{"title":"Congestion-Aware Adaptive Routing in 2D-Mesh Multicores","authors":"D. Avresky, Fabien Chaix, M. Nicolaidis","doi":"10.1109/NCA.2014.13","DOIUrl":"https://doi.org/10.1109/NCA.2014.13","url":null,"abstract":"New CMOS processes offer cheaper but less reliable transistors. This trend foreshadows the apparition of processors consisting of hundreds and thousands of cores prone to defects. In this context, the performance of the core interconnect under faults will be critical. In this work, we propose the combination of a novel adaptive routing algorithm and several related router mechanisms, which firstly ensure message transfers under transient and permanent faults and second adapt to congestion in order to improve the interconnect performances. In effect, the widespread 2D mesh topology offers a high redundancy of routes. Hence, a fault-tolerant congestion-aware routing algorithm is able to improve substantially the interconnect efficiency under degraded conditions. Besides, the Virtual Channel allocation is optimized for performance, and a message truncation mechanism is added to cope with dynamic permanent and transient faults.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122452598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-Control Cloud Services","authors":"T. Aubonnet, N. Simoni","doi":"10.1109/NCA.2014.48","DOIUrl":"https://doi.org/10.1109/NCA.2014.48","url":null,"abstract":"We introduce a self-control integrated service component aiming at ensuring Service Level Agreement management. Our approach based on quality of service has two important points: the contract description (supply and demand) and the contract management. The self-control in service components allows us to react dynamically (operational decision) and the autonomic loop enables us to manage the services composition in a virtual session (tactical and strategic decision). This approach is proposed in the Open Cloud ware project. We also provide an example of self-control cloud services through the Springoo application.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122495037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Claudio Correa, J. Ueyama, R. Meneguette, L. Villas
{"title":"VANets: An Exploratory Evaluation in Vehicular Ad Hoc Network for Urban Environment","authors":"Claudio Correa, J. Ueyama, R. Meneguette, L. Villas","doi":"10.1109/NCA.2014.12","DOIUrl":"https://doi.org/10.1109/NCA.2014.12","url":null,"abstract":"Vehicular Ad hoc Network (VANET) is a promising communication technology suitable for vehicular mobile networks. Represent networks of singular features, wherein the data dissemination is fundamental. The literature is plentiful in protocols, usually specific to address individual issues in well-defined scenarios. This work efforts are concentrated, mainly, to examine operating settings in protocols like AID, DBRS, and ADDHV for disseminating messages. A benchmarking explores strategies that address challenges such as network partitioning and the broadcast storm problem, which undertake the dissemination. The results of a set of metrics obtained in different vehicular traffic schemes complete the discussion held. Considerations for answers in coverage, delay, rate of delivery, broadcast, and packet loss support this initiative and motivate the development of an adaptive solution to fluctuations in carrier density.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126057326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource Management in Cloud Federation Using XMPP","authors":"M. Fazio, A. Celesti, M. Villari, A. Puliafito","doi":"10.1109/NCA.2014.15","DOIUrl":"https://doi.org/10.1109/NCA.2014.15","url":null,"abstract":"This paper deals with Cloud federation issues, where Clouds are both providers and clients of virtual resource at the same time. Specifically, we have designed a solution based on a XMPP communication platform, which allows to set up federated environments and to easily manage virtual shared resources. Heterogeneous and dynamic Clouds can interact in near-real time, making available their own resources according to specific agreement policies. We are thinking to implement the proposed solution using the Hadoop framework, a well-known Cloud Map-Reduce middleware designed to offer different types of services. Here, we analyze the basic and useful elements necessary to making up federated clouds. By mean of Cloud federation, two or more Hadoop clusters can be connected in order to increase service scalability, overcoming some technical limitations of the Hadoop framework itself.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"351 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133885295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Green Proxy-Based Approaches for BitTorrent","authors":"Sena Cebeci, Öznur Özkasap, G. Anastasi","doi":"10.1109/NCA.2014.29","DOIUrl":"https://doi.org/10.1109/NCA.2014.29","url":null,"abstract":"Energy efficiency in P2P systems has become a prominent issue due to significant portions of the Internet traffic devoted to P2P protocols. In this paper, we address the approaches for energy efficiency in BitTorrent Protocol. First, we provide a classification of the existing energy efficient BitTorrent studies, and then propose multi-proxy and private proxy approaches to minimize energy consumption. We develop energy cost formulations for our proposed protocols as well as the legacy BitTorrent. The performance of multi-proxy and private proxy BitTorrent is analyzed through a comprehensive set of simulations performed on Peersim for the energy consumption and average download time metrics. For the multi-proxy protocol, we investigate the effect of increasing the number of proxies on the overlay. We also present preliminary experimental results on large-scale scenarios revealing that the proxy-based schemes reduce the energy consumption up to 80% without any performance degradation in comparison to the legacy BitTorrent.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121186441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Ren, J. Suzuki, Dung H. Phan, Shingo Omura, Ryuichi Hosoya
