首页 > 最新文献

IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications最新文献

英文 中文
Compiling packet forwarding rules for switch pipelined architecture 编写交换机流水线架构的报文转发规则
Salaheddine Hamadi, Khalil Blaiech, Petko Valtchev, O. Cherkaoui, R. State
Openflow is a key step in abstracting network functions by separating the control and the forwarding plane. However, even with continuous innovation and evolution of the protocol, its adoption on forwarding device targets remains laborious and time consuming. In this paper, we present a semantic-based approach to packet forwarding design that tailors flow classification to the underlying switch device. Its key idea consist in streamlining flow classification through rule compiling and thus to optimize forwarding operations and improve switch resources usage. The compiling itself exploits a rule grouping gleaned through Frequent Pattern Mining and Network Calculus in optimizing flow classification w.r.t. the switch pipelined architecture.
Openflow将控制平面和转发平面分离,是实现网络功能抽象的关键步骤。然而,即使该协议不断创新和发展,在转发设备目标上采用它仍然是费力和耗时的。在本文中,我们提出了一种基于语义的数据包转发设计方法,该方法根据底层交换设备定制流分类。其核心思想是通过规则编译简化流量分类,从而优化转发操作,提高交换机资源利用率。编译本身利用通过频繁模式挖掘和网络演算收集的规则分组来优化流分类,而不是切换管道体系结构。
{"title":"Compiling packet forwarding rules for switch pipelined architecture","authors":"Salaheddine Hamadi, Khalil Blaiech, Petko Valtchev, O. Cherkaoui, R. State","doi":"10.1109/INFOCOM.2016.7524421","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524421","url":null,"abstract":"Openflow is a key step in abstracting network functions by separating the control and the forwarding plane. However, even with continuous innovation and evolution of the protocol, its adoption on forwarding device targets remains laborious and time consuming. In this paper, we present a semantic-based approach to packet forwarding design that tailors flow classification to the underlying switch device. Its key idea consist in streamlining flow classification through rule compiling and thus to optimize forwarding operations and improve switch resources usage. The compiling itself exploits a rule grouping gleaned through Frequent Pattern Mining and Network Calculus in optimizing flow classification w.r.t. the switch pipelined architecture.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129327384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cooperative data offloading in opportunistic mobile networks 机会移动网络中的协同数据卸载
Zongqing Lu, Xiao Sun, T. L. Porta
Opportunistic mobile networks consisting of intermittently connected mobile devices have been exploited for various applications, such as computational offloading and mitigating cellular traffic load. Different from existing work, in this paper, we focus on cooperatively offloading data among mobile devices to maximally improve the probability of data delivery from a mobile device to an intermittently connected remote server or data center within a given time constraint, which is referred to as the cooperative offloading problem. Unfortunately, cooperative offloading is NP-hard. To this end, a heuristic algorithm is designed based on the proposed probabilistic framework, which provides the estimation of the probability of successful data delivery over the opportunistic path, considering both data size and contact duration. Due to the lack of global information, a distributed algorithm is further proposed. The performance of the proposed approaches is evaluated based on both synthetic networks and real traces, and simulation results show that cooperative offloading can significantly improve the data delivery probability and the performance of both heuristic algorithm and distributed algorithm outperforms other approaches.
