首页 > 最新文献

2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)最新文献

英文 中文
Control Communication in SDN-based Dynamic Multi-hop Wireless Infrastructure-less Networks 基于sdn的动态多跳无线无基础设施网络控制通信
Ayush Dusia, V. Mishra, A. Sethi
Nodes in a dynamic wireless network are expected to autonomously self-organize and configure routes for communicating amongst themselves. Such networks have applications in several scenarios, including military, disaster relief, and search and rescue operations. Designing a solution for such networks is challenging because of their unique characteristics. Traditionally, decentralized solutions have been sought-after. In the past few years, Software-Defined Networking (SDN) has emerged as a promising approach for designing effective solutions for different types of networks. In this paper, we present an SDN-based architecture and a control communication protocol for dynamic multi-hop wireless infrastructure-less networks. In particular, the solution is designed for networks with 1) node mobility and unreliable connectivity, 2) unstructured network topology, 3) limited bandwidth and high interference due to multi-hop communication in a shared channel, 4) no out-of-band communication channel, and 5) no location-tracking services for learning the position of mobile nodes. We evaluate our architecture and control communication protocol in NS-3 and compare the results with two conventional solutions - OLSR and DSDV. The results demonstrate up to 40% reduction in the routing overhead while achieving the same or better throughput than the conventional solutions for networks of size up to 50 nodes.
动态无线网络中的节点被期望能够自主地自组织和配置路由,以便彼此之间进行通信。这种网络在军事、救灾和搜救行动等多种场景中都有应用。由于此类网络的独特特性,为其设计解决方案具有挑战性。传统上,分散的解决方案一直受到追捧。在过去的几年中,软件定义网络(SDN)作为一种有前途的方法出现,为不同类型的网络设计有效的解决方案。本文提出了一种基于sdn的动态多跳无线无基础设施网络体系结构和控制通信协议。该解决方案特别适用于以下网络:1)节点可移动性和不可靠的连接;2)非结构化网络拓扑;3)带宽有限,共享信道中多跳通信造成的高干扰;4)没有带外通信信道;5)没有用于学习移动节点位置的位置跟踪服务。我们在NS-3中评估了我们的架构和控制通信协议,并将结果与两种传统解决方案OLSR和DSDV进行了比较。结果表明,对于最多50个节点的网络,与传统解决方案相比,路由开销减少了40%,同时实现了相同或更好的吞吐量。
{"title":"Control Communication in SDN-based Dynamic Multi-hop Wireless Infrastructure-less Networks","authors":"Ayush Dusia, V. Mishra, A. Sethi","doi":"10.1109/ANTS.2018.8710097","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710097","url":null,"abstract":"Nodes in a dynamic wireless network are expected to autonomously self-organize and configure routes for communicating amongst themselves. Such networks have applications in several scenarios, including military, disaster relief, and search and rescue operations. Designing a solution for such networks is challenging because of their unique characteristics. Traditionally, decentralized solutions have been sought-after. In the past few years, Software-Defined Networking (SDN) has emerged as a promising approach for designing effective solutions for different types of networks. In this paper, we present an SDN-based architecture and a control communication protocol for dynamic multi-hop wireless infrastructure-less networks. In particular, the solution is designed for networks with 1) node mobility and unreliable connectivity, 2) unstructured network topology, 3) limited bandwidth and high interference due to multi-hop communication in a shared channel, 4) no out-of-band communication channel, and 5) no location-tracking services for learning the position of mobile nodes. We evaluate our architecture and control communication protocol in NS-3 and compare the results with two conventional solutions - OLSR and DSDV. The results demonstrate up to 40% reduction in the routing overhead while achieving the same or better throughput than the conventional solutions for networks of size up to 50 nodes.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129672609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
QoS Enhancement using Intelligent Cluster Head Selection Routing Technique in Vehicular Ad Hoc Networks in case of RSU failure 基于智能簇头选择路由技术的车载Ad Hoc网络RSU故障QoS增强
C. Raut, S. Devane
Use of clustering in VANET have proven effective technique to enhance QoS. Clustering based solution in current research designed by considering the geographical distances as well as network dynamics (mobility). Present research work has improved the QoS, yet the failure of infrastructure is not considered, which will definitely hamper the QoS where the quality of infrastructure is not good. This paper, intelligent cluster head routing protocol (ICHR) is proposed to work with RSU failure conditions in network efficiently for VANET. Additionally, the method of selecting cluster head has been changed to improve the QoS significantly. In case of RSU failure, the Intelligent CH (ICH) is selected from the all CH nodes based on the maximum probability of all three parameters to transmit the data over the alternate neighboring RSU through LTE network which is already in use for providing internet connection.
