{"title":"LTE CoS/QoS Harmonization Emulator","authors":"Li Li, Su-bin Shen, C. Yang","doi":"10.1109/CyberC.2011.34","DOIUrl":"https://doi.org/10.1109/CyberC.2011.34","url":null,"abstract":"There are many challenges in the QoS controls and traffic handling mechanisms in the deployment of Long Term Evolution (LTE). Simulations are crucial for performance evaluation of end-to-end QoS (Quality of Service) management across LTE network elements over heterogeneous networks. The LTE CoS/QoS Harmonization Emulator presented in this paper will allow the user to determine whether the QoS design strategy specifically and logically fits in a variety of LTE network topologies. The Emulator is capable of evaluating effectiveness of CoS/QoS mapping, performance of QoS controls (classification/policing/mark/queuing&dropping/ shaping) and traffic handling mechanisms that supports specific LTE applications. This module is portable and can be integrated with the performance management (PM) system as a part of business/operations impact analysis to support testing during the system development and quality assurance phases. The Emulator is offered for free under the terms of an academic, non-commercial use license.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127488652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhihong Shen, Jianhui Li, Chengzan Li, Xing He, Xianming Su
{"title":"VisualDB: Managing and Publishing Scientific Data on the Web","authors":"Zhihong Shen, Jianhui Li, Chengzan Li, Xing He, Xianming Su","doi":"10.1109/CyberC.2011.70","DOIUrl":"https://doi.org/10.1109/CyberC.2011.70","url":null,"abstract":"Scientific data have become an important part of human knowledge and are playing an important role in knowledge discovery and subsequent scientific research. Some systems and tools are developed to help data owners manage and publish their data online. However, a generic integration framework for relational databases and files is still absent. This paper presents VisualDB as a Web-based management and publishing tool for scientific data, which connects relational records and files distributed in multiple distributed repositories, serving them as a whole data source through VdbServer. After reviewing related work, the Linked Entities Model (LEM) is proposed as a general logical model for representing relational records and files. Then problems and corresponding solutions of managing and publishing scientific data are systematically discussed. After introducing the architecture of VisualDB, the paper is concluded with introduction of application and future work of VisualDB.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123208462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-metric Opportunistic Routing for VANETs in Urban Scenario","authors":"Qi Chen, Nan Cheng, Xinhong Wang, Fuqiang Liu","doi":"10.1109/CyberC.2011.29","DOIUrl":"https://doi.org/10.1109/CyberC.2011.29","url":null,"abstract":"Vehicular Ad hoc Networks (VANETs) have received great attention in recent years, and multi-hop routing becomes an important issue for VANETs-based applications. This paper introduces an routing protocol based on opportunistic forwarding called Multi-Metric Opportunistic Routing (MMOR), which imports the multi metrics into analysis of the best opportunistic next forward node while route link is being established. Our proposed routing protocols is analyzed in urban scenario compared with the typical geographical routing protocol GPSR and the well-known mobile ad hoc network routing protocol AODV. The simulation results show that MMOR outperforms others in terms of the packet drop ratio, end-to-end delay and packet throughput.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121113986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid File System Using NAND-Flash SSD","authors":"Jaechun No","doi":"10.1109/CyberC.2011.67","DOIUrl":"https://doi.org/10.1109/CyberC.2011.67","url":null,"abstract":"In this paper, we present a hybrid file system, called N-hybrid (New-form of hybrid) file system, whose main objective is to integrate the strengths of HDD and SSD, to provide a large-scale file system space in a cost-effective way. N-hybrid was designed to take advantage of SSD's high I/O performance while providing a flexible internal structure to integrate excellent sequential performance of a legacy file system, such as ext2 or xfs. The performance evaluation demonstrates that achieving high I/O performance is possible by combining vast, low-cost HDD storage space with a small portion of SSD. Several experiments were conducted to verify the performance of N-hybrid.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129632886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Calculus for the Validation of Automotive Ethernet In-vehicle Network Configurations","authors":"M. Manderscheid, Falk Langer","doi":"10.1109/CyberC.2011.42","DOIUrl":"https://doi.org/10.1109/CyberC.2011.42","url":null,"abstract":"Automotive functions require validation of the underlying network in advance. Especially driver assistance functions may require hard time bounds concerning their communication infrastructure. In several works analytical models have been introduced, enabling the calculation of worst case delays for realtime applications using Ethernet as communication technology. On the other hand considerable effort has been spend to evaluate Ethernet for the use in automotive in-vehicle networks using simulation tools and prototypes. Showing that Ethernet can be used in general for the automotive use, they did not make an assertion about what happens if the worst case occurs. In this work we show by means of an analytic model the worst case analysis of a sample automotive Ethernet network configuration. We show that this configuration satisfies a current set of automotive functions requirements -- even for the worst case.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116387863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xidong Wu, Zhengye Liu, Yali Liu, Menglin Liu, C. Yang, Jin Wang
