首页 > 最新文献

NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium最新文献

英文 中文
Experiences evaluating OpenStack network data plane performance and scalability OpenStack网络数据平面性能和可扩展性评估经验
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502923
B. Karaçali, J. Tracey
Growth in cloud computing motivates cloud networks that provide excellent performance and scalability. Improvements rely on the ability to measure these characteristics. Measurement is complicated by a combinatorial explosion of implementations, configurations, metrics, workloads and scenarios. We present tools and a framework that facilitate performance and scalability evaluation. We present the results of applying the framework to six OpenStack network implementations/configurations. The results validate the framework's ability to highlight the performance and scalability impact of changes to the underlying cloud implementation and configuration. Our experience also yields important lessons regarding cloud network evaluation.
云计算的发展促使云网络能够提供出色的性能和可伸缩性。改进依赖于测量这些特性的能力。度量由于实现、配置、度量、工作负载和场景的组合爆炸而变得复杂。我们提供了一些工具和框架来促进性能和可伸缩性评估。我们展示了将该框架应用于六个OpenStack网络实现/配置的结果。结果验证了框架能够突出显示对底层云实现和配置的更改对性能和可伸缩性的影响。我们的经验也为云网络评估提供了重要的经验教训。
{"title":"Experiences evaluating OpenStack network data plane performance and scalability","authors":"B. Karaçali, J. Tracey","doi":"10.1109/NOMS.2016.7502923","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502923","url":null,"abstract":"Growth in cloud computing motivates cloud networks that provide excellent performance and scalability. Improvements rely on the ability to measure these characteristics. Measurement is complicated by a combinatorial explosion of implementations, configurations, metrics, workloads and scenarios. We present tools and a framework that facilitate performance and scalability evaluation. We present the results of applying the framework to six OpenStack network implementations/configurations. The results validate the framework's ability to highlight the performance and scalability impact of changes to the underlying cloud implementation and configuration. Our experience also yields important lessons regarding cloud network evaluation.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121903255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Autonomous system based flow marking scheme for IP-Traceback 基于自治系统的ip溯源流标记方案
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502804
Vahid Aghaei-Foroushani, A. Zincir-Heywood
Tracing IP packets to their sources, known as IP-Traceback, is a critical task in defending against IP spoofing and DoS attacks. There are several solutions to traceback to the origin of the attack. However, all these solutions require either all routers or ISPs to support the same IP-Traceback mechanism. To address this limitation, we propose an IP-Traceback approach at the level of autonomous systems, called Autonomous System-based Flow Marking, ASFM, to identify some key locations in the path where attacker packets are being forwarded. ASFM employs the BGP update message community attribute that enables information to be passed across ASs even if they are not necessarily involved in the IP-Traceback scheme. We also propose an authentication method, so a downstream AS can examine the correctness of the marking provided by the upstream ASs, thus eliminating the fake marking embedded by subverted routers. Finally, we evaluate and analyze the performance of our proposal, using real life datasets.
