首页 > 最新文献

NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium最新文献

英文 中文
Anomaly detection for SOME/IP using complex event processing 使用复杂事件处理的SOME/IP异常检测
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502991
N. Herold, S. Posselt, Oliver Hanka, G. Carle
Recent developments favor the adoption of IP-based protocols in automotive and aerospace domains. The increased connectivity between components helps to cut costs and enables better re-use of standardized components. However, increased connectivity also increases the attack surface of the overall system and necessitates dedicated security solutions. This paper presents an anomaly detection system for SOME/IP, a standardized automotive middleware protocol. Within the system, Esper, a complex event processing engine, applies a domain-specific rule set to a stream of SOME/IP packets. Possible attacks and protocol violations on the SOME/IP protocol are identified, suitable rules for detection are presented, and finally, the performance of the system is evaluated.
最近的发展倾向于在汽车和航空航天领域采用基于ip的协议。组件之间增加的连接性有助于降低成本并更好地重用标准化组件。然而,增加的连接性也增加了整个系统的攻击面,因此需要专用的安全解决方案。本文提出了一种基于标准化汽车中间件协议SOME/IP的异常检测系统。在系统中,复杂事件处理引擎Esper将特定于领域的规则集应用于SOME/IP数据包流。在此基础上,分析了针对SOME/IP协议可能存在的攻击和协议违规行为,提出了相应的检测规则,并对系统的性能进行了评估。
{"title":"Anomaly detection for SOME/IP using complex event processing","authors":"N. Herold, S. Posselt, Oliver Hanka, G. Carle","doi":"10.1109/NOMS.2016.7502991","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502991","url":null,"abstract":"Recent developments favor the adoption of IP-based protocols in automotive and aerospace domains. The increased connectivity between components helps to cut costs and enables better re-use of standardized components. However, increased connectivity also increases the attack surface of the overall system and necessitates dedicated security solutions. This paper presents an anomaly detection system for SOME/IP, a standardized automotive middleware protocol. Within the system, Esper, a complex event processing engine, applies a domain-specific rule set to a stream of SOME/IP packets. Possible attacks and protocol violations on the SOME/IP protocol are identified, suitable rules for detection are presented, and finally, the performance of the system is evaluated.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124202422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
On-demand provisioning of long-tail services in distributed clouds 分布式云中按需提供长尾服务
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7503011
Pieter Smet, B. Dhoedt, P. Simoens
We see a trend to design services as a suite of small service components instead of the typical monolithic nature of classic web services, which led to an increasing amount of long-tail services on the Internet. Deploying instances everywhere to achieve a fast response time results in high costs, especially when these services are used infrequently and remain idle most of the time. One way to avoid needless over-provisioning is to deploy instances on-demand but this requires every component to be available upon request arrival. We propose a placement algorithm to maximize the amount of clients we can serve on-demand using the Docker layered filesystem. Docker facilitates automated deployment of services in lightweight software containers, allowing almost instantaneous deployment. Our algorithm finds the optimal storage location for layers so we can retrieve all service layers, deploy a service instance and provide a first response to a request within the desired time. We solve this problem using integer linear programming (ILP) and present techniques to improve the scalability of ILP while minimizing the performance loss. Results show that our approximation performs better with large scale problems than the classic ILP case.
