首页 > 最新文献

2017 IEEE 25th International Conference on Network Protocols (ICNP)最新文献

英文 中文
vPROM: VSwitch enhanced programmable measurement in SDN vPROM: SDN中VSwitch增强的可编程测量
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117567
Yang Guo, Douglas C. Montgomery, K. Sriram, An Wang, Songqing Chen, F. Hao, Tirunell V. Lakshman
While being critical to the network management, the current state of the art in network measurement is inadequate, providing surprisingly little visibility into detailed network behaviors and often requiring high level of manual intervention to operate. Such a practice becomes increasingly ineffective as the networks grow both in size and complexity. In this paper, we propose vPROM, a vSwitch enhanced SDN programmable measurement framework that automates the measurement process, minimizes the measurement resource usage, and addresses several significant technical challenges faced by early works. vPROM leverages the SDN programmability and extends the Pyretic runtime system and OpenFlow network interface to achieve the measurement automation. The required measurement resources are minimized by only acquiring the necessary statistics, made possible with instrumented Open vSwitches1 with user defined monitoring capability. By decoupling monitoring from routing, vPROM reduces the interference between the measurement applications and other applications, and eliminates the frequent involvement of the controller. A vPROM prototype is implemented with DDoS and port-scan detection applications. The performance of vPROM is evaluated and the comparison results with other existing programmable measurement approaches are also presented.
虽然网络测量对网络管理至关重要,但目前的网络测量技术还不充分,对详细的网络行为提供的可见性令人惊讶地少,而且通常需要高水平的人工干预来操作。随着网络规模和复杂性的增长,这种做法变得越来越无效。在本文中,我们提出了vPROM,一个vSwitch增强的SDN可编程测量框架,它可以自动化测量过程,最大限度地减少测量资源的使用,并解决了早期工作面临的几个重大技术挑战。vPROM利用SDN可编程性,扩展Pyretic运行时系统和OpenFlow网络接口,实现测量自动化。通过仅获取必要的统计数据,可以最大限度地减少所需的测量资源,这可以通过带有用户定义监控功能的仪表化Open vSwitches1实现。通过将监控与路由解耦,vPROM减少了测量应用与其他应用之间的干扰,并消除了控制器的频繁介入。一个vPROM原型实现与DDoS和端口扫描检测应用程序。对vPROM的性能进行了评价,并与其他现有的可编程测量方法进行了比较。
{"title":"vPROM: VSwitch enhanced programmable measurement in SDN","authors":"Yang Guo, Douglas C. Montgomery, K. Sriram, An Wang, Songqing Chen, F. Hao, Tirunell V. Lakshman","doi":"10.1109/ICNP.2017.8117567","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117567","url":null,"abstract":"While being critical to the network management, the current state of the art in network measurement is inadequate, providing surprisingly little visibility into detailed network behaviors and often requiring high level of manual intervention to operate. Such a practice becomes increasingly ineffective as the networks grow both in size and complexity. In this paper, we propose vPROM, a vSwitch enhanced SDN programmable measurement framework that automates the measurement process, minimizes the measurement resource usage, and addresses several significant technical challenges faced by early works. vPROM leverages the SDN programmability and extends the Pyretic runtime system and OpenFlow network interface to achieve the measurement automation. The required measurement resources are minimized by only acquiring the necessary statistics, made possible with instrumented Open vSwitches1 with user defined monitoring capability. By decoupling monitoring from routing, vPROM reduces the interference between the measurement applications and other applications, and eliminates the frequent involvement of the controller. A vPROM prototype is implemented with DDoS and port-scan detection applications. The performance of vPROM is evaluated and the comparison results with other existing programmable measurement approaches are also presented.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"16 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82855487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Preferential link tomography in dynamic networks 动态网络中的优先链路断层扫描
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117552
Huikang Li, Yi Gao, Wei Dong, Chun Chen
Inferring fine-grained link metrics by using aggregated path measurements, known as network tomography, is essential for various network operations, such as network monitoring, load balancing, and failure diagnosis. Given a set of interesting links and the changing topologies of a dynamic network, we study the problem of calculating the link metrics of these links by end-to-end cycle-free path measurements among selected monitors, i.e., preferential link tomography. We propose MAPLink, an algorithm that assigns a number of nodes as monitors to solve this tomography problem. As the first algorithm to solve the preferential link tomography problem in dynamic networks, MAPLink guarantees that the assigned monitors can calculate the link metrics of all interesting links for all topologies of the dynamic network. We formally prove the above property of MAPLink based on graph theory. We implement MAPLink and evaluate its performance using two real-world dynamic networks, including a vehicular network and a sensor network, both with changing topologies due to node mobility or wireless dynamics. Results show that MAPLink achieves significant better performance compared with three baseline methods in both of the two dynamic networks.
