首页 > 最新文献

10th International Conference on Network and Service Management (CNSM) and Workshop最新文献

英文 中文
Blessing or curse? Revisiting security aspects of Software-Defined Networking 祝福还是诅咒?回顾软件定义网络的安全方面
Lisa Schehlmann, Sebastian Abt, Harald Baier
Software-Defined Networking (SDN) is an emerging technology, physically separating data and control planes of network devices. From a security point of view SDN has two sides. First, it enables network security functions by design, because traffic flows can be redirected or filtered based on packet content or application layer state - functionality, which to date requires additional network security devices like fire-walls, intrusion detection systems or spam filters in conventional networks. On the other hand, due to physical separation of planes, SDN possibly offers additional attack vectors compared to traditional network architectures, which may severely impact overall network availability as well as confidentiality, authenticity, integrity and consistency of network traffic and control data. In this paper, we discuss and balance security provided by SDN with security threats of SDN also in respect of traditional networks. We develop an evaluation methodology for both sides and show that from a security point of view SDN is a blessing for today's and future network design and operation.
软件定义网络(SDN)是一种将网络设备的数据平面和控制平面进行物理分离的新兴技术。从安全的角度来看,SDN有两个方面。首先,它通过设计实现了网络安全功能,因为流量可以根据数据包内容或应用层状态进行重定向或过滤,迄今为止,这需要额外的网络安全设备,如防火墙、入侵检测系统或传统网络中的垃圾邮件过滤器。另一方面,由于平面的物理分离,与传统网络架构相比,SDN可能提供额外的攻击向量,这可能严重影响整个网络的可用性,以及网络流量和控制数据的机密性、真实性、完整性和一致性。本文就SDN提供的安全性和SDN对传统网络的安全威胁进行了讨论和权衡。我们为双方开发了一种评估方法,并从安全的角度表明SDN是当今和未来网络设计和运营的福音。
{"title":"Blessing or curse? Revisiting security aspects of Software-Defined Networking","authors":"Lisa Schehlmann, Sebastian Abt, Harald Baier","doi":"10.1109/CNSM.2014.7014199","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014199","url":null,"abstract":"Software-Defined Networking (SDN) is an emerging technology, physically separating data and control planes of network devices. From a security point of view SDN has two sides. First, it enables network security functions by design, because traffic flows can be redirected or filtered based on packet content or application layer state - functionality, which to date requires additional network security devices like fire-walls, intrusion detection systems or spam filters in conventional networks. On the other hand, due to physical separation of planes, SDN possibly offers additional attack vectors compared to traditional network architectures, which may severely impact overall network availability as well as confidentiality, authenticity, integrity and consistency of network traffic and control data. In this paper, we discuss and balance security provided by SDN with security threats of SDN also in respect of traditional networks. We develop an evaluation methodology for both sides and show that from a security point of view SDN is a blessing for today's and future network design and operation.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122783649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
Network-aware placement of virtual machine ensembles using effective bandwidth estimation 使用有效带宽估计的虚拟机集成的网络感知放置
Runxin Wang, R. Esteves, Lei Shi, Juliano Araujo Wickboldt, B. Jennings, L. Granville
Modern datacenters rely heavily on virtualization technologies to offer customized computing and network resources on demand to a large number of tenant applications. However, efficiency in resource utilization delivered by virtualization technologies that exploit statistical multiplexing of resources across applications means that predictability in performance remains a challenge. Allocation of network bandwidth is particularly difficult, given the variability of traffic flows between the components of multi-tier applications. Static bandwidth allocation based on peak traffic rates ensures SLA compliance at the cost of significant overprovisioning, while allocation based on mean traffic rates ensures efficient usage of bandwidth at the cost of QoS violations. We describe MAPLE, a network-aware VM ensemble placement scheme that uses empirical estimations of the effective bandwidth required between servers to ensure that QoS violations are within targets specified in the SLA for the tenant application. Experimental results obtained using traffic traces collected from an emulated datacenter show that, in contrast to the Oktopus network-aware VM placement system, MAPLE is able to allocate computing and network resources in a manner that balances efficiency of resource utilization with performance predictability.
