首页 > 最新文献

Journal of Network and Systems Management最新文献

英文 中文
EDaTAD: Energy-Aware Data Transmission Approach with Decision-Making for Fog Computing-Based IoT Applications EDaTAD:为基于雾计算的物联网应用提供具有决策功能的节能数据传输方法
IF 3.6 3区 计算机科学 Q2 Business, Management and Accounting Pub Date : 2024-06-03 DOI: 10.1007/s10922-024-09828-6
Ali Kadhum Idrees, Tara Ali-Yahiya, Sara Kadhum Idrees, Raphael Couturier

In the fog computing-based Internet of Things (IoT) architecture, the sensor devices represent the basic elements needed to sense the surrounding environment. They gather and send a huge amount of data to the fog gateway and then to the cloud due to their use in various real-world IoT applications. This would lead to high data traffic, increased energy consumption, and slow decisions at the fog gateway. Therefore, it is important to reduce the transmitted data to save energy and provide an accurate decision regarding the safety and health of the building’s environment. This paper suggests an energy-aware data transmission approach with decision-making (EDaTAD) for Fog Computing-based IoT applications. It works on two-level nodes in the fog computing-based TI architecture: sensor devices and fog gateways. The EDaTAD implements a Lightweight Redundant Data Removing (LiReDaR) algorithm at the sensor device level to lower the gathered data before sending it to the fog gateway. In the fog gateway, a decision-making model is proposed to provide suitable decisions to the monitoring staff in remote monitoring applications. Finally, it executes a Data Set Redundancy Elimination (DaSeRE) approach to discard the repetitive data sets before sending them to the cloud for archiving and further analysis. EDaTAD outperforms other methods in terms of transmitted data, energy consumption, and data accuracy. Furthermore, it assesses the risk efficiently and provides suitable decisions while decreasing the latency time.

在基于雾计算的物联网(IoT)架构中,传感器设备是感知周围环境所需的基本要素。由于在各种真实世界的物联网应用中使用,它们会收集大量数据并发送到雾网关,然后再发送到云端。这将导致高数据流量、能耗增加以及雾网关决策缓慢。因此,必须减少传输的数据,以节约能源并提供有关建筑环境安全和健康的准确决策。本文为基于雾计算的物联网应用提出了一种具有决策功能的能源感知数据传输方法(EDaTAD)。它适用于基于雾计算的 TI 架构中的两级节点:传感器设备和雾网关。EDaTAD 在传感器设备层实现了轻量级冗余数据移除(LiReDaR)算法,在将收集到的数据发送到雾网关之前将其降低。在雾网关中,提出了一个决策模型,为远程监控应用中的监控人员提供合适的决策。最后,它执行了一种数据集冗余消除(DaSeRE)方法,在将重复数据集发送到云端进行归档和进一步分析之前将其丢弃。EDaTAD 在传输数据、能耗和数据准确性方面都优于其他方法。此外,它还能有效评估风险并提供合适的决策,同时减少延迟时间。
{"title":"EDaTAD: Energy-Aware Data Transmission Approach with Decision-Making for Fog Computing-Based IoT Applications","authors":"Ali Kadhum Idrees, Tara Ali-Yahiya, Sara Kadhum Idrees, Raphael Couturier","doi":"10.1007/s10922-024-09828-6","DOIUrl":"https://doi.org/10.1007/s10922-024-09828-6","url":null,"abstract":"<p>In the fog computing-based Internet of Things (IoT) architecture, the sensor devices represent the basic elements needed to sense the surrounding environment. They gather and send a huge amount of data to the fog gateway and then to the cloud due to their use in various real-world IoT applications. This would lead to high data traffic, increased energy consumption, and slow decisions at the fog gateway. Therefore, it is important to reduce the transmitted data to save energy and provide an accurate decision regarding the safety and health of the building’s environment. This paper suggests an energy-aware data transmission approach with decision-making (EDaTAD) for Fog Computing-based IoT applications. It works on two-level nodes in the fog computing-based TI architecture: sensor devices and fog gateways. The EDaTAD implements a Lightweight Redundant Data Removing (LiReDaR) algorithm at the sensor device level to lower the gathered data before sending it to the fog gateway. In the fog gateway, a decision-making model is proposed to provide suitable decisions to the monitoring staff in remote monitoring applications. Finally, it executes a Data Set Redundancy Elimination (DaSeRE) approach to discard the repetitive data sets before sending them to the cloud for archiving and further analysis. EDaTAD outperforms other methods in terms of transmitted data, energy consumption, and data accuracy. Furthermore, it assesses the risk efficiently and provides suitable decisions while decreasing the latency time.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141258114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-Aware Microservice-Based Application Deployment in UAV-Based Networks for Rural Scenarios 面向农村场景的无人机网络中基于能量感知的微服务应用部署
IF 3.6 3区 计算机科学 Q2 Business, Management and Accounting Pub Date : 2024-05-31 DOI: 10.1007/s10922-024-09825-9
Diego Ramos-Ramos, Alejandro González-Vegas, Javier Berrocal, Jaime Galán-Jiménez

