Pub Date : 2021-12-06DOI: 10.1109/SDS54264.2021.9732115
Mohammad Al-Quraan, A. Khan, L. Mohjazi, A. Centeno, A. Zoha, M. Imran
The combination of deep learning (DL) and computer vision (CV) is shaping the future of wireless communications by supporting the operations of ultra-dense networks (UDNs). However, vision-aided wireless communications (VAWC) are highly dependent on DL algorithms that rely on a wide range of multimodal data stored at a central location. Although the performance of the DL model is improved when the model becomes deeper, the need for a large number of datasets for model training incurs more computational complexity in terms of model training time and storage size. Hence, the energy efficiency of the network will become worse due to the higher energy costs associated with model training and transmitting a large amount of data over wireless links. Therefore, a crit-ical challenge is to reduce the computational complexity and bandwidth utilisation of DL-based vision-aided UDNs without compromising their performance. In this paper, we adopt single-channel (SICH) images, joint photographic expert group (JPEG) image compression (COMP), and object detection (ODET) to form a hybrid data manipulation technique. This technique can reduce the model computation cost and data storage volume, as well as alleviate the transmission burden on the wireless links to make future wireless networks more reliable and energy efficient. Specifically, this technique is used to manipulate datasets before using them in model training. Compared to reference datasets, simulation results show that our hybrid technique achieves the best performance in reducing the model computation by 34%, a significant reduction of 86% in memory size for data storage, reducing data transmission time by 83%, and 82.5% more energy efficient networks.
{"title":"A Hybrid Data Manipulation Approach for Energy and Latency-Efficient Vision-Aided UDNs","authors":"Mohammad Al-Quraan, A. Khan, L. Mohjazi, A. Centeno, A. Zoha, M. Imran","doi":"10.1109/SDS54264.2021.9732115","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9732115","url":null,"abstract":"The combination of deep learning (DL) and computer vision (CV) is shaping the future of wireless communications by supporting the operations of ultra-dense networks (UDNs). However, vision-aided wireless communications (VAWC) are highly dependent on DL algorithms that rely on a wide range of multimodal data stored at a central location. Although the performance of the DL model is improved when the model becomes deeper, the need for a large number of datasets for model training incurs more computational complexity in terms of model training time and storage size. Hence, the energy efficiency of the network will become worse due to the higher energy costs associated with model training and transmitting a large amount of data over wireless links. Therefore, a crit-ical challenge is to reduce the computational complexity and bandwidth utilisation of DL-based vision-aided UDNs without compromising their performance. In this paper, we adopt single-channel (SICH) images, joint photographic expert group (JPEG) image compression (COMP), and object detection (ODET) to form a hybrid data manipulation technique. This technique can reduce the model computation cost and data storage volume, as well as alleviate the transmission burden on the wireless links to make future wireless networks more reliable and energy efficient. Specifically, this technique is used to manipulate datasets before using them in model training. Compared to reference datasets, simulation results show that our hybrid technique achieves the best performance in reducing the model computation by 34%, a significant reduction of 86% in memory size for data storage, reducing data transmission time by 83%, and 82.5% more energy efficient networks.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"10 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130062321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-06DOI: 10.1109/SDS54264.2021.9732104
A. Hegazy, Minar El-Aasser
The internet has made everything connected and accessible from anywhere. However, conventional TCP/IP networks are complex and very hard to manage. Software-Defined Networking (SDN) is one of the most promising networking paradigms in current and next-generation networks. It promises to change this situation by breaking vertical integration and introduce network programmability. SDN separates control from the network and data plane. The intelligence and brain of the network are logically centralized, and the underlying network infrastructure is abstracted from the application. However, the Control Plane and Data Plane separation opens the door for security challenges and threats. In this paper, we aim to collect, analyze and classify all major security threats and their possible solutions. The security platforms that are used as countermeasures for each attack are described, followed by various security approaches for network-wide security in SDN. As well as classifying security challenges and threats according to different fields, an SDN simulation platform to study and test network performance and attacks countermeasures is also introduced. In short, this paper gathers all the present major SDN security challenges and possible solutions. Furthermore, it studies, classifies and highlights future directions for secure SDN.