通过使用聚合路径测量(称为网络断层扫描)推断细粒度的链路度量,这对于各种网络操作(例如网络监控、负载平衡和故障诊断)是必不可少的。给定一组有趣的链路和动态网络的变化拓扑,我们研究了在选定的监视器之间通过端到端无周期路径测量来计算这些链路的链路度量的问题,即优先链路断层扫描。我们提出了MAPLink算法,该算法分配了许多节点作为监视器来解决这个断层扫描问题。作为第一个解决动态网络中优先链路层析问题的算法,MAPLink保证分配的监视器能够计算出动态网络中所有拓扑中所有感兴趣链路的链路度量。基于图论,我们正式证明了MAPLink的上述性质。我们使用两个真实世界的动态网络(包括车辆网络和传感器网络)来实现MAPLink并评估其性能,这两个网络都由于节点移动或无线动态而改变拓扑结构。结果表明,与三种基线方法相比,MAPLink在两种动态网络中都取得了明显更好的性能。
{"title":"Preferential link tomography in dynamic networks","authors":"Huikang Li, Yi Gao, Wei Dong, Chun Chen","doi":"10.1109/ICNP.2017.8117552","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117552","url":null,"abstract":"Inferring fine-grained link metrics by using aggregated path measurements, known as network tomography, is essential for various network operations, such as network monitoring, load balancing, and failure diagnosis. Given a set of interesting links and the changing topologies of a dynamic network, we study the problem of calculating the link metrics of these links by end-to-end cycle-free path measurements among selected monitors, i.e., preferential link tomography. We propose MAPLink, an algorithm that assigns a number of nodes as monitors to solve this tomography problem. As the first algorithm to solve the preferential link tomography problem in dynamic networks, MAPLink guarantees that the assigned monitors can calculate the link metrics of all interesting links for all topologies of the dynamic network. We formally prove the above property of MAPLink based on graph theory. We implement MAPLink and evaluate its performance using two real-world dynamic networks, including a vehicular network and a sensor network, both with changing topologies due to node mobility or wireless dynamics. Results show that MAPLink achieves significant better performance compared with three baseline methods in both of the two dynamic networks.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"64 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83940031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SDN-based service automation for IoT 基于sdn的物联网服务自动化
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117555
M. Uddin, S. Mukherjee, Hyunseok Chang, T. V. Lakshman
Bluetooth Low Energy (BLE) is a personal area wireless network technology that is of increasing importance for emerging Internet of Things (IoT) deployments. By design, BLE supports short-range, single-hop communication between a pair of BLE devices. As such, native BLE does not allow network-based policy control or in-network functions for service enhancement. These limitations are impediments to any large-scale BLE based IoT deployment (e.g., in hospital environments), where such sophisticated network-based visibility and control may be required. Relying on cloud-based solutions to meet these requirements has many known shortcomings. This paper proposes an SDN-based architecture for enabling wide area IoT deployments using BLE devices at the edge. We introduce a programmable BLE service switch (BLESS) that is transparently inserted between two communicating BLE devices. BLESS can be programmed at the service layer by a central controller to enable flexible, policy-based switching, as well as various in-network operations in BLE networks. We describe the design of BLESS, its implementation using P4 and OVS, and illustrate its utility through practical use cases.
