首页 > 最新文献

2019 IEEE 40th Sarnoff Symposium最新文献

英文 中文
Discovering Shadowing Effects Over Effective Spectrum Availability Inside Smart Buildings for Cognitive Short Range Systems Operation 认知短距离系统运行中智能建筑有效频谱可用性的阴影效应研究
Pub Date : 2019-09-01 DOI: 10.1109/Sarnoff47838.2019.9067818
Washington Medina, Francisco Novillo, Eduardo Chancay, Juan M. Romero-Arguello
Applying the Cognitive Radio paradigm to short-range systems inside buildings, it is intended to control two major drawbacks. The first one refers to controlling the efficiency in the use of the spectrum in interior scenarios, and the second is to overcome the inconvenience in the quality of service that arises when there are large quantities of short-range systems interfering with each other. Estimating the effective spectrum available inside a smart building is a big challenge. To do so, we must consider the deployment of users of the primary system, whose band would be reused. Large amounts of spectral opportunities have been found for the primary band, especially on the lower floors of the building. However, when considering the effect of shadowing on the interior of the building, it is shown that effective spectrum availability decreases.
将认知无线电范例应用于建筑物内的近距离系统,旨在控制两个主要缺点。首先是控制内部场景下频谱的使用效率,其次是克服大量近距离系统相互干扰时对服务质量带来的不便。估计智能建筑内部可用的有效频谱是一个很大的挑战。为此,我们必须考虑主系统用户的部署,这些用户的频带将被重用。在主波段发现了大量的光谱机会,特别是在建筑物的较低楼层。然而,当考虑阴影对建筑物内部的影响时,表明有效频谱可用性降低。
{"title":"Discovering Shadowing Effects Over Effective Spectrum Availability Inside Smart Buildings for Cognitive Short Range Systems Operation","authors":"Washington Medina, Francisco Novillo, Eduardo Chancay, Juan M. Romero-Arguello","doi":"10.1109/Sarnoff47838.2019.9067818","DOIUrl":"https://doi.org/10.1109/Sarnoff47838.2019.9067818","url":null,"abstract":"Applying the Cognitive Radio paradigm to short-range systems inside buildings, it is intended to control two major drawbacks. The first one refers to controlling the efficiency in the use of the spectrum in interior scenarios, and the second is to overcome the inconvenience in the quality of service that arises when there are large quantities of short-range systems interfering with each other. Estimating the effective spectrum available inside a smart building is a big challenge. To do so, we must consider the deployment of users of the primary system, whose band would be reused. Large amounts of spectral opportunities have been found for the primary band, especially on the lower floors of the building. However, when considering the effect of shadowing on the interior of the building, it is shown that effective spectrum availability decreases.","PeriodicalId":306134,"journal":{"name":"2019 IEEE 40th Sarnoff Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130189645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comprehensive Overview of Selfish Mining and Double Spending Attack Countermeasures 自私挖矿及双花攻击对策综述
Pub Date : 2019-09-01 DOI: 10.1109/Sarnoff47838.2019.9067821
Kervins Nicolas, Yi Wang, G. Giakos
Bitcoin is a well-known cryptocurrency in which records of transactions are maintained by a P2P network to create a distributed ledger. Due to the complex nature of maintaining highly efficient, transparent and speed transactions between nodes, security is one of the primary concerns of this system. The most prominent modern-day attacks to this system are the selfish mining and double spending attacks. This survey is organized around the aspects pertaining to countermeasures of selfish mining and double spending attacks. We selected a total of 20 primary studies from recent years as a result of a systematic analysis approach. In this study we will aim to classify, analyze, and evaluate these proposed methods in order to create a secure blockchain system. These countermeasures are being developed and are being experimented with in order to mitigate and/or even eliminate these attacks from occurring. These proposed frameworks and research papers will outline the keys to improving the blockchain architecture with code scripts and design parameters to increase the functionality of the blockchain. We aim to identify implications of these countermeasures to address vulnerabilities in the blockchain network for future research on this topic.
