Zhengyuan Liu, Peng-Peng Yu, F. Zhou, Lei Feng, Wenjing Li
{"title":"Intelligent and Energy-efficient Distributed Resource Allocation for 5G Cloud Radio Access Networks","authors":"Zhengyuan Liu, Peng-Peng Yu, F. Zhou, Lei Feng, Wenjing Li","doi":"10.23919/CNSM52442.2021.9615594","DOIUrl":"https://doi.org/10.23919/CNSM52442.2021.9615594","url":null,"abstract":"With the development of 5G, the distribution of base stations tends to be dense. Compared with the traditional network architecture, Cloud Radio Access Networks(C-RAN) architecture can satisfy the current requirements of high bandwidth, low latency and low energy consumption. Currently most energy-saving scheme for C-RAN is complex with time cost computing, which may not be suitable for large-scale region. For the problem of energy-efficient resource allocation for dense distribution of Remote Radio Heads(RRHs) in C-RAN, we use K-means clustering algorithm to simplify the network topology and reduce the complexity under a distributed manner. Aiming at the problem of network resource allocation in C-RAN, we use A3C algorithm to allocate network transmission power, and compare the total energy consumption, system energy efficiency and Signal to Interference plus Noise Ratio(SINR) value of terminal devices through simulation experiments. The experimental results show that in the same network environment, A3C algorithm has the highest energy efficiency, and can keep the SINR value of terminal devices in a reasonable range, which proves the effectiveness of A3C algorithm.","PeriodicalId":358223,"journal":{"name":"2021 17th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129580470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Problem Diagnostics using Typographic Error Correction","authors":"Martin Holkovic, Michal Bohus, O. Ryšavý","doi":"10.23919/CNSM52442.2021.9615525","DOIUrl":"https://doi.org/10.23919/CNSM52442.2021.9615525","url":null,"abstract":"Detecting and correcting network and service availability issues is an essential part of the network administrator's daily duty. One of the causes of errors can be the user herself providing incorrect input. The present work describes a new diagnostic method that detects incorrectly inserted inputs observed in network-related data, e.g., network traffic, log files. The proposed method aims to detect incorrect words in domains, login names, or email addresses. First, we describe how to detect possible incorrect words. For each such detected word, a list of correct candidates is created based on edit distance. Next, the correction method selects the best word by scoring candidates based on the probability of occurrence in the given context. The proposed method was implemented as a prototype and tested on words created using real user activities. The evaluation demonstrates that this approach can substantially reduce the time needed to identify this kind of errors.","PeriodicalId":358223,"journal":{"name":"2021 17th International Conference on Network and Service Management (CNSM)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127130077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eder Ollora Zaballa, David Franco, E. Jacob, M. Higuero, M. Berger
{"title":"Automation of Modular and Programmable Control and Data Plane SDN Networks","authors":"Eder Ollora Zaballa, David Franco, E. Jacob, M. Higuero, M. Berger","doi":"10.23919/CNSM52442.2021.9615508","DOIUrl":"https://doi.org/10.23919/CNSM52442.2021.9615508","url":null,"abstract":"In the last years, Software-Defined Networking (SDN) has provided a new approach to network programmability, first regarding the control plane and later the data plane. With the popularity of the data plane programming languages like P4, SDN network automation has extended from developing control plane applications and deploying controllers to integrating custom packet processing pipelines in this process. However, developing control and data plane applications can become burdensome since expertise in both fields is scarce. The process of automating SDN networks requires (among many tasks) inter-plane correlated application self-collection and assembly. As a result, the orchestrator presented in this paper, named P4click, provides high-level interfaces in order to transparently deploy modular control and data plane applications for SDN networks. This paper describes the architecture design of the orchestrator, outlines the deployment structure, and provides a general view of control plane application deployment and data plane pipeline assembly. Besides, P4click requires no previous knowledge of data plane programming and provides a simple interface for network operators that have to deploy new network functionalities. The results in this paper show which tasks in the network automation are most influential (timewise) in bringing a network up and running from the ground up.","PeriodicalId":358223,"journal":{"name":"2021 17th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130056483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Rao, Minghui Wang, Cuixia Tian, Xin’an Yang, Xiang Ao
