2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)最新文献

筛选
英文 中文
Modeling and Simulation of Spark Streaming 火花流的建模与仿真
Jia-Chun Lin, Ming-Chang Lee, Ingrid Chieh Yu, E. Johnsen
{"title":"Modeling and Simulation of Spark Streaming","authors":"Jia-Chun Lin, Ming-Chang Lee, Ingrid Chieh Yu, E. Johnsen","doi":"10.1109/AINA.2018.00068","DOIUrl":"https://doi.org/10.1109/AINA.2018.00068","url":null,"abstract":"As more and more devices connect to Internet of Things, unbounded streams of data will be generated, which have to be processed \"on the fly\" in order to trigger automated actions and deliver real-time services. Spark Streaming is a popular realtime stream processing framework. To make efficient use of Spark Streaming and achieve stable stream processing, it requires a careful interplay between different parameter configurations. Mistakes may lead to significant resource overprovisioning and bad performance. To alleviate such issues, this paper develops an executable and configurable model named SSP (stands for Spark Streaming Processing) to model and simulate Spark Streaming. SSP is written in ABS, which is a formal, executable, and object-oriented language for modeling distributed systems by means of concurrent object groups. SSP allows users to rapidly evaluate and compare different parameter configurations without deploying their applications on a cluster/cloud. The simulation results show that SSP is able to mimic Spark Streaming in different scenarios.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133403542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
End-to-End Efficient Heuristic Algorithm for 5G Network Slicing 5G网络切片的端到端高效启发式算法
Amal Kammoun, N. Tabbane, G. Diaz, Abdulhalim Dandoush, N. Achir
{"title":"End-to-End Efficient Heuristic Algorithm for 5G Network Slicing","authors":"Amal Kammoun, N. Tabbane, G. Diaz, Abdulhalim Dandoush, N. Achir","doi":"10.1109/AINA.2018.00065","DOIUrl":"https://doi.org/10.1109/AINA.2018.00065","url":null,"abstract":"Coupling Software Defined Networking (SDN) and Network Function virtualization (NFV) has proved to be a promising paradigm for flexible resource provisioning in future networks. Network slicing is a very recent methodology that can be used in this paradigm for accommodating new services with wide different requirements over the same physical network. In this work, we propose a mathematical formulation of an optimization problem for an end-to-end (E2E) network slices deployment for different 5G-based use-cases. Each use case such as video streaming, intelligent transport, e-Health and public safety, has its own availability, reliability and delay tolerance requirements. Then, in view of the fact that the optimization problem is NP-Hard, a low-cost and efficient heuristic algorithm has been proposed. Last, the efficiency of the proposed algorithm is validated through extensive simulation. Applying our algorithm improves the quality of service (QoS) afforded to the users.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115448556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
SANGN: A New Service Oriented Architecture for Provisioning of NGN Scalable Multimedia Services 面向业务的NGN可扩展多媒体业务提供新体系结构
Juliana C. S. Andrade, R. B. C. Ribeiro, R. Villaça, M. Martinello, Celso A. S. Santos
{"title":"SANGN: A New Service Oriented Architecture for Provisioning of NGN Scalable Multimedia Services","authors":"Juliana C. S. Andrade, R. B. C. Ribeiro, R. Villaça, M. Martinello, Celso A. S. Santos","doi":"10.1109/AINA.2018.00080","DOIUrl":"https://doi.org/10.1109/AINA.2018.00080","url":null,"abstract":"The introduction of Next Generation Networks (NGN) has changed significantly the network service model. Vertical structures that are designed to each type of access have been replaced by horizontal structures. However, the service architecture has to be rebuilt to support the required agility within the horizontal structures. Our proposal, named SANGN, is based on a full integration of Open Services Gateway Initiative (OSGi) with Java Agent DEvelopment (JADE) framework for providing multimedia services of IP Multimedia Subsystem (IMS). We have introduced a Televote service as a use case in order to validate the SANGN architecture ensuring the massive scalability of these services to meet the stringent multimedia requirements. Our implementation is able to adapt with a high dynamic load of the system, making use of a minimal set of computational resources seamlessly for the clients, providing IMS core components in the network infrastructure.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115811417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Julunga: A New Large-Scale Distributed Read-Write File Storage System for Cloud Computing Environments Julunga:面向云计算环境的新型大规模分布式读写文件存储系统
Hrishikesh Dewan, R. Hansdah