比特币是一种众所周知的加密货币,其交易记录由P2P网络维护,以创建分布式账本。由于在节点之间保持高效、透明和快速交易的复杂性,安全性是该系统的主要关注点之一。现代对该系统最突出的攻击是自私挖矿和双重支出攻击。本调查围绕自私挖矿和双重支出攻击的对策进行组织。我们采用系统分析的方法,共选取了近年来的20项主要研究。在本研究中,我们将对这些提出的方法进行分类、分析和评估,以创建一个安全的区块链系统。正在开发和试验这些对策,以减轻和/或甚至消除这些攻击的发生。这些建议的框架和研究论文将概述用代码脚本和设计参数改进区块链架构的关键,以增加区块链的功能。我们的目标是确定这些对策的影响,以解决区块链网络中的漏洞,以便将来研究这一主题。
{"title":"Comprehensive Overview of Selfish Mining and Double Spending Attack Countermeasures","authors":"Kervins Nicolas, Yi Wang, G. Giakos","doi":"10.1109/Sarnoff47838.2019.9067821","DOIUrl":"https://doi.org/10.1109/Sarnoff47838.2019.9067821","url":null,"abstract":"Bitcoin is a well-known cryptocurrency in which records of transactions are maintained by a P2P network to create a distributed ledger. Due to the complex nature of maintaining highly efficient, transparent and speed transactions between nodes, security is one of the primary concerns of this system. The most prominent modern-day attacks to this system are the selfish mining and double spending attacks. This survey is organized around the aspects pertaining to countermeasures of selfish mining and double spending attacks. We selected a total of 20 primary studies from recent years as a result of a systematic analysis approach. In this study we will aim to classify, analyze, and evaluate these proposed methods in order to create a secure blockchain system. These countermeasures are being developed and are being experimented with in order to mitigate and/or even eliminate these attacks from occurring. These proposed frameworks and research papers will outline the keys to improving the blockchain architecture with code scripts and design parameters to increase the functionality of the blockchain. We aim to identify implications of these countermeasures to address vulnerabilities in the blockchain network for future research on this topic.","PeriodicalId":306134,"journal":{"name":"2019 IEEE 40th Sarnoff Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128316610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Varying the Beamwidth of Hybrid Beamforming for mmWave Communications 改变毫米波通信混合波束形成的波束宽度
Pub Date : 2019-09-01 DOI: 10.1109/Sarnoff47838.2019.9067820
Y. Yaman, P. Spasojevic
Availability of large array usage in millimeter wave communications gives the opportunity to create narrow beams that yield to high antenna gains. However, in some cases, wider beams are of interest in order to increase the coverage area or reduce the outages caused by the channel variations. To address this need, beam broadening approaches with no increase in the hardware complexity have been described without studying the implementation difficulties. This paper proposes a simplified broadening model while adopting a strategy in which neighbor beams are concatenated to create a wider beam dividing the antenna into subarrays. The beamwidth and power loss analysis along with the beam broadening bounds in the design parameters are expressed in detail. Next, introduced broadening model is integrated to the hybrid beamforming system without changing its hardware structure. Simulation results that verify the analytical expressions for both broadening system and its hybrid beamforming implementation are provided.
在毫米波通信中,大阵列的可用性为产生高天线增益的窄波束提供了机会。然而,在某些情况下,为了增加覆盖面积或减少由信道变化引起的中断,更宽的波束是有意义的。为了满足这一需求,在不研究实现困难的情况下,描述了不增加硬件复杂性的波束加宽方法。本文提出了一种简化的展宽模型,并采用相邻波束串联的策略,将天线分成子阵,形成更宽的波束。详细地分析了设计参数中的波束宽度和功率损耗以及波束展宽边界。其次,在不改变混合波束形成系统硬件结构的前提下,将引入的扩宽模型集成到混合波束形成系统中。仿真结果验证了展宽系统及其混合波束形成实现的解析表达式。
{"title":"Varying the Beamwidth of Hybrid Beamforming for mmWave Communications","authors":"Y. Yaman, P. Spasojevic","doi":"10.1109/Sarnoff47838.2019.9067820","DOIUrl":"https://doi.org/10.1109/Sarnoff47838.2019.9067820","url":null,"abstract":"Availability of large array usage in millimeter wave communications gives the opportunity to create narrow beams that yield to high antenna gains. However, in some cases, wider beams are of interest in order to increase the coverage area or reduce the outages caused by the channel variations. To address this need, beam broadening approaches with no increase in the hardware complexity have been described without studying the implementation difficulties. This paper proposes a simplified broadening model while adopting a strategy in which neighbor beams are concatenated to create a wider beam dividing the antenna into subarrays. The beamwidth and power loss analysis along with the beam broadening bounds in the design parameters are expressed in detail. Next, introduced broadening model is integrated to the hybrid beamforming system without changing its hardware structure. Simulation results that verify the analytical expressions for both broadening system and its hybrid beamforming implementation are provided.","PeriodicalId":306134,"journal":{"name":"2019 IEEE 40th Sarnoff Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122537267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simultaneous Synchronization and Detection in Loosely Synchronized Tiny Packet Networks 松散同步微包网络中的同步与检测