我们看到了一种趋势,将服务设计成一套小型服务组件,而不是传统web服务的典型整体特性,这导致Internet上长尾服务的数量不断增加。在任何地方部署实例以实现快速响应时间会导致高成本,特别是当这些服务不经常使用并且大部分时间处于空闲状态时。避免不必要的过度配置的一种方法是按需部署实例,但这要求每个组件在请求到达时都可用。我们提出了一种放置算法来最大化我们可以使用Docker分层文件系统按需服务的客户端数量。Docker促进了在轻量级软件容器中自动部署服务,允许几乎即时的部署。我们的算法为层找到最佳存储位置,这样我们就可以检索所有服务层,部署服务实例,并在期望的时间内为请求提供第一个响应。我们使用整数线性规划(ILP)和现有技术来解决这个问题,以提高ILP的可扩展性,同时最大限度地减少性能损失。结果表明,与经典的ILP情况相比,我们的近似在大规模问题上表现得更好。
{"title":"On-demand provisioning of long-tail services in distributed clouds","authors":"Pieter Smet, B. Dhoedt, P. Simoens","doi":"10.1109/NOMS.2016.7503011","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7503011","url":null,"abstract":"We see a trend to design services as a suite of small service components instead of the typical monolithic nature of classic web services, which led to an increasing amount of long-tail services on the Internet. Deploying instances everywhere to achieve a fast response time results in high costs, especially when these services are used infrequently and remain idle most of the time. One way to avoid needless over-provisioning is to deploy instances on-demand but this requires every component to be available upon request arrival. We propose a placement algorithm to maximize the amount of clients we can serve on-demand using the Docker layered filesystem. Docker facilitates automated deployment of services in lightweight software containers, allowing almost instantaneous deployment. Our algorithm finds the optimal storage location for layers so we can retrieve all service layers, deploy a service instance and provide a first response to a request within the desired time. We solve this problem using integer linear programming (ILP) and present techniques to improve the scalability of ILP while minimizing the performance loss. Results show that our approximation performs better with large scale problems than the classic ILP case.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126114858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic virtual network restoration with optimal standby virtual router selection 基于最佳备用虚拟路由器选择的动态虚拟网络恢复
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502935
Xuan Liu, D. Medhi
Fault-tolerance in a virtualized networking environment (VNE) requires additional efforts to provide the survivability against failures on either virtual networks (VNs) or the underlying substrate network. In this dissertation, we design a software-defined resilient VNE using a hybrid scheme of protection and restoration, where for each VN, a set of redundant virtual routers (VRs) are reserved as shared standby virtual routers (S-VRs), and any S-VR can be activated to replace a failed VR in the existed VN dynamically after the failure is identified. We first introduce a dynamic reconfiguration scheme (DRS) for node failures in a VNE, and then propose a Mixed-Integer Linear Programming (MILP) model with dual goals to optimally select S-VRs to restore all VNs while load balancing, and a heuristic algorithm based on the model is also presented. By considering a number of factors, the results showed that the proposed heuristics performance was close to the optimization model when there were sufficient standby virtual routers for each virtual network and the substrate nodes had the capability to support multiple standby virtual routers to be in service simultaneously. Finally, we present a prototyping design and implementation on the realistic virtual network testbeds (i.e., GpENI and GENI).
虚拟网络环境(VNE)中的容错需要额外的努力来提供针对虚拟网络(VNs)或底层基板网络故障的生存能力。本文采用保护和恢复的混合方案设计了一个软件定义的弹性虚拟网络,其中每个虚拟网络保留一组冗余虚拟路由器(VR)作为共享备用虚拟路由器(S-VR),并且任何S-VR都可以在故障识别后动态激活以替换现有虚拟网络中的故障VR。在此基础上,提出了一种具有双重目标的混合整数线性规划(MILP)模型,用于在负载均衡的同时最优选择S-VRs来恢复所有vn,并在此基础上提出了一种启发式算法。综合考虑多个因素,结果表明,当每个虚拟网络有足够的备用虚拟路由器,且底层节点有能力支持多个备用虚拟路由器同时工作时,所提出的启发式算法性能接近优化模型。最后,在现实的虚拟网络测试平台(即GpENI和GENI)上进行了原型设计和实现。
{"title":"Dynamic virtual network restoration with optimal standby virtual router selection","authors":"Xuan Liu, D. Medhi","doi":"10.1109/NOMS.2016.7502935","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502935","url":null,"abstract":"Fault-tolerance in a virtualized networking environment (VNE) requires additional efforts to provide the survivability against failures on either virtual networks (VNs) or the underlying substrate network. In this dissertation, we design a software-defined resilient VNE using a hybrid scheme of protection and restoration, where for each VN, a set of redundant virtual routers (VRs) are reserved as shared standby virtual routers (S-VRs), and any S-VR can be activated to replace a failed VR in the existed VN dynamically after the failure is identified. We first introduce a dynamic reconfiguration scheme (DRS) for node failures in a VNE, and then propose a Mixed-Integer Linear Programming (MILP) model with dual goals to optimally select S-VRs to restore all VNs while load balancing, and a heuristic algorithm based on the model is also presented. By considering a number of factors, the results showed that the proposed heuristics performance was close to the optimization model when there were sufficient standby virtual routers for each virtual network and the substrate nodes had the capability to support multiple standby virtual routers to be in service simultaneously. Finally, we present a prototyping design and implementation on the realistic virtual network testbeds (i.e., GpENI and GENI).","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129964544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improve round-trip time measurement quality via clustering in inter-domain traffic engineering 利用聚类技术提高域间流量工程中往返时间测量质量
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502970
Wenqin Shao, J. Rougier, F. Devienne, M. Viste
For multi-homed networks, inter-domain traffic engineering (TE) consists in selecting the best path via available transit providers, so that the transmission quality is improved in front of network events, such as congestion and fail-over. In practice, this choice bases on end-to-end (e2e) measurements toward destination networks. These measurements, especially Round-Trip Time (RTT), are expected to offer an faithful view on inter-domain path properties. Hosts in destination networks with open ports are deliberately discovered for active measurement. RTT traces so obtained can be influenced by host-local factors that are not relevant to inter-domain routing and eventually mislead route decisions. We data-mined the RTT time-series between two ASes with unsupervised learning method - clustering, on a set of statistic features. Achieved results showed that our method was capable of improving data quality, by excluding less reliable traces. Moreover, we considered traceroute measurements. Early results suggested that most variations of e2e delay actually occured in access networks. We thus believe that the proposed scheme can improve the accuracy and stability of the route selection for multi-homed networks.