现代数据中心在很大程度上依赖虚拟化技术,根据需要为大量租户应用程序提供定制的计算和网络资源。然而,利用应用程序间资源的统计多路复用的虚拟化技术提供的资源利用效率意味着性能的可预测性仍然是一个挑战。考虑到多层应用程序组件之间流量的可变性,网络带宽的分配尤其困难。基于峰值流量速率的静态带宽分配确保了SLA遵从性,但代价是严重的过度供应,而基于平均流量速率的分配确保了带宽的有效使用,但代价是违反QoS。我们描述了MAPLE,这是一种网络感知的VM集成放置方案,它使用服务器之间所需有效带宽的经验估计,以确保QoS违规在租户应用程序的SLA中指定的目标范围内。利用从模拟数据中心收集的流量轨迹获得的实验结果表明,与Oktopus网络感知VM放置系统相比,MAPLE能够以平衡资源利用效率和性能可预测性的方式分配计算和网络资源。
{"title":"Network-aware placement of virtual machine ensembles using effective bandwidth estimation","authors":"Runxin Wang, R. Esteves, Lei Shi, Juliano Araujo Wickboldt, B. Jennings, L. Granville","doi":"10.1109/CNSM.2014.7014146","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014146","url":null,"abstract":"Modern datacenters rely heavily on virtualization technologies to offer customized computing and network resources on demand to a large number of tenant applications. However, efficiency in resource utilization delivered by virtualization technologies that exploit statistical multiplexing of resources across applications means that predictability in performance remains a challenge. Allocation of network bandwidth is particularly difficult, given the variability of traffic flows between the components of multi-tier applications. Static bandwidth allocation based on peak traffic rates ensures SLA compliance at the cost of significant overprovisioning, while allocation based on mean traffic rates ensures efficient usage of bandwidth at the cost of QoS violations. We describe MAPLE, a network-aware VM ensemble placement scheme that uses empirical estimations of the effective bandwidth required between servers to ensure that QoS violations are within targets specified in the SLA for the tenant application. Experimental results obtained using traffic traces collected from an emulated datacenter show that, in contrast to the Oktopus network-aware VM placement system, MAPLE is able to allocate computing and network resources in a manner that balances efficiency of resource utilization with performance predictability.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128647185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Unsupervised classification and characterization of honeypot attacks 蜜罐攻击的无监督分类与表征
P. Owezarski
Monitoring communication networks and their traffic is of essential importance for estimating the risk in the Internet, and therefore designing suited protection systems for computer networks. Network and traffic analysis can be done thanks to measurement devices or honeypots. However, analyzing the huge amount of gathered data, and characterizing the anomalies and attacks contained in these traces remain complex and time consuming tasks, done by network and security experts using poorly automatized tools, and are consequently slow and costly. In this paper, we present an unsupervised method for classification and characterization of security related anomalies and attacks occurring in honeypots. This as automatized as possible method does not need any attack signature database, learning phase, or labeled traffic. This corresponds to a major step towards autonomous security systems. This paper also shows how it is possible from anomalies characterization results to infer filtering rules that could serve for automatically configuring network routers, switches or firewalls.
监控通信网络及其流量对于评估互联网的风险,从而设计适合的计算机网络保护系统至关重要。网络和流量分析可以通过测量设备或蜜罐来完成。然而,分析大量收集的数据,并描述这些痕迹中包含的异常和攻击仍然是复杂和耗时的任务,由网络和安全专家使用较差的自动化工具完成,因此速度缓慢且成本高昂。在本文中,我们提出了一种用于蜜罐中发生的安全相关异常和攻击的分类和表征的无监督方法。这种尽可能自动化的方法不需要任何攻击特征库、学习阶段或标记流量。这相当于朝着自主安全系统迈出了重要一步。本文还展示了如何从异常表征结果中推断出可用于自动配置网络路由器、交换机或防火墙的过滤规则。
{"title":"Unsupervised classification and characterization of honeypot attacks","authors":"P. Owezarski","doi":"10.1109/CNSM.2014.7014136","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014136","url":null,"abstract":"Monitoring communication networks and their traffic is of essential importance for estimating the risk in the Internet, and therefore designing suited protection systems for computer networks. Network and traffic analysis can be done thanks to measurement devices or honeypots. However, analyzing the huge amount of gathered data, and characterizing the anomalies and attacks contained in these traces remain complex and time consuming tasks, done by network and security experts using poorly automatized tools, and are consequently slow and costly. In this paper, we present an unsupervised method for classification and characterization of security related anomalies and attacks occurring in honeypots. This as automatized as possible method does not need any attack signature database, learning phase, or labeled traffic. This corresponds to a major step towards autonomous security systems. This paper also shows how it is possible from anomalies characterization results to infer filtering rules that could serve for automatically configuring network routers, switches or firewalls.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125084124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Integrated management of 10G-PON network element using NETCONF and OpenFlow 采用NETCONF和OpenFlow对10G-PON网元进行综合管理
A. B. Sassi, Manuel Santos Gavidia, E. L. Fernandes, M. Nascimento
This paper describes an integrated management architecture and solution for controlling network elements composed of controller, optional aggregation switch and a variable number of optical line terminals (OLTs), including multiple OLTs based on different technologies and presenting distinct features. The YANG language was used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF). The system allows the configuration of OpenFlow switches, providing greater protocol flexibility and forwarding algorithms to the aggregation network. The architecture has been implemented and tested using a real Gigabit-capable Passive Optical Network (GPON), a stacked GPON and switch equipment in a variety of scenarios.
