首页 > 最新文献

2016 IEEE 41st Conference on Local Computer Networks (LCN)最新文献

英文 中文
Convex Hull Watchdog: Mitigation of Malicious Nodes in Tree-Based P2P Monitoring Systems 凸壳看门狗:缓解基于树的P2P监控系统中的恶意节点
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.16
Andreas Disterhöft, Kalman Graffi
Monitoring the global state in peer-to-peer networks through decentralized mechanisms allows targeted optimization and improvement of the peer-to-peer network. However, malicious nodes could aim to distort the process of gathering the global state through monitoring. In this paper we propose DOMiNo, a security solution for tree-based peer-to-peer monitoring mechanisms. It passively listens to incoming events, e.g. data, and rates its suspiciousness based on outlier detection, structural verification and sanity check mechanisms. For our main objective, which is to limit the monitoring error of the desired global view, we performed an extensive evaluation. Evaluation shows tolerance with normal fluctuations but effective filtering of outliers, that severely influence the global view. As our watchdog solution operates passively, we do not add any costs nor create new surface for attacks to the monitoring system.
通过去中心化机制监测点对点网络的全局状态,可以有针对性地优化和改进点对点网络。然而,恶意节点可能会通过监控来扭曲收集全局状态的过程。在本文中,我们提出DOMiNo,这是一种基于树的对等监视机制的安全解决方案。它被动地监听传入的事件,例如数据,并根据异常值检测、结构验证和完整性检查机制对其怀疑程度进行评级。为了实现我们的主要目标,即限制所需全局视图的监视误差,我们执行了广泛的评估。评价显示对正常波动的容忍,但对严重影响全局观点的异常值进行有效过滤。由于我们的看门狗解决方案是被动运行的,我们不会增加任何成本,也不会为监控系统的攻击创造新的机会。
{"title":"Convex Hull Watchdog: Mitigation of Malicious Nodes in Tree-Based P2P Monitoring Systems","authors":"Andreas Disterhöft, Kalman Graffi","doi":"10.1109/LCN.2016.16","DOIUrl":"https://doi.org/10.1109/LCN.2016.16","url":null,"abstract":"Monitoring the global state in peer-to-peer networks through decentralized mechanisms allows targeted optimization and improvement of the peer-to-peer network. However, malicious nodes could aim to distort the process of gathering the global state through monitoring. In this paper we propose DOMiNo, a security solution for tree-based peer-to-peer monitoring mechanisms. It passively listens to incoming events, e.g. data, and rates its suspiciousness based on outlier detection, structural verification and sanity check mechanisms. For our main objective, which is to limit the monitoring error of the desired global view, we performed an extensive evaluation. Evaluation shows tolerance with normal fluctuations but effective filtering of outliers, that severely influence the global view. As our watchdog solution operates passively, we do not add any costs nor create new surface for attacks to the monitoring system.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"26 1","pages":"52-60"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84043907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
OP4: An OPPortunistic Privacy-Preserving Scheme for Crowdsensing Applications OP4:面向众感应用的机会性隐私保护方案
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.75
D. Reinhardt, Ilya Manyugin
Crowdsensing applications rely on volunteers to collect sensor readings using their mobile devices. Since the collected sensor readings are annotated with spatiotemporal information, the volunteers' privacy may be endangered. Existing privacy-preserving solutions often disclose the volunteers' location information to either a central third party or their peers. As a result, the volunteers need to trust these parties to respect their privacy. In this paper, we present a distributed approach based on the concept of multi-party computation, which does not require a trusted party and protects the location information against curious users. We evaluate the performance of our approach and show its feasibility by means of extensive simulations based on a real-world dataset. We further implement a proof-of-concept to test its performance under realistic conditions.