{"title":"Network Security Challenges and Countermeasures in SDN Environments","authors":"A. Hegazy, Minar El-Aasser","doi":"10.1109/SDS54264.2021.9732104","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9732104","url":null,"abstract":"The internet has made everything connected and accessible from anywhere. However, conventional TCP/IP networks are complex and very hard to manage. Software-Defined Networking (SDN) is one of the most promising networking paradigms in current and next-generation networks. It promises to change this situation by breaking vertical integration and introduce network programmability. SDN separates control from the network and data plane. The intelligence and brain of the network are logically centralized, and the underlying network infrastructure is abstracted from the application. However, the Control Plane and Data Plane separation opens the door for security challenges and threats. In this paper, we aim to collect, analyze and classify all major security threats and their possible solutions. The security platforms that are used as countermeasures for each attack are described, followed by various security approaches for network-wide security in SDN. As well as classifying security challenges and threats according to different fields, an SDN simulation platform to study and test network performance and attacks countermeasures is also introduced. In short, this paper gathers all the present major SDN security challenges and possible solutions. Furthermore, it studies, classifies and highlights future directions for secure SDN.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122826590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-06DOI: 10.1109/SDS54264.2021.9731850
J. Carvajal, Francisco Torrecillas Gilabert, J. Cañadas
In this paper, a practical approach is presented for transforming corporate Wide Area Networks (WAN) using Software-Defined Networking (SDN). This case study describes how the deployment of Software-Defined Wide Area Networking (SD-WAN) technology in a multinational corporation was utilized as a tool to facilitate the company's digital transformation strategies. With this aim in mind, the current architecture of the company's corporate network was analyzed and a network architecture based on SD-WAN technology was designed. The proposed design allows the SDN solution to coexist within the productive network infrastructure, making possible a transparent implementation to the business operations. Next, the plan for deploying the designed architecture is described using the selected (and proprietary) Cisco Meraki SDN solution. An analysis of the benefits is presented in terms of the solution's performance and security. Finally, the conclusions are discussed and some future work is proposed based on the company's real-life scenario.
{"title":"Corporate network transformation with SD-WAN. A practical approach","authors":"J. Carvajal, Francisco Torrecillas Gilabert, J. Cañadas","doi":"10.1109/SDS54264.2021.9731850","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9731850","url":null,"abstract":"In this paper, a practical approach is presented for transforming corporate Wide Area Networks (WAN) using Software-Defined Networking (SDN). This case study describes how the deployment of Software-Defined Wide Area Networking (SD-WAN) technology in a multinational corporation was utilized as a tool to facilitate the company's digital transformation strategies. With this aim in mind, the current architecture of the company's corporate network was analyzed and a network architecture based on SD-WAN technology was designed. The proposed design allows the SDN solution to coexist within the productive network infrastructure, making possible a transparent implementation to the business operations. Next, the plan for deploying the designed architecture is described using the selected (and proprietary) Cisco Meraki SDN solution. An analysis of the benefits is presented in terms of the solution's performance and security. Finally, the conclusions are discussed and some future work is proposed based on the company's real-life scenario.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121377067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-06DOI: 10.1109/SDS54264.2021.9732138
Maziyar Nazari, Sepideh Goodarzy, Eric Keller, Eric Rozner, Shivakant Mishra
Serverless Computing is a new cloud computing paradigm wherein people in academia and industry are actively proposing either interesting improvements or building excellent applications on top of it. AWS, Google Cloud, Microsoft Azure, and IBM are popular samples of public clouds that offer Function-as-a-Service on top of their Serverless Computing platforms. Although this paradigm has had numerous advantages for software developers and programmers, it has introduced new challenges to cloud providers. Factors like fine-grained pricing and pay-as-you-go manner, eliminating the responsibility of resource management on the developer side, promises of elasticity and highly-available service, fault tolerance, auto-scaling, and being able to run embarrassingly parallel jobs make it a suitable platform for developers. On the other hand, efficient resource management, offering low-latency service, and providing proper security/isolation have been partly the main challenges introduced on the cloud provider side. This paper presents a literature review on today's Serverless platform optimizations and extensions that people have proposed and implemented to further capitalize the Serverless infras-tructure. In the end, we will provide the current Serverless paradigm's limitations and a few future directions and research opportunities regarding Serverless Computing.
