2016 17th International Telecommunications Network Strategy and Planning Symposium (Networks)最新文献

筛选
英文 中文
Requirement modeling language for the dynamic node integration problem 针对动态节点集成问题的需求建模语言
Yu Nakayama, K. Sezaki
{"title":"Requirement modeling language for the dynamic node integration problem","authors":"Yu Nakayama, K. Sezaki","doi":"10.1587/TRANSCOM.2017EBP3248","DOIUrl":"https://doi.org/10.1587/TRANSCOM.2017EBP3248","url":null,"abstract":"The population in industrialized countries will decline over the coming decades. Node integration in low-demand areas will improve the efficiency of access networks in this approaching age of depopulation. A dynamic node integration model has been developed to organize the optimal plan for closing nodes over the planning horizon. However, the existing model does not consider the requirements of network carriers. In actual situations, network carriers often want to specify the way each node is managed, regardless of the mathematical optimality of the solution. This paper proposes a requirement modeling language for the dynamic node integration problem, with which the requirements of network carriers can be described and satisfied. When this integration problem is solved using the requirement statements described by the proposed requirement modeling language, the calculated optimal solution always satisfies the requirements. The validity of the proposed method was evaluated with computer simulations.","PeriodicalId":239896,"journal":{"name":"2016 17th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121191343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network management based QoE estimation for adaptive streaming over HTTP 基于QoE估计的HTTP自适应流网络管理
Tan Phan-Xuan, E. Kamioka
{"title":"Network management based QoE estimation for adaptive streaming over HTTP","authors":"Tan Phan-Xuan, E. Kamioka","doi":"10.1109/NETWKS.2016.7751173","DOIUrl":"https://doi.org/10.1109/NETWKS.2016.7751173","url":null,"abstract":"This decade has been marked with tremendous growth of video streaming which has been known as “bandwidth killer service”. Unmanaged services or Over-the-top (OTT) services now become more and more popular in the entertainment industry. However, it is easy to realize that those services' providers do not guarantee a stable video quality for users because they cannot control the underlying network condition at the users' side. In order to deal with this problem, several solutions have been proposed but this problem comprises of many aspects needed to be coped with. Our research comes up with the idea of performing network management referring to video quality perceived from users. In this paper, we also study the effects of available bandwidth on latency and provide an insight into the relationship between Quality of Experience (QoE) and available bandwidth.","PeriodicalId":239896,"journal":{"name":"2016 17th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128446696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A coalitional game for femtocell clustering in OFDMA macro-femtocell networks OFDMA宏飞蜂窝网络中飞蜂窝聚类的联合对策
Katty Rohoden, Rebeca L. Estrada, H. Otrok, Z. Dziong
{"title":"A coalitional game for femtocell clustering in OFDMA macro-femtocell networks","authors":"Katty Rohoden, Rebeca L. Estrada, H. Otrok, Z. Dziong","doi":"10.1109/NETWKS.2016.7751179","DOIUrl":"https://doi.org/10.1109/NETWKS.2016.7751179","url":null,"abstract":"In this paper, we tackle the problem of resource management in macro-femtocell networks. Dense deployment of femtocells imposes several challenges for a cluster-based resource allocation. Some of those challenges are the trade-off between the level of offloaded traffic from macrocell and bandwidth allocated to femto-tier, the fair distribution of resources, and the mitigation of inter-cluster interference. To overcome these limitations, we propose a coalitional game to form clusters of femtocells that can reduce the resource allocation complexity. Stable clusters are formed based on the core model. Our proposal mainly consists of three components. Namely, a femtocell selection for public users, a coalitional game where cooperative femtocells are rewarded, and a Weighted Water Filling algorithm to allocate resources. Our solution is performed under a rewarding model, which is based on an ideal spectral efficiency and on an effective spectral efficiency. We compare the results of our rewarding model with a non-cooperative model, where femtocells work in closed access mode. Simulation results demonstrate that our proposal improves the femto-tier throughput and the satisfaction of femtocells subscribers.","PeriodicalId":239896,"journal":{"name":"2016 17th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123202875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Modeling and optimization of Content Delivery Networks with heuristics solutions for the Multidimensional Knapsack Problem 多维背包问题的启发式内容交付网络建模与优化
Veronica Quintuna, Maxime Laye
