首页 > 最新文献

2019 15th International Conference on Network and Service Management (CNSM)最新文献

英文 中文
Janus - A Software-Defined Networking MPEG-DASH Video Streaming Load Balancer Janus -软件定义网络MPEG-DASH视频流负载均衡器
Pub Date : 2019-10-01 DOI: 10.23919/cnsm46954.2019.9012670
Edenilson Jônatas dos Passos, Adriano Fiorese
Recently, with popularisation of video streaming service, new video distribution technologies have been created. Currently, one of the most promising ones is the Moving Picture Expert Group Dynamic Adaptive Streaming over HTTP or MPEG-DASH. Even so, with the limitation of the TCP/IP network structure, the end user Quality of Experience (QoE) may be affected. One issue that can affect user QoE is the workload of content distribution servers. Thus, the unbalancing of server’s workload comprising user’s attendance can lead to a content server provider non optimised choice. This work presents two load-balancing solutions between MPEG-DASH video servers based on Software-Defined Networks, using as a balancing workload metric the throughput of the content server as well as the CPU load.
近年来,随着视频流媒体服务的普及,新的视频分发技术应运而生。目前,最有前途的技术之一是基于HTTP或MPEG-DASH的动态自适应流媒体技术。尽管如此,由于TCP/IP网络结构的限制,最终用户的体验质量(QoE)可能会受到影响。影响用户QoE的一个问题是内容分发服务器的工作负载。因此,包含用户出勤的服务器工作负载的不平衡可能导致内容服务器提供者的非优化选择。这项工作提出了基于软件定义网络的MPEG-DASH视频服务器之间的两种负载平衡解决方案,使用内容服务器的吞吐量和CPU负载作为平衡工作负载的度量。
{"title":"Janus - A Software-Defined Networking MPEG-DASH Video Streaming Load Balancer","authors":"Edenilson Jônatas dos Passos, Adriano Fiorese","doi":"10.23919/cnsm46954.2019.9012670","DOIUrl":"https://doi.org/10.23919/cnsm46954.2019.9012670","url":null,"abstract":"Recently, with popularisation of video streaming service, new video distribution technologies have been created. Currently, one of the most promising ones is the Moving Picture Expert Group Dynamic Adaptive Streaming over HTTP or MPEG-DASH. Even so, with the limitation of the TCP/IP network structure, the end user Quality of Experience (QoE) may be affected. One issue that can affect user QoE is the workload of content distribution servers. Thus, the unbalancing of server’s workload comprising user’s attendance can lead to a content server provider non optimised choice. This work presents two load-balancing solutions between MPEG-DASH video servers based on Software-Defined Networks, using as a balancing workload metric the throughput of the content server as well as the CPU load.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130159542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DBvLEA: A Demand-Based Approach to Virtual Link Mapping for Multi-Service Industrial Applications DBvLEA:一种基于需求的多服务工业应用虚拟链路映射方法
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012682
A. Frimpong, H. Meer
Network virtualization is proposed in several research work as a means to overcome the ossification of the Internet. Its application relies on embedding algorithms to instantiate virtual networks on substrate infrastructures. Notably, those considered in the scope of traffic-engineering are developed to focus on efficient resource utilization with the aim of increasing the acceptance ratio of the algorithms. In this paper, a demand-based virtual link embedding approach for multi-service mapping in programmable industrial networks is proposed. The approach aims at increasing the overall acceptance ratio of virtual link embedding algorithms by increasing the acceptance of demand critical requests. The goal is achieved by minimizing the deviation between requested demands and the resources satisfying the demand. The approach, when analyzed against state-of-the-art shortest path approaches under the same simulation conditions, shows good results in terms of utilization of the network resources, acceptance of delay-critical traffic demands and overall acceptance ratio.
