2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)最新文献

筛选
英文 中文
Double-Lead Content Search Scheme for Producer Mobility in Named Data Networking 命名数据网络中生产者移动的双导内容搜索方案
2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2020-09-01 DOI: 10.23919/APNOMS50412.2020.9236982
Huilin Liu, Xushan Chen, Guoxin Xia, Hui Guo
{"title":"Double-Lead Content Search Scheme for Producer Mobility in Named Data Networking","authors":"Huilin Liu, Xushan Chen, Guoxin Xia, Hui Guo","doi":"10.23919/APNOMS50412.2020.9236982","DOIUrl":"https://doi.org/10.23919/APNOMS50412.2020.9236982","url":null,"abstract":"In Named Data Networking (NDN), the processing of the packet is based on the data rather than the communication endpoint. It's very suitable for the core demand of content sharing on the internet today. However, there are still some problems to be dealt with, including mobility support of the producer. By analyzing existing solutions, we put forward a solution finding MCS (Mobile Content Source) passively by HR(Home Repository) and leading interest packets to find MCS actively in the local scope at the same time to speed up to search MCS and to support NDN producer mobility. Triangle routing problem in single HR and low efficiency problem can be based on this solution. Experimental results show that our scheme does better in reducing delay with low handoff cost than other typical solutions.","PeriodicalId":122940,"journal":{"name":"2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126781959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
End-to-end Service Assurance in 5G Crosshaul Networks 5G交叉网络的端到端业务保障
2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2020-09-01 DOI: 10.23919/APNOMS50412.2020.9236977
Che-Chun Teng, Mei-Chun Chen, Min-Han Hung, Hong-Jie Chen
{"title":"End-to-end Service Assurance in 5G Crosshaul Networks","authors":"Che-Chun Teng, Mei-Chun Chen, Min-Han Hung, Hong-Jie Chen","doi":"10.23919/APNOMS50412.2020.9236977","DOIUrl":"https://doi.org/10.23919/APNOMS50412.2020.9236977","url":null,"abstract":"More and more telecom operators around the world began to build and to deploy fifth-generation (5G) mobile networks. With the advent of 5G service scenarios, it brings new challenges and increases the complexity of management. To deliver good quality of experience of these 5G applications for customers, service assurance is important. In this paper, we propose an end-to-end service assurance solution for 5G crosshaul networks. The 5G crosshaul network architecture consists of fronthaul, midhaul, and backhaul networks. Our solution deployed in 5G trial network in Chunghwa Telecom in Taiwan. The solution focus on slicing service assurance and synchronization monitoring. Besides, our solution adjusts most of network management in the operation support system (OSS) to apply to 5G crosshaul network. Our goal is to provide stable 5G transport network and to assure quality of experience for customers.","PeriodicalId":122940,"journal":{"name":"2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129888811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Copyright 版权
2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2020-09-01 DOI: 10.23919/apnoms50412.2020.9237001
{"title":"Copyright","authors":"","doi":"10.23919/apnoms50412.2020.9237001","DOIUrl":"https://doi.org/10.23919/apnoms50412.2020.9237001","url":null,"abstract":"","PeriodicalId":122940,"journal":{"name":"2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"348 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132636344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Analysis of Port and Protocol via Endpoint Measurement: An Empirical Study 基于端点测量的端口和协议联合分析:一个实证研究
2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2020-09-01 DOI: 10.23919/APNOMS50412.2020.9237036
Chengshang Hou, Gaopeng Gou, G. Xiong, Zhuguo Li
{"title":"Joint Analysis of Port and Protocol via Endpoint Measurement: An Empirical Study","authors":"Chengshang Hou, Gaopeng Gou, G. Xiong, Zhuguo Li","doi":"10.23919/APNOMS50412.2020.9237036","DOIUrl":"https://doi.org/10.23919/APNOMS50412.2020.9237036","url":null,"abstract":"As network services continuously evolving, accurately classifying traffic is important for network operators to optimize QoS and customize policy. Network service uses non-standard ports and protocol obfuscation causing damage to the accurate port-based and payload-based traffic classification. However, Deep Packet Inspection (DPI) technique, which combines the payload-based method and port-based method, is still adopted by practitioners from the academic and industrial community. In this paper, we investigate the DPI classification result on a large network to estimate the impact of two factors. We qualify the popularity of non-standard port among different protocols. By endpoint filtering, we discover a large proportion of non-standard ports are opened temporally. We show there still is strong association between P2P protocols and camouflaged protocol. In particular, using both host and label association between endpoints, we find camouflaged protocols exhibit an abnormal port span that is different with the original protocol and are similar to the port span of P2P protocols.","PeriodicalId":122940,"journal":{"name":"2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115404150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Interference-aware GPU Container Concurrency Learning from Resource Usage of Application Execution 利用干扰感知的GPU容器并发学习从应用程序执行的资源使用
