首页 > 最新文献

2014 IEEE Global Communications Conference最新文献

英文 中文
On routing for extending satellite service life in LEO satellite networks 低轨道卫星网络中延长卫星使用寿命的路由研究
Pub Date : 2014-12-08 DOI: 10.1109/GLOCOM.2014.7037237
M. Hussein, G. Jakllari, B. Paillassa
We address the problem of routing for extending the service life of satellites in Iridium-like LEO constellations. Satellites in LEO constellations can spend over 30% of their time under the earth's umbra, time during which they are powered by batteries. While the batteries are recharged by solar energy, the depth of discharge they reach during eclipse significantly affects their lifetime - and by extension, the service life of the satellites themselves. For batteries of the type that power Iridium satellites, a 15% increase to the depth of discharge can practically cut their service lives in half. We present two new routing metrics - LASER and SLIM - that try to strike a balance between performance and battery depth of discharge in LEO satellite constellations. Our basic approach is to leverage the deterministic movement of satellites for favoring routing traffic over satellites exposed to the sun as opposed to the eclipsed satellites, thereby decreasing the average battery depth of discharge - all without adversely affecting network performance. Simulations show that LASER and SLIM can reduce the depth of discharge by about 11% and 16%, respectively, which can lead to as much as 100% increase in the satellite batteries lifetime. This is accomplished by trading off very little in terms of end-to-end delay.
我们解决了在类铱低轨道星座中延长卫星使用寿命的路由问题。低轨道星座的卫星有超过30%的时间处于地球本影之下,在此期间它们是由电池供电的。当电池通过太阳能充电时,它们在日食期间达到的放电深度会显著影响它们的使用寿命,进而影响卫星本身的使用寿命。对于为铱星提供动力的那种电池来说,放电深度增加15%实际上会使它们的使用寿命缩短一半。我们提出了两个新的路由指标- LASER和SLIM -试图在低轨道卫星星座的性能和电池放电深度之间取得平衡。我们的基本方法是利用卫星的确定性运动来支持路由流量,而不是暴露在阳光下的卫星,而不是黯然失色的卫星,从而降低电池的平均放电深度——所有这些都不会对网络性能产生不利影响。仿真结果表明,LASER和SLIM分别可以减少约11%和16%的放电深度,从而使卫星电池寿命延长100%。这是通过在端到端延迟方面付出很少的代价来实现的。
{"title":"On routing for extending satellite service life in LEO satellite networks","authors":"M. Hussein, G. Jakllari, B. Paillassa","doi":"10.1109/GLOCOM.2014.7037237","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7037237","url":null,"abstract":"We address the problem of routing for extending the service life of satellites in Iridium-like LEO constellations. Satellites in LEO constellations can spend over 30% of their time under the earth's umbra, time during which they are powered by batteries. While the batteries are recharged by solar energy, the depth of discharge they reach during eclipse significantly affects their lifetime - and by extension, the service life of the satellites themselves. For batteries of the type that power Iridium satellites, a 15% increase to the depth of discharge can practically cut their service lives in half. We present two new routing metrics - LASER and SLIM - that try to strike a balance between performance and battery depth of discharge in LEO satellite constellations. Our basic approach is to leverage the deterministic movement of satellites for favoring routing traffic over satellites exposed to the sun as opposed to the eclipsed satellites, thereby decreasing the average battery depth of discharge - all without adversely affecting network performance. Simulations show that LASER and SLIM can reduce the depth of discharge by about 11% and 16%, respectively, which can lead to as much as 100% increase in the satellite batteries lifetime. This is accomplished by trading off very little in terms of end-to-end delay.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"8 1","pages":"2832-2837"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78775752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Resource allocation for HARQ-IR systems with QoS constraints and limited feedback 具有QoS约束和有限反馈的HARQ-IR系统资源分配
Pub Date : 2014-12-08 DOI: 10.1109/GLOCOM.2014.7037471
D. To, H. Nguyen, Quoc-Tuan Vien, Li-Ke Huang
This paper investigates power allocation for reliable downlink transmission in cellular networks subject to quality-of-service (QoS) constraints. The reliability of data transmissions is assured by hybrid automatic repeat request protocol with incremental redundancy (HARQ-IR). By evaluating the effective throughput of the HARQ-IR protocol for the downlink transmission under QoS constraints, we propose a novel power allocation policy to efficiently exploit the available resources. Furthermore, based on the derived effective throughput, optimization problem is formulated and solved, in which all channels are effectively allocated to all users. Finally, numerical results are provided to support theoretical findings.
