{"title":"Detecting and diagnosing performance impact of smartphone software upgrades","authors":"A. Mahimkar","doi":"10.1109/CNSM.2016.7818416","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818416","url":null,"abstract":"Smartphone manufacturers often release software upgrades to their users for improving service performance, patching security vulnerabilities, enhancing device stability, fixing bugs, increasing battery life, or even enriching the graphical user interface. It is crucial to monitor the smartphones after software upgrades to either confirm their expected impacts, or quickly identify any undesirable behaviors. In this paper, we focus on automatically detecting the software upgrades on smartphones and analyzing their service performance impacts. The complex interactions between the software on the smartphones and the cellular networks make it hard to differentiate if the impacts are smartphone-centric, or network-centric. We propose a new approach, SSM (Smartphone Specific Monitoring) for conducting pre/post impact analysis of multiple service performance metrics across smartphones aggregated by their type, make, model and network locations. Using one-year worth of operational network data, we demonstrate the effectiveness of SSM in accurately detecting and diagnosing the performance impact of smartphone software upgrades.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122829841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cresco: A distributed agent-based edge computing framework","authors":"V. Bumgardner, V. Marek, Caylin D. Hickey","doi":"10.1109/CNSM.2016.7818455","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818455","url":null,"abstract":"The Cresco distributed agent-based framework is designed to address the challenges of edge computing. We present an actor-model implementation for the management of large numbers of geographically distributed services, comprised from heterogeneous resources and communication protocols, in support of low-latency realtime streaming applications. We present the purpose of our work, the basic methodology, the initial results already obtained, the relationship to the existing software, and the potential of the presently implemented framework to a number of potential further projects that could be developed on the basis of the existing implementation.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128807825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building a feedback loop to capture evidence of network incidents","authors":"Zdenek Rosa, T. Čejka, M. Zádník, V. Pus","doi":"10.1109/CNSM.2016.7818435","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818435","url":null,"abstract":"Flow measurement is extremely useful in network management, however, in some cases it is vital to observe the packets in full detail. To this end, we propose combining flow measurement, packet capture and network behavioral analysis. The evaluation of the proposed system shows its feasibility even in high-speed network environment.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"376 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126717332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Let's adapt to network change: Towards energy saving with rate adaptation in SDN","authors":"Samy Zemmouri, Shahin Vakilinia, M. Cheriet","doi":"10.1109/CNSM.2016.7818431","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818431","url":null,"abstract":"The exponential growth of network users and their communication demands have led to a tangible increment of energy consumption in network infrastructures. A new networking paradigm called Software-Defined Networking (SDN) recently emerged which simplifies network management by offering programmability of network devices. SDN assists to lower link data rates via rate-adaptation technique which reduces power consumption of the network. The main idea behind this paper is to find a distribution of traffic flows over pre-calculated paths which allow adapting the transmission rate of maximum links into lower states. We first formulate the problem as a Mixed Integer Linear Program (MILP) problem. We then present four different computationally efficient algorithms namely greedy first fit, greedy best fit, greedy worst fit and a meta-heuristic genetic algorithm to solve the problem for a realistic network topology. Simulation results show that the genetic algorithm consistently outperforms the three greedy algorithms.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132988884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}