{"title":"A method for reducing TCP latency due to consecutive packet losses in mobile networks","authors":"Yoshiaki Nishikawa, Kousuke Nogami, E. Takahashi","doi":"10.1109/APNOMS.2016.7737274","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737274","url":null,"abstract":"In this paper, we propose a method for reducing the transmission control protocol (TCP) latency due to consecutive packet losses in mobile networks. Mobile networks are becoming increasingly popular and used in the same sense as fixed networks. However, insufficient attention is directed toward the problem with mobile networks, i.e., long latency due to an inappropriate TCP retransmission mechanism. In the proposed method, a sender detects the start and end of burst packet losses and retransmits right after the endpoint. To detect the endpoint, the sender periodically sends a small probe packet during the waiting state. By the proposed method, latency decreased without increasing traffic load in 70% of sample cases compared with the conventional method.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129157637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online learning-based clustering approach for news recommendation systems","authors":"Minh N. H. Nguyen, Chuan Pham, J. Son, C. Hong","doi":"10.1109/APNOMS.2016.7737269","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737269","url":null,"abstract":"Recommender agents are widely used in online markets, social networks and search engines. The recent online news recommendation systems such as Google News and Yahoo! News produce real-time decisions for ranking and displaying highlighted stories from massive news and users access per day. The more relevant highlighted items are suggested to users, the more interesting and better feedback from users achieve. Therefore, the distributed online learning can be a promising approach that provides learning ability for recommender agents based on side information under dynamic environment in large scale scenarios. In this work, we propose a distributed algorithm that is integrated online K-Means user contexts clustering with online learning mechanisms for selecting a highlighted news. Our proposed algorithm for online clustering with lower bound confident clustering approximates closer to offline K-Means clusters than greedy clustering and gives better performance in learning process. The algorithm provides a scalability, cheap storage and computation cost approach for large scale news recommendation systems.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127665190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Siu, Jia-Lun Wang, Wen-Hung Tseng, C. Liao, Hsiu-fang Hu
{"title":"Primary reference time clocks performance monitoring using GNSS common-view technique in telecommunication networks","authors":"S. Siu, Jia-Lun Wang, Wen-Hung Tseng, C. Liao, Hsiu-fang Hu","doi":"10.1109/APNOMS.2016.7737237","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737237","url":null,"abstract":"In recent years, there has been a dramatic demand for stringent time/phase synchronization due to the continuing evolution of mobile network technologies. The primary reference time clock (PRTC) located in core centers provides reference time and phase synchronization signal traceable to a recognized time standard UTC(*) for other clocks within the telecommunication networks. The performance monitoring to secure stringent time/phase is a key point for providing better Quality-of-Services (QoS) in LTE / LTE-Advanced networks. In this paper, we demonstrate PRTC time/phase accuracy monitoring against UTC(*) with our proposed time comparison system for assuring network performance. Furthermore, the system can also be used to remotely calibrate the PRTC by GPS common-view technique. The performance of GNSS-based PRTC is evaluated with direct measurement mode and the GNSS common-view mode by our proposed system, respectively. The analytical results show that the proposed system offers a worthy performance monitoring and remote calibration schemes for monitoring GNSS-based PRTCs cloud in telecommunication networks.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117262493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shibo Xu, Peng Ni, Wensheng Cao, Yang Yang, Shao-Yong Guo, Wenjing Li
{"title":"Routing discovery mechanism based on fault tolerance in container yard environment","authors":"Shibo Xu, Peng Ni, Wensheng Cao, Yang Yang, Shao-Yong Guo, Wenjing Li","doi":"10.1109/APNOMS.2016.7737289","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737289","url":null,"abstract":"Container transportation has become the main transportation form for international freight. In this paper, the energy saving and reliability tactics are considered and we design a new E-ZBR routing algorithm based on the original ZBR routing protocol. Firstly we propose the score criterion for estimating a path, and then based on nodes' connectivity, we select two existed better routing paths through improved FCM clustering algorithm. Through clustering, we get rid of those nodes with possible failure and construct a fault tolerance routing path with more reliability and robustness. We demonstrate that E-ZBR routing protocol has higher the energy efficiency and fault tolerance.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117232850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yoori Oh, Jieun Choi, E. Song, M. Kim, Yoonhee Kim
{"title":"A SLA-based Spark cluster scaling method in cloud environment","authors":"Yoori Oh, Jieun Choi, E. Song, M. Kim, Yoonhee Kim","doi":"10.1109/APNOMS.2016.7737242","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737242","url":null,"abstract":"As the development of Internet and mobile device increases, there is a correspondingly increasing amount of data produced by users of such technology worldwide. It is thus essential to analyze such massive amounts of data reflective of the big data era. Recently, Apache Spark has become popular for analyzing big data, since it can process streaming data and support real-time in-memory computing. Also, it is known to execute applications faster than traditionally used Hadoop. Also cloud technology provides flexible resource utilization environment on-demand. When analyzing big data using Spark in existing environments, it is difficult to provision resources according to the system's changing environment and the influence of other users' executions. Using cloud technology however, it is possible to provision resources more effectively for the execution of jobs through dynamic resource provision methods. In this paper, we propose an auto-scaling framework with corresponding algorithms to manage resources dynamically in virtual environments, in order to meet user-specified SLA (Service Level Agreement) given a set of limited resources. Our experimental results on Spark in OpenStack demonstrate the effectiveness of scaling resources to satisfy user SLAs.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132405446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xie Chen, Ao Xiong, Peng Yu, Wenjing Li, Mingxiong Wang