本文研究了受服务质量(QoS)约束的蜂窝网络下行可靠传输的功率分配问题。采用具有增量冗余的混合式自动重复请求协议(HARQ-IR)保证了数据传输的可靠性。通过评估在QoS约束下HARQ-IR协议下行传输的有效吞吐量,提出了一种新的功率分配策略,以有效地利用可用资源。在导出有效吞吐量的基础上,构造并求解了所有信道有效分配给所有用户的优化问题。最后,给出了数值结果来支持理论结果。
{"title":"Resource allocation for HARQ-IR systems with QoS constraints and limited feedback","authors":"D. To, H. Nguyen, Quoc-Tuan Vien, Li-Ke Huang","doi":"10.1109/GLOCOM.2014.7037471","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7037471","url":null,"abstract":"This paper investigates power allocation for reliable downlink transmission in cellular networks subject to quality-of-service (QoS) constraints. The reliability of data transmissions is assured by hybrid automatic repeat request protocol with incremental redundancy (HARQ-IR). By evaluating the effective throughput of the HARQ-IR protocol for the downlink transmission under QoS constraints, we propose a novel power allocation policy to efficiently exploit the available resources. Furthermore, based on the derived effective throughput, optimization problem is formulated and solved, in which all channels are effectively allocated to all users. Finally, numerical results are provided to support theoretical findings.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"333 1 1","pages":"4226-4231"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77412495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quality of service in an information-centric network 以信息为中心的网络中的服务质量
Pub Date : 2014-12-08 DOI: 10.1109/GLOCOM.2014.7037079
M. Al-Naday, Andreas Bontozoglou, V. Vassilakis, M. Reed
QoS provisioning is one of the key challenges facing current as well as future Internet architectures. Its dependency on content recognition does not allow a straightforward support of QoS in the IP, host-centric, model. In contrast, Information-Centric Networking (ICN) offers native content identification in the network, which can be exploited to develop a common, elegant, framework for supporting QoS-based delivery. Therefore, ICN may naturally overcome many of the cumbersome fixes and limitations of today's solutions. In this work, we exploit the flexibility in semantic representation offered by ICN to present a flexible and scalable ICN-based QoS model. Our model defines QoS requirements as information items that can be linked to the content at various aggregation levels, independent of the communication approach. Therefore, it can be applied uniformly to various network types and hierarchies. Furthermore, our model offers enhanced traffic treatment as well as resource utilization while significantly reducing the overhead on the network.
QoS提供是当前和未来Internet架构面临的关键挑战之一。它对内容识别的依赖使得在以主机为中心的IP模型中不能直接支持QoS。相反,以信息为中心的网络(Information-Centric Networking, ICN)在网络中提供原生内容标识,可以利用它来开发一个通用的、优雅的框架,以支持基于qos的交付。因此,ICN可能会自然而然地克服当今解决方案中许多繁琐的修复和限制。在这项工作中,我们利用ICN提供的语义表示的灵活性来提出一个灵活和可扩展的基于ICN的QoS模型。我们的模型将QoS需求定义为可以在不同聚合级别链接到内容的信息项,而不依赖于通信方法。因此,它可以统一应用于各种网络类型和层次。此外,我们的模型提供了增强的流量处理和资源利用率,同时显著降低了网络开销。
{"title":"Quality of service in an information-centric network","authors":"M. Al-Naday, Andreas Bontozoglou, V. Vassilakis, M. Reed","doi":"10.1109/GLOCOM.2014.7037079","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7037079","url":null,"abstract":"QoS provisioning is one of the key challenges facing current as well as future Internet architectures. Its dependency on content recognition does not allow a straightforward support of QoS in the IP, host-centric, model. In contrast, Information-Centric Networking (ICN) offers native content identification in the network, which can be exploited to develop a common, elegant, framework for supporting QoS-based delivery. Therefore, ICN may naturally overcome many of the cumbersome fixes and limitations of today's solutions. In this work, we exploit the flexibility in semantic representation offered by ICN to present a flexible and scalable ICN-based QoS model. Our model defines QoS requirements as information items that can be linked to the content at various aggregation levels, independent of the communication approach. Therefore, it can be applied uniformly to various network types and hierarchies. Furthermore, our model offers enhanced traffic treatment as well as resource utilization while significantly reducing the overhead on the network.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"1 1","pages":"1861-1866"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83624296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Spectrum sensing for cognitive radio using multicoset sampling 使用多集采样的认知无线电频谱传感
Pub Date : 2014-12-08 DOI: 10.1109/GLOCOM.2014.7036909
Babar Aziz, S. Traore, A. Nafkha, Daniel Le Guennec
Spectrum sensing is the very task upon which the entire operation of Cognitive Radio rests. In this paper, we propose a spectrum sensing technique based on the estimates of the spectrum of a multiband signal obtained from its non-uniform compressed multicoset samples. We show that our proposed spectrum sensing method provides accurate results using less data samples. We discuss in detail the effect of false detections on the quality of the reconstructed signal obtained from non-uniform multicoset samples.