Yearly, the rates of Internet penetration are on the rise, surpassing 80% in developed nations. Despite this progress, over two billion individuals in rural and low-income regions face a complete absence of Internet access. This lack of connectivity hinders the implementation of vital services like remote healthcare, emergency assistance, distance learning, and personal communications. To bridge this gap and bring essential services to rural populations, this paper leverages Unmanned Aerial Vehicles (UAVs). The proposal introduces a UAV-based network architecture and an energy-efficient algorithm to deploy Internet of Things (IoT) applications. These applications are broken down into microservices, strategically distributed among a subset of UAVs. This approach addresses the limitations associated with running an entire IoT application on a single UAV, which could lead to suboptimal outcomes due to battery and computational constraints. Simulation results conducted in a realistic scenario underscore the effectiveness of the proposed solution. The evaluation includes assessing the percentage of IoT requests successfully served to users in the designated area and reducing the energy consumption required by UAVs during the handling of such requests.

互联网普及率逐年上升,在发达国家已超过 80%。尽管取得了这一进步,但农村和低收入地区仍有 20 多亿人完全无法接入互联网。这种连接的缺乏阻碍了远程医疗、紧急援助、远程学习和个人通信等重要服务的实施。为了弥补这一差距并为农村人口提供基本服务,本文利用了无人机(UAV)。该提案介绍了一种基于无人飞行器的网络架构和一种高能效算法,用于部署物联网(IoT)应用。这些应用被分解成微服务,战略性地分布在无人机子集中。这种方法解决了在单个无人机上运行整个物联网应用的局限性,因为单个无人机可能会因电池和计算限制而导致次优结果。在现实场景中进行的模拟结果证明了所提解决方案的有效性。评估内容包括评估向指定区域内的用户成功提供物联网请求的百分比,以及降低无人机在处理此类请求时所需的能耗。
{"title":"Energy-Aware Microservice-Based Application Deployment in UAV-Based Networks for Rural Scenarios","authors":"Diego Ramos-Ramos, Alejandro González-Vegas, Javier Berrocal, Jaime Galán-Jiménez","doi":"10.1007/s10922-024-09825-9","DOIUrl":"https://doi.org/10.1007/s10922-024-09825-9","url":null,"abstract":"<p>Yearly, the rates of Internet penetration are on the rise, surpassing 80% in developed nations. Despite this progress, over two billion individuals in rural and low-income regions face a complete absence of Internet access. This lack of connectivity hinders the implementation of vital services like remote healthcare, emergency assistance, distance learning, and personal communications. To bridge this gap and bring essential services to rural populations, this paper leverages Unmanned Aerial Vehicles (UAVs). The proposal introduces a UAV-based network architecture and an energy-efficient algorithm to deploy Internet of Things (IoT) applications. These applications are broken down into microservices, strategically distributed among a subset of UAVs. This approach addresses the limitations associated with running an entire IoT application on a single UAV, which could lead to suboptimal outcomes due to battery and computational constraints. Simulation results conducted in a realistic scenario underscore the effectiveness of the proposed solution. The evaluation includes assessing the percentage of IoT requests successfully served to users in the designated area and reducing the energy consumption required by UAVs during the handling of such requests.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141190342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Sybil Attacks in VANET: Exploring Feature Diversity and Deep Learning Algorithms with Insights into Sybil Node Associations 检测 VANET 中的假冒攻击:探索特征多样性和深度学习算法,洞察假节点关联
