首页 > 最新文献

2017 IEEE 25th International Conference on Network Protocols (ICNP)最新文献

英文 中文
The dynamic cuckoo filter 动态杜鹃滤波器
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117563
Hanhua Chen, Liangyi Liao, Hai Jin, Jie Wu
The emergence of large-scale dynamic sets in real applications creates stringent requirements for approximate set representation structures: 1) the capacity of the set representation structures should support flexibly extending or reducing to cope with dynamically changing of set size; 2) the set representation structures should support reliable delete operation. Existing techniques for approximate set representation, e.g., the cuckoo filter, the Bloom filter and its variants cannot meet both the requirements of a dynamic set. To solve the problem, in this paper we propose the dynamic cuckoo filter (DCF) to support reliable delete operation and elastic capacity for dynamic set representation and membership testing. Two factors contribute to the efficiency of the DCF design. First, the data structure of a DCF is extendable, making the representation of a dynamic set space efficient. Second, a DCF utilizes a monopolistic fingerprint for representing an item and guarantees reliable delete operation. Experiment results show that compared to the existing state-of-the-art designs, DCF achieves 75% reduction in memory cost, 50% improvement in construction speed, and 80% improvement in speed of membership query. We implement a prototype file backup system and use DCF for data deduplication. Comprehensive experiment results demonstrate the efficiency of our DCF design compared to existing schemes.
实际应用中大规模动态集的出现对近似集表示结构提出了严格的要求:1)集合表示结构的能力应支持灵活的扩展或缩减,以应对集合大小的动态变化;2)集合表示结构应支持可靠的删除操作。现有的近似集表示技术,如布谷鸟滤波、布隆滤波及其变体,不能同时满足动态集的要求。为了解决这一问题,本文提出了动态杜鹃滤波器(DCF)来支持可靠的删除操作和动态集表示和隶属度测试的弹性容量。影响DCF设计效率的因素有两个。首先,DCF的数据结构是可扩展的,使得动态集合空间的表示效率很高。其次,DCF利用独占指纹来表示项,并保证可靠的删除操作。实验结果表明,与现有最先进的设计相比,DCF的内存成本降低了75%,构建速度提高了50%,成员查询速度提高了80%。我们实现了一个原型文件备份系统,并使用DCF进行重复数据删除。综合实验结果表明,与现有方案相比,我们的DCF设计是有效的。
{"title":"The dynamic cuckoo filter","authors":"Hanhua Chen, Liangyi Liao, Hai Jin, Jie Wu","doi":"10.1109/ICNP.2017.8117563","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117563","url":null,"abstract":"The emergence of large-scale dynamic sets in real applications creates stringent requirements for approximate set representation structures: 1) the capacity of the set representation structures should support flexibly extending or reducing to cope with dynamically changing of set size; 2) the set representation structures should support reliable delete operation. Existing techniques for approximate set representation, e.g., the cuckoo filter, the Bloom filter and its variants cannot meet both the requirements of a dynamic set. To solve the problem, in this paper we propose the dynamic cuckoo filter (DCF) to support reliable delete operation and elastic capacity for dynamic set representation and membership testing. Two factors contribute to the efficiency of the DCF design. First, the data structure of a DCF is extendable, making the representation of a dynamic set space efficient. Second, a DCF utilizes a monopolistic fingerprint for representing an item and guarantees reliable delete operation. Experiment results show that compared to the existing state-of-the-art designs, DCF achieves 75% reduction in memory cost, 50% improvement in construction speed, and 80% improvement in speed of membership query. We implement a prototype file backup system and use DCF for data deduplication. Comprehensive experiment results demonstrate the efficiency of our DCF design compared to existing schemes.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"41 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72848456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Deploying default paths by joint optimization of flow table and group table in SDNs 通过sdn中流表和组表的联合优化部署默认路径
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117539
Gongming Zhao, Hongli Xu, Shigang Chen, Liusheng Huang, Pengzhan Wang
Software Defined Networking (SDN) separates the control plane from the data plane to ease network management and provide flexibility in packet routing. The control plane interacts with the data plane through the forwarding tables, usually including a flow table and a group table, at each switch. Due to high cost and power consumption of Ternary Content Addressable Memory (TCAM), commodity switches can only support flow/group tables of limited size, which presents serious challenge for SDN to scale to large networks. One promising approach to address the scalability problem is to deploy aggregate default paths specified by wildcard forwarding rules. However, the multi-dimensional interaction among numerous system parameters and performance/scalability considerations makes the problem of setting up the flow/group tables at all switches for optimal overall layout of default paths very challenging. This paper studies the joint optimization of flow/group tables in the complex setting of large-scale SDNs. We formulate this problem as an integer linear program, and prove its NP-Hardness. An efficient algorithm with bounded approximation factors is proposed to solve the problem. The properties of our algorithm are formally analyzed. We implement the proposed algorithm on an SDN testbed for experimental studies and use simulations for large-scale investigation. The experimental results and simulation results demonstrate high efficiency of our proposed algorithm.