Pub Date : 2019-09-01 DOI: 10.1109/Sarnoff47838.2019.9067812
Zongwen Tang, P. Spasojevic, Chryssalenia Koumpouzi, F. Dagefu
Internet of Things (IoT) applications are anticipated to bloom in the future, and two popular industry areas related to Internet of Things (IoT) are smart houses and smart factories. To make a home or factory smart, hundreds or thousands of sensors need to work and communicate together with simple, secure and stable connectivity. Thus, the design of smart homes and smart factories relies on wireless sensor networks, whose transmission is often characterized to be sporadic. Classical approaches to multiuser communications rely on tight time synchronization achieved by employing coordinating infrastructure, but in a mass sensor transmission system, sensors may communicate with each other directly without relying on coordinating mechanisms. Our study explores the possibilities of simple and reliable multiuser detection in DS-CDMA system for few data and short distance mass sensor connectivity with joint synchronization of data. Furthermore, we discussed a scenario where spreading sequences are overused. We show that our system has strong potential for excellent mass sensors detection performance without synchronizing infrastructure.
物联网(IoT)应用预计将在未来蓬勃发展,与物联网(IoT)相关的两个热门行业领域是智能房屋和智能工厂。为了使家庭或工厂智能化,数百或数千个传感器需要通过简单,安全和稳定的连接一起工作和通信。因此,智能家居和智能工厂的设计依赖于无线传感器网络,而无线传感器网络的传输往往是零星的。多用户通信的经典方法依赖于采用协调基础设施实现的紧密时间同步,但在海量传感器传输系统中,传感器之间可以直接通信,而不依赖于协调机制。我们的研究探索了DS-CDMA系统中简单可靠的多用户检测的可能性,用于少量数据和短距离的质量传感器连接,并进行数据联合同步。此外,我们还讨论了过度使用扩展序列的场景。我们表明,我们的系统在没有同步基础设施的情况下具有出色的质量传感器检测性能的强大潜力。
{"title":"Simultaneous Synchronization and Detection in Loosely Synchronized Tiny Packet Networks","authors":"Zongwen Tang, P. Spasojevic, Chryssalenia Koumpouzi, F. Dagefu","doi":"10.1109/Sarnoff47838.2019.9067812","DOIUrl":"https://doi.org/10.1109/Sarnoff47838.2019.9067812","url":null,"abstract":"Internet of Things (IoT) applications are anticipated to bloom in the future, and two popular industry areas related to Internet of Things (IoT) are smart houses and smart factories. To make a home or factory smart, hundreds or thousands of sensors need to work and communicate together with simple, secure and stable connectivity. Thus, the design of smart homes and smart factories relies on wireless sensor networks, whose transmission is often characterized to be sporadic. Classical approaches to multiuser communications rely on tight time synchronization achieved by employing coordinating infrastructure, but in a mass sensor transmission system, sensors may communicate with each other directly without relying on coordinating mechanisms. Our study explores the possibilities of simple and reliable multiuser detection in DS-CDMA system for few data and short distance mass sensor connectivity with joint synchronization of data. Furthermore, we discussed a scenario where spreading sequences are overused. We show that our system has strong potential for excellent mass sensors detection performance without synchronizing infrastructure.","PeriodicalId":306134,"journal":{"name":"2019 IEEE 40th Sarnoff Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122853005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sarnoff 2019 Committees Sarnoff 2019委员会
Pub Date : 2019-09-01 DOI: 10.1109/sarnoff47838.2019.9067810
{"title":"Sarnoff 2019 Committees","authors":"","doi":"10.1109/sarnoff47838.2019.9067810","DOIUrl":"https://doi.org/10.1109/sarnoff47838.2019.9067810","url":null,"abstract":"","PeriodicalId":306134,"journal":{"name":"2019 IEEE 40th Sarnoff Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125669195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game Theory and Biology Inspired Flight Control for Autonomous UAVs Operating in Contested Environments 基于博弈论和生物学的自主无人机在竞争环境中的飞行控制
Pub Date : 2019-09-01 DOI: 10.1109/Sarnoff47838.2019.9067828
Janusz Kusyk, M. U. Uyar, Kelvin Ma, Kevin Budhu, Eltan Samoylov, Joseph Plishka, G. Bertoli, J. Boksiner, Dilip K. Guha
A self-organizing swarm of autonomous unmanned areal vehicles (UAVs) can provide a quick response to cyber-attacks in austere civilian and military environments. However, if a UAV swarm relies on centralized control, synchronization of swarm members, pre-planned actions or rule-based systems, it may not provide adequate and timely response against cyber attacks. We introduce game theory (GT) and biology inspired flight control algorithms to be run by each autonomous UAV to detect, localize and counteract rogue electromagnetic signal emitters. Each UAV positions itself such that the swarm tracks mobile adversaries while maintaining uniform node distribution and connectivity of the mobile ad-hoc network (MANET). UAVs use only their respective local neighbor information to determine their individual actions. Simulation experiments in OPNET show that our algorithms can provide an adequate area coverage over mobile interference sources. Our solution can be employed for civilian and military applications that require agile responses in dynamic environments.