{"title":"Optimizing and Extending Serverless Platforms: A Survey","authors":"Maziyar Nazari, Sepideh Goodarzy, Eric Keller, Eric Rozner, Shivakant Mishra","doi":"10.1109/SDS54264.2021.9732138","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9732138","url":null,"abstract":"Serverless Computing is a new cloud computing paradigm wherein people in academia and industry are actively proposing either interesting improvements or building excellent applications on top of it. AWS, Google Cloud, Microsoft Azure, and IBM are popular samples of public clouds that offer Function-as-a-Service on top of their Serverless Computing platforms. Although this paradigm has had numerous advantages for software developers and programmers, it has introduced new challenges to cloud providers. Factors like fine-grained pricing and pay-as-you-go manner, eliminating the responsibility of resource management on the developer side, promises of elasticity and highly-available service, fault tolerance, auto-scaling, and being able to run embarrassingly parallel jobs make it a suitable platform for developers. On the other hand, efficient resource management, offering low-latency service, and providing proper security/isolation have been partly the main challenges introduced on the cloud provider side. This paper presents a literature review on today's Serverless platform optimizations and extensions that people have proposed and implemented to further capitalize the Serverless infras-tructure. In the end, we will provide the current Serverless paradigm's limitations and a few future directions and research opportunities regarding Serverless Computing.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126281799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-06DOI: 10.1109/SDS54264.2021.9731853
Jonathan Sherwin, C. Sreenan
Software-Defined Networking (SDN) is used widely in Data Center Networks (DCNs) to facilitate the automated configuration of network devices required to provide cloud services and a multi-tenant environment. The resulting rate of change presents a challenge to a DCN operator who needs to be able to answer questions about the past state of the network. We describe our work in addressing this need, and how an ontological approach was taken to build a topological and temporal model of a DCN, which could then be populated using control-plane data captured in a message log. Sophisticated queries applied against the populated model allow the DCN operator to gain insight into the effects of historical automated configuration changes. We have tested our model for accuracy against a network from which a message log was captured, and we have demonstrated how queries have been formulated to retrieve useful information for the DCN operator.
软件定义网络SDN (Software-Defined Networking)广泛应用于数据中心网络(Data Center network, dcn)中,为提供云服务和多租户环境所需的网络设备提供自动化配置。由此产生的变化率对DCN运营商提出了挑战,因为他们需要能够回答有关网络过去状态的问题。我们描述了我们在满足这一需求方面的工作,以及如何采用本体论方法来构建DCN的拓扑和时间模型,然后可以使用消息日志中捕获的控制平面数据填充该模型。针对填充模型应用的复杂查询允许DCN操作员深入了解历史自动配置更改的影响。我们针对捕获消息日志的网络测试了我们的模型的准确性,并演示了如何制定查询来为DCN操作员检索有用的信息。
{"title":"Inferring and Querying the Past State of a Software-Defined Data Center Network","authors":"Jonathan Sherwin, C. Sreenan","doi":"10.1109/SDS54264.2021.9731853","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9731853","url":null,"abstract":"Software-Defined Networking (SDN) is used widely in Data Center Networks (DCNs) to facilitate the automated configuration of network devices required to provide cloud services and a multi-tenant environment. The resulting rate of change presents a challenge to a DCN operator who needs to be able to answer questions about the past state of the network. We describe our work in addressing this need, and how an ontological approach was taken to build a topological and temporal model of a DCN, which could then be populated using control-plane data captured in a message log. Sophisticated queries applied against the populated model allow the DCN operator to gain insight into the effects of historical automated configuration changes. We have tested our model for accuracy against a network from which a message log was captured, and we have demonstrated how queries have been formulated to retrieve useful information for the DCN operator.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127032853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-06DOI: 10.1109/SDS54264.2021.9732076
H. Al-Obiedollah, Ali Hayajneh, H. Salameh, K. Cumanan, Ahmad Al-Nimrat
Recently, several multiple access (MA) have been proposed to support the massive connectivity of the cognitive radio (CR) internet-of-things IoT-based networks. Among these MA techniques, the combination of spatial domain multiple access (SDMA) and non-orthogonal multiple access (NOMA), namely SDMA-NOMA, shows a potential capability to meet the unprecedented massive connectivity requirements. With this SDMA-NOMA approach, both spatial and power domains offered by NOMA and SDMA, respectively, are utilized together to serve the secondary users (SUs) in CR networks. To further increase the number of connected SUs, a multi-carrier SDMA-NOMA CR-based system is considered in this paper. With this approach, the available bandwidth of transmission is divided into a set of sub-channels, in which an SDMA-NOMA CR-based transmission is utilized. To explore the benefits of this multi-carrier SDMA-NOMA system over the existing conventional MA techniques, a power minimization (P-Min) problem is formulated. With this P-Min problem, the total transmit power is minimized subject to achieve a set of quality-of-service (QoS) constraints. Simulation results show that the proposed multi-carrier SDMA-NOMA CR system outperforms the conventional approaches in terms of the total required power for transmission.
