2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks)最新文献

筛选
英文 中文
Network planning guaranteeing end-to-end overload probability for stochastic traffic demands 随机流量需求下保证端到端过载概率的网络规划
P. N. Tran, Bharata Dwi Cahyanto, A. Timm‐Giel
{"title":"Network planning guaranteeing end-to-end overload probability for stochastic traffic demands","authors":"P. N. Tran, Bharata Dwi Cahyanto, A. Timm‐Giel","doi":"10.1109/NETWKS.2014.6959234","DOIUrl":"https://doi.org/10.1109/NETWKS.2014.6959234","url":null,"abstract":"Planning a communication network is a very challenging task, because network traffic is not constant but fluctuates heavily. Overestimating the traffic volume leads to an expensive solution, while underestimating it results in a poor Quality of Service (QoS). In this paper, we propose a new approach to solve the network planning problem under stochastic traffic demands, which guarantees the overload probability of an end-to-end traffic demand to be bounded by a pre-determined value. The problem was first formulated as a chance-constrained programming problem, in which the capacity constraints need to be satisfied in probabilistic sense. We then propose two heuristic algorithms, which 1) determines the overload probability on each link so that the end-to-end overload probability of a traffic demanded is guaranteed and 2) solves the routing and capacity allocation problem for given stochastic traffic demands. The experiment results show that the proposed approach can significantly reduce the network costs compared to the peak-load-based approach, while still maintaining the robustness of the solution. This approach can be applied to networks carrying different flows with different QoS requirements.","PeriodicalId":410892,"journal":{"name":"2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129860380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new class of web caching strategies for content delivery 一种新的用于内容传递的web缓存策略
G. Haßlinger, K. Ntougias, Frank Hasslinger
{"title":"A new class of web caching strategies for content delivery","authors":"G. Haßlinger, K. Ntougias, Frank Hasslinger","doi":"10.1109/NETWKS.2014.6958534","DOIUrl":"https://doi.org/10.1109/NETWKS.2014.6958534","url":null,"abstract":"Least recently used (LRU) is the most commonly applied strategy to update the content of caches in computing and database systems as well as for Web caching. Although some case studies have shown that LRU hit rates can be low when compared to Web caching strategies being aware of complete statistics of past requests, proposed alternatives seem too complex to cope with constant update effort of LRU. In this work we start with an evaluation of the hit rates for LRU as compared to statistic-based caching strategies for Zipf distributed popularity of web content, which has been confirmed manifold as the relevant access profile to content on the Internet. We conclude that LRU has more than 10% absolute hit rate deficits not only in some special cases but over the entire relevant parameter range of Zipf law access pattern. We show that a 10% gain over LRU hit rates is already realized by the variant of score-gated LRU, whose mean updating effort is comparable to pure LRU. As another main advantage, score-gated LRU avoids most of the input traffic of a pure LRU strategy, which frequently reloads objects into the cache. Score-gated LRU keeps the cache content stable in case of unchanged popularity and loads new objects only when their score is increasing until it exceeds the score of a cached object.","PeriodicalId":410892,"journal":{"name":"2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124410777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Detecting DDoS attacks at the source using multiscaling analysis 多尺度分析从源头检测DDoS攻击
Ivo Petiz, P. Salvador, A. Nogueira, Eduardo Rocha
{"title":"Detecting DDoS attacks at the source using multiscaling analysis","authors":"Ivo Petiz, P. Salvador, A. Nogueira, Eduardo Rocha","doi":"10.1109/NETWKS.2014.6959267","DOIUrl":"https://doi.org/10.1109/NETWKS.2014.6959267","url":null,"abstract":"The proliferation of Distributed Denial of Service (DDoS) attacks is a constant threat to business and individuals. Existing systems proved to be inefficient when deploying counter-measures at the target of the attacks. In fact, efficient counteractions should be applied at the networks that contain the sources of the attack. However, the detection of such type of attacks at the source is extremely difficult. In this work, we propose a novel and more efficient methodology to detect DDoS attacks at the source that relies on the inherent periodicity of the traffic generated by DDoS attack sources. Detecting and quantifying the traffic periodic components using multiscaling traffic analysis based on wavelet scalograms allows an efficient detection of DDoS attacks at the source, even when the attacks are performed using encrypted channels or are embedded within licit traffic.","PeriodicalId":410892,"journal":{"name":"2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114409537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
FTTH solutions in the Slovenian telecommunications market 斯洛文尼亚电信市场的FTTH解决方案
B. Batagelj