在VANET中使用聚类技术已被证明是提高服务质量的有效技术。目前研究中基于聚类的解决方案设计考虑了地理距离以及网络动态(移动性)。目前的研究工作改进了QoS,但没有考虑到基础设施的失效,在基础设施质量不好的情况下,这必然会影响QoS的实现。本文提出了一种智能簇头路由协议(ICHR),用于VANET有效地处理网络中RSU故障情况。此外,改进了簇头选择方法,显著提高了服务质量。在RSU发生故障的情况下,根据三个参数的最大概率从所有CH节点中选择智能CH (ICH),通过已经用于提供互联网连接的LTE网络在备用相邻RSU上传输数据。
{"title":"QoS Enhancement using Intelligent Cluster Head Selection Routing Technique in Vehicular Ad Hoc Networks in case of RSU failure","authors":"C. Raut, S. Devane","doi":"10.1109/ANTS.2018.8710102","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710102","url":null,"abstract":"Use of clustering in VANET have proven effective technique to enhance QoS. Clustering based solution in current research designed by considering the geographical distances as well as network dynamics (mobility). Present research work has improved the QoS, yet the failure of infrastructure is not considered, which will definitely hamper the QoS where the quality of infrastructure is not good. This paper, intelligent cluster head routing protocol (ICHR) is proposed to work with RSU failure conditions in network efficiently for VANET. Additionally, the method of selecting cluster head has been changed to improve the QoS significantly. In case of RSU failure, the Intelligent CH (ICH) is selected from the all CH nodes based on the maximum probability of all three parameters to transmit the data over the alternate neighboring RSU through LTE network which is already in use for providing internet connection.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130655587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Minimum Cost Real-Time Ubiquitous Computing System Using Edge-Fog-Cloud 基于边缘雾云的最小成本实时普适计算系统
Surbhi Saraswat, Hari Prabhat Gupta, Tanima Dutta
With the development of diverse ubiquitous computing applications, tremendous amount of sensor data is generated. This data requires efficient localized processing and storage. A real-time ubiquitous system requires latency-aware processing to satisfy the deadline of the ubiquitous applications. Performing processing near the network, using Edge and Fog devices, meets this need. The cost of the ubiquitous system depends on the pricing of the processing and storage. In this paper, we present an Edge, Fog, and Cloud layers based ubiquitous computing system, which not only deals with the deadline of a given application but also minimizes the cost of the system. We derive expressions to estimate the cost of computing and storage of the ubiquitous computing system and delay of the network. We demonstrate an application of the analysis in the design of a minimum cost ubiquitous computing system. We propose an algorithm to determine the layers for executing the machine learning techniques required to satisfy the deadline of the system and simultaneously minimize the cost of the network.