{"title":"Modeling and optimization of Content Delivery Networks with heuristics solutions for the Multidimensional Knapsack Problem","authors":"Veronica Quintuna, Maxime Laye","doi":"10.1109/NETWKS.2016.7751146","DOIUrl":"https://doi.org/10.1109/NETWKS.2016.7751146","url":null,"abstract":"The explosion of Internet traffic mainly due to multimedia services is bringing real challenges to Internet Service Providers (ISPs). Content Delivery Networks (CDN) aim to face this traffic growth by replicating content as close as possible to end-users. Nevertheless, several issues related to the localization of CDN nodes are involved in the CDN design. The goal of the CDN optimization is to increase the volume of traffic supported by the installed infrastructure.","PeriodicalId":239896,"journal":{"name":"2016 17th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128062891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Aircraft harness measurement campaign and investigations on introducing one pair Ethernet 飞机线束测量运动及引入一对以太网的研究
A. Elefsiniotis, Sebastian Hahn
{"title":"Aircraft harness measurement campaign and investigations on introducing one pair Ethernet","authors":"A. Elefsiniotis, Sebastian Hahn","doi":"10.1109/NETWKS.2016.7751177","DOIUrl":"https://doi.org/10.1109/NETWKS.2016.7751177","url":null,"abstract":"In this paper, the results of a measurement campaign on the data harness of an A321 aircraft will be presented. The S-parameters of the cabin harnesses of an existing system are illustrated, and these parameters will be used to model a cabin architecture based on the existing harnesses. This A321 aircraft, where the measurements were performed, is a 20-year-old aircraft; hence possible cable aging will be discussed. The currently used aeronautical-certified cables show a great potential on introducing new technologies to the aircraft cabin, driven from the automotive industry (like 100BASE-T1 or 1000BASE-T1), thus increasing the available bandwidth by a factor of up to 500 times compared with the existing systems, without increasing the most important factor for aircrafts, weight.","PeriodicalId":239896,"journal":{"name":"2016 17th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128838455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reward-based online routing and spectrum assignment in flex-grid optical networks 柔性网格光网络中基于奖励的在线路由和频谱分配
R. Reyes, T. Bauschert
{"title":"Reward-based online routing and spectrum assignment in flex-grid optical networks","authors":"R. Reyes, T. Bauschert","doi":"10.1109/NETWKS.2016.7751160","DOIUrl":"https://doi.org/10.1109/NETWKS.2016.7751160","url":null,"abstract":"In this paper we propose an online, reward-based routing and spectrum assignment (RSA) method for multirate flex-grid optical networks. The method, denoted as MDP-RSA, is derived from a flex-grid optical link model based on the theory of Markov decision processes. Assuming that connections arrive randomly offering a reward to the system, the objective is to take the best decision on admission, routing and spectrum assignment for each incoming connection request, such that the rate of reward from the network is maximized. This is accomplished by only admitting connections that bring a positive reward gain to the network. For selected network scenarios, the reward loss (i.e. the ratio of the reward of rejected to offered connections) caused by the MDP-RSA is compared to that of an online scheme, which admits connections on the shortest path that fulfils the contiguity and continuity constraints. It is observed that the MDP-RSA yields a lower reward loss. Furthermore, it is shown how to provide grade of service control on individual connection classes. Compared to existing online RSA schemes, the MDP-RSA is much more flexible as the connection reward parameters can be tailored to different optimization objectives (e.g. maximization of either carried traffic or economic revenue).","PeriodicalId":239896,"journal":{"name":"2016 17th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125842724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Non-intentional mobility of data sessions across mobile networks while roaming because of operators' mobile DNS architecture 由于运营商的移动DNS架构,漫游时跨移动网络的数据会话的非故意移动性
G. Boulmier
{"title":"Non-intentional mobility of data sessions across mobile networks while roaming because of operators' mobile DNS architecture","authors":"G. Boulmier","doi":"10.1109/NETWKS.2016.7751158","DOIUrl":"https://doi.org/10.1109/NETWKS.2016.7751158","url":null,"abstract":"The Domain Name System (DNS) is used almost everywhere in mobile networks to determine the IP addresses of the network elements and thanks to the DNS architecture of the inter-operator IP backbone network, a network element of a public mobile network (PMN) can easily determine IP addresses of any other PMN. The analysis of some customers' complaints showed that it could be the cause of billing mistakes. Consequently we decided to go further into the reasons behind. The aim of the paper is to alert operators to the risk of data session mobility across mobile networks when inter-operator DNS procedures allow the new PMN to exchange with the old PMN and retrieve the context of the data session. It explains the associated risk of charging/billing problems for the roamers because of non-intentional inter-PMN mobility in case the home charging/billing architecture is not ready to deal with a PMN change during a data session. Finally, it introduces a few solutions to forbid/control inter-PMN mobility of mobile data sessions.","PeriodicalId":239896,"journal":{"name":"2016 17th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130969112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Bubble Burst (ABB): Mitigating DDoS attacks in Software-Defined Networks 自适应泡沫爆发(ABB):减轻软件定义网络中的DDoS攻击