网络虚拟化作为克服互联网僵化的一种手段,在一些研究工作中被提出。它的应用依赖于嵌入算法在底层基础设施上实例化虚拟网络。值得注意的是,那些在交通工程范围内考虑的是关注有效的资源利用,目的是提高算法的接受率。提出了一种基于需求的可编程工业网络多业务映射虚拟链路嵌入方法。该方法旨在通过增加需求关键请求的接受度来提高虚拟链路嵌入算法的整体接受率。通过最小化所请求的需求与满足需求的资源之间的偏差来实现目标。将该方法与相同仿真条件下最先进的最短路径方法进行对比分析,在网络资源利用率、延迟关键流量需求接受度和总体接受率方面均取得了较好的效果。
{"title":"DBvLEA: A Demand-Based Approach to Virtual Link Mapping for Multi-Service Industrial Applications","authors":"A. Frimpong, H. Meer","doi":"10.23919/CNSM46954.2019.9012682","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012682","url":null,"abstract":"Network virtualization is proposed in several research work as a means to overcome the ossification of the Internet. Its application relies on embedding algorithms to instantiate virtual networks on substrate infrastructures. Notably, those considered in the scope of traffic-engineering are developed to focus on efficient resource utilization with the aim of increasing the acceptance ratio of the algorithms. In this paper, a demand-based virtual link embedding approach for multi-service mapping in programmable industrial networks is proposed. The approach aims at increasing the overall acceptance ratio of virtual link embedding algorithms by increasing the acceptance of demand critical requests. The goal is achieved by minimizing the deviation between requested demands and the resources satisfying the demand. The approach, when analyzed against state-of-the-art shortest path approaches under the same simulation conditions, shows good results in terms of utilization of the network resources, acceptance of delay-critical traffic demands and overall acceptance ratio.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134482990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SACO: A Service Chain Aware SDN Controller-Switch Mapping Framework 中美合作所:一个支持服务链的SDN控制器-交换机映射框架
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012747
Duong Tuan Nguyen, Chuan Pham, K. Nguyen, M. Cheriet
The emerging paradigm of Software Defined Network (SDN) and virtualization technology promises an efficient solution for network providers to deploy services. Adopting them not only facilitates network management but also helps reduce the cost of maintaining network infrastructure. However, despite these advantages, there are still obstacles that must be overcome before SDN and virtualization can advance to reality in industrial deployments. In this paper, we focus on two well-researched issues, namely controller-switch assignment and Virtual Network Function (VNF) placement. Unlike prior works, our purpose is to jointly solve these two problems, accounting for the complex and counter-intuitive manner they are related to each other. We present a service chain aware framework (SACO) that enables the controller-switch association in a multi-controller network regarding the relationship of switches via their connected VNFs that implement service components of the chain. We also propose a model and formulate the joint optimization problem of dynamic controller-switch mapping and VNF allocation. We apply the Lyapunov optimization framework to transform a long-term optimization problem into a series of real-time problem and employ the Markov approximation method to find a near-optimal solution. Simulation results show that our service chain aware approach improves the system cost up to 10 ~ 43% compared to the state-of-the-art solutions.
软件定义网络(SDN)和虚拟化技术的新兴范例为网络提供商部署服务提供了一个有效的解决方案。采用它们不仅可以方便网络管理,还可以降低维护网络基础设施的成本。然而,尽管有这些优势,在SDN和虚拟化在工业部署中成为现实之前,仍然有一些必须克服的障碍。在本文中,我们重点研究了两个已被广泛研究的问题,即控制器-交换机分配和虚拟网络功能(VNF)的放置。与之前的作品不同,我们的目的是共同解决这两个问题,考虑到它们相互关联的复杂和反直觉的方式。我们提出了一个服务链感知框架(SACO),它使控制器-交换机关联在多控制器网络中,通过它们连接的VNFs实现了链的服务组件。提出了动态控制器-开关映射和VNF分配的联合优化问题模型。我们应用Lyapunov优化框架将一个长期优化问题转化为一系列实时问题,并采用马尔可夫近似方法寻找近最优解。仿真结果表明,与现有解决方案相比,我们的服务链感知方法可将系统成本提高10 ~ 43%。
{"title":"SACO: A Service Chain Aware SDN Controller-Switch Mapping Framework","authors":"Duong Tuan Nguyen, Chuan Pham, K. Nguyen, M. Cheriet","doi":"10.23919/CNSM46954.2019.9012747","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012747","url":null,"abstract":"The emerging paradigm of Software Defined Network (SDN) and virtualization technology promises an efficient solution for network providers to deploy services. Adopting them not only facilitates network management but also helps reduce the cost of maintaining network infrastructure. However, despite these advantages, there are still obstacles that must be overcome before SDN and virtualization can advance to reality in industrial deployments. In this paper, we focus on two well-researched issues, namely controller-switch assignment and Virtual Network Function (VNF) placement. Unlike prior works, our purpose is to jointly solve these two problems, accounting for the complex and counter-intuitive manner they are related to each other. We present a service chain aware framework (SACO) that enables the controller-switch association in a multi-controller network regarding the relationship of switches via their connected VNFs that implement service components of the chain. We also propose a model and formulate the joint optimization problem of dynamic controller-switch mapping and VNF allocation. We apply the Lyapunov optimization framework to transform a long-term optimization problem into a series of real-time problem and employ the Markov approximation method to find a near-optimal solution. Simulation results show that our service chain aware approach improves the system cost up to 10 ~ 43% compared to the state-of-the-art solutions.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"48 5 Suppl 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128209345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experimental Estimation of LTE-A Performance LTE-A性能的实验估计