低功耗蓝牙(BLE)是一种个人区域无线网络技术,对新兴的物联网(IoT)部署越来越重要。通过设计,BLE支持一对BLE设备之间的短距离单跳通信。因此,本机BLE不支持基于网络的策略控制或用于业务增强的网内功能。这些限制是任何大规模基于BLE的物联网部署的障碍(例如,在医院环境中),其中可能需要这种复杂的基于网络的可见性和控制。依靠基于云的解决方案来满足这些需求有许多已知的缺点。本文提出了一种基于sdn的架构,用于在边缘使用BLE设备实现广域物联网部署。我们引入了一个可编程的BLE业务开关(BLESS),它透明地插入两个通信BLE设备之间。可以通过中央控制器在服务层对BLESS进行编程,以实现灵活的、基于策略的交换,以及BLE网络中的各种网络内操作。本文介绍了BLESS的设计、使用P4和OVS实现,并通过实际用例说明了它的实用性。
{"title":"SDN-based service automation for IoT","authors":"M. Uddin, S. Mukherjee, Hyunseok Chang, T. V. Lakshman","doi":"10.1109/ICNP.2017.8117555","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117555","url":null,"abstract":"Bluetooth Low Energy (BLE) is a personal area wireless network technology that is of increasing importance for emerging Internet of Things (IoT) deployments. By design, BLE supports short-range, single-hop communication between a pair of BLE devices. As such, native BLE does not allow network-based policy control or in-network functions for service enhancement. These limitations are impediments to any large-scale BLE based IoT deployment (e.g., in hospital environments), where such sophisticated network-based visibility and control may be required. Relying on cloud-based solutions to meet these requirements has many known shortcomings. This paper proposes an SDN-based architecture for enabling wide area IoT deployments using BLE devices at the edge. We introduce a programmable BLE service switch (BLESS) that is transparently inserted between two communicating BLE devices. BLESS can be programmed at the service layer by a central controller to enable flexible, policy-based switching, as well as various in-network operations in BLE networks. We describe the design of BLESS, its implementation using P4 and OVS, and illustrate its utility through practical use cases.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"1 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88565766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Multipath TCP traffic diversion attacks and countermeasures 多路径TCP引流攻击及对策
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117547
Ali Munir, Zhiyun Qian, Zubair Shafiq, A. Liu, Franck Le
Multipath TCP (MPTCP) is an IETF standardized suite of TCP extensions that allow two endpoints to simultaneously use multiple paths between them. In this paper, we report vulnerabilities in MPTCP that arise because of cross-path interactions between MPTCP subflows. First, an attacker eavesdropping one MPTCP subflow can infer throughput of other subflows. Second, an attacker can inject forged MPTCP packets to change priorities of any MPTCP subflow. We present two attacks to exploit these vulnerabilities. In the connection hijack attack, an attacker takes full control of the MPTCP connection by suspending the subflows he has no access to. In the traffic diversion attack, an attacker diverts traffic from one path to other paths. Proposed vulnerabilities fixes, changes to MPTCP specification, provide the guarantees that MPTCP is at least as secure as TCP and the original MPTCP. We validate attacks and prevention mechanism, using MPTCP Linux implementation (v0.91), on a real-network testbed.
多路径TCP (MPTCP)是一个IETF标准化的TCP扩展套件,它允许两个端点同时使用它们之间的多条路径。在本文中,我们报告了由于MPTCP子流之间的交叉路径交互而产生的MPTCP漏洞。首先,攻击者窃听一个MPTCP子流可以推断出其他子流的吞吐量。其次,攻击者可以注入伪造的MPTCP报文来改变MPTCP子流的优先级。我们提出了两种利用这些漏洞的攻击。在连接劫持攻击中,攻击者通过挂起他无法访问的子流来完全控制MPTCP连接。引流攻击是指攻击者将流量从一条路径引流到另一条路径。建议的漏洞修复,对MPTCP规范的更改,提供了MPTCP至少与TCP和原始MPTCP一样安全的保证。我们使用MPTCP Linux实现(v0.91)在真实的网络测试平台上验证了攻击和防御机制。
{"title":"Multipath TCP traffic diversion attacks and countermeasures","authors":"Ali Munir, Zhiyun Qian, Zubair Shafiq, A. Liu, Franck Le","doi":"10.1109/ICNP.2017.8117547","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117547","url":null,"abstract":"Multipath TCP (MPTCP) is an IETF standardized suite of TCP extensions that allow two endpoints to simultaneously use multiple paths between them. In this paper, we report vulnerabilities in MPTCP that arise because of cross-path interactions between MPTCP subflows. First, an attacker eavesdropping one MPTCP subflow can infer throughput of other subflows. Second, an attacker can inject forged MPTCP packets to change priorities of any MPTCP subflow. We present two attacks to exploit these vulnerabilities. In the connection hijack attack, an attacker takes full control of the MPTCP connection by suspending the subflows he has no access to. In the traffic diversion attack, an attacker diverts traffic from one path to other paths. Proposed vulnerabilities fixes, changes to MPTCP specification, provide the guarantees that MPTCP is at least as secure as TCP and the original MPTCP. We validate attacks and prevention mechanism, using MPTCP Linux implementation (v0.91), on a real-network testbed.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"73 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76554274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Yosemite: Efficient scheduling of weighted coflows in data centers Yosemite:数据中心中加权流的有效调度