{"title":"Julunga: A New Large-Scale Distributed Read-Write File Storage System for Cloud Computing Environments","authors":"Hrishikesh Dewan, R. Hansdah","doi":"10.1109/AINA.2018.00138","DOIUrl":"https://doi.org/10.1109/AINA.2018.00138","url":null,"abstract":"We present in this paper the design of a large distributed file storage system called Julunga for cloud computing environments. Julunga is designed for federated data center environments where multiple numbers of data centers across the globe interconnect to each other and present a coherent single system view to end-users. In Julunga, the metadata, the namespace and the data blocks of the files are completely distributed with no hard limits on the number of files that can be accommodated in a single directory. Also, there is no physical limit on the size of a file. Julunga supports file of exabytes size with ease along with the number of concurrent users updating, reading and writing to the same file or a directory. The location of the data blocks of a file is determined by using functions, thus expunging the need for file allocation tables. Many new data structures and algorithms were designed earlier where locality and preferences of users are considered to provide optimal storage locations for files and metadata. We elaborate, in this paper, the design of fundamental building blocks of the distributed storage system and compare it with the designs of the earlier file storage systems.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114760047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Measuring Energy Consumption of a Wireless Sensor Node During Transmission: panStamp 测量无线传感器节点在传输过程中的能量消耗:panStamp
Sabrine Khriji, Rym Chéour, M. Goetz, Dhouha El Houssaini, I. Kammoun, O. Kanoun
{"title":"Measuring Energy Consumption of a Wireless Sensor Node During Transmission: panStamp","authors":"Sabrine Khriji, Rym Chéour, M. Goetz, Dhouha El Houssaini, I. Kammoun, O. Kanoun","doi":"10.1109/AINA.2018.00050","DOIUrl":"https://doi.org/10.1109/AINA.2018.00050","url":null,"abstract":"In most of the real-life application scenarios, where Wireless Sensor Networks (WSNs) are deployed, the energy is a limited and valuable resource. Many energy-based strategies were proposed in the literature to reduce the power consumption of sensor nodes and thus enhance the network lifetime. When those algorithms are developed and tested with some well-known network simulators like NS3, OPNET, the energy estimation aspect is not a key criterion, because these simulators have their own specific energy models. By implementing these algorithms in a real sensor node, the energy consumption can be measured and compared to the results provided by other previously implemented approaches. This paper proposes a method for estimating the energy consumption of a low power wireless node panStamp NRG 2.0. The proposed model calculates the consumed energy of the system, at run time for different operation cycles. Besides, since the biggest amount of energy is consumed during the communication, this paper aims to characterize the power consumption in the transmission state. A proper metric of the energy consumed per byte transmission pattern of the packets is provided. The results can be used to derive not only the energy consumption for other protocols but also the energy needed to transmit one byte as well as the payload size are given.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128752046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Evaluation of Routing Protocols for Opportunistic Networks in Scenarios with High Degree of People Renewal 高度人员更新场景下机会网络路由协议评价
Leonardo Chancay-Garcia, Jorge Herrera-Tapia, P. Manzoni, Enrique Hernández-Orallo, C. Calafate, Juan-Carlos Cano
{"title":"Evaluation of Routing Protocols for Opportunistic Networks in Scenarios with High Degree of People Renewal","authors":"Leonardo Chancay-Garcia, Jorge Herrera-Tapia, P. Manzoni, Enrique Hernández-Orallo, C. Calafate, Juan-Carlos Cano","doi":"10.1109/AINA.2018.00044","DOIUrl":"https://doi.org/10.1109/AINA.2018.00044","url":null,"abstract":"The performance of Opportunistic Networks relies mainly on users mobility. It is in fact mobility that creates the opportunities for contacts and therefore for data forwarding. The evaluation of these networks is usually based on either synthetic mobility models or real mobility traces generally characterized by a fixed number of users. In this paper, we focus on a mostly unexplored area characterized by crowded scenarios with people renewal, i.e., with users that can either enter or leave the evaluated scenario. By using a pedestrian mobility simulator we define realistic people mobility traces that allow the evaluation of different degrees of users densities and renewal rates. Using this methodology, we studied the performance of various existing routing protocols in scenarios with high degree of people renewal and by varying the messages sizes. The experiments confirm that the renewal rate has an important impact on the performance of the protocols, which becomes particularly evident when the message size is large. Overall, we observe that controlled flooding algorithm such as Spray & Wait can obtain good packet delivery results with lower overhead than with respect to probability based protocols, avoiding also the implementation complexity of the latters.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129611310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobile Privacy Protection Enhanced with Multi-access Edge Computing 多接入边缘计算增强移动隐私保护
Ping Zhang, M. Durresi, A. Durresi
{"title":"Mobile Privacy Protection Enhanced with Multi-access Edge Computing","authors":"Ping Zhang, M. Durresi, A. Durresi","doi":"10.1109/AINA.2018.00109","DOIUrl":"https://doi.org/10.1109/AINA.2018.00109","url":null,"abstract":"Nowadays cellular data network carries the majority of Internet mobile access traffic and becomes de facto the solution of accessing the Internet in a mobile fashion. However comparing to ordinary Internet access, connecting through cellular network yet provides equivalent connection stability or longevity, and more critically raises particular privacy concerns. Meanwhile, Mobile/Multi-access Edge Computing(MEC), as one of the most practical Edge Computing architectures, has great potentials of implementing(or enhancing) emerging network paradigms, such as 5G network, Fog computing, and Edge Cloud Computing. It roots in cellular networks, and could quickly become prevailing without long ramp-up years. We observed the opportunities of leveraging MEC to solve above issues. In this paper, we present our improved Mobility Support System(MSS) using MEC as a key pivot to protect a mobile user's network privacy with little impact on communication performance. While the system operation cost is reduced further, MSS could also close the gap of connection interruption for roaming mobile users.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130176307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Authenticated Network Coding for Software-Defined Named Data Networking 软件定义命名数据网络的认证网络编码
