首页 > 最新文献

2014 28th International Conference on Advanced Information Networking and Applications Workshops最新文献

英文 中文
Performance Evaluation of LTE Network via Using Fixed/Mobile Femtocells 基于固定/移动Femtocells的LTE网络性能评估
R. Raheem, A. Lasebae, J. Loo
This paper examines the concept of Mobile Femtocells to be the revolution of the next generation cellular networks. Mobile Femtocells can be deployed in public transportation vehicles such as trains, buses or private cars that form its own cell inside vehicles to serve vehicular and mobile User Equipments. The purpose of this study is to help cell-edge users to have better signal strength. Therefore, an investigation into Long Term Evolution cell-edge users' performance is being conducted by investigating the deployment of Mobile Femtocells in LTE system. The throughput for cell edge users can be improved by deploying Fixed/Mobile Femtocells. In this paper, two scenarios have been considered in the case of Fixed/Mobile Femtocells. The handover of Mobile Femtocell has been expressed in three more scenarios. The achieved results via Matlab simulation showed that Mobile Femtocells' users have enjoyed better Quality of Services than Fixed Femtocells' users. The improved performance has been noticed through the improvement of the Mobile Femtocells UEs' spectral efficiency, throughput and SINR over the Fixed Femtocells' users. The system behavior has been investigated under low, medium and high load traffic before and after adding the Mobile Femtocells. The results showed that adding the Mobile Femtocells in the high loaded traffic areas has the biggest affect on improving the UE's throughput.
本文探讨了移动飞蜂窝的概念是下一代蜂窝网络的革命。移动Femtocells可以部署在公共交通工具上,如火车、公共汽车或私家车,它们在车内形成自己的蜂窝,为车辆和移动用户设备提供服务。本研究的目的是帮助蜂窝边缘用户获得更好的信号强度。因此,通过调查移动Femtocells在LTE系统中的部署,正在对长期演进蜂窝边缘用户的性能进行调查。通过部署固定/移动femtocell,可以提高蜂窝边缘用户的吞吐量。在本文中,考虑了固定/移动飞蜂窝的两种情况。Mobile Femtocell的移交有另外三种情况。通过Matlab仿真得到的结果表明,移动Femtocells用户比固定Femtocells用户享受到更好的服务质量。通过改进移动飞蜂窝ue的频谱效率、吞吐量和信噪比(SINR)来改善固定飞蜂窝的用户,可以注意到性能的改善。研究了加入移动基站前后系统在低、中、高负荷下的性能。结果表明,在高负荷通信区增加移动基站对提高终端吞吐量影响最大。
{"title":"Performance Evaluation of LTE Network via Using Fixed/Mobile Femtocells","authors":"R. Raheem, A. Lasebae, J. Loo","doi":"10.1109/WAINA.2014.51","DOIUrl":"https://doi.org/10.1109/WAINA.2014.51","url":null,"abstract":"This paper examines the concept of Mobile Femtocells to be the revolution of the next generation cellular networks. Mobile Femtocells can be deployed in public transportation vehicles such as trains, buses or private cars that form its own cell inside vehicles to serve vehicular and mobile User Equipments. The purpose of this study is to help cell-edge users to have better signal strength. Therefore, an investigation into Long Term Evolution cell-edge users' performance is being conducted by investigating the deployment of Mobile Femtocells in LTE system. The throughput for cell edge users can be improved by deploying Fixed/Mobile Femtocells. In this paper, two scenarios have been considered in the case of Fixed/Mobile Femtocells. The handover of Mobile Femtocell has been expressed in three more scenarios. The achieved results via Matlab simulation showed that Mobile Femtocells' users have enjoyed better Quality of Services than Fixed Femtocells' users. The improved performance has been noticed through the improvement of the Mobile Femtocells UEs' spectral efficiency, throughput and SINR over the Fixed Femtocells' users. The system behavior has been investigated under low, medium and high load traffic before and after adding the Mobile Femtocells. The results showed that adding the Mobile Femtocells in the high loaded traffic areas has the biggest affect on improving the UE's throughput.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115671887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A First Look at Caching during TIP-Tree Navigation for Location Based Services 在基于位置的服务的TIP-Tree导航期间的缓存初探
W. Osborn
This paper explores the issue of caching during TIP-tree navigation for location-based services. The TIP-tree is a recently proposed spatial access method for supporting continuous point queries in a tourist information system. In addition, its navigation strategy avoids repeating searching, thus providing efficient processing of user trajectories that are not known in advance. This paper proposes a caching strategy that further improves upon the efficiency of the TIP-tree navigation algorithm. A performance evaluation shows that significant improvement is possible when navigation and caching are applied together.