IF 3.6 3区 计算机科学 Q2 Business, Management and Accounting Pub Date : 2024-05-23 DOI: 10.1007/s10922-024-09827-7
Rukhsar Sultana, Jyoti Grover, Meenakshi Tripathi, Manhar Singh Sachdev, Sparsh Taneja
{"title":"Detecting Sybil Attacks in VANET: Exploring Feature Diversity and Deep Learning Algorithms with Insights into Sybil Node Associations","authors":"Rukhsar Sultana, Jyoti Grover, Meenakshi Tripathi, Manhar Singh Sachdev, Sparsh Taneja","doi":"10.1007/s10922-024-09827-7","DOIUrl":"https://doi.org/10.1007/s10922-024-09827-7","url":null,"abstract":"","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141103432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Economic Alternatives for the Provision of URLLC and eMBB Services Over a 5G Network 通过 5G 网络提供 URLLC 和 eMBB 服务的经济替代方案
IF 3.6 3区 计算机科学 Q2 Business, Management and Accounting Pub Date : 2024-05-21 DOI: 10.1007/s10922-024-09826-8
Edison Moreno-Cardenas, Erwin J. Sacoto-Cabrera, Luis Guijarro
{"title":"Economic Alternatives for the Provision of URLLC and eMBB Services Over a 5G Network","authors":"Edison Moreno-Cardenas, Erwin J. Sacoto-Cabrera, Luis Guijarro","doi":"10.1007/s10922-024-09826-8","DOIUrl":"https://doi.org/10.1007/s10922-024-09826-8","url":null,"abstract":"","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141115600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile-Aware Service Function Chain Intelligent Seamless Migration in Multi-access Edge Computing 多接入边缘计算中的移动感知服务功能链智能无缝迁移
IF 3.6 3区 计算机科学 Q2 Business, Management and Accounting Pub Date : 2024-05-18 DOI: 10.1007/s10922-024-09820-0
Lingyi Xu, Wenbin Liu, Zhiwei Wang, Jianxiao Luo, Jinjiang Wang, Zhi Ma

With the improvement of service delay and quality requirements for new applications such as unmanned driving, internet of vehicles, and virtual reality, the deployment of network services is gradually moving from the cloud to the edge. This transition has led to the emergence of multi-access edge computing (MEC) architectures such as distributed micro data center and fog computing. In the MEC environment, network infrastructure is distributed around users, allowing them to access the network nearby and move between different service coverage locations. However, the high mobility of users can significantly affect service orchestration and quality, and even cause service interruption. How to respond to user mobility, dynamically migrate user services, and provide users with a continuous and seamless service experience has become a huge challenge. This paper studies the dynamic migration of service function chain (SFC) caused by user mobility in MEC environments. First, we model the SFC dynamic migration problem in mobile scenarios as an integer programming problem with the goal of optimizing service delay, migration success rate, and migration time. Based on the above model, we propose a deep reinforcement learning-driven SFC adaptive dynamic migration optimization algorithm (DRL-ADMO). DRL-ADMO can perceive the underlying network resources and SFC migration requests, intelligently decide on the migration paths of multiple network functions, and adaptively allocate bandwidth, achieving parallel and seamless SFC migration. Performance evaluation results show that compared with existing algorithms, the proposed algorithm can optimize 7% service delay and 20% migration success rate at the cost of sacrificing a small amount of migration time.

