Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996523
Yu-Chih Wei, Yi-Ming Chen
In existing trust establishment researches, the decision making accuracy and decision delay of received event message are both the outstanding problems in VANETs. Especially on the decision delay, the delay of alert event might lead to traffic accident and injury. In this paper, we propose an adaptive decision making model which can make decision quickly by the effective and quick assistance of the RSUs. To evaluate the detection accuracy and efficiency of our proposed system, we conducted several simulations under different trust attacks. In the experiment results, the purpose model can shorten decision delay while raising the detection accuracy.
{"title":"Adaptive decision making for improving trust establishment in VANET","authors":"Yu-Chih Wei, Yi-Ming Chen","doi":"10.1109/APNOMS.2014.6996523","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996523","url":null,"abstract":"In existing trust establishment researches, the decision making accuracy and decision delay of received event message are both the outstanding problems in VANETs. Especially on the decision delay, the delay of alert event might lead to traffic accident and injury. In this paper, we propose an adaptive decision making model which can make decision quickly by the effective and quick assistance of the RSUs. To evaluate the detection accuracy and efficiency of our proposed system, we conducted several simulations under different trust attacks. In the experiment results, the purpose model can shorten decision delay while raising the detection accuracy.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114574264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996572
Seongbok Baik, C. Hwang, Youngwoo Lee
Recently there have been a lot of discussions about the benefits and usages of SDN technologies, but not many practical proposals for how to interconnect the various heterogeneous and disparate networks maintained by the telecommunication companies. Current level of SDN technologies does not show any sign of transforming the whole legacy network into the SDN oriented one all at once, but instead, SDN concept may need to be deployed into the small parts of the current heterogeneous mixed network first and then it would be able to expand its area gradually [1]. Being started to consider the new aspects of network services, such as off-loading the mobile data, transferring smart contents, adjusting and adapting the network resources and traffic amount, the telecommunication companies need to establish a strategy for virtualization of the networks, including metro Ethernet and optical transport networks, for systematic unification of the control mechanisms, and eventually for the SDN based network management and control system operated in real-time. Since the research and development of SDN technology to be adapted onto the large scaled telecommunication network is in the beginning stage, we focus on the activities for the interconnection methods for the disparate heterogeneous networks. This paper especially suggests SDN-based end-to-end path provisioning architecture for mixed circuit and packet networks.
{"title":"SDN-based architecture for end-to-end path provisioning in the mixed circuit and packet network environment","authors":"Seongbok Baik, C. Hwang, Youngwoo Lee","doi":"10.1109/APNOMS.2014.6996572","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996572","url":null,"abstract":"Recently there have been a lot of discussions about the benefits and usages of SDN technologies, but not many practical proposals for how to interconnect the various heterogeneous and disparate networks maintained by the telecommunication companies. Current level of SDN technologies does not show any sign of transforming the whole legacy network into the SDN oriented one all at once, but instead, SDN concept may need to be deployed into the small parts of the current heterogeneous mixed network first and then it would be able to expand its area gradually [1]. Being started to consider the new aspects of network services, such as off-loading the mobile data, transferring smart contents, adjusting and adapting the network resources and traffic amount, the telecommunication companies need to establish a strategy for virtualization of the networks, including metro Ethernet and optical transport networks, for systematic unification of the control mechanisms, and eventually for the SDN based network management and control system operated in real-time. Since the research and development of SDN technology to be adapted onto the large scaled telecommunication network is in the beginning stage, we focus on the activities for the interconnection methods for the disparate heterogeneous networks. This paper especially suggests SDN-based end-to-end path provisioning architecture for mixed circuit and packet networks.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127014768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996558
Yutaka Yakuwa, N. Tomizawa, T. Tonouchi
OpenFlow is one of the most popular protocols to realize Software-Defined Networking. OpenFlow has attracted a great deal of interest because of its wide utility and applicability for automation of network management. While OpenFlow provides the ability to control a network using software, there is the risk of bugs occurring in the software that could cause erroneous network behavior. Therefore, improving the reliability of the network is very important. Model checking is a well-known technique to verify the correctness of distributed systems such as OpenFlow networks. However, it is difficult to apply it to this problem because model checking takes an exponential amount of time in relation to the scale of its target. Naïve model checking may take too much time, even to verify a toy network. We introduce an effective method for model checking of the OpenFlow network. Our method reduces the state-explosion problem with dynamic partial-order reduction and with state transition based on symbolic execution. We implemented a prototype for our method to evaluate it. The results indicated that our method completed model checking in less than 10% of the execution time of naïve depth first search model checking and in 31% of the execution time of an existing state-of-the-art tool.