{"title":"On The Performance of Multi-Carrier SDMA-NOMA CR-Based Systems","authors":"H. Al-Obiedollah, Ali Hayajneh, H. Salameh, K. Cumanan, Ahmad Al-Nimrat","doi":"10.1109/SDS54264.2021.9732076","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9732076","url":null,"abstract":"Recently, several multiple access (MA) have been proposed to support the massive connectivity of the cognitive radio (CR) internet-of-things IoT-based networks. Among these MA techniques, the combination of spatial domain multiple access (SDMA) and non-orthogonal multiple access (NOMA), namely SDMA-NOMA, shows a potential capability to meet the unprecedented massive connectivity requirements. With this SDMA-NOMA approach, both spatial and power domains offered by NOMA and SDMA, respectively, are utilized together to serve the secondary users (SUs) in CR networks. To further increase the number of connected SUs, a multi-carrier SDMA-NOMA CR-based system is considered in this paper. With this approach, the available bandwidth of transmission is divided into a set of sub-channels, in which an SDMA-NOMA CR-based transmission is utilized. To explore the benefits of this multi-carrier SDMA-NOMA system over the existing conventional MA techniques, a power minimization (P-Min) problem is formulated. With this P-Min problem, the total transmit power is minimized subject to achieve a set of quality-of-service (QoS) constraints. Simulation results show that the proposed multi-carrier SDMA-NOMA CR system outperforms the conventional approaches in terms of the total required power for transmission.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132116684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-06DOI: 10.1109/SDS54264.2021.9732142
M. Kourtis, Michael C. Batistatos, G. Xilouris, Thanos Sarlas, Themis Anagnostopoulos, I. Chochliouros, A. Kourtis
The definition of multiple slicing types in 5G has created a wide field for service innovation in communications. However, the advantages that network slicing has to offer remain to be fully exploited by today's applications and users. An important area that can potentially benefit from 5G slicing is emergency communications for First Responders. The latter consists of heterogeneous teams, imposing different requirements to the connectivity network. In this paper, the RESPOND-A platform is presented, which provides First Responders with network-enabled tools on top of 5G on-scene planning with enhanced service slicing capabilities tailored to emergency communications. Furthermore, a mapping of emergency services and communications to specific slice types is proposed to identify the current challenges in the field. Additionally, a novel slicing manager proposed and detailed, along with a group of performance measurements for low latency and high bandwidth slicing types. The approach is summarized by discussing future steps in the convergence of 5G network slicing in various areas of emergency applications.
{"title":"5G Slicing for Emergency Communications","authors":"M. Kourtis, Michael C. Batistatos, G. Xilouris, Thanos Sarlas, Themis Anagnostopoulos, I. Chochliouros, A. Kourtis","doi":"10.1109/SDS54264.2021.9732142","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9732142","url":null,"abstract":"The definition of multiple slicing types in 5G has created a wide field for service innovation in communications. However, the advantages that network slicing has to offer remain to be fully exploited by today's applications and users. An important area that can potentially benefit from 5G slicing is emergency communications for First Responders. The latter consists of heterogeneous teams, imposing different requirements to the connectivity network. In this paper, the RESPOND-A platform is presented, which provides First Responders with network-enabled tools on top of 5G on-scene planning with enhanced service slicing capabilities tailored to emergency communications. Furthermore, a mapping of emergency services and communications to specific slice types is proposed to identify the current challenges in the field. Additionally, a novel slicing manager proposed and detailed, along with a group of performance measurements for low latency and high bandwidth slicing types. The approach is summarized by discussing future steps in the convergence of 5G network slicing in various areas of emergency applications.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114780226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-06DOI: 10.1109/SDS54264.2021.9731854
Paola Soto, D. De Vleeschauwer, M. Camelo, Yorick De Bock, K. De Schepper, Chia-Yu Chang, P. Hellinckx, J. F. Botero, Steven Latré
Network Function Virtualization (NFV) is one of the main enablers behind the promised improvements in the Fifth Generation (5G) networking era. Thanks to this concept, Network Functions (NFs) are evolving into software components (e.g., Vir-tual Network Functions (VNFs)) that can be deployed in general-purpose servers following a cloud-based approach. In this way, NFs can be deployed at scale, fulfilling a great variety of service requirements. Unfortunately, the complexity in the management and orchestration of NFV-based networks has increased due to the diverse demands from a growing number of network services. Such complexity calls for an automated and autonomous solution that self adapts to the needs of those network services. In this paper, we propose and compare a Deep Reinforcement Learning (DRL) agent, a classical Proportional-Integral-Derivative (PID) controller, and a Threshold (THD)-based algorithm for autonomously determining the amount of VNF instances to fulfill a service latency requirement without knowing or predicting the expected demand. Finally, we present a comparison of the three approaches in terms of created VNFs and peak latency performed in a discrete event simulator.