频谱感知是整个认知无线电操作所依赖的任务。在本文中,我们提出了一种基于从非均匀压缩多共集样本中获得的多频带信号的频谱估计的频谱传感技术。结果表明,本文提出的频谱传感方法使用较少的数据样本就能获得准确的结果。我们详细讨论了假检测对从非均匀多共集样本中获得的重构信号质量的影响。
{"title":"Spectrum sensing for cognitive radio using multicoset sampling","authors":"Babar Aziz, S. Traore, A. Nafkha, Daniel Le Guennec","doi":"10.1109/GLOCOM.2014.7036909","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7036909","url":null,"abstract":"Spectrum sensing is the very task upon which the entire operation of Cognitive Radio rests. In this paper, we propose a spectrum sensing technique based on the estimates of the spectrum of a multiband signal obtained from its non-uniform compressed multicoset samples. We show that our proposed spectrum sensing method provides accurate results using less data samples. We discuss in detail the effect of false detections on the quality of the reconstructed signal obtained from non-uniform multicoset samples.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"10 1","pages":"816-821"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85431850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Too big or too small? The PTB-PTS ICMP-based attack against IPsec gateways 太大还是太小?针对IPsec网关的PTB-PTS icmp攻击
Pub Date : 2014-12-08 DOI: 10.1109/GLOCOM.2014.7036862
Ludovic Jacquin, V. Roca, Jean-Louis Roch
This work introduces the "Packet Too Big"-"Packet Too Small" ICMP based attack against IPsec gateways. We explain how an attacker having eavesdropping and packet injection capabilities, from the insecure network where he only sees encrypted packets, can force a gateway to reduce the Path MTU of an IPsec tunnel to the minimum, which triggers severe issues for the hosts behind this gateway: depending on the Path MTU discovery algorithm in use, the attack either creates a Denial of Service or major performance penalties. This attack highlights two fundamental problems that we discuss, along with potential counter-measures to mitigate the attack while keeping ICMP benefits.