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012663
Imane Oussakel, P. Owezarski, Pascal Berthou
In cellular networks, the emergence of machine communications such as connected vehicles increases the high demand of uplink transmissions, thus, degrading the quality of service per user equipment. Enforcing quality-of-service in such cellular network is challenging, as radio phenomena, as well as user (and their devices) mobility and dynamics, are uncontrolled. To solve this issue, estimating what the quality of transmissions will be in a short future for a connected user is essential. For that purpose, we argue that lower layer metrics are a key feature whose evolution can help predict the bandwidth that the considered connections can take advantage of in the following hundreds of milliseconds. The paper then describes how a 4G testbed has been deployed in order to investigate throughput prediction in uplink transmissions at a small time granularity of 100 ms. Based on lower layer metrics (physical and mac layers), the main supervised machine learning algorithms are used, such as Linear Regressor and Random Forest to predict the uplink received bandwidth in different radio phenomena environment. Hence, a deep investigation of the impact of radio issues on bandwidth prediction is conducted. Further, our evaluation shows that the prediction is highly accurate: at the time granularity of 100 ms, the average prediction error is in the range of 6% to 12% for all the scenarios we explored.
在蜂窝网络中,机器通信(如联网车辆)的出现增加了对上行传输的高需求,从而降低了每个用户设备的服务质量。在这种蜂窝网络中加强服务质量是具有挑战性的,因为无线电现象以及用户(及其设备)的移动性和动态是不受控制的。为了解决这个问题,估计一个连接用户在不久的将来的传输质量是至关重要的。为此,我们认为较低层指标是一个关键特性,它的演变可以帮助预测所考虑的连接在接下来的数百毫秒内可以利用的带宽。然后,本文描述了如何部署4G测试平台,以便在100ms的小时间粒度下研究上行传输的吞吐量预测。基于底层指标(物理层和mac层),使用线性回归和随机森林等主要的监督机器学习算法来预测不同无线电现象环境下的上行链路接收带宽。因此,对无线电问题对带宽预测的影响进行了深入研究。此外,我们的评估表明预测非常准确:在100 ms的时间粒度下,我们探索的所有场景的平均预测误差在6%到12%的范围内。
{"title":"Experimental Estimation of LTE-A Performance","authors":"Imane Oussakel, P. Owezarski, Pascal Berthou","doi":"10.23919/CNSM46954.2019.9012663","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012663","url":null,"abstract":"In cellular networks, the emergence of machine communications such as connected vehicles increases the high demand of uplink transmissions, thus, degrading the quality of service per user equipment. Enforcing quality-of-service in such cellular network is challenging, as radio phenomena, as well as user (and their devices) mobility and dynamics, are uncontrolled. To solve this issue, estimating what the quality of transmissions will be in a short future for a connected user is essential. For that purpose, we argue that lower layer metrics are a key feature whose evolution can help predict the bandwidth that the considered connections can take advantage of in the following hundreds of milliseconds. The paper then describes how a 4G testbed has been deployed in order to investigate throughput prediction in uplink transmissions at a small time granularity of 100 ms. Based on lower layer metrics (physical and mac layers), the main supervised machine learning algorithms are used, such as Linear Regressor and Random Forest to predict the uplink received bandwidth in different radio phenomena environment. Hence, a deep investigation of the impact of radio issues on bandwidth prediction is conducted. Further, our evaluation shows that the prediction is highly accurate: at the time granularity of 100 ms, the average prediction error is in the range of 6% to 12% for all the scenarios we explored.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133881176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Access Control Implementation Targeting Resource-constrained Environments 针对资源受限环境的访问控制实现
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012689
Fan Zhang, B. Butler, B. Jennings
As more and more services are deployed on devices near the network edge, security operations (such as authentication and authorization) need to move with them. Typically, edge devices have fewer resources than data center servers and so the security operations need to make more efficient use of what is available while offering adequate performance. Authorization adds latency and requires system resources, but the need for security management with strong authorization at the network edge is growing. We have released the first open source, high-performance, resource-efficient, XACML3 standard-compatible Policy Decision Point (PDP) called Luas (means “speed’' in the Irish language) based on an event-driven architecture and a non-blocking computational model, using a Bloom Filter for better performance. We compared its performance, resource usage and reliability against existing open source PDPs. Like those we tested, it provides accurate decisions, but Luas offers much faster security policy evaluation while using fewer system resources, and provides responses in a reasonable timeframe even when resources are scarce.