本文介绍了一种由控制器、可选汇聚交换机和可变数量的光线路终端(olt)组成的网元综合管理体系结构和解决方案,包括基于不同技术的多个olt,各具特色。使用YANG语言对网络配置协议(NETCONF)操作的配置和状态数据进行建模。该系统允许配置OpenFlow交换机,为聚合网络提供更大的协议灵活性和转发算法。该架构已经在各种场景中使用真正的千兆无源光网络(GPON)、堆叠GPON和交换设备进行了实现和测试。
{"title":"Integrated management of 10G-PON network element using NETCONF and OpenFlow","authors":"A. B. Sassi, Manuel Santos Gavidia, E. L. Fernandes, M. Nascimento","doi":"10.1109/CNSM.2014.7014195","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014195","url":null,"abstract":"This paper describes an integrated management architecture and solution for controlling network elements composed of controller, optional aggregation switch and a variable number of optical line terminals (OLTs), including multiple OLTs based on different technologies and presenting distinct features. The YANG language was used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF). The system allows the configuration of OpenFlow switches, providing greater protocol flexibility and forwarding algorithms to the aggregation network. The architecture has been implemented and tested using a real Gigabit-capable Passive Optical Network (GPON), a stacked GPON and switch equipment in a variety of scenarios.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127317412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
HIPER: Heuristic-based infrastructure expansion through partition reconnection for efficient Virtual Network Embedding HIPER:基于启发式的基础设施扩展,通过分区重连接实现高效的虚拟网络嵌入
M. C. Luizelli, L. Bays, M. Barcellos, L. Gaspary
As research in the area of network virtualization continues to advance, there have been numerous efforts to solve the challenge of efficiently mapping virtual networks on top of physical structures. Despite these efforts, current state-of-the-art proposals still suffer from significant amount of rejection of virtual network requests in circumstances where overall resource availability would be sufficient to embed them. This is caused by the exhaustion of resources in certain key points of the infrastructure. In this paper, we propose HIPER - a strategy for expanding physical networks that suggests infrastructure upgrades with the objective of maximizing the acceptance of virtual network requests (and, as a consequence, physical resource utilization). This is achieved through the reconnection of strongly connected components (i.e., recurring partitions) of the infrastructure. Evaluated under realistic workloads, HIPER led to promising results. After the expansion of 10% to 20% of infrastructure resources, HIPER sustained an increase of up to 30% in virtual network acceptance, allowing an additional 52% in resource utilization.