对于多归属网络,域间流量工程(inter-domain traffic engineering, TE)是指在网络发生拥塞、故障转移等事件时,通过可用的传输提供商选择最佳路径,从而提高传输质量。在实践中,这种选择基于对目标网络的端到端(e2e)测量。这些度量,特别是往返时间(RTT),期望提供域间路径属性的可靠视图。目的网络中开放端口的主机被有意地发现以进行主动测量。这样获得的RTT跟踪可能受到与域间路由无关的主机本地因素的影响,并最终误导路由决策。我们在一组统计特征上使用无监督学习方法聚类对两个asa之间的RTT时间序列进行数据挖掘。取得的结果表明,我们的方法能够通过排除不太可靠的痕迹来提高数据质量。此外,我们还考虑了跟踪路由测量。早期的研究结果表明,大多数端到端延迟的变化实际上发生在接入网中。因此,我们认为该方案可以提高多归属网络路由选择的准确性和稳定性。
{"title":"Improve round-trip time measurement quality via clustering in inter-domain traffic engineering","authors":"Wenqin Shao, J. Rougier, F. Devienne, M. Viste","doi":"10.1109/NOMS.2016.7502970","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502970","url":null,"abstract":"For multi-homed networks, inter-domain traffic engineering (TE) consists in selecting the best path via available transit providers, so that the transmission quality is improved in front of network events, such as congestion and fail-over. In practice, this choice bases on end-to-end (e2e) measurements toward destination networks. These measurements, especially Round-Trip Time (RTT), are expected to offer an faithful view on inter-domain path properties. Hosts in destination networks with open ports are deliberately discovered for active measurement. RTT traces so obtained can be influenced by host-local factors that are not relevant to inter-domain routing and eventually mislead route decisions. We data-mined the RTT time-series between two ASes with unsupervised learning method - clustering, on a set of statistic features. Achieved results showed that our method was capable of improving data quality, by excluding less reliable traces. Moreover, we considered traceroute measurements. Early results suggested that most variations of e2e delay actually occured in access networks. We thus believe that the proposed scheme can improve the accuracy and stability of the route selection for multi-homed networks.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132464849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assessing the impact of cryptographic access control solutions on multimedia delivery in information-centric networks 评估加密访问控制解决方案对信息中心网络中多媒体传输的影响
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502840
Elisa Mannes, C. Maziero, L. Lassance, Fábio Borges
Information-centric Networks (ICN) aims to improve content delivery by promoting the content as the protagonist of the network layer. By naming, routing, and forwarding named content directly on the network layer, ICN allows the same content to satisfy requests from different users, enabling innetwork caches to place contents strategically near the interested users. This characteristic is especially interesting for multimedia content distribution, since it represents a better quality of experience for users due to low round-trip time, bandwidth use, and load on content providers. However, caching protected multimedia content on uncontrolled third party devices may impair access control policies enforcement by the content providers. Many encryption-based access control solutions have been proposed for ICN, applying different cryptographic strategies leading to distinct features which may not be appropriate for multimedia content protection. In this paper, we simulate, evaluate, and discuss the individual characteristics of three encryption-based access control solutions in light of multimedia distribution in ICN. We show that leveraging cache efficiency, computational load to encrypt and decrypt content, and user revocation are the biggest challenges for the enforcement of access control policies on ICN.
