Pub Date : 2016-07-04DOI: 10.1109/NOMS.2016.7502812
E. S. Spalla, D. Mafioletti, A. Liberato, G. Ewald, Christian Esteve Rothenberg, Lásaro J. Camargos, R. Villaça, M. Martinello
Software Defined Networking (SDN) is a promising architectural approach based on a programmatic separation of the control and data planes. For high availability purposes, logically centralized SDN controllers follow a distributed implementation. While controller role features in the OpenFlow protocol allow switches to communicate with multiple controllers, these mechanisms alone are not sufficient to guarantee a resilient control plane, leaving the actual implementation as open challenge for SDN designers. This paper explores OpenFlow roles for the design of resilient SDN control plane and proposes AR2C2 as an actively replicated multi-controller strategy. As proof of concept, AR2C2 is implemented based on the Ryu controller and relying on OpenReplica to ensure consistent state among the distributed controllers. Our prototype is experimentally evaluated using real commodity switches and Mininet emulated environment. Results of the measured times to recover from failures for different workloads shed some light on the practical trade-offs on replication overhead and latency as a step forward towards SDN resiliency.
{"title":"AR2C2: Actively replicated controllers for SDN resilient control plane","authors":"E. S. Spalla, D. Mafioletti, A. Liberato, G. Ewald, Christian Esteve Rothenberg, Lásaro J. Camargos, R. Villaça, M. Martinello","doi":"10.1109/NOMS.2016.7502812","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502812","url":null,"abstract":"Software Defined Networking (SDN) is a promising architectural approach based on a programmatic separation of the control and data planes. For high availability purposes, logically centralized SDN controllers follow a distributed implementation. While controller role features in the OpenFlow protocol allow switches to communicate with multiple controllers, these mechanisms alone are not sufficient to guarantee a resilient control plane, leaving the actual implementation as open challenge for SDN designers. This paper explores OpenFlow roles for the design of resilient SDN control plane and proposes AR2C2 as an actively replicated multi-controller strategy. As proof of concept, AR2C2 is implemented based on the Ryu controller and relying on OpenReplica to ensure consistent state among the distributed controllers. Our prototype is experimentally evaluated using real commodity switches and Mininet emulated environment. Results of the measured times to recover from failures for different workloads shed some light on the practical trade-offs on replication overhead and latency as a step forward towards SDN resiliency.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"374 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133317271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-04DOI: 10.1109/NOMS.2016.7502925
M. Wullink, G. Moura, M. Müller, Cristian Hesselman
We present ENTRADA, a high-performance data streaming warehouse that enables researchers and operators to analyze vast amounts of network traffic and measurement data within interactive response times (seconds to few minutes), even in a small computer cluster. ENTRADA delivers such performance by employing a optimized file format and a high-performance query engine, both open-source. ENTRADA has been operational for more than 1.5 years, having ingested more than 100 TB of pcap files from two .nl DNS authoritative servers. As we discuss, we use this data in projects that aim at further increasing the security and stability of the .nl zone. We present in this paper our design choices, experiences, and a performance evaluation of ENTRADA. Finally, we open-source ENTRADA, which can be used “out-of-the-box” by researchers, operators, and registries to deploy their own networking analysis clusters for DNS traffic, and can be easily extended to handle any other structured data.
