首页 > 最新文献

2021 IEEE 29th International Conference on Network Protocols (ICNP)最新文献

英文 中文
RIOT-AKA: cellular-like authentication over IoT devices IoT -又名:物联网设备上的类似蜂窝的身份验证
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651952
G. Bianchi, A. L. Rosa, Gabriele Restuccia
Many Internet-connected appliances are often moved to different environments, such as when they are re-located. And even when they are buried in a given physical environment, their ownership "moves", such as when a home or smart space changes hands. This calls for roaming-friendly IoT authentication devised to circumvent the need to deploy long-term authentication credentials across different visited domains. Noting that this issue has been very extensively addressed since at least three decades in cellular network, in this paper we integrate, within the RIOT IoT Operating system, an authentication and key agreement protocol designed to be as close as possible to the standard one used by 4G/5G cellular systems. Our design accounts for a few technical improvements made possible since, unlike the case of cellular networks, we are here free from back-ward compatibility issues. Our proof-of-concept implementation is built on COAP for the radio interface, and on HTTPS for the core network signaling parts, and can be further configured to use two different types of secret keys: pre-shared or on-demand, (re)generated via a SRAM-PUF API available in RIOT.
许多连接互联网的设备经常被移动到不同的环境中,例如当它们重新定位时。即使它们被埋在一个特定的物理环境中,它们的所有权也会“移动”,比如当一个家或一个智能空间易手时。这需要漫游友好的物联网身份验证,以避免在不同访问域部署长期身份验证凭据的需要。注意到这个问题已经在蜂窝网络中被广泛解决了至少三十年,在本文中,我们在RIOT物联网操作系统中集成了一个认证和密钥协议,该协议旨在尽可能接近4G/5G蜂窝系统使用的标准协议。我们的设计考虑了一些技术上的改进,因为与蜂窝网络的情况不同,我们在这里没有向后兼容性问题。我们的概念验证实现建立在无线电接口的COAP和核心网络信令部分的HTTPS上,并且可以进一步配置为使用两种不同类型的密钥:预共享或按需,(重新)通过RIOT中可用的SRAM-PUF API生成。
{"title":"RIOT-AKA: cellular-like authentication over IoT devices","authors":"G. Bianchi, A. L. Rosa, Gabriele Restuccia","doi":"10.1109/ICNP52444.2021.9651952","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651952","url":null,"abstract":"Many Internet-connected appliances are often moved to different environments, such as when they are re-located. And even when they are buried in a given physical environment, their ownership \"moves\", such as when a home or smart space changes hands. This calls for roaming-friendly IoT authentication devised to circumvent the need to deploy long-term authentication credentials across different visited domains. Noting that this issue has been very extensively addressed since at least three decades in cellular network, in this paper we integrate, within the RIOT IoT Operating system, an authentication and key agreement protocol designed to be as close as possible to the standard one used by 4G/5G cellular systems. Our design accounts for a few technical improvements made possible since, unlike the case of cellular networks, we are here free from back-ward compatibility issues. Our proof-of-concept implementation is built on COAP for the radio interface, and on HTTPS for the core network signaling parts, and can be further configured to use two different types of secret keys: pre-shared or on-demand, (re)generated via a SRAM-PUF API available in RIOT.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128823471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The integration of UAVs to the C-ITS Stack 将无人机集成到C-ITS堆栈
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651976
Felipe Valle, M. Cooney, Konstantin Mikhaylov, A. Vinel
In this paper, we conceptualise and propose integrating UAVs with Intelligent Transportation Systems (ITS) based on using the Cooperative-ITS (C-ITS) framework. We start by discussing the state of the art and pinpointing some of the reasons for integration and the applications that the envisaged integration would enable. Next, we recall the critical aspects of the state of the art C-ITS connectivity and discuss how seamless integration of UAVs into C-ITS can be achieved. Notably, we show that encapsulation of UAVs in C-ITS does not imply significant changes for the currently existing mechanisms and data formats. Finally, we discuss some of the open research challenges related to the integration and operation of the integrated systems and pinpoint some mechanisms which can help to address these.
