首页 > 最新文献

2019 15th International Conference on Network and Service Management (CNSM)最新文献

英文 中文
Fog-based Data Fusion for Heterogeneous IoT Sensor Networks: A Real Implementation 异构物联网传感器网络基于雾的数据融合:真实实现
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012744
F. Valente, João Paulo Morijo, Kelen Cristiane Teixeira Vivaldini, L. Trevelin
The Internet of Things (IoT) is an environment that can be divided in three large layers: the sensor/actuator level where a wide variety of objects with different computing, sensors and communication capabilities resides, the communication layer with wireless technologies such as ZigBee, Bluetooth and emerging 6LoWPAN (e.g LoRa), and the intelligence layer, where computing analytics/decisions occur. IoT can be used for monitoring, inferring problems, decision making at a business level or actuating at the edge via IoT nodes. As the IoT sensor network grows, an enormous amount of data from multiple sources flows to the intelligence layer. In order to make decisions based on analytics over these data, the measurements need to be precise and accurate. Data fusion is an effective way to improve data quality, however, IoT environments are still evolving and the best way and location where data fusion should happen is an open problem. This paper presents one potential strategy for IoT sensor data fusion by implementing multi-sensor data fusion as microservices using a container platform built into an opensource IoT middleware based in a fog computing infrastructure which is can scale automatically as the influx of data from the IoT nodes grows. A number of data fusion tests were performed for different amounts of IoT nodes and sensor readings over ZigBee and LoRa using a specific data fusion algorithm. The results show that, the strategy can be effectively used in IoT heterogeneous environments.
物联网(IoT)是一个可以分为三个大层的环境:传感器/执行器层,其中包含各种具有不同计算、传感器和通信能力的对象;通信层使用无线技术,如ZigBee、蓝牙和新兴的6LoWPAN(例如LoRa);智能层,其中发生计算分析/决策。物联网可用于监控、推断问题、在业务层面做出决策或通过物联网节点在边缘执行。随着物联网传感器网络的发展,来自多个来源的大量数据流向智能层。为了根据对这些数据的分析做出决策,测量需要精确和准确。数据融合是提高数据质量的有效方法,然而,物联网环境仍在不断发展,数据融合发生的最佳方式和位置是一个悬而未决的问题。本文提出了一种物联网传感器数据融合的潜在策略,通过使用基于雾计算基础设施的开源物联网中间件中的容器平台将多传感器数据融合实现为微服务,该平台可以随着来自物联网节点的数据流入的增长而自动扩展。使用特定的数据融合算法,对ZigBee和LoRa上不同数量的物联网节点和传感器读数进行了大量数据融合测试。结果表明,该策略可以有效地应用于物联网异构环境。
{"title":"Fog-based Data Fusion for Heterogeneous IoT Sensor Networks: A Real Implementation","authors":"F. Valente, João Paulo Morijo, Kelen Cristiane Teixeira Vivaldini, L. Trevelin","doi":"10.23919/CNSM46954.2019.9012744","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012744","url":null,"abstract":"The Internet of Things (IoT) is an environment that can be divided in three large layers: the sensor/actuator level where a wide variety of objects with different computing, sensors and communication capabilities resides, the communication layer with wireless technologies such as ZigBee, Bluetooth and emerging 6LoWPAN (e.g LoRa), and the intelligence layer, where computing analytics/decisions occur. IoT can be used for monitoring, inferring problems, decision making at a business level or actuating at the edge via IoT nodes. As the IoT sensor network grows, an enormous amount of data from multiple sources flows to the intelligence layer. In order to make decisions based on analytics over these data, the measurements need to be precise and accurate. Data fusion is an effective way to improve data quality, however, IoT environments are still evolving and the best way and location where data fusion should happen is an open problem. This paper presents one potential strategy for IoT sensor data fusion by implementing multi-sensor data fusion as microservices using a container platform built into an opensource IoT middleware based in a fog computing infrastructure which is can scale automatically as the influx of data from the IoT nodes grows. A number of data fusion tests were performed for different amounts of IoT nodes and sensor readings over ZigBee and LoRa using a specific data fusion algorithm. The results show that, the strategy can be effectively used in IoT heterogeneous environments.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128873120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Informed Access Network Selection: The Benefits of Socket Intents for Web Performance 知情接入网选择:套接字意图对Web性能的好处