随着无人驾驶、车联网和虚拟现实等新应用对服务延迟和质量要求的提高,网络服务的部署正逐渐从云端转移到边缘。这种转变导致了分布式微型数据中心和雾计算等多接入边缘计算(MEC)架构的出现。在 MEC 环境中,网络基础设施分布在用户周围,允许用户就近访问网络,并在不同的服务覆盖地点之间移动。然而,用户的高流动性会严重影响服务协调和质量,甚至导致服务中断。如何应对用户的移动性,动态迁移用户服务,为用户提供连续、无缝的服务体验,成为一个巨大的挑战。本文研究了 MEC 环境中由用户移动引起的服务功能链(SFC)的动态迁移。首先,我们将移动场景下的 SFC 动态迁移问题建模为一个整数编程问题,目标是优化服务延迟、迁移成功率和迁移时间。基于上述模型,我们提出了一种深度强化学习驱动的 SFC 自适应动态迁移优化算法(DRL-ADMO)。DRL-ADMO 可感知底层网络资源和 SFC 迁移请求,智能决定多个网络功能的迁移路径,并自适应分配带宽,实现并行、无缝的 SFC 迁移。性能评估结果表明,与现有算法相比,所提出的算法以牺牲少量迁移时间为代价,可优化 7% 的服务延迟和 20% 的迁移成功率。
{"title":"Mobile-Aware Service Function Chain Intelligent Seamless Migration in Multi-access Edge Computing","authors":"Lingyi Xu, Wenbin Liu, Zhiwei Wang, Jianxiao Luo, Jinjiang Wang, Zhi Ma","doi":"10.1007/s10922-024-09820-0","DOIUrl":"https://doi.org/10.1007/s10922-024-09820-0","url":null,"abstract":"<p>With the improvement of service delay and quality requirements for new applications such as unmanned driving, internet of vehicles, and virtual reality, the deployment of network services is gradually moving from the cloud to the edge. This transition has led to the emergence of multi-access edge computing (MEC) architectures such as distributed micro data center and fog computing. In the MEC environment, network infrastructure is distributed around users, allowing them to access the network nearby and move between different service coverage locations. However, the high mobility of users can significantly affect service orchestration and quality, and even cause service interruption. How to respond to user mobility, dynamically migrate user services, and provide users with a continuous and seamless service experience has become a huge challenge. This paper studies the dynamic migration of service function chain (SFC) caused by user mobility in MEC environments. First, we model the SFC dynamic migration problem in mobile scenarios as an integer programming problem with the goal of optimizing service delay, migration success rate, and migration time. Based on the above model, we propose a deep reinforcement learning-driven SFC adaptive dynamic migration optimization algorithm (DRL-ADMO). DRL-ADMO can perceive the underlying network resources and SFC migration requests, intelligently decide on the migration paths of multiple network functions, and adaptively allocate bandwidth, achieving parallel and seamless SFC migration. Performance evaluation results show that compared with existing algorithms, the proposed algorithm can optimize 7% service delay and 20% migration success rate at the cost of sacrificing a small amount of migration time.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141061137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power-Profile in Q-Learning NOMA Random Access Protocols for Throughput Maximization Q 学习 NOMA 随机存取协议中的功率曲线以实现吞吐量最大化
IF 3.6 3区 计算机科学 Q2 Business, Management and Accounting Pub Date : 2024-05-17 DOI: 10.1007/s10922-024-09823-x
João Paulo Monteiro Santana, Taufik Abrão
{"title":"Power-Profile in Q-Learning NOMA Random Access Protocols for Throughput Maximization","authors":"João Paulo Monteiro Santana, Taufik Abrão","doi":"10.1007/s10922-024-09823-x","DOIUrl":"https://doi.org/10.1007/s10922-024-09823-x","url":null,"abstract":"","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140963869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building a Comprehensive Intent-Based Networking Framework: A Practical Approach from Design Concepts to Implementation 构建基于意图的综合网络框架:从设计概念到实施的实用方法
IF 3.6 3区 计算机科学 Q2 Business, Management and Accounting Pub Date : 2024-05-03 DOI: 10.1007/s10922-024-09819-7
Henry Yu, Hesam Rahimi, Christopher Janz, Dong Wang, Zhen Li, Chungang Yang, Yehua Zhao