随着网络虚拟化领域的研究不断推进,人们已经做出了许多努力来解决在物理结构上有效映射虚拟网络的挑战。尽管做出了这些努力,当前最先进的提案仍然遭受大量虚拟网络请求的拒绝,而在整体资源可用性足以嵌入它们的情况下。这是由于基础设施某些关键点的资源耗尽造成的。在本文中,我们提出了HIPER——一种扩展物理网络的策略,它建议基础设施升级的目标是最大限度地接受虚拟网络请求(并因此提高物理资源利用率)。这是通过重新连接基础设施的强连接组件(即,循环分区)来实现的。在实际工作负载下进行评估,HIPER产生了令人鼓舞的结果。在基础设施资源扩展了10%到20%之后,HIPER的虚拟网络接受度持续增长了30%,资源利用率增加了52%。
{"title":"HIPER: Heuristic-based infrastructure expansion through partition reconnection for efficient Virtual Network Embedding","authors":"M. C. Luizelli, L. Bays, M. Barcellos, L. Gaspary","doi":"10.1109/CNSM.2014.7014145","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014145","url":null,"abstract":"As research in the area of network virtualization continues to advance, there have been numerous efforts to solve the challenge of efficiently mapping virtual networks on top of physical structures. Despite these efforts, current state-of-the-art proposals still suffer from significant amount of rejection of virtual network requests in circumstances where overall resource availability would be sufficient to embed them. This is caused by the exhaustion of resources in certain key points of the infrastructure. In this paper, we propose HIPER - a strategy for expanding physical networks that suggests infrastructure upgrades with the objective of maximizing the acceptance of virtual network requests (and, as a consequence, physical resource utilization). This is achieved through the reconnection of strongly connected components (i.e., recurring partitions) of the infrastructure. Evaluated under realistic workloads, HIPER led to promising results. After the expansion of 10% to 20% of infrastructure resources, HIPER sustained an increase of up to 30% in virtual network acceptance, allowing an additional 52% in resource utilization.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125253589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Congestion Policing Queues - A new approach to managing bandwidth sharing at bottlenecks 拥塞监管队列——在瓶颈处管理带宽共享的一种新方法
David P. Wagner
Managing bandwidth sharing at bottlenecks is a challenge as old as packet switched networks. When equal senders compete for bandwidth of a bottleneck, it is desirable not only to enforce an instantaneous sharing of the scarce resource but also to prevent permanently active customers from suppressing less active customers. Moreover, it is desirable to incentivize shifting load to non-congested networks or times. Today there is no cheap, efficient and effective mechanism available to achieve these goals. It has been argued that policing based on congestion as perceived by the transport layer can achieve these goals. In this paper we present the concept of Congestion Policing Queues (CPQ), based on a very lightweight dequeuing and scheduling because all customers share one queue. CPQs can police congestion if deployed at bottlenecks relevant to the customers' traffic. We developed three base policers that differ in the level of integration with the Active Queue Management (AQM) of the shared queue. By simulations of three scenarios we evaluate the robustness of the achieved resource sharing and performance in partial deployments for multi-bottleneck situations.
在瓶颈处管理带宽共享是一个与分组交换网络一样古老的挑战。当相等的发送方竞争瓶颈带宽时,不仅需要强制执行稀缺资源的瞬时共享,而且还需要防止永久活跃的客户压制不太活跃的客户。此外,激励将负载转移到非拥塞网络或时间是可取的。今天,没有廉价、高效和有效的机制来实现这些目标。有人认为,基于传输层感知到的拥塞进行监管可以实现这些目标。在本文中,我们提出了拥塞监管队列(CPQ)的概念,该概念基于一个非常轻量级的排队和调度,因为所有客户共享一个队列。如果部署在与客户流量相关的瓶颈处,cpq可以管理拥堵。我们开发了三个基本策略,它们与共享队列的活动队列管理(Active Queue Management, AQM)的集成级别不同。通过对三种场景的模拟,我们评估了在多瓶颈情况下局部部署所实现的资源共享和性能的鲁棒性。
{"title":"Congestion Policing Queues - A new approach to managing bandwidth sharing at bottlenecks","authors":"David P. Wagner","doi":"10.1109/CNSM.2014.7014160","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014160","url":null,"abstract":"Managing bandwidth sharing at bottlenecks is a challenge as old as packet switched networks. When equal senders compete for bandwidth of a bottleneck, it is desirable not only to enforce an instantaneous sharing of the scarce resource but also to prevent permanently active customers from suppressing less active customers. Moreover, it is desirable to incentivize shifting load to non-congested networks or times. Today there is no cheap, efficient and effective mechanism available to achieve these goals. It has been argued that policing based on congestion as perceived by the transport layer can achieve these goals. In this paper we present the concept of Congestion Policing Queues (CPQ), based on a very lightweight dequeuing and scheduling because all customers share one queue. CPQs can police congestion if deployed at bottlenecks relevant to the customers' traffic. We developed three base policers that differ in the level of integration with the Active Queue Management (AQM) of the shared queue. By simulations of three scenarios we evaluate the robustness of the achieved resource sharing and performance in partial deployments for multi-bottleneck situations.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124408003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Self management of rate, power and carrier-sense threshold for interference mitigation in IEEE 802.11 networks ieee802.11网络中速率、功率和载波感知阈值的干扰缓解的自我管理
Matías Richart, J. Visca, J. Baliosian
Nowadays, it is common to find IEEE 802.11 networks that are deployed in an unplanned and unmanaged manner. Moreover, because of the low hardware cost and, trying to obtain better coverage and performance, a large number of devices are usually installed in reduced spaces causing high-density deployments. This kind of networks experiment several problems related with the shared nature of the transmission medium. In recent years, different transmit power control mechanisms have been proposed to palliate those problems, however, in some situations, the existing solutions can lead to an starvation problem. In this paper, we present a novel mechanism that manages data rate, transmit power and carrier-sense threshold to reduce this problem.
