{"title":"Double-Lead Content Search Scheme for Producer Mobility in Named Data Networking","authors":"Huilin Liu, Xushan Chen, Guoxin Xia, Hui Guo","doi":"10.23919/APNOMS50412.2020.9236982","DOIUrl":"https://doi.org/10.23919/APNOMS50412.2020.9236982","url":null,"abstract":"In Named Data Networking (NDN), the processing of the packet is based on the data rather than the communication endpoint. It's very suitable for the core demand of content sharing on the internet today. However, there are still some problems to be dealt with, including mobility support of the producer. By analyzing existing solutions, we put forward a solution finding MCS (Mobile Content Source) passively by HR(Home Repository) and leading interest packets to find MCS actively in the local scope at the same time to speed up to search MCS and to support NDN producer mobility. Triangle routing problem in single HR and low efficiency problem can be based on this solution. Experimental results show that our scheme does better in reducing delay with low handoff cost than other typical solutions.","PeriodicalId":122940,"journal":{"name":"2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126781959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"End-to-end Service Assurance in 5G Crosshaul Networks","authors":"Che-Chun Teng, Mei-Chun Chen, Min-Han Hung, Hong-Jie Chen","doi":"10.23919/APNOMS50412.2020.9236977","DOIUrl":"https://doi.org/10.23919/APNOMS50412.2020.9236977","url":null,"abstract":"More and more telecom operators around the world began to build and to deploy fifth-generation (5G) mobile networks. With the advent of 5G service scenarios, it brings new challenges and increases the complexity of management. To deliver good quality of experience of these 5G applications for customers, service assurance is important. In this paper, we propose an end-to-end service assurance solution for 5G crosshaul networks. The 5G crosshaul network architecture consists of fronthaul, midhaul, and backhaul networks. Our solution deployed in 5G trial network in Chunghwa Telecom in Taiwan. The solution focus on slicing service assurance and synchronization monitoring. Besides, our solution adjusts most of network management in the operation support system (OSS) to apply to 5G crosshaul network. Our goal is to provide stable 5G transport network and to assure quality of experience for customers.","PeriodicalId":122940,"journal":{"name":"2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129888811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint Analysis of Port and Protocol via Endpoint Measurement: An Empirical Study","authors":"Chengshang Hou, Gaopeng Gou, G. Xiong, Zhuguo Li","doi":"10.23919/APNOMS50412.2020.9237036","DOIUrl":"https://doi.org/10.23919/APNOMS50412.2020.9237036","url":null,"abstract":"As network services continuously evolving, accurately classifying traffic is important for network operators to optimize QoS and customize policy. Network service uses non-standard ports and protocol obfuscation causing damage to the accurate port-based and payload-based traffic classification. However, Deep Packet Inspection (DPI) technique, which combines the payload-based method and port-based method, is still adopted by practitioners from the academic and industrial community. In this paper, we investigate the DPI classification result on a large network to estimate the impact of two factors. We qualify the popularity of non-standard port among different protocols. By endpoint filtering, we discover a large proportion of non-standard ports are opened temporally. We show there still is strong association between P2P protocols and camouflaged protocol. In particular, using both host and label association between endpoints, we find camouflaged protocols exhibit an abnormal port span that is different with the original protocol and are similar to the port span of P2P protocols.","PeriodicalId":122940,"journal":{"name":"2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115404150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting Interference-aware GPU Container Concurrency Learning from Resource Usage of Application Execution","authors":"Sejin Kim, Yoonhee Kim","doi":"10.23919/APNOMS50412.2020.9236964","DOIUrl":"https://doi.org/10.23919/APNOMS50412.2020.9236964","url":null,"abstract":"The advent of GPGPU (General-Purpose Graphic Processing Unit) containers enlarges opportunities of acceleration and easy-to-use in clouds. However, there is still lack of research on utilizing efficiently GPU resource and managing multiple applications at the same time. Co-execution of applications without understanding applications' execution characteristics may result in low performance caused by their interference problems. To solve the problem, this paper defines resource metrics that causes performance degradation when sharing resource. We calculate the degree of interference during concurrent execution of multi applications using a ML (Machine Learning) method with the metrics. The experiments show that the execution of interference aware groups improves 7% in execution time compared to non-interference aware group in overall. For a workload consisting of several applications, the overall performance was improved by 18% and 25%, respectively, when compared to SJF and random.","PeriodicalId":122940,"journal":{"name":"2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125956628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Profitable Deployment of Network Services to Geo-distributed Edge Systems","authors":"Yi Chia Chen, Li-Hsing Yen","doi":"10.23919/APNOMS50412.2020.9237027","DOIUrl":"https://doi.org/10.23919/APNOMS50412.2020.9237027","url":null,"abstract":"Recent advance of Network Function Virtualization (NFV) enables deployment of NFV-based network services on a cloud-base infrastructure. Meanwhile, edge computing provides cloud infrastructure on the the edge of access network to serve end user. This paper proposes a decentralized market-based framework that matches independent network service providers (NSPs) with independent edge service providers (ESPs) for possible deployments of network services with associated payments. The framework benefits all participants by guaranteeing that the results are profitable for all participants: no NSP or ESP can be better off by dropping out of the match result. Simulation results indicate that the proposed approach had the highest average number of deployed network services compared with counterparts.","PeriodicalId":122940,"journal":{"name":"2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128793210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigating SYN flooding Attack and ARP Spoofing in SDN Data Plane","authors":"Ting-Yu Lin, Jhen-Ping Wu, Pei-Hsuan Hung, Ching-Hsuan Shao, Yu-Ting Wang, Yun-Zhan Cai, Meng-Hsun Tsai","doi":"10.23919/APNOMS50412.2020.9236951","DOIUrl":"https://doi.org/10.23919/APNOMS50412.2020.9236951","url":null,"abstract":"As the number of network devices increases rapidly, it becomes more and more difficult to defend network attacks. Large-scaled attacks, such as SYN flooding, may lead to heavy burden to the switches as well as the controller in a software defined network (SDN). In this paper, we investigate the SYN flooding and Address Resolution Protocol (ARP) spoofing attacks in SDN, and then propose mechanisms to address these two attacks. We also present a new scheme to detect SYN flooding by using only a few forwarding rules. Moreover, we utilize the Programming Protocol-independent Packet Processors (P4) technique to mitigate the burden of the controller.","PeriodicalId":122940,"journal":{"name":"2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121066452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-Efficient Offloading and User Association in UAV-assisted Vehicular Ad Hoc Network","authors":"P. Aung, Y. Tun, Nway Nway Ei, C. Hong","doi":"10.23919/APNOMS50412.2020.9237040","DOIUrl":"https://doi.org/10.23919/APNOMS50412.2020.9237040","url":null,"abstract":"Task offloading scheme provides opportunistic energy saving for computation-intensive on-vehicle applications. The evolution of the Vehicular Edge Computing (VEC) paradigm has contributed a vast potential that can enhance the performance of such vehicles with energy-hungry and delay-sensitive services. However, determining how much workload to compute locally or offload to the VEC server is still quite challenging. Moreover, when all the vehicles try to offload their computation tasks to the same VEC server, it leads to deterioration in the performance gain due to overburden. Recently, unmanned aerial vehicle (UAV) as the edge server has gained huge attraction due to its well maneuverability and cost efficiency. In this paper, we study the energy-efficient offloading as well as association of the vehicles between the road side unit (RSU) and UAV. First, we formulate the joint offloading and association problem. Next, we decompose the formulated mixed integer linear (MIL) problem into two subproblems and then solve them by using standard convex optimization. Finally, we compare our proposed algorithm with benchmark schemes and the numerical results demonstrate that our algorithm outperforms the benchmark solutions.","PeriodicalId":122940,"journal":{"name":"2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131564212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hierarchical Identifier (HID)-based 5G Architecture with Backup Slice","authors":"Haneul Ko, Jaewook Lee, Hongrok Cho, Sangheon Pack","doi":"10.23919/APNOMS50412.2020.9236966","DOIUrl":"https://doi.org/10.23919/APNOMS50412.2020.9236966","url":null,"abstract":"To support network slicing and service function chaining (SFC) at a time, we propose a novel hierarchical identifier (HID)-based 5G architecture. For this, we first introduce HID which consists of network slice selection assistance information (NSSAI) and service path ID (SPI). Based on HID, a user can attach a specific network slice and flows generated by the user can be processed by a set of service functions (SFs) in a sequence. Meanwhile, when the incoming flow to a specific slice unexpectedly increases, the slice cannot handle incoming flow due to its limited capacity, which degrades users' quality of service (QoS). To alleviate this issue and efficiently utilize network resources, we introduce a concept of the backup slice shared by different services. Evaluation results demonstrate that the proposed architecture can achieve better performance in terms of the average system blocking probability and utilization in dynamic environments.","PeriodicalId":122940,"journal":{"name":"2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115619016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimating wallets and bitcoins owned by Satoshi using Hash-rate and Transactions analysis","authors":"Hye-Yeong Shin, Meryam Essaid, Hongtaek Ju","doi":"10.23919/APNOMS50412.2020.9237018","DOIUrl":"https://doi.org/10.23919/APNOMS50412.2020.9237018","url":null,"abstract":"Bitcoin is designed to allow its users to send and receive payments under a pseudonym. In Bitcoin, A pseudonym is an address from/to which a user sends/receives coins. Owing to users anonymity, one-half of the transactions in Bitcoin are associated with illegal trading or money laundering. Hence, it is necessary to develop an approach that estimates the number of coins owned by Bitcoin users and identifies transactions which deal with illegal activities. Considering that every address involved in the Bitcoin transaction is stored permanently in the ledger. If an address is ever mapped to a user identity, every transaction wrote by that user will be linked. In this study, we proposed a new method to identify the number of coins owned by users, in particular, we estimate the number of bitcoins held by the Bitcoin creator Satoshi Nakamoto, by analyzing the mining hash rate, mining reward and transactions data.","PeriodicalId":122940,"journal":{"name":"2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114764627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}