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012714
Theresa Enghardt, Philipp S. Tiesel, T. Zinner, A. Feldmann
Today’s end-user devices have multiple access networks available and can achieve better application performance by distributing traffic across access networks. However, matching application traffic to the most suitable access network or bundling them is non-trivial, given varying application needs and network performance characteristics. Therefore, we propose an application-informed approach for access network selection (IANS). Based on the size of a Web resource, we select the better access network in terms of latency and available downstream capacity. We implement IANS within our Socket Intents prototype and evaluate its benefits for Web page loads under a variety of network conditions and for various Web pages. IANS provides the highest speedups for scenarios with asymmetric network conditions and for scenarios with low downstream capacity. Here, IANS improves relevant Web metrics by between 500 and 1000 ms in the median, compared to using the better of the two access networks, and may also outperform MPTCP. This confirms that IANS improves application performance over using a single network and, in several scenarios, even using MPTCP.
当今的终端用户设备可以使用多个接入网,并且可以通过跨接入网分配流量来获得更好的应用性能。然而,考虑到不同的应用程序需求和网络性能特征,将应用程序流量匹配到最合适的接入网或将它们捆绑在一起并非易事。因此,我们提出了一种基于应用的接入网选择(IANS)方法。根据Web资源的大小,我们根据延迟和可用的下游容量选择更好的接入网。我们在Socket intent原型中实现了IANS,并评估了它在各种网络条件和各种Web页面下对Web页面加载的好处。在网络不对称和下游容量较低的情况下,IANS提供了最高的提速。在这里,与使用两种接入网络中较好的一种相比,IANS将相关Web指标提高了500到1000毫秒,并且还可能优于MPTCP。这证实了与使用单个网络相比,IANS可以提高应用程序的性能,在某些情况下,甚至可以使用MPTCP。
{"title":"Informed Access Network Selection: The Benefits of Socket Intents for Web Performance","authors":"Theresa Enghardt, Philipp S. Tiesel, T. Zinner, A. Feldmann","doi":"10.23919/CNSM46954.2019.9012714","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012714","url":null,"abstract":"Today’s end-user devices have multiple access networks available and can achieve better application performance by distributing traffic across access networks. However, matching application traffic to the most suitable access network or bundling them is non-trivial, given varying application needs and network performance characteristics. Therefore, we propose an application-informed approach for access network selection (IANS). Based on the size of a Web resource, we select the better access network in terms of latency and available downstream capacity. We implement IANS within our Socket Intents prototype and evaluate its benefits for Web page loads under a variety of network conditions and for various Web pages. IANS provides the highest speedups for scenarios with asymmetric network conditions and for scenarios with low downstream capacity. Here, IANS improves relevant Web metrics by between 500 and 1000 ms in the median, compared to using the better of the two access networks, and may also outperform MPTCP. This confirms that IANS improves application performance over using a single network and, in several scenarios, even using MPTCP.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131654489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Slotted TDMA Multichannel MAC for Overlapped Vehicular Networks with SDN-based Distributed System 基于sdn分布式系统的重叠车用网络的开槽TDMA多通道MAC
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012660
Hyundong Hwang, Young-Tak Kim
The IEEE 802.11p, IEEE 1609, and wireless access in vehicular environment (WAVE) standards are developed to be used on multi-channels in dedicated short range communication (DSRC) spectrum. While the vehicular networks will be inevitably installed in overlapped manner in metropolitan area, most research works of VANETs, however, are focused on the coordinated multichannel MAC protocol operations in a single isolated ad hoc network environment without considering overlapped vehicular network environments that include interferences from neighbor networks. In this paper, we propose a slotted TDMA Multichannel MAC (STMC-MAC) for overlapped vehicular networks (OVN) with software-defined networking-based distribution system (SDN-DS) as infrastructure. The proposed STMC-MAC guarantees reliable delivery of basic safety message (BSM) with bounded delay and scalability on OVN with SDN-DS for metropolitan area with high vehicular density. The proposed STMC-MAC provides higher scalability, reliability, and flexibility in BSM and non-BSM data exchanges at various VN-ESS topologies and different level of vehicular density. The proposed scheme had been implemented on NS-3 network simulator, and the performances of the proposed scheme are measured, analyzed, and compared with existing approaches.1
