Pub Date : 2012-11-26DOI: 10.1109/APNOMS.2012.6356105
Ji-hye Kim, S. Yoon, Myung-Sup Kim
Internet traffic has rapidly increased due to the increasing use of wireless devices and the appearance of various applications and services. With the rapid increase of Internet traffic, the need for Internet traffic classification becomes important for the effective use of network resources. However, the traffic classification taxonomy has received little attention compared to the study of classification methods. In this paper, we propose novel traffic classification taxonomy for multilateral and hierarchical traffic identification. The proposed taxonomy can support multilateral identification based on the proposed four classification criteria: service, application, protocol, and function. In addition, the proposed taxonomy can support hierarchical structure supporting roll-up and drill-down operation to the classification result. We proved the applicability and advantages of the proposed taxonomy by applying it to real campus network traffic.
{"title":"Study on traffic classification taxonomy for multilateral and hierarchical traffic classification","authors":"Ji-hye Kim, S. Yoon, Myung-Sup Kim","doi":"10.1109/APNOMS.2012.6356105","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356105","url":null,"abstract":"Internet traffic has rapidly increased due to the increasing use of wireless devices and the appearance of various applications and services. With the rapid increase of Internet traffic, the need for Internet traffic classification becomes important for the effective use of network resources. However, the traffic classification taxonomy has received little attention compared to the study of classification methods. In this paper, we propose novel traffic classification taxonomy for multilateral and hierarchical traffic identification. The proposed taxonomy can support multilateral identification based on the proposed four classification criteria: service, application, protocol, and function. In addition, the proposed taxonomy can support hierarchical structure supporting roll-up and drill-down operation to the classification result. We proved the applicability and advantages of the proposed taxonomy by applying it to real campus network traffic.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134511358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-26DOI: 10.1109/APNOMS.2012.6356064
Mi-yeon Hur, Myung-Sup Kim
The appearance of smart phones and their continuing rapid uptake has large affects on our society in as much as they represent a paradigm shift in the traditional industrial structure. The Telecom market is changing day by day, networks with the complicated and varied traffic have almost reached capacity because of the rapid increase of user and the service releases on smart phones. Therefore, the necessity for smart phone traffic monitoring and analysis has increased. Traffic analysis is an essential element for efficient and reliable networks. In this paper, we propose a new smart phone traffic classification by application method. The proposed method is composed of several consecutive steps: grouping the HTTP User-Agent field, extracting common strings by the LCS algorithm and finally classifying the traffic. In addition, to classify unknown traffic from previous methods, we propose a process that extracts header signatures in grouped information to improve the classification completeness. We achieved about a 90% accuracy rate for the analysis by our proposed method in the target campus network.
{"title":"Towards smart phone traffic classification","authors":"Mi-yeon Hur, Myung-Sup Kim","doi":"10.1109/APNOMS.2012.6356064","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356064","url":null,"abstract":"The appearance of smart phones and their continuing rapid uptake has large affects on our society in as much as they represent a paradigm shift in the traditional industrial structure. The Telecom market is changing day by day, networks with the complicated and varied traffic have almost reached capacity because of the rapid increase of user and the service releases on smart phones. Therefore, the necessity for smart phone traffic monitoring and analysis has increased. Traffic analysis is an essential element for efficient and reliable networks. In this paper, we propose a new smart phone traffic classification by application method. The proposed method is composed of several consecutive steps: grouping the HTTP User-Agent field, extracting common strings by the LCS algorithm and finally classifying the traffic. In addition, to classify unknown traffic from previous methods, we propose a process that extracts header signatures in grouped information to improve the classification completeness. We achieved about a 90% accuracy rate for the analysis by our proposed method in the target campus network.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117182717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-26DOI: 10.1109/APNOMS.2012.6356104
Sungbong Chang, Hyungsoo Kim, Byung-deok Chung, Hyunchul Jung
IT (Information Technology) is known as one of the best solution to slow down the global warming by various industry sectors. IT equipments are responsible of 2% of GHG emission of total. Especially, Concentrate Energy Consuming Facilities such as Data Centers are to blame most as increasing sources of global warming caused by energy consumption by IT network equipments. This paper shows how to manage and control the energy consumed by IT equipments such as switches, routers, storages and servers loaded in a rack type facility. How to collect the energy consumption data from the individual equipment effectively and how to monitor and save the energy in a smart way without interrupting the services by introduction of Energy/Carbon Management Platform are to be explained. Smart Rack, Intelligent PDU (i-PDU), SECMP (Smart Energy/Carbon Management Platform) are introduced in this paper.
