首页 > 最新文献

2020 6th IEEE Conference on Network Softwarization (NetSoft)最新文献

英文 中文
On the Security of Permissioned Blockchain Solutions for IoT Applications 关于物联网应用许可区块链解决方案的安全性
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165480
Sotirios Brotsis, N. Kolokotronis, Konstantinos Limniotis, S. Shiaeles
The blockchain has found numerous applications in many areas with the expectation to significantly enhance their security. The Internet of things (IoT) constitutes a prominent application domain of blockchain, with a number of architectures having been proposed for improving not only security but also properties like transparency and auditability. However, many blockchain solutions suffer from inherent constraints associated with the consensus protocol used. These constraints are mostly inherited by the permissionless setting, e.g. computational power in proof-of-work, and become serious obstacles in a resource-constrained IoT environment. Moreover, consensus protocols with low throughput or high latency are not suitable for IoT networks where massive volumes of data are generated. Thus, in this paper we focus on permissioned blockchain platforms and investigate the consensus protocols used, aiming at evaluating their performance and fault tolerance as the main selection criteria for (in principle highly insecure) IoT ecosystem. The results of the paper provide new insights on the essential differences of various consensus protocols and their capacity to meet IoT needs.
区块链已经在许多领域找到了许多应用,期望大大提高它们的安全性。物联网(IoT)构成了区块链的一个重要应用领域,已经提出了许多架构,不仅可以提高安全性,还可以提高透明度和可审计性等属性。然而,许多区块链解决方案受到与所使用的共识协议相关的固有约束。这些约束大多由无权限设置继承,例如工作量证明中的计算能力,并在资源受限的物联网环境中成为严重障碍。此外,低吞吐量或高延迟的共识协议不适合生成大量数据的物联网网络。因此,在本文中,我们专注于许可的区块链平台,并研究所使用的共识协议,旨在评估其性能和容错性,作为(原则上高度不安全的)物联网生态系统的主要选择标准。本文的结果对各种共识协议的本质差异及其满足物联网需求的能力提供了新的见解。
{"title":"On the Security of Permissioned Blockchain Solutions for IoT Applications","authors":"Sotirios Brotsis, N. Kolokotronis, Konstantinos Limniotis, S. Shiaeles","doi":"10.1109/NetSoft48620.2020.9165480","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165480","url":null,"abstract":"The blockchain has found numerous applications in many areas with the expectation to significantly enhance their security. The Internet of things (IoT) constitutes a prominent application domain of blockchain, with a number of architectures having been proposed for improving not only security but also properties like transparency and auditability. However, many blockchain solutions suffer from inherent constraints associated with the consensus protocol used. These constraints are mostly inherited by the permissionless setting, e.g. computational power in proof-of-work, and become serious obstacles in a resource-constrained IoT environment. Moreover, consensus protocols with low throughput or high latency are not suitable for IoT networks where massive volumes of data are generated. Thus, in this paper we focus on permissioned blockchain platforms and investigate the consensus protocols used, aiming at evaluating their performance and fault tolerance as the main selection criteria for (in principle highly insecure) IoT ecosystem. The results of the paper provide new insights on the essential differences of various consensus protocols and their capacity to meet IoT needs.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"105 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120827126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IoT Malware Network Traffic Classification using Visual Representation and Deep Learning 使用视觉表示和深度学习的物联网恶意软件网络流量分类
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165381
G. Bendiab, S. Shiaeles, Abdulrahman Alruban, N. Kolokotronis
With the increase of IoT devices and technologies coming into service, Malware has risen as a challenging threat with increased infection rates and levels of sophistication. Without strong security mechanisms, a huge amount of sensitive data are exposed to vulnerabilities, and therefore, easily abused by cybercriminals to perform several illegal activities. Thus, advanced network security mechanisms that are able of performing a real-time traffic analysis and mitigation of malicious traffic are required. To address this challenge, we are proposing a novel IoT malware traffic analysis approach using deep learning and visual representation for faster detection and classification of new malware (zero-day malware). The detection of malicious network traffic in the proposed approach works at the package level, reducing significantly the time of detection with promising results due to the deep learning technologies used. To evaluate our proposed method performance, a dataset is constructed which consists of 1000 pcap files of normal and malware traffic that are collected from different network traffic sources. The experimental results of Residual Neural Network (ResNet50) are very promising, providing a 94.50% accuracy rate for detection of malware traffic.