本文探讨了基于位置的服务在tip树导航期间的缓存问题。tip树是最近提出的一种支持旅游信息系统中连续点查询的空间访问方法。此外,它的导航策略避免了重复搜索,从而提供了事先不知道的用户轨迹的有效处理。本文提出了一种缓存策略,进一步提高了tip树导航算法的效率。性能评估表明,当导航和缓存一起应用时,可能会有显著的改进。
{"title":"A First Look at Caching during TIP-Tree Navigation for Location Based Services","authors":"W. Osborn","doi":"10.1109/WAINA.2014.37","DOIUrl":"https://doi.org/10.1109/WAINA.2014.37","url":null,"abstract":"This paper explores the issue of caching during TIP-tree navigation for location-based services. The TIP-tree is a recently proposed spatial access method for supporting continuous point queries in a tourist information system. In addition, its navigation strategy avoids repeating searching, thus providing efficient processing of user trajectories that are not known in advance. This paper proposes a caching strategy that further improves upon the efficiency of the TIP-tree navigation algorithm. A performance evaluation shows that significant improvement is possible when navigation and caching are applied together.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116970940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of PC Router Based Cognitive Wireless Network for Disaster-Resilient WANs 基于PC路由器的认知无线网络容灾广域网性能评估
Goshi Sato, Noriki Uchida, Y. Shibata
In order to temporally recover the information network infrastructure in disaster areas on the East Japan Great Earthquake on March 11, 2011, various wireless network technologies such as satellite IP network, 3G, Wi-Fi were effectively used. However, since those wireless networks are individually introduced and installed, but not totally integrated, some of networks were congested due to the sudden network traffic generation and unbalanced traffic distribution, eventually the total network could not effectively function. In this paper, by integrating those wireless networks into a cognitive wireless network, user can use this cognitive network as an access network to Internet by selecting the best network even though the serious disaster occurred. We introduce an OpenFlow based access network to automatically select the best network link and route among the possible access networks to Internet by periodically monitoring their network states and evaluate the those using extended AHP method. In order to verify the usefulness of our proposed system, a prototype system is constructed and its performance is evaluated.