信息中心网络(ICN)旨在通过促进内容成为网络层的主角来改善内容传递。通过在网络层上直接命名、路由和转发命名的内容,ICN允许相同的内容满足来自不同用户的请求,从而使网络缓存能够战略性地将内容放置在感兴趣的用户附近。这个特性对于多媒体内容分发来说特别有趣,因为它为用户提供了更好的体验质量,因为它减少了往返时间、带宽使用和内容提供者的负载。但是,在不受控制的第三方设备上缓存受保护的多媒体内容可能会损害内容提供者执行的访问控制策略。针对ICN提出了许多基于加密的访问控制解决方案,应用不同的加密策略导致不同的特征,这些特征可能不适合多媒体内容保护。本文针对ICN中多媒体分布的特点,对三种基于加密的访问控制方案进行了仿真、评价和讨论。我们表明,利用缓存效率、计算负载来加密和解密内容以及用户撤销是在ICN上实施访问控制策略的最大挑战。
{"title":"Assessing the impact of cryptographic access control solutions on multimedia delivery in information-centric networks","authors":"Elisa Mannes, C. Maziero, L. Lassance, Fábio Borges","doi":"10.1109/NOMS.2016.7502840","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502840","url":null,"abstract":"Information-centric Networks (ICN) aims to improve content delivery by promoting the content as the protagonist of the network layer. By naming, routing, and forwarding named content directly on the network layer, ICN allows the same content to satisfy requests from different users, enabling innetwork caches to place contents strategically near the interested users. This characteristic is especially interesting for multimedia content distribution, since it represents a better quality of experience for users due to low round-trip time, bandwidth use, and load on content providers. However, caching protected multimedia content on uncontrolled third party devices may impair access control policies enforcement by the content providers. Many encryption-based access control solutions have been proposed for ICN, applying different cryptographic strategies leading to distinct features which may not be appropriate for multimedia content protection. In this paper, we simulate, evaluate, and discuss the individual characteristics of three encryption-based access control solutions in light of multimedia distribution in ICN. We show that leveraging cache efficiency, computational load to encrypt and decrypt content, and user revocation are the biggest challenges for the enforcement of access control policies on ICN.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122317413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Empowering network operating systems with memory management techniques 为网络操作系统提供内存管理技术
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502889
R. D. Corin, D. Siracusa, E. Salvadori, Arne Schwabe
Similarly to computer operating systems which guarantee safe access to memory resources, Network Operating Systems shall grant SDN applications a reliable access to neatly organized flow table resources. This paper presents the architecture for a controller-agnostic Memory Management System and some of its functionalities that aim at improving flow table usage and preventing network misconfigurations. From the implementation perspective, this work discusses the applicability of the proposed system, a strategy to evaluate it and current open challenges.
与保证对内存资源的安全访问的计算机操作系统类似,网络操作系统应使SDN应用程序能够可靠地访问组织整齐的流表资源。本文介绍了一个控制器无关内存管理系统的体系结构及其一些功能,旨在提高流表的使用率和防止网络错误配置。从实施的角度来看,本工作讨论了所提出的系统的适用性,评估它的策略和当前开放的挑战。
{"title":"Empowering network operating systems with memory management techniques","authors":"R. D. Corin, D. Siracusa, E. Salvadori, Arne Schwabe","doi":"10.1109/NOMS.2016.7502889","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502889","url":null,"abstract":"Similarly to computer operating systems which guarantee safe access to memory resources, Network Operating Systems shall grant SDN applications a reliable access to neatly organized flow table resources. This paper presents the architecture for a controller-agnostic Memory Management System and some of its functionalities that aim at improving flow table usage and preventing network misconfigurations. From the implementation perspective, this work discusses the applicability of the proposed system, a strategy to evaluate it and current open challenges.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"35 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121014217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Towards flexbile SDN-based management for cloud-based mobile networks 面向基于云的移动网络灵活的sdn管理
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502846
M. Artuso, C. Caba, H. Christiansen, José Soler
New technologies and architectures arise in the telecommunications industry in order to cater to the ever growing demands in terms of resource utilization, manageability and user experience. C-RAN and SDN represent two such novel paradigms, both advocating for centralization of a set of resources or control capabilities respectively. The C-RAN architecture requires a significant amount of link capacity which may be a prohibitive factor in its adoption hence an obvious solution is to intelligently share the physical infrastructure among several virtual operators. In this context, a new challenge is to flexibly manage the sharing of the infrastructure. This paper argues that a centralized, SDN-based approach can bring the needed flexibility in the management of the C-RAN. More specifically, this paper proposes a policy-centric management framework, which uses the SDN architecture to enforce various rules for sharing the physical infrastructure. A testbed based on Floodlight and Mininet has been implemented to show the benefits of using this automatic management tool for sharing the mobile site capacity.