随着物联网设备和技术投入使用的增加,恶意软件已经成为一种具有挑战性的威胁,感染率和复杂程度都在增加。如果没有强大的安全机制,大量的敏感数据就会暴露在漏洞中,容易被网络犯罪分子滥用,进行各种非法活动。因此,需要能够执行实时流量分析和减轻恶意流量的高级网络安全机制。为了应对这一挑战,我们提出了一种新的物联网恶意软件流量分析方法,使用深度学习和可视化表示来更快地检测和分类新的恶意软件(零日恶意软件)。在该方法中,恶意网络流量的检测工作在包级别,由于使用了深度学习技术,大大减少了检测时间,结果很有希望。为了评估我们提出的方法的性能,构建了一个数据集,该数据集由从不同网络流量源收集的1000个正常和恶意流量的pcap文件组成。残差神经网络(ResNet50)的实验结果非常有前景,对恶意流量的检测准确率达到94.50%。
{"title":"IoT Malware Network Traffic Classification using Visual Representation and Deep Learning","authors":"G. Bendiab, S. Shiaeles, Abdulrahman Alruban, N. Kolokotronis","doi":"10.1109/NetSoft48620.2020.9165381","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165381","url":null,"abstract":"With the increase of IoT devices and technologies coming into service, Malware has risen as a challenging threat with increased infection rates and levels of sophistication. Without strong security mechanisms, a huge amount of sensitive data are exposed to vulnerabilities, and therefore, easily abused by cybercriminals to perform several illegal activities. Thus, advanced network security mechanisms that are able of performing a real-time traffic analysis and mitigation of malicious traffic are required. To address this challenge, we are proposing a novel IoT malware traffic analysis approach using deep learning and visual representation for faster detection and classification of new malware (zero-day malware). The detection of malicious network traffic in the proposed approach works at the package level, reducing significantly the time of detection with promising results due to the deep learning technologies used. To evaluate our proposed method performance, a dataset is constructed which consists of 1000 pcap files of normal and malware traffic that are collected from different network traffic sources. The experimental results of Residual Neural Network (ResNet50) are very promising, providing a 94.50% accuracy rate for detection of malware traffic.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123410937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Spider: Parallelizing Longest Prefix Matching with Optimization for SIMD Instructions 蜘蛛:并行最长前缀匹配与优化SIMD指令
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165306
Yukito Ueno, Ryo Nakamura, Yohei Kuga, H. Esaki
Longest prefix matching (LPM) is a fundamental process in IP routing used not only in traditional hardware routers but also in modern software middleboxes such as the applications of Network Function Virtualization. However, the performance of recent LPM methods in software routers is insufficient for high-speed packet processing such as two or more 100 Gbps throughput. To improve the performance of LPM, we propose Spider, a new LPM method that achieves a fully parallelized LPM procedure using single instruction, multiple data (SIMD) instructions in a CPU. The evaluation shows that the proposed method has 1.8-1.9 times faster LPM performance compared with the state-of-the-art methods in this study area. We describe the Spider's lookup procedure fully parallelized by SIMD instructions and the design of the routing table efficiently processed by the procedure. We also report the following three evaluations: (1) The effect of parallelization by SIMD instructions on the performance of Spider; (2) the scalability of Spider with the number of CPU cores; and (3) the performance comparison with the previous methods in terms of randomly generated and real-trace traffic patterns.