Intent-Based Networking (IBN) is an important step towards achieving network automation. Many challenges of today’s complex network management systems can be tackled by the solutions proposed by IBN. However, although IBN has gained a lot of attention from the academic and industrial community in the second half of the last decade leading to many scientific publications and research papers, there has been little effort made on proposing a comprehensive framework for IBN, which converts system-level IBN concepts and theories into a fully featured software implementation. This paper presents such framework. Its implementation is standards-based and open-source. The framework can be used to facilitate and validate novel research ideas and test cases. The paper discusses relevant IBN design concepts and theories, how the framework’s software architecture is derived from those concepts, and the technical and implementation details on key IBN aspects and features including Intent life-cycle, Intent definition and translation, Intent orchestration, and Intent assurance using closed-loops. We also demonstrate a real intent-based use case realized by the framework in order to show and validate the proof-of-concept (PoC). The Future work of this project is also discussed.

基于意图的网络(IBN)是实现网络自动化的重要一步。IBN 提出的解决方案可以解决当今复杂网络管理系统面临的许多挑战。然而,尽管 IBN 在过去十年的后半期得到了学术界和工业界的广泛关注,发表了许多科学出版物和研究论文,但很少有人致力于提出一个全面的 IBN 框架,将系统级的 IBN 概念和理论转化为功能齐全的软件实现。本文介绍了这种框架。其实施基于标准并开源。该框架可用于促进和验证新的研究理念和测试案例。本文讨论了相关的 IBN 设计概念和理论,框架的软件架构是如何从这些概念中衍生出来的,以及 IBN 关键方面和功能的技术和实现细节,包括意图生命周期、意图定义和翻译、意图协调和使用闭环的意图保证。我们还演示了框架实现的基于意图的真实用例,以展示和验证概念验证(PoC)。我们还讨论了该项目的未来工作。
{"title":"Building a Comprehensive Intent-Based Networking Framework: A Practical Approach from Design Concepts to Implementation","authors":"Henry Yu, Hesam Rahimi, Christopher Janz, Dong Wang, Zhen Li, Chungang Yang, Yehua Zhao","doi":"10.1007/s10922-024-09819-7","DOIUrl":"https://doi.org/10.1007/s10922-024-09819-7","url":null,"abstract":"<p>Intent-Based Networking (IBN) is an important step towards achieving network automation. Many challenges of today’s complex network management systems can be tackled by the solutions proposed by IBN. However, although IBN has gained a lot of attention from the academic and industrial community in the second half of the last decade leading to many scientific publications and research papers, there has been little effort made on proposing a comprehensive framework for IBN, which converts system-level IBN concepts and theories into a fully featured software implementation. This paper presents such framework. Its implementation is standards-based and open-source. The framework can be used to facilitate and validate novel research ideas and test cases. The paper discusses relevant IBN design concepts and theories, how the framework’s software architecture is derived from those concepts, and the technical and implementation details on key IBN aspects and features including Intent life-cycle, Intent definition and translation, Intent orchestration, and Intent assurance using closed-loops. We also demonstrate a real intent-based use case realized by the framework in order to show and validate the proof-of-concept (PoC). The Future work of this project is also discussed.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140883169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Initialization Functions for Metaheuristic-Based Online Virtual Network Embedding 基于元搜索的在线虚拟网络嵌入的新初始化函数
IF 3.6 3区 计算机科学 Q2 Business, Management and Accounting Pub Date : 2024-04-30 DOI: 10.1007/s10922-024-09822-y
Javier Rubio-Loyola, Christian Aguilar-Fuster

Virtual network embedding (VNE) is the process of allocating resources in a substrate (i.e. physical) network to support virtual networks optimally. The VNE problem is an NP-hard problem that has been studied for more than a decade in the continuous seek to maximize the revenue of physical infrastructures with more efficient VNE solutions. Metaheuristics have been widely used in online VNE as they incorporate mechanisms to avoid local optimum solutions, explore larger search spaces, and keep acceptable execution times. All metaheuristic optimization algorithms require initialization for which the vast majority of online VNE solutions implement random initialization. This paper proposes three novel initialization functions namely, Initialization Based on Node Selection (IFNS), Initialization Function Based on Community Detection (IFCD), and Initialization Function Based on Previous Solutions (IFPS), intending to enhance the performance of the online VNE process. Through simulation, our initialization functions have been proven to enhance the acceptance rate, revenue, and revenue-to-cost metrics of the VNE process. The enhancements achieved by our initialization functions are statistically significant and their implementation does not add computational overhead to the classic VNE approaches.