{"title":"Energy/carbon management network for IT equipments","authors":"Sungbong Chang, Hyungsoo Kim, Byung-deok Chung, Hyunchul Jung","doi":"10.1109/APNOMS.2012.6356104","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356104","url":null,"abstract":"IT (Information Technology) is known as one of the best solution to slow down the global warming by various industry sectors. IT equipments are responsible of 2% of GHG emission of total. Especially, Concentrate Energy Consuming Facilities such as Data Centers are to blame most as increasing sources of global warming caused by energy consumption by IT network equipments. This paper shows how to manage and control the energy consumed by IT equipments such as switches, routers, storages and servers loaded in a rack type facility. How to collect the energy consumption data from the individual equipment effectively and how to monitor and save the energy in a smart way without interrupting the services by introduction of Energy/Carbon Management Platform are to be explained. Smart Rack, Intelligent PDU (i-PDU), SECMP (Smart Energy/Carbon Management Platform) are introduced in this paper.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117042546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Synchronous Digital Hierarchy (SDH) networks are wildly deployed by telecom service providers (SP) around the world. Conventionally, SDH network circuits have to be designed and provisioned beforehand. Circuit profiles, including capacity, circuit route, end points..., have to be assigned before service activations. Any attempt of network re-configuration caused by network failures or traffic congestions will lead to uncertain service interruption. To further increase network availability, SPs have to overbuild their networks or to assign backup route(s) for each critical circuit, which, however, is costly and inefficient. With the introduction of technologies such as Virtual Concatenation (VCAT) and Link Capacity Adjustment Scheme (LCAS) of Next generation SDH (NG-SDH), SPs are able to adjust their SDH circuits at various bandwidth granularities and to hitlessly increase or decrease bandwidth of each circuit. In this study, we propose an effective approach to locate overbuild bandwidth, failed circuits, as well as congested circuits based on real time traffic flow data and network alarm message. Then our approach reallocates overbuilt network bandwidth in responding to network failures or traffic congestions by exploiting the benefit of VCAT and LCAS. Our simulation results show that our approach can significantly improve network availability as well as network resource utilization with minimal cost.
{"title":"Dynamic bandwidth reallocation for NG-SDH networks based on Real-time Traffic Flow Analysis","authors":"Tsan-Chang Kuo, Min-Chia Chang, Chuan Yin, Been-Huang Liao","doi":"10.1109/APNOMS.2012.6356078","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356078","url":null,"abstract":"Synchronous Digital Hierarchy (SDH) networks are wildly deployed by telecom service providers (SP) around the world. Conventionally, SDH network circuits have to be designed and provisioned beforehand. Circuit profiles, including capacity, circuit route, end points..., have to be assigned before service activations. Any attempt of network re-configuration caused by network failures or traffic congestions will lead to uncertain service interruption. To further increase network availability, SPs have to overbuild their networks or to assign backup route(s) for each critical circuit, which, however, is costly and inefficient. With the introduction of technologies such as Virtual Concatenation (VCAT) and Link Capacity Adjustment Scheme (LCAS) of Next generation SDH (NG-SDH), SPs are able to adjust their SDH circuits at various bandwidth granularities and to hitlessly increase or decrease bandwidth of each circuit. In this study, we propose an effective approach to locate overbuild bandwidth, failed circuits, as well as congested circuits based on real time traffic flow data and network alarm message. Then our approach reallocates overbuilt network bandwidth in responding to network failures or traffic congestions by exploiting the benefit of VCAT and LCAS. Our simulation results show that our approach can significantly improve network availability as well as network resource utilization with minimal cost.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123368850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-26DOI: 10.1109/APNOMS.2012.6356052
Jian Li, Jin Xiao, J. W. Hong, R. Boutaba
Vast majority of the services running on the smart phone today are networked in that significant amount of communication is required. Smart phone energy expenditure due to Wi-Fi communications constitutes significant portion of the battery discharge. In this paper, we first investigate the key factors influencing Wi-Fi energy consumption, and propose three energy management schemes: 1) Dynamic control of Wi-Fi on/off interface; 2) improve communication efficiency via application packing; and 3) elongation of Wi-Fi Power Save Mode (PSM) via application alignment under mixed application workload. We also design and test our solution as a device-side application utilizing general system process scheduling and network firewall techniques. As the result, our solution is easy to deploy, applicable to most mobile devices, and we explicitly tackle the challenging case of download management. Through extensive experimentation and solution prototyping, we show the effectiveness of device side Wi-Fi energy management and the importance of considering application characteristics.
