Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996545
Masahiro Yoshida, Wenyu Shen, T. Kawabata, K. Minato, W. Imajuku
Capital expenditure (CAPEX) and operating expenses (OPEX) have been practical concerns for telecommunication companies, and Network Function Virtualization (NFV) has attracted significant attention in recent years. However, the NFV Infrastructure (NFVI) includes a wide variety of resource types and stakeholders. Hence, there is still a need for the existing resource scheduling approaches, but they are no longer sufficient. In this paper, we propose a Multi-objective Resource Scheduling Algorithm (MORSA) to optimize the NFVI resources. In the development of the MORSA, we designed a plug-in architecture to satisfy various requirements related to NFVI resources and stakeholder policies. The MORSA allows the NFVI Resource Scheduler to optimize simultaneously the combination of possibly conflicting objectives with multifaceted constraints in complex real world situations. Evaluation results show that the MORSA obtains approximate solutions among conflicting objectives in a reasonable computation time.
{"title":"MORSA: A multi-objective resource scheduling algorithm for NFV infrastructure","authors":"Masahiro Yoshida, Wenyu Shen, T. Kawabata, K. Minato, W. Imajuku","doi":"10.1109/APNOMS.2014.6996545","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996545","url":null,"abstract":"Capital expenditure (CAPEX) and operating expenses (OPEX) have been practical concerns for telecommunication companies, and Network Function Virtualization (NFV) has attracted significant attention in recent years. However, the NFV Infrastructure (NFVI) includes a wide variety of resource types and stakeholders. Hence, there is still a need for the existing resource scheduling approaches, but they are no longer sufficient. In this paper, we propose a Multi-objective Resource Scheduling Algorithm (MORSA) to optimize the NFVI resources. In the development of the MORSA, we designed a plug-in architecture to satisfy various requirements related to NFVI resources and stakeholder policies. The MORSA allows the NFVI Resource Scheduler to optimize simultaneously the combination of possibly conflicting objectives with multifaceted constraints in complex real world situations. Evaluation results show that the MORSA obtains approximate solutions among conflicting objectives in a reasonable computation time.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131190169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996608
Y. C. Sung, Yu-Hsin Yang
Long-term evolution (LTE) is a broadband wireless communication standard evolved from the Universal Mobile Telecommunications System (UMTS) network. A report from GSA (Global mobile Suppliers Association) said that there are 274 LTE networks have been launched in 101 countries until 2014 Feb [1]. This paper describes the background and current situation of voice over LTE (VoLTE) technology in LTE netwrok. We provide some presentations about existing solutions and operator situation first. And then, we introduce video over LTE technology and elaborate the challenges from voice over LTE to video over LTE.
长期演进(LTE)是由通用移动通信系统(UMTS)网络发展而来的宽带无线通信标准。GSA(全球移动供应商协会)的一份报告称,截至2014年2月,已有274张LTE网络在101个国家推出[1]。本文介绍了LTE网络中VoLTE (voice over LTE)技术的发展背景和现状。我们首先介绍了现有的解决方案和运营商的情况。然后,我们介绍了LTE视频技术,并阐述了从LTE语音到LTE视频的挑战。
{"title":"Challenges from voice-over-LTE to video-over-LTE","authors":"Y. C. Sung, Yu-Hsin Yang","doi":"10.1109/APNOMS.2014.6996608","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996608","url":null,"abstract":"Long-term evolution (LTE) is a broadband wireless communication standard evolved from the Universal Mobile Telecommunications System (UMTS) network. A report from GSA (Global mobile Suppliers Association) said that there are 274 LTE networks have been launched in 101 countries until 2014 Feb [1]. This paper describes the background and current situation of voice over LTE (VoLTE) technology in LTE netwrok. We provide some presentations about existing solutions and operator situation first. And then, we introduce video over LTE technology and elaborate the challenges from voice over LTE to video over LTE.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131565104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996587
Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, Hongtaek Ju
We report performance measurements and analyses of a variety of wireless networks to arrive at an appropriate network structure configuration for smooth multimedia streaming service with a variety of smart devices in a single wireless network environment. Unlike the usual infrastructure network, configurations such as the IEEE 802.11 ad hoc network and the Wi-Fi direct network use direct connections between devices without going through a wireless AP. Therefore, these configurations prevent concentrating traffic at the wireless AP. We generated three types of wireless network performance measurements and arrived at a suitable network for multimedia streaming service using a variety of smart devices. The wireless network was configured in a structure for efficient multimedia streaming service in a single wireless LAN environment, and subsequently, the network performance was measured.