{"title":"Efficient model checking of OpenFlow networks using SDPOR-DS","authors":"Yutaka Yakuwa, N. Tomizawa, T. Tonouchi","doi":"10.1109/APNOMS.2014.6996558","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996558","url":null,"abstract":"OpenFlow is one of the most popular protocols to realize Software-Defined Networking. OpenFlow has attracted a great deal of interest because of its wide utility and applicability for automation of network management. While OpenFlow provides the ability to control a network using software, there is the risk of bugs occurring in the software that could cause erroneous network behavior. Therefore, improving the reliability of the network is very important. Model checking is a well-known technique to verify the correctness of distributed systems such as OpenFlow networks. However, it is difficult to apply it to this problem because model checking takes an exponential amount of time in relation to the scale of its target. Naïve model checking may take too much time, even to verify a toy network. We introduce an effective method for model checking of the OpenFlow network. Our method reduces the state-explosion problem with dynamic partial-order reduction and with state transition based on symbolic execution. We implemented a prototype for our method to evaluate it. The results indicated that our method completed model checking in less than 10% of the execution time of naïve depth first search model checking and in 31% of the execution time of an existing state-of-the-art tool.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121998641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996573
Yuh-Shyan Chen, Chih-Shun Hsu, De-Yi Huang
A new non-IP networking technology, called as named data networking (NDN), is an emerging research topic for the future Internet. In this paper, we propose a pipe-assisted mobility protocol in NDN networks. The proposed mobility protocol is constructed based on a new proposed name-based routing scheme by utilizing a pipe technique. A new name-based routing protocol is developed by constructing a pipe from a consumer to a producer in NDN networks. With the assistance of the constructed pipe, a pipe-assisted producer mobility protocol is proposed. When a mobile producer enters a new domain, a pipe-based pre-route with the maximum popular levels is built to increase the successful probability of discovering a new path from the producer to the consumer. Extensive simulations illustrate that the proposed pipe-assisted mobility protocol significantly reduces the packet loss rate.
{"title":"A pipe-assisted mobility management in named data networking networks","authors":"Yuh-Shyan Chen, Chih-Shun Hsu, De-Yi Huang","doi":"10.1109/APNOMS.2014.6996573","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996573","url":null,"abstract":"A new non-IP networking technology, called as named data networking (NDN), is an emerging research topic for the future Internet. In this paper, we propose a pipe-assisted mobility protocol in NDN networks. The proposed mobility protocol is constructed based on a new proposed name-based routing scheme by utilizing a pipe technique. A new name-based routing protocol is developed by constructing a pipe from a consumer to a producer in NDN networks. With the assistance of the constructed pipe, a pipe-assisted producer mobility protocol is proposed. When a mobile producer enters a new domain, a pipe-based pre-route with the maximum popular levels is built to increase the successful probability of discovering a new path from the producer to the consumer. Extensive simulations illustrate that the proposed pipe-assisted mobility protocol significantly reduces the packet loss rate.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123413347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996524
Junpei Aramata, M. Hyashi
A method is proposed for evaluating telecommunications network reliability considering traffic path assignments that produces a very useful reliability measure, “one-to-all reliability,” that can be evaluated exactly without the need for assuming highly reliable nodes and links. The key idea is to apply a factoring method to the enhanced model of Anzai et al. Evaluation showed that this method achieves faster evaluation compared to previously proposed methods. It is thus well suited for long-term network development in developing countries.
{"title":"A high-speed method for evaluating one-to-all reliability","authors":"Junpei Aramata, M. Hyashi","doi":"10.1109/APNOMS.2014.6996524","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996524","url":null,"abstract":"A method is proposed for evaluating telecommunications network reliability considering traffic path assignments that produces a very useful reliability measure, “one-to-all reliability,” that can be evaluated exactly without the need for assuming highly reliable nodes and links. The key idea is to apply a factoring method to the enhanced model of Anzai et al. Evaluation showed that this method achieves faster evaluation compared to previously proposed methods. It is thus well suited for long-term network development in developing countries.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126250356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996541
S. Rehman, Wang-Cheol Song, Min-Hyup Kang
This paper provides insights into the traffic flow monitoring system of OF@TEIN (OpenFlow@Trans Eurasia Information Network) testbed. OF@TEIN is software defined networking (SDN) testbed adapted by KOREN (KOrea advanced REsearch Network) and integrated with the research and education networks of several Asian nations including Japan, Malaysia, Thailand, Vietnam, Philippine, etc. Traditional traffic monitoring solutions such as NetFlow, RSPAN ports, Network Packet Brokers (NPBs) can't provide network-wide visibility in OF@TEIN because OF@TEIN is a large multi-tenant testbed deployed over high speed research networks across several countries. Therefore, we have implemented a new sFlow-based flow monitoring system that is tailored to OF@TEIN requirements and can provide real-time L2 to L7 network wide visibility. OF@TEIN uses SDN-based network virtualization to slice the network among multiple concurrent experimenters. Machines in a network slice (or VLAN) communicate with each other using GRE tunnels. Our traffic monitoring system enables monitoring flow spaces of VLANs as well as physical provider network. It utilizes northbound interfaces (NBIs) exposed by sFlow-RT analytics engine and FloodLight SDN Controller. It periodically fetches flows statistics from sFlow-RT and stores them in time-series format in Whisper RRD database. Graphite real-time charting tool is used to plot the statistics stored in Whisper.