{"title":"Application-centric Wi-Fi energy management on smart phone","authors":"Jian Li, Jin Xiao, J. W. Hong, R. Boutaba","doi":"10.1109/APNOMS.2012.6356052","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356052","url":null,"abstract":"Vast majority of the services running on the smart phone today are networked in that significant amount of communication is required. Smart phone energy expenditure due to Wi-Fi communications constitutes significant portion of the battery discharge. In this paper, we first investigate the key factors influencing Wi-Fi energy consumption, and propose three energy management schemes: 1) Dynamic control of Wi-Fi on/off interface; 2) improve communication efficiency via application packing; and 3) elongation of Wi-Fi Power Save Mode (PSM) via application alignment under mixed application workload. We also design and test our solution as a device-side application utilizing general system process scheduling and network firewall techniques. As the result, our solution is easy to deploy, applicable to most mobile devices, and we explicitly tackle the challenging case of download management. Through extensive experimentation and solution prototyping, we show the effectiveness of device side Wi-Fi energy management and the importance of considering application characteristics.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122183282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-26DOI: 10.1109/APNOMS.2012.6356080
Miao Li, Jessie Hui Wang, Jiahai Yang
Understanding of the Internet evolution is important for many research topics, such as network planning, optimal routing design, etc. In this paper, we try to analyze CAIDA AS-level topology dataset from 2004 to 2010 to validate two conjectures on the Internet evolution, i.e., the Internet flattening trend and the preferential attachment rule. Our analysis shows that the evolvement of the Internet core is different from the edge of Internet. We classify the Internet into several layers using different layering methods, i.e., Rich Club coefficient based method, k-core decomposition method and SARK hierarchy model, and then study the changes of the features of these layers. Under all of these laying methods, we find that the boundaries between neighboring layers in the Internet core are more and more blurred; ASes in the core distribute more evenly and different layers are closer to each other in size, while the Internet edge still has a distinct hierarchical characteristic. It is more evident in Asia and Europe than North America. The other difference between Internet core and Internet edge is that link births/deaths in the Internet core follow the “Preferential Attachment/de-attachment” rule, while link births/deaths in the Internet edge follow a super linear preferential attachment/de-attachement rule. On the other hand, in both Internet core and Internet edge, link births caused by AS births present stronger preference than link rewiring.