{"title":"ENTRADA: A high-performance network traffic data streaming warehouse","authors":"M. Wullink, G. Moura, M. Müller, Cristian Hesselman","doi":"10.1109/NOMS.2016.7502925","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502925","url":null,"abstract":"We present ENTRADA, a high-performance data streaming warehouse that enables researchers and operators to analyze vast amounts of network traffic and measurement data within interactive response times (seconds to few minutes), even in a small computer cluster. ENTRADA delivers such performance by employing a optimized file format and a high-performance query engine, both open-source. ENTRADA has been operational for more than 1.5 years, having ingested more than 100 TB of pcap files from two .nl DNS authoritative servers. As we discuss, we use this data in projects that aim at further increasing the security and stability of the .nl zone. We present in this paper our design choices, experiences, and a performance evaluation of ENTRADA. Finally, we open-source ENTRADA, which can be used “out-of-the-box” by researchers, operators, and registries to deploy their own networking analysis clusters for DNS traffic, and can be easily extended to handle any other structured data.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133867905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-04DOI: 10.1109/NOMS.2016.7502908
Yuhang Ye, Yuansong Qiao, Brian A. Lee, Niall Murray
The Internet of Things (IoT) places significant demands on network infrastructure in order to process data captured by ubiquitous sensor devices. One existing technique to support this sensor data processing involves transporting captured data to cloud servers. This approach suffers from numerous issues such as increased transmission costs i.e. bandwidth consumption and delays. To help resolve these issues, this paper proposes Programmable IoT (PIoT), a novel IoT data processing architecture. It is an application layer design which operates over Named Data Networking (NDN) to enable the execution of reconfigurable processing-logic in the network. In addition, a novel naming scheme and computation service for IoT is presented to describe the processing requirements using Lambda Expressions. To verify the feasibility of our design, a real-world implementation was created and evaluated. It compares efficiency of the in-network versus out-network approaches.
{"title":"PIoT: Programmable IoT using Information Centric Networking","authors":"Yuhang Ye, Yuansong Qiao, Brian A. Lee, Niall Murray","doi":"10.1109/NOMS.2016.7502908","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502908","url":null,"abstract":"The Internet of Things (IoT) places significant demands on network infrastructure in order to process data captured by ubiquitous sensor devices. One existing technique to support this sensor data processing involves transporting captured data to cloud servers. This approach suffers from numerous issues such as increased transmission costs i.e. bandwidth consumption and delays. To help resolve these issues, this paper proposes Programmable IoT (PIoT), a novel IoT data processing architecture. It is an application layer design which operates over Named Data Networking (NDN) to enable the execution of reconfigurable processing-logic in the network. In addition, a novel naming scheme and computation service for IoT is presented to describe the processing requirements using Lambda Expressions. To verify the feasibility of our design, a real-world implementation was created and evaluated. It compares efficiency of the in-network versus out-network approaches.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122091879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-04DOI: 10.1109/NOMS.2016.7503003
Teodora Sandra Buda, H. Assem, Lei Xu, D. Raz, Udi Margolin, Elisha J. Rosensweig, D. López, M. Corici, M. Smirnov, R. Mullins, Olga Uryupina, A. Mozo, B. Rubio, Ángel Martín, A. Alloush, Pat O'Sullivan, I. B. Yahia
5G represents the next generation of communication networks and services, and will bring a new set of use cases and scenarios. These in turn will address a new set of challenges from the network and service management perspective, such as network traffic and resource management, big data management and energy efficiency. Consequently, novel techniques and strategies are required to address these challenges in a smarter way. In this paper, we present the limitations of the current network and service management and describe in detail the challenges that 5G is expected to face from a management perspective. The main contribution of this paper is presenting a set of use cases and scenarios of 5G in which machine learning can aid in addressing their management challenges. It is expected that machine learning can provide a higher and more intelligent level of monitoring and management of networks and applications, improve operational efficiencies and facilitate the requirements of the future 5G network.