随着各种普适计算应用的发展,产生了大量的传感器数据。这些数据需要高效的本地化处理和存储。实时泛在系统需要延迟感知处理来满足泛在应用程序的截止日期。使用Edge和Fog设备在网络附近执行处理可以满足这种需求。无所不在系统的成本取决于处理和存储的定价。在本文中,我们提出了一个基于边缘、雾和云的普适计算系统,它不仅处理给定应用程序的截止日期,而且最小化了系统的成本。推导了泛在计算系统的计算成本、存储成本和网络时延的估计表达式。我们演示了该分析在最小成本普适计算系统设计中的一个应用。我们提出了一种算法来确定执行机器学习技术所需的层,以满足系统的最后期限,同时最小化网络的成本。
{"title":"A Minimum Cost Real-Time Ubiquitous Computing System Using Edge-Fog-Cloud","authors":"Surbhi Saraswat, Hari Prabhat Gupta, Tanima Dutta","doi":"10.1109/ANTS.2018.8710091","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710091","url":null,"abstract":"With the development of diverse ubiquitous computing applications, tremendous amount of sensor data is generated. This data requires efficient localized processing and storage. A real-time ubiquitous system requires latency-aware processing to satisfy the deadline of the ubiquitous applications. Performing processing near the network, using Edge and Fog devices, meets this need. The cost of the ubiquitous system depends on the pricing of the processing and storage. In this paper, we present an Edge, Fog, and Cloud layers based ubiquitous computing system, which not only deals with the deadline of a given application but also minimizes the cost of the system. We derive expressions to estimate the cost of computing and storage of the ubiquitous computing system and delay of the network. We demonstrate an application of the analysis in the design of a minimum cost ubiquitous computing system. We propose an algorithm to determine the layers for executing the machine learning techniques required to satisfy the deadline of the system and simultaneously minimize the cost of the network.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126373423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Empirical Delay Models for 802.11 under Deterministic Convergecast Traffic 确定性汇聚流量下802.11的经验延迟模型
A. Ramesh, B. S. Vineeth
Wireless sensor and actuator networks as well as industrial Internet of things networks use protocols such as IEEE 802. 15.4e TSCH, which uses deterministic scheduling, in order to collect data. The data collected from multiple sensor nodes is convergecast to a gateway. Since the scheduling is deterministic the data arrival at the gateway follows a periodic deterministic pattern. Often, in an industrial setting it is useful to take this collected data from multiple gateways and transfer it for cloud processing or storage. We consider an architecture where the convergecast data is communicated over WiFi to the cloud. Although real-time latency requirements are not imposed on this cloud transfer, average latency requirements still apply for use-cases like long term control of parameters or for updation of dashboards. In this context, we analyze the average latency performance of the 802.11 MAC layer with deterministic input traffic. We propose a data driven empirical model for the average delay of 802.11 under deterministic traffic.
无线传感器和执行器网络以及工业物联网网络使用IEEE 802等协议。15.4e TSCH,它使用确定性调度,以便收集数据。从多个传感器节点收集的数据被汇聚到一个网关。由于调度是确定的,因此到达网关的数据遵循周期性的确定模式。通常,在工业环境中,从多个网关获取收集到的数据并将其传输给云处理或存储是很有用的。我们考虑一种架构,其中聚合数据通过WiFi传输到云。尽管对这种云传输没有施加实时延迟要求,但平均延迟要求仍然适用于长期控制参数或更新仪表板等用例。在这种情况下,我们分析了具有确定性输入流量的802.11 MAC层的平均延迟性能。我们提出了一种确定性流量下802.11平均时延的数据驱动经验模型。
{"title":"Empirical Delay Models for 802.11 under Deterministic Convergecast Traffic","authors":"A. Ramesh, B. S. Vineeth","doi":"10.1109/ANTS.2018.8710111","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710111","url":null,"abstract":"Wireless sensor and actuator networks as well as industrial Internet of things networks use protocols such as IEEE 802. 15.4e TSCH, which uses deterministic scheduling, in order to collect data. The data collected from multiple sensor nodes is convergecast to a gateway. Since the scheduling is deterministic the data arrival at the gateway follows a periodic deterministic pattern. Often, in an industrial setting it is useful to take this collected data from multiple gateways and transfer it for cloud processing or storage. We consider an architecture where the convergecast data is communicated over WiFi to the cloud. Although real-time latency requirements are not imposed on this cloud transfer, average latency requirements still apply for use-cases like long term control of parameters or for updation of dashboards. In this context, we analyze the average latency performance of the 802.11 MAC layer with deterministic input traffic. We propose a data driven empirical model for the average delay of 802.11 under deterministic traffic.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121438699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Queuing Model for the Secondary Users in a Cognitive Radio Network for Improvement of QoS 基于认知无线网络中辅助用户动态排队模型的QoS改进