跟踪IP数据包到其源,即IP- traceback,是防御IP欺骗和DoS攻击的关键任务。有几种解决方案可以追溯到攻击的起源。但是,所有这些解决方案都要求所有路由器或isp支持相同的IP-Traceback机制。为了解决这一限制,我们在自治系统级别提出了一种ip溯源方法,称为基于自治系统的流标记(ASFM),以识别攻击者数据包转发路径中的一些关键位置。ASFM使用BGP更新消息团体属性,使得信息可以在as之间传递,即使它们不一定参与IP-Traceback方案。我们还提出了一种认证方法,使下游自治系统可以检查上游自治系统提供的标记的正确性,从而消除被颠覆路由器嵌入的虚假标记。最后,我们使用现实生活中的数据集来评估和分析我们的建议的性能。
{"title":"Autonomous system based flow marking scheme for IP-Traceback","authors":"Vahid Aghaei-Foroushani, A. Zincir-Heywood","doi":"10.1109/NOMS.2016.7502804","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502804","url":null,"abstract":"Tracing IP packets to their sources, known as IP-Traceback, is a critical task in defending against IP spoofing and DoS attacks. There are several solutions to traceback to the origin of the attack. However, all these solutions require either all routers or ISPs to support the same IP-Traceback mechanism. To address this limitation, we propose an IP-Traceback approach at the level of autonomous systems, called Autonomous System-based Flow Marking, ASFM, to identify some key locations in the path where attacker packets are being forwarded. ASFM employs the BGP update message community attribute that enables information to be passed across ASs even if they are not necessarily involved in the IP-Traceback scheme. We also propose an authentication method, so a downstream AS can examine the correctness of the marking provided by the upstream ASs, thus eliminating the fake marking embedded by subverted routers. Finally, we evaluate and analyze the performance of our proposal, using real life datasets.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122145263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Surviving link failures in multicast VN embedded applications 组播VN嵌入式应用中幸存链路故障
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502871
A. M. Ghaleb, Tarek Khalifa, Sara Ayoubi, K. Shaban
Virtual network embedding (VNE) is defined as the allocation of network resources to multiple virtual networks (VNs) and is recognized to be a challenging task to perform efficiently. Virtual network survivability is a new term that describes the measures taken to provide a failure-proof VN against physical link and/or node failure. Indeed, a single link or node failure in a substrate network can bring down multiple hosted VNs, i.e., the ones that utilize that failed link or node. As such, virtual network survivability becomes an essential part of VNE. While much work has been dedicated to studying the impact of a variety of failure cases in a VN, little attention has been directed towards studying the link failure impact on multicast virtual network (MVN) applications, which principally restrict end-to-end delay and delay variation measures. In fact, most of the introduced survivability schemes adopt protection techniques by reserving backup resources prior to embedding, which inevitably leads to under-utilization of the network resources. In this paper, we first investigate the impact of physical link failure on MVNs. Then, we introduce a novel recovery approach to restore MVNs while considering their end-delay and delay variation requirements. Simulation experiments prove that our recovery technique achieves good restoration ratio in considerably fast execution time and low link mapping cost with little impact on the admittance ratio.
虚拟网络嵌入(Virtual network embedding, VNE)是指将网络资源分配到多个虚拟网络(Virtual network, VNs)中,是一项具有挑战性的高效嵌入任务。虚拟网络生存性是一个新术语,描述了为防止物理链路和/或节点故障而提供防故障虚拟网络所采取的措施。实际上,基板网络中的单个链路或节点故障可能导致多个托管vpn,即利用该故障链路或节点的vpn。因此,虚拟网络的生存性成为虚拟网络的重要组成部分。虽然很多工作都致力于研究VN中各种故障情况的影响,但很少有人关注链路故障对多播虚拟网络(MVN)应用的影响,这主要限制了端到端延迟和延迟变化措施。实际上,所引入的生存性方案大多采用在嵌入之前预留备份资源的保护技术,这不可避免地会导致网络资源利用率不足。在本文中,我们首先研究了物理链路故障对MVNs的影响。然后,我们引入了一种新的恢复方法来恢复MVNs,同时考虑了它们的端延迟和延迟变化要求。仿真实验证明,该恢复技术在相当快的执行时间和较低的链路映射成本下,对导纳比的影响很小,实现了较好的恢复率。
{"title":"Surviving link failures in multicast VN embedded applications","authors":"A. M. Ghaleb, Tarek Khalifa, Sara Ayoubi, K. Shaban","doi":"10.1109/NOMS.2016.7502871","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502871","url":null,"abstract":"Virtual network embedding (VNE) is defined as the allocation of network resources to multiple virtual networks (VNs) and is recognized to be a challenging task to perform efficiently. Virtual network survivability is a new term that describes the measures taken to provide a failure-proof VN against physical link and/or node failure. Indeed, a single link or node failure in a substrate network can bring down multiple hosted VNs, i.e., the ones that utilize that failed