在本文中,我们概念化并提出了基于合作ITS (C-ITS)框架将无人机与智能交通系统(ITS)集成。我们首先讨论技术的现状,并指出集成的一些原因以及设想的集成将支持的应用程序。接下来,我们回顾了最先进的C-ITS连接的关键方面,并讨论了如何实现无人机与C-ITS的无缝集成。值得注意的是,我们表明在C-ITS中封装无人机并不意味着对当前现有机制和数据格式的重大改变。最后,我们讨论了一些与集成系统的集成和操作相关的开放研究挑战,并指出了一些有助于解决这些问题的机制。
{"title":"The integration of UAVs to the C-ITS Stack","authors":"Felipe Valle, M. Cooney, Konstantin Mikhaylov, A. Vinel","doi":"10.1109/ICNP52444.2021.9651976","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651976","url":null,"abstract":"In this paper, we conceptualise and propose integrating UAVs with Intelligent Transportation Systems (ITS) based on using the Cooperative-ITS (C-ITS) framework. We start by discussing the state of the art and pinpointing some of the reasons for integration and the applications that the envisaged integration would enable. Next, we recall the critical aspects of the state of the art C-ITS connectivity and discuss how seamless integration of UAVs into C-ITS can be achieved. Notably, we show that encapsulation of UAVs in C-ITS does not imply significant changes for the currently existing mechanisms and data formats. Finally, we discuss some of the open research challenges related to the integration and operation of the integrated systems and pinpoint some mechanisms which can help to address these.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129640248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Constraint-Aware Deep Reinforcement Learning for End-to-End Resource Orchestration in Mobile Networks 面向移动网络端到端资源编排的约束感知深度强化学习
Pub Date : 2021-10-08 DOI: 10.1109/ICNP52444.2021.9651934
Qiang Liu, Nakjung Choi, Tao Han
Network slicing is a promising technology that allows mobile network operators to efficiently serve various emerging use cases in 5G. It is challenging to optimize the utilization of network infrastructures while guaranteeing the performance of network slices according to service level agreements (SLAs). To solve this problem, we propose SafeSlicing that introduces a new constraint-aware deep reinforcement learning (CaDRL) algorithm to learn the optimal resource orchestration policy within two steps, i.e., offline training in a simulated environment and online learning with the real network system. On optimizing the resource orchestration, we incorporate the constraints on the statistical performance of slices in the reward function using Lagrangian multipliers, and solve the Lagrangian relaxed problem via a policy network. To satisfy the constraints on the system capacity, we design a constraint network to map the latent actions generated from the policy network to the orchestration actions such that the total resources allocated to network slices do not exceed the system capacity. We prototype SafeSlicing on an end-to-end testbed developed by using OpenAirInterface LTE, OpenDayLight-based SDN, and CUDA GPU computing platform. The experimental results show that SafeSlicing reduces more than 20% resource usage while meeting SLAs of network slices as compared with other solutions.
网络切片是一项很有前途的技术,它允许移动网络运营商在5G中有效地服务各种新兴用例。如何根据服务水平协议(sla)在保证网络切片性能的同时优化网络基础设施的利用率是一个挑战。为了解决这一问题,我们提出了SafeSlicing算法,该算法引入了一种新的约束感知深度强化学习(CaDRL)算法,在模拟环境下的离线训练和真实网络系统的在线学习两步内学习到最优的资源编排策略。在优化资源编排方面,我们利用拉格朗日乘子在奖励函数中加入对切片统计性能的约束,并通过策略网络解决拉格朗日松弛问题。为了满足对系统容量的约束,我们设计了一个约束网络,将策略网络生成的潜在动作映射到编排动作,使分配给网络片的总资源不超过系统容量。我们在使用OpenAirInterface LTE、基于opendaylight的SDN和CUDA GPU计算平台开发的端到端测试平台上对SafeSlicing进行了原型设计。实验结果表明,与其他解决方案相比,safesslicing在满足网络切片sla的同时,减少了20%以上的资源使用。
{"title":"Constraint-Aware Deep Reinforcement Learning for End-to-End Resource Orchestration in Mobile Networks","authors":"Qiang Liu, Nakjung Choi, Tao Han","doi":"10.1109/ICNP52444.2021.9651934","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651934","url":null,"abstract":"Network slicing is a promising technology that allows mobile network operators to efficiently serve various emerging use cases in 5G. It is challenging to optimize the utilization of network infrastructures while guaranteeing the performance of network slices according to service level agreements (SLAs). To solve this problem, we propose SafeSlicing that introduces a new constraint-aware deep reinforcement learning (CaDRL) algorithm to learn the optimal resource orchestration policy within two steps, i.e., offline training in a simulated environment and online learning with the real network system. On optimizing the resource orchestration, we incorporate