IEEE 802.11p、IEEE 1609和车载环境无线接入(WAVE)标准被开发用于专用短距离通信(DSRC)频谱的多通道。在城市区域内,车联网不可避免地会以重叠的方式安装,然而,大多数vanet的研究工作都集中在一个孤立的自组织网络环境下的协调多通道MAC协议运行,而没有考虑包括邻居网络干扰的重叠车联网环境。本文以基于软件定义网络的分布系统(SDN-DS)为基础架构,提出了一种用于重叠车辆网络(OVN)的开槽TDMA多通道MAC (STMC-MAC)。所提出的STMC-MAC保证了在具有SDN-DS的OVN上具有有限延迟和可扩展性的基本安全消息(BSM)的可靠传递,适用于高车辆密度的城域网。提出的STMC-MAC在各种VN-ESS拓扑和不同车辆密度水平下的BSM和非BSM数据交换中提供更高的可扩展性、可靠性和灵活性。在NS-3网络模拟器上实现了所提方案,并对所提方案的性能进行了测试、分析,并与现有方案进行了比较
{"title":"Slotted TDMA Multichannel MAC for Overlapped Vehicular Networks with SDN-based Distributed System","authors":"Hyundong Hwang, Young-Tak Kim","doi":"10.23919/CNSM46954.2019.9012660","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012660","url":null,"abstract":"The IEEE 802.11p, IEEE 1609, and wireless access in vehicular environment (WAVE) standards are developed to be used on multi-channels in dedicated short range communication (DSRC) spectrum. While the vehicular networks will be inevitably installed in overlapped manner in metropolitan area, most research works of VANETs, however, are focused on the coordinated multichannel MAC protocol operations in a single isolated ad hoc network environment without considering overlapped vehicular network environments that include interferences from neighbor networks. In this paper, we propose a slotted TDMA Multichannel MAC (STMC-MAC) for overlapped vehicular networks (OVN) with software-defined networking-based distribution system (SDN-DS) as infrastructure. The proposed STMC-MAC guarantees reliable delivery of basic safety message (BSM) with bounded delay and scalability on OVN with SDN-DS for metropolitan area with high vehicular density. The proposed STMC-MAC provides higher scalability, reliability, and flexibility in BSM and non-BSM data exchanges at various VN-ESS topologies and different level of vehicular density. The proposed scheme had been implemented on NS-3 network simulator, and the performances of the proposed scheme are measured, analyzed, and compared with existing approaches.1","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130779104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Data-Driven Emulation of Mobile Access Networks 移动接入网的数据驱动仿真
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012691
Ali Safari Khatouni, Martino Trevisan, Danilo Giordano
Network monitoring is fundamental to understand network evolution and behavior. However, monitoring studies have the main limitation of running new experiments when the phenomenon under analysis is over e.g., congestion. To overcome this limitation, network emulation is of vital importance for network testing and research experiments either in wired and mobile networks. When it comes to mobile networks, the variety of technical characteristics, coupled with the opaque network configurations, make realistic network emulation a challenging task.In this paper, we address this issue leveraging a large scale dataset composed of 500M network latency measurements in Mobile BroadBand networks. By using this dataset, we create 51 different network latency profiles based on the Mobile BroadBand operator, the radio access technology and signal strength. These profiles are then processed to make them compatible with the tc-netem emulation tool. Finally, we show that, despite the limitation of current tc-netem emulation tool, Generative Adversarial Networks are a promising solution used to create realistic temporal emulation.We believe that this work could be the first step toward a comprehensive data-driven network emulation. For this, we make our profiles and codes available to foster further studies in these directions.
