2016 12th International Conference on Network and Service Management (CNSM)最新文献

筛选
英文 中文
Analytic model for SDN controller traffic and switch table occupancy SDN控制器流量和交换表占用的分析模型
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-11-30 DOI: 10.1109/CNSM.2016.7818406
Christopher Metter, Michael Seufert, Florian Wamser, T. Zinner, P. Tran-Gia
{"title":"Analytic model for SDN controller traffic and switch table occupancy","authors":"Christopher Metter, Michael Seufert, Florian Wamser, T. Zinner, P. Tran-Gia","doi":"10.1109/CNSM.2016.7818406","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818406","url":null,"abstract":"Software Defined Networking (SDN) is a major paradigm in the field of current communication networks. SDN is used as the basis of many new networks although few performance models are available in the literature, and the majority of performance evaluations are based primarily on practical measurements. To fill this gap, we develop an analytical model to assess SDN control plane traffic as well as the occupancy of the flow table of an SDN switch. The contribution of this work is the formulation of the model for the performance-decisive parameters control-plane traffic and flow table occupancy and the application of the model for different data plane traffic characteristics. In the end, there is a discussion about the setting of time-out values for storing flow entries in the switch flow table depending on the traffic characteristics in the data plane. The trade-off between the signaling traffic in the control plane and the occupancy of the flow table is discussed to minimize both.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131159959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Fluid capacity for energy saving management in multi-layer ultra-dense 4G/5G cellular networks 面向多层超密4G/5G蜂窝网络节能管理的流体容量
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-11-30 DOI: 10.1109/CNSM.2016.7818423
Stephen S. Mwanje, Janne Ali-Tolppa
{"title":"Fluid capacity for energy saving management in multi-layer ultra-dense 4G/5G cellular networks","authors":"Stephen S. Mwanje, Janne Ali-Tolppa","doi":"10.1109/CNSM.2016.7818423","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818423","url":null,"abstract":"There is a major demand for reducing energy consumption in mobile networks and it is expected become even more vital in the future (5G) multi-layer Ultra Dense Networks (UDNs), in which the number and density of cells in the different layers will grow dramatically. In these networks, multiple geographically overlapping layers are deployed to increase the capacity and throughput, but also increasing the energy consumption. In this paper we present an end-to-end solution that manages energy saving mechanisms in order to scale the provided capacity to the traffic. Assuming a Heterogeneous Network (HetNet) deployment, the solution dynamically selects cells to activate and/or deactivate considering the prevailing network load and the expected spectral efficiency of those cells. Evaluation in a small HetNet scenario showed that the proposed solution is able to reduce the energy consumption by more than 30%.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125369560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SWAN: Base-band units placement over reconfigurable wireless front-hauls SWAN:基带单元放置在可重构无线前端
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-10-31 DOI: 10.1109/CNSM.2016.7818397
R. Riggio, D. Harutyunyan, Abbas Bradai, S. Kukliński, T. Ahmed
{"title":"SWAN: Base-band units placement over reconfigurable wireless front-hauls","authors":"R. Riggio, D. Harutyunyan, Abbas Bradai, S. Kukliński, T. Ahmed","doi":"10.1109/CNSM.2016.7818397","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818397","url":null,"abstract":"Small-cells are rapidly emerging as the mobile operators' choice to provide additional capacity in current and future mobile networks. However, in order to fully deliver on their promises, small-cells need to address severe interference control and coordination challenges. By centralizing base-band processing in large high-volume computing infrastructures, Cloud-RAN can effectively enable advanced coordination features for dense small-cells deployments. Unfortunately, Cloud-RAN tight bandwidth and latency requirements have made optical fiber the most common solution for the links interconnecting remote radio heads (RRHs) with the base band units (BBUs), i.e. the fronthaul. Recent advances in microwave communications are making wireless fronthauls a viable option especially in dense urban environments where fiber fronthauls could be too rigid for accommodating highly dynamic traffic patterns. In this paper, we provide a novel formulation for the BBU Placement problem where BBU pools are placed at the edges of the network, possibly co-located with macro-cells, and a reconfigurable wireless fronthaul is used in order to provide RRHs with connectivity. To the best of our knowledge this is the first work to tackle the BBU placement problem over a reconfigurable substrate network with mmWave links. We also propose a BBU Placement heuristics, and we evaluate it using a numerical simulator.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127033015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
QoS-aware multipathing in datacenters using effective bandwidth estimation and SDN 使用有效带宽估计和SDN的数据中心qos感知多路径
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-10-01 DOI: 10.1109/CNSM.2016.7818444
Runxin Wang, Simone Mangiante, A. Davy, Lei Shi, B. Jennings