{"title":"Flattening and preferential attachment in the internet evolution","authors":"Miao Li, Jessie Hui Wang, Jiahai Yang","doi":"10.1109/APNOMS.2012.6356080","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356080","url":null,"abstract":"Understanding of the Internet evolution is important for many research topics, such as network planning, optimal routing design, etc. In this paper, we try to analyze CAIDA AS-level topology dataset from 2004 to 2010 to validate two conjectures on the Internet evolution, i.e., the Internet flattening trend and the preferential attachment rule. Our analysis shows that the evolvement of the Internet core is different from the edge of Internet. We classify the Internet into several layers using different layering methods, i.e., Rich Club coefficient based method, k-core decomposition method and SARK hierarchy model, and then study the changes of the features of these layers. Under all of these laying methods, we find that the boundaries between neighboring layers in the Internet core are more and more blurred; ASes in the core distribute more evenly and different layers are closer to each other in size, while the Internet edge still has a distinct hierarchical characteristic. It is more evident in Asia and Europe than North America. The other difference between Internet core and Internet edge is that link births/deaths in the Internet core follow the “Preferential Attachment/de-attachment” rule, while link births/deaths in the Internet edge follow a super linear preferential attachment/de-attachement rule. On the other hand, in both Internet core and Internet edge, link births caused by AS births present stronger preference than link rewiring.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114848810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-26DOI: 10.1109/APNOMS.2012.6356101
Seoyoung Kim, Hyejeong Kang, Yoonhee Kim
As computing technologies develop, various studies for e-Science have been actively developed for many years. The advent of Cloud computing, for example, enables scientists to expand their research environments over supercomputers to on-demand and scalable resources. However, several performance drawbacks on the cloud computing can cause considerable obstacles in scientific domains, despite its strong merits. A hybrid infrastructure which consists of the existing and cloud architecture thus can produce a synergy effect for utilizing resources efficiently. In this paper, we proposed hybrid infrastructure-supported a scientific workflow environment for Aerodynamics design and demonstrated its superiority. Hybrid infrastructure covers grid and private cloud computing in this paper. Especially, we focused on improving performance by supporting hybrid infrastructure and efficient usages of physical resources. Since it offers diverse types of computing infrastructures including cloud computing, it can serve elastic resources regardless of the number of tasks for experiments or limitations of space and can reduce costs of time as well as budget during simulations.
{"title":"A scientific workflow supported environment over hybrid infrastructure for aerodynamics design","authors":"Seoyoung Kim, Hyejeong Kang, Yoonhee Kim","doi":"10.1109/APNOMS.2012.6356101","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356101","url":null,"abstract":"As computing technologies develop, various studies for e-Science have been actively developed for many years. The advent of Cloud computing, for example, enables scientists to expand their research environments over supercomputers to on-demand and scalable resources. However, several performance drawbacks on the cloud computing can cause considerable obstacles in scientific domains, despite its strong merits. A hybrid infrastructure which consists of the existing and cloud architecture thus can produce a synergy effect for utilizing resources efficiently. In this paper, we proposed hybrid infrastructure-supported a scientific workflow environment for Aerodynamics design and demonstrated its superiority. Hybrid infrastructure covers grid and private cloud computing in this paper. Especially, we focused on improving performance by supporting hybrid infrastructure and efficient usages of physical resources. Since it offers diverse types of computing infrastructures including cloud computing, it can serve elastic resources regardless of the number of tasks for experiments or limitations of space and can reduce costs of time as well as budget during simulations.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117277759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-26DOI: 10.1109/APNOMS.2012.6356055
Dongwoo Kwon, J. W. Hong, Hong-Taek Ju
This paper proposes a proactive security system to forecast Distributed Denial of Service (DDoS) attacks. A reactive system focused on detection after network attacks occur has difficulties responding rapidly to massive distributed attacks, such as DDoS. By forecasting the attack, we can take active countermeasures such as strengthening the power of the security devices and it would also enable us to plan a recovery procedure and countermeasures beforehand, providing a more rapid response. In this paper, we discuss previous studies related to intrusion forecasting, define the concept of intrusion forecasting and propose the Internet Intrusion Forecasting System Architecture. To obtain intrusion factors for DDoS attack forecasts, Honeynet was deployed and we analyze Hflow data gathered from Honeynet.