{"title":"Network-wide traffic visibility in OF@TEIN SDN testbed using sFlow","authors":"S. Rehman, Wang-Cheol Song, Min-Hyup Kang","doi":"10.1109/APNOMS.2014.6996541","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996541","url":null,"abstract":"This paper provides insights into the traffic flow monitoring system of OF@TEIN (OpenFlow@Trans Eurasia Information Network) testbed. OF@TEIN is software defined networking (SDN) testbed adapted by KOREN (KOrea advanced REsearch Network) and integrated with the research and education networks of several Asian nations including Japan, Malaysia, Thailand, Vietnam, Philippine, etc. Traditional traffic monitoring solutions such as NetFlow, RSPAN ports, Network Packet Brokers (NPBs) can't provide network-wide visibility in OF@TEIN because OF@TEIN is a large multi-tenant testbed deployed over high speed research networks across several countries. Therefore, we have implemented a new sFlow-based flow monitoring system that is tailored to OF@TEIN requirements and can provide real-time L2 to L7 network wide visibility. OF@TEIN uses SDN-based network virtualization to slice the network among multiple concurrent experimenters. Machines in a network slice (or VLAN) communicate with each other using GRE tunnels. Our traffic monitoring system enables monitoring flow spaces of VLANs as well as physical provider network. It utilizes northbound interfaces (NBIs) exposed by sFlow-RT analytics engine and FloodLight SDN Controller. It periodically fetches flows statistics from sFlow-RT and stores them in time-series format in Whisper RRD database. Graphite real-time charting tool is used to plot the statistics stored in Whisper.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122293589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996525
Yuan-Hsin Tung, Chih-Ju Chuang, Hwai-Ling Shan
Recently, adopting open source software into software development has become a growing trend in the IT software industry. Unlike the general commercial software, open source software leverages the capability of the communities to improve the quality, but also reduce the cost of software development. This paper aims at analyzing the influence factors of applying open source software in software reuse. We begin by proposing our framework for enhancing the open source software usage and then set out to determine the influence factors of software reuse. A reuse system based on our proposed framework is implemented. For the assessment, a questionnaire survey and analysis of 20 software projects are carried out to evaluate our approach. There are 50 experienced corresponding project managers and developers participating in our experiments. The assessment shows that reuse factors of projects managers and developers influence the OSS reuse.
{"title":"A framework of code reuse in open source software","authors":"Yuan-Hsin Tung, Chih-Ju Chuang, Hwai-Ling Shan","doi":"10.1109/APNOMS.2014.6996525","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996525","url":null,"abstract":"Recently, adopting open source software into software development has become a growing trend in the IT software industry. Unlike the general commercial software, open source software leverages the capability of the communities to improve the quality, but also reduce the cost of software development. This paper aims at analyzing the influence factors of applying open source software in software reuse. We begin by proposing our framework for enhancing the open source software usage and then set out to determine the influence factors of software reuse. A reuse system based on our proposed framework is implemented. For the assessment, a questionnaire survey and analysis of 20 software projects are carried out to evaluate our approach. There are 50 experienced corresponding project managers and developers participating in our experiments. The assessment shows that reuse factors of projects managers and developers influence the OSS reuse.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134082510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996561
Vandung Nguyen, Duc Ngoc Minh Dang, Sungman Jang, C. Hong
The VeMAC, a TDMA-based MAC protocol for Vehicular Ad-hoc NETworks (VANET), assigns disjoint sets of the time slots to vehicles moving in opposite directions and to road side units. So the VeMAC protocol reduces the access and merging collisions. Moreover, the VeMAC protocol employs slot release prevention condition which avoids unnecessarily releasing time slots when a node just enters the communication range of each other. Although VeMAC supports reliable and efficient transmission, it is still not full applicable for VANET in parallel transmission. In this paper, we propose an e-VeMAC protocol: an enhanced vehicular MAC protocol to mitigate the exposed terminal problem. The simulation results show that the e-VeMAC protocol supports more parallel transmissions than the VeMAC protocol.