Kaushik Dutta, Rishav Mukherjee, A. Kundu, Shamik Kundu
The advent of various bandwidth-hungry applications now-a-days has increased the spectrum demand, thereby resulting in spectrum scarcity. Cognitive Radio Networks (CRN), proposed by the researchers, is a probable solution to the problem. CRN allows licensed Primary Users (PUs) to partly lease their unutilized spectrum to the opportunistic Secondary Users (SU) for effective Channel Utilization (CU) and enhanced Quality of Service (QoS). Now, use of buffers is a common approach to provide improved QoS to the SUs. However, if the waiting time of the SUs in the buffers exceed their time-out interval, the QoS degrades instead of improving. Thus, in this work, firstly, a CRN has been modeled using two buffers, namely, the New Queue (NQ) and the Pre-empted Queue (PQ). The NQ holds the newly requesting SUs while the PQ holds the SUs pre-empted by the PUs. Next, a model to determine the dynamic length of buffers has been proposed. It works based on the prior activity of the end-users and the requesting SU's waiting threshold. The model ensures service to user if it is admitted in the network. Otherwise, it is blocked or dropped. Blocking or dropping of the calls in this case provides a chance to the SUs to transmit via other base stations. The system is modeled using a multidimensional Continuous Time Markov Chain (CTMC) model. The dynamic queue helps to restrict the Level of Impatience (LOI) to 19.90% for the New Queue SUs and 14.93% for Preempted Queue SUs while achieving 99.33% CU.
随着各种需要大量带宽的应用的出现,增加了对频谱的需求,从而导致频谱稀缺。研究人员提出的认知无线电网络(CRN)可能是解决这个问题的一种方法。CRN允许授权的主用户(pu)将部分未使用的频谱出租给机会的从用户(SU),以获得有效的信道利用率(CU)和增强的服务质量(QoS)。现在,使用缓冲区是为单元提供改进的QoS的常用方法。但是,如果单元在缓冲区中的等待时间超过了它们的超时时间间隔,则QoS会降低而不是提高。因此,在这项工作中,首先,CRN使用两个缓冲区建模,即新队列(NQ)和抢占队列(PQ)。NQ持有新请求的su, PQ持有被pu抢占的su。其次,提出了一个确定缓冲区动态长度的模型。它基于最终用户的先前活动和请求SU的等待阈值工作。该模型保证在网络允许的情况下为用户提供服务。否则,它将被阻塞或丢弃。在这种情况下,阻塞或丢弃呼叫为单元提供了通过其他基站进行传输的机会。采用多维连续时间马尔可夫链(CTMC)模型对系统进行建模。动态队列有助于将新队列单元的不耐烦水平(LOI)限制为19.90%,抢占队列单元的LOI限制为14.93%,同时实现99.33%的CU。
{"title":"Dynamic Queuing Model for the Secondary Users in a Cognitive Radio Network for Improvement of QoS","authors":"Kaushik Dutta, Rishav Mukherjee, A. Kundu, Shamik Kundu","doi":"10.1109/ANTS.2018.8710124","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710124","url":null,"abstract":"The advent of various bandwidth-hungry applications now-a-days has increased the spectrum demand, thereby resulting in spectrum scarcity. Cognitive Radio Networks (CRN), proposed by the researchers, is a probable solution to the problem. CRN allows licensed Primary Users (PUs) to partly lease their unutilized spectrum to the opportunistic Secondary Users (SU) for effective Channel Utilization (CU) and enhanced Quality of Service (QoS). Now, use of buffers is a common approach to provide improved QoS to the SUs. However, if the waiting time of the SUs in the buffers exceed their time-out interval, the QoS degrades instead of improving. Thus, in this work, firstly, a CRN has been modeled using two buffers, namely, the New Queue (NQ) and the Pre-empted Queue (PQ). The NQ holds the newly requesting SUs while the PQ holds the SUs pre-empted by the PUs. Next, a model to determine the dynamic length of buffers has been proposed. It works based on the prior activity of the end-users and the requesting SU's waiting threshold. The model ensures service to user if it is admitted in the network. Otherwise, it is blocked or dropped. Blocking or dropping of the calls in this case provides a chance to the SUs to transmit via other base stations. The system is modeled using a multidimensional Continuous Time Markov Chain (CTMC) model. The dynamic queue helps to restrict the Level of Impatience (LOI) to 19.90% for the New Queue SUs and 14.93% for Preempted Queue SUs while achieving 99.33% CU.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"867 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121029248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of Offloading in NOMA-HetNets using Imperfect CSI 基于不完全CSI的NOMA-HetNets卸载性能分析