最长前缀匹配(LPM)是IP路由的一个基本过程,不仅用于传统的硬件路由器,也用于现代软件中间件,如网络功能虚拟化的应用。然而,目前软件路由器中LPM方法的性能不足以满足两个或两个以上100gbps吞吐量的高速分组处理。为了提高LPM的性能,我们提出了一种新的LPM方法Spider,它在CPU中使用单指令多数据(SIMD)指令实现了完全并行的LPM过程。评价结果表明,该方法的LPM性能比本研究区域现有方法快1.8 ~ 1.9倍。描述了由SIMD指令完全并行化的Spider查找过程,以及该过程有效处理路由表的设计。我们还报告了以下三个评估:(1)SIMD指令并行化对Spider性能的影响;(2) Spider随CPU核数的可扩展性;(3)随机生成和实时跟踪流量模式与以往方法的性能比较。
{"title":"Spider: Parallelizing Longest Prefix Matching with Optimization for SIMD Instructions","authors":"Yukito Ueno, Ryo Nakamura, Yohei Kuga, H. Esaki","doi":"10.1109/NetSoft48620.2020.9165306","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165306","url":null,"abstract":"Longest prefix matching (LPM) is a fundamental process in IP routing used not only in traditional hardware routers but also in modern software middleboxes such as the applications of Network Function Virtualization. However, the performance of recent LPM methods in software routers is insufficient for high-speed packet processing such as two or more 100 Gbps throughput. To improve the performance of LPM, we propose Spider, a new LPM method that achieves a fully parallelized LPM procedure using single instruction, multiple data (SIMD) instructions in a CPU. The evaluation shows that the proposed method has 1.8-1.9 times faster LPM performance compared with the state-of-the-art methods in this study area. We describe the Spider's lookup procedure fully parallelized by SIMD instructions and the design of the routing table efficiently processed by the procedure. We also report the following three evaluations: (1) The effect of parallelization by SIMD instructions on the performance of Spider; (2) the scalability of Spider with the number of CPU cores; and (3) the performance comparison with the previous methods in terms of randomly generated and real-trace traffic patterns.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125436817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Orchestrating SDN Control Plane towards Enhanced IoT Security 编排SDN控制平面,增强物联网安全性
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165424
Hasan Tooba, Adnan Akhunzada, Thanassis Giannetsos, Jahanzaib Malik
The Internet of Things (IoT) is rapidly evolving, while introducing several new challenges regarding security, resilience and operational assurance. In the face of an increasing attack landscape, it is necessary to cater for the provision of efficient mechanisms to collectively detect sophisticated malware resulting in undesirable (run-time) device and network modifications. This is not an easy task considering the dynamic and heterogeneous nature of IoT environments; i.e., different operating systems, varied connected networks and a wide gamut of underlying protocols and devices. Malicious IoT nodes or gateways can potentially lead to the compromise of the whole IoT network infrastructure. On the other hand, the SDN control plane has the capability to be orchestrated towards providing enhanced security services to all layers of the IoT networking stack. In this paper, we propose an SDN-enabled control plane based orchestration that leverages emerging Long Short-Term Memory (LSTM) classification models; a Deep Learning (DL) based architecture to combat malicious IoT nodes. It is a first step towards a new line of security mechanisms that enables the provision of scalable AI-based intrusion detection focusing on the operational assurance of only those specific, critical infrastructure components,thus, allowing for a much more efficient security solution. The proposed mechanism has been evaluated with current state of the art datasets (i.e., N_BaIoT 2018) using standard performance evaluation metrics. Our preliminary results show an outstanding detection accuracy (i.e., 99.9%) which significantly outperforms state-of-the-art approaches. Based on our findings, we posit open issues and challenges, and discuss possible ways to address them, so that security does not hinder the deployment of intelligent IoT-based computing systems.