{"title":"An Evolutionary Game Theoretic Approach for Configuring Cloud-Integrated Body Sensor Networks","authors":"Y. Ren, J. Suzuki, Dung H. Phan, Shingo Omura, Ryuichi Hosoya","doi":"10.1109/NCA.2014.47","DOIUrl":"https://doi.org/10.1109/NCA.2014.47","url":null,"abstract":"This paper considers a cloud-integrated architecture for body sensor networks (BSNs), called Body-in-the-Cloud (BitC), and studies an evolutionary game theoretic approach to configure BSNs in an adaptive and stable manner. BitC allows BSNs to adapt their configurations (i.e., Sensing intervals and sampling rates as well as data transmission intervals for nodes) to operational conditions (e.g., Data request patterns) with respect to multiple conflicting objectives such as resource consumption and data yield. Moreover, BitC allows each BSN to perform an evolutionarily stable configuration strategy, which is an equilibrium solution under given operational conditions. Simulation results show that BitC effectively configures BSNs by seeking the trade-offs among conflicting objectives.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123614405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Based-Agent Distributed Architecture to Manage the Dynamic Multi-hop Ridesharing System","authors":"S. B. Cheikh, S. Hammadi, C. Tahon","doi":"10.1109/NCA.2014.22","DOIUrl":"https://doi.org/10.1109/NCA.2014.22","url":null,"abstract":"A diverse range of architectures and concepts has been suggested by academic researchers within the theme of ridesharing. Most of these studies have tried to join together two main elements: the need for mobility and the resources used to achieve this action. Based on empty seats in the private cars, rideshare systems allow a substantial number of people to share car rides. If a request can be matched with only one offer, then the problem is called single hop ride matching. It is called multihop ride matching, if a request can be matched with several offers at different times. In this paper, we focus on the Multi-Hop Ride matching Problem (MHRP) which offers more flexible than other forms of ridesharing and proposes more choices for the rider. As a transportation service, the MHRP is generally geographically distributed in dynamic changing environments. With this in mind, and aiming at setting up a distributed architecture through which an optimizing decentralized process should be performed, we propose a distributed software architecture based on communicating agents with different behaviors. The reason for the growing success of agents behaviors technology especially in performing complex tasks and operating with each other to achieve a desired global goal.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123708104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jesus Friginal, M. Killijian, R. Pasqua, Matthieu Roy, Gilles Trédan
{"title":"Does Mobility Matter? An Evaluation Methodology for Opportunistic Apps","authors":"Jesus Friginal, M. Killijian, R. Pasqua, Matthieu Roy, Gilles Trédan","doi":"10.1109/NCA.2014.8","DOIUrl":"https://doi.org/10.1109/NCA.2014.8","url":null,"abstract":"This paper presents a methodology to guide the evaluation of social distributed applications in mobile environments. Even when applications are already designed, they exhibit a number of tuning parameters upon which network operators can act in order to improve performance. Accordingly, evaluation can be a valuable tool to determine for a particular mobile application which is the most suitable parameters setup from a performance point of view. Our methodology can be of great interest in this tuning process, thus saving both time and money. The main novelty of this methodology is the use of diversification to recreate mobile environments using both synthetic and real mobility traces. Our work focuses on how micro-mobility may impact social distributed applications. The feasibility of the paper is showed through a realistic microblogging case study.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122594515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Probabilistic Greedy Algorithm with Forced Assignment and Compression for Fast Frequency Assignment in Cellular Network","authors":"Subhankar Ghosal, Sasthi C. Ghosh","doi":"10.1109/NCA.2014.36","DOIUrl":"https://doi.org/10.1109/NCA.2014.36","url":null,"abstract":"This paper presents a probabilistic greedy algorithm for solving the channel assignment problem (CAP) in cellular networks. We took each call as a vertex of a complete edge weighed graph, termed as CAP graph, where an edge weight represents the minimum frequency separation needed between the calls represented by the terminal vertices of that edge. Our objective is to assign non-negative integers representing colors or frequencies to the vertices of the CAP graph such that the required span (maximum frequency - minimum frequency) is minimized while satisfying the frequency separation constraints represented by the edge weights. We begin with a probabilistic ordering of the vertices and apply frequency exhaustive strategy to color them. During the coloring, when color of a vertex exceeds the maximum color of previously allocated vertices, we apply a forced assignment phase to reduce the so far obtained span. Finally we propose an iterative compression phase to further reduce the span obtained from applying the frequency exhaustive strategy with forced assignment phase. The proposed polynomial time algorithm is then applied over the well-known benchmark instances and the obtained spans are measured. The obtained results show that the proposed algorithm performs better that the existing assignment strategies with respect to deviation from optimality and computation time. The time taken by our algorithm is less than 1.77 seconds (HP Z400 Workstation) even for the most difficult benchmark instances and thus is very much suitable where fast channel assignment is of primary importance while a marginal deviation from optimality may be tolerated.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126782440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Deadline Aware DTN Approach Based on Epidemic Routing","authors":"Chung-Jae Lee, Ki-Il Kim","doi":"10.1109/NCA.2014.11","DOIUrl":"https://doi.org/10.1109/NCA.2014.11","url":null,"abstract":"Delay Tolerant Networks (DTN) has been proposed to provide communication between nodes where they are intermittently connected. In this situation, a new routing approach, store-carry-forward, is used to deliver data between source and destination. Even though long delay is acceptable in DTN, however some applications occasionally require predetermined bounded delay. To meet this requirement, some approaches have been proposed. However, due to dependency on assumption such as infinite buffer size and mobility pattern, they suffer from deployment problem. To defeat this problem, in this paper, we propose a new probabilistic epidemic routing with time constraint and delay. We adjust forwarding probability on each node depending on bounded delay, elapsed time, and current networks environment. Simulation results reveal that the proposed scheme can meet required delivery ratio and consume little resource rather than original one and competitive protocol.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125772788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}