2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2020-09-01 DOI: 10.23919/APNOMS50412.2020.9236964
Sejin Kim, Yoonhee Kim
{"title":"Exploiting Interference-aware GPU Container Concurrency Learning from Resource Usage of Application Execution","authors":"Sejin Kim, Yoonhee Kim","doi":"10.23919/APNOMS50412.2020.9236964","DOIUrl":"https://doi.org/10.23919/APNOMS50412.2020.9236964","url":null,"abstract":"The advent of GPGPU (General-Purpose Graphic Processing Unit) containers enlarges opportunities of acceleration and easy-to-use in clouds. However, there is still lack of research on utilizing efficiently GPU resource and managing multiple applications at the same time. Co-execution of applications without understanding applications' execution characteristics may result in low performance caused by their interference problems. To solve the problem, this paper defines resource metrics that causes performance degradation when sharing resource. We calculate the degree of interference during concurrent execution of multi applications using a ML (Machine Learning) method with the metrics. The experiments show that the execution of interference aware groups improves 7% in execution time compared to non-interference aware group in overall. For a workload consisting of several applications, the overall performance was improved by 18% and 25%, respectively, when compared to SJF and random.","PeriodicalId":122940,"journal":{"name":"2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125956628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed Profitable Deployment of Network Services to Geo-distributed Edge Systems 网络服务在地理分布边缘系统上的分布式可盈利部署
2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2020-09-01 DOI: 10.23919/APNOMS50412.2020.9237027
Yi Chia Chen, Li-Hsing Yen
{"title":"Distributed Profitable Deployment of Network Services to Geo-distributed Edge Systems","authors":"Yi Chia Chen, Li-Hsing Yen","doi":"10.23919/APNOMS50412.2020.9237027","DOIUrl":"https://doi.org/10.23919/APNOMS50412.2020.9237027","url":null,"abstract":"Recent advance of Network Function Virtualization (NFV) enables deployment of NFV-based network services on a cloud-base infrastructure. Meanwhile, edge computing provides cloud infrastructure on the the edge of access network to serve end user. This paper proposes a decentralized market-based framework that matches independent network service providers (NSPs) with independent edge service providers (ESPs) for possible deployments of network services with associated payments. The framework benefits all participants by guaranteeing that the results are profitable for all participants: no NSP or ESP can be better off by dropping out of the match result. Simulation results indicate that the proposed approach had the highest average number of deployed network services compared with counterparts.","PeriodicalId":122940,"journal":{"name":"2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128793210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mitigating SYN flooding Attack and ARP Spoofing in SDN Data Plane 缓解SDN数据平面SYN泛洪攻击和ARP欺骗
2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2020-09-01 DOI: 10.23919/APNOMS50412.2020.9236951
Ting-Yu Lin, Jhen-Ping Wu, Pei-Hsuan Hung, Ching-Hsuan Shao, Yu-Ting Wang, Yun-Zhan Cai, Meng-Hsun Tsai
{"title":"Mitigating SYN flooding Attack and ARP Spoofing in SDN Data Plane","authors":"Ting-Yu Lin, Jhen-Ping Wu, Pei-Hsuan Hung, Ching-Hsuan Shao, Yu-Ting Wang, Yun-Zhan Cai, Meng-Hsun Tsai","doi":"10.23919/APNOMS50412.2020.9236951","DOIUrl":"https://doi.org/10.23919/APNOMS50412.2020.9236951","url":null,"abstract":"As the number of network devices increases rapidly, it becomes more and more difficult to defend network attacks. Large-scaled attacks, such as SYN flooding, may lead to heavy burden to the switches as well as the controller in a software defined network (SDN). In this paper, we investigate the SYN flooding and Address Resolution Protocol (ARP) spoofing attacks in SDN, and then propose mechanisms to address these two attacks. We also present a new scheme to detect SYN flooding by using only a few forwarding rules. Moreover, we utilize the Programming Protocol-independent Packet Processors (P4) technique to mitigate the burden of the controller.","PeriodicalId":122940,"journal":{"name":"2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121066452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Energy-Efficient Offloading and User Association in UAV-assisted Vehicular Ad Hoc Network 无人机辅助车载自组织网络的节能卸载与用户关联
