2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)最新文献

筛选
英文 中文
Adaptive survivability algorithm for path protection with various traffic classes in elastic optical networks 弹性光网络中不同流量类别路径保护的自适应生存性算法
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-10-01 DOI: 10.1109/RNDM.2015.7324309
Michal Aibin, K. Walkowiak
{"title":"Adaptive survivability algorithm for path protection with various traffic classes in elastic optical networks","authors":"Michal Aibin, K. Walkowiak","doi":"10.1109/RNDM.2015.7324309","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7324309","url":null,"abstract":"The recently proposed concept of Elastic Optical Networks (EON) is expected to largely improve optical network resource utilization due to the possibility to divide the optical spectrum into relatively narrow segments called slices. In turn, the increasing position of numerous IT solutions in the modern world as well as the growth of network traffic trigger the need to develop robust and cost-efficient protection approaches, since the failures affecting the network can occur in any time. Therefore, in this paper we focus on the issues related to dynamic routing in EON with additional survivability requirements. The main contribution of this paper is a new adaptive algorithm for dynamic routing in survivable EON. The key novelty of our approach is the possibility to handle various traffic classes in a different way in terms of the required protection level. Our new method was extensively tested using representative network topologies with realistic assumptions concerning the network traffic and operation of the EON. The obtained results clearly indicate that the our algorithm significantly outperforms classical protection methods including Dedicated Path Protection and Shared Backup Path Protection in terms of two performance metrics, namely, bandwidth blocking probability and ratio of traffic lost (not restored) due to network failures.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130249784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Computing stochastic bounds of network distributions of time before failure 计算故障前时间网络分布的随机边界
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-10-01 DOI: 10.1109/RNDM.2015.7325221
J. Fourneau
{"title":"Computing stochastic bounds of network distributions of time before failure","authors":"J. Fourneau","doi":"10.1109/RNDM.2015.7325221","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7325221","url":null,"abstract":"We present a new method based on strong stochastic bounds and numerical computations on discrete distributions of failure time of the links to analyze the distribution of time before failure for some networks. The method provides a tradeoff between accuracy and computation times. We present the theory, the complexity of the analysis, the algorithms, and a small example to illustrate the approach. The method allows to model dependent failures.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":" 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120984554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection and prevention of firewall-rule conflicts on software-defined networking 软件定义网络中防火墙规则冲突的检测与预防
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-10-01 DOI: 10.1109/RNDM.2015.7325238
Ferney A. Maldonado-Lopez, E. Calle, Y. Donoso
{"title":"Detection and prevention of firewall-rule conflicts on software-defined networking","authors":"Ferney A. Maldonado-Lopez, E. Calle, Y. Donoso","doi":"10.1109/RNDM.2015.7325238","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7325238","url":null,"abstract":"Software-Defined Networking (SDN) is a different approach to manage a network by software. It could use well-defined software expressions and predicates to regulate network behavior. Current SDN controllers, such as Floodlight, offer a framework to develop, test and run applications that control the network operation, including the firewall function. However, they are not able to validate firewall policies, detect conflicts; neither avoids contradictory configurations on network devices. Some compilers only detect conflicts by a subset of the language; hence, it cannot detect conflicts related to contradicting rules with security controls. This paper presents our framework based on Alloy called FireWell. FireWell is able to model firewall policies as formal predicates to validate, detect and prevent conflicts in firewall policies. In addition we present the implementation of FireWell and test it using the Floodlight controller and firewall application.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127902867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Statistical methods for diameter constrained reliability estimation in rare event scenarios 罕见事件情景下直径约束可靠性估计的统计方法
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-10-01 DOI: 10.1109/RNDM.2015.7325236
María Elisa Bertinat, H. Cancela, Maria Fernanda Gonzalez, F. Robledo, P. Romero