物联网(IoT)正在迅速发展,同时在安全性、弹性和运营保障方面引入了一些新的挑战。面对越来越多的攻击,有必要提供有效的机制来集体检测导致不良(运行时)设备和网络修改的复杂恶意软件。考虑到物联网环境的动态性和异构性,这不是一件容易的事;也就是说,不同的操作系统,不同的连接网络和广泛的底层协议和设备。恶意的物联网节点或网关可能会导致整个物联网网络基础设施的破坏。另一方面,SDN控制平面有能力为物联网网络堆栈的所有层提供增强的安全服务。在本文中,我们提出了一个基于sdn的基于编排的控制平面,该编排利用了新兴的长短期记忆(LSTM)分类模型;基于深度学习(DL)的架构,用于对抗恶意物联网节点。这是迈向新的安全机制的第一步,它能够提供可扩展的基于人工智能的入侵检测,只关注那些特定的、关键的基础设施组件的操作保证,因此,允许更有效的安全解决方案。所提出的机制已使用当前最先进的数据集(即N_BaIoT 2018)使用标准性能评估指标进行了评估。我们的初步结果显示出卓越的检测精度(即99.9%),显著优于最先进的方法。根据我们的研究结果,我们提出了开放的问题和挑战,并讨论了解决这些问题的可能方法,以便安全不会阻碍基于物联网的智能计算系统的部署。
{"title":"Orchestrating SDN Control Plane towards Enhanced IoT Security","authors":"Hasan Tooba, Adnan Akhunzada, Thanassis Giannetsos, Jahanzaib Malik","doi":"10.1109/NetSoft48620.2020.9165424","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165424","url":null,"abstract":"The Internet of Things (IoT) is rapidly evolving, while introducing several new challenges regarding security, resilience and operational assurance. In the face of an increasing attack landscape, it is necessary to cater for the provision of efficient mechanisms to collectively detect sophisticated malware resulting in undesirable (run-time) device and network modifications. This is not an easy task considering the dynamic and heterogeneous nature of IoT environments; i.e., different operating systems, varied connected networks and a wide gamut of underlying protocols and devices. Malicious IoT nodes or gateways can potentially lead to the compromise of the whole IoT network infrastructure. On the other hand, the SDN control plane has the capability to be orchestrated towards providing enhanced security services to all layers of the IoT networking stack. In this paper, we propose an SDN-enabled control plane based orchestration that leverages emerging Long Short-Term Memory (LSTM) classification models; a Deep Learning (DL) based architecture to combat malicious IoT nodes. It is a first step towards a new line of security mechanisms that enables the provision of scalable AI-based intrusion detection focusing on the operational assurance of only those specific, critical infrastructure components,thus, allowing for a much more efficient security solution. The proposed mechanism has been evaluated with current state of the art datasets (i.e., N_BaIoT 2018) using standard performance evaluation metrics. Our preliminary results show an outstanding detection accuracy (i.e., 99.9%) which significantly outperforms state-of-the-art approaches. Based on our findings, we posit open issues and challenges, and discuss possible ways to address them, so that security does not hinder the deployment of intelligent IoT-based computing systems.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"467 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114891905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Automated Provisioning of Cloud-Native Network Functions in Multi-Cloud Environments 多云环境下云原生网络功能的自动发放
Pub Date : 2020-06-01 DOI: 10.1109/netsoft48620.2020.9165343
Shiku Hirai, Takuya Tojo, S. Seto, S. Yasukawa
Cloud-native Network Functions (CNFs), which are an advanced form of Virtualized Network Functions (VNFs), are expected to optimize network slicing and make the development and deployment cycle of network services faster than VNFs by using a container-based microservices architecture. However, to satisfy the requirements for high reliability and performance assurance unique to network services, additional functions specific to the Kubernetes-based CNF platform are required. In this demonstration, we propose an automated CNF provisioning engine that optimizes the hardware resources of CNFs in multi-cloud environments on the basis of performance prediction and demonstrate its effectiveness by implementing it on Kubernetes as a core function of the future CNF platform.