2011年3月11日东日本大地震中,为了暂时恢复灾区的信息网络基础设施,有效利用了卫星IP网络、3G、Wi-Fi等多种无线网络技术。然而,由于这些无线网络是单独引入和安装的,而不是完全集成的,因此由于网络流量的突然产生和流量分配的不平衡,导致一些网络拥塞,最终导致整个网络无法有效运行。本文通过将这些无线网络整合成一个认知无线网络,即使在发生严重灾害的情况下,用户也可以通过选择最佳网络,将该认知无线网络作为互联网的接入网。介绍了一种基于OpenFlow的接入网,通过定期监测网络状态,自动选择最佳网络链路和路由,并采用扩展AHP方法对网络状态进行评价。为了验证系统的有效性,构建了一个原型系统,并对其性能进行了评估。
{"title":"Performance Evaluation of PC Router Based Cognitive Wireless Network for Disaster-Resilient WANs","authors":"Goshi Sato, Noriki Uchida, Y. Shibata","doi":"10.1109/WAINA.2014.100","DOIUrl":"https://doi.org/10.1109/WAINA.2014.100","url":null,"abstract":"In order to temporally recover the information network infrastructure in disaster areas on the East Japan Great Earthquake on March 11, 2011, various wireless network technologies such as satellite IP network, 3G, Wi-Fi were effectively used. However, since those wireless networks are individually introduced and installed, but not totally integrated, some of networks were congested due to the sudden network traffic generation and unbalanced traffic distribution, eventually the total network could not effectively function. In this paper, by integrating those wireless networks into a cognitive wireless network, user can use this cognitive network as an access network to Internet by selecting the best network even though the serious disaster occurred. We introduce an OpenFlow based access network to automatically select the best network link and route among the possible access networks to Internet by periodically monitoring their network states and evaluate the those using extended AHP method. In order to verify the usefulness of our proposed system, a prototype system is constructed and its performance is evaluated.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114549885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distinguishing between Web Attacks and Vulnerability Scans Based on Behavioral Characteristics 基于行为特征区分Web攻击和漏洞扫描
K. Goseva-Popstojanova, Ana Dimitrijevikj
The number of vulnerabilities and reported attacks on Web systems are showing increasing trends, which clearly illustrate the need for better understanding of malicious cyber activities. In this paper we use clustering to classify attacker activities aimed at Web systems. The empirical analysis is based on four datasets, each in duration of several months, collected by high-interaction honey pots. The results show that behavioral clustering analysis can be used to distinguish between attack sessions and vulnerability scan sessions. However, the performance heavily depends on the dataset. Furthermore, the results show that attacks differ from vulnerability scans in a small number of features (i.e., session characteristics). Specifically, for each dataset, the best feature selection method (in terms of the high probability of detection and low probability of false alarm) selects only three features and results into three to four clusters, significantly improving the performance of clustering compared to the case when all features are used. The best subset of features and the extent of the improvement, however, also depend on the dataset.
针对Web系统的漏洞和已报告的攻击数量呈现出不断增长的趋势,这清楚地说明需要更好地了解恶意网络活动。本文采用聚类方法对针对Web系统的攻击行为进行分类。实证分析基于四个数据集,每个数据集持续几个月,由高交互蜂蜜罐收集。结果表明,行为聚类分析可以用于区分攻击会话和漏洞扫描会话。然而,性能在很大程度上取决于数据集。此外,结果表明,攻击与漏洞扫描在少数特征(即会话特征)上有所不同。具体而言,对于每个数据集,最佳特征选择方法(从高检测概率和低虚警概率的角度来看)只选择三个特征并将结果分成三到四个聚类,与使用所有特征的情况相比,聚类的性能显著提高。然而,特征的最佳子集和改进的程度也取决于数据集。
{"title":"Distinguishing between Web Attacks and Vulnerability Scans Based on Behavioral Characteristics","authors":"K. Goseva-Popstojanova, Ana Dimitrijevikj","doi":"10.1109/WAINA.2014.15","DOIUrl":"https://doi.org/10.1109/WAINA.2014.15","url":null,"abstract":"The number of vulnerabilities and reported attacks on Web systems are showing increasing trends, which clearly illustrate the need for better understanding of malicious cyber activities. In this paper we use clustering to classify attacker activities aimed at Web systems. The empirical analysis is based on four datasets, each in duration of several months, collected by high-interaction honey pots. The results show that behavioral clustering analysis can be used to distinguish between attack sessions and vulnerability scan sessions. However, the performance heavily depends on the dataset. Furthermore, the results show that attacks differ from vulnerability scans in a small number of features (i.e., session characteristics). Specifically, for each dataset, the best feature selection method (in terms of the high probability of detection and low probability of false alarm) selects only three features and results into three to four clusters, significantly improving the performance of clustering compared to the case when all features are used. The best subset of features and the extent of the improvement, however, also depend on the dataset.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128259782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Remote Control Method for Mobile Robots Using Game Engines 基于游戏引擎的移动机器人远程控制方法
Osamu Ohashi, Eiji Ochiai, Y. Kato
This paper proposes a mapping method with the virtual world and the real world for robot remote controlling via the internet. Server isolates a user operation side in the virtual world and a robot working side in the real world. We use a Game Engine for creating the virtual world. The Game Engine handles user operation and user side view. This view is used for the reference for comparing matching level with the real world view which is taken by robots in the real world and current intensity level comparing with measured intensity concurrently. These comparing processes are done on the server. We validate efficiency of the method for applying to campus guidance service.