众测应用依赖于志愿者使用他们的移动设备收集传感器读数。由于采集到的传感器读数带有时空信息注释,可能会危及志愿者的隐私。现有的隐私保护解决方案通常会将志愿者的位置信息泄露给中心第三方或他们的同行。因此,志愿者需要相信这些当事人会尊重他们的隐私。在本文中,我们提出了一种基于多方计算概念的分布式方法,该方法不需要可信方,并保护位置信息不受好奇用户的影响。我们评估了我们的方法的性能,并通过基于真实世界数据集的广泛模拟来展示其可行性。我们进一步实现了一个概念验证,以测试其在现实条件下的性能。
{"title":"OP4: An OPPortunistic Privacy-Preserving Scheme for Crowdsensing Applications","authors":"D. Reinhardt, Ilya Manyugin","doi":"10.1109/LCN.2016.75","DOIUrl":"https://doi.org/10.1109/LCN.2016.75","url":null,"abstract":"Crowdsensing applications rely on volunteers to collect sensor readings using their mobile devices. Since the collected sensor readings are annotated with spatiotemporal information, the volunteers' privacy may be endangered. Existing privacy-preserving solutions often disclose the volunteers' location information to either a central third party or their peers. As a result, the volunteers need to trust these parties to respect their privacy. In this paper, we present a distributed approach based on the concept of multi-party computation, which does not require a trusted party and protects the location information against curious users. We evaluate the performance of our approach and show its feasibility by means of extensive simulations based on a real-world dataset. We further implement a proof-of-concept to test its performance under realistic conditions.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"23 1","pages":"460-468"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88352302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Inferring Future Links in Large Scale Networks 推断大规模网络中的未来链接
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.52
Sima Das, Sajal K. Das, Susmita K. Ghosh
The challenge in predicting future links over large scale networks (social networks) is not only maintaining accuracy, but also coping with the time-varying network graph. In contrast to the existing approaches, in this work we propose building a Markov prediction model. It not only incorporates temporal snapshots reflecting the dynamic network graph, but also considers effect of multiple timescales, along with corresponding local and global structural evolution (links and clusters respectively), correlated evolution and rate of evolution. The resulting edge selection in our approach exhibits the power law degree distribution, as exhibited in real world networks. Finally, we use two heavily dynamic real world network temporal data set (e.g. Twitter and Enron) and one relatively less dynamic network data set (e.g. DBLP), and existing state-of-the-art static and recent dynamic measures, to evaluate the prediction accuracy of our proposed Markov model and show that it out performs existing approaches.
在大规模网络(社会网络)中预测未来链接的挑战不仅在于保持准确性,而且在于处理时变的网络图。与现有的方法相比,在这项工作中,我们提出建立一个马尔可夫预测模型。它不仅结合了反映动态网络图的时间快照,而且考虑了多个时间尺度的影响,以及相应的局部和全局结构演化(分别为链接和集群)、相关演化和演化速度。在我们的方法中产生的边缘选择显示了幂律度分布,正如在现实世界的网络中所显示的那样。最后,我们使用两个高度动态的现实世界网络时态数据集(例如Twitter和安然)和一个相对不那么动态的网络数据集(例如DBLP),以及现有的最先进的静态和最新的动态测量,来评估我们提出的马尔可夫模型的预测准确性,并表明它优于现有的方法。
{"title":"Inferring Future Links in Large Scale Networks","authors":"Sima Das, Sajal K. Das, Susmita K. Ghosh","doi":"10.1109/LCN.2016.52","DOIUrl":"https://doi.org/10.1109/LCN.2016.52","url":null,"abstract":"The challenge in predicting future links over large scale networks (social networks) is not only maintaining accuracy, but also coping with the time-varying network graph. In contrast to the existing approaches, in this work we propose building a Markov prediction model. It not only incorporates temporal snapshots reflecting the dynamic network graph, but also considers effect of multiple timescales, along with corresponding local and global structural evolution (links and clusters respectively), correlated evolution and rate of evolution. The resulting edge selection in our approach exhibits the power law degree distribution, as exhibited in real world networks. Finally, we use two heavily dynamic real world network temporal data set (e.g. Twitter and Enron) and one relatively less dynamic network data set (e.g. DBLP), and existing state-of-the-art static and recent dynamic measures, to evaluate the prediction accuracy of our proposed Markov model and show that it out performs existing approaches.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"41 1","pages":"244-252"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76375565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributing Distributed Revision Control Systems 分布式版本控制系统
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.113
Philipp Hagemeister, M. Mauve
Current revision control systems are commonly used in a distributed fashion but rely on centralized stores and low-latency communication. In this work we evaluate how they would fare in fully distributed high latency networks such as delay tolerant networks (DTNs). We show that current revision control systems impose significant costs under these conditions even in moderately-sized networks. By simplifying/improving the merging process, these costs can be reduced. We also show that speeding up or slowing down communication can reduce the costs significantly.
