Pub Date : 2022-10-31DOI: 10.23919/CNSM55787.2022.9965139
Alberto Huertas Celdrán, Jan Bauer, Melike Demirci, Joel Leupp, M. Franco, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, G. Pérez, B. Stiller
This demo presents RITUAL, a platform composed of a novel algorithm and a Web application quantifying the trustworthiness level of supervised Machine and Deep Learning (ML/DL) models according to their fairness, explainability, robustness, and accountability. The algorithm is deployed on a Web application to allow users to quantify and compare the trustworthiness of their ML/DL models. Finally, a scenario with ML/DL models classifying network cyberattacks demonstrates the platform applicability.
{"title":"RITUAL: a Platform Quantifying the Trustworthiness of Supervised Machine Learning","authors":"Alberto Huertas Celdrán, Jan Bauer, Melike Demirci, Joel Leupp, M. Franco, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, G. Pérez, B. Stiller","doi":"10.23919/CNSM55787.2022.9965139","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9965139","url":null,"abstract":"This demo presents RITUAL, a platform composed of a novel algorithm and a Web application quantifying the trustworthiness level of supervised Machine and Deep Learning (ML/DL) models according to their fairness, explainability, robustness, and accountability. The algorithm is deployed on a Web application to allow users to quantify and compare the trustworthiness of their ML/DL models. Finally, a scenario with ML/DL models classifying network cyberattacks demonstrates the platform applicability.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"17 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121014783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-31DOI: 10.23919/CNSM55787.2022.9964606
Filippos Christou
Intent-based networking is increasingly used to improve network control and management. Network operators have already begun to adopt this paradigm, which leads to a simplified and automatized network operation. The operators can interact with their intent-driven networks through the Northbound Interface (NBI). Given a standardized NBI, the same approach can scale to coordinate intent provisioning across multi-domain networks in a decentralized fashion. This can outdate traditional decentralized protocols and open new opportunities for flexible and scalable communication mechanisms. This paper proposes a minimal and general high-level architecture, relying on a standard IBN (Intent-Based Networking) architecture, for multi-domain intent deployment in IP-optical networks. Our architecture is consistent between diverse network operators that use the same NBI, respects confidential information, promotes accountability, and can scale for various network services. To achieve this, we introduce a hierarchical system-generated intent schema with automatic intent delegation between the different domains.
{"title":"Decentralized Intent-driven Coordination of Multi-Domain IP-Optical Networks","authors":"Filippos Christou","doi":"10.23919/CNSM55787.2022.9964606","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964606","url":null,"abstract":"Intent-based networking is increasingly used to improve network control and management. Network operators have already begun to adopt this paradigm, which leads to a simplified and automatized network operation. The operators can interact with their intent-driven networks through the Northbound Interface (NBI). Given a standardized NBI, the same approach can scale to coordinate intent provisioning across multi-domain networks in a decentralized fashion. This can outdate traditional decentralized protocols and open new opportunities for flexible and scalable communication mechanisms. This paper proposes a minimal and general high-level architecture, relying on a standard IBN (Intent-Based Networking) architecture, for multi-domain intent deployment in IP-optical networks. Our architecture is consistent between diverse network operators that use the same NBI, respects confidential information, promotes accountability, and can scale for various network services. To achieve this, we introduce a hierarchical system-generated intent schema with automatic intent delegation between the different domains.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129296215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-31DOI: 10.23919/CNSM55787.2022.9964765
Cristian Trusin, L. Bertholdo, J. J. Santanna
In 2022 the Russian invasion of Ukraine began. It is known that Ukraine faced outages because of the damage to their infrastructure. It is also known that Russia was boycotted by the international community. However the impact on the telecommunications of the two countries remains unknown. In this paper we quantified the degree to which the Internet was affected in both countries by analyzing routing tables from five large Internet Exchange Points (IXPs). IXPs provide a central point of interconnection where internet traffic can be freely exchanged between Autonomous Systems (ASes). This centrality makes IXPs a good vantage point for analyzing changes in the Internet infrastructure. With data collected before and after the start of the conflict we observed considerable damage to the Ukrainian Internet network with numerous outages and minimal damage to the Russian network. An average of 11.12% of Ukrainian ASes were unreachable at each IXP. We identified the biggest outages and the events responsible for them. This paper highlights resilience issues during conflicts to the network and management community, and serves as a basis for future more in-depth research.