一群自组织的自主无人驾驶区域飞行器(uav)可以在严峻的民用和军事环境中对网络攻击做出快速反应。然而,如果无人机群依赖于集中控制、群成员的同步、预先计划的行动或基于规则的系统,它可能无法对网络攻击提供充分和及时的响应。我们引入博弈论(GT)和受生物学启发的飞行控制算法,由每架自主无人机运行,以检测,定位和抵消流氓电磁信号发射器。每架无人机定位自身,使得蜂群跟踪移动对手,同时保持统一的节点分布和移动自组网(MANET)的连通性。无人机仅使用各自的局部邻居信息来确定各自的行动。在OPNET上的仿真实验表明,我们的算法可以在移动干扰源上提供足够的区域覆盖。我们的解决方案可用于需要在动态环境中灵活响应的民用和军用应用。
{"title":"Game Theory and Biology Inspired Flight Control for Autonomous UAVs Operating in Contested Environments","authors":"Janusz Kusyk, M. U. Uyar, Kelvin Ma, Kevin Budhu, Eltan Samoylov, Joseph Plishka, G. Bertoli, J. Boksiner, Dilip K. Guha","doi":"10.1109/Sarnoff47838.2019.9067828","DOIUrl":"https://doi.org/10.1109/Sarnoff47838.2019.9067828","url":null,"abstract":"A self-organizing swarm of autonomous unmanned areal vehicles (UAVs) can provide a quick response to cyber-attacks in austere civilian and military environments. However, if a UAV swarm relies on centralized control, synchronization of swarm members, pre-planned actions or rule-based systems, it may not provide adequate and timely response against cyber attacks. We introduce game theory (GT) and biology inspired flight control algorithms to be run by each autonomous UAV to detect, localize and counteract rogue electromagnetic signal emitters. Each UAV positions itself such that the swarm tracks mobile adversaries while maintaining uniform node distribution and connectivity of the mobile ad-hoc network (MANET). UAVs use only their respective local neighbor information to determine their individual actions. Simulation experiments in OPNET show that our algorithms can provide an adequate area coverage over mobile interference sources. Our solution can be employed for civilian and military applications that require agile responses in dynamic environments.","PeriodicalId":306134,"journal":{"name":"2019 IEEE 40th Sarnoff Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114682531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards An Explanatory Model for Network Traffic 网络流量的解释模型
Pub Date : 2019-09-01 DOI: 10.1109/Sarnoff47838.2019.9067816
Jorge Gonzalez, Joshua Clymer, Chad A. Bollmann
This work presents two explanatory mathematical models explaining how network traffic features that display Gaus-sian tendencies in single devices and small networks aggregate to alpha-stable processes in larger networks. The first model shows how self-similarity originates from an impulsive-noise-based representation of individual processes. A second model uses renewal processes to justify impulsive process aggregation to alpha-stable or Gaussian end states and permits estimating network traffic alpha-stable rates of convergence. We develop a model based on this first method to empirically validate this aggregation approach.