{"title":"Statistical methods for diameter constrained reliability estimation in rare event scenarios","authors":"María Elisa Bertinat, H. Cancela, Maria Fernanda Gonzalez, F. Robledo, P. Romero","doi":"10.1109/RNDM.2015.7325236","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7325236","url":null,"abstract":"The object under study is a metric associated to each graph, called diameter constrained reliability. The exact evaluation of the diameter constrained reliability belongs to the class of NP-Hard problems, and becomes prohibitive in large graphs. In the literature, several estimation methods have been developed, inspired in statistics, combinatorics, algebra and other branches of knowledge. We are focused on the statistical evaluation of the diameter constrained reliability under rare event scenarios. Under these assumptions (highly reliable networks), Crude Monte Carlo method is not accurate. More sophisticated methods meet both accuracy and bounded relative error. We compare the performance of two variance reduction methods, to know, Approximate Zero Variance Importance Sampling (AZVIS) and Recursive Variance Reduction (RVR). These methods are compared to Crude Monte Carlo in terms of accuracy and computational effort. Numerical comparisons show the improvement in the global performance of these alternative statistical methods. The paper is closed with a discussion of novel hybrid methods to address network reliability analysis in robust networks, when failures represent a rare event.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131613412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Probabilistic flow marking for IP traceback (PFM) IP回溯(PFM)的概率流标记
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-10-01 DOI: 10.1109/RNDM.2015.7325234
V. A. Foroushani, A. N. Zincir-Heywood
{"title":"Probabilistic flow marking for IP traceback (PFM)","authors":"V. A. Foroushani, A. N. Zincir-Heywood","doi":"10.1109/RNDM.2015.7325234","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7325234","url":null,"abstract":"Distributed-Denial-Of-Service attacks are one of the hardest security issues on the Internet today. One difficulty to counter these attacks is to trace the source of the attacks because they often use spoofed source IP addresses to hide their original source. This paper presents a new IP traceback scheme, called Probabilistic Flow Marking (PFM). The goal is to trace anonymous flooding attacks on the network back toward their original source, even if the source is located behind a network address translation (NAT) or a proxy device. In this approach, PFM embeds a fingerprint in the packets randomly. This enables PFM to identify the origin of the traffic traversing through the Internet on a per flow basis, regardless of the source IP address spoofing. We evaluate PFM on three real-life Internet data sets from the CAIDA archives. Our evaluation results show that compared to the previous IP traceback schemes, PFM significantly decreases the number of marked packets required to traceback and represents a step forward in terms of performance and deployability.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126719046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Context-aware heterogeneous V2I communications 上下文感知的异构V2I通信
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-10-01 DOI: 10.1109/RNDM.2015.7325243
M. Sepulcre, J. Gozálvez, O. Altintas, Haris Kremo
{"title":"Context-aware heterogeneous V2I communications","authors":"M. Sepulcre, J. Gozálvez, O. Altintas, Haris Kremo","doi":"10.1109/RNDM.2015.7325243","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7325243","url":null,"abstract":"The automotive industry is currently focusing on the research and development of the IEEE 802.11p technology to support V2V and V2I communications. However, connected vehicles will benefit from exploiting heterogeneous communications technologies to satisfy the diverse functional and operational requirements of vehicular applications under variable context conditions. In this context, a key aspect is the adequate selection and management of the different radio access technologies that will be integrated in connected vehicles. This paper proposes a novel context-aware heterogeneous V2I communications technique that exploits context information to make intelligent decisions on the most adequate communications technology to use at each moment in order to improve both individual and system performance. The decision is directly made by each vehicle with assistance from the infrastructure. The results obtained demonstrate the benefits of the proposed technique, and its robustness to the variability and accuracy of the context information.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129926308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A time-evolving weighted-graph analysis of global petroleum exchange 全球石油交易的时变加权图分析
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-10-01 DOI: 10.1109/RNDM.2015.7325239
Rajgopal Yarlagadda, Srinath Pinnaka, Egemen K. Çetinkaya
{"title":"A time-evolving weighted-graph analysis of global petroleum exchange","authors":"Rajgopal Yarlagadda, Srinath Pinnaka, Egemen K. Çetinkaya","doi":"10.1109/RNDM.2015.7325239","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7325239","url":null,"abstract":"Networks have become an influential part of our society. New social ties are being formed or existing ties are removed in social networks. Technological networks, such as the Internet and power grid are heavily relied upon to perform daily tasks, and biological networks inspire us to develop and optimize processes. Much of the existing studies consider networks as unweighted graphs, predominantly because of lack of data and tools. However, weights influence the importance of nodes or links in a network, and considering the weights is realistic in graph analysis. Orthogonal to the weighted graphs, the evolution of graphs can help us predict the future state of a network. In this paper, we study the evolution of global petroleum exchange as a weighted graph. We analyze 17 years of global petroleum imports and exports data between all counties with samples and show that the countries' import and export increased. We also rank the most important countries according to important graph centrality metrics and our rankings vary based on the metric being used. The evolution of the global petroleum exchange graph represents that new ties between countries formed and the graph size increased.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122517264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SRLG fault localization in all-optical networks 全光网络SRLG故障定位