{"title":"QoS-aware multipathing in datacenters using effective bandwidth estimation and SDN","authors":"Runxin Wang, Simone Mangiante, A. Davy, Lei Shi, B. Jennings","doi":"10.1109/CNSM.2016.7818444","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818444","url":null,"abstract":"Datacenter networks are commonly structured with hierarchical topologies in which multipaths are provided to create redundant paths between end-to-end servers. Without a dedicated flow control mechanism, different sizes of traffic flows are statically allocated to links without sensing the current link utilization, which can result in transient network congestion that impacts on the latency experienced by users of the hosted applications. Existing works aim to realize load balancing by efficiently scheduling flows based on their sizes and link utilization. However, many applications' performance is bounded with specific QoS targets, so load balancing may not directly address their QoS requirements. In this paper, we present a latency-aware flow scheduling system that schedules flows based on a tenant application's QoS target and empirical estimations of the effective bandwidth required to meet these QoS targets. The approach seeks to ensure that, following a network-aware placement of VMs hosting application components, the latency associated with communications between these VMs is controlled even as the inter-VM traffic patterns change, or as the background traffic associated with other applications changes. We describe a prototype implementation of the approach that extends our MAPLE network-aware VM placement system. Our experiments in an emulated datacenter indicate that our scheduling approach leads to fewer QoS violations compared to ECMP.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114669871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A routing optimization method based on risk prediction for communication services in smart grid 基于风险预测的智能电网通信业务路由优化方法
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-10-01 DOI: 10.1109/CNSM.2016.7818451
Puyuan Zhao, Peng Yu, Chenchen Ji, Lei Feng, Wenjing Li
{"title":"A routing optimization method based on risk prediction for communication services in smart grid","authors":"Puyuan Zhao, Peng Yu, Chenchen Ji, Lei Feng, Wenjing Li","doi":"10.1109/CNSM.2016.7818451","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818451","url":null,"abstract":"As power communication network is more and more important in smart grid, to decrease the failure risk of power system caused by the interruption of communication service, this paper propose a novel routing optimization method based on risk predication for communication services. Firstly, we analyze the probability of failure of communication link and node which is induced by external factors, like winds and snows, equipment failures, and etc. Then based on importance of services, links and nodes, we calculate the risk of failure of communication link and node. Further, we propose three service risk indicators and corresponding improved Dijkstra algorithms to optimize service routing, thus to decrease the network failure probability. Finally, based on part of power grid topology structure from a Chinese province, the simulation results show that the service risk o and the risk of the whole network are also reduced.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"28 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124279956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An improved Markov method for prediction of user mobility 一种改进的马尔可夫方法预测用户移动性
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-10-01 DOI: 10.1109/CNSM.2016.7818454
Yihang Cheng, Yuanyuan Qiao, Jie Yang
{"title":"An improved Markov method for prediction of user mobility","authors":"Yihang Cheng, Yuanyuan Qiao, Jie Yang","doi":"10.1109/CNSM.2016.7818454","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818454","url":null,"abstract":"The developments of Information and Communication Technology (ICT) and Internet of Things (IoT) are being used to enhance quality, performance and interactivity of urban services. Benefited from the widespread adoption of mobile devices, we can collect amount of mobile data for user mobility analysis. Mining hidden information from users' mobile data is important for builders of smart city to provide better location-based service. This paper focuses on two classical domain-independent prediction models and one improved Markov model that are capable of estimating the next location. By using 27-day-long traffic data of mobile network, we extract trajectories of 4914 individuals for experiments. We find that the original Markov algorithm has a better performance in resource consumption than LZ family algorithms, but its prediction accuracy is lower than prediction accuracy of LeZi Update and Active LeZi algorithm. In order to improve the prediction accuracy of Markov and overcome drawbacks of traditional prediction algorithms, we present a new method based on Markov, which considers both temporal and spatial factors. Extensive experiments demonstrate our improved method has a better performance in location prediction. In addition, we further study the relationship between prediction accuracy and trajectory's regularity, to identify the most suitable prediction algorithm for a trajectory.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128179463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Power proportional computing for “Green” servers “绿色”服务器的功率比例计算
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-10-01 DOI: 10.1109/CNSM.2016.7818450
E. McCune
{"title":"Power proportional computing for “Green” servers","authors":"E. McCune","doi":"10.1109/CNSM.2016.7818450","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818450","url":null,"abstract":"Achieving energy-efficient “Green” operations within data centers used for applications such as Cloud Computing requires matching the power consumed to the data processed at each server in real-time. Beyond having a high efficiency in the server power supplies, it is vitally important to only draw power when the server is actually processing data. To operate at maximum energy efficiency, in the times when a server is idle it needs to draw no power for the server farm. By matching power draw to actual data processing activity at logic speeds, the average energy draw of the server farm drops by 50% or more with no reduction in throughput. Drawing on technology developed for efficient radio transmitters, an agile power supply, able to provide tight voltage regulation and still transition between power-off and power-on (or the other way) in nanoseconds without transition overshoot is described. With this nanosecond agility, this also solves the objective for elastic computing. Additionally, the supply pin pairing required by this energy management method provides benefits toward reducing electromagnetic interference (EMI). Proportional reduction in processor operating temperature improves reliability, along with reducing facility cooling loads.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133911261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantifying the service performance impact of self-organizing network actions 量化自组织网络行为对服务性能的影响