{"title":"The Effect of the Russian-Ukrainian Conflict from the Perspective of Internet eXchanges","authors":"Cristian Trusin, L. Bertholdo, J. J. Santanna","doi":"10.23919/CNSM55787.2022.9964765","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964765","url":null,"abstract":"In 2022 the Russian invasion of Ukraine began. It is known that Ukraine faced outages because of the damage to their infrastructure. It is also known that Russia was boycotted by the international community. However the impact on the telecommunications of the two countries remains unknown. In this paper we quantified the degree to which the Internet was affected in both countries by analyzing routing tables from five large Internet Exchange Points (IXPs). IXPs provide a central point of interconnection where internet traffic can be freely exchanged between Autonomous Systems (ASes). This centrality makes IXPs a good vantage point for analyzing changes in the Internet infrastructure. With data collected before and after the start of the conflict we observed considerable damage to the Ukrainian Internet network with numerous outages and minimal damage to the Russian network. An average of 11.12% of Ukrainian ASes were unreachable at each IXP. We identified the biggest outages and the events responsible for them. This paper highlights resilience issues during conflicts to the network and management community, and serves as a basis for future more in-depth research.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129161925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-31DOI: 10.23919/CNSM55787.2022.9964689
Klement Hagenhoff, Eike Viehmann, G. Rodosek
MANETs comprise several mobile nodes, wirelessly connected with each other. These networks are self-organized, each participant is responsible for routing and data forwarding. Routing protocols only provide local or outdated topology knowledge because participants are moving continuously. Also, transmission capacities are limited which often results in over-utilized network segments. Capacity conform path distribution is challenging since nodes route based on their incomplete topology knowledge. Recent work showed that an up-to-date and complete network topology representation can quickly be delivered to a controller, which is instantiated on an arbitrary node. Now, routing and path deployment can be outsourced to the controller. With this knowledge, we introduce several path finding approaches to answer the question if and to which extent non over-utilizing routes for several flows can be found where common MANET routing techniques would fail. Also, paths have to be computed quickly since topologies change due to the mobility of nodes. Our path finding techniques also focus on routes aiming for long connection lifetime. We compare our approaches regarding capacity usage, computation times, and connection lifetimes, taking into consideration typical MANET behavior.
{"title":"Time-sensitive Multi-Flow Routing in Highly Utilized MANETs","authors":"Klement Hagenhoff, Eike Viehmann, G. Rodosek","doi":"10.23919/CNSM55787.2022.9964689","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964689","url":null,"abstract":"MANETs comprise several mobile nodes, wirelessly connected with each other. These networks are self-organized, each participant is responsible for routing and data forwarding. Routing protocols only provide local or outdated topology knowledge because participants are moving continuously. Also, transmission capacities are limited which often results in over-utilized network segments. Capacity conform path distribution is challenging since nodes route based on their incomplete topology knowledge. Recent work showed that an up-to-date and complete network topology representation can quickly be delivered to a controller, which is instantiated on an arbitrary node. Now, routing and path deployment can be outsourced to the controller. With this knowledge, we introduce several path finding approaches to answer the question if and to which extent non over-utilizing routes for several flows can be found where common MANET routing techniques would fail. Also, paths have to be computed quickly since topologies change due to the mobility of nodes. Our path finding techniques also focus on routes aiming for long connection lifetime. We compare our approaches regarding capacity usage, computation times, and connection lifetimes, taking into consideration typical MANET behavior.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124194047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-31DOI: 10.23919/CNSM55787.2022.9965032
Leyao Nie, Lin He, Guanglei Song, Hao Gao, Chenglong Li, Zhiliang Wang, Jiahai Yang
The Domain Name System (DNS) is critical to Internet communications. EDNS Client Subnet (ECS), a DNS extension, allows recursive resolvers to include client subnet information in DNS queries to improve CDN end-user mapping, extending the visibility of client information to a broader range. Major content delivery network (CDN) vendors, content providers (CP), and public DNS service providers (PDNS) are accelerating their IPv6 infrastructure development. With the increasing deployment of IPv6-enabled services and DNS being the most foundational system of the Internet, it becomes important to analyze the behavioral and privacy status of IPv6 resolvers. However, there is a lack of research on ECS for IPv6 DNS resolvers.In this paper, we study the ECS deployment and compliance status of IPv6 resolvers. Our measurement shows that 11.12% IPv6 open resolvers implement ECS. We discuss abnormal noncompliant scenarios that exist in both IPv6 and IPv4 that raise privacy and performance issues. Additionally, we measured if the sacrifice of clients’ privacy can enhance IPv6 CDN performance. We find that in some cases ECS helps end-user mapping but with an unnecessary privacy loss. And even worse, the exposure of client address information can sometimes backfire, which deserves attention from both Internet users and PDNSes.