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-10-01 DOI: 10.1109/RNDM.2015.7325232
M. L. Ali, P. Ho, János Tapolcai
{"title":"SRLG fault localization in all-optical networks","authors":"M. L. Ali, P. Ho, János Tapolcai","doi":"10.1109/RNDM.2015.7325232","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7325232","url":null,"abstract":"This paper introduces a novel m-trail allocation method for achieving local unambiguous failure localization (L-UFL) in all-optical mesh networks under the monitoring burst (m-burst) framework, in which a single monitoring node (MN) can localize any multi-link failure with up to d links in a (d+1)-connected network by inspecting the optical bursts traversing through the MN where each m-trails is originated from the MN. The proposed m-trail allocation method is based on the theory that when each undirected link is traversed by a unique set of m-trails and the m-trail set is not a subset of the m-trails traversing any shared risk link group (SRLG) having d links whenever the SRLG is disjoint from the link, each SRLG having 1 to d links will be traversed by a unique set of m-trails. We prove the theorem for m-trail allocation, formulate an integer linear program (ILP) based on the theorem, and implement the method for up to 3-link failures. Numerical results show that the proposed method outperform the previous arts that do not use post-processing to reduce the m-trails in the solution.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129614915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of a virtualization layer supporting P2P downloading of contents in VANETs VANETs中支持P2P内容下载的虚拟化层的性能分析
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-10-01 DOI: 10.1109/RNDM.2015.7325246
Jose Victor Saians-Vazquez, Martín López Nores, Y. Blanco-Fernández, J. Pazos-Arias, J. Bravo-Torres
{"title":"Performance analysis of a virtualization layer supporting P2P downloading of contents in VANETs","authors":"Jose Victor Saians-Vazquez, Martín López Nores, Y. Blanco-Fernández, J. Pazos-Arias, J. Bravo-Torres","doi":"10.1109/RNDM.2015.7325246","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7325246","url":null,"abstract":"The VaNetLayer is a cluster-based approach to handle communications in vehicular ad-hoc networks, furnishing an abstraction of fixed geographical regions served by virtual nodes as a means to tackle the challenges raised by the mobility of the real nodes. Previous studies have shown that the VaNetLayer can be used to implement routing protocols that achieve good performance -in terms of packet delivery ratio, latencies and routing overhead- in canonical scenarios involving communications between pairs of vehicles chosen at random. In this paper, we assess the performance of the VaNetLayer in more complex scenarios of peer-to-peer downloading and dissemination of contents, which has long been advocated as one of the foreseeable applications of VANETs.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"103 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117292363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Progressive network recovery in optical core networks 光核心网中的渐进式网络恢复
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-10-01 DOI: 10.1109/RNDM.2015.7325216
Kassem Sabeh, M. Tornatore, F. Dikbiyik
{"title":"Progressive network recovery in optical core networks","authors":"Kassem Sabeh, M. Tornatore, F. Dikbiyik","doi":"10.1109/RNDM.2015.7325216","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7325216","url":null,"abstract":"Disasters hit telecommunication structures every year. As Earth becomes more disaster-prone, telecom networks, and especially optical networks due to their high capacity, should be designed to prepare against disasters. Although disaster resiliency for optical core networks has been subject of significant recent research, damages on the network infrastructure due to the direct or indirect impacts of disasters are usually inevitable. In fact, even if undamaged parts of the network may still be functional, soon the survived resources might get exhausted to serve the residual traffic from unaffected regions. Besides, traffic from affected regions should be recovered quickly to help survivors and rescue teams to recover at least the essential communication services. Full recovery may take weeks and multi-stage progressive-recovery plans are needed. Thus, efficient recovery methods for optical core networks should also be designed. There are only a few research on progressive network recovery problem, mostly dealing with generic IP transport networks. In this work, we investigate the problem of progressive network recovery with a specific focus on the role of different optical network architectures, namely opaque, transparent, and elastic optical networks. We formulate the problem into a set of Mixed Integer Linear Programming (MILP) models. The numerical examples show that optical networks that exploit recent technological advances, i. e., elastic optical networks, perform better than classical architectures (opaque and transparent optical networks) in terms of traffic recovered, due to its higher spectrum-utilization efficiency. The numerical examples also showed that pre-deploying some spare transponders can significantly increase network recovery performance.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116311877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信