{"title":"FTTH solutions in the Slovenian telecommunications market","authors":"B. Batagelj","doi":"10.1109/NETWKS.2014.6959239","DOIUrl":"https://doi.org/10.1109/NETWKS.2014.6959239","url":null,"abstract":"This invited paper provides an overview of the fiber-to-the-home (FTTH) access solutions that are implemented in the Slovenian telecommunications market. The optical network topology used by Slovenian operators is reviewed and the factors that have an impact on the investment in optical access networks are analyzed, including the competition, the regulatory authority and the Slovenian government. In the years before the economic crisis, an accelerated deployment of optical access networks and a consequent increase in the number of household optical connections were observed. The two main Slovenian operators are building a FTTH architecture in the form of point-to-point (P2P) solution, while some public-private partnership projects and one cable television operator have begun to use point-to-multi-point (P2MP) solutions. Although the P2P solution can provide a larger bandwidth per customer than the P2MP, it has already been noted that a mixture of P2P and P2MP solutions will be the right future-proof option, also because it allows multiple operators to be active on a single network. While P2P will serve for the more-demanding users, P2MP will be employed for residential users, with lower requirements, but this will still be in line with the European Digital Agenda.","PeriodicalId":410892,"journal":{"name":"2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132988901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Data rate adaptation mechanisms in vehicular networks 车载网络中的数据速率自适应机制
N. Nunes, S. Sargento
{"title":"Data rate adaptation mechanisms in vehicular networks","authors":"N. Nunes, S. Sargento","doi":"10.1109/NETWKS.2014.6959225","DOIUrl":"https://doi.org/10.1109/NETWKS.2014.6959225","url":null,"abstract":"Although several data rate adaptation mechanisms are available for Wi-Fi networks, the same is not true for vehicular networks and its IEEE 802.11p standard. In this paper, we study and evaluate the Wi-Fi available rate adaptation mechanisms in vehicular scenarios to understand their behaviour and analyse their performance under different conditions, in both urban and highway scenarios. The performance results show that loss differentiation algorithms (AARF-CD and CARA) perform better in dynamic and dense environments when compared with those without loss differentiation (Minstrel). They provide an efficient recovery strategy, since they are capable to distinguish the cause of frame loss. The results have also shown that rate adaptation mechanisms are more sensitive to the density of nodes when compared with other parameters; distance and velocity are the second and the third parameters with larger impact in rate adaptation.","PeriodicalId":410892,"journal":{"name":"2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121406521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Routing, spectrum and core assignment for space division multiplexing elastic optical networks 空分复用弹性光网络的路由、频谱和核心分配
H. Tode, Y. Hirota
{"title":"Routing, spectrum and core assignment for space division multiplexing elastic optical networks","authors":"H. Tode, Y. Hirota","doi":"10.1109/NETWKS.2014.6958538","DOIUrl":"https://doi.org/10.1109/NETWKS.2014.6958538","url":null,"abstract":"Elastic Optical Network (EON) is expected as one of future networks in terms of spectrum flexibility. While Routing and Wavelength Assignment (RWA) problem is one of the key issues in traditional Wavelength Division Multiplexing (WDM) networks, Routing and Spectrum Assignment (RSA) problem has much impact on network performance in EONs. On the other hand, Data-Center (DC) traffic and/or mobile back-haul traffic keep on increasing. To deal with such forthcoming huge capacity of applications, Space Division Multiplexing (SDM) technologies, such as Multi-Core Fiber (MCF) and few-mode fiber, are intensively researched. From network perspective, this paper focuses on Routing, Spectrum and Core Assignment (RSCA) problem for future SDM-EON. Introducing multi-core fibers makes RSA problem more complex because fiber-core dimension is newly expanded. In addition, physical impairment caused by MCF must be taken into account. In this paper, first, the target RSCA problem is divided into the routing and SCA problems, and K-shortest path based pre-computation method is introduced as the routing solution. Next, according to whether MCF has inter-core crosstalk or not, we propose SCA methods with crosstalk awareness and with prioritized area concept, respectively. Finally, the paper evaluates the effectiveness of the proposed algorithms compared with representative ones.","PeriodicalId":410892,"journal":{"name":"2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115619089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Trust management in mobile ad hoc networks 移动自组网中的信任管理
Michail Chatzidakis, S. Hadjiefthymiades
