2015 24th International Conference on Computer Communication and Networks (ICCCN)最新文献

筛选
英文 中文
Enabling Distributed Mobility Management: A Unified Wireless Network Architecture Based on Virtualized Core Network 实现分布式移动管理:基于虚拟化核心网的统一无线网络架构
2015 24th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2015-10-05 DOI: 10.1109/ICCCN.2015.7288404
Jyotirmoy Banik, M. Tacca, A. Fumagalli, B. Sarikaya, Li Xue
{"title":"Enabling Distributed Mobility Management: A Unified Wireless Network Architecture Based on Virtualized Core Network","authors":"Jyotirmoy Banik, M. Tacca, A. Fumagalli, B. Sarikaya, Li Xue","doi":"10.1109/ICCCN.2015.7288404","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288404","url":null,"abstract":"In this paper, a Software Defined Networking (SDN) based unified wireless network architecture is proposed to enable distributed mobility management. The proposed approach envisions a virtualized control plane, placed in the Cloud. The user plane is free of typical tunnelling mechanisms and utilizes layer 2 and layer 3 traffic forwarding. The network architecture for cellular users is described first. Then, traffic flow in both upstream and downstream directions, different mobility scenarios, and an efficient address assignment scheme are discussed. An analytical model to estimate the signaling overhead in the Evolved Packet Core (EPC) is presented. The architecture is further extended to support WLAN users in fixed networks, with a description of the signaling schemes required in a number of mobility events.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"358 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115879344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multiple Service Providers with IP Flow Mobility: From an Economic Perspective 多服务提供商与IP流动流动性:从经济角度
2015 24th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2015-10-05 DOI: 10.1109/ICCCN.2015.7288432
Jun Huang, Yi Sun, Fang Fang, Cong-Cong Xing, Yanxiao Zhao, Kun Hua
{"title":"Multiple Service Providers with IP Flow Mobility: From an Economic Perspective","authors":"Jun Huang, Yi Sun, Fang Fang, Cong-Cong Xing, Yanxiao Zhao, Kun Hua","doi":"10.1109/ICCCN.2015.7288432","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288432","url":null,"abstract":"The proliferation of the mobile Internet and social networks reshapes the proportion of uploaded data in the entire Internet traffic. IFOM (IP Flow Mobility) technology, which offloads the cellular data to the WiFi or Femtocells or other complementary networks, plays a crucial role in improving the throughput of cellular systems. Although there have been many studies on the IFOM technology, most of them are done from a technical perspective, and the issues related the dissemination and utilization of the IFOM technology are largely overlooked. Unlike prior research works, this paper addresses issues involved with the IFOM technology from an economic perspective. Specifically, we model the competitions among multiple service providers supporting or not supporting the IFOM technology by leveraging the Game Theory, and then analyze the Nash Equilibrium for the ensuing game model. We also conduct extensive simulations to determine the factors that affect the market share and profit of the service providers. We believe that this research work will provide valuable guidance to service providers for the promotion and utilization of the IFOM technology.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128484405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy Sensitive Resource Access Monitoring for Android Systems Android系统的隐私敏感资源访问监控
2015 24th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2015-10-05 DOI: 10.1109/ICCCN.2015.7288451
Lea Zhao, N. Chan, S. Yang, R. Melton
{"title":"Privacy Sensitive Resource Access Monitoring for Android Systems","authors":"Lea Zhao, N. Chan, S. Yang, R. Melton","doi":"10.1109/ICCCN.2015.7288451","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288451","url":null,"abstract":"Existing works have studied how to collect and analyze human usage of mobile devices, to aid in further understanding of human behavior. Typical data collection utilizes applications or background services installed on the mobile device with user permission to collect user usage data via accelerometer, call logs, location, Wi-Fi transmission, etc. through a data tainting process. Built on the existing work, this research developed a system called Panorama (Privacy-sensitive Resource Access Monitoring for Android Systems) to collect application behavior instead of user behavior. The goal is to provide the means to analyze how background services access mobile resources, and potentially to identify suspicious applications that access sensitive user information. Panorama tracks the access of mobile resources in real time and enhances the concept of taint tracking. Each identified user privacy-sensitive resource is tagged and marked for tracking. The result is a dynamic, real-time tool that monitors the process flow of applications. This paper presents the development of Panorama and a set of analysis with respect to a variety of legitimate application behaviors.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121836740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Using Ethernet Commodity Switches to Build a Switch Fabric in Routers 在路由器中使用以太网商品交换机构建交换结构
2015 24th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2015-10-05 DOI: 10.1109/ICCCN.2015.7288483
M. Bahnasy, André Béliveau, B. Alleyne, Bochra Boughzala, C. Padala, Karim Idoudi, H. Elbiaze