{"title":"Can machine learning aid in delivering new use cases and scenarios in 5G?","authors":"Teodora Sandra Buda, H. Assem, Lei Xu, D. Raz, Udi Margolin, Elisha J. Rosensweig, D. López, M. Corici, M. Smirnov, R. Mullins, Olga Uryupina, A. Mozo, B. Rubio, Ángel Martín, A. Alloush, Pat O'Sullivan, I. B. Yahia","doi":"10.1109/NOMS.2016.7503003","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7503003","url":null,"abstract":"5G represents the next generation of communication networks and services, and will bring a new set of use cases and scenarios. These in turn will address a new set of challenges from the network and service management perspective, such as network traffic and resource management, big data management and energy efficiency. Consequently, novel techniques and strategies are required to address these challenges in a smarter way. In this paper, we present the limitations of the current network and service management and describe in detail the challenges that 5G is expected to face from a management perspective. The main contribution of this paper is presenting a set of use cases and scenarios of 5G in which machine learning can aid in addressing their management challenges. It is expected that machine learning can provide a higher and more intelligent level of monitoring and management of networks and applications, improve operational efficiencies and facilitate the requirements of the future 5G network.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130960561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-04DOI: 10.1109/NOMS.2016.7502998
Zubair Amjad, Wang-Cheol Song, Khi-Jung Ahn, M. Shoaib
Data aggregation for VANETs is considered a vital building block for many applications due to its bandwidth saving potential. In this paper, we propose a novel context aware data aggregation technique for VANETs. The data aggregation is done by the cluster head based on the context i.e. vehicle speed and density to reduces the required bandwidth for periodic data dissemination. The proposed technique is validated through extensive simulations and results show that context aware data aggregation can significantly reduce communication cost.
{"title":"Context aware data aggregation in vehicular ad-hoc networks","authors":"Zubair Amjad, Wang-Cheol Song, Khi-Jung Ahn, M. Shoaib","doi":"10.1109/NOMS.2016.7502998","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502998","url":null,"abstract":"Data aggregation for VANETs is considered a vital building block for many applications due to its bandwidth saving potential. In this paper, we propose a novel context aware data aggregation technique for VANETs. The data aggregation is done by the cluster head based on the context i.e. vehicle speed and density to reduces the required bandwidth for periodic data dissemination. The proposed technique is validated through extensive simulations and results show that context aware data aggregation can significantly reduce communication cost.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129760010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-04DOI: 10.1109/NOMS.2016.7502934
Feng Yan, E. Smirni
In the era of global, large scale data centers residing in clouds, many applications and users share the same pool of resources for the purpose of reducing costs while maintaining high performance. When multiple workloads access the same resources concurrently, their requests are interleaved, possibly causing delays. Providing performance isolation to individual workloads such that they meet their own performance objectives is important and challenging. The challenge lies in finding accurate, robust, compact metrics and models that drive algorithms which can meet different performance objectives while achieving efficient utilization of resources. This dissertation proposes a set of methodologies and tools aiming at solving the challenging performance isolation problem of workload interleaving in data centers, focusing on both storage components and computing components. At the storage node level, we consider methodologies for better interleaving user traffic with background workloads, such as tasks for improving reliability, availability, and power savings. At the storage cluster level, we propose methodologies on how to efficiently conduct work consolidation and schedule asynchronous updates without violating user performance targets. At the computing node level, we present priority scheduling middleware that employs different policies to schedule background tasks. Finally, at the computing cluster level, we develop a new Hadoop scheduler called DyScale to exploit capabilities offered by heterogeneous cores in order to achieve a variety of performance objectives. All works have been evaluated through extensive simulation using enterprise traces or real testbed implementation, and have been accepted for publications in leading performance conferences.