当前的版本控制系统通常以分布式方式使用,但依赖于集中存储和低延迟通信。在这项工作中,我们评估了它们在完全分布式的高延迟网络(如延迟容忍网络(DTNs))中的表现。我们表明,在这些条件下,即使在中等规模的网络中,当前的修订控制系统也会造成显著的成本。通过简化/改进合并过程,可以降低这些成本。我们还表明,加快或减慢通信速度可以显著降低成本。
{"title":"Distributing Distributed Revision Control Systems","authors":"Philipp Hagemeister, M. Mauve","doi":"10.1109/LCN.2016.113","DOIUrl":"https://doi.org/10.1109/LCN.2016.113","url":null,"abstract":"Current revision control systems are commonly used in a distributed fashion but rely on centralized stores and low-latency communication. In this work we evaluate how they would fare in fully distributed high latency networks such as delay tolerant networks (DTNs). We show that current revision control systems impose significant costs under these conditions even in moderately-sized networks. By simplifying/improving the merging process, these costs can be reduced. We also show that speeding up or slowing down communication can reduce the costs significantly.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"47 7 1","pages":"647-650"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77493408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive Transmission Scheme for TCP in Wireless Multi-Hop Network 无线多跳网络中TCP自适应传输方案
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.78
J. Lee, Hyunsoon Kim, Woonghee Lee, Hwangnam Kim
Wireless multi-hop networks are scalable in that devices can easily connect to the network. Such scalability is also required in IoT. However, wireless multi-hop network mostly suffers from high probability of transmission failure due to interference, and nodes connected to the network often experience connection loss and subsequent segment loss which node mobility and routing update incur. Due to the fact that the congestion is not a sole reason for segment loss in wireless multi-hop network, the congestion control of TCP should consider momentary link instability, which unnecessarily reduces transmission speed. For this reason, this paper suggests adjustment of slow-start threshold (ssthresh) value which is used for congestion control algorithm. The adjustment algorithm is called adaptive ssthresh decision ASD algorithm that is to reduce unnecessary decrease of transmission speed in wireless multi-hop network.
无线多跳网络是可扩展的,因为设备可以很容易地连接到网络。物联网也需要这种可扩展性。然而,无线多跳网络由于受到干扰,传输失败的概率很大,连接到网络上的节点经常会因为节点移动和路由更新而导致连接丢失和随后的网段丢失。在无线多跳网络中,拥塞并不是导致网段丢失的唯一原因,因此TCP的拥塞控制应该考虑链路的瞬间不稳定性,而这会不必要地降低传输速度。为此,本文建议调整用于拥塞控制算法的慢启动门限(ssthresh)值。这种调整算法称为自适应阈值决策ASD算法,其目的是为了减少无线多跳网络中不必要的传输速度降低。
{"title":"Adaptive Transmission Scheme for TCP in Wireless Multi-Hop Network","authors":"J. Lee, Hyunsoon Kim, Woonghee Lee, Hwangnam Kim","doi":"10.1109/LCN.2016.78","DOIUrl":"https://doi.org/10.1109/LCN.2016.78","url":null,"abstract":"Wireless multi-hop networks are scalable in that devices can easily connect to the network. Such scalability is also required in IoT. However, wireless multi-hop network mostly suffers from high probability of transmission failure due to interference, and nodes connected to the network often experience connection loss and subsequent segment loss which node mobility and routing update incur. Due to the fact that the congestion is not a sole reason for segment loss in wireless multi-hop network, the congestion control of TCP should consider momentary link instability, which unnecessarily reduces transmission speed. For this reason, this paper suggests adjustment of slow-start threshold (ssthresh) value which is used for congestion control algorithm. The adjustment algorithm is called adaptive ssthresh decision ASD algorithm that is to reduce unnecessary decrease of transmission speed in wireless multi-hop network.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"45 1","pages":"503-506"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73478832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Achieving Stable iBGP with Only One Add-Path 实现只有一个Add-Path的稳定iBGP
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.119
Xiaomei Sun, Qi Li, Mingwei Xu, Yuan Yang
Border Gateway Protocol (BGP) has been and will still be the de-facto standard for inter-domain routing in the Internet. However, the problem of routing oscillations in BGP has not been well addressed, which can introduce lots of unnecessary routing updates and severely degrade network performance. In particular, existing studies need a great effort to be deployed or introduce a large overhead. In this paper, we propose to first detect a routing oscillation quickly after the oscillation happened, and then, we eliminate the routing oscillation by disseminating only one additional path (Add-path). Based on analysis of BGP updates in the routers where oscillations have already happened, we present a general method to detect a routing oscillation within a couple of routing replacements. Then, we show that one more Add-path is enough to stop the oscillation. We propose the Minimal Add-paths BGP (MA-BGP) approach, develop algorithms, and prove that MA-BGP can guarantee stable iBGP by a classical model that captures the underlying semantics of any path vector protocol including BGP. The simulation results show the effectiveness and efficiency of our approach.