link or node. As such, virtual network survivability becomes an essential part of VNE. While much work has been dedicated to studying the impact of a variety of failure cases in a VN, little attention has been directed towards studying the link failure impact on multicast virtual network (MVN) applications, which principally restrict end-to-end delay and delay variation measures. In fact, most of the introduced survivability schemes adopt protection techniques by reserving backup resources prior to embedding, which inevitably leads to under-utilization of the network resources. In this paper, we first investigate the impact of physical link failure on MVNs. Then, we introduce a novel recovery approach to restore MVNs while considering their end-delay and delay variation requirements. Simulation experiments prove that our recovery technique achieves good restoration ratio in considerably fast execution time and low link mapping cost with little impact on the admittance ratio.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131791586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Hosting virtual machines on a cloud datacenter: A matching theoretic approach 在云数据中心上托管虚拟机:一种匹配理论方法
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502873
Chuan Pham, Nguyen H. Tran, Minh N. H. Nguyen, Shaolei Ren, W. Saad, C. Hong
In this paper, the problem of resource allocation in cloud datacenters, that own highly complex and heterogeneous tasks and servers, is considered. To address this problem, a novel framework, dubbed joint operation cost and network traffic cost (JOT) framework, is proposed. This framework combines notions from Gibbs sampling and matching theory to find an efficient solution addressing the NP-hard problem JOT. The proposed model is shown to be capable of controlling the active server set, in a coordinated manner while allocating VMs in order to reduce both operation cost and network traffic cost of the cloud datacenter. We also conduct a case-study to validate our proposed algorithm and the results show that JOT can reduce the total incurred cost by up to 19% compared to the existing non-coordinated approach.
本文研究了云数据中心中具有高度复杂异构任务和服务器的资源分配问题。为了解决这一问题,提出了一个新的框架,称为联合运营成本和网络流量成本(JOT)框架。该框架结合了吉布斯采样和匹配理论的概念,找到了解决NP-hard问题的有效解决方案。该模型能够在分配虚拟机的同时以协调的方式控制活动服务器集,从而降低云数据中心的运营成本和网络流量成本。我们还进行了一个案例研究来验证我们提出的算法,结果表明,与现有的非协调方法相比,JOT可以减少高达19%的总成本。
{"title":"Hosting virtual machines on a cloud datacenter: A matching theoretic approach","authors":"Chuan Pham, Nguyen H. Tran, Minh N. H. Nguyen, Shaolei Ren, W. Saad, C. Hong","doi":"10.1109/NOMS.2016.7502873","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502873","url":null,"abstract":"In this paper, the problem of resource allocation in cloud datacenters, that own highly complex and heterogeneous tasks and servers, is considered. To address this problem, a novel framework, dubbed joint operation cost and network traffic cost (JOT) framework, is proposed. This framework combines notions from Gibbs sampling and matching theory to find an efficient solution addressing the NP-hard problem JOT. The proposed model is shown to be capable of controlling the active server set, in a coordinated manner while allocating VMs in order to reduce both operation cost and network traffic cost of the cloud datacenter. We also conduct a case-study to validate our proposed algorithm and the results show that JOT can reduce the total incurred cost by up to 19% compared to the existing non-coordinated approach.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116201937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Joint NFV placement and routing for multicast service on SDN SDN上多播业务的联合NFV放置和路由
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502829
S. Zhang, A. Tizghadam, Byungchul Park, H. Bannazadeh, A. Leon-Garcia
Network function visualization (NFV) has emerged as a promising paradigm in networking, where the hardware-based middleboxes are replaced with software-based virtualized entities typically running on the cloud to provide specific functionalities. By deploying NFV, network services become more adaptive and cost-effective. Many multicast services such as real-time multimedia streaming and intrusion detection require appropriate services chaining; however, NFVs placement in the network as well as traffic routing strategy to guarantee that the multicast flows traverse through the services chain before reaching the end user is still an open problem. In this paper, we present an algorithm to solve this problem.