Ryma Boussaha, Y. Challal, A. Bouabdallah
{"title":"Authenticated Network Coding for Software-Defined Named Data Networking","authors":"Ryma Boussaha, Y. Challal, A. Bouabdallah","doi":"10.1109/AINA.2018.00160","DOIUrl":"https://doi.org/10.1109/AINA.2018.00160","url":null,"abstract":"Named Data Networking (or NDN) represents a potential new approach to the current host based Internet architecture which prioritize content over the communication between end nodes. NDN relies on caching functionalities and local data storage, such as a content request could be satisfied by any node holding a copy of the content in its storage. Due to the fact that users in the same network domain can share their cached content with each other and in order to reduce the transmission cost for obtaining the desired content, a cooperative network coding mechanism is proposed in this paper. We first formulate our optimal coding and homomorphic signature scheme as a MIP problem and we show how to leverage Software Defined Networking to provide seamless implementation of the proposed solution. Evaluation results demonstrate the efficiency of the proposed coding scheme which achieves better performance than conventional NDN with random coding especially in terms of transmission cost and security.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130903360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Contents Centric Interest Forwarding According to User Preference on NDN NDN上基于用户偏好的以内容为中心的兴趣转发
Tetsuro Kuniyasu, Tetsuya Shigeyasu
{"title":"A New Contents Centric Interest Forwarding According to User Preference on NDN","authors":"Tetsuro Kuniyasu, Tetsuya Shigeyasu","doi":"10.1109/AINA.2018.00043","DOIUrl":"https://doi.org/10.1109/AINA.2018.00043","url":null,"abstract":"Recently, performance for gathering the data over multihop wireless network becomes important by popularization of IoT technology. So, it is also desired that data centric communication strategy for the efficient data gathering and delivering while keeping network traffic low. This paper propose to implement new data centric Interest forwarding method according to dispositions of consumers on the NDN, to WLAN for achieving efficiently communication performance. For purpose, in this paper, we discusses to modify the NDN originally developed for wired network, for educing better communication performance even in the wireless communication networks. More concretely, we discusses the methods that are forwarding the Interest according to the dispositions of consumers to increase cache hit ratio by concentrating similar cache data on the given path. By the computer simulations, we clarify that our proposals well increase cache hit ratio by selecting proper route in accordance with the network conditions.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130409849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Statistical Framework to Forecast Duration and Volume of Internet Usage Based on Pervasive Monitoring of NetFlow Logs 基于NetFlow日志普适监测的互联网使用时长和流量预测统计框架
S. Sarmadi, Mingyang Li, S. Chellappan
{"title":"A Statistical Framework to Forecast Duration and Volume of Internet Usage Based on Pervasive Monitoring of NetFlow Logs","authors":"S. Sarmadi, Mingyang Li, S. Chellappan","doi":"10.1109/AINA.2018.00077","DOIUrl":"https://doi.org/10.1109/AINA.2018.00077","url":null,"abstract":"In this paper, we address an important and practical problem - namely to forecast the duration and volume of Internet usage of a subject based on pervasive and unobtrusive of past history. Unfortunately though, profiling users can have privacy ramifications. In this paper, we present a statistical framework to forecast duration and volume of Internet usage of subjects via processing NetFlow logs from routers. Briefly, NetFlow logs are network level information of IP packets as they traverse a router, but they do not contain the packet payload. In our experimental study, Internet traffic logs of octets and durations of 66 subjects in a college campus were collected (via privacy-preserving NetFlow records) in a pervasive and unobtrusive manner for a month. By applying times series forecasting techniques, we demonstrate that predictions on duration and volume of usage at future times can be made based on past usage, with very good precision. Furthermore, our results also show that with more historical data, prediction accuracy improves further. We believe that our problem in this paper has not been addressed in the literature. We also believe that our contributions in this paper have important consequences in enabling privacy preserving techniques to manage network resources for administrators, cyber security via behavioral based authentication, and smarter advertising.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129191307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信