Jyotirmoy Banik, M. Tacca, A. Fumagalli, B. Sarikaya, Li Xue
{"title":"Enabling Distributed Mobility Management: A Unified Wireless Network Architecture Based on Virtualized Core Network","authors":"Jyotirmoy Banik, M. Tacca, A. Fumagalli, B. Sarikaya, Li Xue","doi":"10.1109/ICCCN.2015.7288404","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288404","url":null,"abstract":"In this paper, a Software Defined Networking (SDN) based unified wireless network architecture is proposed to enable distributed mobility management. The proposed approach envisions a virtualized control plane, placed in the Cloud. The user plane is free of typical tunnelling mechanisms and utilizes layer 2 and layer 3 traffic forwarding. The network architecture for cellular users is described first. Then, traffic flow in both upstream and downstream directions, different mobility scenarios, and an efficient address assignment scheme are discussed. An analytical model to estimate the signaling overhead in the Evolved Packet Core (EPC) is presented. The architecture is further extended to support WLAN users in fixed networks, with a description of the signaling schemes required in a number of mobility events.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"358 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115879344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jun Huang, Yi Sun, Fang Fang, Cong-Cong Xing, Yanxiao Zhao, Kun Hua
{"title":"Multiple Service Providers with IP Flow Mobility: From an Economic Perspective","authors":"Jun Huang, Yi Sun, Fang Fang, Cong-Cong Xing, Yanxiao Zhao, Kun Hua","doi":"10.1109/ICCCN.2015.7288432","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288432","url":null,"abstract":"The proliferation of the mobile Internet and social networks reshapes the proportion of uploaded data in the entire Internet traffic. IFOM (IP Flow Mobility) technology, which offloads the cellular data to the WiFi or Femtocells or other complementary networks, plays a crucial role in improving the throughput of cellular systems. Although there have been many studies on the IFOM technology, most of them are done from a technical perspective, and the issues related the dissemination and utilization of the IFOM technology are largely overlooked. Unlike prior research works, this paper addresses issues involved with the IFOM technology from an economic perspective. Specifically, we model the competitions among multiple service providers supporting or not supporting the IFOM technology by leveraging the Game Theory, and then analyze the Nash Equilibrium for the ensuing game model. We also conduct extensive simulations to determine the factors that affect the market share and profit of the service providers. We believe that this research work will provide valuable guidance to service providers for the promotion and utilization of the IFOM technology.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128484405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Sensitive Resource Access Monitoring for Android Systems","authors":"Lea Zhao, N. Chan, S. Yang, R. Melton","doi":"10.1109/ICCCN.2015.7288451","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288451","url":null,"abstract":"Existing works have studied how to collect and analyze human usage of mobile devices, to aid in further understanding of human behavior. Typical data collection utilizes applications or background services installed on the mobile device with user permission to collect user usage data via accelerometer, call logs, location, Wi-Fi transmission, etc. through a data tainting process. Built on the existing work, this research developed a system called Panorama (Privacy-sensitive Resource Access Monitoring for Android Systems) to collect application behavior instead of user behavior. The goal is to provide the means to analyze how background services access mobile resources, and potentially to identify suspicious applications that access sensitive user information. Panorama tracks the access of mobile resources in real time and enhances the concept of taint tracking. Each identified user privacy-sensitive resource is tagged and marked for tracking. The result is a dynamic, real-time tool that monitors the process flow of applications. This paper presents the development of Panorama and a set of analysis with respect to a variety of legitimate application behaviors.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121836740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Bahnasy, André Béliveau, B. Alleyne, Bochra Boughzala, C. Padala, Karim Idoudi, H. Elbiaze