{"title":"Towards a Behavioral and Privacy Analysis of ECS for IPv6 DNS Resolvers","authors":"Leyao Nie, Lin He, Guanglei Song, Hao Gao, Chenglong Li, Zhiliang Wang, Jiahai Yang","doi":"10.23919/CNSM55787.2022.9965032","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9965032","url":null,"abstract":"The Domain Name System (DNS) is critical to Internet communications. EDNS Client Subnet (ECS), a DNS extension, allows recursive resolvers to include client subnet information in DNS queries to improve CDN end-user mapping, extending the visibility of client information to a broader range. Major content delivery network (CDN) vendors, content providers (CP), and public DNS service providers (PDNS) are accelerating their IPv6 infrastructure development. With the increasing deployment of IPv6-enabled services and DNS being the most foundational system of the Internet, it becomes important to analyze the behavioral and privacy status of IPv6 resolvers. However, there is a lack of research on ECS for IPv6 DNS resolvers.In this paper, we study the ECS deployment and compliance status of IPv6 resolvers. Our measurement shows that 11.12% IPv6 open resolvers implement ECS. We discuss abnormal noncompliant scenarios that exist in both IPv6 and IPv4 that raise privacy and performance issues. Additionally, we measured if the sacrifice of clients’ privacy can enhance IPv6 CDN performance. We find that in some cases ECS helps end-user mapping but with an unnecessary privacy loss. And even worse, the exposure of client address information can sometimes backfire, which deserves attention from both Internet users and PDNSes.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128204847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-31DOI: 10.23919/CNSM55787.2022.9964775
Tom Goethals, B. Volckaert, F. Turck
In recent years, the continuing growth of the network edge, along with increasing user demands, has led to the need for increasingly complex and responsive management strategies for edge services. Many of these strategies are cloud-based, offering near-perfect solutions at the cost of requiring massive computational power, or edge-based, offering reactive strategies to changing edge conditions. This paper presents a decentralized, pro-active Quality of Experience (QoE) based architecture designed to run on edge nodes, which allows nodes to predict optimal service providers (fog nodes) in advance and request their services. The concepts behind the components of the architecture are explained, as well as geometry-inspired design decisions to limit model size. Evaluations on an NVIDIA Jetson Nano show that the architecture can predict optimal service providers for an edge node in real-time for 5 to 20 QoS (Quality of Service) and QoE parameters, with at least 50 potential fog nodes, and that overall QoE resulting from its use is improved by 1% to 18% over previous work such as SoSwirly, depending on the scenario.
{"title":"A Geometric Approach to Real-time Quality of Experience Prediction in Volatile Edge Networks","authors":"Tom Goethals, B. Volckaert, F. Turck","doi":"10.23919/CNSM55787.2022.9964775","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964775","url":null,"abstract":"In recent years, the continuing growth of the network edge, along with increasing user demands, has led to the need for increasingly complex and responsive management strategies for edge services. Many of these strategies are cloud-based, offering near-perfect solutions at the cost of requiring massive computational power, or edge-based, offering reactive strategies to changing edge conditions. This paper presents a decentralized, pro-active Quality of Experience (QoE) based architecture designed to run on edge nodes, which allows nodes to predict optimal service providers (fog nodes) in advance and request their services. The concepts behind the components of the architecture are explained, as well as geometry-inspired design decisions to limit model size. Evaluations on an NVIDIA Jetson Nano show that the architecture can predict optimal service providers for an edge node in real-time for 5 to 20 QoS (Quality of Service) and QoE parameters, with at least 50 potential fog nodes, and that overall QoE resulting from its use is improved by 1% to 18% over previous work such as SoSwirly, depending on the scenario.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125149124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-31DOI: 10.23919/CNSM55787.2022.9964552
Honglin Fang, Peng Yu, Ying Wang, Wenjing Li, F. Zhou, Run Ma
Network delay is a crucial indicator for realizing delay-sensitive task offloading, network management, and optimization in B5G/6G edge computing networks. However, the delay prediction for edge networks becomes complicated due to diverse access strategies and heterogeneous services’ storage, computing, and communication resource requirements. Current GNN-based delay prediction models such as RouteNet and PLNet lack the ability to express the complex associations between links and paths, so the predicted delay is not accurate. In this paper, we propose a novel end-to-end delay prediction model named MixerNet for edge computing, which is based on the mixed multi-layer perceptron (MLP). In this model, a mixed MLP architecture is applied to represent the association between links in the network topology and various paths. Observing that each link may have different effects on various paths, a weight matrix is then defined and multiplied by the path matrix to express it. Thus, a complete mapping frame from network characteristics (e.g., traffic intensity and routing schemes) to delay indicator is constructed. Finally, we perform extensive experiments on NSFNET and GEANT2 datasets and regard RouteNet as the baseline model. Experimental results show that MixerNet can accurately predict end-to-end delay results on various network topologies and the mean absolute error is merely about 0.36%. MixerNet also outperforms the baseline model in most evaluation indicators, especially the mean square error has a 3-fold decrease in NSFNET.