云原生网络功能(cnf)是虚拟化网络功能(VNFs)的高级形式,通过使用基于容器的微服务架构,有望优化网络切片,并使网络服务的开发和部署周期比VNFs更快。然而,为了满足网络服务对高可靠性和性能保证的独特要求,需要基于kubernetes的CNF平台特有的附加功能。在这个演示中,我们提出了一个自动化的CNF供应引擎,该引擎在性能预测的基础上优化了多云环境下CNF的硬件资源,并通过在Kubernetes上实现它作为未来CNF平台的核心功能来证明其有效性。
{"title":"Automated Provisioning of Cloud-Native Network Functions in Multi-Cloud Environments","authors":"Shiku Hirai, Takuya Tojo, S. Seto, S. Yasukawa","doi":"10.1109/netsoft48620.2020.9165343","DOIUrl":"https://doi.org/10.1109/netsoft48620.2020.9165343","url":null,"abstract":"Cloud-native Network Functions (CNFs), which are an advanced form of Virtualized Network Functions (VNFs), are expected to optimize network slicing and make the development and deployment cycle of network services faster than VNFs by using a container-based microservices architecture. However, to satisfy the requirements for high reliability and performance assurance unique to network services, additional functions specific to the Kubernetes-based CNF platform are required. In this demonstration, we propose an automated CNF provisioning engine that optimizes the hardware resources of CNFs in multi-cloud environments on the basis of performance prediction and demonstrate its effectiveness by implementing it on Kubernetes as a core function of the future CNF platform.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128523380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Integrated Instrumentation and Insights Framework for Holistic 5G Slice Assurance 全面5G切片保证的集成仪器和洞察框架
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165431
P. Veitch, John J. Browne, Jonas Krogell
A key requirement for 5G networks supporting a range of network slices with distinct service characteristics, is to provide continuous monitoring and assurance of slice key performance indicators (KPIs). This paper describes a novel integrated framework using complementary methods of monitoring performance assurance. End-to-end active monitoring using a vendor-specific capability, is complemented by an open-source solution to passively collect and visualize platform telemetry. Via a proof-of-concept testbed, it is demonstrated that combining the reporting and visualization of performance KPIs applicable to different parts of the network infrastructure, provides a very powerful and holistic insights framework for 5G slicing assurance.
支持多种具有不同业务特征的网络切片的5G网络的一个关键要求是对切片关键性能指标(kpi)进行持续监控和保证。本文描述了一种新的集成框架,使用了监控性能保证的补充方法。端到端主动监控使用特定于供应商的功能,辅以开源解决方案被动收集和可视化平台遥测。通过概念验证测试平台,证明了将适用于网络基础设施不同部分的性能kpi的报告和可视化相结合,为5G切片保证提供了非常强大和全面的洞察框架。
{"title":"An Integrated Instrumentation and Insights Framework for Holistic 5G Slice Assurance","authors":"P. Veitch, John J. Browne, Jonas Krogell","doi":"10.1109/NetSoft48620.2020.9165431","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165431","url":null,"abstract":"A key requirement for 5G networks supporting a range of network slices with distinct service characteristics, is to provide continuous monitoring and assurance of slice key performance indicators (KPIs). This paper describes a novel integrated framework using complementary methods of monitoring performance assurance. End-to-end active monitoring using a vendor-specific capability, is complemented by an open-source solution to passively collect and visualize platform telemetry. Via a proof-of-concept testbed, it is demonstrated that combining the reporting and visualization of performance KPIs applicable to different parts of the network infrastructure, provides a very powerful and holistic insights framework for 5G slicing assurance.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115380384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Techno-economic evaluation of a brokerage role in the context of integrated satellite-5G networks 卫星- 5g综合网络背景下中介作用的技术经济评估
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165508
Asma Chiha, M. V. D. Wee, K. Briggs, D. Colle
The ever-increasing customer demand for emerging applications and services poses new technological as well as business challenges for the new 5G networks. To meet user’ expectations, satellite communication can complement terrestrial deployments, in some specific use cases. Though, integrating satellite and 5G needs close collaboration between different network operators, that have different backgrounds, which poses business and technical challenges. This paper aims to assess, from a business-model perspective, the role of a radio-resource broker in the satellite-5G network integration case. The paper concludes that efficiency gains can be result from using a broker, if specific technical challenges are overcome and if it is managed by a regulatory body. The broker analysis showed that three different business models of the broker can be realized, depending on which level the satellite operator could allow the broker to manage its network resources.