SDN (Software Defined Networking)是一种将控制平面与数据平面分离的网络技术,可以简化网络管理并提供更灵活的报文路由。控制平面通过每个交换机上的转发表(通常包括流表和组表)与数据平面进行交互。由于三元内容可寻址存储器(TCAM)的高成本和高功耗,商品交换机只能支持有限大小的流/组表,这对SDN扩展到大型网络提出了严峻的挑战。解决可伸缩性问题的一种有希望的方法是部署由通配符转发规则指定的聚合默认路径。然而,在众多系统参数和性能/可伸缩性考虑因素之间的多维交互使得在所有交换机上设置流/组表以实现默认路径的最佳总体布局的问题非常具有挑战性。本文研究了大型sdn复杂设置下的流/群表联合优化问题。我们将这个问题化为一个整数线性规划,并证明了它的np -硬度。提出了一种具有有界近似因子的有效算法来解决这一问题。对算法的性质进行了形式化分析。我们在SDN测试平台上实现了所提出的算法进行实验研究,并使用模拟进行大规模调查。实验结果和仿真结果表明了该算法的有效性。
{"title":"Deploying default paths by joint optimization of flow table and group table in SDNs","authors":"Gongming Zhao, Hongli Xu, Shigang Chen, Liusheng Huang, Pengzhan Wang","doi":"10.1109/ICNP.2017.8117539","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117539","url":null,"abstract":"Software Defined Networking (SDN) separates the control plane from the data plane to ease network management and provide flexibility in packet routing. The control plane interacts with the data plane through the forwarding tables, usually including a flow table and a group table, at each switch. Due to high cost and power consumption of Ternary Content Addressable Memory (TCAM), commodity switches can only support flow/group tables of limited size, which presents serious challenge for SDN to scale to large networks. One promising approach to address the scalability problem is to deploy aggregate default paths specified by wildcard forwarding rules. However, the multi-dimensional interaction among numerous system parameters and performance/scalability considerations makes the problem of setting up the flow/group tables at all switches for optimal overall layout of default paths very challenging. This paper studies the joint optimization of flow/group tables in the complex setting of large-scale SDNs. We formulate this problem as an integer linear program, and prove its NP-Hardness. An efficient algorithm with bounded approximation factors is proposed to solve the problem. The properties of our algorithm are formally analyzed. We implement the proposed algorithm on an SDN testbed for experimental studies and use simulations for large-scale investigation. The experimental results and simulation results demonstrate high efficiency of our proposed algorithm.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"89 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85318870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Experimental evaluation of BBR congestion control BBR拥塞控制的实验评价
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117540
Mario Hock, R. Bless, M. Zitterbart
BBR is a recently proposed congestion control. Instead of using packet loss as congestion signal, like many currently used congestion controls, it uses an estimate of the available bottleneck link bandwidth to determine its sending rate. BBR tries to provide high link utilization while avoiding to create queues in bottleneck buffers. The original publication of BBR shows that it can deliver superior performance compared to Cubic TCP in some environments. This paper provides an independent and extensive experimental evaluation of BBR at higher speeds. The experimental setup uses BBR's Linux kernel 4.9 implementation and typical data rates of 10Gbit/s and 1 Gbit/s at the bottleneck link. The experiments vary the flows' round-trip times, the number of flows, and buffer sizes at the bottleneck. The evaluation considers throughput, queuing delay, packet loss, and fairness. On the one hand, the intended behavior of BBR could be observed with our experiments. On the other hand, some severe inherent issues such as increased queuing delays, unfairness, and massive packet loss were also detected. The paper provides an in-depth discussion of BBR's behavior in different experiment setups.