由间歇性连接的移动设备组成的机会性移动网络已被用于各种应用,例如计算卸载和减轻蜂窝流量负载。与已有工作不同的是,本文关注的是移动设备之间的数据协同卸载,以最大限度地提高在给定时间约束下,移动设备向间断性连接的远程服务器或数据中心传输数据的概率,称为协同卸载问题。不幸的是,合作卸载是NP-hard。为此,基于所提出的概率框架设计了一种启发式算法,该算法在考虑数据大小和接触时间的情况下,提供了通过机会路径成功传递数据的概率估计。由于缺乏全局信息,进一步提出了一种分布式算法。基于合成网络和真实轨迹对所提方法的性能进行了评估,仿真结果表明,协同卸载可以显著提高启发式算法和分布式算法的数据传输概率和性能,优于其他方法。
{"title":"Cooperative data offloading in opportunistic mobile networks","authors":"Zongqing Lu, Xiao Sun, T. L. Porta","doi":"10.1109/INFOCOM.2016.7524494","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524494","url":null,"abstract":"Opportunistic mobile networks consisting of intermittently connected mobile devices have been exploited for various applications, such as computational offloading and mitigating cellular traffic load. Different from existing work, in this paper, we focus on cooperatively offloading data among mobile devices to maximally improve the probability of data delivery from a mobile device to an intermittently connected remote server or data center within a given time constraint, which is referred to as the cooperative offloading problem. Unfortunately, cooperative offloading is NP-hard. To this end, a heuristic algorithm is designed based on the proposed probabilistic framework, which provides the estimation of the probability of successful data delivery over the opportunistic path, considering both data size and contact duration. Due to the lack of global information, a distributed algorithm is further proposed. The performance of the proposed approaches is evaluated based on both synthetic networks and real traces, and simulation results show that cooperative offloading can significantly improve the data delivery probability and the performance of both heuristic algorithm and distributed algorithm outperforms other approaches.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129457127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Accurate recovery of Internet traffic data: A tensor completion approach 互联网流量数据的精确恢复:一种张量补全方法
Kun Xie, Lele Wang, Xin Wang, Gaogang Xie, Jigang Wen, Guangxin Zhang
The inference of traffic volume of the whole network from partial traffic measurements becomes increasingly critical for various network engineering tasks, such as traffic prediction, network optimization, and anomaly detection. Previous studies indicate that the matrix completion is a possible solution for this problem. However, as a two-dimension matrix cannot sufficiently capture the spatial-temporal features of traffic data, these approaches fail to work when the data missing ratio is high. To fully exploit hidden spatial-temporal structures of the traffic data, this paper models the traffic data as a 3-way traffic tensor and formulates the traffic data recovery problem as a low-rank tensor completion problem. However, the high computation complexity incurred by the conventional tensor completion algorithms prevents its practical application for the traffic data recovery. To reduce the computation cost, we propose a novel Sequential Tensor Completion algorithm (STC) which can efficiently exploit the tensor decomposition result for the previous traffic data to deduce the tensor decomposition for the current data. To the best of our knowledge, we are the first to apply the tensor to model Internet traffic data to well exploit their hidden structures and propose a sequential tensor completion algorithm to significantly speed up the traffic data recovery process. We have done extensive simulations with the real traffic trace as the input. The simulation results demonstrate that our algorithm can achieve significantly better performance compared with the literature tensor and matrix completion algorithms even when the data missing ratio is high.
从部分流量测量中推断出整个网络的流量,对于各种网络工程任务,如流量预测、网络优化和异常检测,变得越来越重要。以往的研究表明,矩阵完井是解决这一问题的一种可能方法。然而,由于二维矩阵不能充分捕捉交通数据的时空特征,当数据缺失率较高时,这些方法就失效了。为了充分挖掘交通数据隐藏的时空结构,本文将交通数据建模为一个三向交通张量,将交通数据恢复问题表述为一个低秩张量补全问题。然而,传统张量补全算法计算量大,阻碍了其在交通数据恢复中的实际应用。为了减少计算量,提出了一种新的顺序张量补全算法(STC),该算法可以有效地利用之前交通数据的张量分解结果来推导当前数据的张量分解。据我们所知,我们是第一个将张量应用于互联网流量数据建模,以很好地利用其隐藏结构,并提出了一个顺序张量补全算法,以显着加快流量数据恢复过程。我们用真实的交通轨迹作为输入进行了大量的模拟。仿真结果表明,即使在数据缺失率较高的情况下,与文献中的张量和矩阵补全算法相比,我们的算法也能取得明显更好的性能。
{"title":"Accurate recovery of Internet traffic data: A tensor completion approach","authors":"Kun Xie, Lele Wang, Xin Wang, Gaogang Xie, Jigang Wen, Guangxin Zhang","doi":"10.1109/INFOCOM.2016.7524463","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524463","url":null,"abstract":"The inference of traffic volume of the whole network from partial traffic measurements becomes increasingly critical for various network engineering tasks, such as traffic prediction, network optimization, and anomaly detection. Previous studies indicate that the matrix completion is a possible solution for this problem. However, as a two-dimension matrix cannot sufficiently capture the spatial-temporal features of traffic data, these approaches fail to work when the data missing ratio is high. To fully exploit hidden spatial-temporal structures of the traffic data, this paper models the traffic data as a 3-way traffic tensor and formulates the traffic data recovery problem as a low-rank tensor completion problem. However, the high computation complexity incurred by the conventional tensor completion algorithms prevents its practical application for the traffic data recovery. To reduce the computation cost, we propose a novel Sequential Tensor Completion algorithm (STC) which can efficiently exploit the tensor decomposition result for the previous traffic data to deduce the tensor decomposition for the current data. To the best of our knowledge, we are the first to apply the tensor to model Internet traffic data to well exploit their hidden structures and propose a sequential tensor completion algorithm to significantly speed up the traffic data recovery process. We have done extensive simulations with the real traffic trace as the input. The simulation results demonstrate that our algorithm can achieve significantly better performance compared with the literature tensor and matrix completion algorithms even when the data missing ratio is high.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130541582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Software defined networks: It's about time 软件定义网络:是时候了