{"title":"e-VeMAC: An enhanced vehicular MAC protocol to mitigate the exposed terminal problem","authors":"Vandung Nguyen, Duc Ngoc Minh Dang, Sungman Jang, C. Hong","doi":"10.1109/APNOMS.2014.6996561","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996561","url":null,"abstract":"The VeMAC, a TDMA-based MAC protocol for Vehicular Ad-hoc NETworks (VANET), assigns disjoint sets of the time slots to vehicles moving in opposite directions and to road side units. So the VeMAC protocol reduces the access and merging collisions. Moreover, the VeMAC protocol employs slot release prevention condition which avoids unnecessarily releasing time slots when a node just enters the communication range of each other. Although VeMAC supports reliable and efficient transmission, it is still not full applicable for VANET in parallel transmission. In this paper, we propose an e-VeMAC protocol: an enhanced vehicular MAC protocol to mitigate the exposed terminal problem. The simulation results show that the e-VeMAC protocol supports more parallel transmissions than the VeMAC protocol.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132298960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996565
Jiehui Zhu, Yang Yang, Xue-song Qiu, Zhipeng Gao
The main role of wireless sensor networks is to collect environmental data. As the sensor nodes are vulnerable and work in unpredictable environments, sensors are possible to fail and return unexpected response. Therefore, fault detection and recovery are important in wireless sensor networks. In this paper, we propose a fault detection algorithm based on support vector regression, which predicts the measurements of sensor nodes by using historical data. Credit levels of sensor nodes will be determined by a contrast between predictions and actual measured values. In this paper we also propose a fault recovery algorithm according to the node credit levels combined with genetic algorithm. The simulation results demonstrate that the algorithms we propose work well in failure detection rate, fault recovery speed and energy consumption.
{"title":"Sensor failure detection and recovery mechanism based on support vector and genetic algorithm","authors":"Jiehui Zhu, Yang Yang, Xue-song Qiu, Zhipeng Gao","doi":"10.1109/APNOMS.2014.6996565","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996565","url":null,"abstract":"The main role of wireless sensor networks is to collect environmental data. As the sensor nodes are vulnerable and work in unpredictable environments, sensors are possible to fail and return unexpected response. Therefore, fault detection and recovery are important in wireless sensor networks. In this paper, we propose a fault detection algorithm based on support vector regression, which predicts the measurements of sensor nodes by using historical data. Credit levels of sensor nodes will be determined by a contrast between predictions and actual measured values. In this paper we also propose a fault recovery algorithm according to the node credit levels combined with genetic algorithm. The simulation results demonstrate that the algorithms we propose work well in failure detection rate, fault recovery speed and energy consumption.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130185900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996521
S. Hsieh, S. Yuan, Guo-Heng Luo, Hsiao-Wei Chen
To guarantee quality of the service, services need to be tested to ensure the service quality. But most of existing testing service can't provide multi-type testing and deploy testing clients concurrently in different regions. To overcome these problems, in this paper, a cloud testing service combine cloud computing and multi-testing tools is proposed. Using the proposed service user can deploy the testing clients in different countries to access the testing targets, when the testing is finish user can easily get both of detail and summarized test results. To show the capabilities of proposed service, an experiment is performed. The results shows that the proposed service can guarantee testing quality, automatically deploy testing clients concurrently in different region, get latency from different countries, and perform press testing.
{"title":"A flexible public cloud based testing service for heterogeneous testing targets","authors":"S. Hsieh, S. Yuan, Guo-Heng Luo, Hsiao-Wei Chen","doi":"10.1109/APNOMS.2014.6996521","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996521","url":null,"abstract":"To guarantee quality of the service, services need to be tested to ensure the service quality. But most of existing testing service can't provide multi-type testing and deploy testing clients concurrently in different regions. To overcome these problems, in this paper, a cloud testing service combine cloud computing and multi-testing tools is proposed. Using the proposed service user can deploy the testing clients in different countries to access the testing targets, when the testing is finish user can easily get both of detail and summarized test results. To show the capabilities of proposed service, an experiment is performed. The results shows that the proposed service can guarantee testing quality, automatically deploy testing clients concurrently in different region, get latency from different countries, and perform press testing.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132707116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}