{"title":"Mobile network configuration for large-scale multimedia delivery on a single WLAN","authors":"Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, Hongtaek Ju","doi":"10.1109/APNOMS.2014.6996587","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996587","url":null,"abstract":"We report performance measurements and analyses of a variety of wireless networks to arrive at an appropriate network structure configuration for smooth multimedia streaming service with a variety of smart devices in a single wireless network environment. Unlike the usual infrastructure network, configurations such as the IEEE 802.11 ad hoc network and the Wi-Fi direct network use direct connections between devices without going through a wireless AP. Therefore, these configurations prevent concentrating traffic at the wireless AP. We generated three types of wireless network performance measurements and arrived at a suitable network for multimedia streaming service using a variety of smart devices. The wireless network was configured in a structure for efficient multimedia streaming service in a single wireless LAN environment, and subsequently, the network performance was measured.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134468931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996526
Li-Juan Wu, Hong-Wei Li, Yu-Jui Cheng, Yu-Sung Wu, Houcheng Lin
Software defined infrastructure greatly reduces the deployment cost of distributed applications. Many distributed applications employ message oriented middleware (MOM) for the integration of heterogeneous components and to achieve scalability and fault tolerance. The structure of a distributed application can be very complex. In addition, the asynchronous message delivery model of MOM further complicates the runtime behavior of a distributed application. To diagnose a faulty distributed application, one often needs to determine the dependences of its messages, and by extension, the dependences of its components. We propose Message Tracer to identify the message dependencies of a MOM-based distributed application. Message Tracer sniffs the network traffic of MOM and uses knowledge of message broker protocols to establish the dependencies. Message Tracer makes no assumption on the application threading model and incurs negligible performance overhead. Message Tracer correctly identified 95% of the dependencies for the common use cases and 75% of the dependencies when the system was under extreme stress.
{"title":"Application dependency tracing for message oriented middleware","authors":"Li-Juan Wu, Hong-Wei Li, Yu-Jui Cheng, Yu-Sung Wu, Houcheng Lin","doi":"10.1109/APNOMS.2014.6996526","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996526","url":null,"abstract":"Software defined infrastructure greatly reduces the deployment cost of distributed applications. Many distributed applications employ message oriented middleware (MOM) for the integration of heterogeneous components and to achieve scalability and fault tolerance. The structure of a distributed application can be very complex. In addition, the asynchronous message delivery model of MOM further complicates the runtime behavior of a distributed application. To diagnose a faulty distributed application, one often needs to determine the dependences of its messages, and by extension, the dependences of its components. We propose Message Tracer to identify the message dependencies of a MOM-based distributed application. Message Tracer sniffs the network traffic of MOM and uses knowledge of message broker protocols to establish the dependencies. Message Tracer makes no assumption on the application threading model and incurs negligible performance overhead. Message Tracer correctly identified 95% of the dependencies for the common use cases and 75% of the dependencies when the system was under extreme stress.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133570605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996603
H. Farhadi, P. Du, A. Nakao
Software-Defined Networking (SDN) increasingly attracts more researchers as well as industry attentions. Open-Flow as a major API for SDN applies <;match, action> rules to every packet. However, it only supports a few actions that are all predefined. We extend this limitation of OpenFlow and propose User-Defined Actions (UDAs) for SDN. We discuss usecases of UDAs and propose an architecture to realize UDAs. Using our architecture we conduct a series of tests. We indicate that our UDAs can elevate millisecond-scale running time of current proposals to nanosecond-scale (including proposals from northbound applications of SDN community and virtual appliances of Network Function Virtualization or NFV community). Also, regarding ease of programmability, we show that our proposal decrease the lines of code of by 72.9% and 79.3% compared to implementing the same functionality as a northbound application and as a standalone middlebox, respectively. In addition, we extended OpenFlow to support UDAs and implemented a few sample UDAs.