提出了一种虚拟世界与现实世界的映射方法,用于机器人网络远程控制。服务器隔离了虚拟世界中的用户操作端和现实世界中的机器人工作端。我们使用游戏引擎来创造虚拟世界。游戏引擎处理用户操作和用户侧视图。该视图用于比较机器人在现实世界中所采取的真实世界视图的匹配程度以及当前强度水平与测量强度的比较。这些比较过程在服务器上完成。验证了该方法在校园指导服务中的有效性。
{"title":"A Remote Control Method for Mobile Robots Using Game Engines","authors":"Osamu Ohashi, Eiji Ochiai, Y. Kato","doi":"10.1109/WAINA.2014.23","DOIUrl":"https://doi.org/10.1109/WAINA.2014.23","url":null,"abstract":"This paper proposes a mapping method with the virtual world and the real world for robot remote controlling via the internet. Server isolates a user operation side in the virtual world and a robot working side in the real world. We use a Game Engine for creating the virtual world. The Game Engine handles user operation and user side view. This view is used for the reference for comparing matching level with the real world view which is taken by robots in the real world and current intensity level comparing with measured intensity concurrently. These comparing processes are done on the server. We validate efficiency of the method for applying to campus guidance service.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114762336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secure Live Virtual Machines Migration: Issues and Solutions 安全的实时虚拟机迁移:问题和解决方案
Mahdi Aiash, G. Mapp, O. Gemikonakli
In recent years, there has been a huge trend towards running network intensive applications, such as Internet servers and Cloud-based service in virtual environment, where multiple virtual machines (VMs) running on the same machine share the machine's physical and network resources. In such environment, the virtual machine monitor (VMM) virtualizes the machine's resources in terms of CPU, memory, storage, network and I/O devices to allow multiple operating systems running in different VMs to operate and access the network concurrently. A key feature of virtualization is live migration (LM) that allows transfer of virtual machine from one physical server to another without interrupting the services running in virtual machine. Live migration facilitates workload balancing, fault tolerance, online system maintenance, consolidation of virtual machines etc. However, live migration is still in an early stage of implementation and its security is yet to be evaluated. The security concern of live migration is a major factor for its adoption by the IT industry. Therefore, this paper uses the X.805 security standard to investigate attacks on live virtual machine migration. The analysis highlights the main source of threats and suggests approaches to tackle them. The paper also surveys and compares different proposals in the literature to secure the live migration.
