Julio A. Sanguesa, Vicente Torres, Fernando Naranjo, Manuel Fogué, Piedad Garrido, Jesús Gallardo, F. Martinez
{"title":"Vehicle Density and Roadmap Topology Issues when Characterizing Vehicular Communications","authors":"Julio A. Sanguesa, Vicente Torres, Fernando Naranjo, Manuel Fogué, Piedad Garrido, Jesús Gallardo, F. Martinez","doi":"10.1109/NCA.2015.23","DOIUrl":"https://doi.org/10.1109/NCA.2015.23","url":null,"abstract":"In this paper, we study the influence of the roadmap topology and the number of vehicles when accounting for the vehicular communications capabilities, especially in urban scenarios. Additionally, we propose the use of two metrics: the SJ Ratio (SJR) and the Total Distance (TD), as the metrics that better correlate with communications performance. Hence, researchers will better characterize the different urban scenarios. In particular, simulation results demonstrate that roadmaps with both similar SJR and TD present similar communications performance in terms of vehicles informed.","PeriodicalId":222162,"journal":{"name":"2015 IEEE 14th International Symposium on Network Computing and Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121430699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hengky Susanto, Benyuan Liu, Byung-Guk Kim, Honggang Zhang, Biao Chen, Junda Zhu, Xinwen Fu
{"title":"Secondary Market Mobile Users for Internet Access","authors":"Hengky Susanto, Benyuan Liu, Byung-Guk Kim, Honggang Zhang, Biao Chen, Junda Zhu, Xinwen Fu","doi":"10.1109/NCA.2015.13","DOIUrl":"https://doi.org/10.1109/NCA.2015.13","url":null,"abstract":"There is a fast growing number of public spaces offering Wi-Fi access to meet the rising demands for the Internet. It is common for such service to be offered to users at no charge or for a flat fee. Both situations provide very little incentive for Wi-Fi providers to offer better service to the users. Similarly, Wi-Fi providers pay a monthly flat-rate to ISP for Internet access, which does not incentivize ISP to offer better service to Wi-Fi users. As a result, Wi-Fi users may experience poor Internet connection when network becomes congested during peak hours. In this paper, we propose a dynamic pricing mechanism for both ISP and Wi-Fi providers in order to give mobile Wi-Fi users better service, while providing economic incentive for both ISP and Wi-Fi provider.","PeriodicalId":222162,"journal":{"name":"2015 IEEE 14th International Symposium on Network Computing and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115037985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Ahvar, S. Ahvar, N. Crespi, Joaquín García, Z. Mann
{"title":"NACER: A Network-Aware Cost-Efficient Resource Allocation Method for Processing-Intensive Tasks in Distributed Clouds","authors":"E. Ahvar, S. Ahvar, N. Crespi, Joaquín García, Z. Mann","doi":"10.1109/NCA.2015.37","DOIUrl":"https://doi.org/10.1109/NCA.2015.37","url":null,"abstract":"In the distributed cloud paradigm, data centers are geographically dispersed and interconnected over a wide-area network. Due to the geographical distribution of data centers, communication networks play an important role in distributed clouds in terms of communication cost and QoS. Large-scale, processing-intensive tasks require the cooperation of many VMs, which may be distributed in more than one data center and should communicate with each other. In this setting, the number of data enters serving the given task and the network distance among those data centers have critical impact on the communication cost, traffic and even completion time of the task. In this paper, we present the NACER algorithm, a Network-Aware Cost-Efficient Resource allocation method for optimizing the placement of largemulti-VM tasks in distributed clouds. NACER builds on ideas of the A* search algorithm from Artificial Intelligence research in order to obtain better results than typical greedy heuristics. We present extensive simulation results to compare the performance of NACER with competing heuristics and show its effectiveness.","PeriodicalId":222162,"journal":{"name":"2015 IEEE 14th International Symposium on Network Computing and Applications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124506270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Anceaume, Yann Busnel, Paul Lajoie-Mazenc, Géraldine Texier
{"title":"Reputation for Inter-Domain QoS Routing","authors":"E. Anceaume, Yann Busnel, Paul Lajoie-Mazenc, Géraldine Texier","doi":"10.1109/NCA.2015.19","DOIUrl":"https://doi.org/10.1109/NCA.2015.19","url":null,"abstract":"Video traffic, which represents an increasing fraction of the Internet traffic, requires end-to-end quality of service (QoS) guarantees for inter-domain routing. However, providing such guarantees remains a challenge essentially because it requires a strong and fair cooperation among the different network operators or Autonomous Systems (ASes), crossed by the traffic. Having a single AS on the path that does not meet its QoS engagement is sufficient to violate the end-to-end QoS guarantees. Unfortunately, the client is not capable of distinguishing unfair ASes from honest ones at the time it selects its path. Reputation mechanisms turn out to be very efficient tools to estimate how trustworthy and reliable entities can be without requiring the help of any central authority. They are effective to foster cooperation