网络功能可视化(NFV)已经成为网络中一个很有前途的范例,其中基于硬件的中间件被基于软件的虚拟化实体所取代,这些实体通常运行在云上,以提供特定的功能。通过部署NFV,网络业务变得更具适应性和成本效益。实时多媒体流和入侵检测等多播业务都需要适当的业务链;然而,nfv在网络中的布局以及保证多播流在到达最终用户之前穿越服务链的流量路由策略仍然是一个悬而未决的问题。在本文中,我们提出了一种算法来解决这个问题。
{"title":"Joint NFV placement and routing for multicast service on SDN","authors":"S. Zhang, A. Tizghadam, Byungchul Park, H. Bannazadeh, A. Leon-Garcia","doi":"10.1109/NOMS.2016.7502829","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502829","url":null,"abstract":"Network function visualization (NFV) has emerged as a promising paradigm in networking, where the hardware-based middleboxes are replaced with software-based virtualized entities typically running on the cloud to provide specific functionalities. By deploying NFV, network services become more adaptive and cost-effective. Many multicast services such as real-time multimedia streaming and intrusion detection require appropriate services chaining; however, NFVs placement in the network as well as traffic routing strategy to guarantee that the multicast flows traverse through the services chain before reaching the end user is still an open problem. In this paper, we present an algorithm to solve this problem.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116246583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Handling malicious switches in software defined networks 处理软件定义网络中的恶意交换机
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502995
R. Ghannam, Anthony Chung
Traffic flowing through a software defined network is vulnerable to disruptions caused by malicious switches. The malicious behaviors are diverse such as dropping traffic, adding traffic or modifying it. A switch could be malicious or otherwise dysfunctional or misconfigured. A lot of work in SDN has addressed the problem by securing the control plane and having it validate network wide properties and policy compliance, e.g., loop-freedom, reachability and resolution of conflicting rules. In this paper, we argue that it is imperative as well to ensure the correctness of traffic forwarding itself. Therefore we define a threat model for the security and correctness of forwarding in an SDN switch. We describe several malicious behaviors that could be encountered at an SDN switch and propose possible solutions to each fault type. The capabilities of the SDN paradigm to detect and deter such attacks are analyzed.
通过软件定义网络的流量很容易受到恶意交换机造成的中断。恶意行为多种多样,包括减少流量、增加流量、修改流量等。交换机可能是恶意的,或者功能失调或配置错误。SDN中的许多工作都通过保护控制平面并使其验证网络范围的属性和策略遵从性来解决这个问题,例如,环路自由、可达性和冲突规则的解决。在本文中,我们认为确保流量转发本身的正确性也是必要的。因此,我们定义了SDN交换机转发安全性和正确性的威胁模型。我们描述了在SDN交换机上可能遇到的几种恶意行为,并针对每种故障类型提出了可能的解决方案。分析了SDN范式检测和阻止此类攻击的能力。
{"title":"Handling malicious switches in software defined networks","authors":"R. Ghannam, Anthony Chung","doi":"10.1109/NOMS.2016.7502995","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502995","url":null,"abstract":"Traffic flowing through a software defined network is vulnerable to disruptions caused by malicious switches. The malicious behaviors are diverse such as dropping traffic, adding traffic or modifying it. A switch could be malicious or otherwise dysfunctional or misconfigured. A lot of work in SDN has addressed the problem by securing the control plane and having it validate network wide properties and policy compliance, e.g., loop-freedom, reachability and resolution of conflicting rules. In this paper, we argue that it is imperative as well to ensure the correctness of traffic forwarding itself. Therefore we define a threat model for the security and correctness of forwarding in an SDN switch. We describe several malicious behaviors that could be encountered at an SDN switch and propose possible solutions to each fault type. The capabilities of the SDN paradigm to detect and deter such attacks are analyzed.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132229472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Collating time-series resource data for system-wide job profiling 整理时间序列资源数据,用于系统范围的作业分析
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502958
V. Bumgardner, V. Marek, Ray L. Hyatt
Through the collection and association of discrete time-series resource metrics and workloads, we can both provide benchmark and intra-job resource collations, along with system-wide job profiling. Traditional RDBMSes are not designed to store and process long-term discrete time-series metrics and the commonly used resolution-reducing round robin databases (RRDB), make poor long-term sources of data for workload analytics. We implemented a system that employs “Big-data” (Hadoop/HBase) and other analytics (R) techniques and tools to store, process, and characterize HPC workloads. Using this system we have collected and processed over a 30 billion time-series metrics from existing short-term high-resolution (15-sec RRDB) sources, profiling over 200 thousand jobs across a wide spectrum of workloads. The system is currently in use at the University of Kentucky for better understanding of individual jobs and system-wide profiling as well as a strategic source of data for resource allocation and future acquisitions.