近年来,在虚拟环境中运行网络密集型应用程序(如Internet服务器和基于云的服务)已经成为一种巨大的趋势,在虚拟环境中,运行在同一台机器上的多个虚拟机(vm)共享机器的物理和网络资源。在这种环境下,虚拟机监视器(VMM)从CPU、内存、存储、网络和I/O设备等方面对机器的资源进行虚拟化,使运行在不同vm中的多个操作系统能够并发地操作和访问网络。虚拟化的一个关键特性是实时迁移(LM),它允许将虚拟机从一台物理服务器传输到另一台物理服务器,而不会中断虚拟机中运行的服务。实时迁移有助于工作负载平衡、容错、在线系统维护、虚拟机整合等。然而,实时迁移仍处于实施的早期阶段,其安全性还有待评估。实时迁移的安全性问题是IT行业采用实时迁移的主要因素。因此,本文使用X.805安全标准来研究对实时虚拟机迁移的攻击。该分析强调了威胁的主要来源,并提出了解决这些威胁的方法。本文还调查和比较了文献中不同的建议,以确保实时迁移。
{"title":"Secure Live Virtual Machines Migration: Issues and Solutions","authors":"Mahdi Aiash, G. Mapp, O. Gemikonakli","doi":"10.1109/WAINA.2014.35","DOIUrl":"https://doi.org/10.1109/WAINA.2014.35","url":null,"abstract":"In recent years, there has been a huge trend towards running network intensive applications, such as Internet servers and Cloud-based service in virtual environment, where multiple virtual machines (VMs) running on the same machine share the machine's physical and network resources. In such environment, the virtual machine monitor (VMM) virtualizes the machine's resources in terms of CPU, memory, storage, network and I/O devices to allow multiple operating systems running in different VMs to operate and access the network concurrently. A key feature of virtualization is live migration (LM) that allows transfer of virtual machine from one physical server to another without interrupting the services running in virtual machine. Live migration facilitates workload balancing, fault tolerance, online system maintenance, consolidation of virtual machines etc. However, live migration is still in an early stage of implementation and its security is yet to be evaluated. The security concern of live migration is a major factor for its adoption by the IT industry. Therefore, this paper uses the X.805 security standard to investigate attacks on live virtual machine migration. The analysis highlights the main source of threats and suggests approaches to tackle them. The paper also surveys and compares different proposals in the literature to secure the live migration.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126561521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Botnet Behaviour Analysis Using IP Flows: With HTTP Filters Using Classifiers 使用IP流的僵尸网络行为分析:使用分类器的HTTP过滤器
Fariba Haddadi, Jillian Morgan, Eduardo Gomes Filho, A. N. Zincir-Heywood
Botnets are one of the most destructive threats against the cyber security. Recently, HTTP protocol is frequently utilized by botnets as the Command and Communication (C&C) protocol. In this work, we aim to detect HTTP based botnet activity based on botnet behaviour analysis via machine learning approach. To achieve this, we employ flow-based network traffic utilizing NetFlow (via Softflowd). The proposed botnet analysis system is implemented by employing two different machine learning algorithms, C4.5 and Naive Bayes. Our results show that C4.5 learning algorithm based classifier obtained very promising performance on detecting HTTP based botnet activity.
僵尸网络是对网络安全最具破坏性的威胁之一。近年来,僵尸网络经常利用HTTP协议作为命令与通信(C&C)协议。在这项工作中,我们的目标是通过机器学习方法基于僵尸网络行为分析来检测基于HTTP的僵尸网络活动。为了实现这一点,我们采用基于流量的网络流量利用NetFlow(通过softflow)。该僵尸网络分析系统采用C4.5和朴素贝叶斯两种不同的机器学习算法来实现。结果表明,基于C4.5学习算法的分类器在检测基于HTTP的僵尸网络活动方面取得了很好的效果。
{"title":"Botnet Behaviour Analysis Using IP Flows: With HTTP Filters Using Classifiers","authors":"Fariba Haddadi, Jillian Morgan, Eduardo Gomes Filho, A. N. Zincir-Heywood","doi":"10.1109/WAINA.2014.19","DOIUrl":"https://doi.org/10.1109/WAINA.2014.19","url":null,"abstract":"Botnets are one of the most destructive threats against the cyber security. Recently, HTTP protocol is frequently utilized by botnets as the Command and Communication (C&C) protocol. In this work, we aim to detect HTTP based botnet activity based on botnet behaviour analysis via machine learning approach. To achieve this, we employ flow-based network traffic utilizing NetFlow (via Softflowd). The proposed botnet analysis system is implemented by employing two different machine learning algorithms, C4.5 and Naive Bayes. Our results show that C4.5 learning algorithm based classifier obtained very promising performance on detecting HTTP based botnet activity.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131010695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
An Approach for Performance Modelling and Analysis of Multi-tiers Autonomic Systems 多层自治系统的性能建模与分析方法
Mehdi Sliem, Nabila Salmi, M. Ioualalen
The need of a modern system to be more autonomous with regard to its environment make autonomic systems very attractive, providing them with self-management capabilities. Usually, an autonomic system reconfigures itself to overcome some problem or optimize itself. However, these reconfigurations may result in a loss of performance or even a service degradation. To avoid such situations, this paper proposes a performance prediction approach for autonomic systems, based on formal modelling. Our goal is to forecast the most appropriate configuration for an autonomic system, particularly, a multi-tier system, in order to get an efficient use of resources. The main idea is to model resource allocation triggered by the autonomic loop for achieving the best configuration. Then, we show how to analyse the whole system and evaluate the autonomic loop impact on system performances. The method is based on Stochastic Petri Nets (SPN) modelling. The resource availability, the workload intensity and the autonomic features are targeted. A typical example of a multiers system with one server is presented, analysed with the GreatSPN tool, to show the effectiveness of the proposed approach.