边界网关协议(BGP)已经并将继续是因特网域间路由的事实上的标准。然而,BGP路由振荡问题一直没有得到很好的解决,它会带来大量不必要的路由更新,严重降低网络性能。特别是,现有的研究需要付出很大的努力来部署或引入很大的开销。在本文中,我们提出首先在振荡发生后快速检测路由振荡,然后通过仅传播一条附加路径(Add-path)来消除路由振荡。基于对已经发生振荡的路由器的BGP更新的分析,我们提出了一种在几个路由替换中检测路由振荡的通用方法。然后,我们证明了多一个加径足以阻止振荡。我们提出了最小路径添加BGP (MA-BGP)方法,开发了算法,并证明了MA-BGP可以通过一个经典模型来保证稳定的iBGP,该模型可以捕获包括BGP在内的任何路径向量协议的底层语义。仿真结果表明了该方法的有效性和高效性。
{"title":"Achieving Stable iBGP with Only One Add-Path","authors":"Xiaomei Sun, Qi Li, Mingwei Xu, Yuan Yang","doi":"10.1109/LCN.2016.119","DOIUrl":"https://doi.org/10.1109/LCN.2016.119","url":null,"abstract":"Border Gateway Protocol (BGP) has been and will still be the de-facto standard for inter-domain routing in the Internet. However, the problem of routing oscillations in BGP has not been well addressed, which can introduce lots of unnecessary routing updates and severely degrade network performance. In particular, existing studies need a great effort to be deployed or introduce a large overhead. In this paper, we propose to first detect a routing oscillation quickly after the oscillation happened, and then, we eliminate the routing oscillation by disseminating only one additional path (Add-path). Based on analysis of BGP updates in the routers where oscillations have already happened, we present a general method to detect a routing oscillation within a couple of routing replacements. Then, we show that one more Add-path is enough to stop the oscillation. We propose the Minimal Add-paths BGP (MA-BGP) approach, develop algorithms, and prove that MA-BGP can guarantee stable iBGP by a classical model that captures the underlying semantics of any path vector protocol including BGP. The simulation results show the effectiveness and efficiency of our approach.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"1216 7 1","pages":"688-696"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75843182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mitigating Crossfire Attacks Using SDN-Based Moving Target Defense 利用基于sdn的移动目标防御减少交叉火力攻击
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.108
Abdullah Aydeger, Nico Saputro, K. Akkaya, Mohammed Rahman
Recent research demonstrated that software defined networking (SDN) can be leveraged to enable moving target defense (MTD) to mitigate distributed denial of service (DDoS) attacks. The network states are continuously changed in MTD by effectively collecting information from the network and enforcing certain security measures on the fly in order to deceive the attackers. Being motivated from the success of SDN-based maneuvering, this work targets an emerging type of DDoS attacks, called Crossfire, and proposes an SDN-based MTD mechanism to defend against such attacks. We analyze Crossfire attack planning and utilize the analyzed results to develop the defense mechanism which in turn reorganize the routes in such a way that the congested links are avoided during packet forwarding. The detection and mitigation techniques are implemented using Mininet emulator and Floodlight SDN controller. The evaluation results show that the route mutation can effectively reduce the congestion in the targeted links without making any major disruption on network services.