网络监控是理解网络演变和行为的基础。然而,监测研究的主要限制是在分析现象结束时进行新的实验,例如拥堵。为了克服这一限制,网络仿真对于有线和移动网络中的网络测试和研究实验至关重要。当涉及到移动网络时,各种各样的技术特性,加上不透明的网络配置,使得真实的网络仿真成为一项具有挑战性的任务。在本文中,我们利用由移动宽带网络中的500M网络延迟测量组成的大规模数据集来解决这个问题。通过使用该数据集,我们基于移动宽带运营商、无线接入技术和信号强度创建了51种不同的网络延迟概况。然后对这些配置文件进行处理,使它们与tc-netem仿真工具兼容。最后,我们表明,尽管目前的tc-netem仿真工具的局限性,生成对抗网络是一个有前途的解决方案,用于创建逼真的时间模拟。我们相信,这项工作可能是迈向全面的数据驱动网络仿真的第一步。为此,我们提供了我们的简介和代码,以促进这些方向的进一步研究。
{"title":"Data-Driven Emulation of Mobile Access Networks","authors":"Ali Safari Khatouni, Martino Trevisan, Danilo Giordano","doi":"10.23919/CNSM46954.2019.9012691","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012691","url":null,"abstract":"Network monitoring is fundamental to understand network evolution and behavior. However, monitoring studies have the main limitation of running new experiments when the phenomenon under analysis is over e.g., congestion. To overcome this limitation, network emulation is of vital importance for network testing and research experiments either in wired and mobile networks. When it comes to mobile networks, the variety of technical characteristics, coupled with the opaque network configurations, make realistic network emulation a challenging task.In this paper, we address this issue leveraging a large scale dataset composed of 500M network latency measurements in Mobile BroadBand networks. By using this dataset, we create 51 different network latency profiles based on the Mobile BroadBand operator, the radio access technology and signal strength. These profiles are then processed to make them compatible with the tc-netem emulation tool. Finally, we show that, despite the limitation of current tc-netem emulation tool, Generative Adversarial Networks are a promising solution used to create realistic temporal emulation.We believe that this work could be the first step toward a comprehensive data-driven network emulation. For this, we make our profiles and codes available to foster further studies in these directions.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133373464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Are There Bots even in FIFA World Cup 2018 Tweets? 2018年世界杯推特上有机器人吗?
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012743
Moath Bagarish, Riyad Alshammari, A. N. Zincir-Heywood
Social media is an important communication medium in these days. Twitter is famous as microblogging service. It has been reported that social bots have been used in Twitter widely. In this research, we aim to understand whether bots are selective in the topics they participate or not. To this end, we explore tweets on FIFA World Cup. Our analysis indicate that there are bot activities even in tweets related to soccer (football) events but not just political topics.