Pragya Swami, V. Bhatia, Satyanarayana Vuppala, T. Ratnarajah
The increase in number of cellular users had lead to the evolution from the traditional cellular networks to the more efficient heterogeneous cellular networks (HetNet) to handle the traffic. Offloading plays a vital role in handling the traffic from the congested macro base station by handing users to the less congested femto base stations (FBS). Further, non-orthogonal multiple access (NOMA) has proved to be efficient for the future generation networks. In this work, we study the offloading in HetNets, where the FBS tier serves the users using NOMA. Imperfect channel state information (CSI) is considered to analyze the outage probability of offloaded user, since, in practice CSI estimation requires significant system overhead, especially when the number of users are large. Hence, for practical systems, the analyses with imperfect CSI is more relevant. Some important observations regarding offloading to FBS tier with NOMA based on imperfect CSI are drawn. The analytical results are validated using Monte Carlo simulations.
随着蜂窝用户数量的增加,传统的蜂窝网络向更高效的异构蜂窝网络(HetNet)发展。卸载通过将用户转移到较不拥挤的femto基站(FBS),在处理来自拥塞宏基站的流量方面起着至关重要的作用。此外,非正交多址(NOMA)已被证明是未来一代网络的有效方法。在这项工作中,我们研究了HetNets中的卸载,其中FBS层使用NOMA为用户提供服务。考虑不完全信道状态信息(CSI)来分析卸载用户的中断概率,因为在实践中,CSI估计需要大量的系统开销,特别是当用户数量很大时。因此,对于实际系统,不完全CSI的分析更有意义。关于基于不完全CSI的NOMA卸载到FBS层的一些重要观察结果。通过蒙特卡罗模拟验证了分析结果。
{"title":"Performance Analysis of Offloading in NOMA-HetNets using Imperfect CSI","authors":"Pragya Swami, V. Bhatia, Satyanarayana Vuppala, T. Ratnarajah","doi":"10.1109/ANTS.2018.8710131","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710131","url":null,"abstract":"The increase in number of cellular users had lead to the evolution from the traditional cellular networks to the more efficient heterogeneous cellular networks (HetNet) to handle the traffic. Offloading plays a vital role in handling the traffic from the congested macro base station by handing users to the less congested femto base stations (FBS). Further, non-orthogonal multiple access (NOMA) has proved to be efficient for the future generation networks. In this work, we study the offloading in HetNets, where the FBS tier serves the users using NOMA. Imperfect channel state information (CSI) is considered to analyze the outage probability of offloaded user, since, in practice CSI estimation requires significant system overhead, especially when the number of users are large. Hence, for practical systems, the analyses with imperfect CSI is more relevant. Some important observations regarding offloading to FBS tier with NOMA based on imperfect CSI are drawn. The analytical results are validated using Monte Carlo simulations.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125313414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
OCPDA: A novel approach towards detection of overloaded cloud providers in a federated environment OCPDA:一种在联邦环境中检测超载云提供商的新方法
Benay Kumar Ray, Oindrilla Ghosh, Srimoyee Bhattacherjee, Sarbani Roy, Sunirmal Khatua
A federated cloud environment helps different cloud service providers (CSP) to improve their performances in terms of Quality of Service $(mathrm {Q}mathrm {o}mathrm {S})$. For a federation to deliver its best, the workloads on its member CSPs should be balanced. Overloading a CSP leads to degradation in performance which is absolutely undesirable. To balance the workloads among the member CSPs of a federation, detection of the overloaded CSPs is important. The proposed model, Overloaded Cloud Provider Detection Algorithm(OCPDA), uses Multiple Linear Regression (MLR) based technique to estimate the loads of CSPs. Extensive simulation has been conducted which shows that OCPDA successfully detects overloaded CSPs in a federation.