{"title":"Towards Autonomous VNF Auto-scaling using Deep Reinforcement Learning","authors":"Paola Soto, D. De Vleeschauwer, M. Camelo, Yorick De Bock, K. De Schepper, Chia-Yu Chang, P. Hellinckx, J. F. Botero, Steven Latré","doi":"10.1109/SDS54264.2021.9731854","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9731854","url":null,"abstract":"Network Function Virtualization (NFV) is one of the main enablers behind the promised improvements in the Fifth Generation (5G) networking era. Thanks to this concept, Network Functions (NFs) are evolving into software components (e.g., Vir-tual Network Functions (VNFs)) that can be deployed in general-purpose servers following a cloud-based approach. In this way, NFs can be deployed at scale, fulfilling a great variety of service requirements. Unfortunately, the complexity in the management and orchestration of NFV-based networks has increased due to the diverse demands from a growing number of network services. Such complexity calls for an automated and autonomous solution that self adapts to the needs of those network services. In this paper, we propose and compare a Deep Reinforcement Learning (DRL) agent, a classical Proportional-Integral-Derivative (PID) controller, and a Threshold (THD)-based algorithm for autonomously determining the amount of VNF instances to fulfill a service latency requirement without knowing or predicting the expected demand. Finally, we present a comparison of the three approaches in terms of created VNFs and peak latency performed in a discrete event simulator.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134633419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-06DOI: 10.1109/SDS54264.2021.9732100
Mayank Raikwar, D. Gligoroski
Blockchain has evolved rapidly in the past decade, but it still faces challenges such as scalability, large block size, slow block verification, high communication overhead. Though multiple solutions have been proposed to overcome these challenges, a few solutions perform aggregation of blockchain data. Moreover, blockchain data can be a blockchain state, transaction, or consensus message. Therefore, the solutions involving aggregation have immense potential to solve several existing challenges in the blockchain ecosystem. In this work, we investigate and scrutinize possible aggregations in the blockchain. For that purpose, we first briefly describe cryptographic primitives with aggregation scheme and their applicability in the blockchain. These schemes can empower the blockchain with improved scalability, reduced block size, low communication overhead, and fast block verification. Then, we identify nine research problems related to these cryptographic primitives.
{"title":"Aggregation in Blockchain Ecosystem","authors":"Mayank Raikwar, D. Gligoroski","doi":"10.1109/SDS54264.2021.9732100","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9732100","url":null,"abstract":"Blockchain has evolved rapidly in the past decade, but it still faces challenges such as scalability, large block size, slow block verification, high communication overhead. Though multiple solutions have been proposed to overcome these challenges, a few solutions perform aggregation of blockchain data. Moreover, blockchain data can be a blockchain state, transaction, or consensus message. Therefore, the solutions involving aggregation have immense potential to solve several existing challenges in the blockchain ecosystem. In this work, we investigate and scrutinize possible aggregations in the blockchain. For that purpose, we first briefly describe cryptographic primitives with aggregation scheme and their applicability in the blockchain. These schemes can empower the blockchain with improved scalability, reduced block size, low communication overhead, and fast block verification. Then, we identify nine research problems related to these cryptographic primitives.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115801944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-06DOI: 10.1109/SDS54264.2021.9731848
Sarah Abdallah, A. Kayssi, I. Elhajj, A. Chehab
The centralization or distributedness of control exists beyond the area of telecommunication. Some systems, such as the biological nervous system or administrative and political regimes, exhibit the same interrelationship between the two types of control. These systems serve as an inspiration to designing hybrid control planes in data networks. This work aims to combine centralized and distributed protocols to form an adaptively-controlled hybrid system that exploits the advantages of both centralized and distributed control. The system is then allowed to shift either completely or partially from a centralized system to a distributed environment so as to deliver a desired performance. When applied to telecommunication networks, this approach allows us to fully exploit the advantages of both SDN and legacy networks for enhanced overall network robustness.
{"title":"Centralization vs. De-Centralization: Where Does the Network Control Plane Stand?","authors":"Sarah Abdallah, A. Kayssi, I. Elhajj, A. Chehab","doi":"10.1109/SDS54264.2021.9731848","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9731848","url":null,"abstract":"The centralization or distributedness of control exists beyond the area of telecommunication. Some systems, such as the biological nervous system or administrative and political regimes, exhibit the same interrelationship between the two types of control. These systems serve as an inspiration to designing hybrid control planes in data networks. This work aims to combine centralized and distributed protocols to form an adaptively-controlled hybrid system that exploits the advantages of both centralized and distributed control. The system is then allowed to shift either completely or partially from a centralized system to a distributed environment so as to deliver a desired performance. When applied to telecommunication networks, this approach allows us to fully exploit the advantages of both SDN and legacy networks for enhanced overall network robustness.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126749015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}