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-10-01 DOI: 10.1109/CNSM.2016.7818398
Swati Roy, David Applegate, Zihui Ge, A. Mahimkar, Shomik Pathak, S. Puthenpura
{"title":"Quantifying the service performance impact of self-organizing network actions","authors":"Swati Roy, David Applegate, Zihui Ge, A. Mahimkar, Shomik Pathak, S. Puthenpura","doi":"10.1109/CNSM.2016.7818398","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818398","url":null,"abstract":"As smartphone users increasingly rely on cellular networks to access voice, video, and web applications, guaranteeing good performance and high availability is more important than ever. Historically, managing cellular network configuration has been a manual, error-prone process; recently, automated solutions such as SON (Self-Organizing Networks) controllers are being deployed for dynamic tuning of network configuration to improve end-user service performance under dynamic network and traffic conditions. SON automates many aspects of cellular network configuration, but it is nonetheless susceptible to software bugs and expected traffic changes that could result in sub-optimal performance. In this paper, we propose a capability (Veracity) to analyze and quantify the performance effects of SON actions. Assessing the effects of SON control is difficult because of the dynamic nature of SON and the dependency of end-user performance on factors such as radio channel quality, mobility and traffic load. Veracity addresses these using model-driven impact detection and quantification. Our evaluation using data collected from an operational cellular network demonstrates that Veracity is accurate. Veracity is now being used by the service providers' field operation teams for the assessment of SON effectiveness in arenas and stadiums.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132256877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Network service description for virtual network deployment: A constraints based OVF extension proposal 虚拟网络部署的网络服务描述:基于约束的OVF扩展建议
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-10-01 DOI: 10.1109/CNSM.2016.7818448
G. Diaz, N. Simoni
{"title":"Network service description for virtual network deployment: A constraints based OVF extension proposal","authors":"G. Diaz, N. Simoni","doi":"10.1109/CNSM.2016.7818448","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818448","url":null,"abstract":"The Cloud has allowed an evolution in the design, deployment and management of services. Applying a Cloud model at the network level involves incorporating into the life cycle of network services the new processes that take into account the virtualization. To take advantage of advances such as SDN (Software-Defined Networking) and NFV (Network Functions Virtualization), we must not only take into account the virtualization of network equipment, but we must incorporate the network level virtualization with its control plane into the design of virtual networks to meet the demands of users. This leads us to distinguish the “network deployment phase” from the “placement” of virtual elements into a physical infrastructure. To help automate the deployment and management process, it is necessary to describe all of the information used by them. Our proposal defines an OVF (Open Virtualization Format) extension enabling to describe the behavior of elements implemented in the virtual network to deploy (nodes, links, network). We include in our description the QoS and placement constraints. Our description shows two viewpoints: requested service quality and quality of service offered.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115634318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Booter blacklist: Unveiling DDoS-for-hire websites 引导黑名单:揭露DDoS-for-hire网站
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-10-01 DOI: 10.1109/CNSM.2016.7818410
J. J. Santanna, R. Schmidt, D. Tuncer, J. D. Vries, L. Granville, A. Pras
{"title":"Booter blacklist: Unveiling DDoS-for-hire websites","authors":"J. J. Santanna, R. Schmidt, D. Tuncer, J. D. Vries, L. Granville, A. Pras","doi":"10.1109/CNSM.2016.7818410","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818410","url":null,"abstract":"The expansion of Distributed Denial of Service (DDoS) for hire websites, known as Booters, has radically modified both the scope and stakes of DDoS attacks. Until recently, however, Booters have only received little attention from the research community. Given their impact, addressing the challenges associated with this phenomenon is crucial. In this paper, we present a rigorous methodology to identify a comprehensive set of existing Booters in the Internet. The methodology relies on well-defined mechanisms to generate a Booter blacklist, from crawling suspect URLs to characterizing and classifying the collected URLs. The list obtained using the methodology presented in this paper has a classification accuracy of 95.5%, which is 10.5% better compared to previous work. We also demonstrate the usage of our methodology applied by the Dutch NREN, SURFNet, which started using our blacklist to extend their Booters' activities monitoring.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124575611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信