{"title":"A Hierarchical Tree-Based Syslog Clustering Scheme for Network Diagnosis","authors":"S. Rao, Minghui Wang, Cuixia Tian, Xin’an Yang, Xiang Ao","doi":"10.23919/CNSM52442.2021.9615506","DOIUrl":"https://doi.org/10.23919/CNSM52442.2021.9615506","url":null,"abstract":"With the continuous development of Information Technology, modern networks have been widely utilised. Since the complex network structure causes growing difficulties in maintenance, log analysis has been widely studied in recent years for network diagnosis. System log clustering is mainly focused for root cause analysis. In this paper, a hierarchical tree-based clustering scheme is proposed that could accurately group system logs according to both time and network constraints without any training and parameter settings. Furthermore, it largely accelerates the matching process by reducing matching times and significantly boosts the performance of hit rate (100%) and match efficiency (16%) comparing to other clustering strategies, which greatly helps with precise network diagnosis.","PeriodicalId":358223,"journal":{"name":"2021 17th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126623192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marcin Bosk, Marija Gajic, Susanna Schwarzmann, Stanislav Lange, R. Trivisonno, C. Marquezan, T. Zinner
{"title":"Using 5G QoS Mechanisms to Achieve QoE-Aware Resource Allocation","authors":"Marcin Bosk, Marija Gajic, Susanna Schwarzmann, Stanislav Lange, R. Trivisonno, C. Marquezan, T. Zinner","doi":"10.23919/CNSM52442.2021.9615557","DOIUrl":"https://doi.org/10.23919/CNSM52442.2021.9615557","url":null,"abstract":"Network operators generally aim at providing a good level of satisfaction to their customers. Diverse application demands require the usage of beyond best-effort resource allocation mechanisms, particularly in resource-constrained environments. Such mechanisms introduce additional complexity in the control plane and need to be configured appropriately. Within 5G mobile networks, two new mechanisms for QoS-aware resource allocation are introduced. While QoS Flows enable specifying various QoS profiles on a per flow granularity, slices are dedicated virtual networks, strongly isolated against each other, with aggregated QoS guarantees. It is, however, unclear how QoS Flows and network slicing can optimally be exploited to ensure a high customer QoE while efficiently utilizing the available network resources. We address this research question and evaluate the outlined interplay using the OMNeT++ simulation environment in a multi-application scenario. We show that resource isolation induced by slicing may negatively affect application quality or system utilization, and that this impact can be overcome by finetuning the system parameters.","PeriodicalId":358223,"journal":{"name":"2021 17th International Conference on Network and Service Management (CNSM)","volume":"408 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115953111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dominik Soukup, Peter Tisovčík, Karel Hynek, T. Čejka
{"title":"Towards Evaluating Quality of Datasets for Network Traffic Domain","authors":"Dominik Soukup, Peter Tisovčík, Karel Hynek, T. Čejka","doi":"10.23919/CNSM52442.2021.9615601","DOIUrl":"https://doi.org/10.23919/CNSM52442.2021.9615601","url":null,"abstract":"This paper deals with the quality of network traffic datasets created to train and validate machine learning classification and detection methods. Naturally, there is a long epoch of research targeted at data quality; however, it is focused mainly on data consistency, validity, precision, and other metrics, which are insufficient for network traffic use-cases. The rise of Machine learning usage in network monitoring applications requires a new methodology for evaluation datasets. There is a need to evaluate and compare traffic samples captured at different conditions and decide the usability of the already captured and annotated data. This paper aims to explain a use case of dataset creation, propose definitions regarding the quality of the network traffic datasets, and finally, describe a framework for datasets analysis.","PeriodicalId":358223,"journal":{"name":"2021 17th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122631261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EdgeEcho: An Architecture for Echocardiology at the Edge","authors":"Aman Khalid, F. Esposito, Alessio Sacco, S. Smart","doi":"10.23919/CNSM52442.2021.9615595","DOIUrl":"https://doi.org/10.23919/CNSM52442.2021.9615595","url":null,"abstract":"Edge computing technologies have improved delays and privacy of several applications, including in medical imaging and eHealth. In this paper, we consider ultrasound technology and echocardiology (echo) and empower it with edge computing. Despite the many advances that ultrasound technology has seen recently, e.g., it is possible to perform echo scans using wireless ultrasound probes, the use of Artificial Intelligence (AI) techniques is becoming a necessity, for faster and more accurate echo diagnosis (not limited to heart diseases). While a few proprietary solutions exist that embed AI within echo devices, none of them uses resource-intensive tasks on handheld devices, and none of them is open-source. To this end, we propose EdgeEcho, an architecture that captures ultrasound data originated from handheld ultrasound probes and tags it using semantic segmentation performed on edge cloud. Our prototype focuses on optimizing the management of edge resources to address the specific requirements of echocardiology and the challenges of serving AI algorithms responsively. As a use case, we focus on a ventricular volume detection operation. Our performance evaluation results show that EdgeEcho can support multiple parallel medical video processing streaming sessions for continuing medical education, demonstrating a promising edge computing application with life-saving potential.","PeriodicalId":358223,"journal":{"name":"2021 17th International Conference on Network and Service Management (CNSM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131210223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"P4 