随着越来越多的业务部署在靠近网络边缘的设备上,安全操作(如身份验证和授权)也需要随之移动。通常,边缘设备比数据中心服务器拥有更少的资源,因此安全操作需要更有效地利用可用资源,同时提供足够的性能。授权增加了延迟并需要系统资源,但在网络边缘对具有强授权的安全管理的需求正在增长。我们发布了第一个开源的、高性能的、资源高效的、与XACML3标准兼容的策略决策点(PDP),名为Luas(在爱尔兰语中是“速度”的意思),它基于事件驱动的架构和非阻塞计算模型,使用Bloom Filter来获得更好的性能。我们将其性能、资源使用和可靠性与现有的开源pdp进行了比较。与我们测试的那些一样,它提供了准确的决策,但是Luas在使用更少的系统资源的同时提供了更快的安全策略评估,并且即使在资源稀缺的情况下也能在合理的时间范围内提供响应。
{"title":"An Access Control Implementation Targeting Resource-constrained Environments","authors":"Fan Zhang, B. Butler, B. Jennings","doi":"10.23919/CNSM46954.2019.9012689","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012689","url":null,"abstract":"As more and more services are deployed on devices near the network edge, security operations (such as authentication and authorization) need to move with them. Typically, edge devices have fewer resources than data center servers and so the security operations need to make more efficient use of what is available while offering adequate performance. Authorization adds latency and requires system resources, but the need for security management with strong authorization at the network edge is growing. We have released the first open source, high-performance, resource-efficient, XACML3 standard-compatible Policy Decision Point (PDP) called Luas (means “speed’' in the Irish language) based on an event-driven architecture and a non-blocking computational model, using a Bloom Filter for better performance. We compared its performance, resource usage and reliability against existing open source PDPs. Like those we tested, it provides accurate decisions, but Luas offers much faster security policy evaluation while using fewer system resources, and provides responses in a reasonable timeframe even when resources are scarce.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115498787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Feature Normalization and Temporal Information for Machine Learning Based Insider Threat Detection 探索基于机器学习的内部威胁检测的特征归一化和时间信息
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012708
Pedro Ferreira, Duc C. Le, N. Zincir-Heywood
Insider threat is one of the most damaging cyber security attacks to companies and organizations. In this paper, we explore different techniques to leverage spatial and temporal characteristics of user behaviours for insider threat detection. In particular, feature normalization (scaling) techniques and a scheme for representing explicit temporal information are explored to improve the performance of the machine learning based insider threat detection. The results show that these data characteristics have different effects on different classifiers, where Standard Scaler with Random Forest classifier produces the best performance.