联邦云环境帮助不同的云服务提供商(CSP)在服务质量$(mathrm {Q}mathrm {o}mathrm {S})$方面提高性能。为了使联邦发挥最佳效果,其成员csp上的工作负载应该是平衡的。超载CSP会导致性能下降,这是绝对不希望看到的。为了平衡联盟成员csp之间的工作负载,检测过载的csp非常重要。该模型,超载云提供商检测算法(OCPDA),使用基于多元线性回归(MLR)的技术来估计云服务提供商的负载。大量的仿真结果表明,OCPDA能够成功地检测到联邦中过载的csp。
{"title":"OCPDA: A novel approach towards detection of overloaded cloud providers in a federated environment","authors":"Benay Kumar Ray, Oindrilla Ghosh, Srimoyee Bhattacherjee, Sarbani Roy, Sunirmal Khatua","doi":"10.1109/ANTS.2018.8710148","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710148","url":null,"abstract":"A federated cloud environment helps different cloud service providers (CSP) to improve their performances in terms of Quality of Service $(mathrm {Q}mathrm {o}mathrm {S})$. For a federation to deliver its best, the workloads on its member CSPs should be balanced. Overloading a CSP leads to degradation in performance which is absolutely undesirable. To balance the workloads among the member CSPs of a federation, detection of the overloaded CSPs is important. The proposed model, Overloaded Cloud Provider Detection Algorithm(OCPDA), uses Multiple Linear Regression (MLR) based technique to estimate the loads of CSPs. Extensive simulation has been conducted which shows that OCPDA successfully detects overloaded CSPs in a federation.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133279580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigation of Controller induced DDoS Attack on Primary Server in High Traffic Scenarios of Software Defined Networks 软件定义网络大流量场景下控制器对主服务器DDoS攻击的缓解
R. Sanjeetha, A. Prasanna, D. P. Kumar, A. Kanavalli
One of the major constraint of a Software Defined Network (SDN) is the limited size of the flow table in the switch. These flow tables are required for forwarding packets to the desired destination. To deliver a packet in SDN, the controller installs flow table rules on the source switch i.e. the switch which connects to the source host, multiple intermediate switches through which the packet will be transmitted, and the destination switch which connects to the destination host. In high traffic scenarios, the flow tables of these switches become full and the flow rules must be repeatedly replaced by the controller. Hiep T. Nguyen Tri et al. proposed a solution for the same, by using an OpenDaylight controller feature that forwards packets to the destination switch directly and install a flow table rules only on it. In this paper we show how a DDoS attack can be instigated on a primary server i.e. the server providing important services like web server, file server etc., present in SDN which uses the abovementioned solution during high traffic scenarios. The attack is instigated by generating huge number of packets with destination IP addresses such that it compels the controller to always choose the switch which connects the primary sever to the rest of the network as the destination switch. The flow table rules are repeatedly installed by the controller into this switch, leading to exhaustion of its flow table space. This blocks the genuine traffic between the primary server and its clients as the flow rules that would service legitimate clients get replaced by flow rules that process this attack traffic.