{"title":"DDoS attack forecasting system architecture using Honeynet","authors":"Dongwoo Kwon, J. W. Hong, Hong-Taek Ju","doi":"10.1109/APNOMS.2012.6356055","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356055","url":null,"abstract":"This paper proposes a proactive security system to forecast Distributed Denial of Service (DDoS) attacks. A reactive system focused on detection after network attacks occur has difficulties responding rapidly to massive distributed attacks, such as DDoS. By forecasting the attack, we can take active countermeasures such as strengthening the power of the security devices and it would also enable us to plan a recovery procedure and countermeasures beforehand, providing a more rapid response. In this paper, we discuss previous studies related to intrusion forecasting, define the concept of intrusion forecasting and propose the Internet Intrusion Forecasting System Architecture. To obtain intrusion factors for DDoS attack forecasts, Honeynet was deployed and we analyze Hflow data gathered from Honeynet.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125312126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-26DOI: 10.1109/APNOMS.2012.6356091
Yuya Inoue, Masanori Yamazaki, Y. Hirota, K. Kinoshita, H. Tode, K. Murakami
Recently, network services based on distributed components that provide services by using components running on remote nodes have attracted much attention. Advanced services can be provided at a lower cost by using existing components. We have previously proposed a method that ensures a stable QoS for each service by allocating components dynamically according to changes in access frequency. In that method, however, we considered only CPU resources rather than network resources. In this paper, we propose a method for providing bandwidth-guaranteed services stably by considering available wavelength resources in backend servers on a platform with a WDM optical network.
{"title":"A bandwidth management method using available wavelength resources in backend servers for network services based on distributed components","authors":"Yuya Inoue, Masanori Yamazaki, Y. Hirota, K. Kinoshita, H. Tode, K. Murakami","doi":"10.1109/APNOMS.2012.6356091","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356091","url":null,"abstract":"Recently, network services based on distributed components that provide services by using components running on remote nodes have attracted much attention. Advanced services can be provided at a lower cost by using existing components. We have previously proposed a method that ensures a stable QoS for each service by allocating components dynamically according to changes in access frequency. In that method, however, we considered only CPU resources rather than network resources. In this paper, we propose a method for providing bandwidth-guaranteed services stably by considering available wavelength resources in backend servers on a platform with a WDM optical network.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126713687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-26DOI: 10.1109/APNOMS.2012.6356094
Li-Der Chou, Yao-Tsung Yang, Yi-Shou Chen, Te-Chin Chang, C. Shieh, S. Huang
With the increase in the bandwidth needs of network service, the customer requirements for Quality of Service (QoS) are also higher. Although the QoS guarantees can be offered by signing the Service Level Agreement (SLA), the costs of infrastructures are increased as well. This paper proposes a shortest path algorithm based on SLA, combined with the resource allocation for virtual networks (VNs). It can help service providers to enhance the achievement of overall SLA contracts in the case of lack of resources. This architecture was also implemented on NetFPGA platforms applied with the concept of OpenFlow to meet the demands of network performance and flexibility. Finally, the experimental results show that the proposed algorithm can dynamically provide the better path to reach the SLA achievement rates.
随着网络业务对带宽需求的增加,客户对QoS (Quality of service)的要求也越来越高。虽然可以通过签署服务水平协议(SLA)来提供QoS保证,但基础设施的成本也会增加。结合虚拟网络的资源分配,提出了一种基于SLA的最短路径算法。它可以帮助服务提供商在缺乏资源的情况下提高整体SLA合同的实现。为了满足网络性能和灵活性的要求,该架构还在NetFPGA平台上应用OpenFlow概念实现。最后,实验结果表明,该算法可以动态地提供更好的路径来达到SLA成果率。
{"title":"Implementation of virtual network management system with SLA on NetFPGA","authors":"Li-Der Chou, Yao-Tsung Yang, Yi-Shou Chen, Te-Chin Chang, C. Shieh, S. Huang","doi":"10.1109/APNOMS.2012.6356094","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356094","url":null,"abstract":"With the increase in the bandwidth needs of network service, the customer requirements for Quality of Service (QoS) are also higher. Although the QoS guarantees can be offered by signing the Service Level Agreement (SLA), the costs of infrastructures are increased as well. This paper proposes a shortest path algorithm based on SLA, combined with the resource allocation for virtual networks (VNs). It can help service providers to enhance the achievement of overall SLA contracts in the case of lack of resources. This architecture was also implemented on NetFPGA platforms applied with the concept of OpenFlow to meet the demands of network performance and flexibility. Finally, the experimental results show that the proposed algorithm can dynamically provide the better path to reach the SLA achievement rates.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117029386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}