本文介绍了针对IPsec网关的“包太大”-“包太小”ICMP攻击。我们解释了一个具有窃听和数据包注入能力的攻击者如何从他只看到加密数据包的不安全网络中,迫使网关将IPsec隧道的Path MTU减少到最小,这对网关后面的主机触发了严重的问题:根据使用的Path MTU发现算法,攻击会产生拒绝服务或主要性能惩罚。这种攻击突出了我们讨论的两个基本问题,以及在保持ICMP优势的同时减轻攻击的潜在对策。
{"title":"Too big or too small? The PTB-PTS ICMP-based attack against IPsec gateways","authors":"Ludovic Jacquin, V. Roca, Jean-Louis Roch","doi":"10.1109/GLOCOM.2014.7036862","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7036862","url":null,"abstract":"This work introduces the \"Packet Too Big\"-\"Packet Too Small\" ICMP based attack against IPsec gateways. We explain how an attacker having eavesdropping and packet injection capabilities, from the insecure network where he only sees encrypted packets, can force a gateway to reduce the Path MTU of an IPsec tunnel to the minimum, which triggers severe issues for the hosts behind this gateway: depending on the Path MTU discovery algorithm in use, the attack either creates a Denial of Service or major performance penalties. This attack highlights two fundamental problems that we discuss, along with potential counter-measures to mitigate the attack while keeping ICMP benefits.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"14 1","pages":"530-536"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83363485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimizing rule placement in software-defined networks for energy-aware routing 优化软件定义网络中能量感知路由的规则放置
Pub Date : 2014-12-08 DOI: 10.1109/GLOCOM.2014.7037187
F. Giroire, J. Moulierac, T. K. Phan
Software-defined Networks (SDN), in particular OpenFlow, is a new networking paradigm enabling innovation through network programmability. Over past few years, many applications have been built using SDN such as server load balancing, virtual-machine migration, traffic engineering and access control. In this paper, we focus on using SDN for energy-aware routing (EAR). Since traffic load has a small influence on power consumption of routers, EAR allows to put unused links into sleep mode to save energy. SDN can collect traffic matrix and then computes routing solutions satisfying QoS while being minimal in energy consumption. However, prior works on EAR have assumed that the table of OpenFlow switch can hold an infinite number of rules. In practice, this assumption does not hold since the flow table is implemented with Ternary Content Addressable Memory (TCAM) which is expensive and power-hungry. In this paper, we propose an optimization method to minimize energy consumption for a backbone network while respecting capacity constraints on links and rule space constraints on routers. In details, we present an exact formulation using Integer Linear Program (ILP) and introduce efficient greedy heuristic algorithm. Based on simulations, we show that using this smart rule space allocation, it is possible to save almost as much power consumption as the classical EAR approach.
软件定义网络(SDN),特别是OpenFlow,是一种新的网络范例,通过网络可编程性实现创新。在过去的几年中,许多应用程序都是使用SDN构建的,例如服务器负载平衡、虚拟机迁移、流量工程和访问控制。在本文中,我们重点研究了将SDN用于能量感知路由(EAR)。由于流量负载对路由器功耗的影响很小,EAR允许将未使用的链路置于休眠模式以节省能源。SDN可以采集流量矩阵,然后以最小的能耗计算出满足QoS的路由解决方案。然而,先前关于EAR的工作已经假设OpenFlow交换机的表可以容纳无限数量的规则。在实践中,这个假设并不成立,因为流表是用三元内容可寻址内存(TCAM)实现的,这是昂贵和耗电的。在本文中,我们提出了一种优化方法,以最小化骨干网的能量消耗,同时尊重链路的容量约束和路由器的规则空间约束。详细地,我们用整数线性规划(ILP)给出了一个精确的公式,并引入了高效的贪婪启发式算法。基于仿真,我们证明了使用这种智能规则空间分配,可以节省与经典EAR方法几乎相同的功耗。
{"title":"Optimizing rule placement in software-defined networks for energy-aware routing","authors":"F. Giroire, J. Moulierac, T. K. Phan","doi":"10.1109/GLOCOM.2014.7037187","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7037187","url":null,"abstract":"Software-defined Networks (SDN), in particular OpenFlow, is a new networking paradigm enabling innovation through network programmability. Over past few years, many applications have been built using SDN such as server load balancing, virtual-machine migration, traffic engineering and access control. In this paper, we focus on using SDN for energy-aware routing (EAR). Since traffic load has a small influence on power consumption of routers, EAR allows to put unused links into sleep mode to save energy. SDN can collect traffic matrix and then computes routing solutions satisfying QoS while being minimal in energy consumption. However, prior works on EAR have assumed that the table of OpenFlow switch can hold an infinite number of rules. In practice, this assumption does not hold since the flow table is implemented with Ternary Content Addressable Memory (TCAM) which is expensive and power-hungry. In this paper, we propose an optimization method to minimize energy consumption for a backbone network while respecting capacity constraints on links and rule space constraints on routers. In details, we present an exact formulation using Integer Linear Program (ILP) and introduce efficient greedy heuristic algorithm. Based on simulations, we show that using this smart rule space allocation, it is possible to save almost as much power consumption as the classical EAR approach.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"194 1","pages":"2523-2529"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75551050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 144
Multiple input single output optical buffers for asynchronous optical packet switched networks 异步光分组交换网络的多输入单输出光缓冲器
Pub Date : 2014-12-01 DOI: 10.1109/GLOCOM.2014.7037110
Shuna Yang, N. Stol
Optical buffering is one major challenge in realizing all-optical packet switching. In this paper we focus on a delay-line buffer architecture, called a Multiple-Input Single-Output FIFO (MISO-FIFO) optical buffer. This architecture reduces the physical size of a buffer by up to an order of magnitude or more by allowing reuse of its basic optical delay line elements. We consider the MISO-FIFO optical buffers in a network scenario where the incoming packets are asynchronous and of variable length. A simple Markov model is developed to analyze the performance of our buffering scheme, in terms of packet loss ratio, average packet delay and the output link utilization. Both simulation and analytical results show that increasing the buffer size will significantly improve the performance of this optical buffer under low system load. However, under high system load, its performance will deteriorate when increasing the buffer size. In addition, this paper gives clear guidelines for designing the optimal basic delay line lengths under different system loads, in order to get the minimal packet loss. It is noticeable that this optimal basic length value is independent of the buffer sizes.