内部威胁是对公司和组织最具破坏性的网络安全攻击之一。在本文中,我们探索了利用用户行为的空间和时间特征进行内部威胁检测的不同技术。特别是,研究了特征归一化(缩放)技术和表示显式时间信息的方案,以提高基于机器学习的内部威胁检测的性能。结果表明,这些数据特征对不同的分类器有不同的影响,其中标准尺度器与随机森林分类器的性能最好。
{"title":"Exploring Feature Normalization and Temporal Information for Machine Learning Based Insider Threat Detection","authors":"Pedro Ferreira, Duc C. Le, N. Zincir-Heywood","doi":"10.23919/CNSM46954.2019.9012708","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012708","url":null,"abstract":"Insider threat is one of the most damaging cyber security attacks to companies and organizations. In this paper, we explore different techniques to leverage spatial and temporal characteristics of user behaviours for insider threat detection. In particular, feature normalization (scaling) techniques and a scheme for representing explicit temporal information are explored to improve the performance of the machine learning based insider threat detection. The results show that these data characteristics have different effects on different classifiers, where Standard Scaler with Random Forest classifier produces the best performance.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129019350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
WASPP: Workflow Automation for Security Policy Procedures 安全策略过程的工作流自动化
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012707
Ren Quinn, Nico Holguin, Ben Poster, Corey Roach, J. V. D. Merwe
Every day, university networks are bombarded with attempts to steal the sensitive data of the various disparate domains and organizations they serve. For this reason, universities form teams of information security specialists called a Security Operations Center (SOC) to manage the complex operations involved in monitoring and mitigating such attacks. When a suspicious event is identified, members of the SOC are tasked to understand the nature of the event in order to respond to any damage the attack might have caused. This process is defined by administrative policies which are often very high-level and rarely systematically defined. This impedes the implementation of generalized and automated event response solutions, leading to specific ad hoc solutions based primarily on human intuition and experience as well as immediate administrative priorities. These solutions are often fragile, highly specific, and more difficult to reuse in other scenarios.
每一天,大学网络都被试图窃取他们所服务的不同领域和组织的敏感数据的企图轰炸。出于这个原因,大学组建了信息安全专家团队,称为安全运营中心(SOC),以管理监控和减轻此类攻击所涉及的复杂操作。当发现可疑事件时,SOC成员的任务是了解事件的性质,以便对攻击可能造成的任何损害做出反应。这个过程是由行政政策定义的,这些政策通常是非常高层的,很少有系统地定义。这阻碍了一般化和自动化事件响应解决方案的实现,导致了主要基于人类直觉和经验以及直接管理优先级的特定的临时解决方案。这些解决方案通常是脆弱的、高度特定的,并且更难以在其他场景中重用。
{"title":"WASPP: Workflow Automation for Security Policy Procedures","authors":"Ren Quinn, Nico Holguin, Ben Poster, Corey Roach, J. V. D. Merwe","doi":"10.23919/CNSM46954.2019.9012707","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012707","url":null,"abstract":"Every day, university networks are bombarded with attempts to steal the sensitive data of the various disparate domains and organizations they serve. For this reason, universities form teams of information security specialists called a Security Operations Center (SOC) to manage the complex operations involved in monitoring and mitigating such attacks. When a suspicious event is identified, members of the SOC are tasked to understand the nature of the event in order to respond to any damage the attack might have caused. This process is defined by administrative policies which are often very high-level and rarely systematically defined. This impedes the implementation of generalized and automated event response solutions, leading to specific ad hoc solutions based primarily on human intuition and experience as well as immediate administrative priorities. These solutions are often fragile, highly specific, and more difficult to reuse in other scenarios.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130332407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reinforcement Learning Based Approach for 5G Network Slicing Across Multiple Domains 基于强化学习的5G多域网络切片方法
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012674
Godfrey Kibalya, J. Serrat, J. Gorricho, R. Pasquini, Haipeng Yao, Peiying Zhang
Network Function Virtualization (NFV) and Machine Learning (ML) are envisioned as possible techniques for the realization of a flexible and adaptive 5G network. ML will provide the network with experiential intelligence to forecast, adapt and recover from temporal network fluctuations. On the other hand, NFV will enable the deployment of slice instances meeting specific service requirements. Moreover, a single slice instance may require to be deployed across multiple substrate networks; however, existing works on multi-substrate Virtual Network Embedding fall short on addressing the realistic slice constraints such as delay, location, etc., hence they are not suited for applications transcending multiple domains. In this paper, we address the multi-substrate slicing problem in a coordinated manner, and we propose a Reinforcement Learning (RL) algorithm for partitioning the slice request to the different candidate substrate networks. Moreover, we consider realistic slice constraints such as delay, location, etc. Simulation results show that the RL approach results into a performance comparable to the combinatorial solution, with more than 99% of time saving for the processing of each request.
