{"title":"Designing a high availability subnetwork to support availability differentiation","authors":"Abdulaziz S. Alashaikh, D. Tipper, Teresa Gomes","doi":"10.1109/ICIN.2018.8401593","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401593","url":null,"abstract":"In a recent series of papers [1-3] we studied the problem of how to provide both high levels of availability and service differentiation to traffic flows in a cost efficient manner. The basic idea developed was to embed at the physical layer a high availability set of links and nodes (termed the spine) in the network topology to support protection and routing in providing differentiated classes of resilience with varying levels of end-to-end availability. In this paper, we present an optimization model formulation of the spine design problem considering link availability and the cost of upgrading link availability. Numerical results show the advantages of modifying the availability of a subset of the network topology to provide QoR classes.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127500304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sihem Cherrared, Sofiane Imadali, É. Fabre, Gregor Gössler
{"title":"LUMEN: A global fault management framework for network virtualization environments","authors":"Sihem Cherrared, Sofiane Imadali, É. Fabre, Gregor Gössler","doi":"10.1109/ICIN.2018.8401622","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401622","url":null,"abstract":"The advent of 5G and its ever increasing stringent requirements for bandwidth, latency, and quality of service pushes the boundaries of what is feasible with legacy Mobile Network Operators' technologies. Network Function Virtualization (NFV) is one promising attempt at solving some of those challenges that were widely adopted by the industry and the standardization bodies. At its essence, NFV is about running network functions as software workloads on commodity hardware to optimize deployment costs and simplify the life-cycle management of network functions. However, it introduces new fault management challenges including dynamic topology, multi-tenant fault isolation and data consistency and ambiguity; that we propose to define in this paper. To tackle those challenges, we extend the classical fault management process to the virtualized functions by introducing LUMEN: a Global Fault Management Framework. Our approach aims at providing the availability and reliability of the virtualized 5G end-to-end service chain. LUMEN includes the canonical steps of the fault management process and proposes a monitoring solution for all types of Network virtualization Environments. Our framework is based on open source solutions and could easily be integrated with other existing autonomic management models.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133796610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of algorithms for multipath route selection over the Internet","authors":"Fabian Helfert, H. Niedermayer, G. Carle","doi":"10.1109/ICIN.2018.8401640","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401640","url":null,"abstract":"Resilience as well as other objectives like censorship-resistance demand the existence of multiple diverse paths between two hosts on the Internet. On Internet level, this requires the use of an overlay approach. In this paper, we study this problem on the basis of a data set obtained from traces between Internet hosts on PlanetLab. We study a variety of path selection algorithms, including adapted versions of Suurballe's algorithm. We find that these can outperform the single-hop relay approach that is more commonly proposed for Internet multipath. Our analysis framework imports traceroute data and it generates graph representations of the overlay and the underlay. We can reduce the granularity of information that the algorithms can access. Topology-aware algorithms like Suurballe profit from better information. We also support a variety of evaluation metrics.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115120190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A data flow architecture for smart city applications","authors":"Jean-Charles Grégoire","doi":"10.1109/ICIN.2018.8401639","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401639","url":null,"abstract":"The smart city is often presented as the combination of sensor networks (IoT) with big data processing, but this largely ignores the issues of bridging these two universes, as well as the need to integrate other environments, which is typically swept aside as back end concerns. We present in this paper the challenges of integrating networks of sensor and actuator devices into a framework suitable for smart city applications, which includes various forms of efficient sharing and processing of information. We propose architectural elements for distributed implementations of gateways in a data flow architecture. We finally discuss how implementing this framework can benefit from contemporary hybrid networking/computing technology, such as SDN/NFV.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123552075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Shima, Daisuke Miyamoto, Hiroshi Abe, Tomohiro Ishihara, Kazuya Okada, Y. Sekiya, H. Asai, Yusuke Doi
{"title":"Classification of URL bitstreams using bag of bytes","authors":"K. Shima, Daisuke Miyamoto, Hiroshi Abe, Tomohiro Ishihara, Kazuya Okada, Y. Sekiya, H. Asai, Yusuke Doi","doi":"10.1109/ICIN.2018.8401597","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401597","url":null,"abstract":"Protecting users from accessing malicious web sites is one of the important management tasks for network operators. There are many open-source and commercial products to control web sites users can access. The most traditional approach is blacklist-based filtering. This mechanism is simple but not scalable, though there are some enhanced approaches utilizing fuzzy matching technologies. Other approaches try to use machine learning (ML) techniques by extracting features from URL strings. This approach can cover a wider area of Internet web sites, but finding good features requires deep knowledge of trends of web site design. Recently, another approach using deep learning (DL) has appeared. The DL approach will help to extract features automatically by investigating a lot of existing sample data. Using this technique, we can build a flexible filtering decision module by keep teaching the neural network module about recent trends, without any specific expert knowledge of the URL domain. In this paper, we apply a mechanical approach to generate feature vectors from URL strings. We implemented our approach and tested with realistic URL access history data taken from a research organization and data from the famous archive site of phishing site information, PhishTank.com. Our approach achieved 2∼3% better accuracy compared to the existing DL- based approach.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121610830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Brokalakis, N. Tampouratzis, Antonios Nikitakis, I. Papaefstathiou, Stamatis Andrianakis, A. Dollas, Marco Paracchini, Marco Marcon, D. Pau, Emanuele Plebani