{"title":"QoS Monitoring and Troubleshooting of a Large Scale IPTV Deployment","authors":"Xidong Wu, Zhengye Liu, Yali Liu, Menglin Liu, C. Yang, Jin Wang","doi":"10.1109/CyberC.2011.41","DOIUrl":"https://doi.org/10.1109/CyberC.2011.41","url":null,"abstract":"Several network segments are involved in a large scale IPTV deployment, from the original video content server to the set-top-box (STB). Each network segment could be error-prone. QoS monitoring and troubleshooting are critical to guarantee satisfying user experience. In this paper, we discuss QoS monitoring and troubleshooting in AT&T U-Verse, one of the largest IPTV deployments in the world.We present the overall architecture of U-Verse, with a focus on QoS. Furthermore, we review the current efforts in U-Verse on QoS monitoring and troubleshooting, as well as their challenges and opportunities. Moreover, we provide a case study on how to troubleshoot the U-Verse IPTV system with the data collected by current QoS monitoring and troubleshooting infrastructure.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114606530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Algebraic Signatures for Remote Data Possession Checking","authors":"Lanxiang Chen","doi":"10.1109/CyberC.2011.56","DOIUrl":"https://doi.org/10.1109/CyberC.2011.56","url":null,"abstract":"Outsourcing storage enables users to access their data anywhere and at any time. It also can comply with a growing number of regulations. However, because of security and reliability, outsourcing storage is not widely adopted. When users store their data in outsourced storage server, they mostly concern about whether the data is intact. This is the goal of remote data possession checking (RDPC) schemes. This paper proposes an algebraic signature based RDPC scheme. Algebraic signature can improve efficiency and the running of algebraic signature can achieve tens to hundreds of megabytes per second. It allows verification without the need for the challenger to compare against the original data. The challenge/response protocol transmits a small, constant amount of data. The user needs to store only two secret keys and several random numbers. The algebraic property of algebraic signatures makes it possible to propose an efficient challenge updating method. Finally, experiment results reveal that the performance is bounded by disk I/O and not by algebraic signature and cryptographic computation.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116141363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Charging Model Research of Infrastructure Layer in Cloud Computing Based on Cost-Profit Petri Net","authors":"Lirui Bai, Tong Li, Xinjun Wu, Zhongwen Xie","doi":"10.1109/CyberC.2011.77","DOIUrl":"https://doi.org/10.1109/CyberC.2011.77","url":null,"abstract":"Cloud computing is a rising IT industry. How to charge for cloud computing is an important problem to be solved urgently at present. By analyzing and sorting, this article designs a charging model based on infrastructure layer in cloud computing called the infrastructure cloud. This article also proposes a Petri net which introduces costs and profits. A problem that attracts common concern in industrial circles. Based on the cost-profit Petri net, this article contributes to modeling design and analysis about charging model in cloud computing infrastructure layer.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122141958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aspect-Oriented Web Service Composition: A Petri Net Based Approach","authors":"Deivamani Mallayya, Baskaran Ramachandran","doi":"10.1109/CyberC.2011.24","DOIUrl":"https://doi.org/10.1109/CyberC.2011.24","url":null,"abstract":"In the various approaches of web service compositions proposed by the researcher, Aspect Oriented Web Service Composition (AOWSC) is the most formal way of composition. Composition is a set of relevant candidate web service, synchronously tied up with each other, delivered to the requestor at run time based on the service request. In par with aspect orientation, the candidate web services are developed as aspects, dynamically selected at run time based on the service request, composed through a weaving mechanism and thus handle composition. The weaving mechanism is the heart of AOWSC, as it specifies the order in which the candidate web service has to be synchronously presented with respect to each other. The paper also projects this formal approach of aspect oriented web service composition by using Petri Net algebra.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117230653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Parallelized Network Traffic Classification Based on Hidden Markov Model","authors":"X. Mu, Wenjun Wu","doi":"10.1109/CyberC.2011.27","DOIUrl":"https://doi.org/10.1109/CyberC.2011.27","url":null,"abstract":"This paper implemented a network traffic classification method on the basis of Guassian Mixture Model-Hidden Markov Model using packet-level properties in network traffic flows (PLGMM-HMM). Our model firstly builds PLGMM-HMMs via two packet-level properties, inter packet time and payload size, respectively; then, we construct the estimation function by computing the F-Measure value through classifying another training set using the PLGMM-HMMs. Hadoop Streaming based MapReduce has been evaluated while performing our classification experiment. Results show that our PLGMM-HMM based classification method could obtain considerable accuracy, giving out the accuracy over 90% on collected datasets, and comparatively outperforming classifiers based on HMMs with variables obeying other distributions. It is recommended that this framework could be applied to other machine learning methods as a multi-classifier template.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122680635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}