网络功能虚拟化(NFV)和机器学习(ML)被设想为实现灵活和自适应5G网络的可能技术。机器学习将为网络提供经验智能,以预测、适应和从时间网络波动中恢复。另一方面,NFV将支持满足特定服务需求的片实例的部署。此外,单个切片实例可能需要部署在多个基板网络上;然而,现有的多基板虚拟网络嵌入工作在解决诸如延迟、位置等现实切片约束方面存在不足,因此它们不适合跨多域应用。在本文中,我们以协调的方式解决了多基板切片问题,并提出了一种强化学习(RL)算法,用于将切片请求划分到不同的候选基板网络。此外,我们还考虑了实际的切片约束,如延迟、位置等。仿真结果表明,RL方法的性能可与组合解决方案相媲美,每个请求的处理时间节省99%以上。
{"title":"A Reinforcement Learning Based Approach for 5G Network Slicing Across Multiple Domains","authors":"Godfrey Kibalya, J. Serrat, J. Gorricho, R. Pasquini, Haipeng Yao, Peiying Zhang","doi":"10.23919/CNSM46954.2019.9012674","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012674","url":null,"abstract":"Network Function Virtualization (NFV) and Machine Learning (ML) are envisioned as possible techniques for the realization of a flexible and adaptive 5G network. ML will provide the network with experiential intelligence to forecast, adapt and recover from temporal network fluctuations. On the other hand, NFV will enable the deployment of slice instances meeting specific service requirements. Moreover, a single slice instance may require to be deployed across multiple substrate networks; however, existing works on multi-substrate Virtual Network Embedding fall short on addressing the realistic slice constraints such as delay, location, etc., hence they are not suited for applications transcending multiple domains. In this paper, we address the multi-substrate slicing problem in a coordinated manner, and we propose a Reinforcement Learning (RL) algorithm for partitioning the slice request to the different candidate substrate networks. Moreover, we consider realistic slice constraints such as delay, location, etc. Simulation results show that the RL approach results into a performance comparable to the combinatorial solution, with more than 99% of time saving for the processing of each request.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129659784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Analyzing Dynamics of MVNO Market Using Evolutionary Game 基于演化博弈的MVNO市场动态分析
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012751
N. Kamiyama, A. Nakao
In many countries, mobile virtual network operators (MVNOs) provide mobile network services to users by leasing the wireless bandwidth from mobile network operators (MNOs). To attract many users and increase the number of subscribers, some MVNOs introduce the strategy called zero rating (ZR) which exempts traffic of specific content providers (CPs) from usage-based charging. The ZR differentiates traffic of specific CPs from that of other CPs, so the ZR violates the principle of network neutrality, and the ZR is prohibited in some countries. However, to clarify the desirable rules against the ZR, we need to analyze its impact on end users. In this paper, we investigate the charging strategy of ZR MVNOs by analyzing the price plans of major MVNOs in Japan. Moreover, we model the dynamics of the MVNO market consisting of low-price (LP) MVNOs and ZR MVNOs by the evolutionary game which can model the dynamics of social environment described by strategic distribution. We show that the MVNO market will be monopolized by MVNOs using either strategy, and the monthly fee of users will increase at the steady state. Therefore, we conclude that ZR MVNOs are required to introduce a service plan for users who do not benefit from the ZR.
在许多国家,移动虚拟网络运营商(MVNOs)通过向移动网络运营商(MNOs)租赁无线带宽来向用户提供移动网络服务。为了吸引更多的用户和增加订户数量,一些mvno引入了零费率(ZR)策略,免除特定内容提供商(CPs)的流量按使用情况收费。ZR将特定CPs的流量与其他CPs的流量区分开来,违反了网络中立性原则,在一些国家是被禁止的。然而,为了明确针对ZR的理想规则,我们需要分析它对最终用户的影响。本文通过对日本主要移动运营商价格方案的分析,研究了ZR移动运营商的收费策略。此外,本文还利用演化博弈模型对低价和低价MVNO组成的MVNO市场进行了动态建模,该模型可以模拟由战略分布描述的社会环境动态。结果表明,无论采用哪一种策略,MVNO市场都将被MVNO垄断,且用户的月费在稳定状态下都将增加。因此,我们得出结论,ZR mvno需要为没有从ZR中受益的用户引入服务计划。
{"title":"Analyzing Dynamics of MVNO Market Using Evolutionary Game","authors":"N. Kamiyama, A. Nakao","doi":"10.23919/CNSM46954.2019.9012751","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012751","url":null,"abstract":"In many countries, mobile virtual network operators (MVNOs) provide mobile network services to users by leasing the wireless bandwidth from mobile network operators (MNOs). To attract many users and increase the number of subscribers, some MVNOs introduce the strategy called zero rating (ZR) which exempts traffic of specific content providers (CPs) from usage-based charging. The ZR differentiates traffic of specific CPs from that of other CPs, so the ZR violates the principle of network neutrality, and the ZR is prohibited in some countries. However, to clarify the desirable rules against the ZR, we need to analyze its impact on end users. In this paper, we investigate the charging strategy of ZR MVNOs by analyzing the price plans of major MVNOs in Japan. Moreover, we model the dynamics of the MVNO market consisting of low-price (LP) MVNOs and ZR MVNOs by the evolutionary game which can model the dynamics of social environment described by strategic distribution. We show that the MVNO market will be monopolized by MVNOs using either strategy, and the monthly fee of users will increase at the steady state. Therefore, we conclude that ZR MVNOs are required to introduce a service plan for users who do not benefit from the ZR.