客户对新兴应用和服务的需求不断增长,为新型5G网络带来了新的技术和业务挑战。为了满足用户的期望,在某些特定用例中,卫星通信可以补充地面部署。然而,整合卫星和5G需要不同背景的不同网络运营商之间的密切合作,这带来了业务和技术挑战。本文旨在从商业模式的角度评估无线电资源代理在卫星- 5g网络集成案例中的作用。该论文的结论是,如果克服了具体的技术挑战,并且由监管机构进行管理,那么使用经纪人可以提高效率。代理分析表明,根据卫星运营商允许代理管理其网络资源的级别,可以实现代理的三种不同的业务模型。
{"title":"Techno-economic evaluation of a brokerage role in the context of integrated satellite-5G networks","authors":"Asma Chiha, M. V. D. Wee, K. Briggs, D. Colle","doi":"10.1109/NetSoft48620.2020.9165508","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165508","url":null,"abstract":"The ever-increasing customer demand for emerging applications and services poses new technological as well as business challenges for the new 5G networks. To meet user’ expectations, satellite communication can complement terrestrial deployments, in some specific use cases. Though, integrating satellite and 5G needs close collaboration between different network operators, that have different backgrounds, which poses business and technical challenges. This paper aims to assess, from a business-model perspective, the role of a radio-resource broker in the satellite-5G network integration case. The paper concludes that efficiency gains can be result from using a broker, if specific technical challenges are overcome and if it is managed by a regulatory body. The broker analysis showed that three different business models of the broker can be realized, depending on which level the satellite operator could allow the broker to manage its network resources.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114383160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linking QoE and Performance Models for DASH-based Video Streaming 链接QoE和性能模型的基于dash的视频流
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165339
Susanna Schwarzmann, T. Zinner
HTTP Adaptive Streaming (HAS) is the de-facto standard for video delivery over the Internet. Splitting the video clip into small segments and providing multiple quality levels per segment allows the client to dynamically adapt the quality to current network conditions. The performance of HAS, and as a consequence the user Quality of Experience (QoE), is influenced by a multitude of parameters. This includes adjustable settings like quality switching thresholds, the initial buffer level, or the maximum buffer, as well as video characteristics like segment duration or the variation of segment sizes along the video. Recently, a couple of analytical models for video streaming have been proposed, allowing to compare these input parameters and derive their impact on QoE-relevant metrics for HAS-based video delivery. The outcome of these models are typically asymptotic probabilities, distribution functions, or centralized and standardized moments. For instance, these models do not yield any temporal information in terms of stalling events or requested video quality. This contradicts to QoE prediction models like P.1203, which compute the QoE based on the chronological sequence of a specific video playback. So far, it is unclear how and to which extent the generalized results of analytical models can be utilized to derive sequence-based QoE values or the QoE distribution for a set of sequences for similar input parameters with stochastic variations. To address this problem, we compare testbed measurements with the output of a GI/GI/1 model with pq-policy and buffer-based quality switching capability to conclude to which extent the results still allow to approximate the video QoE.