虚拟网络嵌入(VNE)是指在基质(即物理)网络中分配资源,以最佳方式支持虚拟网络的过程。虚拟网络嵌入问题是一个 NP 难度很高的问题,十多年来,人们一直在研究如何通过更高效的虚拟网络嵌入解决方案实现物理基础设施收益的最大化。元启发式已被广泛应用于在线 VNE,因为它们结合了避免局部最优解、探索更大搜索空间和保持可接受执行时间的机制。所有元启发式优化算法都需要初始化,而绝大多数在线 VNE 解决方案都采用随机初始化。本文提出了三种新颖的初始化函数,即基于节点选择的初始化(IFNS)、基于社群检测的初始化函数(IFCD)和基于先前解决方案的初始化函数(IFPS),旨在提高在线 VNE 流程的性能。通过仿真,我们的初始化功能被证明可以提高 VNE 流程的接受率、收入和收入成本比指标。我们的初始化函数所实现的提升在统计学上是显著的,而且其实施不会增加传统 VNE 方法的计算开销。
{"title":"Novel Initialization Functions for Metaheuristic-Based Online Virtual Network Embedding","authors":"Javier Rubio-Loyola, Christian Aguilar-Fuster","doi":"10.1007/s10922-024-09822-y","DOIUrl":"https://doi.org/10.1007/s10922-024-09822-y","url":null,"abstract":"<p>Virtual network embedding (VNE) is the process of allocating resources in a substrate (i.e. physical) network to support virtual networks optimally. The VNE problem is an NP-hard problem that has been studied for more than a decade in the continuous seek to maximize the revenue of physical infrastructures with more efficient VNE solutions. Metaheuristics have been widely used in online VNE as they incorporate mechanisms to avoid local optimum solutions, explore larger search spaces, and keep acceptable execution times. All metaheuristic optimization algorithms require initialization for which the vast majority of online VNE solutions implement random initialization. This paper proposes three novel initialization functions namely, Initialization Based on Node Selection (IFNS), Initialization Function Based on Community Detection (IFCD), and Initialization Function Based on Previous Solutions (IFPS), intending to enhance the performance of the online VNE process. Through simulation, our initialization functions have been proven to enhance the acceptance rate, revenue, and revenue-to-cost metrics of the VNE process. The enhancements achieved by our initialization functions are statistically significant and their implementation does not add computational overhead to the classic VNE approaches.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140838155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of a Routing Protocol for VANET to Improve the QoS of the Network 设计和实施用于 VANET 的路由协议以提高网络的服务质量
IF 3.6 3区 计算机科学 Q2 Business, Management and Accounting Pub Date : 2024-04-25 DOI: 10.1007/s10922-024-09821-z
Tumpa Pal, Ramesh Saha, Suparna Biswas
{"title":"Design and Implementation of a Routing Protocol for VANET to Improve the QoS of the Network","authors":"Tumpa Pal, Ramesh Saha, Suparna Biswas","doi":"10.1007/s10922-024-09821-z","DOIUrl":"https://doi.org/10.1007/s10922-024-09821-z","url":null,"abstract":"","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140657746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SampleHST-X: A Point and Collective Anomaly-Aware Trace Sampling Pipeline with Approximate Half Space Trees SampleHST-X:具有近似半空间树的点和集体异常感知跟踪采样管道
IF 3.6 3区 计算机科学 Q2 Business, Management and Accounting Pub Date : 2024-04-16 DOI: 10.1007/s10922-024-09818-8
Alim Ul Gias, Yicheng Gao, Matthew Sheldon, José A. Perusquía, Owen O’Brien, Giuliano Casale