language extensions for stateful packet processing","authors":"Angelo Tulumello","doi":"10.23919/CNSM52442.2021.9615573","DOIUrl":"https://doi.org/10.23919/CNSM52442.2021.9615573","url":null,"abstract":"The P4 language is the de facto standard to define how programmable switches must process packets. P4 is extensively employed in datacenter scenarios as it permits to support a wide set of network applications. However, P4 does not provide a clear description of stateful processing, especially on handling per-flow states. This paper extends both the P4 language and the P4 software switch (bmv2) with novel stateful primitives with a clear representation of per-flow states. Furthermore, we exploit these new functionalities by implementing a datacenter network function that implements a scalable tunneling mechanism. The developed network function differentiates the top talker flows directly handled by the switch and the other flows that are instead managed in a slow path involving specific network devices with large connection tables.","PeriodicalId":358223,"journal":{"name":"2021 17th International Conference on Network and Service Management (CNSM)","volume":"292 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133693298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. V. D. Toorn, Johannes Krupp, M. Jonker, R. V. Rijswijk-Deij, C. Rossow, A. Sperotto
{"title":"ANYway: Measuring the Amplification DDoS Potential of Domains","authors":"O. V. D. Toorn, Johannes Krupp, M. Jonker, R. V. Rijswijk-Deij, C. Rossow, A. Sperotto","doi":"10.23919/CNSM52442.2021.9615596","DOIUrl":"https://doi.org/10.23919/CNSM52442.2021.9615596","url":null,"abstract":"DDoS attacks threaten Internet security and stability, with attacks reaching the Tbps range. A popular approach involves DNS-based reflection and amplification, a type of attack in which a domain name, known to return a large answer, is queried using spoofed requests. Do the chosen names offer the largest amplification, however, or have we yet to see the full amplification potential? And while operational countermeasures are proposed, chiefly limiting responses to ‘ANY’ queries, up to what point will these countermeasures be effective? In this paper we make three main contributions. First, we propose and validate a scalable method to estimate the amplification potential of a domain name, based on the expected ANY response size. Second, we create estimates for hundreds of millions of domain names and rank them by their amplification potential. By comparing the overall ranking to the set of domains observed in actual attacks in honeypot data, we show whether attackers are using the most-potent domains for their attacks, or if we may expect larger attacks in the future. Finally, we evaluate the effectiveness of blocking ANY queries, as proposed by the IETF, to limit DNS-based DDoS attacks, by estimating the decrease in attack volume when switching from ANY to other query types. Our results show that by blocking ANY, the response size of domains observed in attacks can be reduced by 57%, and the size of most-potent domains decreases by 69%. However, we also show that dropping ANY is not an absolute solution to DNS-based DDoS, as a small but potent portion of domains remain leading to an expected response size of over 2,048 bytes to queries other than ANY.","PeriodicalId":358223,"journal":{"name":"2021 17th International Conference on Network and Service Management (CNSM)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134638760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrea Pimpinella, A. Redondi, Frank Loh, Michael Seufert
{"title":"Machine-Learning Based Prediction of Next HTTP Request Arrival Time in Adaptive Video Streaming","authors":"Andrea Pimpinella, A. Redondi, Frank Loh, Michael Seufert","doi":"10.23919/CNSM52442.2021.9615552","DOIUrl":"https://doi.org/10.23919/CNSM52442.2021.9615552","url":null,"abstract":"Continuously monitoring the network activity to proactively recognise possible problems and prevent users QoE degradation is a major concern for network operators, for both mobile radio and home networks. Considering video streaming applications, which generate the majority of overall Internet traffic, monitoring the chunk requests from the video client to the video server is of particular interest, as they not only indicate that a download burst is imminent, but their type (e.g., request of an audio or video chunk) and frequency also allow to estimate which and how much data will be downloaded to the client. In this work, we propose a machine-learning based video streaming traffic monitoring architecture able to i) predict when next uplink request will be issued by the video client and ii) classify the type of next uplink request. We evaluate the system performance on a dataset of more than 900 HTTP adaptive streaming sessions and 15,000 request-response exchanges, where both the predictor of the next request arrival and the request type classifier are fed with lightweight features extracted from encrypted traffic in an online fashion, both in the uplink and downlink directions of the traffic. Results show that i) the system is able to classify the type of a HAS uplink requests with an accuracy greater than 95 % and ii) pipe-lining request type classification and prediction of next request arrival time improves the final prediction performance.","PeriodicalId":358223,"journal":{"name":"2021 17th International Conference on Network and Service Management (CNSM)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114383091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}