Tal Mizrahi, Y. Moses
With the rise of Software Defined Networks (SDN), there is growing interest in dynamic and centralized traffic engineering, where decisions about forwarding paths are taken dynamically from a network-wide perspective. Frequent path reconfiguration can significantly improve the network performance, but should be handled with care, so as to minimize disruptions that may occur during network updates. In this paper we introduce Time4, an approach that uses accurate time to coordinate network updates. We characterize a set of update scenarios called flow swaps, for which Time4 is the optimal update approach, yielding less packet loss than existing update approaches. We define the lossless flow allocation problem, and formally show that in environments with frequent path allocation, scenarios that require simultaneous changes at multiple network devices are inevitable. We present the design, implementation, and evaluation of a time4-enabled OpenFlow prototype. The prototype is publicly available as open source. Our work includes an extension to the OpenFlow protocol that has been adopted by the Open Networking Foundation (ONF), and is now included in OpenFlow 1.5. Our experimental results demonstrate the significant advantages of Time4 compared to other network update approaches.
随着软件定义网络(SDN)的兴起,人们对动态和集中的流量工程越来越感兴趣,其中关于转发路径的决定是从整个网络的角度动态采取的。频繁的路径重新配置可以显著提高网络性能,但应该小心处理,以尽量减少在网络更新期间可能发生的中断。本文介绍了一种使用精确时间来协调网络更新的方法Time4。我们描述了一组称为流交换的更新场景,其中Time4是最佳更新方法,比现有更新方法产生更少的数据包丢失。我们定义了无损流量分配问题,并形式化地表明,在路径分配频繁的环境中,需要多个网络设备同时改变的场景是不可避免的。我们展示了一个启用time4的OpenFlow原型的设计、实现和评估。该原型作为开放源代码公开提供。我们的工作包括OpenFlow协议的扩展,该协议已被开放网络基金会(ONF)采用,现在包含在OpenFlow 1.5中。我们的实验结果表明,与其他网络更新方法相比,Time4具有显著的优势。
{"title":"Software defined networks: It's about time","authors":"Tal Mizrahi, Y. Moses","doi":"10.1109/INFOCOM.2016.7524418","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524418","url":null,"abstract":"With the rise of Software Defined Networks (SDN), there is growing interest in dynamic and centralized traffic engineering, where decisions about forwarding paths are taken dynamically from a network-wide perspective. Frequent path reconfiguration can significantly improve the network performance, but should be handled with care, so as to minimize disruptions that may occur during network updates. In this paper we introduce Time4, an approach that uses accurate time to coordinate network updates. We characterize a set of update scenarios called flow swaps, for which Time4 is the optimal update approach, yielding less packet loss than existing update approaches. We define the lossless flow allocation problem, and formally show that in environments with frequent path allocation, scenarios that require simultaneous changes at multiple network devices are inevitable. We present the design, implementation, and evaluation of a time4-enabled OpenFlow prototype. The prototype is publicly available as open source. Our work includes an extension to the OpenFlow protocol that has been adopted by the Open Networking Foundation (ONF), and is now included in OpenFlow 1.5. Our experimental results demonstrate the significant advantages of Time4 compared to other network update approaches.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130086226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Application-aware traffic scheduling for workload offloading in mobile clouds 基于应用程序感知的移动云工作负载卸载流量调度
Liang Tong, Wei Gao
Mobile Cloud Computing (MCC) bridges the gap between limited capabilities of mobile devices and the increasing complexity of mobile applications, by offloading the computational workloads from local devices to the cloud. Current research supports workload offloading through appropriate application partitioning and remote method execution, but generally ignores the impact of wireless network characteristics on such offloading. Wireless data transmissions incurred by remote method execution consume a large amount of additional energy during transmission intervals when the network interface stays in the high-power state, and deferring these transmissions increases the response delay of mobile applications. In this paper, we adaptively balance the tradeoff between energy efficiency and responsiveness of mobile applications by developing application-aware wireless transmission scheduling algorithms. We take both causality and run-time dynamics of application method executions into account when deferring wireless transmissions, so as to minimize the wireless energy cost and satisfy the application delay constraint with respect to the practical system contexts. Systematic evaluations show that our scheme significantly improves the energy efficiency of workload offloading over realistic smartphone applications.