光缓冲是实现全光分组交换的主要挑战之一。在本文中,我们重点研究了一种延迟线缓冲器结构,称为多输入单输出FIFO (MISO-FIFO)光缓冲器。这种架构通过允许重用其基本的光延迟线元件,将缓冲区的物理大小减少了多达一个数量级或更多。我们考虑在传入数据包是异步和可变长度的网络场景中的MISO-FIFO光缓冲器。建立了一个简单的马尔可夫模型,从丢包率、平均包延迟和输出链路利用率等方面分析了该缓冲方案的性能。仿真和分析结果表明,在低系统负载下,增大缓冲器的尺寸可以显著提高该光缓冲器的性能。但是,在高系统负载下,增大缓冲区的大小会使其性能下降。此外,本文给出了在不同系统负载下设计最优基本延迟线长度的指导原则,以获得最小的丢包量。值得注意的是,这个最佳基本长度值与缓冲区大小无关。
{"title":"Multiple input single output optical buffers for asynchronous optical packet switched networks","authors":"Shuna Yang, N. Stol","doi":"10.1109/GLOCOM.2014.7037110","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7037110","url":null,"abstract":"Optical buffering is one major challenge in realizing all-optical packet switching. In this paper we focus on a delay-line buffer architecture, called a Multiple-Input Single-Output FIFO (MISO-FIFO) optical buffer. This architecture reduces the physical size of a buffer by up to an order of magnitude or more by allowing reuse of its basic optical delay line elements. We consider the MISO-FIFO optical buffers in a network scenario where the incoming packets are asynchronous and of variable length. A simple Markov model is developed to analyze the performance of our buffering scheme, in terms of packet loss ratio, average packet delay and the output link utilization. Both simulation and analytical results show that increasing the buffer size will significantly improve the performance of this optical buffer under low system load. However, under high system load, its performance will deteriorate when increasing the buffer size. In addition, this paper gives clear guidelines for designing the optimal basic delay line lengths under different system loads, in order to get the minimal packet loss. It is noticeable that this optimal basic length value is independent of the buffer sizes.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"2 1","pages":"2054-2059"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73845681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A robust SDN network architecture for service providers 为服务提供商提供健壮的SDN网络架构
Pub Date : 2014-12-01 DOI: 10.1109/GLOCOM.2014.7037086
Femando Lopez-Rodriguez, Divanilson R. Campelo
Large scale networks, such as those deployed by Service Providers (SPs), employ robust architectures, capable of supporting large volumes of traffic with very different characteristics. Their network equipment has significant processing load, being responsible for building both a routing logic and the routing of traffic itself. By having the network control implemented in a distributed manner and being built with a limited number of vendors, these networks have limitations of control and traffic engineering, hindering the differentiation among SPs. Additionally, the network intelligence is hidden in the network equipment, making innovations very slow and conditioned to the vendors interests. As an alternative option, this work proposes a Software Defined Networking (SDN)-OpenFlow network architecture that attempts to improve the previously mentioned problems, and, at the same time, to solve the arising difficulties related to the SDN network centralized feature. With the proposed architecture, a robust SP SDN-OpenFlow network is created to support high controller response times and controller outages, without additional delays in the creation of flows and with significant reduction of the controller load. A prototype has been built using Open vSwitch as a virtualization software for OpenFlow clients, Mininet for the topology construction and Ryu as the controller, all with OpenFlow 1.3 support. The obtained results are general and can be extended to other types of networks.