最近的研究表明,可以利用软件定义网络(SDN)来实现移动目标防御(MTD),以减轻分布式拒绝服务(DDoS)攻击。在MTD中,通过有效地从网络中收集信息并动态地实施某些安全措施来欺骗攻击者,从而不断地改变网络状态。受到基于sdn的机动成功的激励,这项工作针对一种新兴的DDoS攻击类型,称为Crossfire,并提出了一种基于sdn的MTD机制来防御此类攻击。我们分析了Crossfire攻击计划,并利用分析结果建立了防御机制,从而重新组织路由,使数据包转发过程中避免拥塞链路。利用Mininet仿真器和Floodlight SDN控制器实现了检测和缓解技术。评估结果表明,路由突变可以有效地减少目标链路上的拥塞,而不会对网络业务造成重大影响。
{"title":"Mitigating Crossfire Attacks Using SDN-Based Moving Target Defense","authors":"Abdullah Aydeger, Nico Saputro, K. Akkaya, Mohammed Rahman","doi":"10.1109/LCN.2016.108","DOIUrl":"https://doi.org/10.1109/LCN.2016.108","url":null,"abstract":"Recent research demonstrated that software defined networking (SDN) can be leveraged to enable moving target defense (MTD) to mitigate distributed denial of service (DDoS) attacks. The network states are continuously changed in MTD by effectively collecting information from the network and enforcing certain security measures on the fly in order to deceive the attackers. Being motivated from the success of SDN-based maneuvering, this work targets an emerging type of DDoS attacks, called Crossfire, and proposes an SDN-based MTD mechanism to defend against such attacks. We analyze Crossfire attack planning and utilize the analyzed results to develop the defense mechanism which in turn reorganize the routes in such a way that the congested links are avoided during packet forwarding. The detection and mitigation techniques are implemented using Mininet emulator and Floodlight SDN controller. The evaluation results show that the route mutation can effectively reduce the congestion in the targeted links without making any major disruption on network services.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"627-630"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81347013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
An Approach to Improve the Cooperation between Heterogeneous SDN Overlays 一种改进异构SDN覆盖间协作的方法
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.51
Ziteng Cui, J. Liao, Jingyu Wang, Q. Qi, Jing Wang
The overlay network has been widely developed in recent years. There may be various overlays that co-exist with each other upon the same underlying network. These overlays have heterogeneous performance goals, and they will compete for the physical resources, so that a sub-optimal performance of the overlays may be achieved. Moreover, the heterogeneity of the overlays makes them difficult to coordinate with each other to improve their performance. We introduce the concept of SDN to the deployment of overlay network and propose an approach to make the overlays cooperate with each other. A cooperative solution is proposed for co-existing overlays to improve their performance while leveraging their heterogeneous performance goals. Simulations are performed to evaluate the cooperative solution.
覆盖网络近年来得到了广泛的发展。在同一个底层网络上可能有各种各样的重叠,它们彼此共存。这些覆盖层具有异构的性能目标,并且它们将竞争物理资源,因此可能会实现覆盖层的次优性能。此外,覆盖层的非均匀性使它们难以相互协调以提高其性能。将SDN的概念引入到覆盖网络的部署中,提出了一种实现覆盖网络相互协作的方法。提出了一种协作解决方案,用于共存覆盖,以在利用其异构性能目标的同时提高其性能。通过仿真来评估协同解决方案。
{"title":"An Approach to Improve the Cooperation between Heterogeneous SDN Overlays","authors":"Ziteng Cui, J. Liao, Jingyu Wang, Q. Qi, Jing Wang","doi":"10.1109/LCN.2016.51","DOIUrl":"https://doi.org/10.1109/LCN.2016.51","url":null,"abstract":"The overlay network has been widely developed in recent years. There may be various overlays that co-exist with each other upon the same underlying network. These overlays have heterogeneous performance goals, and they will compete for the physical resources, so that a sub-optimal performance of the overlays may be achieved. Moreover, the heterogeneity of the overlays makes them difficult to coordinate with each other to improve their performance. We introduce the concept of SDN to the deployment of overlay network and propose an approach to make the overlays cooperate with each other. A cooperative solution is proposed for co-existing overlays to improve their performance while leveraging their heterogeneous performance goals. Simulations are performed to evaluate the cooperative solution.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"103 1","pages":"236-239"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85617919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Joint Resource Reservation and Flow Scheduling for Ultra-Low-Latency Transmission 超低延迟传输的联合资源预留与流调度
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.44
Guolin Sun, Dawit Kefyalew, Guisong Liu
In recent times, there has been an increase in the number of mobile devices to access a variety of services on radio access network, and the trend is expected to continue. In addition, ultra-low latency services require much bandwidth and often characterized by having extremely short delay constraints. Hence, satisfying required strong QoS requirement becomes challenging task. Existing scheduling methods to solve this problem exhibit very poor performance in terms of transmission latency. In this paper, a scheduling-based resource reservation mechanism is proposed for cloud UE. Unlike other methods, the proposed algorithm in this paper considers various traffic parameters to calculate the effective bandwidth of the flow and always gives priority to delay sensitive flows under a software defined network framework. Simulation results show that the proposed scheduling algorithm improves the average throughput of ultra-low latency flows.
