{"title":"Explicit topology management for continental-scale airborne networks","authors":"Ben Newton, Jay Aikat, K. Jeffay","doi":"10.1109/INFCOMW.2017.8116355","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116355","url":null,"abstract":"Large-scale high-capacity communication networks among airborne platforms are quickly becoming a reality. Today, both Google and Facebook are seeking to form networks between high flying balloons and drones in an effort to provide Internet connections from the upper atmosphere to users on the ground. These airborne networks, that will likely use directional communication links between nodes to achieve high rates over long distances, present new networking challenges. One such challenge is the fact that the topology of these networks must be explicitly and constantly managed, ensuring that each directional data link is always pointed at and connected with the appropriate neighbor to yield an acceptable global topology. In this work we present several topology generation algorithms that can be used by a topology management framework to manage the topology of a continental-scale airborne network in a distributed manner. We give a detailed analysis of the strengths and weaknesses of these algorithms, based on their performance on numerous sets of nodes of various densities. We then simulate the topology management and routing with a geographic routing protocol in a network made up of hundreds of commercial aircraft in the continental United States, utilizing actual aircraft position data.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"487 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116323478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An LTE-based optimal resource allocation scheme for delay-sensitive M2M deployments coexistent with H2H users","authors":"Mohammed Y. Abdelsadek, Y. Gadallah, M. Ahmed","doi":"10.1109/INFCOMW.2017.8116366","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116366","url":null,"abstract":"Machine-to-Machine (M2M) communication is considered one of the essential elements of the Internet of Things (IoT) for enabling objects to communicate over potentially large distances. It is predicted to be the dominant source of traffic in 5G networks. To enable M2M communications on LTE networks, which is considered the main cellular access technology for M2M communications, several issues need to be addressed while managing radio resources. One of the major issues is the scheduling of delay-sensitive M2M applications which require strict delay constraints in the existence of traffic types of other needs such as Human-to-Human (H2H) traffic. In this paper, we propose an optimal resource allocation scheme for delay-sensitive M2M applications that considers their delay requirements with statistical guarantees while not impacting the Quality of Service (QoS) of H2H traffic. We formulate the optimization problem and propose solution techniques that do not require high computational complexity. We also analytically derive the performance metrics of the proposed algorithm and validate them using simulations. The results show that the proposed algorithm exhibits better performance in comparison with other scheduling algorithms from past studies.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115368054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for flexible interdomain routing in transit ISPs","authors":"Trung Truong, I. Welch, Bryan K. F. Ng","doi":"10.1109/INFCOMW.2017.8116450","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116450","url":null,"abstract":"ISPs face difficulties in optimizing interdomain routing due to the single path routing constraint of BGP. A single best path makes it difficult to optimize routing and is unable to satisfy various application requirements of customers. In this paper, we present a new routing architecture for ISP edge network which breaks this constraint and allows the operator to flexibly assign interdomain paths to customers and to use these paths for forwarding. We leverage Software Defined Networking (SDN) to implement this new design while also maintaining compatibility with existing networks. Our preliminary results show that the system is capable of flexible routing and can be integrated to existing infrastructure.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115747182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haodi Zhang, Yu Wang, X. Qi, Weiping Xu, Tao Peng, Shucheng Liu
{"title":"Demo abstract: An intent solver for enabling intent-based SDN","authors":"Haodi Zhang, Yu Wang, X. Qi, Weiping Xu, Tao Peng, Shucheng Liu","doi":"10.1109/INFCOMW.2017.8116514","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116514","url":null,"abstract":"In recent years, software-defined networking (SDN) has been adopted in practice, such as the fast-growing market of software-defined wide area networks (SD-WAN). Intent, an emerging concept for SDN, aims to provide a simple interface for operators to manage the network. Under the framework of intent, an application submits a request by specifying the objective only, and the SDN controller decides how to reconfigure the network by considering the objectives of multiple intents with potential conflicts. For instance, in SD-WAN, when multiple applications or flows are competing for limited MPLS resource, we need to decide how and when to redirect some of them to Internet broadband connections. To this end, an intent solver is needed to analyze the received intents, making optimized solutions to operate the network. In this demo, we present the prototype of an intent solver focusing on intents related to flow routing. The demo takes intents both from applications for establishing/adjusting connections and from the network operator for load balancing, and generates optimized routing/rerouting solutions in real time.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125242097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gaetano Manzo, R. Soua, Antonio Di Maio, T. Engel, M. Palattella, G. Rizzo
{"title":"Coordination mechanisms for floating content in realistic vehicular scenario","authors":"Gaetano Manzo, R. Soua, Antonio Di Maio, T. Engel, M. Palattella, G. Rizzo","doi":"10.1109/INFCOMW.2017.8116443","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116443","url":null,"abstract":"The increasing interest in vehicular communications draws attention to scalability and network congestion problems and therefore on techniques to offload the traffic, typically carried through the infrastructure, to the Vehicle-to-vehicle (V2V) network. Floating content (FC) represents a promising paradigm to share ephemeral content without direct support from infrastructure. It is based on constraining geographically within the Anchor Zone (AZ) the opportunistic replication of a given content among vehicles, in a way that strikes a balance between minimization of resource usage and content availability. Existing works on FC performance modeling are based on standard, homogeneous synthetic mobility models, and it is hence unclear how they actually fit in realistic mobility scenarios. Moreover, the approaches to FC dimensioning they propose assume users have full knowledge of Spatio-temporal mobility patterns, which is hard to achieve in practice. Finally, despite FC is an infrastructure-less communication paradigm, some form of infrastructure support could be available in the vast majority of those application scenarios for which it has been proposed. In this paper, we perform a first attempt at tackling these issues. We focus on how to dimension an Anchor Zone in a realistic vehicular scenario. We propose the first set of simple dimensioning strategies, based on the estimation of some key mobility parameters and of FC performance. We assess such strategies on measurement-based vehicular traces, providing a first indication of their relative performance, and of the feasibility of FC in practical scenarios.