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117586
Han Zhang, Xingang Shi, Xia Yin, Zhiliang Wang
Recently, coflow has been proposed as a new abstraction to capture the communication patterns in a rich set of data parallel applications in data centers. Coflows effectively model the application-level semantics of network resource usage, so high-level optimization goals, such as reducing the transfer latency of applications, can be better achieved by taking coflows as the basic elements in network resource allocation or scheduling. Although efficient coflow scheduling methods have been studied, in this paper, we propose to schedule weighted coflows as a further step in this direction, where weights are used to express the emergences or priorities of different coflows or their corresponding applications. We design an information-agnostic online algorithm to dynamically schedule coflows according to their weights and the instantaneous network condition. Then We implement the algorithm in a scheduling system named Yosemite. Our evaluation results show that, compared to the latest information-agnostic coflow scheduling algorithms, Yosemite can reduce more than 40% of the WCCT (Weighted Coflow Completion Time), and more than 30% of the completion time for coflows with above-the-average level of emergence. It even outperforms the most efficient clairvoyant coflow scheduling method by reducing around 30% WCCT, and 25%∼30% of the completion time for coflows with above-the-average emergence, respectively.
最近,coflow作为一种新的抽象被提出,用于捕获数据中心中丰富的数据并行应用程序中的通信模式。coflow有效地对网络资源使用的应用级语义进行建模,因此将coflow作为网络资源分配或调度的基本元素,可以更好地实现降低应用程序传输延迟等高级优化目标。虽然已经研究了有效的协同流调度方法,但在本文中,我们提出了在这个方向上更进一步的调度加权协同流,其中权重用于表示不同协同流的出现或优先级或其相应的应用。我们设计了一种信息不可知的在线算法,根据协同流的权重和瞬时网络状况动态调度协同流。然后我们在一个名为Yosemite的调度系统中实现该算法。我们的评估结果表明,与最新的信息不可知的共流调度算法相比,Yosemite可以减少40%以上的WCCT(加权共流完成时间),并且在高于平均水平的共流出现时减少30%以上的完成时间。它甚至优于最有效的千里眼共流调度方法,分别减少了约30%的WCCT和25% ~ 30%的高于平均水平的共流完井时间。
{"title":"Yosemite: Efficient scheduling of weighted coflows in data centers","authors":"Han Zhang, Xingang Shi, Xia Yin, Zhiliang Wang","doi":"10.1109/ICNP.2017.8117586","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117586","url":null,"abstract":"Recently, coflow has been proposed as a new abstraction to capture the communication patterns in a rich set of data parallel applications in data centers. Coflows effectively model the application-level semantics of network resource usage, so high-level optimization goals, such as reducing the transfer latency of applications, can be better achieved by taking coflows as the basic elements in network resource allocation or scheduling. Although efficient coflow scheduling methods have been studied, in this paper, we propose to schedule weighted coflows as a further step in this direction, where weights are used to express the emergences or priorities of different coflows or their corresponding applications. We design an information-agnostic online algorithm to dynamically schedule coflows according to their weights and the instantaneous network condition. Then We implement the algorithm in a scheduling system named Yosemite. Our evaluation results show that, compared to the latest information-agnostic coflow scheduling algorithms, Yosemite can reduce more than 40% of the WCCT (Weighted Coflow Completion Time), and more than 30% of the completion time for coflows with above-the-average level of emergence. It even outperforms the most efficient clairvoyant coflow scheduling method by reducing around 30% WCCT, and 25%∼30% of the completion time for coflows with above-the-average emergence, respectively.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"13 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78370468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Toward a programmable FIB caching architecture 迈向可编程FIB缓存架构
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117584
Garegin Grigoryan, Yaoqing Liu
The current Internet routing ecosystem is neither sustainable nor economical. More than 711K IPv4 routes and more than 41K IPv6 routes exist in current global Forwarding Information Base (FIBs) with growth rates increasing. This rapid growth has serious consequences, such as creating the need for costly FIB memory upgrades and increased potential for Internet service outages. And while FIB memories are power-hungry and prohibitively expensive, more than 70% of the routes in FIBs carry no traffic for long time periods, a wasteful use of these expensive resources. Taking advantage of the emerging concept of programmable data plane, we design a programmable FIB caching architecture to address the existing concerns. Our preliminary evaluation results show that the architecture can significantly mitigate the global routing scalability and poor FIB utilization issues.