{"title":"A Novel Network Delay Prediction Model with Mixed Multi-layer Perceptron Architecture for Edge Computing","authors":"Honglin Fang, Peng Yu, Ying Wang, Wenjing Li, F. Zhou, Run Ma","doi":"10.23919/CNSM55787.2022.9964552","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964552","url":null,"abstract":"Network delay is a crucial indicator for realizing delay-sensitive task offloading, network management, and optimization in B5G/6G edge computing networks. However, the delay prediction for edge networks becomes complicated due to diverse access strategies and heterogeneous services’ storage, computing, and communication resource requirements. Current GNN-based delay prediction models such as RouteNet and PLNet lack the ability to express the complex associations between links and paths, so the predicted delay is not accurate. In this paper, we propose a novel end-to-end delay prediction model named MixerNet for edge computing, which is based on the mixed multi-layer perceptron (MLP). In this model, a mixed MLP architecture is applied to represent the association between links in the network topology and various paths. Observing that each link may have different effects on various paths, a weight matrix is then defined and multiplied by the path matrix to express it. Thus, a complete mapping frame from network characteristics (e.g., traffic intensity and routing schemes) to delay indicator is constructed. Finally, we perform extensive experiments on NSFNET and GEANT2 datasets and regard RouteNet as the baseline model. Experimental results show that MixerNet can accurately predict end-to-end delay results on various network topologies and the mean absolute error is merely about 0.36%. MixerNet also outperforms the baseline model in most evaluation indicators, especially the mean square error has a 3-fold decrease in NSFNET.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127617007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-31DOI: 10.23919/CNSM55787.2022.9965155
Raffaele Sommese, M. Jonker, J. V. D. Ham, G. Moura
Electronic government (e-gov) enables citizens and residents to digitally interact with their government via the Internet. Underpinning these services is the Internet Domain Name Systems (DNS), which maps e-gov domain names to Internet addresses. Structuring DNS with multiple levels of redundancy that can withstand stress events such as denial-of-service (DoS) attacks is a challenging task. While the operator community has established best practices to this end, adopting them all involves expert knowledge and resources. In this work, we obtain and study a list of e-gov domain names used by four countries (The Netherlands, Sweden, Switzerland, and the United States) and measure the DNS structuring of these domains. We show the adoption of best practices, inter-country differences such as the use of anycast, and provide recommendations to improve DNS service robustness.