{"title":"Power modeling of BSs based on energy storage monitoring","authors":"Xie Chen, Ao Xiong, Peng Yu, Wenjing Li, Mingxiong Wang","doi":"10.1109/APNOMS.2016.7737254","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737254","url":null,"abstract":"Current research in base station(BS) energy consumption area is mostly devoted to the study of the static energy consumption or dynamic factor. But it lacks the research on the energy storage efficiency of the BS. In this paper, we propose a power modeling of BSs based on energy storage monitoring. Firstly, the system architecture and networking scheme of energy storage monitoring are presented, and the mathematical model of BS energy consumption is analyzed. Then, based on the current network's data, a large number of real data are collected through the energy consumption analysis system. We analyzed the effect of charge and discharge time on energy storage efficiency of power grid. Based on the monitoring data, we fit the model of energy consumption and get the model of overall power consumption. Finally, based on the use control template, the optimization scheme of reducing the power consumption of authority network is proposed, which has substantial economic and green value.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121751640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Policy-based verification method for configurations of large network with header-space analyses","authors":"T. Tonouchi","doi":"10.1109/APNOMS.2016.7737248","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737248","url":null,"abstract":"Configuration of network is getting complex because the network has been equipped with much functionality. Meanwhile, the network should satisfy many requirements for sophisticated multi-tenancy, high-level security and so on. For example, a flow which should be secure has to go through a firewall. However, it is difficult for an operator to verify whether the configuration in large network can satisfy these requirements. The verification takes a lot of time and a lot of human work. In addition, the human operator may inherently overlook an erroneous configuration. In this paper, we propose a policy language, which can specify the requirements. We also propose two implementation designs of the policy language. The one of the methods is estimated to verify the configuration of large network.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114976451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified Controlling Queue Delay for TCP fairness improvement","authors":"Masato Hanai, Saneyasu Yamaguchi, A. Kobayashi","doi":"10.1109/APNOMS.2016.7737224","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737224","url":null,"abstract":"For overcoming performance decline caused by current long fat networks, many high performance TCPs have been proposed, such as Compound TCP and CUBIC TCP. These proposals have raised a new issue, which is fairness among these modern TCPs. For this issue, several fairness evaluations and some proposals for improving fairness were published. In our past work, we focused on Controlling Queue Delay (CoDel) and proposed a method for improving performance fairness of modern TCPs by modifying CoDel. However, this existing method assumed that the most bandwidth-consuming connection was given for network elements. In this paper, we discuss a method for improving TCP fairness without such an assumption. First, we present fairness evaluation among modern TCPs with and without CoDel, and then demonstrate that fairness among these TCPs is very poor. Second, we propose a method for improving performance fairness. The method monitors network packets and guesses the most bandwidth-consuming connection from the monitored packets. Then, it drops packets in the most bandwidth-consuming connections more aggressively in the network element. Third, we evaluate our proposed method and show that our method can improve performance fairness.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123539607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security analysis of a NTRU-based mutual authentication scheme","authors":"R. Tso, Yi-Shio Jheng","doi":"10.1109/APNOMS.2016.7737253","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737253","url":null,"abstract":"NFC-based mobile transaction has come into limelight in recent years thanks to the rapid development of NFC and mobile technologies. In these applications, the NFC-chip is in the card emulation mode to simulate a credit card. Because many sensitive information is exchanged during the communication of the mobile transaction, mutual authentication is required in order to verify the legality of each communicating party. Recently, Part and Lee introduced an anonymous authentication scheme based on NTRU. It is aimed to protect user information in NFC mobile payment systems without directly using private financial information of users. However, we found a security flaw in their new scheme. In this paper, we show that their scheme is insecure against an eavesdropping attack. An attacker, without any secret information, can impersonate the user against a service provider and pass the authentication procedure. This may result in a serious problem in which an attacker can enjoy a service such as an on-line shopping on behalf of the real user without the permission of the real user. An improved scheme will be left as our future work.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124932354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nguyen Dang Tri, S. M. Ahsan Kazmi, T. Ho, Nguyen H. Tran, C. Hong
{"title":"A Double-Auction mechanism for wireless charging networks","authors":"Nguyen Dang Tri, S. M. Ahsan Kazmi, T. Ho, Nguyen H. Tran, C. Hong","doi":"10.1109/APNOMS.2016.7737279","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737279","url":null,"abstract":"Wireless Power Transmission (WPT) is a technique to charge electrical devices (EDs) remotely. In WPT, power source (Smart Wireless Charger) transmits power wirelessly, using air as the medium, to EDs. In this paper, we present an Auction mechanism to obtain the energy trading between Smart Wireless Chargers (SWCs) and EDs. In our proposed Double-Auction based charging trade mechanism, our priorities are to increase utility of the SWCs as well as increase EDs utilities. In our proposal, first we analyze the system architecture of the WPT environment and then form an optimization problem for the auction system. We then, introduce two algorithms to solve the combinatorial optimization problem such that the wireless charging system is stable and have high efficiency. We have numerically analyzed our system using python, the results show that the proposed mechanism achieve higher total utility for the whole system with satisfying budget balancing, individual rationality and truthfulness.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129840625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}