BBR是最近提出的拥塞控制。它不像许多当前使用的拥塞控制那样使用丢包作为拥塞信号,而是使用对可用瓶颈链路带宽的估计来确定其发送速率。BBR试图提供高链路利用率,同时避免在瓶颈缓冲区中创建队列。BBR的原始发布表明,在某些环境中,它可以提供比Cubic TCP更好的性能。本文提供了高速下BBR的独立和广泛的实验评估。实验设置使用BBR的Linux内核4.9实现,瓶颈链路的典型数据速率为10Gbit/s和1gbit /s。实验改变了流的往返时间、流的数量和瓶颈处的缓冲区大小。评估考虑了吞吐量、排队延迟、丢包和公平性。一方面,我们的实验可以观察到BBR的预期行为。另一方面,还检测到一些严重的固有问题,如排队延迟增加、不公平和大量数据包丢失。本文深入讨论了BBR在不同实验条件下的行为。
{"title":"Experimental evaluation of BBR congestion control","authors":"Mario Hock, R. Bless, M. Zitterbart","doi":"10.1109/ICNP.2017.8117540","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117540","url":null,"abstract":"BBR is a recently proposed congestion control. Instead of using packet loss as congestion signal, like many currently used congestion controls, it uses an estimate of the available bottleneck link bandwidth to determine its sending rate. BBR tries to provide high link utilization while avoiding to create queues in bottleneck buffers. The original publication of BBR shows that it can deliver superior performance compared to Cubic TCP in some environments. This paper provides an independent and extensive experimental evaluation of BBR at higher speeds. The experimental setup uses BBR's Linux kernel 4.9 implementation and typical data rates of 10Gbit/s and 1 Gbit/s at the bottleneck link. The experiments vary the flows' round-trip times, the number of flows, and buffer sizes at the bottleneck. The evaluation considers throughput, queuing delay, packet loss, and fairness. On the one hand, the intended behavior of BBR could be observed with our experiments. On the other hand, some severe inherent issues such as increased queuing delays, unfairness, and massive packet loss were also detected. The paper provides an in-depth discussion of BBR's behavior in different experiment setups.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"2 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82476513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 171
Wireless network instabilities in the wild: Prevalence, App (non)resilience, and OS remedy 野外无线网络的不稳定性:流行,应用程序(非)弹性和操作系统补救
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117568
Zeqi Lai, Yong Cui, Yimin Jiang, Xiaomeng Chen, Y. C. Hu, Kun Tan, Minglong Dai, Kai Zheng
While the bandwidth and latency improvement of both WiFi and cellular data networks in the past decade are plenty evident, the extent of signal strength fluctuation and network disruptions (unexpected switching or disconnections) experienced by mobile users in today's network deployment remains less clear. This paper makes three contributions. First, we conduct the first extensive measurement of network disruptions and signal strength fluctuations (together denoted as instabilities) experienced by 2000 smartphones in the wild. Our results show that network disruptions and signal strength fluctuations remain prevalent as we moved into the 4G era. Second, we study how well popular mobile apps today handle such network instabilities. Our results show that even some of the most popular mobile apps do not implement any disruption-tolerant mechanisms. Third, we present JANUS, an intelligent interface management framework that exploits the multiple interfaces on a handset to transparently handle network disruptions and improve apps' QoE. We have implemented JANUS on Android and our evaluation using a set of popular apps shows that Janus can (1) transparently and efficiently handle network disruptions, (2) reduce video stalls by 2.9 times and increase 31% of the time of good voice quality compared to naive solutions.