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123475823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Machine Learning for Location and Orientation Fingerprinting in MIMO WLANs MIMO无线局域网中位置和方向指纹的机器学习
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012737
Hui Xiong, J. Ilow
To detect the position and the orientation of a mobile device within a Wireless Local Area Network (WLAN) covered by multiple access points (APs), the intrinsic properties of multiple-input multiple-output (MIMO) channels are used linking the received signal strength indicators (RSSIs) to the distance and exploiting the received signal correlation structures. Location and orientation fingerprinting is a map based positioning solution that stores for a given orientation past measurements of RSSIs at known reference/grid points in a database that is later used to localize a mobile device at an unknown location and with unknown orientation to the closest reference point. This paper focuses on processing the RSSI data vectors from multiple receiving antennas on a downlink by applying the core tools of Machine Learning (ML) classification methods to evaluate the effects of MIMO RSSI meta-data when capturing 802.11n/ac packets using commodity hardware. Specifically, the paper provides insights into the design of the overall location fingerprinting system operating with new WiFi physical link layer protocols. To verify the operation of the proposed system, experimental results are presented to investigate the impact of different factors, like the number of receive antennas, affecting the estimation accuracy for the location and the orientation of mobile user.
为了在由多个接入点(ap)覆盖的无线局域网(WLAN)中检测移动设备的位置和方向,使用多输入多输出(MIMO)信道的固有属性将接收到的信号强度指标(rssi)与距离联系起来,并利用接收到的信号相关结构。位置和方向指纹识别是一种基于地图的定位解决方案,它将过去在已知参考/网格点上的rssi测量值存储在数据库中,该数据库稍后用于定位位于未知位置和方向未知的移动设备到最近的参考点。本文着重于通过应用机器学习(ML)分类方法的核心工具来处理下行链路上多个接收天线的RSSI数据向量,以评估使用商用硬件捕获802.11n/ac数据包时MIMO RSSI元数据的效果。具体而言,本文提供了基于新WiFi物理链路层协议的整体位置指纹识别系统的设计见解。为了验证该系统的有效性,给出了实验结果,研究了接收天线数量等不同因素对移动用户位置和方向估计精度的影响。
{"title":"Machine Learning for Location and Orientation Fingerprinting in MIMO WLANs","authors":"Hui Xiong, J. Ilow","doi":"10.23919/CNSM46954.2019.9012737","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012737","url":null,"abstract":"To detect the position and the orientation of a mobile device within a Wireless Local Area Network (WLAN) covered by multiple access points (APs), the intrinsic properties of multiple-input multiple-output (MIMO) channels are used linking the received signal strength indicators (RSSIs) to the distance and exploiting the received signal correlation structures. Location and orientation fingerprinting is a map based positioning solution that stores for a given orientation past measurements of RSSIs at known reference/grid points in a database that is later used to localize a mobile device at an unknown location and with unknown orientation to the closest reference point. This paper focuses on processing the RSSI data vectors from multiple receiving antennas on a downlink by applying the core tools of Machine Learning (ML) classification methods to evaluate the effects of MIMO RSSI meta-data when capturing 802.11n/ac packets using commodity hardware. Specifically, the paper provides insights into the design of the overall location fingerprinting system operating with new WiFi physical link layer protocols. To verify the operation of the proposed system, experimental results are presented to investigate the impact of different factors, like the number of receive antennas, affecting the estimation accuracy for the location and the orientation of mobile user.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127867162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 15th International Conference on Network and Service Management (CNSM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1