当前的互联网路由生态系统既不可持续也不经济。目前,全球FIBs (Forwarding Information Base)中存在超过711K的IPv4路由和超过41K的IPv6路由,并且这些路由的增长速度还在不断加快。这种快速增长带来了严重的后果,例如需要昂贵的FIB内存升级,并增加了Internet服务中断的可能性。虽然FIB存储器非常耗电且价格昂贵,但FIB中超过70%的路由在很长一段时间内没有流量,这是对这些昂贵资源的浪费。利用新兴的可编程数据平面概念,设计了一种可编程FIB缓存架构来解决现有的问题。我们的初步评估结果表明,该架构可以显著缓解全局路由可扩展性和FIB利用率差的问题。
{"title":"Toward a programmable FIB caching architecture","authors":"Garegin Grigoryan, Yaoqing Liu","doi":"10.1109/ICNP.2017.8117584","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117584","url":null,"abstract":"The current Internet routing ecosystem is neither sustainable nor economical. More than 711K IPv4 routes and more than 41K IPv6 routes exist in current global Forwarding Information Base (FIBs) with growth rates increasing. This rapid growth has serious consequences, such as creating the need for costly FIB memory upgrades and increased potential for Internet service outages. And while FIB memories are power-hungry and prohibitively expensive, more than 70% of the routes in FIBs carry no traffic for long time periods, a wasteful use of these expensive resources. Taking advantage of the emerging concept of programmable data plane, we design a programmable FIB caching architecture to address the existing concerns. Our preliminary evaluation results show that the architecture can significantly mitigate the global routing scalability and poor FIB utilization issues.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"21 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73838126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BoLTE: Efficient network-wide LTE broadcasting BoLTE:高效的全网LTE广播
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117535
R. Sivaraj, Mustafa Y. Arslan, K. Sundaresan, S. Rangarajan, P. Mohapatra
Evolved-Multimedia Broadcast Multicast Services (eMBMS) is a set of features in LTE networks to deliver bandwidth-intensive multimedia content on a point-to-multipoint basis to subscribers. The notion of a Single Frequency Network (SFN) in eMBMS allows base stations to synchronize and transmit signals in a coordinated fashion across the same frequency-time radio resources using a common modulation rate. While SFN boosts the channel quality of users via transmit diversity gain, the use of a common rate across base stations results in reduced utilization for those that can individually support much higher data rates for their users, even without the notion of an SFN. Excluding such base stations from the SFN helps them utilize their resources better by not being constrained by the common rate, but creates additional inter-cell interference from their independent transmissions. Striking a balance between SFN cooperation and resource utilization is crucial for efficiently delivering broadcast content as well as other unicast flows. We design BoLTE, which carefully addresses this tradeoff and evaluate it using a prototype implementation over an SFN testbed, realized over a cloud-based radio access network system, as well as large-scale NS3 simulations. We show that BoLTE improves overall system throughput by around 40%.