为了满足在资源利用、可管理性和用户体验方面不断增长的需求,电信行业出现了新的技术和体系结构。C-RAN和SDN代表了两种这样的新范式,它们都分别倡导一组资源或控制能力的集中。C-RAN架构需要大量的链路容量,这可能是其采用的一个禁止因素,因此一个明显的解决方案是在几个虚拟运营商之间智能地共享物理基础设施。在这种情况下,一个新的挑战是灵活地管理基础设施的共享。本文认为,集中式的、基于sdn的方法可以为C-RAN的管理带来所需的灵活性。更具体地说,本文提出了一个以策略为中心的管理框架,该框架使用SDN架构来强制执行各种规则以共享物理基础设施。一个基于Floodlight和Mininet的测试平台已经实现,以显示使用这个自动管理工具共享移动站点容量的好处。
{"title":"Towards flexbile SDN-based management for cloud-based mobile networks","authors":"M. Artuso, C. Caba, H. Christiansen, José Soler","doi":"10.1109/NOMS.2016.7502846","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502846","url":null,"abstract":"New technologies and architectures arise in the telecommunications industry in order to cater to the ever growing demands in terms of resource utilization, manageability and user experience. C-RAN and SDN represent two such novel paradigms, both advocating for centralization of a set of resources or control capabilities respectively. The C-RAN architecture requires a significant amount of link capacity which may be a prohibitive factor in its adoption hence an obvious solution is to intelligently share the physical infrastructure among several virtual operators. In this context, a new challenge is to flexibly manage the sharing of the infrastructure. This paper argues that a centralized, SDN-based approach can bring the needed flexibility in the management of the C-RAN. More specifically, this paper proposes a policy-centric management framework, which uses the SDN architecture to enforce various rules for sharing the physical infrastructure. A testbed based on Floodlight and Mininet has been implemented to show the benefits of using this automatic management tool for sharing the mobile site capacity.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132655779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of probabilistic flooding in VANETs for optimal rebroadcast probabilities VANETs中最优重播概率的概率泛洪分析
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502984
Taqwa Saeed, M. Lestas, Y. Mylonas, A. Pitsillides, V. P. Lesta
A number of probabilistic flooding schemes have been recently considered in VANETs to address problems of information dissemination in safety applications. The design approach has so far been simulative, a method which does not guarantee that the derived protocols will work when the simulation settings are violated in practice. In this paper, motivated by the need to design information dissemination protocols with verifiable properties prior to implementation, we employ mathematical models of single and multiple lane roads to investigate probabilistic flooding in VANETs using mathematical analysis. We demonstrate that the system can be described by linear difference equations the solutions of which yield the probability of all vehicles receiving the critical message as a function of the rebroadcast probability, the number of neighbors of each vehicle and the number of vehicles. We utilize the obtained solutions to derive the desired rebroadcast probabilities as a function of the transmission range, the vehicle density and the dissemination distance. The obtained results are in line with results obtained using extensive simulations and can be used as a baseline to develop information dissemination protocols with verifiable properties.