软件定义网络(SDN)的主要限制之一是交换机中流表的有限大小。这些流表是将数据包转发到所需目的地所必需的。为了在SDN中传送数据包,控制器在源交换机上安装流表规则,即连接到源主机的交换机、传输数据包的多个中间交换机以及连接到目的主机的目的交换机。在高流量场景下,这些交换机的流表会被填满,流规则必须被控制器反复替换。Hiep T. Nguyen Tri等人提出了同样的解决方案,通过使用OpenDaylight控制器功能将数据包直接转发到目标交换机,并仅在其上安装流表规则。在本文中,我们展示了如何在主服务器上煽动DDoS攻击,即提供重要服务的服务器,如web服务器,文件服务器等,存在于SDN中,在高流量场景中使用上述解决方案。这种攻击是通过生成大量带有目的IP地址的数据包来煽动的,这样就迫使控制器总是选择连接主服务器和网络其余部分的交换机作为目的交换机。流表规则被控制器反复安装到该开关中,导致其流表空间耗尽。这将阻止主服务器与其客户端之间的真实流量,因为将为合法客户端提供服务的流规则将被处理攻击流量的流规则所取代。
{"title":"Mitigation of Controller induced DDoS Attack on Primary Server in High Traffic Scenarios of Software Defined Networks","authors":"R. Sanjeetha, A. Prasanna, D. P. Kumar, A. Kanavalli","doi":"10.1109/ANTS.2018.8710066","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710066","url":null,"abstract":"One of the major constraint of a Software Defined Network (SDN) is the limited size of the flow table in the switch. These flow tables are required for forwarding packets to the desired destination. To deliver a packet in SDN, the controller installs flow table rules on the source switch i.e. the switch which connects to the source host, multiple intermediate switches through which the packet will be transmitted, and the destination switch which connects to the destination host. In high traffic scenarios, the flow tables of these switches become full and the flow rules must be repeatedly replaced by the controller. Hiep T. Nguyen Tri et al. proposed a solution for the same, by using an OpenDaylight controller feature that forwards packets to the destination switch directly and install a flow table rules only on it. In this paper we show how a DDoS attack can be instigated on a primary server i.e. the server providing important services like web server, file server etc., present in SDN which uses the abovementioned solution during high traffic scenarios. The attack is instigated by generating huge number of packets with destination IP addresses such that it compels the controller to always choose the switch which connects the primary sever to the rest of the network as the destination switch. The flow table rules are repeatedly installed by the controller into this switch, leading to exhaustion of its flow table space. This blocks the genuine traffic between the primary server and its clients as the flow rules that would service legitimate clients get replaced by flow rules that process this attack traffic.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134580769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and Implementation of an Ultra-Low Power Wake-up Radio for Wireless IoT Devices 用于无线物联网设备的超低功耗唤醒无线电的设计与实现
Anders Frøytlog, Linga Reddy Cenkeramaddi
In this paper, we present the design and prototype implementation of an ultra-low power wake-up radio for wireless IoT devices. The prototyped wake-up radio consumes only 580nA from 3V power supply, covers distance range of up to 55 meters and achieves a sensitivity of -49.5dBm. This wakeup radio module can easily be integrated into wireless IoT devices and thereby reducing the overall power consumption of the battery powered and energy harvesting based devices. The prolonged life time of the devices can reduce the overall costs when deployed in large scale.