{"title":"Using Ethernet Commodity Switches to Build a Switch Fabric in Routers","authors":"M. Bahnasy, André Béliveau, B. Alleyne, Bochra Boughzala, C. Padala, Karim Idoudi, H. Elbiaze","doi":"10.1109/ICCCN.2015.7288483","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288483","url":null,"abstract":"Switch fabric in routers requires very tight characteristics in term of packet loss, fairness in bandwidth allocation, no head-of-line blocking and low latency. Such attributes are traditionally resolved using specialized and expensive switch devices. Motivated by the emergence of IEEE Data Center Bridging, we explore the possibility of using commodity Ethernet switches to achieve scalable, flexible, and more cost efficient solutions, while still guaranteeing the switch characteristics. In this context, we propose Ethernet Congestion Control & Prevention (ECCP), a novel concept to control and prevent congestion in switch fabrics. ECCP consists of (1) a method to estimate the available bandwidth along a given network path using a train of probes and (2) a rate control algorithm to adjust the sending rate of traffic along this path based on the estimated bandwidth. To prove ECCP and evaluate its characteristics, we present a first prototype based on the OMNEST simulator and conduct extensive experiments. Our analysis confirms that ECCP is a viable solution to (1) avoid congestion within the fabric, thus minimizing path latency and avoiding packet loss, (2) guarantee fair share of the link capacity between flows, and (3) avoid head of line blocking.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126062076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Silvestri, B. Holbert, P. Novotný, T. L. Porta, A. Wolf, A. Swami
{"title":"Inferring Network Topologies in MANETs Applied to Service Redeployment","authors":"S. Silvestri, B. Holbert, P. Novotný, T. L. Porta, A. Wolf, A. Swami","doi":"10.1109/ICCCN.2015.7288419","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288419","url":null,"abstract":"The heterogeneous and dynamic nature of tactical coalition networks poses several challenges to common network management tasks, due to the lack of complete and accurate network information. In this paper, we consider the problem of redeploying services in mobile tactical networks. We propose M-iTop, an algorithm for inferring the network topology when only partial information is available. M-iTop initially constructs a virtual topology that overestimates the number of network components, and then repeatedly merges links in this topology to resolve it towards the structure of the true network. We perform extensive simulations and show that M-iTop enables an efficient redeployment of services over the network despite the limitation of partial information.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122374043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of OXC Node Architectures for WDM and Flex-Grid Optical Networks","authors":"Jingxin Wu, S. Subramaniam, H. Hasegawa","doi":"10.1109/ICCCN.2015.7288388","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288388","url":null,"abstract":"Large scale optical cross-connects (OXCs) are required due to the increasing traffic demands. Currently, wavelength-selective switches (WSS) are utilized to create the OXCs. However, the port count of commercially available WSSs is limited. To achieve high port counts in OXCs, the existing WSS-based approach is to cascade WSSs, which results in a square order increment in the number of required WSSs. To save the hardware costs in terms of number of WSSs, two novel OXC architectures utilizing the waveband switching technique have been proposed. In this paper, we conduct a detailed comparison among the conventional cascading architecture and the two new architectures. We propose algorithms to accommodate dynamic traffic demands for all architectures and compare the blocking rates. The results show that the blocking rates of the novel architectures are very small and close to that of the cascading architecture, while the novel architectures have much less node complexity in terms of hardware requirement.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127201487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Estefanía Coronado, Jose Miguel Villalón Millán, L. D. L. Ossa, A. Garrido
{"title":"An AIFSN Prediction Scheme for Multimedia Wireless Communications","authors":"Estefanía Coronado, Jose Miguel Villalón Millán, L. D. L. Ossa, A. Garrido","doi":"10.1109/ICCCN.2015.7288375","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288375","url":null,"abstract":"The incessant development of High Quality (HQ) multimedia contents and the trend towards the use of wireless technologies have as a consequence the need for providing the users with an adequate level of Quality of Service (QoS) in IEEE 802.11 networks. The IEEE 802.11e amendment aims to overcome this situation by introducing the Enhanced Distributed Channel Access (EDCA) access method. This new method is characterised through a group of Medium Access Control (MAC) parameters, which are able to classify and prioritize the different types of traffic. In this regard, the most determining parameter is the Arbitration Inter-Frame Space Number (AIFSN). On this basis, we propose a new adaptation scheme that makes use of a M5 regression model with the aim of improving the voice and video performance offered by EDCA. Our proposal is able to determine dynamically the optimum AIFSN values with regard to the network conditions, maintaining the backward compatibility with the stations that use the original IEEE 802.11 standard. The prediction algorithm is only queried by the Access Point (AP), without introducing additional control traffic into the network, making it possible to use it in real-time. With respect to the standard EDCA values, the results show an enhancement in the voice+video normalized throughput and a significant reduction in the number of the retransmission attempts.