通过收集和关联离散时间序列资源指标和工作负载,我们可以提供基准和作业内部资源排序,以及系统范围的作业分析。传统的rdbms并不是为存储和处理长期离散时间序列指标而设计的,而常用的降低分辨率的轮询数据库(RRDB)不能作为工作负载分析的长期数据源。我们实现了一个使用“大数据”(Hadoop/HBase)和其他分析(R)技术和工具来存储、处理和表征HPC工作负载的系统。使用该系统,我们已经从现有的短期高分辨率(15秒RRDB)来源收集和处理了超过300亿个时间序列指标,分析了各种工作负载中的20多万个作业。该系统目前在肯塔基大学使用,用于更好地了解单个工作和系统范围的分析,以及资源分配和未来采购的战略数据来源。
{"title":"Collating time-series resource data for system-wide job profiling","authors":"V. Bumgardner, V. Marek, Ray L. Hyatt","doi":"10.1109/NOMS.2016.7502958","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502958","url":null,"abstract":"Through the collection and association of discrete time-series resource metrics and workloads, we can both provide benchmark and intra-job resource collations, along with system-wide job profiling. Traditional RDBMSes are not designed to store and process long-term discrete time-series metrics and the commonly used resolution-reducing round robin databases (RRDB), make poor long-term sources of data for workload analytics. We implemented a system that employs “Big-data” (Hadoop/HBase) and other analytics (R) techniques and tools to store, process, and characterize HPC workloads. Using this system we have collected and processed over a 30 billion time-series metrics from existing short-term high-resolution (15-sec RRDB) sources, profiling over 200 thousand jobs across a wide spectrum of workloads. The system is currently in use at the University of Kentucky for better understanding of individual jobs and system-wide profiling as well as a strategic source of data for resource allocation and future acquisitions.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132246009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A minimum spanning tree-based approach for reducing verification collisions in self-organizing networks 基于最小生成树的自组织网络验证冲突减少方法
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502806
T. Tsvetkov, Janne Ali-Tolppa, H. Sanneck, G. Carle
The verification of Configuration Management (CM) changes has become an important step in the operation of a mobile Self-Organizing Network (SON). Typically, a verification mechanism operates in three phases. At first, it partitions the network into verification areas, then it triggers an anomaly detection algorithm for those areas, and finally generates CM undo requests for the abnormally performing ones. Those requests set the CM parameters to a previous stable state. However, verification areas may overlap and share anomalous cells which results in a verification collision. As a consequence, the verification mechanism is not able to simultaneously deploy the undo requests since there is an uncertainty which to execute and which to potentially omit. In such a case, it has to serialize the deployment process and resolve the collisions. This procedure, though, can be negatively impacted if unnecessary collisions are processed, since they might delay the execution of the queued CM undo requests. To overcome this issue, we propose an approach for changing the size of the verification areas with respect to the detected collisions. We achieve our goal by using a Minimum Spanning Tree (MST)-based clustering approach that is able to group similarly behaving cells together. Based on the group they have been assigned to, we remove cells from a verification area and prevent false positive collisions from being further processed. Furthermore, we evaluate the proposed solution in two different scenarios. First, we highlight its benefits by applying it on CM and Performance Management (PM) data collected from a real Long Term Evolution (LTE) network. Second, in a simulation study we show how it positively affects the network performance after eliminating the false positives.