虽然WiFi和蜂窝数据网络在过去十年中的带宽和延迟改善是非常明显的,但在今天的网络部署中,移动用户所经历的信号强度波动和网络中断(意外切换或断开)的程度仍然不太清楚。本文有三个贡献。首先,我们对2000部智能手机在野外经历的网络中断和信号强度波动(统称为不稳定性)进行了首次广泛测量。我们的研究结果表明,随着我们进入4G时代,网络中断和信号强度波动仍然普遍存在。其次,我们研究当今流行的移动应用程序如何处理这种网络不稳定性。我们的研究结果表明,即使是一些最受欢迎的移动应用程序也没有实现任何容忍中断的机制。第三,我们提出了JANUS,这是一个智能接口管理框架,利用手机上的多个接口来透明地处理网络中断并提高应用程序的QoE。我们已经在Android上实现了JANUS,我们使用一组流行的应用程序进行的评估表明,JANUS可以(1)透明有效地处理网络中断,(2)与原始解决方案相比,将视频延迟减少2.9倍,并将良好语音质量的时间增加31%。
{"title":"Wireless network instabilities in the wild: Prevalence, App (non)resilience, and OS remedy","authors":"Zeqi Lai, Yong Cui, Yimin Jiang, Xiaomeng Chen, Y. C. Hu, Kun Tan, Minglong Dai, Kai Zheng","doi":"10.1109/ICNP.2017.8117568","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117568","url":null,"abstract":"While the bandwidth and latency improvement of both WiFi and cellular data networks in the past decade are plenty evident, the extent of signal strength fluctuation and network disruptions (unexpected switching or disconnections) experienced by mobile users in today's network deployment remains less clear. This paper makes three contributions. First, we conduct the first extensive measurement of network disruptions and signal strength fluctuations (together denoted as instabilities) experienced by 2000 smartphones in the wild. Our results show that network disruptions and signal strength fluctuations remain prevalent as we moved into the 4G era. Second, we study how well popular mobile apps today handle such network instabilities. Our results show that even some of the most popular mobile apps do not implement any disruption-tolerant mechanisms. Third, we present JANUS, an intelligent interface management framework that exploits the multiple interfaces on a handset to transparently handle network disruptions and improve apps' QoE. We have implemented JANUS on Android and our evaluation using a set of popular apps shows that Janus can (1) transparently and efficiently handle network disruptions, (2) reduce video stalls by 2.9 times and increase 31% of the time of good voice quality compared to naive solutions.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"85 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80663853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigating the impact of cache pollution attacks in heterogeneous cellular networks 研究异构蜂窝网络中缓存污染攻击的影响
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117572
Sibendu Paul, A. Seetharam, A. Mukherjee, M. K. Naskar
With the growth of Internet-of-Things, mobile data traffic is expected to increase exponentially. To support this rapid growth, heterogeneous cellular networks comprising of femtocells with storage capabilities along with macrocell base stations have been proposed. In this paper, we first investigate the performance impact of a simple randomized cache pollution attack, where the attacker pollutes the cache at the femtocell by requesting unpopular content. We then adopt a principled approach based on the characteristic time of a content in a cache to design an optimized attack strategy. Our experiments show that the proposed attack strategy outperforms the randomized attack with the same attack rate.