社交媒体是当今重要的沟通媒介。Twitter是著名的微博服务。据报道,社交机器人在推特上被广泛使用。在这项研究中,我们的目标是了解机器人是否对他们参与的主题有选择性。为此,我们研究了有关FIFA世界杯的推文。我们的分析表明,即使在推特上也有与足球(足球)事件相关的活动,而不仅仅是政治话题。
{"title":"Are There Bots even in FIFA World Cup 2018 Tweets?","authors":"Moath Bagarish, Riyad Alshammari, A. N. Zincir-Heywood","doi":"10.23919/CNSM46954.2019.9012743","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012743","url":null,"abstract":"Social media is an important communication medium in these days. Twitter is famous as microblogging service. It has been reported that social bots have been used in Twitter widely. In this research, we aim to understand whether bots are selective in the topics they participate or not. To this end, we explore tweets on FIFA World Cup. Our analysis indicate that there are bot activities even in tweets related to soccer (football) events but not just political topics.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133385797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Emergency Flow Prioritization in SDN Networks 启用SDN网络的应急流优先级
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012696
Jerico Moeyersons, Behrooz Farkiani, Bahador Bakhshi, S. A. MirHassani, T. Wauters, B. Volckaert, F. Turck
Emergency services must be able to transfer data with high priority over different networks. With 5G, slicing concepts at mobile network connections are introduced, allowing operators to divide portions of their network for specific use cases. In addition, Software-Defined Networking (SDN) principles allow to assign different Quality-of-Service (QoS) levels to different network slices.This paper proposes an SDN-based solution, executable both offline and online, that guarantees the required bandwidth for the emergency flows and maximizes the best-effort flows over the remaining bandwidth based on their priority. The offline model allows to optimize the problem for a batch of flow requests, but is computationally expensive, especially the variant where flows can be split up over parallel paths. For practical, dynamic situations, an online approach is proposed that periodically recalculates the optimal solution for all requested flows, while using shortest path routing and a greedy heuristic for bandwidth allocation for the intermediate flows.Afterwards, the offline approaches are evaluated through simulations while the online approach is validated through physical experiments with SDN switches, both in a scenario with 500 best-effort and 50 emergency flows. The results show that the offline algorithm is able to guarantee the resource allocation for the emergency flows while optimizing the best-effort flows with a sub-second execution time. As a proof-of-concept, a physical setup with Zodiac switches effectively validates the feasibility of the online approach in a realistic setup.
紧急服务必须能够在不同的网络上以高优先级传输数据。5G引入了移动网络连接的切片概念,允许运营商为特定用例划分部分网络。此外,软件定义网络(SDN)原则允许为不同的网络切片分配不同的服务质量(QoS)级别。本文提出了一种基于sdn的解决方案,该方案在离线和在线上都可执行,它保证了应急流所需的带宽,并根据其优先级在剩余带宽上最大化了最佳努力流。离线模型允许针对一批流请求优化问题,但是计算成本很高,特别是流可以在并行路径上分割的变体。对于实际的动态情况,提出了一种在线方法,周期性地重新计算所有请求流的最优解,同时使用最短路径路由和贪婪启发式算法对中间流进行带宽分配。然后,通过模拟评估离线方法,同时通过SDN交换机的物理实验验证在线方法,这两种方法都是在500个最佳努力和50个应急流的场景中进行的。结果表明,离线算法能够保证应急流的资源分配,同时以亚秒级的执行时间优化最佳努力流。作为概念验证,带有Zodiac交换机的物理设置有效地验证了在线方法在现实设置中的可行性。
{"title":"Enabling Emergency Flow Prioritization in SDN Networks","authors":"Jerico Moeyersons, Behrooz Farkiani, Bahador Bakhshi, S. A. MirHassani, T. Wauters, B. Volckaert, F. Turck","doi":"10.23919/CNSM46954.2019.9012696","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012696","url":null,"abstract":"Emergency services must be able to transfer data with high priority over different networks. With 5G, slicing concepts at mobile network connections are introduced, allowing operators to divide portions of their network for specific use cases. In addition, Software-Defined Networking (SDN) principles allow to assign different Quality-of-Service (QoS) levels to different network slices.This paper proposes an SDN-based solution, executable both offline and online, that guarantees the required bandwidth for the emergency flows and maximizes the best-effort flows over the remaining bandwidth based on their priority. The offline model allows to optimize the problem for a batch of flow requests, but is computationally expensive, especially the variant where flows can be split up over parallel paths. For practical, dynamic situations, an online approach is proposed that periodically recalculates the optimal solution for all requested flows, while using shortest path routing and a greedy heuristic for bandwidth allocation for the intermediate flows.Afterwards, the offline approaches are evaluated through simulations while the online approach is validated through physical experiments with SDN switches, both in a scenario with 500 best-effort and 50 emergency flows. The results show that the offline algorithm is able to guarantee the resource allocation for the emergency flows while optimizing the best-effort flows with a sub-second execution time. As a proof-of-concept, a physical setup with Zodiac switches effectively validates the feasibility of the online approach in a realistic setup.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132522808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards a Unified Network Slicing Model 一个统一的网络切片模型
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012745
Mohammed Chahbar, G. Diaz, Abdulhalim Dandoush
Network Slicing (NS) is actually an ongoing standardization work, different visions and inconsistent use of terminologies are observed across Standard Developing Organizations (SDOs). In this paper, we aim at presenting and comparing most well known works about NS information models. The target is to combine major contributions from different SDOs and come out with a proposition of a unified NS model. The proposed NS model components and the way they relate to each other are then mapped to the end-to-end Management and Orchestration (MANO) reference architecture.