配置管理(CM)变更的验证已成为移动自组织网络(SON)运行的重要步骤。通常,验证机制分为三个阶段。该算法首先将网络划分为多个验证区域,然后针对这些区域触发异常检测算法,最后对执行异常的区域生成CM撤销请求。这些请求将CM参数设置为以前的稳定状态。然而,验证区域可能重叠并共享异常单元,从而导致验证冲突。因此,验证机制不能同时部署撤销请求,因为不确定哪些需要执行,哪些可能会被省略。在这种情况下,它必须序列化部署过程并解决冲突。但是,如果处理不必要的冲突,这个过程可能会受到负面影响,因为它们可能会延迟排队CM撤消请求的执行。为了克服这个问题,我们提出了一种方法来改变相对于检测到的碰撞的验证区域的大小。我们通过使用基于最小生成树(MST)的聚类方法来实现我们的目标,该方法能够将行为相似的单元分组在一起。根据它们被分配到的组,我们从验证区域中移除细胞,并防止误报碰撞被进一步处理。此外,我们在两种不同的场景中评估了所提出的解决方案。首先,我们通过将其应用于从真正的长期演进(LTE)网络收集的CM和性能管理(PM)数据来强调它的好处。其次,在模拟研究中,我们展示了它如何在消除误报后积极影响网络性能。
{"title":"A minimum spanning tree-based approach for reducing verification collisions in self-organizing networks","authors":"T. Tsvetkov, Janne Ali-Tolppa, H. Sanneck, G. Carle","doi":"10.1109/NOMS.2016.7502806","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502806","url":null,"abstract":"The verification of Configuration Management (CM) changes has become an important step in the operation of a mobile Self-Organizing Network (SON). Typically, a verification mechanism operates in three phases. At first, it partitions the network into verification areas, then it triggers an anomaly detection algorithm for those areas, and finally generates CM undo requests for the abnormally performing ones. Those requests set the CM parameters to a previous stable state. However, verification areas may overlap and share anomalous cells which results in a verification collision. As a consequence, the verification mechanism is not able to simultaneously deploy the undo requests since there is an uncertainty which to execute and which to potentially omit. In such a case, it has to serialize the deployment process and resolve the collisions. This procedure, though, can be negatively impacted if unnecessary collisions are processed, since they might delay the execution of the queued CM undo requests. To overcome this issue, we propose an approach for changing the size of the verification areas with respect to the detected collisions. We achieve our goal by using a Minimum Spanning Tree (MST)-based clustering approach that is able to group similarly behaving cells together. Based on the group they have been assigned to, we remove cells from a verification area and prevent false positive collisions from being further processed. Furthermore, we evaluate the proposed solution in two different scenarios. First, we highlight its benefits by applying it on CM and Performance Management (PM) data collected from a real Long Term Evolution (LTE) network. Second, in a simulation study we show how it positively affects the network performance after eliminating the false positives.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128223025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Order@Cloud: A VM organisation framework based on multi-objectives placement ranking Order@Cloud:基于多目标位置排名的虚拟机组织框架
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502854
G. Geronimo, Rafael Brundo Uriarte, Carlos Becker Westphall
This paper presents the implementation and tests of a flexible and extensible framework, named Order@Cloud, that improves the Virtual Machine placements of a Cloud. It receives new VMs on the Cloud and organises them by relocating their placements based on the Multiple-Objectives of the environment. These Objectives are represented by Rules, Qualifiers and Costs, which can be easily added, extended and prioritised. Based on Evolutionary and Greedy Searches, Order@Cloud theoretically guarantees the adoption of a better set of Placements. More specifically, it seeks the non-dominated solutions (Pareto Set) and compares them considering the implementation cost of the scenario and its benefits. In contrast to existing solutions, that address specific objectives, our framework was devised to be objective-agnostic and easily extensible, which enables the implementation of new and generic prioritised elements. To understand the applicability and performance of our solution we conducted experiments using a real Cloud environment and discuss its performance, flexibility and optimality.