{"title":"Enhancing OpenFlow actions to offload packet-in processing","authors":"H. Farhadi, P. Du, A. Nakao","doi":"10.1109/APNOMS.2014.6996603","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996603","url":null,"abstract":"Software-Defined Networking (SDN) increasingly attracts more researchers as well as industry attentions. Open-Flow as a major API for SDN applies <;match, action> rules to every packet. However, it only supports a few actions that are all predefined. We extend this limitation of OpenFlow and propose User-Defined Actions (UDAs) for SDN. We discuss usecases of UDAs and propose an architecture to realize UDAs. Using our architecture we conduct a series of tests. We indicate that our UDAs can elevate millisecond-scale running time of current proposals to nanosecond-scale (including proposals from northbound applications of SDN community and virtual appliances of Network Function Virtualization or NFV community). Also, regarding ease of programmability, we show that our proposal decrease the lines of code of by 72.9% and 79.3% compared to implementing the same functionality as a northbound application and as a standalone middlebox, respectively. In addition, we extended OpenFlow to support UDAs and implemented a few sample UDAs.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133283641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996576
Hiroki Nakayama, Tatsuo Mori, S. Ueno, Y. Watanabe, Tsunemasa Hayashi
Software Defined Network (SDN) is revolutionizing the networking industry by a potential of enabling flexible and uniform management by decoupling the control plane and forwarding plane. However, there are several issues on scalability and adaption against conventional network protocols to implement on the large scaled network. To address these issues, we propose an implementation method which runs SDN controller and Quagga on SDN switch in this paper. By controlling information of each SDN controller uniformly with the upper layer controller, it could be able to handle each problems of implementing SDN without missing the advantage of SDN. Furthermore, by implementing prototype of our model, we will discuss some issues on the implementation of SDN system.
{"title":"An implementation model and solutions for stepwise introduction of SDN","authors":"Hiroki Nakayama, Tatsuo Mori, S. Ueno, Y. Watanabe, Tsunemasa Hayashi","doi":"10.1109/APNOMS.2014.6996576","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996576","url":null,"abstract":"Software Defined Network (SDN) is revolutionizing the networking industry by a potential of enabling flexible and uniform management by decoupling the control plane and forwarding plane. However, there are several issues on scalability and adaption against conventional network protocols to implement on the large scaled network. To address these issues, we propose an implementation method which runs SDN controller and Quagga on SDN switch in this paper. By controlling information of each SDN controller uniformly with the upper layer controller, it could be able to handle each problems of implementing SDN without missing the advantage of SDN. Furthermore, by implementing prototype of our model, we will discuss some issues on the implementation of SDN system.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115718940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996550
Xiaohua Chen, Chunzhi Li
Multicommodity flow-based virtual network embedding algorithm does not consider link energy, which causes waste of energy. And its high time complexity can not meet real-time requirements of online virtual network embedding. In this paper, we find the dynamic inversion phenomenon, where revenue does not rely on embedding cost. Two novel link mapping algorithms are proposed for path splitting which based on the undirected network minimum cost flow. They enable link resource to consolidate and have low time complexity. Simulation results show that proposed algorithms reduce energy consumption and ensure real-time performance of online VN embedding.
{"title":"Energy efficient virtual network embedding for path splitting","authors":"Xiaohua Chen, Chunzhi Li","doi":"10.1109/APNOMS.2014.6996550","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996550","url":null,"abstract":"Multicommodity flow-based virtual network embedding algorithm does not consider link energy, which causes waste of energy. And its high time complexity can not meet real-time requirements of online virtual network embedding. In this paper, we find the dynamic inversion phenomenon, where revenue does not rely on embedding cost. Two novel link mapping algorithms are proposed for path splitting which based on the undirected network minimum cost flow. They enable link resource to consolidate and have low time complexity. Simulation results show that proposed algorithms reduce energy consumption and ensure real-time performance of online VN embedding.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116443285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996540
Hwan-Hee Kim, Mi-Jung Choi
As usage of mobile increased, target of attackers has changed from PC to Mobile environment. In particular, various attacks have occurred in android platform because it has feature of open platform. To solve this problem, researches of machine learning-based malware detection continually have progressed. However, as version of Android platform continuously is updated, some feature that used in existing research could not collect any more. Therefore, we propose Linux kernel-based novel feature in order to detect malware in higher than android version 4.0. In addition, we perform feature selection to select optimal feature about foregoing feature. This way is able to improve performance of malware detection system. In experiment, by performing android malware detection through support vector machine classifier which has showed relatively good performance in existing studies, we show novel feature feasibility and validity.