如今,以非计划和非管理方式部署的IEEE 802.11网络很常见。此外,由于硬件成本较低,并且为了获得更好的覆盖和性能,通常会将大量设备安装在较小的空间中,从而导致高密度部署。这种网络试验了几个与传输介质的共享性质有关的问题。近年来,人们提出了不同的传输功率控制机制来缓解这些问题,然而,在某些情况下,现有的解决方案可能导致饥饿问题。在本文中,我们提出了一种新的机制来管理数据速率,传输功率和载波感知阈值来减少这个问题。
{"title":"Self management of rate, power and carrier-sense threshold for interference mitigation in IEEE 802.11 networks","authors":"Matías Richart, J. Visca, J. Baliosian","doi":"10.1109/CNSM.2014.7014170","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014170","url":null,"abstract":"Nowadays, it is common to find IEEE 802.11 networks that are deployed in an unplanned and unmanaged manner. Moreover, because of the low hardware cost and, trying to obtain better coverage and performance, a large number of devices are usually installed in reduced spaces causing high-density deployments. This kind of networks experiment several problems related with the shared nature of the transmission medium. In recent years, different transmit power control mechanisms have been proposed to palliate those problems, however, in some situations, the existing solutions can lead to an starvation problem. In this paper, we present a novel mechanism that manages data rate, transmit power and carrier-sense threshold to reduce this problem.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129129299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Buffer dynamic management for energy-aware network 能量感知网络的缓冲区动态管理
Wael Zouaoui, Y. Labit, C. Albea-Sánchez
Energy is a major issue in networks especially in local network implementation. Some technological solutions have been developed to treat this problem e.g. Re-engineering, Dynamic Adaptation, Smart Sleeping. We present an original and alternative adaptive solution from a proposed extended Adaptive Link Rate (ALR) module, which relates energy and router queue-length. Applying a controller already proposed by authors, the router queue-length is adapted in order to follow a reference given by the extended ALR module, that guarantees an energy reduction. The approach is validated in the network simulator “NS-2”. Within ADREAM building at LAAS-CNRS, this “control green” will allow to improve energy consumption regarding traffic load and available energy in communication networks.
能源是网络的一个主要问题,特别是在局域网的实施中。已经开发了一些技术解决方案来处理这个问题,例如重新设计,动态适应,智能睡眠。我们提出了一种新的自适应链路速率(ALR)扩展模块,它与能量和路由器队列长度有关。应用作者已经提出的控制器,调整路由器队列长度以遵循扩展的ALR模块给出的参考,从而保证了能耗的降低。该方法在网络模拟器“NS-2”中得到了验证。在LAAS-CNRS的dream大楼内,这种“控制绿色”将允许改善交通负荷和通信网络中可用能源的能耗。
{"title":"Buffer dynamic management for energy-aware network","authors":"Wael Zouaoui, Y. Labit, C. Albea-Sánchez","doi":"10.1109/CNSM.2014.7014192","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014192","url":null,"abstract":"Energy is a major issue in networks especially in local network implementation. Some technological solutions have been developed to treat this problem e.g. Re-engineering, Dynamic Adaptation, Smart Sleeping. We present an original and alternative adaptive solution from a proposed extended Adaptive Link Rate (ALR) module, which relates energy and router queue-length. Applying a controller already proposed by authors, the router queue-length is adapted in order to follow a reference given by the extended ALR module, that guarantees an energy reduction. The approach is validated in the network simulator “NS-2”. Within ADREAM building at LAAS-CNRS, this “control green” will allow to improve energy consumption regarding traffic load and available energy in communication networks.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"470 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114068011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An ontology-based approach to improve SNMP support for autonomic management 基于本体的改进SNMP对自治管理支持的方法
M. Monteiro, Rafael C. Favoreto, Freddy Brasileiro Silva, P. Negri, Pedro Paulo F. Barcelos
The SNMP protocol remains a broadly adopted technology in the Internet management framework and its MIB was proposed to guarantee interoperation. In order to enable the management of new equipment, the human manager must compile the correlated MIB file (MIB description) and choose the right objects to manage an implicit knowledge. This paper presents an ontology-based approach and a Semantic SNMP extension, to improve the framework's autonomic support.