在本文中,我们提出了一种用于无线物联网设备的超低功耗唤醒无线电的设计和原型实现。原型唤醒无线电在3V电源下仅消耗580nA,覆盖距离范围高达55米,灵敏度达到-49.5dBm。这种唤醒无线电模块可以很容易地集成到无线物联网设备中,从而降低电池供电和能量收集设备的总体功耗。在大规模部署时,延长设备的使用寿命可以降低总体成本。
{"title":"Design and Implementation of an Ultra-Low Power Wake-up Radio for Wireless IoT Devices","authors":"Anders Frøytlog, Linga Reddy Cenkeramaddi","doi":"10.1109/ANTS.2018.8710086","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710086","url":null,"abstract":"In this paper, we present the design and prototype implementation of an ultra-low power wake-up radio for wireless IoT devices. The prototyped wake-up radio consumes only 580nA from 3V power supply, covers distance range of up to 55 meters and achieves a sensitivity of -49.5dBm. This wakeup radio module can easily be integrated into wireless IoT devices and thereby reducing the overall power consumption of the battery powered and energy harvesting based devices. The prolonged life time of the devices can reduce the overall costs when deployed in large scale.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115275614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Emerging Access Technologies and Open Challenges in 5G IoT: From Physical Layer Perspective 5G物联网中的新兴接入技术和开放挑战:从物理层角度
Parthiban Annamalai, Jyotsna L. Bapat, D. Das
Internet of Things (IoT) is expected to play a prominent role in the envisioned networked society. In IoT ecosystem, Machine Type Communication (MTC) is the access technology that ensures wireless connectivity for end-user devices to the network. Diverse IoT applications pose conflicting requirements and challenges that must be resolved to fully realize the IoT ecosystem. Although the right access technology to address all these challenges is not available yet, notable progress has been made in the recent times to address most of the key requirements. Extended Coverage (EC)-GSM-IoT and Narrow Band (NB)-IoT have been standardized by 3GPP in Release 13 as the access technologies for IoT. Among non-3GPP community, Long Range (LoRa) has attracted significant attention. In this paper, the suitability of the aforementioned access technologies to various IoT services in terms of the relevant system parameters is explored. We have also identified many system design parameters that will have adverse implications if not configured correctly for the right IoT use case. Important open challenges to be addressed from physical layer (PHY) perspective are highlighted here that will help to realize a truly connected world.
物联网(IoT)有望在设想的网络社会中发挥突出作用。在物联网生态系统中,机器类型通信(MTC)是确保最终用户设备与网络无线连接的接入技术。为了充分实现物联网生态系统,必须解决各种物联网应用带来的相互冲突的需求和挑战。尽管解决所有这些挑战的合适接入技术尚未出现,但在解决大多数关键需求方面,近年来已经取得了显著进展。扩展覆盖(EC)-GSM-IoT和窄带(NB)-IoT在第13版中被3GPP标准化为物联网的接入技术。在非3gpp社区中,远程(LoRa)引起了极大的关注。本文从相关系统参数的角度探讨了上述接入技术对各种物联网服务的适用性。我们还确定了许多系统设计参数,如果没有为正确的物联网用例正确配置,这些参数将产生不利影响。本文强调了从物理层(PHY)角度需要解决的重要开放挑战,这将有助于实现真正的互联世界。
{"title":"Emerging Access Technologies and Open Challenges in 5G IoT: From Physical Layer Perspective","authors":"Parthiban Annamalai, Jyotsna L. Bapat, D. Das","doi":"10.1109/ANTS.2018.8710133","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710133","url":null,"abstract":"Internet of Things (IoT) is expected to play a prominent role in the envisioned networked society. In IoT ecosystem, Machine Type Communication (MTC) is the access technology that ensures wireless connectivity for end-user devices to the network. Diverse IoT applications pose conflicting requirements and challenges that must be resolved to fully realize the IoT ecosystem. Although the right access technology to address all these challenges is not available yet, notable progress has been made in the recent times to address most of the key requirements. Extended Coverage (EC)-GSM-IoT and Narrow Band (NB)-IoT have been standardized by 3GPP in Release 13 as the access technologies for IoT. Among non-3GPP community, Long Range (LoRa) has attracted significant attention. In this paper, the suitability of the aforementioned access technologies to various IoT services in terms of the relevant system parameters is explored. We have also identified many system design parameters that will have adverse implications if not configured correctly for the right IoT use case. Important open challenges to be addressed from physical layer (PHY) perspective are highlighted here that will help to realize a truly connected world.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123546934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1