随着物联网的发展,移动数据流量预计将呈指数级增长。为了支持这种快速增长,已经提出了由具有存储能力的飞蜂窝和宏蜂窝基站组成的异构蜂窝网络。在本文中,我们首先研究了一种简单的随机缓存污染攻击对性能的影响,攻击者通过请求不受欢迎的内容来污染移动基站的缓存。然后,我们采用基于缓存中内容特征时间的原则方法来设计优化的攻击策略。实验表明,该攻击策略优于相同攻击率的随机攻击策略。
{"title":"Investigating the impact of cache pollution attacks in heterogeneous cellular networks","authors":"Sibendu Paul, A. Seetharam, A. Mukherjee, M. K. Naskar","doi":"10.1109/ICNP.2017.8117572","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117572","url":null,"abstract":"With the growth of Internet-of-Things, mobile data traffic is expected to increase exponentially. To support this rapid growth, heterogeneous cellular networks comprising of femtocells with storage capabilities along with macrocell base stations have been proposed. In this paper, we first investigate the performance impact of a simple randomized cache pollution attack, where the attacker pollutes the cache at the femtocell by requesting unpopular content. We then adopt a principled approach based on the characteristic time of a content in a cache to design an optimized attack strategy. Our experiments show that the proposed attack strategy outperforms the randomized attack with the same attack rate.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"105 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89917855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A concise forwarding information base for scalable and fast name lookups 一个简明的转发信息库,用于可扩展和快速的名称查找
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117530
Ye Yu, D. Belazzougui, Chen Qian, Qin Zhang
Forwarding information base (FIB) scalability and its lookup speed are fundamental problems of numerous network technologies that uses location-independent network names. In this paper we present a new network algorithm, Othello Hashing, and its application of a FIB design called Concise, which uses very little memory to support ultra-fast lookups of network names. Othello Hashing and Concise make use of minimal perfect hashing and relies on the programmable network framework to support dynamic updates. Our conceptual contribution of Concise is to optimize the memory efficiency and query speed in the data plane and move the relatively complex construction and update components to the resource-rich control plane. We implemented Concise on three platforms. Experimental results show that Concise uses significantly smaller memory to achieve much faster query speed compared to existing solutions of network name lookups.
转发信息库(Forwarding information base, FIB)的可扩展性及其查找速度是许多使用位置无关网络名称的网络技术的基本问题。在本文中,我们提出了一种新的网络算法,奥赛罗哈希,以及它的应用FIB设计称为简洁,它使用很少的内存来支持超快速查找网络名称。奥赛罗哈希和简明使用最小完美哈希,并依赖于可编程网络框架来支持动态更新。我们在概念上的贡献是优化数据平面的内存效率和查询速度,将相对复杂的构造和更新组件移动到资源丰富的控制平面。我们在三个平台上执行了《简明》。实验结果表明,与现有的网络名称查找解决方案相比,该方法使用了更小的内存,实现了更快的查询速度。
{"title":"A concise forwarding information base for scalable and fast name lookups","authors":"Ye Yu, D. Belazzougui, Chen Qian, Qin Zhang","doi":"10.1109/ICNP.2017.8117530","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117530","url":null,"abstract":"Forwarding information base (FIB) scalability and its lookup speed are fundamental problems of numerous network technologies that uses location-independent network names. In this paper we present a new network algorithm, Othello Hashing, and its application of a FIB design called Concise, which uses very little memory to support ultra-fast lookups of network names. Othello Hashing and Concise make use of minimal perfect hashing and relies on the programmable network framework to support dynamic updates. Our conceptual contribution of Concise is to optimize the memory efficiency and query speed in the data plane and move the relatively complex construction and update components to the resource-rich control plane. We implemented Concise on three platforms. Experimental results show that Concise uses significantly smaller memory to achieve much faster query speed compared to existing solutions of network name lookups.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"2001 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82538103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Analyzing public transportation mobility data for networking purposes 为网络目的分析公共交通移动数据
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117593
K. Suleiman, O. Basir
Utilizing vehicles for networking purposes has always been a challenge. This is mainly due to the minimum density of connected-vehicles required. The locations of these vehicles should be shareable and reasonably predictable for efficient position-based routing protocols to be implemented. Their Vehicle-to-Vehicle (V2V) communication cooperation should be well-incentivized for efficient networking to be realized. Regular vehicles struggle to have all of these properties. Public transportation vehicles, on the other hand, are well-positioned in this regard; their number is proportional to the number of city residents while being uniformly distributed throughout the day, their locations have no privacy concerns while being highly predictable and their V2V communication cooperation is easily enforceable by the single administration authority they usually have. With efficient networking, public transportation vehicles can become the reliable communication backbone for other vehicle categories. In order to investigate their networking potential, we present for the firs time, in this paper, a data analysis study of realistic public transportation mobility datasets representing the Grand River Transit bus service offered throughout the Region of Waterloo, Ontario, Canada. We show both the data preprocessing and processing phases. The processing phase is mainly based on discovering bus groups using hierarchical clustering. This is done while varying the minimum degree of intra-cluster connectivity and the maximum intra-cluster communication range. Based on this data analysis approach, we show the promising networking potential of public transportation vehicles and provide design guidelines for future networking solutions utilizing them.