网络切片(NS)实际上是一项正在进行的标准化工作,在标准开发组织(sdo)中可以观察到不同的愿景和不一致的术语使用。在本文中,我们的目的是介绍和比较最著名的NS信息模型的著作。目标是将不同sdo的主要贡献结合起来,提出统一的NS模型。然后,建议的NS模型组件及其相互关联的方式被映射到端到端的管理和编排(MANO)参考体系结构。
{"title":"Towards a Unified Network Slicing Model","authors":"Mohammed Chahbar, G. Diaz, Abdulhalim Dandoush","doi":"10.23919/CNSM46954.2019.9012745","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012745","url":null,"abstract":"Network Slicing (NS) is actually an ongoing standardization work, different visions and inconsistent use of terminologies are observed across Standard Developing Organizations (SDOs). In this paper, we aim at presenting and comparing most well known works about NS information models. The target is to combine major contributions from different SDOs and come out with a proposition of a unified NS model. The proposed NS model components and the way they relate to each other are then mapped to the end-to-end Management and Orchestration (MANO) reference architecture.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130027125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Exploring NAT Detection and Host Identification Using Machine Learning 利用机器学习探索NAT检测和主机识别
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012684
Ali Safari Khatouni, Lan Zhang, K. Aziz, Ibrahim Zincir, Nur Zincir-Heywood
The usage of Network Address Translation (NAT) devices is common among end users, organizations, and Internet Service Providers. NAT provides anonymity for users within an organization by replacing their internal IP addresses with a single external wide area network address. While such anonymity provides an added measure of security for legitimate users, it can also be taken advantage of by malicious users hiding behind NAT devices. Thus, identifying NAT devices and hosts behind them is essential to detect malicious behaviors in traffic and application usage. In this paper, we propose a machine learning based solution to detect hosts behind NAT devices by using flow level statistics (excluding IP addresses, port numbers, and application layer information) from passive traffic measurements. We capture a large dataset and perform an extensive evaluation of our proposed approach with four existing approaches from the literature. Our results show that the proposed approach could identify NAT behaviors and hosts not only with higher accuracy but also demonstrates the impact of parameter sensitivity of the proposed approach.