by remedying selfishness. In this position paper, we identify the main properties a reputation mechanism should meet to improve inter-domain QoS routing, and we provide a coarsed-grain vision of the design of such a mechanism.","PeriodicalId":222162,"journal":{"name":"2015 IEEE 14th International Symposium on Network Computing and Applications","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131672251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cheating Resistant Implicit Security","authors":"Abhishek Parakh","doi":"10.1109/NCA.2015.32","DOIUrl":"https://doi.org/10.1109/NCA.2015.32","url":null,"abstract":"This paper discusses an implicit security algorithm for secure transmission using multiple paths between sender and receiver, secure cloud storage, in a peer-to-peer network and secret sharing applications. The proposed algorithm modifies Shamir's secret sharing scheme such that a group of k-2 or fewer colluding nodes gain only negligible advantage against the honest node. Further, the proposed modifications do not require any additional storage. Here k is the minimum number of nodes that have to pool their partitions together to reconstruct the secret.","PeriodicalId":222162,"journal":{"name":"2015 IEEE 14th International Symposium on Network Computing and Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116276002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marcelo Amaral, Jordà Polo, David Carrera, Iqbal Mohomed, Merve Unuvar, M. Steinder
{"title":"Performance Evaluation of Microservices Architectures Using Containers","authors":"Marcelo Amaral, Jordà Polo, David Carrera, Iqbal Mohomed, Merve Unuvar, M. Steinder","doi":"10.1109/NCA.2015.49","DOIUrl":"https://doi.org/10.1109/NCA.2015.49","url":null,"abstract":"Micro services architecture has started a new trend for application development for a number of reasons: (1) to reduce complexity by using tiny services, (2) to scale, remove and deploy parts of the system easily, (3) to improve flexibility to use different frameworks and tools, (4) to increase the overall scalability, and (5) to improve the resilience of the system. Containers have empowered the usage of micro services architectures by being lightweight, providing fast start-up times, and having a low overhead. Containers can be used to develop applications based on monolithic architectures where the whole system runs inside a single container or inside a micro services architecture where one or few processes run inside the containers. Two models can be used to implement a micro services architecture using containers: master-slave, or nested-container. The goal of this work is to compare the performance of CPU and network running benchmarks in the two aforementioned models of micro services architecture hence provide a benchmark analysis guidance for system designers.","PeriodicalId":222162,"journal":{"name":"2015 IEEE 14th International Symposium on Network Computing and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120963504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Car Rank: An Information-Centric Identification of Important Smart Vehicles for Urban Sensing","authors":"J. Khan, Y. Ghamri-Doudane","doi":"10.1109/NCA.2015.10","DOIUrl":"https://doi.org/10.1109/NCA.2015.10","url":null,"abstract":"Future cars are becoming powerful sensor platforms capable to collect, store and share large amount of sensory data by constant monitoring of urban streets. It is quite challenging to upload such data from all vehicles to the infrastructure due to limited bandwidth resources and high upload cost. This invoke the need to identify the appropriate vehicles within the Vehicular Ad-hoc Network, that are important for different urban sensing tasks based on their natural mobility and availability. This paper address this problem leveraging the self-decision making ability of a \"Smart Vehicle\" regarding its importance in the network. To do so, we present CarRank, an Information-Centric algorithm for a vehicle to first rank different location-aware information. It then uses the information importance, its spatio-temporal availability and neighborhood topology to analytically find its relative importance in the network. CarRank is the first step towards identifying the best set of information hubs to be used in the network for the efficient collection, storage and distribution of urban sensory information. We evaluate CarRank under a scalable simulation environment using realistic vehicular mobility traces. Results show that CarRank is an efficient ranking algorithm to identify socially important vehicles in comparison to other ranking metrics used in the literature.","PeriodicalId":222162,"journal":{"name":"2015 IEEE 14th International Symposium on Network Computing and Applications","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122176602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cost Effective and Deadline Constrained Scientific Workflow Scheduling for Commercial Clouds","authors":"Vahid Arabnejad, K. Bubendorfer","doi":"10.1109/NCA.2015.33","DOIUrl":"https://doi.org/10.1109/NCA.2015.33","url":null,"abstract":"Commercial clouds have increasingly become a viable platform for hosting scientific analyses and computation due to their elasticity, recent introduction of specialist hardware, and pay-as-you-go cost model. This computing paradigm therefore