{"title":"Using Ethernet Commodity Switches to Build a Switch Fabric in Routers","authors":"M. Bahnasy, André Béliveau, B. Alleyne, Bochra Boughzala, C. Padala, Karim Idoudi, H. Elbiaze","doi":"10.1109/ICCCN.2015.7288483","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288483","url":null,"abstract":"Switch fabric in routers requires very tight characteristics in term of packet loss, fairness in bandwidth allocation, no head-of-line blocking and low latency. Such attributes are traditionally resolved using specialized and expensive switch devices. Motivated by the emergence of IEEE Data Center Bridging, we explore the possibility of using commodity Ethernet switches to achieve scalable, flexible, and more cost efficient solutions, while still guaranteeing the switch characteristics. In this context, we propose Ethernet Congestion Control & Prevention (ECCP), a novel concept to control and prevent congestion in switch fabrics. ECCP consists of (1) a method to estimate the available bandwidth along a given network path using a train of probes and (2) a rate control algorithm to adjust the sending rate of traffic along this path based on the estimated bandwidth. To prove ECCP and evaluate its characteristics, we present a first prototype based on the OMNEST simulator and conduct extensive experiments. Our analysis confirms that ECCP is a viable solution to (1) avoid congestion within the fabric, thus minimizing path latency and avoiding packet loss, (2) guarantee fair share of the link capacity between flows, and (3) avoid head of line blocking.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126062076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Inferring Network Topologies in MANETs Applied to Service Redeployment 应用于业务重新部署的manet网络拓扑推断
2015 24th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2015-10-05 DOI: 10.1109/ICCCN.2015.7288419
S. Silvestri, B. Holbert, P. Novotný, T. L. Porta, A. Wolf, A. Swami
{"title":"Inferring Network Topologies in MANETs Applied to Service Redeployment","authors":"S. Silvestri, B. Holbert, P. Novotný, T. L. Porta, A. Wolf, A. Swami","doi":"10.1109/ICCCN.2015.7288419","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288419","url":null,"abstract":"The heterogeneous and dynamic nature of tactical coalition networks poses several challenges to common network management tasks, due to the lack of complete and accurate network information. In this paper, we consider the problem of redeploying services in mobile tactical networks. We propose M-iTop, an algorithm for inferring the network topology when only partial information is available. M-iTop initially constructs a virtual topology that overestimates the number of network components, and then repeatedly merges links in this topology to resolve it towards the structure of the true network. We perform extensive simulations and show that M-iTop enables an efficient redeployment of services over the network despite the limitation of partial information.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122374043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparison of OXC Node Architectures for WDM and Flex-Grid Optical Networks WDM光网络与柔性网格光网络的OXC节点结构比较
2015 24th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2015-10-05 DOI: 10.1109/ICCCN.2015.7288388
Jingxin Wu, S. Subramaniam, H. Hasegawa
{"title":"Comparison of OXC Node Architectures for WDM and Flex-Grid Optical Networks","authors":"Jingxin Wu, S. Subramaniam, H. Hasegawa","doi":"10.1109/ICCCN.2015.7288388","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288388","url":null,"abstract":"Large scale optical cross-connects (OXCs) are required due to the increasing traffic demands. Currently, wavelength-selective switches (WSS) are utilized to create the OXCs. However, the port count of commercially available WSSs is limited. To achieve high port counts in OXCs, the existing WSS-based approach is to cascade WSSs, which results in a square order increment in the number of required WSSs. To save the hardware costs in terms of number of WSSs, two novel OXC architectures utilizing the waveband switching technique have been proposed. In this paper, we conduct a detailed comparison among the conventional cascading architecture and the two new architectures. We propose algorithms to accommodate dynamic traffic demands for all architectures and compare the blocking rates. The results show that the blocking rates of the novel architectures are very small and close to that of the cascading architecture, while the novel architectures have much less node complexity in terms of hardware requirement.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127201487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An AIFSN Prediction Scheme for Multimedia Wireless Communications 多媒体无线通信的AIFSN预测方案
2015 24th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2015-10-05 DOI: 10.1109/ICCCN.2015.7288375
Estefanía Coronado, Jose Miguel Villalón Millán, L. D. L. Ossa, A. Garrido
{"title":"An AIFSN Prediction Scheme for Multimedia Wireless Communications","authors":"Estefanía Coronado, Jose Miguel Villalón Millán, L. D. L. Ossa, A. Garrido","doi":"10.1109/ICCCN.2015.7288375","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288375","url":null,"abstract":"The incessant development of High Quality (HQ) multimedia contents and the trend towards the use of wireless technologies have as a consequence the need for providing the users with an adequate level of Quality of Service (QoS) in IEEE 802.11 networks. The IEEE 802.11e amendment aims to overcome this situation by introducing the Enhanced Distributed Channel Access (EDCA) access method. This new method is characterised through a group of Medium Access Control (MAC) parameters, which are able to classify and prioritize the different types of traffic. In this regard, the most determining parameter is the Arbitration Inter-Frame Space Number (AIFSN). On this basis, we propose a new adaptation scheme that makes use of a M5 regression model with the aim of improving the voice and video performance offered by EDCA. Our proposal is able to determine dynamically the optimum AIFSN values with regard to the network conditions, maintaining the backward compatibility with the stations that use the original IEEE 802.11 standard. The prediction algorithm is only queried by the Access Point (AP), without introducing additional control traffic into the network, making it possible to use it in real-time. With respect to the standard EDCA values, the results show an enhancement in the voice+video normalized throughput and a significant reduction in the number of the retransmission attempts.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"20 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114092877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