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"20 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114092877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OpenRouteFlow: Enable Legacy Router as a Software-Defined Routing Service for Hybrid SDN","authors":"Tao Feng, J. Bi","doi":"10.1109/ICCCN.2015.7288441","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288441","url":null,"abstract":"Hybrid SDN is an important direction for the evolution of SDN. It is one of the challenges to be addressed for hybrid SDN to open the legacy router and enable the routing view as a software defined routing service. In this paper, OpenRouteFlow is presented, which opens legacy routing protocols and flow sampling information as a routing view service for network applications by software update. OpenRouteFlow tries to realize the decoupling of network visualization and network control. It provides path-oriented and traffic-oriented subscription and publication services for different scenarios of network control. In a hybrid network consisted of OpenFlow switches and legacy routers, OpenRouteFlow is able to map OpenFlow control rules into ACL or RIB in order to support flexible software defined capacities in legacy routers.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124320322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synchronized Multi-Hop Scheduling for Real-Time Traffic on SDNs","authors":"Xiang Cao, Yingfei Dong, D. Du","doi":"10.1109/ICCCN.2015.7288472","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288472","url":null,"abstract":"Although supporting Quality of Service (QoS) on the traditional Internet has been extremely challenging, QoS supports are still highly desirable for many real-time applications. While existing QoS schemes often show poor scalability, low efficiency, and limited QoS supports, the fast development of Software Define Networks (SDNs) provides new opportunities to address QoS support with its centralized network control. In this paper, we propose a synchronized architecture to exploit the unique features of SDNs without conducting static reservations. Assume all routers are synchronized in time, we can precisely determine the upstream delay of a packet at a router. Meanwhile, because we also know the fairly accurate resource availability on its downstream routers (from the SDN controller), we can determine the packet's service priority on its current router based on its end-to-end (e2e) delay requirement and the expected delay that the packet may experience in its downstream. In particular, we propose a synchronized multi-hop scheduling (SMS) scheme to exploit both upstream information and downstream resource availability to speed up or slow down a packet. This is completely different from all existing per-hop or multi-hop schemes that mostly utilize upstream information. Furthermore, we propose to selectively drop a packet that is unlikely to meet its deadline. Our simulation results show that the proposed scheme outperforms existing schemes in packet missing rates.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122433721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Malboubi, Yanlei Gong, Xiong Wang, C. Chuah, P. Sharma
{"title":"Software Defined Network Inference with Passive/Active Evolutionary-Optimal pRobing (SNIPER)","authors":"M. Malboubi, Yanlei Gong, Xiong Wang, C. Chuah, P. Sharma","doi":"10.1109/ICCCN.2015.7288469","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288469","url":null,"abstract":"A key requirement for network management is the accurate and reliable monitoring of relevant network characteristics. In today's large-scale networks, this is a challenging task due to the hard constraints of network measurement resources. This paper proposes a new framework, SNIPER, which leverages the flexibility provided by Software-Defined Networking (SDN) to design the optimal observation or measurement matrix that can leads to the best achievable estimation accuracy using Matrix Completion (MC) techniques. To cope with the complexity of designing large-scale optimal observation matrices, we use the Evolutionary Optimization Algorithms (EOA) which directly target the ultimate estimation accuracy as the optimization objective function. We evaluate the performance of SNIPER using both synthetic and real network measurement traces from different network topologies and by considering two main applications including per-flow size and delay estimations. Our results show that SNIPER can be applied to a variety of network performance measurements under hard resource constraints. For example, by measuring 8.8% of per-flow path delays in Harvard network, congested paths can be detected with probability 0.94. To demonstrate the feasibility of our framework, we also have implemented a prototype of SNIPER in Mininet.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114212653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}