HTTP自适应流(HAS)是Internet上视频传输的事实上的标准。将视频片段分成小段,并为每个段提供多个质量级别,使客户端能够动态地适应当前网络条件的质量。HAS的性能以及用户体验质量(QoE)受到众多参数的影响。这包括可调设置,如质量切换阈值、初始缓冲级别或最大缓冲区,以及视频特征,如片段持续时间或视频中片段大小的变化。最近,已经提出了几个视频流的分析模型,允许比较这些输入参数,并得出它们对基于has的视频传输的qos相关指标的影响。这些模型的结果通常是渐近概率、分布函数或集中和标准化的矩。例如,这些模型不会产生任何关于延迟事件或所要求的视频质量的时间信息。这与P.1203等QoE预测模型相矛盾,后者根据特定视频播放的时间顺序计算QoE。迄今为止,尚不清楚如何以及在多大程度上利用分析模型的广义结果来推导基于序列的QoE值或一组具有随机变化的相似输入参数的序列的QoE分布。为了解决这个问题,我们将测试平台的测量结果与具有pq策略和基于缓冲区的质量切换能力的GI/GI/1模型的输出进行比较,以得出结论,结果在多大程度上仍然允许近似视频QoE。
{"title":"Linking QoE and Performance Models for DASH-based Video Streaming","authors":"Susanna Schwarzmann, T. Zinner","doi":"10.1109/NetSoft48620.2020.9165339","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165339","url":null,"abstract":"HTTP Adaptive Streaming (HAS) is the de-facto standard for video delivery over the Internet. Splitting the video clip into small segments and providing multiple quality levels per segment allows the client to dynamically adapt the quality to current network conditions. The performance of HAS, and as a consequence the user Quality of Experience (QoE), is influenced by a multitude of parameters. This includes adjustable settings like quality switching thresholds, the initial buffer level, or the maximum buffer, as well as video characteristics like segment duration or the variation of segment sizes along the video. Recently, a couple of analytical models for video streaming have been proposed, allowing to compare these input parameters and derive their impact on QoE-relevant metrics for HAS-based video delivery. The outcome of these models are typically asymptotic probabilities, distribution functions, or centralized and standardized moments. For instance, these models do not yield any temporal information in terms of stalling events or requested video quality. This contradicts to QoE prediction models like P.1203, which compute the QoE based on the chronological sequence of a specific video playback. So far, it is unclear how and to which extent the generalized results of analytical models can be utilized to derive sequence-based QoE values or the QoE distribution for a set of sequences for similar input parameters with stochastic variations. To address this problem, we compare testbed measurements with the output of a GI/GI/1 model with pq-policy and buffer-based quality switching capability to conclude to which extent the results still allow to approximate the video QoE.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114644215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Shortest Path Tour Problem Based Integer Linear Programming for Service Chaining in NFV Networks 基于最短路径漫游问题的NFV网络业务链整数线性规划
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165364
Masahiro Sasabe, Takanori Hara
Network functions virtualization (NFV) is a new paradigm to achieve flexible and agile network services by decoupling network functions from proprietary hardware and running them on generic hardware as virtual network functions (VNFs). In the NFV network, a certain network service can be modeled as a sequence of VNFs, called a service chain. Given a connection request (origin node, destination node, and service chain requirement, which is a sequence of functions), the service chaining problem aims to find an appropriate service path, which starts from the origin and ends with the destination while executing the VNFs at the intermediate nodes in the required order. Some existing work noticed that the service chaining problem was similar to the shortest path tour problem (SPTP). To the best of our knowledge, this is the first work that exactly formulates the service chaining problem as an SPTP-based integer linear program (ILP). Through numerical results, we show the SPTP-based ILP can support 1.30-1.77 times larger scale systems than the existing ILP.