{"title":"Linux kernel-based feature selection for Android malware detection","authors":"Hwan-Hee Kim, Mi-Jung Choi","doi":"10.1109/APNOMS.2014.6996540","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996540","url":null,"abstract":"As usage of mobile increased, target of attackers has changed from PC to Mobile environment. In particular, various attacks have occurred in android platform because it has feature of open platform. To solve this problem, researches of machine learning-based malware detection continually have progressed. However, as version of Android platform continuously is updated, some feature that used in existing research could not collect any more. Therefore, we propose Linux kernel-based novel feature in order to detect malware in higher than android version 4.0. In addition, we perform feature selection to select optimal feature about foregoing feature. This way is able to improve performance of malware detection system. In experiment, by performing android malware detection through support vector machine classifier which has showed relatively good performance in existing studies, we show novel feature feasibility and validity.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122903228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996515
Kuo-Tsai Chen, Shun-Kai Yang, Lung-Chin Huang, Kuo-Hsiang Lai, Rong-Ruey Lee
It is the development trend of the current carriers to enhance the rate of broadband services. The FTTx+VDSL2 access network is one of the best choices for the broadband access network, and migrating to the FTTH access network. It may be difficult to build the fiber into/in the house for some situation, such like the ful-filled line pipe and the decoration issues. The carriers have to introduce new methods or technologies for higher rate to form a hybrid access network in the FTTH bottleneck areas. In this paper, we had investigated the various technologies and architectures that could provide high speed access network and enlarge the coverage of the broadband service, including VDSL2 bonding, vectoring, G.fast, G.hn. Furthermore, we also proposed the test technologies and results to verify these technologies.
{"title":"The design and performance of the hybrid access network for FTTH bottleneck areas","authors":"Kuo-Tsai Chen, Shun-Kai Yang, Lung-Chin Huang, Kuo-Hsiang Lai, Rong-Ruey Lee","doi":"10.1109/APNOMS.2014.6996515","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996515","url":null,"abstract":"It is the development trend of the current carriers to enhance the rate of broadband services. The FTTx+VDSL2 access network is one of the best choices for the broadband access network, and migrating to the FTTH access network. It may be difficult to build the fiber into/in the house for some situation, such like the ful-filled line pipe and the decoration issues. The carriers have to introduce new methods or technologies for higher rate to form a hybrid access network in the FTTH bottleneck areas. In this paper, we had investigated the various technologies and architectures that could provide high speed access network and enlarge the coverage of the broadband service, including VDSL2 bonding, vectoring, G.fast, G.hn. Furthermore, we also proposed the test technologies and results to verify these technologies.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131546300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/APNOMS.2014.6996552
Xianwei Li, Bo Gu, Cheng Zhang, K. Yamori, Y. Tanaka
Pricing cloud resources plays an important role in leading to the success of cloud computing. Cloud services are priced at different levels in infrastructure-as-a-service (IaaS) cloud market. For example, Amazon EC2 offers its cloud resources with three pricing schemes, the subscription model, pay-as-you-go model and spot pricing model. With more and more IaaS cloud service providers (CSPs) beginning to provide cloud services, they form a competitive market to compete for cloud users. Therefore, how to set optimal prices in order to maximize their revenue in a competitive IaaS cloud computing market while at the same time meeting the cloud users' demand satisfaction is a problem that CSPs should consider. Towards this end, in this paper, we study subscription pricing competition in a duopoly IaaS cloud computing market. First, we analyze whether or not the cloud users choose to use cloud service. Then, we present a game theoretic analysis of a cloud market with two CSPs competing non-cooperatively for cloud users.
{"title":"Price competition in a duopoly IaaS cloud market","authors":"Xianwei Li, Bo Gu, Cheng Zhang, K. Yamori, Y. Tanaka","doi":"10.1109/APNOMS.2014.6996552","DOIUrl":"https://doi.org/10.1109/APNOMS.2014.6996552","url":null,"abstract":"Pricing cloud resources plays an important role in leading to the success of cloud computing. Cloud services are priced at different levels in infrastructure-as-a-service (IaaS) cloud market. For example, Amazon EC2 offers its cloud resources with three pricing schemes, the subscription model, pay-as-you-go model and spot pricing model. With more and more IaaS cloud service providers (CSPs) beginning to provide cloud services, they form a competitive market to compete for cloud users. Therefore, how to set optimal prices in order to maximize their revenue in a competitive IaaS cloud computing market while at the same time meeting the cloud users' demand satisfaction is a problem that CSPs should consider. Towards this end, in this paper, we study subscription pricing competition in a duopoly IaaS cloud computing market. First, we analyze whether or not the cloud users choose to use cloud service. Then, we present a game theoretic analysis of a cloud market with two CSPs competing non-cooperatively for cloud users.","PeriodicalId":269952,"journal":{"name":"The 16th Asia-Pacific Network Operations and Management Symposium","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130317342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}