现代系统需要在其环境方面更加自主,这使得自主系统非常具有吸引力,为它们提供了自我管理能力。通常,一个自治系统会重新配置自己来克服一些问题或优化自己。但是,这些重新配置可能会导致性能损失甚至服务降级。为了避免这种情况,本文提出了一种基于形式化建模的自主系统性能预测方法。我们的目标是预测自治系统,特别是多层系统的最合适配置,以便有效地利用资源。其主要思想是对由自治循环触发的资源分配进行建模,以实现最佳配置。然后,我们展示了如何分析整个系统并评估自主回路对系统性能的影响。该方法基于随机Petri网(SPN)建模。目标是资源可用性、工作负载强度和自主特性。给出了一个带有一台服务器的乘数系统的典型示例,并使用GreatSPN工具进行了分析,以证明所提出方法的有效性。
{"title":"An Approach for Performance Modelling and Analysis of Multi-tiers Autonomic Systems","authors":"Mehdi Sliem, Nabila Salmi, M. Ioualalen","doi":"10.1109/WAINA.2014.63","DOIUrl":"https://doi.org/10.1109/WAINA.2014.63","url":null,"abstract":"The need of a modern system to be more autonomous with regard to its environment make autonomic systems very attractive, providing them with self-management capabilities. Usually, an autonomic system reconfigures itself to overcome some problem or optimize itself. However, these reconfigurations may result in a loss of performance or even a service degradation. To avoid such situations, this paper proposes a performance prediction approach for autonomic systems, based on formal modelling. Our goal is to forecast the most appropriate configuration for an autonomic system, particularly, a multi-tier system, in order to get an efficient use of resources. The main idea is to model resource allocation triggered by the autonomic loop for achieving the best configuration. Then, we show how to analyse the whole system and evaluate the autonomic loop impact on system performances. The method is based on Stochastic Petri Nets (SPN) modelling. The resource availability, the workload intensity and the autonomic features are targeted. A typical example of a multiers system with one server is presented, analysed with the GreatSPN tool, to show the effectiveness of the proposed approach.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130990110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
REST API Design Patterns for SDN Northbound API SDN北向API的REST API设计模式
Wei Zhou, Li Li, Min Luo, W. Chou
REST architectural style gains increasing popularity in the networking protocol design, and it has become a prevalent choice for northbound API of Software-Defined Networking (SDN). This paper addresses many critical issues in RESTful networking protocol design, and presents a framework on how a networking protocol can be designed in a truly RESTful manner, making it towards a service oriented data networking. In particular, we introduce the HTTP content negotiation mechanism which allows clients to select different representation formats from the same resource URI. Most importantly, we present a hypertext-driven approach, so that hypertext links are defined between REST resources for the networking protocol to guide clients to identify the right resources rather than relying on fixed resource URIs. The advantages of our approach are verified in two folds. First, we show how to apply our approach to fix REST design problems in some existing northbound networking APIs, and then we show how to design a RESTful northbound API of SDN in the context of OpenStack. We implemented our proposed approach in the northbound REST API of SOX, a generalized SDN controller, and the benefits of the proposed approach are experimentally verified.