近年来,在无线接入网上访问各种服务的移动设备数量有所增加,预计这一趋势将继续下去。此外,超低延迟服务需要大量带宽,并且通常具有极短的延迟约束。因此,满足所要求的强QoS要求成为一项具有挑战性的任务。解决此问题的现有调度方法在传输延迟方面表现出非常差的性能。本文提出了一种基于调度的云终端资源预留机制。与其他方法不同,本文提出的算法在软件定义的网络框架下,考虑各种流量参数来计算流的有效带宽,并始终优先考虑延迟敏感的流。仿真结果表明,该调度算法提高了超低延迟流的平均吞吐量。
{"title":"Joint Resource Reservation and Flow Scheduling for Ultra-Low-Latency Transmission","authors":"Guolin Sun, Dawit Kefyalew, Guisong Liu","doi":"10.1109/LCN.2016.44","DOIUrl":"https://doi.org/10.1109/LCN.2016.44","url":null,"abstract":"In recent times, there has been an increase in the number of mobile devices to access a variety of services on radio access network, and the trend is expected to continue. In addition, ultra-low latency services require much bandwidth and often characterized by having extremely short delay constraints. Hence, satisfying required strong QoS requirement becomes challenging task. Existing scheduling methods to solve this problem exhibit very poor performance in terms of transmission latency. In this paper, a scheduling-based resource reservation mechanism is proposed for cloud UE. Unlike other methods, the proposed algorithm in this paper considers various traffic parameters to calculate the effective bandwidth of the flow and always gives priority to delay sensitive flows under a software defined network framework. Simulation results show that the proposed scheduling algorithm improves the average throughput of ultra-low latency flows.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"180 1","pages":"208-211"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80144131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Small, the Fast, and the Lazy (SFL): A General Approach for Fast and Flexible Packet Classification 小、快、懒(SFL):一种快速、灵活的分组分类方法
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.125
Sven Hager, Samuel Brack, B. Scheuermann
Packet classification-the matching of packet headers against a predefined rule set-is a crucial functionality of firewalls, intrusion detection systems, and SDN switches. Most existing classification algorithms trade setup time for classification speed-that is, the packet classification is fast, but the transformation of rules set into the corresponding search data structure takes a considerable amount of time. This preprocessing time, however, poses a significant challenge for systems where rule sets can often change. Hence, these systems often use slow classification algorithms that support frequent rule set updates, which drastically limits their achievable throughput. In this work, we present a novel algorithmic technique which is able to "upgrade" an arbitrary existing classification algorithm to support fast updates, while still providing high lookup performance. Our evaluation demonstrates that our proposed technique exceeds the matching performance of existing dynamically updatable algorithms by an order of magnitude while providing the same level of update responsiveness.
包分类——将包头与预定义的规则集进行匹配——是防火墙、入侵检测系统和SDN交换机的一项关键功能。大多数现有的分类算法以设置时间换取分类速度,即分组分类速度快,但将规则集转换为相应的搜索数据结构需要相当多的时间。然而,这种预处理时间对规则集经常变化的系统构成了重大挑战。因此,这些系统通常使用支持频繁规则集更新的缓慢分类算法,这极大地限制了它们可实现的吞吐量。在这项工作中,我们提出了一种新的算法技术,它能够“升级”任意现有的分类算法以支持快速更新,同时仍然提供高查找性能。我们的评估表明,我们提出的技术在提供相同级别的更新响应性的同时,将现有动态可更新算法的匹配性能提高了一个数量级。
{"title":"The Small, the Fast, and the Lazy (SFL): A General Approach for Fast and Flexible Packet Classification","authors":"Sven Hager, Samuel Brack, B. Scheuermann","doi":"10.1109/LCN.2016.125","DOIUrl":"https://doi.org/10.1109/LCN.2016.125","url":null,"abstract":"Packet classification-the matching of packet headers against a predefined rule set-is a crucial functionality of firewalls, intrusion detection systems, and SDN switches. Most existing classification algorithms trade setup time for classification speed-that is, the packet classification is fast, but the transformation of rules set into the corresponding search data structure takes a considerable amount of time. This preprocessing time, however, poses a significant challenge for systems where rule sets can often change. Hence, these systems often use slow classification algorithms that support frequent rule set updates, which drastically limits their achievable throughput. In this work, we present a novel algorithmic technique which is able to \"upgrade\" an arbitrary existing classification algorithm to support fast updates, while still providing high lookup performance. Our evaluation demonstrates that our proposed technique exceeds the matching performance of existing dynamically updatable algorithms by an order of magnitude while providing the same level of update responsiveness.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"43-51"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88567190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2016 IEEE 41st Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1