大型网络,例如由服务提供商(sp)部署的网络,采用健壮的体系结构,能够支持具有非常不同特征的大量流量。他们的网络设备具有显著的处理负载,负责构建路由逻辑和流量本身的路由。由于网络控制以分布式方式实现,并且由有限数量的供应商构建,这些网络具有控制和流量工程的局限性,阻碍了sp之间的区分。此外,网络智能隐藏在网络设备中,使得创新非常缓慢,并且受制于供应商的利益。作为一种替代方案,本工作提出了一种软件定义网络(SDN)-OpenFlow网络架构,试图改善上述问题,同时解决与SDN网络集中特性相关的困难。根据所提出的架构,创建了一个强大的SP SDN-OpenFlow网络,以支持高控制器响应时间和控制器中断,而不会在创建流时产生额外的延迟,并显着降低控制器负载。使用openvswitch作为OpenFlow客户端的虚拟化软件,Mininet作为拓扑结构,Ryu作为控制器,构建了一个原型,所有这些都支持OpenFlow 1.3。所得结果具有普遍性,可推广到其他类型的网络。
{"title":"A robust SDN network architecture for service providers","authors":"Femando Lopez-Rodriguez, Divanilson R. Campelo","doi":"10.1109/GLOCOM.2014.7037086","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7037086","url":null,"abstract":"Large scale networks, such as those deployed by Service Providers (SPs), employ robust architectures, capable of supporting large volumes of traffic with very different characteristics. Their network equipment has significant processing load, being responsible for building both a routing logic and the routing of traffic itself. By having the network control implemented in a distributed manner and being built with a limited number of vendors, these networks have limitations of control and traffic engineering, hindering the differentiation among SPs. Additionally, the network intelligence is hidden in the network equipment, making innovations very slow and conditioned to the vendors interests. As an alternative option, this work proposes a Software Defined Networking (SDN)-OpenFlow network architecture that attempts to improve the previously mentioned problems, and, at the same time, to solve the arising difficulties related to the SDN network centralized feature. With the proposed architecture, a robust SP SDN-OpenFlow network is created to support high controller response times and controller outages, without additional delays in the creation of flows and with significant reduction of the controller load. A prototype has been built using Open vSwitch as a virtualization software for OpenFlow clients, Mininet for the topology construction and Ryu as the controller, all with OpenFlow 1.3 support. The obtained results are general and can be extended to other types of networks.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"36 1","pages":"1903-1908"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74088115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Detection and prevention from misbehaving intruders in vehicular networks 对车载网络中行为不端的入侵者的检测和预防
Pub Date : 2014-12-01 DOI: 10.1109/GLOCOM.2014.7036781
Hichem Sedjelmaci, Tarek Bouali, S. Senouci
In this paper, we design and implement a new intrusion detection and prevention schema for vehicular networks. It has the ability to detect and predict with a high accuracy a future malicious behavior of an attacker. This is unlike the current detection schémas, where there is no prevention technique since they aim to detect only current attackers that occur in the network. We used game theory concept to predict the future behavior of the monitored vehicle and categorize it into the appropriate list (White, White & Gray, Gray, and Revocation_Black) according to its predicted attack severity. In this paper, our aim is to prevent from the most dangerous attack that targets a vehicular network, which is false alert's generation attack. Simulation results show that our intrusion detection and prevention schema exhibits a high detection rate and generates a low false positive rate. In addition, it requires a low overhead to achieve a high-level security.