REST架构风格在网络协议设计中越来越流行,成为软件定义网络(SDN)北向API的普遍选择。本文解决了RESTful网络协议设计中的许多关键问题,并提出了一个框架,说明如何以真正的RESTful方式设计网络协议,使其朝着面向服务的数据网络发展。特别是,我们引入了HTTP内容协商机制,该机制允许客户端从相同的资源URI中选择不同的表示格式。最重要的是,我们提出了一种超文本驱动的方法,以便在网络协议的REST资源之间定义超文本链接,以指导客户端识别正确的资源,而不是依赖于固定的资源uri。我们的方法的优点在两个方面得到了验证。首先,我们展示了如何应用我们的方法来解决一些现有的北向网络API中的REST设计问题,然后我们展示了如何在OpenStack的上下文中设计SDN的RESTful北向API。我们在广义SDN控制器SOX的北向REST API中实现了所提出的方法,并通过实验验证了所提出方法的优点。
{"title":"REST API Design Patterns for SDN Northbound API","authors":"Wei Zhou, Li Li, Min Luo, W. Chou","doi":"10.1109/WAINA.2014.153","DOIUrl":"https://doi.org/10.1109/WAINA.2014.153","url":null,"abstract":"REST architectural style gains increasing popularity in the networking protocol design, and it has become a prevalent choice for northbound API of Software-Defined Networking (SDN). This paper addresses many critical issues in RESTful networking protocol design, and presents a framework on how a networking protocol can be designed in a truly RESTful manner, making it towards a service oriented data networking. In particular, we introduce the HTTP content negotiation mechanism which allows clients to select different representation formats from the same resource URI. Most importantly, we present a hypertext-driven approach, so that hypertext links are defined between REST resources for the networking protocol to guide clients to identify the right resources rather than relying on fixed resource URIs. The advantages of our approach are verified in two folds. First, we show how to apply our approach to fix REST design problems in some existing northbound networking APIs, and then we show how to design a RESTful northbound API of SDN in the context of OpenStack. We implemented our proposed approach in the northbound REST API of SOX, a generalized SDN controller, and the benefits of the proposed approach are experimentally verified.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131404701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 110
Internet Traffic Engineering: Understanding the Specialist Decision-Making Process for Traffic Management in South America 互联网流量工程:了解南美流量管理的专家决策过程
M. Deus, P. Carvalho, J. P. Leite
The importance of the traffic control is a huge paradigm on the Internet. The AS (Autonomous Systems) by definition assumes no external control as priority; this could be an enormous problem when the traffic is asymmetric and the inbound is the higher portion. The problem is very often in networks hosted in South America countries; making the unbalancing inbound and outbound in a rate of more than 5:1 in some situations. In this article some Real South America networks will be analyzed, characterized including the specialist (e.g. Network Engineer) decision-making.
流量控制的重要性在互联网上是一个巨大的范例。AS(自治系统)根据定义,没有外部控制作为优先级;当流量不对称且入站流量较高时,这可能是一个巨大的问题。这个问题经常出现在南美洲国家的网络中;在某些情况下,使入站和出站的不平衡率超过5:1。在这篇文章中,一些真正的南美网络将被分析,包括专家(如网络工程师)决策的特点。
{"title":"Internet Traffic Engineering: Understanding the Specialist Decision-Making Process for Traffic Management in South America","authors":"M. Deus, P. Carvalho, J. P. Leite","doi":"10.1109/WAINA.2014.155","DOIUrl":"https://doi.org/10.1109/WAINA.2014.155","url":null,"abstract":"The importance of the traffic control is a huge paradigm on the Internet. The AS (Autonomous Systems) by definition assumes no external control as priority; this could be an enormous problem when the traffic is asymmetric and the inbound is the higher portion. The problem is very often in networks hosted in South America countries; making the unbalancing inbound and outbound in a rate of more than 5:1 in some situations. In this article some Real South America networks will be analyzed, characterized including the specialist (e.g. Network Engineer) decision-making.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115916057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 28th International Conference on Advanced Information Networking and Applications Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1