the constraints on the statistical performance of slices in the reward function using Lagrangian multipliers, and solve the Lagrangian relaxed problem via a policy network. To satisfy the constraints on the system capacity, we design a constraint network to map the latent actions generated from the policy network to the orchestration actions such that the total resources allocated to network slices do not exceed the system capacity. We prototype SafeSlicing on an end-to-end testbed developed by using OpenAirInterface LTE, OpenDayLight-based SDN, and CUDA GPU computing platform. The experimental results show that SafeSlicing reduces more than 20% resource usage while meeting SLAs of network slices as compared with other solutions.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114998640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Partial Symbol Recovery for Interference Resilience in Low-Power Wide Area Networks 低功耗广域网抗干扰的部分符号恢复
Pub Date : 2021-09-08 DOI: 10.1109/ICNP52444.2021.9651936
Kai Sun, Zhimeng Yin, Weiwei Chen, Shuai Wang, Zeyu Zhang, Tian He
Recent years have witnessed the proliferation of Low-power Wide Area Networks (LPWANs) in the unlicensed band for various Internet-of-Things (IoT) applications. Due to the ultra-low transmission power and long transmission duration, LPWAN devices inevitably suffer from high power Cross Technology Interference (CTI), such as interference from Wi-Fi, coexisting in the same spectrum. To alleviate this issue, this paper introduces the Partial Symbol Recovery (PSR) scheme for improving the CTI resilience of LPWAN. We verify our idea on LoRa, a widely adopted LPWAN technique, as a proof of concept.At the PHY layer, although CTI has much higher power, its duration is relatively shorter compared with LoRa symbols, leaving part of a LoRa symbol uncorrupted. Moreover, due to its high redundancy, LoRa chips within a symbol are highly correlated. This opens the possibility of detecting a LoRa symbol with only part of the chips. By examining the unique frequency patterns in LoRa symbols with time-frequency analysis, our design effectively detects the clean LoRa chips that are free of CTI. This enables PSR to only rely on clean LoRa chips for successfully recovering from communication failures. We evaluate our PSR design with real-world testbeds, including SX1280 LoRa chips and USRP B210, under Wi-Fi interference in various scenarios. Extensive experiments demonstrate that our design offers reliable packet recovery performance, successfully boosting the LoRa packet reception ratio from 45.2% to 82.2% with a performance gain of 1.8×.
近年来,各种物联网(IoT)应用的无授权频段低功耗广域网(lpwan)激增。由于超低的传输功率和较长的传输时间,LPWAN设备不可避免地会受到高功率的跨技术干扰(CTI),例如来自Wi-Fi的干扰,在同一频谱中共存。为了解决这一问题,本文引入了部分符号恢复(PSR)方案来提高LPWAN的CTI弹性。我们在LoRa(一种广泛采用的LPWAN技术)上验证了我们的想法,作为概念验证。在物理层,虽然CTI具有更高的功率,但与LoRa符号相比,它的持续时间相对较短,使得部分LoRa符号未被损坏。此外,由于其高冗余性,一个符号内的LoRa芯片高度相关。这开启了仅用部分芯片检测LoRa符号的可能性。通过使用时频分析检查LoRa符号中的独特频率模式,我们的设计有效地检测了无CTI的干净LoRa芯片。这使得PSR仅依靠干净的LoRa芯片成功地从通信故障中恢复。我们通过实际测试平台(包括SX1280 LoRa芯片和USRP B210)在各种场景下的Wi-Fi干扰下评估了我们的PSR设计。大量的实验表明,我们的设计提供了可靠的数据包恢复性能,成功地将LoRa数据包接收率从45.2%提高到82.2%,性能增益为1.8倍。
{"title":"Partial Symbol Recovery for Interference Resilience in Low-Power Wide Area Networks","authors":"Kai Sun, Zhimeng Yin, Weiwei Chen, Shuai Wang, Zeyu Zhang, Tian He","doi":"10.1109/ICNP52444.2021.9651936","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651936","url":null,"abstract":"Recent years have witnessed the proliferation of Low-power Wide Area Networks (LPWANs) in the unlicensed band for various Internet-of-Things (IoT) applications. Due to the ultra-low transmission power and long transmission duration, LPWAN devices inevitably suffer from high power Cross Technology Interference (CTI), such as interference from Wi-Fi, coexisting in the same spectrum. To alleviate this issue, this paper introduces the Partial Symbol Recovery (PSR) scheme for improving the CTI resilience of LPWAN. We verify our idea on LoRa, a widely adopted LPWAN technique, as a proof of concept.At the PHY layer, although CTI has much higher power, its duration is relatively shorter compared with LoRa symbols, leaving part of a LoRa symbol uncorrupted. Moreover, due to its high redundancy, LoRa chips within a symbol are highly correlated. This opens the possibility of detecting a LoRa symbol with only part of the chips. By examining the unique frequency patterns in LoRa symbols with time-frequency analysis, our design effectively detects the clean LoRa chips that are free of CTI. This enables PSR to only rely on clean LoRa chips for successfully recovering from communication failures. We evaluate our PSR design with real-world testbeds, including SX1280 LoRa chips and USRP B210, under Wi-Fi interference in various scenarios. Extensive experiments demonstrate that our design offers reliable packet recovery performance, successfully boosting the LoRa packet reception ratio from 45.2% to 82.2% with a performance gain of 1.8×.