The storage requirement for distributed tracing can be reduced significantly by sampling only the anomalous or interesting traces that occur rarely at runtime. In this paper, we introduce an unsupervised sampling pipeline for distributed tracing that ensures high sampling accuracy while reducing the storage requirement. The proposed method, SampleHST-X, extends our recent work SampleHST. It operates based on a budget which limits the percentage of traces to be sampled while adjusting the storage quota of normal and anomalous traces depending on the size of this budget. The sampling process relies on accurately defining clusters of normal and anomalous traces by leveraging the distribution of mass scores, which characterize the probability of observing different traces, obtained from a forest of Half Space Trees (HST). In our experiments, using traces from a cloud data center, SampleHST yields 2.3(times) to 9.5(times) better sampling performance. SampleHST-X further extends the SampleHST approach by incorporating a novel class of Half Space Trees, namely Approximate HST, that uses approximate counters to update the mass scores. These counters significantly reduces the space requirement for HST while the sampling performance remains similar. In addition to this extension, SampleHST-X includes a Family of Graph Spectral Distances (FGSD) based trace characterization component, which, in addition to point anomalies, enables it to sample traces with collective anomalies. For such traces, we observe that the SampleHST-X approach can yield 1.2(times) to 19(times) better sampling performance.

通过只对运行时很少出现的异常或有趣轨迹进行采样,可以大大降低分布式跟踪的存储需求。在本文中,我们介绍了一种用于分布式跟踪的无监督采样管道,它能在降低存储需求的同时确保高采样精度。我们提出的 SampleHST-X 方法扩展了我们最近的研究成果 SampleHST。该方法的运行基于预算,预算限制了要采样的痕迹百分比,同时根据预算的大小调整正常痕迹和异常痕迹的存储配额。采样过程依赖于利用从半空间树(HST)森林中获得的质量分数分布来准确定义正常和异常痕迹群,质量分数描述了观察到不同痕迹的概率。在我们的实验中,使用来自云数据中心的痕迹,SampleHST的采样性能提高了2.3到9.5倍。SampleHST-X 进一步扩展了 SampleHST 方法,纳入了一类新的半空间树,即近似 HST,它使用近似计数器来更新质量分数。这些计数器大大减少了 HST 所需的空间,而采样性能却保持不变。除这一扩展外,SampleHST-X 还包含基于图谱距离(FGSD)的迹线特征描述组件,除点异常外,还能对具有集体异常的迹线进行采样。对于这类踪迹,我们发现 SampleHST-X 方法的采样性能可以提高 1.2 (次)到 19 (次)。
{"title":"SampleHST-X: A Point and Collective Anomaly-Aware Trace Sampling Pipeline with Approximate Half Space Trees","authors":"Alim Ul Gias, Yicheng Gao, Matthew Sheldon, José A. Perusquía, Owen O’Brien, Giuliano Casale","doi":"10.1007/s10922-024-09818-8","DOIUrl":"https://doi.org/10.1007/s10922-024-09818-8","url":null,"abstract":"<p>The storage requirement for distributed tracing can be reduced significantly by sampling only the anomalous or interesting traces that occur rarely at runtime. In this paper, we introduce an unsupervised sampling pipeline for distributed tracing that ensures high sampling accuracy while reducing the storage requirement. The proposed method, SampleHST-X, extends our recent work SampleHST. It operates based on a budget which limits the percentage of traces to be sampled while adjusting the storage quota of normal and anomalous traces depending on the size of this budget. The sampling process relies on accurately defining clusters of normal and anomalous traces by leveraging the distribution of mass scores, which characterize the probability of observing different traces, obtained from a forest of Half Space Trees (HST). In our experiments, using traces from a cloud data center, SampleHST yields 2.3<span>(times)</span> to 9.5<span>(times)</span> better sampling performance. SampleHST-X further extends the SampleHST approach by incorporating a novel class of Half Space Trees, namely Approximate HST, that uses approximate counters to update the mass scores. These counters significantly reduces the space requirement for HST while the sampling performance remains similar. In addition to this extension, SampleHST-X includes a Family of Graph Spectral Distances (FGSD) based trace characterization component, which, in addition to point anomalies, enables it to sample traces with collective anomalies. For such traces, we observe that the SampleHST-X approach can yield 1.2<span>(times)</span> to 19<span>(times)</span> better sampling performance.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140563545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Network and Systems Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1