移动云计算(MCC)通过将计算工作负载从本地设备转移到云端,弥合了移动设备有限的功能与移动应用程序日益复杂之间的差距。目前的研究支持通过适当的应用程序分区和远程方法执行来卸载工作负载,但通常忽略了无线网络特性对这种卸载的影响。当网络接口处于高功率状态时,远程方法执行产生的无线数据传输在传输间隔期间消耗大量的额外能量,延迟这些传输增加了移动应用程序的响应延迟。在本文中,我们通过开发应用感知的无线传输调度算法,自适应地平衡了移动应用的能源效率和响应性之间的权衡。在延迟无线传输时,我们考虑了应用方法执行的因果关系和运行时动态,以最小化无线能量消耗并满足实际系统环境下的应用延迟约束。系统评估表明,我们的方案显着提高了实际智能手机应用程序负载卸载的能源效率。
{"title":"Application-aware traffic scheduling for workload offloading in mobile clouds","authors":"Liang Tong, Wei Gao","doi":"10.1109/INFOCOM.2016.7524520","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524520","url":null,"abstract":"Mobile Cloud Computing (MCC) bridges the gap between limited capabilities of mobile devices and the increasing complexity of mobile applications, by offloading the computational workloads from local devices to the cloud. Current research supports workload offloading through appropriate application partitioning and remote method execution, but generally ignores the impact of wireless network characteristics on such offloading. Wireless data transmissions incurred by remote method execution consume a large amount of additional energy during transmission intervals when the network interface stays in the high-power state, and deferring these transmissions increases the response delay of mobile applications. In this paper, we adaptively balance the tradeoff between energy efficiency and responsiveness of mobile applications by developing application-aware wireless transmission scheduling algorithms. We take both causality and run-time dynamics of application method executions into account when deferring wireless transmissions, so as to minimize the wireless energy cost and satisfy the application delay constraint with respect to the practical system contexts. Systematic evaluations show that our scheme significantly improves the energy efficiency of workload offloading over realistic smartphone applications.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116223898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
DiVA: Distributed Voronoi-based acoustic source localization with wireless sensor networks DiVA:基于voronoi的分布式声源定位与无线传感器网络
Xueshu Zheng, S. Yang, Naigao Jin, Lei Wang, Mathew L. Wymore, D. Qiao
This paper presents DiVA, a novel hybrid range-free and range-based acoustic source localization scheme that uses an ad-hoc network of microphone sensor nodes to produce an accurate estimate of the source's location in the presence of various real-world challenges. DiVA uses range-free pairwise comparisons of sound detection timestamps between local Voronoi neighbors to identify the node closest to the acoustic source, which then estimates the source's location using a constrained range-based method. Through simulation and experimental evaluations, DiVA is shown to be accurate and highly robust, making it practical for real-world applications.