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122069646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Achieving Deterministic Service in Mobile Edge Computing (MEC) Networks 移动边缘计算(MEC)网络中确定性服务的实现
Pub Date : 2021-09-06 DOI: 10.1109/ICNP52444.2021.9651958
Binwei Wu, Jiasen Wang, Yanyan Wang, Weiqiang Tan, Yudong Huang
Mobile edge computing (MEC) is proposed to boost high-efficient and time-sensitive 5G applications. However, the "microburst" may occur even in lightly-loaded scenarios, which leads to the indeterministic service latency, hence hindering the deployment of MEC. Deterministic IP networking (DIP) has been proposed to provide bounds on latency, and high reliability in the large-scale networks. Nevertheless, the direct migration of DIP into the MEC network is non-trivial owing to its original design for the Ethernet with homogeneous devices. Meanwhile, DIP also faces the challenges on the network throughput and scheduling flexibility. In this paper, we delve into the adoption of DIP for the MEC networks and some of the relevant aspects. A deterministic MEC (D-MEC) network is proposed to deliver the deterministic MEC service. In the D-MEC network, the cycle mapping and cycle shifting are designed to enable: (i) seamless and deterministic transmission with heterogeneous underlaid resources; and (ii) traffic shaping on the edges to improve the resource utilization. We also formulate a joint configuration to maximize the network throughput with deterministic QoS guarantees. Extensive simulations verify that the proposed D-MEC network can achieve a deterministic MEC service, even in the highly-loaded scenarios.
移动边缘计算(MEC)的提出是为了促进高效和时间敏感的5G应用。然而,即使在轻负载情况下也可能出现“微突发”,导致业务延迟的不确定性,从而阻碍了MEC的部署。确定性IP网络(DIP)的提出是为了在大规模网络中提供时延限制和高可靠性。然而,由于DIP的最初设计是针对具有同质设备的以太网,因此直接迁移到MEC网络是不容易的。同时,DIP也面临着网络吞吐量和调度灵活性方面的挑战。本文对MEC网络采用DIP及相关方面进行了深入研究。提出了一种提供确定性MEC服务的确定性MEC (D-MEC)网络。在D-MEC网络中,周期映射和周期转换旨在实现:(i)具有异构底层资源的无缝和确定性传输;(二)对边缘进行流量整形,提高资源利用率。我们还制定了一个联合配置,以最大限度地提高网络吞吐量和确定性的QoS保证。大量的仿真验证了所提出的D-MEC网络即使在高负载情况下也可以实现确定性的MEC服务。
{"title":"Achieving Deterministic Service in Mobile Edge Computing (MEC) Networks","authors":"Binwei Wu, Jiasen Wang, Yanyan Wang, Weiqiang Tan, Yudong Huang","doi":"10.1109/ICNP52444.2021.9651958","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651958","url":null,"abstract":"Mobile edge computing (MEC) is proposed to boost high-efficient and time-sensitive 5G applications. However, the \"microburst\" may occur even in lightly-loaded scenarios, which leads to the indeterministic service latency, hence hindering the deployment of MEC. Deterministic IP networking (DIP) has been proposed to provide bounds on latency, and high reliability in the large-scale networks. Nevertheless, the direct migration of DIP into the MEC network is non-trivial owing to its original design for the Ethernet with homogeneous devices. Meanwhile, DIP also faces the challenges on the network throughput and scheduling flexibility. In this paper, we delve into the adoption of DIP for the MEC networks and some of the relevant aspects. A deterministic MEC (D-MEC) network is proposed to deliver the deterministic MEC service. In the D-MEC network, the cycle mapping and cycle shifting are designed to enable: (i) seamless and deterministic transmission with heterogeneous underlaid resources; and (ii) traffic shaping on the edges to improve the resource utilization. We also formulate a joint configuration to maximize the network throughput with deterministic QoS guarantees. Extensive simulations verify that the proposed D-MEC network can achieve a deterministic MEC service, even in the highly-loaded scenarios.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115637707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Is Machine Learning Ready for Traffic Engineering Optimization? 机器学习为交通工程优化做好准备了吗?