SNMP协议是Internet管理框架中被广泛采用的技术,其MIB是为了保证互操作而提出的。为了能够对新设备进行管理,管理员必须编制相关的MIB文件(MIB描述),并选择合适的对象来管理隐含的知识。本文提出了一种基于本体的方法和语义SNMP扩展,以提高框架的自治支持。
{"title":"An ontology-based approach to improve SNMP support for autonomic management","authors":"M. Monteiro, Rafael C. Favoreto, Freddy Brasileiro Silva, P. Negri, Pedro Paulo F. Barcelos","doi":"10.1109/CNSM.2014.7014174","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014174","url":null,"abstract":"The SNMP protocol remains a broadly adopted technology in the Internet management framework and its MIB was proposed to guarantee interoperation. In order to enable the management of new equipment, the human manager must compile the correlated MIB file (MIB description) and choose the right objects to manage an implicit knowledge. This paper presents an ontology-based approach and a Semantic SNMP extension, to improve the framework's autonomic support.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"429 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115920990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
How Neutral is a CDN? An economic approach CDN有多中立?经济方法
P. Maillé, Karine Pires, G. Simon, B. Tuffin
The growing importance of Content Delivery Network (CDN) in the value chain of content delivery raises concerns about the “neutrality” of these players. We propose in this paper a model to analyze the impact of revenue-oriented CDN management policies on the fairness of the competition among two content providers that use CDN services to deliver contents. We show that there exists a unique optimal revenue-maximizing policy for a CDN actor-the dimensioning and allocation of its storage capacity-that depends on prices for service/transport/storage, and on the distribution of content popularity. Using data from the analysis of traces from two major content providers (YouTube Live and justin.tv), we remark that a CDN remains a relatively neutral actor even when one of the content providers it serves tries to monopolize the CDN storage space by implementing an aggressive policy to harm its competitors.
内容分发网络(CDN)在内容分发价值链中日益增长的重要性引发了对这些参与者“中立性”的担忧。我们在本文中提出了一个模型来分析以收入为导向的CDN管理政策对使用CDN服务提供内容的两家内容提供商之间竞争公平性的影响。我们证明了CDN参与者存在一个唯一的最优收益最大化策略——其存储容量的尺寸和分配——这取决于服务/运输/存储的价格,以及内容流行度的分布。使用来自两个主要内容提供商(YouTube Live和justin.tv)的跟踪分析数据,我们注意到CDN仍然是一个相对中立的参与者,即使它所服务的内容提供商之一试图通过实施激进的政策来垄断CDN存储空间来伤害其竞争对手。
{"title":"How Neutral is a CDN? An economic approach","authors":"P. Maillé, Karine Pires, G. Simon, B. Tuffin","doi":"10.1109/CNSM.2014.7014188","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014188","url":null,"abstract":"The growing importance of Content Delivery Network (CDN) in the value chain of content delivery raises concerns about the “neutrality” of these players. We propose in this paper a model to analyze the impact of revenue-oriented CDN management policies on the fairness of the competition among two content providers that use CDN services to deliver contents. We show that there exists a unique optimal revenue-maximizing policy for a CDN actor-the dimensioning and allocation of its storage capacity-that depends on prices for service/transport/storage, and on the distribution of content popularity. Using data from the analysis of traces from two major content providers (YouTube Live and justin.tv), we remark that a CDN remains a relatively neutral actor even when one of the content providers it serves tries to monopolize the CDN storage space by implementing an aggressive policy to harm its competitors.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115509227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
10th International Conference on Network and Service Management (CNSM) and Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1