本文介绍了一个名为Order@Cloud的灵活可扩展框架的实现和测试,该框架可以改善云中的虚拟机位置。它接收云上的新虚拟机,并根据环境的多目标重新定位它们的位置来组织它们。这些目标由规则、限定词和成本表示,可以很容易地添加、扩展和确定优先级。基于进化和贪婪搜索,Order@Cloud在理论上保证采用更好的位置集。更具体地说,它寻求非支配的解决方案(帕累托集),并考虑场景的实现成本和收益对它们进行比较。与现有的解决方案相比,我们的框架被设计成与目标无关且易于扩展的,这使得实现新的和通用的优先级元素成为可能。为了了解我们的解决方案的适用性和性能,我们使用真实的云环境进行了实验,并讨论了其性能、灵活性和最优性。
{"title":"Order@Cloud: A VM organisation framework based on multi-objectives placement ranking","authors":"G. Geronimo, Rafael Brundo Uriarte, Carlos Becker Westphall","doi":"10.1109/NOMS.2016.7502854","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502854","url":null,"abstract":"This paper presents the implementation and tests of a flexible and extensible framework, named Order@Cloud, that improves the Virtual Machine placements of a Cloud. It receives new VMs on the Cloud and organises them by relocating their placements based on the Multiple-Objectives of the environment. These Objectives are represented by Rules, Qualifiers and Costs, which can be easily added, extended and prioritised. Based on Evolutionary and Greedy Searches, Order@Cloud theoretically guarantees the adoption of a better set of Placements. More specifically, it seeks the non-dominated solutions (Pareto Set) and compares them considering the implementation cost of the scenario and its benefits. In contrast to existing solutions, that address specific objectives, our framework was devised to be objective-agnostic and easily extensible, which enables the implementation of new and generic prioritised elements. To understand the applicability and performance of our solution we conducted experiments using a real Cloud environment and discuss its performance, flexibility and optimality.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"528 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132907309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A non-disruptive automated approach to update SDN applications at runtime 在运行时更新SDN应用程序的非中断自动化方法
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502946
Antonio Marsico, R. D. Corin, M. Gerola, D. Siracusa, Arne Schwabe
The Memory Management Subsystem (MMS) provides automated services for SDN controllers that optimize the management of network devices' memory. Among other functions, it cleans the memory of network devices upon the update or the removal of SDN applications. The potential of this MMS function is demonstrated in a scenario where a critical security update for a network application would be otherwise ineffective.
内存管理子系统(Memory Management Subsystem, MMS)为SDN控制器提供自动化服务,优化网络设备的内存管理。在其他功能中,它在更新或删除SDN应用程序时清理网络设备的内存。这个MMS功能的潜力在网络应用程序的关键安全更新无效的场景中得到了演示。
{"title":"A non-disruptive automated approach to update SDN applications at runtime","authors":"Antonio Marsico, R. D. Corin, M. Gerola, D. Siracusa, Arne Schwabe","doi":"10.1109/NOMS.2016.7502946","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502946","url":null,"abstract":"The Memory Management Subsystem (MMS) provides automated services for SDN controllers that optimize the management of network devices' memory. Among other functions, it cleans the memory of network devices upon the update or the removal of SDN applications. The potential of this MMS function is demonstrated in a scenario where a critical security update for a network application would be otherwise ineffective.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133055682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1