演进多媒体广播多播服务(eMBMS)是LTE网络中的一组功能,用于在点对多点的基础上向用户提供带宽密集型多媒体内容。eMBMS中的单频网络(SFN)概念允许基站使用通用调制速率在相同的频率时间无线电资源中以协调的方式同步和传输信号。虽然SFN通过传输分集增益提高了用户的信道质量,但在基站之间使用通用速率导致那些可以为其用户单独支持更高数据速率的基站的利用率降低,即使没有SFN的概念。将这些基站排除在SFN之外有助于它们更好地利用资源,因为它们不受通用速率的限制,但它们的独立传输会产生额外的小区间干扰。在SFN合作和资源利用之间取得平衡对于有效地传送广播内容和其他单播流至关重要。我们设计了BoLTE,仔细解决了这一权衡,并使用基于云的无线接入网络系统以及大规模NS3模拟的SFN测试平台上的原型实现对其进行了评估。我们表明,BoLTE将整体系统吞吐量提高了约40%。
{"title":"BoLTE: Efficient network-wide LTE broadcasting","authors":"R. Sivaraj, Mustafa Y. Arslan, K. Sundaresan, S. Rangarajan, P. Mohapatra","doi":"10.1109/ICNP.2017.8117535","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117535","url":null,"abstract":"Evolved-Multimedia Broadcast Multicast Services (eMBMS) is a set of features in LTE networks to deliver bandwidth-intensive multimedia content on a point-to-multipoint basis to subscribers. The notion of a Single Frequency Network (SFN) in eMBMS allows base stations to synchronize and transmit signals in a coordinated fashion across the same frequency-time radio resources using a common modulation rate. While SFN boosts the channel quality of users via transmit diversity gain, the use of a common rate across base stations results in reduced utilization for those that can individually support much higher data rates for their users, even without the notion of an SFN. Excluding such base stations from the SFN helps them utilize their resources better by not being constrained by the common rate, but creates additional inter-cell interference from their independent transmissions. Striking a balance between SFN cooperation and resource utilization is crucial for efficiently delivering broadcast content as well as other unicast flows. We design BoLTE, which carefully addresses this tradeoff and evaluate it using a prototype implementation over an SFN testbed, realized over a cloud-based radio access network system, as well as large-scale NS3 simulations. We show that BoLTE improves overall system throughput by around 40%.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"194 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83088163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
iMUTE: Energy-optimal update policy for perishable mobile contents iMUTE:易腐移动内容的能量最优更新策略
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117544
Joohyung Lee, Fang Liu, Kyunghan Lee, N. Shroff
Mobile applications that provide ever-changing information such as social media and news feeds applications are designed to consistently update their contents in the background. This operation, often called “prefetching”, provides the users with immediate access to up-to-date contents. However, such updates often result in the unwanted side-effect of draining the battery of mobile devices. It is considered as pure waste when updated contents are not accessed before being renewed. In this paper, we develop an optimal strategy to update the contents in the background under a given energy constraint. The key challenge is to predict when the user will access the contents in a probabilistic manner from the statistics of the accessed patterns in the past. We model our problem as a constrained Markov decision process (C-MDP) and propose to tackle its high complexity with a two-step solution that combines: (1) a threshold-based backward induction algorithm for the Lagrangian relaxation of our C-MDP, and (2) an iterative root finding algorithm, iMUTE (iterative Method for optimal UpdaTe policy with Energy constraint). We prove that iMUTE converges superlinearly to the optimal solution of the original C-MDP under a mild condition. We also experimentally verify that iMUTE outperforms the periodic policy as well as the additive and multiplicative increase policies that are adopted in the Doze mode of Android systems and HUSH, in terms of user experience and energy saving.
提供不断变化的信息的移动应用程序,如社交媒体和新闻源应用程序,旨在始终如一地在后台更新其内容。这个操作通常被称为“预取”,它为用户提供了对最新内容的即时访问。然而,这样的更新通常会导致不必要的副作用,耗尽移动设备的电池。如果更新的内容在更新之前没有被访问,则被认为是纯粹的浪费。在本文中,我们开发了一个在给定能量约束下的后台内容更新的最优策略。关键的挑战是根据过去访问模式的统计数据以概率方式预测用户何时访问内容。我们将我们的问题建模为一个约束马尔可夫决策过程(C-MDP),并提出了一个两步解决方案来解决它的高复杂性,该方案结合:(1)基于阈值的C-MDP拉格朗日松弛的逆向归纳算法,以及(2)迭代寻根算法,iMUTE(具有能量约束的最优更新策略的迭代方法)。证明了iMUTE在温和条件下超线性收敛于原C-MDP的最优解。我们还通过实验验证了iMUTE在用户体验和节能方面优于周期策略,以及Android系统的打瞌睡模式和HUSH采用的加性和乘性增加策略。