本文介绍了DiVA,一种新型的无距离和基于距离的混合声源定位方案,该方案使用麦克风传感器节点的自组织网络,在各种现实世界挑战的存在下准确估计声源的位置。DiVA使用无距离两两比较本地Voronoi邻居之间的声音检测时间戳来识别最接近声源的节点,然后使用基于受限距离的方法估计声源的位置。通过仿真和实验评估,DiVA被证明是准确的和高度鲁棒性的,使其在实际应用中具有实用性。
{"title":"DiVA: Distributed Voronoi-based acoustic source localization with wireless sensor networks","authors":"Xueshu Zheng, S. Yang, Naigao Jin, Lei Wang, Mathew L. Wymore, D. Qiao","doi":"10.1109/INFOCOM.2016.7524541","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524541","url":null,"abstract":"This paper presents DiVA, a novel hybrid range-free and range-based acoustic source localization scheme that uses an ad-hoc network of microphone sensor nodes to produce an accurate estimate of the source's location in the presence of various real-world challenges. DiVA uses range-free pairwise comparisons of sound detection timestamps between local Voronoi neighbors to identify the node closest to the acoustic source, which then estimates the source's location using a constrained range-based method. Through simulation and experimental evaluations, DiVA is shown to be accurate and highly robust, making it practical for real-world applications.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"4 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120839635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Sketch-based data placement among geo-distributed datacenters for cloud storages 云存储的地理分布式数据中心之间基于草图的数据放置
Boyang Yu, Jianping Pan
With the increasing demand of big data applications, a variety of problems on how to operate the supporting infrastructures more intelligently and efficiently have attracted much attention in the literature. To optimize the data placement among distributed network locations is one of the fundamental problems, which aims at facilitating the data storage and access. However, traditional schemes meet challenges on the running time and the overhead introduced due to the increasing scale of datasets. Therefore, we propose a novel data placement scheme based on sketches to overcome these challenges. We first justify the effectiveness of applying the hypergraph sparsification on the data placement problem, and then present the method of constructing sparsifiers through the sketches of request traffic. Besides, the scheme features on the support of aggregating distributed sketches to make the decision and capturing the pattern of recent traffic through sliding windows. Finally, we obtain numerical results through simulations which confirm that the proposed scheme can place data effectively while reducing the introduced overhead in terms of algorithm running time, space and network traffic.
随着大数据应用需求的不断增长,如何更智能、更高效地运行支撑基础设施的各种问题备受文献关注。优化数据在分布式网络中的位置是一个基本问题,其目的是为了方便数据的存储和访问。然而,由于数据集规模的不断扩大,传统的方案在运行时间和开销方面面临挑战。因此,我们提出了一种新的基于草图的数据放置方案来克服这些挑战。我们首先证明了在数据放置问题上应用超图稀疏化的有效性,然后提出了通过请求流量草图构造稀疏化器的方法。此外,该方案的特点是支持聚合分布式草图,通过滑动窗口进行决策并捕获最近的流量模式。最后,通过仿真得到数值结果,验证了所提方案能够有效地放置数据,同时减少了算法运行时间、空间和网络流量方面的引入开销。
{"title":"Sketch-based data placement among geo-distributed datacenters for cloud storages","authors":"Boyang Yu, Jianping Pan","doi":"10.1109/INFOCOM.2016.7524627","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524627","url":null,"abstract":"With the increasing demand of big data applications, a variety of problems on how to operate the supporting infrastructures more intelligently and efficiently have attracted much attention in the literature. To optimize the data placement among distributed network locations is one of the fundamental problems, which aims at facilitating the data storage and access. However, traditional schemes meet challenges on the running time and the overhead introduced due to the increasing scale of datasets. Therefore, we propose a novel data placement scheme based on sketches to overcome these challenges. We first justify the effectiveness of applying the hypergraph sparsification on the data placement problem, and then present the method of constructing sparsifiers through the sketches of request traffic. Besides, the scheme features on the support of aggregating distributed sketches to make the decision and capturing the pattern of recent traffic through sliding windows. Finally, we obtain numerical results through simulations which confirm that the proposed scheme can place data effectively while reducing the introduced overhead in terms of algorithm running time, space and network traffic.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127040162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Reducing dense virtual networks for fast embedding 减少密集虚拟网络,实现快速嵌入
Toru Mano, Takeru Inoue, Kimihiro Mizutani, Osamu Akashi
Virtual network embedding has been intensively studied for a decade. The time complexity of most conventional methods has been reduced to the cube of the number of links. Since customers are likely to request a dense virtual network that connects every node pair directly (|E| = O(|V|2)) based on a traffic matrix, the time complexity is actually O(|E|3 = |V|6). If we were allowed to reduce this dense network into a sparse one before embedding, the time complexity could be decreased to O(|V|3); the time gap can be a million times for |V| = 100. The network reduction, however, combines several virtual links into a broader link, which makes the embedding cost (solution quality) much worse. This paper analytically and empirically investigates the trade-off between the embedding time and cost for the virtual network reduction. We define two simple reduction algorithms and analyze them with several interesting theorems. The analysis indicates that the embedding cost increases only linearly with exponential decay of embedding time. Thorough numerical evaluation justifies the desirability of the trade-off.