Danish Sattar, A. Matrawy, Olufemi Adeojo
{"title":"Adaptive Bubble Burst (ABB): Mitigating DDoS attacks in Software-Defined Networks","authors":"Danish Sattar, A. Matrawy, Olufemi Adeojo","doi":"10.1109/NETWKS.2016.7751152","DOIUrl":"https://doi.org/10.1109/NETWKS.2016.7751152","url":null,"abstract":"The availability of online services is threatened by the Distributed Denial of Service (DDoS) attacks. As computing resources are getting cheaper, DDoS attacks are becoming more frequent and powerful. When DDoS attacks are directed towards a specific service, a small number of bots can overwhelm the service, making it unavailable to legitimate users. This paper presents Adaptive Bubble Burst (ABB), which takes advantage of the logically centralized architecture of Software-Defined Networks to provide mitigation against DDoS attacks that are targeted towards a specific service. ABB works by dispersing the incoming traffic in the network. Our experimental results show that ABB mitigates the DDoS attacks by enhancing the availability of a specific network resource.","PeriodicalId":239896,"journal":{"name":"2016 17th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116605412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Embedding security and privacy into the development and operation of cloud applications and services 将安全和隐私嵌入到云应用程序和服务的开发和运营中
Tran Quang Thanh, S. Covaci, T. Magedanz, P. Gouvas, A. Zafeiropoulos
{"title":"Embedding security and privacy into the development and operation of cloud applications and services","authors":"Tran Quang Thanh, S. Covaci, T. Magedanz, P. Gouvas, A. Zafeiropoulos","doi":"10.1109/NETWKS.2016.7751149","DOIUrl":"https://doi.org/10.1109/NETWKS.2016.7751149","url":null,"abstract":"This paper introduces an approach allowing cloud application developers, service providers to consider security and privacy requirements across the application lifecycle. Specifically, a DevOps framework has been described that took into account several emerging technologies such as Network Functions Virtualization (NFV) and Microservice Pattern Design. As an illustration, a proof-of-concept application in the healthcare domain is presented to support such direction.","PeriodicalId":239896,"journal":{"name":"2016 17th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124958401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Virtual topologies for abstraction service for IP-VPNs ip - vpn抽象服务的虚拟拓扑
Lavanya Sivakumar, Jayaram Balabaskaran, K. Thulasiraman, S. Arumugam
{"title":"Virtual topologies for abstraction service for IP-VPNs","authors":"Lavanya Sivakumar, Jayaram Balabaskaran, K. Thulasiraman, S. Arumugam","doi":"10.1109/NETWKS.2016.7751178","DOIUrl":"https://doi.org/10.1109/NETWKS.2016.7751178","url":null,"abstract":"VPN service providers(VSP) and IP-VPN customers have maintained service demarcation boundaries between their routing and signaling entities resulting in the VPN's viewing the VSP network as an opaque entity and therefore limiting interaction between the two. Ravi et. al in [1] introduced the notion of topology abstraction as a means for sharing the core topology information as abstract graphs associated with QoS metric information. This has been further studied in a series of papers [2], [9] and [4]. In the more recent work [4], three decentralized schemes to generate topology abstractions were proposed and evaluated through extensive simulations. These schemes used some very powerful tools from graph theory and combinatorial optimization. But the topology considered in [4] for abstraction is very simple and sparse. In this paper we continue this study and propose two new schemes for topology abstraction. Specifically, given a core network with node set V, and also given the node-to-node maximum flow matrix F = [f(u, v)] for any connected graph G = (V *,E) with V * a subset of V, we show how to assign capacities to the edges of G such that the maximum available flow between any pair of vertices u, v ∈ V * in G is at most the maximum available flow between u and v in the core network. Though this methodology is applicable to any graph, we seek abstract topologies with certain other desirable properties: low degree, number of edges being linear in the number of vertices, amenable to survivable logical topology routing in an IP over WDM optical networks etc. Chordal graphs have such properties. In this paper we show how to construct 2-vertex and 2-edge connected chordal graphs, starting from the Gomory-Hu tree of the flow matrix of the core network. Using the theory of graph augmentation presented in [10] one can develop other sparse virtual1 topologies possessing the properties demanded by an application.","PeriodicalId":239896,"journal":{"name":"2016 17th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130350761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信