{"title":"Workload interleaving with performance guarantees in data centers","authors":"Feng Yan, E. Smirni","doi":"10.1109/NOMS.2016.7502934","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502934","url":null,"abstract":"In the era of global, large scale data centers residing in clouds, many applications and users share the same pool of resources for the purpose of reducing costs while maintaining high performance. When multiple workloads access the same resources concurrently, their requests are interleaved, possibly causing delays. Providing performance isolation to individual workloads such that they meet their own performance objectives is important and challenging. The challenge lies in finding accurate, robust, compact metrics and models that drive algorithms which can meet different performance objectives while achieving efficient utilization of resources. This dissertation proposes a set of methodologies and tools aiming at solving the challenging performance isolation problem of workload interleaving in data centers, focusing on both storage components and computing components. At the storage node level, we consider methodologies for better interleaving user traffic with background workloads, such as tasks for improving reliability, availability, and power savings. At the storage cluster level, we propose methodologies on how to efficiently conduct work consolidation and schedule asynchronous updates without violating user performance targets. At the computing node level, we present priority scheduling middleware that employs different policies to schedule background tasks. Finally, at the computing cluster level, we develop a new Hadoop scheduler called DyScale to exploit capabilities offered by heterogeneous cores in order to achieve a variety of performance objectives. All works have been evaluated through extensive simulation using enterprise traces or real testbed implementation, and have been accepted for publications in leading performance conferences.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123147028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-04DOI: 10.1109/NOMS.2016.7502948
K. Dandin, Ibrahim Hökelek, Günes Karabulut-Kurt
Network Function Virtualization (NFV) is utilized to simplfy the deployment and management of constantly evolving and highly complex networking services. In this paper, we propose a dynamic load management framework for IMS networks using NFV, where IMS functions are created within a single virtual machine (VM) instance and moved to the cloud environment. Requests coming from the IMS clients are first processed by a Load Balancer module to efficiently distribute the incoming load over a pool of IMS VMs. The decision of switching an IMS VM instance on or off is performed by the VM provisioning service using the resource utilization information periodically received from the IMS VMs. The proof-of-concept experiments using a realistic testbed demonstrate that the proposed framework increases the scalability of the IMS networks when there are sudden significant increases in traffic.
网络功能虚拟化(Network Function Virtualization, NFV)是一种简化不断发展和高度复杂的网络业务的部署和管理的技术。在本文中,我们为使用NFV的IMS网络提出了一个动态负载管理框架,其中IMS功能在单个虚拟机(VM)实例中创建并移动到云环境中。来自IMS客户机的请求首先由Load Balancer模块处理,以便将传入的负载有效地分配到IMS vm池中。打开或关闭IMS虚拟机实例是由虚拟机发放服务根据从IMS虚拟机定期接收到的资源利用率信息来决定的。使用实际测试平台的概念验证实验表明,当流量突然显著增加时,所提出的框架提高了IMS网络的可伸缩性。
{"title":"Dynamic load management for IMS networks using network function virtualization","authors":"K. Dandin, Ibrahim Hökelek, Günes Karabulut-Kurt","doi":"10.1109/NOMS.2016.7502948","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502948","url":null,"abstract":"Network Function Virtualization (NFV) is utilized to simplfy the deployment and management of constantly evolving and highly complex networking services. In this paper, we propose a dynamic load management framework for IMS networks using NFV, where IMS functions are created within a single virtual machine (VM) instance and moved to the cloud environment. Requests coming from the IMS clients are first processed by a Load Balancer module to efficiently distribute the incoming load over a pool of IMS VMs. The decision of switching an IMS VM instance on or off is performed by the VM provisioning service using the resource utilization information periodically received from the IMS VMs. The proof-of-concept experiments using a realistic testbed demonstrate that the proposed framework increases the scalability of the IMS networks when there are sudden significant increases in traffic.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125494631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-04DOI: 10.1109/NOMS.2016.7502964
Fariba Haddadi, Duong-Tien Phan, A. N. Zincir-Heywood
Given that botnets represent one of the most aggressive threats against cybersecurity, various detection approaches have been studied. However, whichever approach is used, the evolving nature of botnets and the required pre-defined botnet detection rule sets employed may affect the performance of detection systems. In this work, we explore the effectiveness two rule based systems and two machine learning (ML) based techniques with different feature extraction methods (packet payload based and traffic flow based). The performance of these detection systems range from 0% to 100% on thirteen public botnet data sets (i.e. CTU-13). We further analyze the performances of these systems in order to understand which type of a detection system is more effective for which type of an application.