网络功能虚拟化(Network functions virtualization, NFV)是一种实现灵活敏捷网络服务的新范式,它将网络功能与专有硬件解耦,并以虚拟网络功能(virtual Network functions, VNFs)的形式运行在通用硬件上。在NFV网络中,可以将某一网络业务建模为一系列的VNFs,称为业务链。给定一个连接请求(源节点、目的节点和服务链需求,服务链需求是一个函数序列),服务链问题的目的是寻找一条合适的服务路径,该路径从源节点开始,以目标节点结束,同时在中间节点按要求的顺序执行VNFs。一些现有的工作注意到服务链问题类似于最短路径漫游问题(SPTP)。据我们所知,这是第一个将服务链问题精确地表述为基于sptp的整数线性规划(ILP)的工作。数值结果表明,基于sptp的ILP可以支持比现有ILP大1.30-1.77倍的系统规模。
{"title":"Shortest Path Tour Problem Based Integer Linear Programming for Service Chaining in NFV Networks","authors":"Masahiro Sasabe, Takanori Hara","doi":"10.1109/NetSoft48620.2020.9165364","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165364","url":null,"abstract":"Network functions virtualization (NFV) is a new paradigm to achieve flexible and agile network services by decoupling network functions from proprietary hardware and running them on generic hardware as virtual network functions (VNFs). In the NFV network, a certain network service can be modeled as a sequence of VNFs, called a service chain. Given a connection request (origin node, destination node, and service chain requirement, which is a sequence of functions), the service chaining problem aims to find an appropriate service path, which starts from the origin and ends with the destination while executing the VNFs at the intermediate nodes in the required order. Some existing work noticed that the service chaining problem was similar to the shortest path tour problem (SPTP). To the best of our knowledge, this is the first work that exactly formulates the service chaining problem as an SPTP-based integer linear program (ILP). Through numerical results, we show the SPTP-based ILP can support 1.30-1.77 times larger scale systems than the existing ILP.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114916026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PolKA: Polynomial Key-based Architecture for Source Routing in Network Fabrics 网络结构中基于多项式密钥的源路由体系结构
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165501
C. Dominicini, D. Mafioletti, A. Locateli, R. Villaça, M. Martinello, M. Ribeiro, A. Gorodnik
Source routing (SR) is a prominent alternative to table-based routing for reducing the number of network states. However, traditional SR approaches, based on Port Switching, still maintain a state in the packet by using a header rewrite operation. The residue number system (RNS) is a promising way of executing fully stateless SR, in which forwarding decisions at core nodes rely on a simple modulo operation over a route label. Nevertheless, such operation over integer arithmetic is not natively supported by commodity network hardware. Thus, we propose a novel RNS-based SR scheme, named PolKA, that explores binary polynomial arithmetic using Galois field (GF) of order 2. We evaluate PolKA in comparison to Port Switching by implementing emulated and hardware prototypes using P4 architecture. Results show that PolKA can achieve equivalent performance, while providing advanced routing features, such as fast failure reaction and agile path migration.
源路由(SR)是基于表的路由的重要替代方案,用于减少网络状态的数量。然而,基于端口交换的传统SR方法仍然通过使用报头重写操作来维护数据包中的状态。残数系统(RNS)是一种很有前途的执行完全无状态SR的方法,其中核心节点的转发决策依赖于对路由标签的简单模操作。然而,这种对整数运算的操作并不为普通网络硬件所支持。因此,我们提出了一种新的基于rns的SR方案,名为PolKA,该方案利用2阶伽罗瓦场(GF)探索二元多项式算法。我们通过使用P4架构实现仿真和硬件原型来评估PolKA与端口交换的比较。结果表明,PolKA在提供快速故障反应和灵活路径迁移等高级路由特性的同时,可以达到等效性能。
{"title":"PolKA: Polynomial Key-based Architecture for Source Routing in Network Fabrics","authors":"C. Dominicini, D. Mafioletti, A. Locateli, R. Villaça, M. Martinello, M. Ribeiro, A. Gorodnik","doi":"10.1109/NetSoft48620.2020.9165501","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165501","url":null,"abstract":"Source routing (SR) is a prominent alternative to table-based routing for reducing the number of network states. However, traditional SR approaches, based on Port Switching, still maintain a state in the packet by using a header rewrite operation. The residue number system (RNS) is a promising way of executing fully stateless SR, in which forwarding decisions at core nodes rely on a simple modulo operation over a route label. Nevertheless, such operation over integer arithmetic is not natively supported by commodity network hardware. Thus, we propose a novel RNS-based SR scheme, named PolKA, that explores binary polynomial arithmetic using Galois field (GF) of order 2. We evaluate PolKA in comparison to Port Switching by implementing emulated and hardware prototypes using P4 architecture. Results show that PolKA can achieve equivalent performance, while providing advanced routing features, such as fast failure reaction and agile path migration.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130850909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2020 6th IEEE Conference on Network Softwarization (NetSoft)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1