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"2 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123448112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tewelde Degefa Assefa, Rashedul Hoque, E. Tragos, X. Dimitropoulos
{"title":"Poster abstract: SDN-based handover management in enterprise networked femtocells with X2-forwarding scheme","authors":"Tewelde Degefa Assefa, Rashedul Hoque, E. Tragos, X. Dimitropoulos","doi":"10.1109/INFCOMW.2017.8116541","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116541","url":null,"abstract":"We propose an architecture that integrates the SDN paradigm into an X2-interface based mobility management scheme for local mobility handling in femtocell networks. We mathematically model and analyze the performance gain of the proposed architecture with handover decision taken at centralized SDN controller, which achieves a highly reduced handover signaling overhead.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121896992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raihan ul Islam, Karl Andersson, Mohammad Shahadat Hossain
{"title":"Heterogeneous wireless sensor networks using CoAP and SMS to predict natural disasters","authors":"Raihan ul Islam, Karl Andersson, Mohammad Shahadat Hossain","doi":"10.1109/INFCOMW.2017.8116348","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116348","url":null,"abstract":"Even in the 21st century human is still handicapped with natural disaster. Flood is one of the most catastrophic natural disasters. Early warnings help people to take necessary steps to save human lives and properties. Sensors can be used to provide more accurate early warnings due to possibilities of capturing more detail data of surrounding nature. Recent advantages in protocol standardization and cost effectiveness of sensors it is possible to easily deploy and manage sensors in large scale. In this paper, a heterogeneous wireless sensor network is proposed and evaluated to predict natural disaster like flood. In this network CoAP is used as a unified application layer protocol for exchanging sensor data. Therefore, CoAP over SMS protocol is used for exchanging sensor data. Furthermore, the effectiveness of the heterogeneous wireless sensor network for predicting natural disaster is presented in this paper.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131594871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual resource allocation for information-centric heterogeneous networks with mobile edge computing","authors":"Yuchen Zhou, F. Yu, Jian Chen, Yonghong Kuo","doi":"10.1109/INFCOMW.2017.8116382","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116382","url":null,"abstract":"In order to better accommodate the dramatically increasing demand for data caching and computing services, storage and computation capabilities should be endowed to some of the intermediate nodes within the network. In this paper, we design a novel virtualized heterogeneous networks framework aiming at enabling content caching and computing. With the virtualization of the whole system, the communication, computing and caching resources can be shared among all users associated with different virtual service providers. We formulate the virtual resource allocation strategy as a joint optimization problem, where the gains of not only virtualization but also caching and computing are taken into consideration in the proposed architecture. In addition, a distributed algorithm based on alternating direction method of multipliers is adopted to solve the formulated problem, in order to reduce the computational complexity and signaling overhead. Finally, extensive simulations are presented to show the effectiveness of the proposed scheme under different system parameters.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129560397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Redundancy elimination might be overrated: A quantitative study on wireless traffic","authors":"Xueheng Hu, A. Striegel","doi":"10.1109/INFCOMW.2017.8116471","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116471","url":null,"abstract":"With significant increases in mobile device traffic slated for the foreseeable future, numerous technologies must be embraced to satisfy such demand. Notably, one of the more intriguing approaches has been blending on-device caching and device-to-device (D2D) communications. While various past research has pointed to potentially significant gains (30%+) via redundancy elimination (RE), some skepticism has emerged to whether or not such gains are truly harnessable in practice. The premise of this paper is to explore whether or not significant potential for RE exists and whether the rise of encryption might blunt said efforts. Critically, we find that absent significant synchronized interests of mobile users, the actual redundancy falls well short of the values from the literature. In our paper, we investigate the roots for said shortcomings by exploring RE savings with regards to cache characteristics and to what extent client and domain diversity contributes to the savings.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134441806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ranking most informative apps for effective identification of legitimate smartphone owners","authors":"Abdulaziz Alzubaidi, Swarup Roy, J. Kalita","doi":"10.1109/INFCOMW.2017.8116477","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116477","url":null,"abstract":"Improving the accuracy, reducing the time to authenticate users and preserving privacy are some of the pivotal issues in smartphone security. A majority of published owner identification methods have concentrated on improving accuracy, emphasizing less on response time. Usage pattern of smartphone apps by the owner may be used as an important signature to differentiate between the legitimate user and others. In this work, we rank the most informative apps specific to an owner to identify the owner using an information theoretic approach. Interestingly, the reduced set of data based on highly ranked apps gives a higher detection accuracy with reduced learning time consumed by the classifiers.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130894323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}