presents a low capital and low barrier alternative to operating dedicated eScience infrastructure. Indeed, commercial clouds now enable universal access to capabilities previously available to only large well funded research groups. While the potential benefits of cloud computing are clear, there are still significant technical hurdles associated with obtaining the best execution efficiency whilst trading off cost. Large scale scientific analyses are typically represented as workflows, in order to manage multiple tools and data sets. Mapping workflow tasks on to a set of provisioned instances is an example of the general scheduling problem and is NP-complete. In this case, the mapping includes elasticity, where as part of the mapping process additional instances may be provisioned. In this paper we present anew algorithm, Proportional Deadline Constrained (PDC), that addresses eScience workflow scheduling in the cloud. PDC's aim is to minimize costs while meeting deadline constraints. To validate the PDC algorithm, we constructed a Cloud Sim test bed and compared PDC with two other similar algorithms over three workflows. Our results demonstrate that overall PDC achieves generally lower costs for a given deadline, but more significantly, is usually able to construct a viable schedule with tight deadlines where the other algorithms studied cannot.","PeriodicalId":222162,"journal":{"name":"2015 IEEE 14th International Symposium on Network Computing and Applications","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125546229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shahriar Kaisar, J. Kamruzzaman, G. Karmakar, I. Gondal
{"title":"Content Sharing among Visitors with Irregular Movement Patterns in Visiting Hotspots","authors":"Shahriar Kaisar, J. Kamruzzaman, G. Karmakar, I. Gondal","doi":"10.1109/NCA.2015.16","DOIUrl":"https://doi.org/10.1109/NCA.2015.16","url":null,"abstract":"Smart mobile devices have become immensely popular among the people worldwide and provide a new platform for generating and sharing contents. The centralized and hybrid architectures for content sharing require constant Internet connection, increase traffic and incur costs. To address these issues several content sharing approaches have been proposed using the decentralized architecture. Most of the proposed approaches uses patio-temporal regularity and pre-existing social relationships of the users to predict their movements and facilitate content sharing. However, there are scenarios such as visiting hotspots where regular movement patterns or established social relationships among people might not exist. Content sharing in such scenarios has not been addressed yet in literature and existing prediction based approaches are ineffectual. This study focuses on facilitating content sharing in the afore-mentioned scenarios. We take account of user interests, recommendations from online social networks, hotspot specific activities and other relevant information to construct communities which facilitate content sharing. For each community an administrator, who maintains content and member lists and render directory services, is selected based on stay probability, interest score, battery lifetime and device configuration. Simulation results show that our proposed approach attains high content hit and success rate and low latency in delivery which is nearly comparable to those proposed for scenarios with regular predictable movement patterns reported in literature.","PeriodicalId":222162,"journal":{"name":"2015 IEEE 14th International Symposium on Network Computing and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122276078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cesar Ghali, A. Narayanan, D. Oran, G. Tsudik, Christopher A. Wood
{"title":"Secure Fragmentation for Content-Centric Networks","authors":"Cesar Ghali, A. Narayanan, D. Oran, G. Tsudik, Christopher A. Wood","doi":"10.1109/NCA.2015.34","DOIUrl":"https://doi.org/10.1109/NCA.2015.34","url":null,"abstract":"Content-Centric Networking (CCN) is a communication paradigm that emphasizes content distribution. Named-Data Networking (NDN) is an instantiation of CCN, a candidate Future Internet Architecture. NDN supports human-readable content naming and router-based content caching which lends itself to efficient, secure, and scalable content distribution. Because of NDN's fundamental requirement that each content object must be signed by its producer, fragmentation has been considered incompatible with NDN since it precludes authentication of individual content fragments by routers. The alternative is to perform hop-by-hop reassembly, which incurs prohibitive delays. In this paper, we show that secure and efficient content fragmentation is both possible and even advantageous in NDN and similar content-centric network architectures that involve signed content. We design a concrete technique that facilitates efficient and secure content fragmentation in NDN, discuss its security guarantees and assess performance. We also describe a prototype implementation and compare performance of cut-through with hop-by-hop fragmentation and reassembly.","PeriodicalId":222162,"journal":{"name":"2015 IEEE 14th International Symposium on Network Computing and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126762592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}