Pub Date : 2021-09-03 DOI: 10.1109/ICNP52444.2021.9651930
Guillermo Bernárdez, Jos'e Su'arez-Varela, Albert Lopez, Bo-Xi Wu, Shihan Xiao, Xiangle Cheng, P. Barlet-Ros, A. Cabellos-Aparicio
Traffic Engineering (TE) is a basic building block of the Internet. In this paper, we analyze whether modern Machine Learning (ML) methods are ready to be used for TE optimization. We address this open question through a comparative analysis between the state of the art in ML and the state of the art in TE. To this end, we first present a novel distributed system for TE that leverages the latest advancements in ML. Our system implements a novel architecture that combines Multi-Agent Reinforcement Learning (MARL) and Graph Neural Networks (GNN) to minimize network congestion. In our evaluation, we compare our MARL+GNN system with DEFO, a network optimizer based on Constraint Programming that represents the state of the art in TE. Our experimental results show that the proposed MARL+GNN solution achieves equivalent performance to DEFO in a wide variety of network scenarios including three real-world network topologies. At the same time, we show that MARL+GNN can achieve significant reductions in execution time (from the scale of minutes with DEFO to a few seconds with our solution).
流量工程(TE)是互联网的基本组成部分。在本文中,我们分析了现代机器学习(ML)方法是否已经准备好用于TE优化。我们通过ML的最新技术和TE的最新技术之间的比较分析来解决这个开放性问题。为此,我们首先提出了一种利用机器学习最新进展的新型分布式TE系统。我们的系统实现了一种结合了多智能体强化学习(MARL)和图神经网络(GNN)的新型架构,以最大限度地减少网络拥塞。在我们的评估中,我们将MARL+GNN系统与DEFO进行了比较,DEFO是一种基于约束规划的网络优化器,代表了TE中最先进的技术。我们的实验结果表明,提出的MARL+GNN解决方案在包括三种真实网络拓扑在内的各种网络场景中实现了与DEFO相当的性能。同时,我们证明了MARL+GNN可以显著减少执行时间(从DEFO的几分钟到我们的解决方案的几秒钟)。
{"title":"Is Machine Learning Ready for Traffic Engineering Optimization?","authors":"Guillermo Bernárdez, Jos'e Su'arez-Varela, Albert Lopez, Bo-Xi Wu, Shihan Xiao, Xiangle Cheng, P. Barlet-Ros, A. Cabellos-Aparicio","doi":"10.1109/ICNP52444.2021.9651930","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651930","url":null,"abstract":"Traffic Engineering (TE) is a basic building block of the Internet. In this paper, we analyze whether modern Machine Learning (ML) methods are ready to be used for TE optimization. We address this open question through a comparative analysis between the state of the art in ML and the state of the art in TE. To this end, we first present a novel distributed system for TE that leverages the latest advancements in ML. Our system implements a novel architecture that combines Multi-Agent Reinforcement Learning (MARL) and Graph Neural Networks (GNN) to minimize network congestion. In our evaluation, we compare our MARL+GNN system with DEFO, a network optimizer based on Constraint Programming that represents the state of the art in TE. Our experimental results show that the proposed MARL+GNN solution achieves equivalent performance to DEFO in a wide variety of network scenarios including three real-world network topologies. At the same time, we show that MARL+GNN can achieve significant reductions in execution time (from the scale of minutes with DEFO to a few seconds with our solution).","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126764973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
NetFC: Enabling Accurate Floating-point Arithmetic on Programmable Switches NetFC:在可编程交换机上实现精确浮点运算
Pub Date : 2021-06-10 DOI: 10.1109/ICNP52444.2021.9651946
Penglai Cui, H. Pan, Zhenyu Li, Jiaoren Wu, Shengzhuo Zhang, Xingwu Yang, Hongtao Guan, Gaogang Xie
