{"title":"Demonstration of TADA: A tool for automatic detection of AQM","authors":"Minoo Kargar Bideh, Andreas Petlund, Iffat Ahmed","doi":"10.1109/INFCOMW.2016.7562227","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562227","url":null,"abstract":"Active Queue Management (AQM) and solutions to the bufferbloat problem have gained a huge attention in the research community, but it is unknown to what extent such solutions are currently deployed on the Internet. In this paper, we present a demonstration of a tool, called TADA, for automatic detection of AQM on a transmission path bottleneck. We have developed an active measurement tool for Linux, which is not only able to detect the presence of an AQM between a client and a server instance of the tool, but which can also detect the type of AQMs (from a selection of AQM families). TADA relies on active measurement and is able to accurately detect the AQM type in unloaded or lightly loaded bottleneck conditions. For this demonstration, we will allow users to change parameters for loss rate, number of flows competing on the bottleneck, serial bottleneck configuration, FIFO or AQM type on the bottleneck and observe the changes/performance of the tool under different settings.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"361 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113956201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Revisiting AS-level graph reduction","authors":"Erik C. Rye, Justin P. Rohrer, Robert Beverly","doi":"10.1109/INFCOMW.2016.7562121","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562121","url":null,"abstract":"The topological structure of the Internet - the interconnection of routers and autonomous systems (ASes) - is large and complex. Frequently it is necessary to evaluate network protocols and applications on “Internet-like” graphs in order understand their security, resilience, and performance properties. A fundamental obstacle to emulation and simulation is creating realistic Internet-like topologies of reduced order. We reexamine existing AS graph reduction algorithms and find that they struggle to capture graph theoretic properties of modern topologies and topologies obtained from different sources. We develop a new AS graph reduction method that performs well across time periods and data sets.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129150513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of secure 6LoWPAN communications for tactical wireless sensor networks","authors":"David W. Courtney, P. Thulasiraman","doi":"10.1109/INFCOMW.2016.7562168","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562168","url":null,"abstract":"Tactical wireless sensor networks (WSN) consist of power constrained devices spread throughout a region of interest to provide data extraction in real time. The main challenges to the deployment of tactical WSNs for mission-centric operations are limited nodal energy and information security. In this paper we develop security mechanisms to be implemented on a tactical WSN using the 6LoWPAN protocol for use by the United States Marine Corps (USMC). Specifically, we develop an architectural framework for tactical WSNs by studying security gaps and vulnerabilities within the 6LoWPAN security sublayer which is based on IEEE 802.15.4. We develop a key management scheme that is non-broadcast but that is also feasible in an operational scenario. In addition, we modify the 6LoWPAN packet structure to facilitate the newly developed keying mechanism. The tactical WSN architecture is designed to defend against a variety of network attacks that can potentially occur. Simulations will be conducted via MATLAB to show the effectiveness of the developed keying and communication mechanisms.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131898273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Delay tolerant video upload from public vehicles","authors":"Ali Safari Khatouni, M. Marsan, M. Mellia","doi":"10.1109/INFCOMW.2016.7562074","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562074","url":null,"abstract":"In this paper we study a surveillance system for public transport vehicles, which is based on the collection of on-board videos, and the upload via wireless transmission to a central security system of video segments corresponding to those cameras and time intervals involved in an accident. We assume that vehicles are connected to several wireless interfaces, provided by different Mobile Network Operators (MNOs), each charging a different cost. Both the cost and the upload rate for each network interface change over time, according to the network load and the position of the vehicle. When a video must be uploaded to the central security, the system has to complete the upload within a deadline, deciding i) which interface(s) to use, ii) when to upload from that interface(s) and iii) at which rate to upload. The goal is to minimize the total cost of the upload, which we assume to be proportional to the data volume being transmitted and to the cost of using a given interface. We formalize the optimization problem and propose greedy heuristics. Results are generated, using real wireless bandwidth traces, showing that one of the proposed greedy heuristics comes very close to the optimal solution.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"517 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116238027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"mmTrace: Modeling millimeter-wave indoor propagation with image-based ray-tracing","authors":"Daniel Steinmetzer, J. Classen, M. Hollick","doi":"10.1109/INFCOMW.2016.7562115","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562115","url":null,"abstract":"Current mm-wave indoor propagation analysis techniques have limited options when it comes to more than one transmitter and receiver. Experimental testbed hardware is expensive and state-of-the-art simulation methods, such as statistical channel models, are limited to specific scenarios. To overcome these problems, we present mmTrace, a fast deterministic image-based ray-tracing simulation framework for mm-wave propagation. It supports developing mm-wave specific protocols and, in contrast to common statistical models, deals with multiple transceivers. The strengths of mmTrace constitute signal variations at different receivers and interference of multiple transmitters, which are crucial in certain situations. We implement our framework in MATLAB and validate simulated channel impulse responses against those of statistical channel models for IEEE 802.11ad in well-defined scenarios. Our results indicate that image-based ray-tracing is a feasible tool to predict interference in mm-wave communication systems.