{"title":"iMUTE: Energy-optimal update policy for perishable mobile contents","authors":"Joohyung Lee, Fang Liu, Kyunghan Lee, N. Shroff","doi":"10.1109/ICNP.2017.8117544","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117544","url":null,"abstract":"Mobile applications that provide ever-changing information such as social media and news feeds applications are designed to consistently update their contents in the background. This operation, often called “prefetching”, provides the users with immediate access to up-to-date contents. However, such updates often result in the unwanted side-effect of draining the battery of mobile devices. It is considered as pure waste when updated contents are not accessed before being renewed. In this paper, we develop an optimal strategy to update the contents in the background under a given energy constraint. The key challenge is to predict when the user will access the contents in a probabilistic manner from the statistics of the accessed patterns in the past. We model our problem as a constrained Markov decision process (C-MDP) and propose to tackle its high complexity with a two-step solution that combines: (1) a threshold-based backward induction algorithm for the Lagrangian relaxation of our C-MDP, and (2) an iterative root finding algorithm, iMUTE (iterative Method for optimal UpdaTe policy with Energy constraint). We prove that iMUTE converges superlinearly to the optimal solution of the original C-MDP under a mild condition. We also experimentally verify that iMUTE outperforms the periodic policy as well as the additive and multiplicative increase policies that are adopted in the Doze mode of Android systems and HUSH, in terms of user experience and energy saving.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"86 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81295277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Popularity-aware differentiated distributed stream processing on skewed streams 在倾斜流上进行流行度感知的差异化分布式流处理
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117551
Hanhua Chen, Fan Zhang, Hai Jin
Real-world stream data with skewed distribution raises unique challenges to distributed stream processing systems. Existing stream workload partitioning schemes usually use a “one size fits all” design, which leverage either a shuffle grouping or a key grouping strategy for partitioning the stream workloads among multiple processing units, leading to notable problems of unsatisfied system throughput and processing latency. In this paper, we show that the key grouping based schemes result in serious load imbalance and low computation efficiency in the presence of data skewness while the shuffle grouping schemes are not scalable in terms of memory space. We argue that the key to efficient stream scheduling is the popularity of the stream data. We propose and implement a differentiated distributed stream processing system, call DStream, which assigns the popular keys using shuffle grouping while assigns unpopular ones using key grouping. We design a novel efficient and light-weighted probabilistic counting scheme for identifying the current hot keys in dynamic real-time streams. Two factors contribute to the power of this design: 1) the probabilistic counting scheme is extremely computation and memory efficient, so that it can be well integrated in processing instances in the system; 2) the scheme can adapt to the popularity changes in the dynamic stream processing environment. We implement the DStream system on top of Apache Storm. Experiment results using large-scale traces from real-world systems show that DStream achieves a 2.3× improvement in terms of processing throughput and reduces the processing latency by 64% compared to state-of-the-art designs.
具有倾斜分布的现实流数据对分布式流处理系统提出了独特的挑战。现有的流工作负载分区方案通常使用“一刀切”的设计,利用shuffle分组或key分组策略在多个处理单元之间对流工作负载进行分区,这导致了令人不满意的系统吞吐量和处理延迟等明显问题。在本文中,我们证明了基于密钥分组的方案在存在数据偏态的情况下会导致严重的负载不平衡和低计算效率,而shuffle分组方案在内存空间方面不具有可扩展性。我们认为有效的流调度的关键是流数据的普及。我们提出并实现了一种差异化的分布式流处理系统,称为DStream,它使用shuffle分组来分配流行的密钥,而使用密钥分组来分配不流行的密钥。我们设计了一种新的高效、轻量级的概率计数方案来识别动态实时流中的当前热键。本设计的强大之处在于两个因素:1)概率计数方案具有极高的计算效率和内存效率,可以很好地集成到系统的处理实例中;2)该方案能够适应流行度变化的动态流处理环境。我们在Apache Storm之上实现了DStream系统。使用来自现实世界系统的大规模跟踪的实验结果表明,与最先进的设计相比,DStream在处理吞吐量方面提高了2.3倍,并将处理延迟降低了64%。
{"title":"Popularity-aware differentiated distributed stream processing on skewed streams","authors":"Hanhua Chen, Fan Zhang, Hai Jin","doi":"10.1109/ICNP.2017.8117551","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117551","url":null,"abstract":"Real-world stream data with skewed distribution raises unique challenges to distributed stream processing systems. Existing stream workload partitioning schemes usually use a “one size fits all” design, which leverage either a shuffle grouping or a key grouping strategy for partitioning the stream workloads among multiple processing units, leading to notable problems of unsatisfied system throughput and processing latency. In this paper, we show that the key grouping based schemes result in serious load imbalance and low computation efficiency in the presence of data skewness while the shuffle grouping schemes are not scalable in terms of memory space. We argue that the key to efficient