OpenRouteFlow: Enable Legacy Router as a Software-Defined Routing Service for Hybrid SDN OpenRouteFlow:启用传统路由器作为混合SDN的软件定义路由服务
2015 24th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2015-10-05 DOI: 10.1109/ICCCN.2015.7288441
Tao Feng, J. Bi
{"title":"OpenRouteFlow: Enable Legacy Router as a Software-Defined Routing Service for Hybrid SDN","authors":"Tao Feng, J. Bi","doi":"10.1109/ICCCN.2015.7288441","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288441","url":null,"abstract":"Hybrid SDN is an important direction for the evolution of SDN. It is one of the challenges to be addressed for hybrid SDN to open the legacy router and enable the routing view as a software defined routing service. In this paper, OpenRouteFlow is presented, which opens legacy routing protocols and flow sampling information as a routing view service for network applications by software update. OpenRouteFlow tries to realize the decoupling of network visualization and network control. It provides path-oriented and traffic-oriented subscription and publication services for different scenarios of network control. In a hybrid network consisted of OpenFlow switches and legacy routers, OpenRouteFlow is able to map OpenFlow control rules into ACL or RIB in order to support flexible software defined capacities in legacy routers.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124320322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Synchronized Multi-Hop Scheduling for Real-Time Traffic on SDNs sdn实时流量同步多跳调度
2015 24th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2015-10-05 DOI: 10.1109/ICCCN.2015.7288472
Xiang Cao, Yingfei Dong, D. Du
{"title":"Synchronized Multi-Hop Scheduling for Real-Time Traffic on SDNs","authors":"Xiang Cao, Yingfei Dong, D. Du","doi":"10.1109/ICCCN.2015.7288472","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288472","url":null,"abstract":"Although supporting Quality of Service (QoS) on the traditional Internet has been extremely challenging, QoS supports are still highly desirable for many real-time applications. While existing QoS schemes often show poor scalability, low efficiency, and limited QoS supports, the fast development of Software Define Networks (SDNs) provides new opportunities to address QoS support with its centralized network control. In this paper, we propose a synchronized architecture to exploit the unique features of SDNs without conducting static reservations. Assume all routers are synchronized in time, we can precisely determine the upstream delay of a packet at a router. Meanwhile, because we also know the fairly accurate resource availability on its downstream routers (from the SDN controller), we can determine the packet's service priority on its current router based on its end-to-end (e2e) delay requirement and the expected delay that the packet may experience in its downstream. In particular, we propose a synchronized multi-hop scheduling (SMS) scheme to exploit both upstream information and downstream resource availability to speed up or slow down a packet. This is completely different from all existing per-hop or multi-hop schemes that mostly utilize upstream information. Furthermore, we propose to selectively drop a packet that is unlikely to meet its deadline. Our simulation results show that the proposed scheme outperforms existing schemes in packet missing rates.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122433721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Software Defined Network Inference with Passive/Active Evolutionary-Optimal pRobing (SNIPER) 具有被动/主动进化最优探测(SNIPER)的软件定义网络推理
2015 24th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2015-10-05 DOI: 10.1109/ICCCN.2015.7288469
M. Malboubi, Yanlei Gong, Xiong Wang, C. Chuah, P. Sharma
{"title":"Software Defined Network Inference with Passive/Active Evolutionary-Optimal pRobing (SNIPER)","authors":"M. Malboubi, Yanlei Gong, Xiong Wang, C. Chuah, P. Sharma","doi":"10.1109/ICCCN.2015.7288469","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288469","url":null,"abstract":"A key requirement for network management is the accurate and reliable monitoring of relevant network characteristics. In today's large-scale networks, this is a challenging task due to the hard constraints of network measurement resources. This paper proposes a new framework, SNIPER, which leverages the flexibility provided by Software-Defined Networking (SDN) to design the optimal observation or measurement matrix that can leads to the best achievable estimation accuracy using Matrix Completion (MC) techniques. To cope with the complexity of designing large-scale optimal observation matrices, we use the Evolutionary Optimization Algorithms (EOA) which directly target the ultimate estimation accuracy as the optimization objective function. We evaluate the performance of SNIPER using both synthetic and real network measurement traces from different network topologies and by considering two main applications including per-flow size and delay estimations. Our results show that SNIPER can be applied to a variety of network performance measurements under hard resource constraints. For example, by measuring 8.8% of per-flow path delays in Harvard network, congested paths can be detected with probability 0.94. To demonstrate the feasibility of our framework, we also have implemented a prototype of SNIPER in Mininet.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114212653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信