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127098228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of mobility support in Named Data Networking","authors":"Yu Zhang, A. Afanasyev, J. Burke, Lixia Zhang","doi":"10.1109/INFCOMW.2016.7562050","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562050","url":null,"abstract":"The initial Named Data Networking (NDN) architecture design provided consumer mobility support automatically, taking advantage of NDN's stateful forwarding plane to return data to mobile consumers; at the same time, the support of data producer mobility was left unspecified. During the past few years, a number of NDN producer mobility support schemes have been proposed. This paper provides a clear definition of NDN mobility support, to enable fetching of data produced by mobile users, and then to classify the proposed solutions by their commonalities and to articulate design tradeoffs of different approaches. We identify remaining challenges and discuss future research directions for effective and efficient data producer mobility support in NDN.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127454479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A QoS-constrained transmission strategy for energy Harvesting transmitter","authors":"Xiaomin Wu, Yuanyuan Jiao, Jian Yang, H. Xi","doi":"10.1109/INFCOMW.2016.7562206","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562206","url":null,"abstract":"Energy Harvesting is a promising feature for supplying energy to a wireless device. However, due to the mobility of wireless device and the stochastic nature of the energy arrivals, innovative management strategies should be adopted to maximize the energy efficiency. In this paper, we consider the utility maximization problem of a wireless transmitter with delay limited communications and energy harvesting capability. The throughput maximization problem is formulated as a Constrained Markov Decision Process (CMDP). To deal with the curse of the dimensionality, we introduce a new technique named Lyapunov Optimization. Based on Lyapunov Optimization theory, we propose an online expected transmission utility maximization algorithm (ETUMA) which is adaptive to the wireless channel state information as well as the data and the energy queue state information. Derived ETUMA has an advantage of low complexity and requires no prior knowledge of the system. Finally, simulations are provided to illustrate the effectiveness and potential of the proposed algorithm.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127494089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3D-beamforming codebook design based on directly search for millimeter-wave communications","authors":"Wei-xia Zou, Longfei Wang, Chao Guo","doi":"10.1109/INFCOMW.2016.7562230","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562230","url":null,"abstract":"To solve symmetry and beam distortion problem in 3D-beamforming codebook design by direct product method, this paper proposes a codebook design scheme, which is generated by search in two-dimensional matrix. The method can generate asymmetric beam and solves the problem of beam distortion in the direction of large angle. It has more flexibility and can meet the demand for more scenes.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124764835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile-edge computing vs. centralized cloud computing in fiber-wireless access networks","authors":"B. Rimal, D. P. Van, M. Maier","doi":"10.1109/INFCOMW.2016.7562226","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562226","url":null,"abstract":"The advent of Internet of Things and 5G applications renders the need for integration of both centralized cloud computing and emerging mobile-edge computing (MEC) with existing network infrastructures to enhance storage, processing, and caching capabilities in not only centralized but also distributed fashions for supporting both delay-tolerant and mission-critical applications. This paper investigates performance gains of centralized cloud and MEC enabled integrated fiber-wireless (FiWi) access networks. A novel resource management scheme incorporating both centralized cloud and MEC offloading activities into the underlying FiWi dynamic bandwidth allocation process is proposed. An analytical framework is developed to model packet delay, response time efficiency, and gain-offload overhead ratio for both cloud and conventional broadband access traffic. The obtained results demonstrate the feasibility of implementing conventional cloud and MEC in FiWi access networks, while not affecting network performance of broadband access traffic.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114960712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security architecture based on defense in depth for Cloud Computing environment","authors":"Theodoros Mavroeidakos, A. Michalas, D. Vergados","doi":"10.1109/INFCOMW.2016.7562097","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562097","url":null,"abstract":"Cloud Computing constitutes an emerging computing paradigm consisting of elements of grid computing, utility computing and software-defined networks. The aggregation of these technologies offers a new environment for the deployment of services. Cloud computing environment provides capabilities which are unique covering the existing and future needs of organizations and companies. Moreover, this environment supports big data applications usually forming the core elements of research projects. Therefore cloud computing technology and big data are linked to each other. However, the capabilities of cloud computing environment create challenges concerning the security of data applications and its systems. In this respect, security issues are present on big data applications. By adopting the cloud computing environment, the provider has to incorporate security systems and policies in its infrastructure in order to mitigate the security threats. In this paper, multilayered security architecture is defined based on defense in depth. In this architecture the cloud infrastructure is divided into defense zones to achieve better security control. Additionally, intrusion detection system (IDS), honeypots and firewalls are incorporated alongside the defense mechanisms of the cloud infrastructure. In this way, a secure architecture is applied in which the end service is provided uninterrupted, while control over the level of security is maintained.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"57 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116557662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}