stream scheduling is the popularity of the stream data. We propose and implement a differentiated distributed stream processing system, call DStream, which assigns the popular keys using shuffle grouping while assigns unpopular ones using key grouping. We design a novel efficient and light-weighted probabilistic counting scheme for identifying the current hot keys in dynamic real-time streams. Two factors contribute to the power of this design: 1) the probabilistic counting scheme is extremely computation and memory efficient, so that it can be well integrated in processing instances in the system; 2) the scheme can adapt to the popularity changes in the dynamic stream processing environment. We implement the DStream system on top of Apache Storm. Experiment results using large-scale traces from real-world systems show that DStream achieves a 2.3× improvement in terms of processing throughput and reduces the processing latency by 64% compared to state-of-the-art designs.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"19 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89915422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Mrs. Z: Improving ZigBee throughput via multi-rate transmission Z太太:通过多速率传输提高ZigBee吞吐量
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117546
Yifeng Cao, L. Kong, Liang He, Guihai Chen, Minyou Wu, T. He
ZigBee is a widely used wireless technology in low-power and short-range scenarios such as Internet of Things (IoT), sensor networks, and industrial wireless networks. However, the standard ZigBee supports only one data rate, 250Kbps, which thoroughly limits ZigBee's efficiency in dynamic wireless channels. In this paper, we propose Mrs.Z, a novel physical layer design to enable multi-rate selection in ZigBee. The key idea is to change the single spectrum spreading length to multiple ones. Correspondingly, to gracefully adapt to the channel variations, we propose a BER-based rate selection scheme, dividing bit errors into two categories: errors caused by the exceeding despreading threshold, which can be discovered in the physical layer, and caused by incorrect despreading, which is not visible until cyclic redundancy check (CRC) in the media access control (MAC) layer. Then, the receiver selects the rate based on the underlying negative impacts incurred by them and feedbacks to the transceiver. We implement Mrs.Z on USRPs and evaluate its performance in different scenarios. Results demonstrate that Mrs.Z achieves an improvement of 20% and 80% compared to the classic SoftRate and the standard ZigBee.
ZigBee是一种广泛应用于物联网(IoT)、传感器网络、工业无线网络等低功耗、短距离场景的无线技术。然而,标准的ZigBee仅支持一种数据速率,即250Kbps,这彻底限制了ZigBee在动态无线信道中的效率。在本文中,我们提出了一种新的物理层设计Mrs.Z,以实现ZigBee中的多速率选择。其关键思想是将单频谱扩展长度改为多频谱扩展长度。相应地,为了优雅地适应信道的变化,我们提出了一种基于ber的速率选择方案,将比特错误分为两类:由超过解扩阈值引起的错误,可以在物理层发现,以及由不正确的解扩引起的错误,直到媒体访问控制(MAC)层的循环冗余检查(CRC)才可见。然后,接收器根据它们产生的潜在负面影响来选择速率,并反馈给收发器。我们在usrp上实现了Mrs.Z,并评估了它在不同场景下的表现。结果表明,与经典的SoftRate和标准ZigBee相比,Mrs.Z实现了20%和80%的改进。
{"title":"Mrs. Z: Improving ZigBee throughput via multi-rate transmission","authors":"Yifeng Cao, L. Kong, Liang He, Guihai Chen, Minyou Wu, T. He","doi":"10.1109/ICNP.2017.8117546","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117546","url":null,"abstract":"ZigBee is a widely used wireless technology in low-power and short-range scenarios such as Internet of Things (IoT), sensor networks, and industrial wireless networks. However, the standard ZigBee supports only one data rate, 250Kbps, which thoroughly limits ZigBee's efficiency in dynamic wireless channels. In this paper, we propose Mrs.Z, a novel physical layer design to enable multi-rate selection in ZigBee. The key idea is to change the single spectrum spreading length to multiple ones. Correspondingly, to gracefully adapt to the channel variations, we propose a BER-based rate selection scheme, dividing bit errors into two categories: errors caused by the exceeding despreading threshold, which can be discovered in the physical layer, and caused by incorrect despreading, which is not visible until cyclic redundancy check (CRC) in the media access control (MAC) layer. Then, the receiver selects the rate based on the underlying negative impacts incurred by them and feedbacks to the transceiver. We implement Mrs.Z on USRPs and evaluate its performance in different scenarios. Results demonstrate that Mrs.Z achieves an improvement of 20% and 80% compared to the classic SoftRate and the standard ZigBee.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"9 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89121332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2017 IEEE 25th International Conference on Network Protocols (ICNP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1