最近在VANETs中考虑了一些概率泛洪方案,以解决安全应用中的信息传播问题。目前的设计方法是模拟的,这种方法不能保证在实际中违反模拟设置时所导出的协议能够正常工作。在本文中,由于需要在实现之前设计具有可验证属性的信息传播协议,我们采用单车道和多车道道路的数学模型,使用数学分析来研究vanet中的概率洪水。我们证明了该系统可以用线性差分方程来描述,该方程的解产生了所有车辆接收到关键信息的概率作为重播概率、每辆车的邻居数量和车辆数量的函数。我们利用得到的解推导出期望的重播概率作为传输距离、车辆密度和传播距离的函数。所得结果与大量仿真结果一致,可作为开发具有可验证特性的信息传播协议的基准。
{"title":"Analysis of probabilistic flooding in VANETs for optimal rebroadcast probabilities","authors":"Taqwa Saeed, M. Lestas, Y. Mylonas, A. Pitsillides, V. P. Lesta","doi":"10.1109/NOMS.2016.7502984","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502984","url":null,"abstract":"A number of probabilistic flooding schemes have been recently considered in VANETs to address problems of information dissemination in safety applications. The design approach has so far been simulative, a method which does not guarantee that the derived protocols will work when the simulation settings are violated in practice. In this paper, motivated by the need to design information dissemination protocols with verifiable properties prior to implementation, we employ mathematical models of single and multiple lane roads to investigate probabilistic flooding in VANETs using mathematical analysis. We demonstrate that the system can be described by linear difference equations the solutions of which yield the probability of all vehicles receiving the critical message as a function of the rebroadcast probability, the number of neighbors of each vehicle and the number of vehicles. We utilize the obtained solutions to derive the desired rebroadcast probabilities as a function of the transmission range, the vehicle density and the dissemination distance. The obtained results are in line with results obtained using extensive simulations and can be used as a baseline to develop information dissemination protocols with verifiable properties.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133791001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Resource allocation in optical beam-steered indoor networks 光束控制室内网络中的资源分配
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502839
M. T. Vega, J. Famaey, A. Koonen, A. Liotta
Optical Wireless (OW) technologies deploying narrow multiwavelength light beams offer a promising alternative to traditional wireless indoor communications as they provide higher bandwidths and overcome the radio spectrum congestion typical of the 2.4 and 5GHz frequency bands. However, unlocking their full potential requires exploring novel control and management techniques. Specifically, there is a need for efficient and intelligent resource management and localization techniques that allot wavelengths and capacity to devices. In this paper we present a resource allocation model for one such indoor optical wireless approach, a Beam-steered Reconfigurable Optical-Wireless System for Energy-efficient communication (BROWSE). BROWSE aims to supply each user within a room with its own downstream infrared light beam with at least 10Gbps throughput, while providing a 60GHz radio channel upstream. Using Integer Linear Programming (ILP) techniques, we have designed and implemented a resource allocation model for the BROWSE OW downstream connection. The designed model optimises the trade-off between energy-consumption and throughput, while providing TDM capabilities to effectively serve densely deployed devices with a limited number of simultaneous available wavelengths. Through several test-scenarios we have assessed the model's performance, as well as its applicability to future ultra-high bandwidth video streaming applications.
部署窄多波长光束的光学无线技术(OW)提供了传统无线室内通信的一个很有前途的替代方案,因为它们提供更高的带宽,并克服了2.4和5GHz频段典型的无线电频谱拥塞。然而,释放它们的全部潜力需要探索新的控制和管理技术。具体来说,需要高效和智能的资源管理和定位技术,为设备分配波长和容量。在本文中,我们提出了一种这样的室内光无线方法的资源分配模型,一种用于节能通信的波束导向可重构光无线系统(BROWSE)。BROWSE旨在为房间内的每个用户提供自己的下游红外光束,其吞吐量至少为10Gbps,同时提供一个60GHz的上行无线电信道。利用整数线性规划(ILP)技术,我们设计并实现了一个BROWSE OW下游连接的资源分配模型。设计的模型优化了能耗和吞吐量之间的权衡,同时提供时分复用功能,有效地为具有有限数量的同时可用波长的密集部署设备提供服务。通过几个测试场景,我们评估了该模型的性能,以及它对未来超高带宽视频流应用的适用性。
{"title":"Resource allocation in optical beam-steered indoor networks","authors":"M. T. Vega, J. Famaey, A. Koonen, A. Liotta","doi":"10.1109/NOMS.2016.7502839","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502839","url":null,"abstract":"Optical Wireless (OW) technologies deploying narrow multiwavelength light beams offer a promising alternative to traditional wireless indoor communications as they provide higher bandwidths and overcome the radio spectrum congestion typical of the 2.4 and 5GHz frequency bands. However, unlocking their full potential requires exploring novel control and management techniques. Specifically, there is a need for efficient and intelligent resource management and localization techniques that allot wavelengths and capacity to devices. In this paper we present a resource allocation model for one such indoor optical wireless approach, a Beam-steered Reconfigurable Optical-Wireless System for