{"title":"An open-source extendable, highly-accurate and security aware simulator for cloud applications","authors":"A. Brokalakis, N. Tampouratzis, Antonios Nikitakis, I. Papaefstathiou, Stamatis Andrianakis, A. Dollas, Marco Paracchini, Marco Marcon, D. Pau, Emanuele Plebani","doi":"10.1109/ICIN.2018.8401578","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401578","url":null,"abstract":"In this demo, we present COSSIM, an open-source simulation framework for cloud applications. Our solution models the client and server computing devices as well as the network that comprise the overall system and thus provides cycle accurate results, realistic communications and power/energy consumption estimates based on the actual dynamic usage scenarios. The simulator provides the necessary hooks to security testing software and can be extended through an IEEE standardized interface to include additional tools, such as simulators of physical models. The application that will be used to demonstrate COSSIM is mobile visual search, where mobile nodes capture images, extract their compressed representation and dispatch a query to the cloud. A server compares the received query to a local database and sends back some of the corresponding results.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134365892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OTF: Optical Torus-based fault-tolerant DCN","authors":"Saeedeh Akbari Rokn Abari, S. Koohi","doi":"10.1109/ICIN.2018.8401608","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401608","url":null,"abstract":"Data center performance is a function of three features; bandwidth, latency, and reliability. Increasing bandwidth and reducing power consumption can be accessed through optical technology adopted in recent designs. However, the problem of fault tolerance in optical interconnection networks has been raised less. So, in this paper, we propose a fault-tolerant, scalable, and high-performance optical architecture which takes advantages of novel passive photonic switches and routing strategy in order to provide non-blocking and low-power data communication intra data centers. Due to the passive optical components utilized in the proposed optical Torus, OTF, in comparison to WaveCube with the same topology, it results in less power consumption, transmission latency, and cost. Moreover, the proposed fault-tolerant method, which can be adopted in any arbitrary network, leads to throughput increment 40% more than the WaveCube at the presence of network failure, with the same wiring complexity and less latency and power consumption.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"42 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131746494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet acceleration with LISP traffic engineering and multipath TCP","authors":"Chi-Dung Phung, Matthieu Coudron, Stefano Secci","doi":"10.1109/ICIN.2018.8401586","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401586","url":null,"abstract":"We present different design options to implement Augmented Multipath Transmission Control Protocol (A- MPTCP) communications via a Locator/Identifier Separation Protocol (LISP) Traffic Engineering (TE) overlay network. MPTCP allows a TCP connection using multiple subflows to maximize resource usage. LISP is a routing and addressing architecture that provides new semantics for IP communications, by separating the device identity (endpoint identifier) from its location (routing locator) using two different numbering spaces. Our proposition is to adopt a LISP overlay network with traffic engineering capabilities to steer MPTCP subflows across wide-area Internet networks. The resulting augmentation consists of a subflow forwarding that can reach edge bottleneck capacity and surround inter-domain transit bottlenecks and inefficient paths. It can be particularly useful for cases where, even if endpoints are single-homed, inter-domain path diversity can be grasped by the LISP-TE network overlay. We specify the different modes at which this augmentation can take place, from stateless and light modes with very limited management in the network, to stateful and advanced modes implementable by a network provider desiring a higher control on the network. Based on extensive experimentation on the worldwide LISP testbed, we show that the achievable gains up 25% in throughput, while identifying required further improvements.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124698394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nam H. Do, T. V. Do, Isvan Kispal, Nándor Galambosi, C. Rotter, L. Nemeth
{"title":"Demo of a big switch abstraction for service function chaining","authors":"Nam H. Do, T. V. Do, Isvan Kispal, Nándor Galambosi, C. Rotter, L. Nemeth","doi":"10.1109/ICIN.2018.8401616","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401616","url":null,"abstract":"In this demonstration, we present a prototype of Big Switch Abstraction to support network as service through the realization of Virtual Network Function Forwarding Graphs and Network forwarding paths.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131982457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time performance modeling of link layer protocols for multi-layer protocol aggregation","authors":"P. Kühn","doi":"10.1109/ICIN.2018.8401603","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401603","url":null,"abstract":"A hybrid modeling method for real-time performance evaluation of link layer protocols is presented which makes use of task graph structures, Petri Net synchronization elements, general stochastic arrival/service processes, and channel error characteristics. The resulting models are analyzed exactly by probabilistic task aggregations leading to a separation of the protocol and queuing functions by which the protocol model is stepwise reduced to an aggregated frame transit time representation acting as a virtual service time Tx of a standard queuing model GI/G/n. The methodology is applied to two classical communication protocols: (1) the Stop- and-Wait (SW) Protocol and (2) the Selective-Repeat (SR) Protocol, both with positive Acknowledgements and Timeout Recovery (ACK/TO). The method is applied to the performance analysis of multi-layer architectures to reduce complexity and increase accuracy. The method is demonstrated for Networked Control Systems (NCS) where the link layer delay is embedded within the control loop by an equivalent stochastic phase and where delay threshold percentiles have to be guaranteed. The method is also a key to the performance evaluation of multi-layer protocol architectures where a lower layer subsystem is aggregated into a stochastic phase which can be inserted in the next higher protocol layer, applied layer by layer repeatedly.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130280716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}