本文设计并实现了一种新的车载网络入侵检测与防御方案。它具有检测和预测攻击者未来恶意行为的高精度能力。这与目前的检测诈骗不同,后者没有预防技术,因为它们的目标是检测网络中发生的当前攻击者。我们使用博弈论概念来预测被监控车辆的未来行为,并根据其预测的攻击严重程度将其分类为适当的列表(白色,白灰,灰色和recvocation_black)。在本文中,我们的目标是防止针对车辆网络的最危险的攻击,即假警报的生成攻击。仿真结果表明,该入侵检测与防御方案具有较高的检测率和较低的误报率。此外,它需要较低的开销来实现高级别的安全性。
{"title":"Detection and prevention from misbehaving intruders in vehicular networks","authors":"Hichem Sedjelmaci, Tarek Bouali, S. Senouci","doi":"10.1109/GLOCOM.2014.7036781","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7036781","url":null,"abstract":"In this paper, we design and implement a new intrusion detection and prevention schema for vehicular networks. It has the ability to detect and predict with a high accuracy a future malicious behavior of an attacker. This is unlike the current detection schémas, where there is no prevention technique since they aim to detect only current attackers that occur in the network. We used game theory concept to predict the future behavior of the monitored vehicle and categorize it into the appropriate list (White, White & Gray, Gray, and Revocation_Black) according to its predicted attack severity. In this paper, our aim is to prevent from the most dangerous attack that targets a vehicular network, which is false alert's generation attack. Simulation results show that our intrusion detection and prevention schema exhibits a high detection rate and generates a low false positive rate. In addition, it requires a low overhead to achieve a high-level security.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"2015 1","pages":"39-44"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74271062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Optimal deployment of wireless small cell base stations with security considerations 考虑安全因素的无线小蜂窝基站的优化部署
Pub Date : 2014-12-01 DOI: 10.1109/GLOCOM.2014.7036874
A. Houjeij, W. Saad, T. Başar
In this paper, we investigate the problem of placing small cell base stations (SCBSs) in adversarial heterogeneous wireless networks. We consider a continuum of wireless users facing potential eavesdropping and jamming attacks. For each such attack, we first propose a suitable utility function for the wireless users. Then, we propose a novel optimal placement algorithm for finding the optimal locations of the SCBSs given the underlying security considerations. In eavesdropping scenarios, we consider the prospective eavesdroppers to be spread over a given region. The SCBSs are then placed in such a way to minimize the eavesdroppers' effect without having any information about their exact locations. In jamming scenarios, we consider a cost constrained jammer to be present in the network. The SCBSs are then placed in order to minimize the effect of the jammer's signal on the quality of the user's transmission. We simulate the developed algorithm for both types of attacks and for various network configurations. Simulation results show that the proposed solution approach yields significant improvements in the spatial SINR of all users when compared with conventional placement techniques.
本文研究了在对抗性异构无线网络中放置小蜂窝基站(SCBSs)的问题。我们考虑一个连续的无线用户面临潜在的窃听和干扰攻击。对于每一种攻击,我们首先为无线用户提出一个合适的实用函数。然后,我们提出了一种新的最优放置算法,用于在考虑潜在安全性的情况下寻找scbs的最优位置。在窃听场景中,我们认为潜在的窃听者分布在给定的区域内。然后,在没有任何关于scbs确切位置的信息的情况下,以这样一种方式放置scbs,以尽量减少窃听者的影响。在干扰情况下,我们考虑网络中存在一个成本受限的干扰器。然后放置scbs是为了尽量减少干扰器信号对用户传输质量的影响。我们针对这两种类型的攻击和各种网络配置模拟了开发的算法。仿真结果表明,与传统的定位技术相比,该方法显著提高了所有用户的空间信噪比。
{"title":"Optimal deployment of wireless small cell base stations with security considerations","authors":"A. Houjeij, W. Saad, T. Başar","doi":"10.1109/GLOCOM.2014.7036874","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7036874","url":null,"abstract":"In this paper, we investigate the problem of placing small cell base stations (SCBSs) in adversarial heterogeneous wireless networks. We consider a continuum of wireless users facing potential eavesdropping and jamming attacks. For each such attack, we first propose a suitable utility function for the wireless users. Then, we propose a novel optimal placement algorithm for finding the optimal locations of the SCBSs given the underlying security considerations. In eavesdropping scenarios, we consider the prospective eavesdroppers to be spread over a given region. The SCBSs are then placed in such a way to minimize the eavesdroppers' effect without having any information about their exact locations. In jamming scenarios, we consider a cost constrained jammer to be present in the network. The SCBSs are then placed in order to minimize the effect of the jammer's signal on the quality of the user's transmission. We simulate the developed algorithm for both types of attacks and for various network configurations. Simulation results show that the proposed solution approach yields significant improvements in the spatial SINR of all users when compared with conventional placement techniques.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"11 1","pages":"607-612"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75180836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 IEEE Global Communications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1