{"title":"Assessing e-Government DNS Resilience","authors":"Raffaele Sommese, M. Jonker, J. V. D. Ham, G. Moura","doi":"10.23919/CNSM55787.2022.9965155","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9965155","url":null,"abstract":"Electronic government (e-gov) enables citizens and residents to digitally interact with their government via the Internet. Underpinning these services is the Internet Domain Name Systems (DNS), which maps e-gov domain names to Internet addresses. Structuring DNS with multiple levels of redundancy that can withstand stress events such as denial-of-service (DoS) attacks is a challenging task. While the operator community has established best practices to this end, adopting them all involves expert knowledge and resources. In this work, we obtain and study a list of e-gov domain names used by four countries (The Netherlands, Sweden, Switzerland, and the United States) and measure the DNS structuring of these domains. We show the adoption of best practices, inter-country differences such as the use of anycast, and provide recommendations to improve DNS service robustness.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134056844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-31DOI: 10.23919/CNSM55787.2022.9964540
M. Weber, Ghofrane Fersi, F. Derbel
Wake-up Receiver (WuRx) is one of the most trivial and effective solutions for energy-constrained networks and a promising solution for monitoring various phenomena in the sense of the Internet of Things (IoT). The most important and challenging issue in WuRx-based networks is the time efficient routing process in an energy efficient manner. Effectively, awaking each node needed in the routing process recursively requires a lot of time which is not suitable for time-critical applications. In this paper, we propose a novel Wake-up Receiver based routing protocol called Time Efficient WuRx-based Routing (TEW) that ensures energy optimised and time efficient routing in indoor scenarios. In our proposed approach, the network is divided into clusters at which each Fog Node manages the routes for data transmission in an asymmetric manner. When the Sink requires data from a specific set of nodes of a particular cluster, the Sink transmits a DataPts request to the corresponding Fog Node. In addition, the Fog Node sends instructions by means of a single Request (REQ) packet informing the corresponding nodes how often they should act as relays before switching to the sleeping mode. The measurement results show that our proposed approach has higher energy efficiency and achieves significant performance improvements in data delivery delay.
{"title":"Wake-up Receiver based routing protocol for indoor Wireless Sensor Networks","authors":"M. Weber, Ghofrane Fersi, F. Derbel","doi":"10.23919/CNSM55787.2022.9964540","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964540","url":null,"abstract":"Wake-up Receiver (WuRx) is one of the most trivial and effective solutions for energy-constrained networks and a promising solution for monitoring various phenomena in the sense of the Internet of Things (IoT). The most important and challenging issue in WuRx-based networks is the time efficient routing process in an energy efficient manner. Effectively, awaking each node needed in the routing process recursively requires a lot of time which is not suitable for time-critical applications. In this paper, we propose a novel Wake-up Receiver based routing protocol called Time Efficient WuRx-based Routing (TEW) that ensures energy optimised and time efficient routing in indoor scenarios. In our proposed approach, the network is divided into clusters at which each Fog Node manages the routes for data transmission in an asymmetric manner. When the Sink requires data from a specific set of nodes of a particular cluster, the Sink transmits a DataPts request to the corresponding Fog Node. In addition, the Fog Node sends instructions by means of a single Request (REQ) packet informing the corresponding nodes how often they should act as relays before switching to the sleeping mode. The measurement results show that our proposed approach has higher energy efficiency and achieves significant performance improvements in data delivery delay.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134228067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-31DOI: 10.23919/CNSM55787.2022.9964650
Pedro Escaleira, Miguel Mota, D. Gomes, J. Barraca, Rui L. Aguiar
Standardization organizations, such as the European Telecommunications Standards Institute (ETSI), have been gathering efforts to specify the Edge Computing paradigm. However, there is still a lack of complete, interface-wise, actual implementations and evaluations of a fully functional Edge Computing architecture. On these grounds, the work presented in this paper proposes a new Multi-access Edge Computing (MEC)-Network Functions Virtualization (NFV) architecture for a challenging Business to Business to Consumer (B2B2C) model, based on the references provided by ETSI, and provides a prototype implementation to demonstrate its viability. The tests conducted show that the proposed framework can be efficiently deployed, allowing Telecommunications Operators to rapidly instantiate and provide an elastic Edge Infrastructure to their customers.
{"title":"Multi-access Edge Computing as a Service","authors":"Pedro Escaleira, Miguel Mota, D. Gomes, J. Barraca, Rui L. Aguiar","doi":"10.23919/CNSM55787.2022.9964650","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964650","url":null,"abstract":"Standardization organizations, such as the European Telecommunications Standards Institute (ETSI), have been gathering efforts to specify the Edge Computing paradigm. However, there is still a lack of complete, interface-wise, actual implementations and evaluations of a fully functional Edge Computing architecture. On these grounds, the work presented in this paper proposes a new Multi-access Edge Computing (MEC)-Network Functions Virtualization (NFV) architecture for a challenging Business to Business to Consumer (B2B2C) model, based on the references provided by ETSI, and provides a prototype implementation to demonstrate its viability. The tests conducted show that the proposed framework can be efficiently deployed, allowing Telecommunications Operators to rapidly instantiate and provide an elastic Edge Infrastructure to their customers.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130143580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}