这项工作提出了两个解释性数学模型,解释了在单个设备和小型网络中显示高斯趋势的网络流量特征如何在大型网络中聚合为α稳定过程。第一个模型显示了自相似性是如何从单个过程的基于脉冲噪声的表示中产生的。第二个模型使用更新过程来证明脉冲过程聚合到α稳定或高斯端点状态,并允许估计网络流量的α稳定收敛速率。我们基于第一种方法开发了一个模型,以经验验证这种聚合方法。
{"title":"Towards An Explanatory Model for Network Traffic","authors":"Jorge Gonzalez, Joshua Clymer, Chad A. Bollmann","doi":"10.1109/Sarnoff47838.2019.9067816","DOIUrl":"https://doi.org/10.1109/Sarnoff47838.2019.9067816","url":null,"abstract":"This work presents two explanatory mathematical models explaining how network traffic features that display Gaus-sian tendencies in single devices and small networks aggregate to alpha-stable processes in larger networks. The first model shows how self-similarity originates from an impulsive-noise-based representation of individual processes. A second model uses renewal processes to justify impulsive process aggregation to alpha-stable or Gaussian end states and permits estimating network traffic alpha-stable rates of convergence. We develop a model based on this first method to empirically validate this aggregation approach.","PeriodicalId":306134,"journal":{"name":"2019 IEEE 40th Sarnoff Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115929625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A First Step Towards Production-Ready Network Function Storage: Benchmarking with NFSB 迈向生产就绪网络功能存储的第一步:NFSB基准测试
Pub Date : 2019-09-01 DOI: 10.1109/Sarnoff47838.2019.9067814
Haochen Pan, Yingjian Wu, Lewis Tseng, M. Rahman, Nakjung Choi
Recently, multiple research teams aimed to address the scalability and fault-tolerance issues of Network Functions (NFs) by implementing a storage system (or distributed shared object) to share state across NF instances. Each system demonstrated promising performance under specific scenarios. However, there are many more technical challenges to be addressed to build a production-ready storage system for NFs.In this paper, we enumerate these challenges, explain how some of them were addressed by previous systems, and discuss alternative promising solutions to tackle them. Most challenges remain as open problems, while others deserve more thorough study. The first goal of the paper is to provide a broad research agenda around this topic, by discussing more problems than solutions. Moreover, we advocate that the first step towards a production-ready system is to build a realistic yet extensible benchmarking tool to deploy, test, and analyze "network function storages" comprehensively. Toward this end, we present our tool – Network Function Storage Benchmarking (NFSB). Finally, we present some preliminary results using NFSB.
最近,多个研究团队致力于通过实现存储系统(或分布式共享对象)在NFs实例之间共享状态来解决网络功能(NFs)的可伸缩性和容错问题。每个系统在特定场景下都展示了良好的性能。但是,要为NFs构建一个生产就绪的存储系统,还需要解决更多的技术挑战。在本文中,我们列举了这些挑战,解释了以前的系统是如何解决其中一些挑战的,并讨论了解决这些挑战的有希望的替代解决方案。大多数挑战仍然是悬而未决的问题,而其他挑战则值得更深入的研究。本文的第一个目标是围绕这一主题提供一个广泛的研究议程,通过讨论更多的问题而不是解决方案。此外,我们主张,迈向生产就绪系统的第一步是构建一个现实的、可扩展的基准测试工具,以全面部署、测试和分析“网络功能存储”。为此,我们提出了我们的工具——网络功能存储基准测试(NFSB)。最后,我们给出了一些使用NFSB的初步结果。
{"title":"A First Step Towards Production-Ready Network Function Storage: Benchmarking with NFSB","authors":"Haochen Pan, Yingjian Wu, Lewis Tseng, M. Rahman, Nakjung Choi","doi":"10.1109/Sarnoff47838.2019.9067814","DOIUrl":"https://doi.org/10.1109/Sarnoff47838.2019.9067814","url":null,"abstract":"Recently, multiple research teams aimed to address the scalability and fault-tolerance issues of Network Functions (NFs) by implementing a storage system (or distributed shared object) to share state across NF instances. Each system demonstrated promising performance under specific scenarios. However, there are many more technical challenges to be addressed to build a production-ready storage system for NFs.In this paper, we enumerate these challenges, explain how some of them were addressed by previous systems, and discuss alternative promising solutions to tackle them. Most challenges remain as open problems, while others deserve more thorough study. The first goal of the paper is to provide a broad research agenda around this topic, by discussing more problems than solutions. Moreover, we advocate that the first step towards a production-ready system is to build a realistic yet extensible benchmarking tool to deploy, test, and analyze \"network function storages\" comprehensively. Toward this end, we present our tool – Network Function Storage Benchmarking (NFSB). Finally, we present some preliminary results using NFSB.","PeriodicalId":306134,"journal":{"name":"2019 IEEE 40th Sarnoff Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117086152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 IEEE 40th Sarnoff Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1