NAT (Network Address Translation)设备的使用在最终用户、组织和Internet服务提供商中非常普遍。NAT通过将用户的内部IP地址替换为单个外部广域网地址,为组织内的用户提供匿名性。虽然这种匿名性为合法用户提供了额外的安全措施,但隐藏在NAT设备后面的恶意用户也可以利用它。因此,识别NAT设备及其背后的主机对于检测流量和应用程序使用中的恶意行为至关重要。在本文中,我们提出了一种基于机器学习的解决方案,通过使用被动流量测量中的流量级别统计(不包括IP地址、端口号和应用层信息)来检测NAT设备背后的主机。我们获取了一个大型数据集,并使用文献中的四种现有方法对我们提出的方法进行了广泛的评估。结果表明,该方法不仅能够以较高的精度识别NAT行为和主机,而且还验证了该方法参数敏感性的影响。
{"title":"Exploring NAT Detection and Host Identification Using Machine Learning","authors":"Ali Safari Khatouni, Lan Zhang, K. Aziz, Ibrahim Zincir, Nur Zincir-Heywood","doi":"10.23919/CNSM46954.2019.9012684","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012684","url":null,"abstract":"The usage of Network Address Translation (NAT) devices is common among end users, organizations, and Internet Service Providers. NAT provides anonymity for users within an organization by replacing their internal IP addresses with a single external wide area network address. While such anonymity provides an added measure of security for legitimate users, it can also be taken advantage of by malicious users hiding behind NAT devices. Thus, identifying NAT devices and hosts behind them is essential to detect malicious behaviors in traffic and application usage. In this paper, we propose a machine learning based solution to detect hosts behind NAT devices by using flow level statistics (excluding IP addresses, port numbers, and application layer information) from passive traffic measurements. We capture a large dataset and perform an extensive evaluation of our proposed approach with four existing approaches from the literature. Our results show that the proposed approach could identify NAT behaviors and hosts not only with higher accuracy but also demonstrates the impact of parameter sensitivity of the proposed approach.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114315759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Trace-based Behaviour Analysis of Network Servers 基于跟踪的网络服务器行为分析
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012750
Nik Sultana, A. Rao, Zihao Jin, Pardis Pashakhanloo, Henry Zhu, V. Yegneswaran, B. T. Loo
Analysing software and networks can be done using established tools, such as debuggers and packet analysers, but using established tools to analyse network software is difficult and impractical because of the sheer detail the tools present and the performance overheads they typically impose. This makes it difficult to precisely diagnose performance anomalies in network software to identify their causes (is it a DoS attack or a bug?) and determine what needs to be fixed.We present Flowdar: a practical tool for analysing software traces to produce intuitive summaries of network software behaviour by abstracting unimportant details and demultiplexing traces into different sessions’ subtraces. Flowdar can use existing state-of-the-art tracing tools for lower overhead during trace gathering for offline analysis. Using Flowdar we can drill down when diagnosing performance anomalies without getting overwhelmed in detail or burdening the system being observed.We show that Flowdar can be applied to existing real-world software and can digest complex behaviour into an intuitive visualisation.
分析软件和网络可以使用现有的工具来完成,比如调试器和数据包分析器,但是使用现有的工具来分析网络软件是困难和不切实际的,因为这些工具提供了非常详细的细节,而且它们通常会带来性能开销。这使得精确诊断网络软件中的性能异常以确定其原因(是DoS攻击还是错误?)并确定需要修复的内容变得困难。我们提出Flowdar:一个实用的工具,用于分析软件痕迹,通过抽象不重要的细节和解复用痕迹到不同会话的子痕迹来产生网络软件行为的直观摘要。Flowdar可以使用现有的最先进的跟踪工具,在离线分析的跟踪收集过程中降低开销。使用Flowdar,我们可以在诊断性能异常时进行深入研究,而不会被细节淹没,也不会给观察到的系统增加负担。我们证明Flowdar可以应用于现有的现实世界软件,并可以将复杂的行为消化成直观的可视化。
{"title":"Trace-based Behaviour Analysis of Network Servers","authors":"Nik Sultana, A. Rao, Zihao Jin, Pardis Pashakhanloo, Henry Zhu, V. Yegneswaran, B. T. Loo","doi":"10.23919/CNSM46954.2019.9012750","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012750","url":null,"abstract":"Analysing software and networks can be done using established tools, such as debuggers and packet analysers, but using established tools to analyse network software is difficult and impractical because of the sheer detail the tools present and the performance overheads they typically impose. This makes it difficult to precisely diagnose performance anomalies