虚拟网络嵌入已经被深入研究了十年。大多数传统方法的时间复杂度已经降低到链接数的立方。由于客户可能会要求一个基于流量矩阵直接连接每个节点对的密集虚拟网络(|E| = O(|V|2)),因此时间复杂度实际上是O(|E|3 = |V|6)。如果我们允许在嵌入之前将这个密集的网络简化成一个稀疏的网络,时间复杂度可以降低到O(|V|3);当|V| = 100时,时间间隔可以是一百万倍。然而,网络约简将多个虚拟链路合并为一个更广泛的链路,这使得嵌入成本(解决方案质量)大大降低。本文对虚拟网络缩减中嵌入时间与成本之间的权衡进行了分析和实证研究。我们定义了两种简单的约简算法,并用几个有趣的定理对它们进行了分析。分析表明,嵌入成本仅随嵌入时间的指数衰减而线性增加。彻底的数值评估证明了这种权衡的可取性。
{"title":"Reducing dense virtual networks for fast embedding","authors":"Toru Mano, Takeru Inoue, Kimihiro Mizutani, Osamu Akashi","doi":"10.1109/INFOCOM.2016.7524412","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524412","url":null,"abstract":"Virtual network embedding has been intensively studied for a decade. The time complexity of most conventional methods has been reduced to the cube of the number of links. Since customers are likely to request a dense virtual network that connects every node pair directly (|E| = O(|V|2)) based on a traffic matrix, the time complexity is actually O(|E|3 = |V|6). If we were allowed to reduce this dense network into a sparse one before embedding, the time complexity could be decreased to O(|V|3); the time gap can be a million times for |V| = 100. The network reduction, however, combines several virtual links into a broader link, which makes the embedding cost (solution quality) much worse. This paper analytically and empirically investigates the trade-off between the embedding time and cost for the virtual network reduction. We define two simple reduction algorithms and analyze them with several interesting theorems. The analysis indicates that the embedding cost increases only linearly with exponential decay of embedding time. Thorough numerical evaluation justifies the desirability of the trade-off.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127164807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Localization of LTE measurement records with missing information 缺失信息的LTE测量记录的定位
Avik Ray, S. Deb, Pantelis Monogioudis
As cellular networks like 4G LTE networks get more and more sophisticated, mobiles also measure and send enormous amount of mobile measurement data (in TBs/week/metropolitan) during every call and session. The mobile measurement records are saved in data center for further analysis and mining, however, these measurement records are not geo-tagged because the measurement procedures are implemented in mobile LTE stack. Geo-tagging (or localizing) the stored measurement record is a fundamental building block towards network analytics and troubleshooting since the measurement records contain rich information on call quality, latency, throughput, signal quality, error codes etc. In this work, our goal is to localize these mobile measurement records. Precisely, we answer the following question: what was the location of the mobile when it sent a given measurement record? We design and implement novel machine learning based algorithms to infer whether a mobile was outdoor and if so, it infers the latitude-longitude associated with the measurement record. The key technical challenge comes from the fact that measurement records do not contain sufficient information required for triangulation or RF fingerprinting based techniques to work by themselves. Experiments performed with real data sets from an operational 4G network in a major metropolitan show that, the median accuracy of our proposed solution is around 20 m for outdoor mobiles and outdoor classification accuracy is more than 98%.