Programmable switches are recently used for accelerating data-intensive distributed applications. Some computational tasks, traditionally performed on servers in data centers, are offloaded to the network on programmable switches. These tasks may require the support of on-the-fly floatingpoint operations. Unfortunately, the computational capacity of programmable switches is limited to simple integer arithmetic operations. To address this issue, prior approaches either adopt a float-to-integer method or rely on local CPUs of switches, incurring accuracy loss and delayed processing.To this end, we propose NetFC, a table-lookup method to achieve on-the-fly in-network floating-point arithmetic operations nearly without accuracy loss. NetFC adopts a divide-and-conquer mechanism that converts the original huge table into several much smaller tables that are operated by the built-in integer operations. NetFC further leverages a scaling-factor mechanism for improving computational accuracy, and a prefix-based lossless table compression method to reduce memory consumption. We use both synthetic and real-life datasets to evaluate NetFC. The experimental results show that the average accuracy of NetFC is above 99.94% with only 448KB memory consumption. Furthermore, we integrate NetFC into Sonata [12] for detecting Slowloris attack, yielding significant decrease of detection delay.
可编程交换机最近被用于加速数据密集型分布式应用。一些传统上在数据中心的服务器上执行的计算任务,通过可编程交换机转移到网络上。这些任务可能需要支持动态浮点操作。不幸的是,可编程开关的计算能力仅限于简单的整数算术运算。为了解决这个问题,以前的方法要么采用浮点到整数的方法,要么依赖交换机的本地cpu,这会导致精度损失和处理延迟。为此,我们提出了NetFC,这是一种表查找方法,可以在几乎没有精度损失的情况下实现网络中的动态浮点算术运算。NetFC采用了一种分而治之的机制,将原来的大表转换成几个更小的表,这些表由内置的整数操作来操作。NetFC进一步利用缩放因子机制来提高计算精度,并利用基于前缀的无损表压缩方法来减少内存消耗。我们使用合成数据集和真实数据集来评估NetFC。实验结果表明,在仅消耗448KB内存的情况下,NetFC的平均准确率达到99.94%以上。此外,我们将NetFC集成到Sonata[12]中用于检测Slowloris攻击,显著降低了检测延迟。
{"title":"NetFC: Enabling Accurate Floating-point Arithmetic on Programmable Switches","authors":"Penglai Cui, H. Pan, Zhenyu Li, Jiaoren Wu, Shengzhuo Zhang, Xingwu Yang, Hongtao Guan, Gaogang Xie","doi":"10.1109/ICNP52444.2021.9651946","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651946","url":null,"abstract":"Programmable switches are recently used for accelerating data-intensive distributed applications. Some computational tasks, traditionally performed on servers in data centers, are offloaded to the network on programmable switches. These tasks may require the support of on-the-fly floatingpoint operations. Unfortunately, the computational capacity of programmable switches is limited to simple integer arithmetic operations. To address this issue, prior approaches either adopt a float-to-integer method or rely on local CPUs of switches, incurring accuracy loss and delayed processing.To this end, we propose NetFC, a table-lookup method to achieve on-the-fly in-network floating-point arithmetic operations nearly without accuracy loss. NetFC adopts a divide-and-conquer mechanism that converts the original huge table into several much smaller tables that are operated by the built-in integer operations. NetFC further leverages a scaling-factor mechanism for improving computational accuracy, and a prefix-based lossless table compression method to reduce memory consumption. We use both synthetic and real-life datasets to evaluate NetFC. The experimental results show that the average accuracy of NetFC is above 99.94% with only 448KB memory consumption. Furthermore, we integrate NetFC into Sonata [12] for detecting Slowloris attack, yielding significant decrease of detection delay.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131861151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2021 IEEE 29th International Conference on Network Protocols (ICNP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1