Energy-efficient communication (BROWSE). BROWSE aims to supply each user within a room with its own downstream infrared light beam with at least 10Gbps throughput, while providing a 60GHz radio channel upstream. Using Integer Linear Programming (ILP) techniques, we have designed and implemented a resource allocation model for the BROWSE OW downstream connection. The designed model optimises the trade-off between energy-consumption and throughput, while providing TDM capabilities to effectively serve densely deployed devices with a limited number of simultaneous available wavelengths. Through several test-scenarios we have assessed the model's performance, as well as its applicability to future ultra-high bandwidth video streaming applications.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"32 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114002811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enabling QoS in peer to peer live streaming through dynamic bandwidth or playback rate control 通过动态带宽或播放速率控制实现对等直播的QoS功能
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502875
Maria Efthymiopoulou, N. Efthymiopoulos, Athanasios Christakidis
Live video streaming over internet is becoming popular more and more. Current commercial live video streaming systems are based either on a typical client-server (cloud) or on a peer-to-peer (P2P) architecture. The former is preferred for stability and QoS, provided that the system is not stretched beyond the server's bandwidth capacity, while the latter is scalable with small bandwidth and management cost. In this paper, we stabilize live streaming with a cloud assisted P2P live streaming system without sacrificing scalability. In order to achieve this we develop: i) a scalable gossip protocol with low bandwidth overhead for the cloud that monitors dynamically the total available bandwidth resources of the participating peers, ii) a control strategy that dynamically allocates from the cloud the exact amount of required bandwidth in order to guarantee the complete and on time stream distribution, iii) an alternative control strategy that dynamically adapts the playback rate to the available bandwidth resources. All these are achieved by modeling analytically through difference equations the dynamic relationship between the total bandwidth surplus (idle peers' bandwidth) and the playback rate. Finally, we evaluate our proposed architecture in a packet level simulator of a complete P2P live streaming system that designed in OPNET Modeler. Our evaluation testifies the uninterrupted and complete stream delivery even in adverse bandwidth changes.
网络视频直播越来越受欢迎。当前的商业直播视频流系统要么基于典型的客户机-服务器(云),要么基于点对点(P2P)架构。在保证系统不超出服务器的带宽容量的前提下,前者在稳定性和QoS方面优先考虑;后者具有可扩展性,带宽小,管理成本低。在本文中,我们在不牺牲可扩展性的情况下,使用云辅助P2P直播系统来稳定直播。为了实现这一目标,我们开发了:i)一个具有低带宽开销的可扩展八卦协议,用于动态监控参与节点的总可用带宽资源,ii)一种控制策略,可以从云中动态分配所需带宽的确切数量,以保证完整和准时的流分发,iii)一种替代控制策略,可以动态调整播放速率以适应可用带宽资源。所有这些都是通过差分方程对总带宽剩余(空闲对等体带宽)与重放率之间的动态关系进行解析建模实现的。最后,我们在OPNET Modeler设计的完整P2P直播系统的数据包级模拟器中评估了我们提出的架构。我们的评估证明了即使在不利的带宽变化下也可以不间断和完整地传输流。
{"title":"Enabling QoS in peer to peer live streaming through dynamic bandwidth or playback rate control","authors":"Maria Efthymiopoulou, N. Efthymiopoulos, Athanasios Christakidis","doi":"10.1109/NOMS.2016.7502875","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502875","url":null,"abstract":"Live video streaming over internet is becoming popular more and more. Current commercial live video streaming systems are based either on a typical client-server (cloud) or on a peer-to-peer (P2P) architecture. The former is preferred for stability and QoS, provided that the system is not stretched beyond the server's bandwidth capacity, while the latter is scalable with small bandwidth and management cost. In this paper, we stabilize live streaming with a cloud assisted P2P live streaming system without sacrificing scalability. In order to achieve this we develop: i) a scalable gossip protocol with low bandwidth overhead for the cloud that monitors dynamically the total available bandwidth resources of the participating peers, ii) a control strategy that dynamically allocates from the cloud the exact amount of required bandwidth in order to guarantee the complete and on time stream distribution, iii) an alternative control strategy that dynamically adapts the playback rate to the available bandwidth resources. All these are achieved by modeling analytically through difference equations the dynamic relationship between the total bandwidth surplus (idle peers' bandwidth) and the playback rate. Finally, we evaluate our proposed architecture in a packet level simulator of a complete P2P live streaming system that designed in OPNET Modeler. Our evaluation testifies the uninterrupted and complete stream delivery even in adverse bandwidth changes.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114571969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1