随着像4G LTE这样的蜂窝网络变得越来越复杂,手机在每次通话和会话中也会测量和发送大量的移动测量数据(以tb /周/城域网为单位)。移动测量记录保存在数据中心以供进一步分析和挖掘,但由于测量过程是在移动LTE堆栈中实现的,因此这些测量记录没有地理标记。地理标记(或本地化)存储的测量记录是网络分析和故障排除的基本组成部分,因为测量记录包含呼叫质量、延迟、吞吐量、信号质量、错误代码等丰富的信息。在这项工作中,我们的目标是本地化这些移动测量记录。准确地说,我们回答了以下问题:当手机发送给定的测量记录时,它的位置是什么?我们设计并实现了新的基于机器学习的算法来推断手机是否在户外,如果是,它会推断与测量记录相关的经纬度。关键的技术挑战来自于这样一个事实,即测量记录不包含三角测量或基于射频指纹的技术单独工作所需的足够信息。在大城市运营4G网络的真实数据集上进行的实验表明,我们提出的解决方案在户外移动设备上的中位数精度约为20米,户外分类精度超过98%。
{"title":"Localization of LTE measurement records with missing information","authors":"Avik Ray, S. Deb, Pantelis Monogioudis","doi":"10.1109/INFOCOM.2016.7524370","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524370","url":null,"abstract":"As cellular networks like 4G LTE networks get more and more sophisticated, mobiles also measure and send enormous amount of mobile measurement data (in TBs/week/metropolitan) during every call and session. The mobile measurement records are saved in data center for further analysis and mining, however, these measurement records are not geo-tagged because the measurement procedures are implemented in mobile LTE stack. Geo-tagging (or localizing) the stored measurement record is a fundamental building block towards network analytics and troubleshooting since the measurement records contain rich information on call quality, latency, throughput, signal quality, error codes etc. In this work, our goal is to localize these mobile measurement records. Precisely, we answer the following question: what was the location of the mobile when it sent a given measurement record? We design and implement novel machine learning based algorithms to infer whether a mobile was outdoor and if so, it infers the latitude-longitude associated with the measurement record. The key technical challenge comes from the fact that measurement records do not contain sufficient information required for triangulation or RF fingerprinting based techniques to work by themselves. Experiments performed with real data sets from an operational 4G network in a major metropolitan show that, the median accuracy of our proposed solution is around 20 m for outdoor mobiles and outdoor classification accuracy is more than 98%.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117346179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Synergistic policy and virtual machine consolidation in cloud data centers 云数据中心中的协同策略和虚拟机整合
Lin Cui, Richard Cziva, Fung Po Tso, D. Pezaros
In modern Cloud Data Centers (DC)s, correct implementation of network policies is crucial to provide secure, efficient and high performance services for tenants. It is reported that the inefficient management of network policies accounts for 78% of DC downtime, challenged by the dynamically changing network characteristics and by the effects of dynamic Virtual Machine (VM) consolidation. While there has been significant research in policy and VM management, they have so far been treated as disjoint research problems. In this paper, we explore the simultaneous, dynamic VM and policy consolidation, and formulate the Policy-VM Consolidation (PVC) problem, which is shown to be NP-Hard. We then propose Sync, an efficient and synergistic scheme to jointly consolidate network policies and virtual machines. Extensive evaluation results and a testbed implementation of our controller show that policy and VM migration under Sync significantly reduces flow end-to-end delay by nearly 40%, and network-wide communication cost by 50% within few seconds, while adhering strictly to the requirements of network policies.
在现代云数据中心中,正确实施网络策略是为租户提供安全、高效、高性能的服务的关键。据报道,由于动态变化的网络特性和动态虚拟机(VM)整合的影响,网络策略管理效率低下占数据中心停机时间的78%。虽然在政策和虚拟机管理方面已经有了大量的研究,但到目前为止,它们被视为互不相关的研究问题。本文探讨了并行的、动态的虚拟机和策略整合,并提出了策略-虚拟机整合(PVC)问题,该问题被证明是NP-Hard的。然后,我们提出了一种高效的协同方案Sync,用于联合整合网络策略和虚拟机。广泛的评估结果和我们的控制器的测试平台实现表明,在Sync下的策略和VM迁移在几秒钟内显着降低了流端到端延迟近40%,并在网络范围内降低了50%的通信成本,同时严格遵守网络策略的要求。
{"title":"Synergistic policy and virtual machine consolidation in cloud data centers","authors":"Lin Cui, Richard Cziva, Fung Po Tso, D. Pezaros","doi":"10.1109/INFOCOM.2016.7524354","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524354","url":null,"abstract":"In modern Cloud Data Centers (DC)s, correct implementation of network policies is crucial to provide secure, efficient and high performance services for tenants. It is reported that the inefficient management of network policies accounts for 78% of DC downtime, challenged by the dynamically changing network characteristics and by the effects of dynamic Virtual Machine (VM) consolidation. While there has been significant research in policy and VM management, they have so far been treated as disjoint research problems. In this paper, we explore the simultaneous, dynamic VM and policy consolidation, and formulate the Policy-VM Consolidation (PVC) problem, which is shown to be NP-Hard. We then propose Sync, an efficient and synergistic scheme to jointly consolidate network policies and virtual machines. Extensive evaluation results and a testbed implementation of our controller show that policy and VM migration under Sync significantly reduces flow end-to-end delay by nearly 40%, and network-wide communication cost by 50% within few seconds, while adhering strictly to the requirements of network policies.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124368625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1