in network software to identify their causes (is it a DoS attack or a bug?) and determine what needs to be fixed.We present Flowdar: a practical tool for analysing software traces to produce intuitive summaries of network software behaviour by abstracting unimportant details and demultiplexing traces into different sessions’ subtraces. Flowdar can use existing state-of-the-art tracing tools for lower overhead during trace gathering for offline analysis. Using Flowdar we can drill down when diagnosing performance anomalies without getting overwhelmed in detail or burdening the system being observed.We show that Flowdar can be applied to existing real-world software and can digest complex behaviour into an intuitive visualisation.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133196376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BANQUET: Balancing Quality of Experience and Traffic Volume in Adaptive Video Streaming 宴会:在自适应视频流中平衡体验质量和流量
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012685
Takuto Kimura, Tatsuaki Kimura, A. Matsumoto, J. Okamoto
Bitrate-selection algorithms are key to improving the quality of experience (QoE) of adaptive video streaming. Although current bitrate selection algorithms maximize the QoE, video consumers are concerned with QoE and traffic-volume usage due to the pay-per-use or data-capped plans. To balance between the QoE and traffic volume, some commercial video-streaming services enable users to set the upper limit of the selectable bitrate. However, it is difficult for users to set an appropriate limit to obtain sufficient QoE. We propose BANQUET, a novel bitrate-selection algorithm that enables users to control intuitively the balance between the QoE and traffic volume. Assuming a user-set target QoE as a balancing parameter, BANQUET selects the bitrate that minimizes the traffic volume while maintaining the estimated mean opinion score (MOS) above the target QoE. BANQUET calculates the appropriate bitrate based on estimations of the throughput and butter transition. A trace-based simulation shows that BANQUET reduces the traffic volume by up to 47.0% compared to a baseline while maintaining the same average estimated MOS.
比特率选择算法是提高自适应视频流体验质量的关键。尽管当前的比特率选择算法最大化了QoE,但由于按次付费或数据上限计划,视频消费者关心的是QoE和流量使用量。为了平衡qos和流量,一些商业视频流业务允许用户设置可选择比特率的上限。然而,用户很难设定一个适当的限制来获得足够的QoE。我们提出了一种新的比特率选择算法BANQUET,使用户能够直观地控制QoE和流量之间的平衡。假设用户设置的目标QoE作为平衡参数,BANQUET选择在保持估计的平均意见评分(MOS)高于目标QoE的情况下最小化流量的比特率。BANQUET根据吞吐量和黄油转换的估计计算适当的比特率。基于跟踪的模拟表明,与基线相比,BANQUET在保持相同的平均估计MOS的同时,将通信量减少了高达47.0%。
{"title":"BANQUET: Balancing Quality of Experience and Traffic Volume in Adaptive Video Streaming","authors":"Takuto Kimura, Tatsuaki Kimura, A. Matsumoto, J. Okamoto","doi":"10.23919/CNSM46954.2019.9012685","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012685","url":null,"abstract":"Bitrate-selection algorithms are key to improving the quality of experience (QoE) of adaptive video streaming. Although current bitrate selection algorithms maximize the QoE, video consumers are concerned with QoE and traffic-volume usage due to the pay-per-use or data-capped plans. To balance between the QoE and traffic volume, some commercial video-streaming services enable users to set the upper limit of the selectable bitrate. However, it is difficult for users to set an appropriate limit to obtain sufficient QoE. We propose BANQUET, a novel bitrate-selection algorithm that enables users to control intuitively the balance between the QoE and traffic volume. Assuming a user-set target QoE as a balancing parameter, BANQUET selects the bitrate that minimizes the traffic volume while maintaining the estimated mean opinion score (MOS) above the target QoE. BANQUET calculates the appropriate bitrate based on estimations of the throughput and butter transition. A trace-based simulation shows that BANQUET reduces the traffic volume by up to 47.0% compared to a baseline while maintaining the same average estimated MOS.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121377902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2019 15th International Conference on Network and Service Management (CNSM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1