2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2020-09-01 DOI: 10.23919/APNOMS50412.2020.9237040
P. Aung, Y. Tun, Nway Nway Ei, C. Hong
{"title":"Energy-Efficient Offloading and User Association in UAV-assisted Vehicular Ad Hoc Network","authors":"P. Aung, Y. Tun, Nway Nway Ei, C. Hong","doi":"10.23919/APNOMS50412.2020.9237040","DOIUrl":"https://doi.org/10.23919/APNOMS50412.2020.9237040","url":null,"abstract":"Task offloading scheme provides opportunistic energy saving for computation-intensive on-vehicle applications. The evolution of the Vehicular Edge Computing (VEC) paradigm has contributed a vast potential that can enhance the performance of such vehicles with energy-hungry and delay-sensitive services. However, determining how much workload to compute locally or offload to the VEC server is still quite challenging. Moreover, when all the vehicles try to offload their computation tasks to the same VEC server, it leads to deterioration in the performance gain due to overburden. Recently, unmanned aerial vehicle (UAV) as the edge server has gained huge attraction due to its well maneuverability and cost efficiency. In this paper, we study the energy-efficient offloading as well as association of the vehicles between the road side unit (RSU) and UAV. First, we formulate the joint offloading and association problem. Next, we decompose the formulated mixed integer linear (MIL) problem into two subproblems and then solve them by using standard convex optimization. Finally, we compare our proposed algorithm with benchmark schemes and the numerical results demonstrate that our algorithm outperforms the benchmark solutions.","PeriodicalId":122940,"journal":{"name":"2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131564212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hierarchical Identifier (HID)-based 5G Architecture with Backup Slice 基于层次标识符(HID)的5G架构,支持备份切片
2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2020-09-01 DOI: 10.23919/APNOMS50412.2020.9236966
Haneul Ko, Jaewook Lee, Hongrok Cho, Sangheon Pack
{"title":"Hierarchical Identifier (HID)-based 5G Architecture with Backup Slice","authors":"Haneul Ko, Jaewook Lee, Hongrok Cho, Sangheon Pack","doi":"10.23919/APNOMS50412.2020.9236966","DOIUrl":"https://doi.org/10.23919/APNOMS50412.2020.9236966","url":null,"abstract":"To support network slicing and service function chaining (SFC) at a time, we propose a novel hierarchical identifier (HID)-based 5G architecture. For this, we first introduce HID which consists of network slice selection assistance information (NSSAI) and service path ID (SPI). Based on HID, a user can attach a specific network slice and flows generated by the user can be processed by a set of service functions (SFs) in a sequence. Meanwhile, when the incoming flow to a specific slice unexpectedly increases, the slice cannot handle incoming flow due to its limited capacity, which degrades users' quality of service (QoS). To alleviate this issue and efficiently utilize network resources, we introduce a concept of the backup slice shared by different services. Evaluation results demonstrate that the proposed architecture can achieve better performance in terms of the average system blocking probability and utilization in dynamic environments.","PeriodicalId":122940,"journal":{"name":"2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115619016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating wallets and bitcoins owned by Satoshi using Hash-rate and Transactions analysis 使用哈希率和交易分析估计中本聪拥有的钱包和比特币
2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2020-09-01 DOI: 10.23919/APNOMS50412.2020.9237018
Hye-Yeong Shin, Meryam Essaid, Hongtaek Ju
{"title":"Estimating wallets and bitcoins owned by Satoshi using Hash-rate and Transactions analysis","authors":"Hye-Yeong Shin, Meryam Essaid, Hongtaek Ju","doi":"10.23919/APNOMS50412.2020.9237018","DOIUrl":"https://doi.org/10.23919/APNOMS50412.2020.9237018","url":null,"abstract":"Bitcoin is designed to allow its users to send and receive payments under a pseudonym. In Bitcoin, A pseudonym is an address from/to which a user sends/receives coins. Owing to users anonymity, one-half of the transactions in Bitcoin are associated with illegal trading or money laundering. Hence, it is necessary to develop an approach that estimates the number of coins owned by Bitcoin users and identifies transactions which deal with illegal activities. Considering that every address involved in the Bitcoin transaction is stored permanently in the ledger. If an address is ever mapped to a user identity, every transaction wrote by that user will be linked. In this study, we proposed a new method to identify the number of coins owned by users, in particular, we estimate the number of bitcoins held by the Bitcoin creator Satoshi Nakamoto, by analyzing the mining hash rate, mining reward and transactions data.","PeriodicalId":122940,"journal":{"name":"2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114764627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信