利用车辆联网一直是一个挑战。这主要是由于所需的联网车辆密度最小。为了实现有效的基于位置的路由协议,这些车辆的位置应该是可共享和合理预测的。他们的车对车(V2V)通信合作应该得到很好的激励,以实现有效的联网。普通车辆很难拥有所有这些特性。另一方面,公共交通工具在这方面处于有利地位;他们的数量与城市居民的数量成正比,同时全天均匀分布,他们的位置没有隐私问题,同时高度可预测,他们的V2V通信合作很容易被他们通常拥有的单一管理机构强制执行。通过高效的联网,公共交通车辆可以成为其他车辆类别的可靠通信骨干。为了研究它们的网络潜力,我们在本文中首次提出了一项数据分析研究,该数据集代表了加拿大安大略省滑铁卢地区提供的大河公交服务的现实公共交通机动性数据集。我们展示了数据预处理和处理阶段。处理阶段主要基于使用分层聚类发现总线组。这是在改变集群内连接的最小程度和集群内通信的最大范围时完成的。基于这种数据分析方法,我们展示了公共交通工具的联网潜力,并为未来利用它们的联网解决方案提供了设计指南。
{"title":"Analyzing public transportation mobility data for networking purposes","authors":"K. Suleiman, O. Basir","doi":"10.1109/ICNP.2017.8117593","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117593","url":null,"abstract":"Utilizing vehicles for networking purposes has always been a challenge. This is mainly due to the minimum density of connected-vehicles required. The locations of these vehicles should be shareable and reasonably predictable for efficient position-based routing protocols to be implemented. Their Vehicle-to-Vehicle (V2V) communication cooperation should be well-incentivized for efficient networking to be realized. Regular vehicles struggle to have all of these properties. Public transportation vehicles, on the other hand, are well-positioned in this regard; their number is proportional to the number of city residents while being uniformly distributed throughout the day, their locations have no privacy concerns while being highly predictable and their V2V communication cooperation is easily enforceable by the single administration authority they usually have. With efficient networking, public transportation vehicles can become the reliable communication backbone for other vehicle categories. In order to investigate their networking potential, we present for the firs time, in this paper, a data analysis study of realistic public transportation mobility datasets representing the Grand River Transit bus service offered throughout the Region of Waterloo, Ontario, Canada. We show both the data preprocessing and processing phases. The processing phase is mainly based on discovering bus groups using hierarchical clustering. This is done while varying the minimum degree of intra-cluster connectivity and the maximum intra-cluster communication range. Based on this data analysis approach, we show the promising networking potential of public transportation vehicles and provide design guidelines for future networking solutions utilizing them.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"56 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80205714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MSAID: Automated interference detection for multiple SDN applications MSAID:用于多个SDN应用的自动干扰检测
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117575
Yahui Li, Zhiliang Wang, Jiangyuan Yao, Xia Yin, Xingang Shi, Jianping Wu
Multiple SDN applications can make several harmful interferences unintentionally, although each individual application may be properly developed. This paper proposes a Multiple SDN Applications Interference Detector (MSAID). To bridge the gap between the source code of applications and the actual interferences, we leverage symbolic execution and constraint solving to obtain how the event handler handles the input messages. We then analyze the complex interaction of multiple applications and present novel methods to identify the interferences. Finally, we evaluate its correctness and prove its usefulness with a series of SDN applications.