{"title":"Trust management in mobile ad hoc networks","authors":"Michail Chatzidakis, S. Hadjiefthymiades","doi":"10.1109/NETWKS.2014.6958525","DOIUrl":"https://doi.org/10.1109/NETWKS.2014.6958525","url":null,"abstract":"We investigate an approach to trust management in a mobile ad-hoc network by first clustering the network in an efficient manner based on the cost of analysis/processing concept, and then using the experience of some nodes to achieve trust information dissemination through the network. This is accomplished by first exchanging trust information between the nodes and the cluster-head when the cluster is initially formed, and later (on demand) when a client consults the cluster-head prior to proceeding with a transaction. We also examine a possible scenario for trust restoration if a node is found to be in low trust due to former malicious behavior.","PeriodicalId":410892,"journal":{"name":"2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115388663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Optical network evolution for 5G mobile applications and SDN-based control 5G移动应用的光网络演进和基于sdn的控制
N. Cvijetic
{"title":"Optical network evolution for 5G mobile applications and SDN-based control","authors":"N. Cvijetic","doi":"10.1109/NETWKS.2014.6958537","DOIUrl":"https://doi.org/10.1109/NETWKS.2014.6958537","url":null,"abstract":"The tight connection between advanced mobile techniques and optical networking has already been made by emerging cloud radio access network architectures, wherein fiber-optic links to/from remote cell sites have been identified as the leading high-speed, low-latency connectivity solution. By taking such fiber-optic mobile fronthaul networks as the reference case, this paper will consider their scaling to meet 5G demands as driven by key 5G mobile techniques, including massive multiple input multiple output (MIMO) and coordinated multipoint (CoMP), network densification via small/pico/femto cells, device-to-device (D2D) connectivity, and an increasingly heterogeneous bring-your-own-device (BYOD) networking environment. Ramifications on mobile fronthaul signaling formats, optical component selection and wavelength management, topology evolution and network control will be examined, highlighting the need to move beyond raw common public radio interface (CPRI) solutions, support all wavelength division multiplexing (WDM) optics types, enable topology evolution towards a meshed architecture, and adopt a software-defined networking (SDN)-based network control plane. The proposed optical network evolution approaches are viewed as opportunities for both optimizing user-side quality-of-experience (QoE) and monetizing the underlying optical network.","PeriodicalId":410892,"journal":{"name":"2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131945014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Fine granular architecture for optical metro transport network 光城域传输网络的细颗粒结构
Olivier Renais, E. Le Rouzic, P. Gavignet, B. Arzur, A. Triki
{"title":"Fine granular architecture for optical metro transport network","authors":"Olivier Renais, E. Le Rouzic, P. Gavignet, B. Arzur, A. Triki","doi":"10.1109/NETWKS.2014.6959203","DOIUrl":"https://doi.org/10.1109/NETWKS.2014.6959203","url":null,"abstract":"Facing a tremendous IP traffic growth that does not bring significant revenues, ISPs need to improve network efficiency. They work with equipment manufacturers on solutions to improve synergies between the packet and the optical layer. If the available IP & Optical convergence solutions answer today's issues, they do not help handling the traffic pattern changes that Over The Top (OTT) players' content distribution strategy may induce. This paper proposes a fine granular packet transport architecture for optical Metro networks, which leverages on functions provided by Next Generation WDM (NG WDM) platforms, and Sub-Lambda Photonically Switched Networks (SLPSN) technology. The operation principles on which it is based have been demonstrated, and the features it relies on, already exist. Its implementation would only require a deeper standardization of the WDM layer and software developments. First results show remarkable improvement of the proposed solution in terms of bandwidth efficiency compared to classical IPoWDM.","PeriodicalId":410892,"journal":{"name":"2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129457629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data broadcasting over DAB/DMB with Fountain codes and auxilliary mobile data channels 通过带有喷泉码和辅助移动数据通道的DAB/DMB数据广播
Paulo Alexandre, José Vieira, A. Navarro
{"title":"Data broadcasting over DAB/DMB with Fountain codes and auxilliary mobile data channels","authors":"Paulo Alexandre, José Vieira, A. Navarro","doi":"10.1109/NETWKS.2014.6959244","DOIUrl":"https://doi.org/10.1109/NETWKS.2014.6959244","url":null,"abstract":"In this paper we propose a system for efficient broadcasting of digital data using DAB/DMB with Fountain Codes and an auxiliary mobile data channel to provide feedback about the completeness of the transmitted data by all the receivers. This auxiliary channel can also be used to supply extra codewords to the receivers that failed the message decoding previously brodcasted. We also show that this combined system can be an highly efficient solution when a large number of receivers are expected to receive the same information such as in outdoor electronic signage.","PeriodicalId":410892,"journal":{"name":"2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130117159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信