{"title":"How to choose from different botnet detection systems?","authors":"Fariba Haddadi, Duong-Tien Phan, A. N. Zincir-Heywood","doi":"10.1109/NOMS.2016.7502964","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502964","url":null,"abstract":"Given that botnets represent one of the most aggressive threats against cybersecurity, various detection approaches have been studied. However, whichever approach is used, the evolving nature of botnets and the required pre-defined botnet detection rule sets employed may affect the performance of detection systems. In this work, we explore the effectiveness two rule based systems and two machine learning (ML) based techniques with different feature extraction methods (packet payload based and traffic flow based). The performance of these detection systems range from 0% to 100% on thirteen public botnet data sets (i.e. CTU-13). We further analyze the performances of these systems in order to understand which type of a detection system is more effective for which type of an application.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131872876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-04DOI: 10.1109/NOMS.2016.7502954
Amina Boubendir, E. Bertin, N. Simoni
We present in this paper the implementation of the networking part of a Network-as-a-Service (NaaS) architecture based on SDN-enabled NFV using as a basis the OPNFV open framework. This NaaS architecture can be instantiated according to three deployment models allowing application service providers (OTTs) and application services themselves to request specific network services from a network provider within a NaaS model. Therefore, we propose to demonstrate the feasibility of NaaS architecture deployment models with a focus on an “on-demand dynamic model” to highlight the offered dynamicity and easy application-to-network interactions. We have chosen to illustrate the deployment models with a WebRTC OTT application and showcase the on-demand dynamic deployment of virtual network functions, mainly TURN server. Because of time-sensitivity of these communication services, we have relied on container-based (Docker type) instead of virtual machine-based network functions virtualization.
{"title":"On-demand dynamic network service deployment over NaaS architecture","authors":"Amina Boubendir, E. Bertin, N. Simoni","doi":"10.1109/NOMS.2016.7502954","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502954","url":null,"abstract":"We present in this paper the implementation of the networking part of a Network-as-a-Service (NaaS) architecture based on SDN-enabled NFV using as a basis the OPNFV open framework. This NaaS architecture can be instantiated according to three deployment models allowing application service providers (OTTs) and application services themselves to request specific network services from a network provider within a NaaS model. Therefore, we propose to demonstrate the feasibility of NaaS architecture deployment models with a focus on an “on-demand dynamic model” to highlight the offered dynamicity and easy application-to-network interactions. We have chosen to illustrate the deployment models with a WebRTC OTT application and showcase the on-demand dynamic deployment of virtual network functions, mainly TURN server. Because of time-sensitivity of these communication services, we have relied on container-based (Docker type) instead of virtual machine-based network functions virtualization.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126614207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-04DOI: 10.1109/NOMS.2016.7502888
Michael Strasser, N. Weiner, S. Albayrak
The paper presents a Software as a Service approach for individual and outsourced service clearing within Business-to-Business marketplaces for mobility services. Interviewed experts confirm the lack of clearing possibilities within today's marketplaces solutions for mobility services and emphasize the need for service clearing. However, current solutions have no interfaces in place to enable access upon data which is required to perform service clearing and to charge service transactions. The paper discusses interfaces for outsourced service clearing according to their design, data and role dependencies. A reference implementation is developed which enable individual and outsourced service clearing. An algorithm for service clearing has been developed to check the interfaces' reliability and data correctness. Individual service clearing enables marketplace participants to appoint a clearing provider of whom they think fits their clearing requirements best. The introduced and implemented interfaces contribute to protocol standardization within the mobility service domain.
{"title":"Outsourced invoice service: Service-clearing as SaaS in mobility service marketplaces","authors":"Michael Strasser, N. Weiner, S. Albayrak","doi":"10.1109/NOMS.2016.7502888","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502888","url":null,"abstract":"The paper presents a Software as a Service approach for individual and outsourced service clearing within Business-to-Business marketplaces for mobility services. Interviewed experts confirm the lack of clearing possibilities within today's marketplaces solutions for mobility services and emphasize the need for service clearing. However, current solutions have no interfaces in place to enable access upon data which is required to perform service clearing and to charge service transactions. The paper discusses interfaces for outsourced service clearing according to their design, data and role dependencies. A reference implementation is developed which enable individual and outsourced service clearing. An algorithm for service clearing has been developed to check the interfaces' reliability and data correctness. Individual service clearing enables marketplace participants to appoint a clearing provider of whom they think fits their clearing requirements best. The introduced and implemented interfaces contribute to protocol standardization within the mobility service domain.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123179802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}