多个SDN应用程序可能会无意中产生一些有害的干扰,尽管每个单独的应用程序可能会得到适当的开发。提出了一种多SDN应用干扰检测器(MSAID)。为了弥合应用程序源代码和实际干扰之间的差距,我们利用符号执行和约束求解来获取事件处理程序如何处理输入消息。然后,我们分析了多个应用程序的复杂交互作用,并提出了识别干扰的新方法。最后,我们评估了其正确性,并通过一系列SDN应用证明了其实用性。
{"title":"MSAID: Automated interference detection for multiple SDN applications","authors":"Yahui Li, Zhiliang Wang, Jiangyuan Yao, Xia Yin, Xingang Shi, Jianping Wu","doi":"10.1109/ICNP.2017.8117575","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117575","url":null,"abstract":"Multiple SDN applications can make several harmful interferences unintentionally, although each individual application may be properly developed. This paper proposes a Multiple SDN Applications Interference Detector (MSAID). To bridge the gap between the source code of applications and the actual interferences, we leverage symbolic execution and constraint solving to obtain how the event handler handles the input messages. We then analyze the complex interaction of multiple applications and present novel methods to identify the interferences. Finally, we evaluate its correctness and prove its usefulness with a series of SDN applications.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"504 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76705121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SICS: Secure and dynamic middlebox outsourcing 安全、动态的中间盒外包
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117581
Huazhe Wang, Xin Li, Chen Qian
Outsourcing middleboxes brings threats to the enterprise's private information including the trafflc and rules of middleboxes. We present a secure and dynamic middlebox outsourcing framework SICS, short for Secure In-Cloud Service. SICS encrypts each packet header and uses a label for in-cloud rule matching, which enables the cloud to perform its functionalities correctly with minimum header information leakage.
外包中间件给企业的私有信息带来了威胁,包括中间件的流量和规则。我们提出了一个安全的、动态的中间件外包框架SICS,即安全云内服务的缩写。SICS对每个数据包头进行加密,并使用标签进行云内规则匹配,这使云能够以最小的头信息泄漏来正确执行其功能。
{"title":"SICS: Secure and dynamic middlebox outsourcing","authors":"Huazhe Wang, Xin Li, Chen Qian","doi":"10.1109/ICNP.2017.8117581","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117581","url":null,"abstract":"Outsourcing middleboxes brings threats to the enterprise's private information including the trafflc and rules of middleboxes. We present a secure and dynamic middlebox outsourcing framework SICS, short for Secure In-Cloud Service. SICS encrypts each packet header and uses a label for in-cloud rule matching, which enables the cloud to perform its functionalities correctly with minimum header information leakage.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"6 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85557975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On an impact of large content on packet-level caching of information centric networking 大内容对信息中心网络的包级缓存的影响
Pub Date : 2017-10-01 DOI: 10.1109/ICNP.2017.8117577
Yoji Yamamoto, Junji Takemasa, Y. Koizumi, T. Hasegawa
On the one hand packet-level caching of Information-Centric Networking (ICN) is a key to accommodating Video on Demand (VoD) movies thanks to its fine granularity caching, but on the other hand it would cause degradation in cache hit probability because each of packets constituting a content object is dealt individually. This paper analytically reveals that caching large content objects by using packet-level caching degrades caching hit probability.
一方面,信息中心网络(ICN)的数据包级缓存由于其细粒度的缓存是适应视频点播(VoD)电影的关键,但另一方面,由于构成内容对象的每个数据包都是单独处理的,因此会导致缓存命中概率的降低。分析表明,使用包级缓存缓存大型内容对象会降低缓存命中概率。
{"title":"On an impact of large content on packet-level caching of information centric networking","authors":"Yoji Yamamoto, Junji Takemasa, Y. Koizumi, T. Hasegawa","doi":"10.1109/ICNP.2017.8117577","DOIUrl":"https://doi.org/10.1109/ICNP.2017.8117577","url":null,"abstract":"On the one hand packet-level caching of Information-Centric Networking (ICN) is a key to accommodating Video on Demand (VoD) movies thanks to its fine granularity caching, but on the other hand it would cause degradation in cache hit probability because each of packets constituting a content object is dealt individually. This paper analytically reveals that caching large content objects by using packet-level caching degrades caching hit probability.","PeriodicalId":6462,"journal":{"name":"2017 IEEE 25th International Conference on Network Protocols (ICNP)","volume":"43 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88694729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 IEEE 25th International Conference on Network Protocols (ICNP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1