{"title":"Measuring the quality of experience of HTTP video streaming","authors":"Ricky K. P. Mok, Edmond W. W. Chan, R. Chang","doi":"10.1109/INM.2011.5990550","DOIUrl":"https://doi.org/10.1109/INM.2011.5990550","url":null,"abstract":"HTTP video streaming, such as Flash video, is widely deployed to deliver stored media. Owing to TCP's reliable service, the picture and sound quality would not be degraded by network impairments, such as high delay and packet loss. However, the network impairments can cause rebuffering events which would result in jerky playback and deform the video's temporal structure. These quality degradations could adversely affect users' quality of experience (QoE). In this paper, we investigate the relationship among three levels of quality of service (QoS) of HTTP video streaming: network QoS, application QoS, and user QoS (i.e., QoE). Our ultimate goal is to understand how the network QoS affects the QoE of HTTP video streaming. Our approach is to first characterize the correlation between the application and network QoS using analytical models and empirical evaluation. The second step is to perform subjective experiments to evaluate the relationship between application QoS and QoE. Our analysis reveals that the frequency of rebuffering is the main factor responsible for the variations in the QoE.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124618981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Situated vs. global aggregation schemes for autonomous management systems","authors":"R. Makhloufi, G. Doyen, Grégory Bonnet, D. Gaïti","doi":"10.1109/INM.2011.5990525","DOIUrl":"https://doi.org/10.1109/INM.2011.5990525","url":null,"abstract":"In the context of autonomous network management, the Autonomic Managers (AMs) need to collect management information from other elements in order to infer an overall state of the network considered by the decision making process. Two concurrent strategies are commonly used to achieve this operation. On one hand, approaches based on a situated view only gather information in a bounded neighborhood, thus providing a high reactivity to AMs for control operations. On the other hand, approaches based on a global view provide a good accuracy at the cost of a larger convergence time. Being able to choose the best approach in a given context is crucial to ensure the efficiency of an autonomous management system. Thus, in this paper, we perform an exhaustive performance analysis of these approaches by considering typical schemes of both of them, namely a one-hop and two-hops situated view against gossip- and tree-based global aggregation schemes. Metrics we consider are the convergence time, communication and computation cost, scalability and the accuracy of estimated aggregates. Given them, we show under which conditions an approach outperforms the others.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128871543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaofei Wang, Xiaojun Wang, Chengchen Hu, Keqiang He, Junchen Jiang, B. Liu
{"title":"Measurements on movie distribution behavior in Peer-to-Peer networks","authors":"Xiaofei Wang, Xiaojun Wang, Chengchen Hu, Keqiang He, Junchen Jiang, B. Liu","doi":"10.1109/INM.2011.5990585","DOIUrl":"https://doi.org/10.1109/INM.2011.5990585","url":null,"abstract":"Peer-to-Peer (P2P) mode dominates the way that files are shared over the Internet today. A measurement study on the user behavior during the P2P file sharing is important and helpful to better understand and design P2P networks. In this paper, we developed a method to collect information about peers and connections in movie sharing at the BitTorrent client side. Based on the collected data, we have derived 5 observations in the influence upon peers and connections distributions over geographic areas (at different levels of continents, countries, cities) by differences of population, GDP (Gross Domestic Product), time zone and life style.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133887563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the use of SNMP as a management interface for virtual networks","authors":"F. F. Daitx, R. Esteves, L. Granville","doi":"10.1109/INM.2011.5990689","DOIUrl":"https://doi.org/10.1109/INM.2011.5990689","url":null,"abstract":"Virtual networks emerged as an alternative for network infrastructure provision. However, the growth in users demand for shared resources over network elements increase allocation complexity. Thus, enabling effective management on each node is key to the global network operation. This work investigate the use of SNMP as a management interface for virtual routers in order to support automation and provide optimal use of physical assets. The solution was evaluated in two virtualization platforms (Xen and VMware) in order the verify the advantages and limitations of the proposed management interface.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132905393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Salvador, J. Almeida, J. Nogueira, P. T. Barbosa, L. Granville
{"title":"A characterization study of SNMP usage patterns","authors":"E. Salvador, J. Almeida, J. Nogueira, P. T. Barbosa, L. Granville","doi":"10.1109/INM.2011.5990657","DOIUrl":"https://doi.org/10.1109/INM.2011.5990657","url":null,"abstract":"The Simple Network Management Protocol (SNMP), proposed almost 20 years ago, still remains as the de facto standard for TCP/IP networks managing. However, there are few studies that present the real usage of SNMP in production networks. This work aims at presenting a characterization study that was performed over a sample of the management traffic from the Brazilian Education and Research Network (RNP). The achieved results may help both academy and industry in the development of new technologies for managing networks, in order to better meet the needs of the production networks users and administrators.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114464265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PTF: Passive Temporal Fingerprinting","authors":"J. François, H. Abdelnur, R. State, O. Festor","doi":"10.1109/INM.2011.5990703","DOIUrl":"https://doi.org/10.1109/INM.2011.5990703","url":null,"abstract":"We describe in this paper a tool named PTF (Passive and Temporal Fingerprinting) for fingerprinting network devices. The objective of device fingerprinting is to uniquely identify device types by looking at captured traffic from devices implementing that protocol. The main novelty of our approach consists in leveraging both temporal and behavioral features for this purpose. The key contribution is a fingerprinting scheme, where individual fingerprints are represented by tree-based temporal finite state machines. We have developed a fingerprinting scheme that leverages supervised learning approaches based on support vector machines for this purpose.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134543049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Filtering multivariate workload non-conformance in shared IT-infrastructures","authors":"Thomas Setzer, A. Stage","doi":"10.1109/INM.2011.5990565","DOIUrl":"https://doi.org/10.1109/INM.2011.5990565","url":null,"abstract":"Virtualized data centers are hosting virtual machines (VMs) running enterprise applications with time varying resource demand behavior (workload) jointly on the same physical servers in order to increase server utilization. To avoid server overload situations, a data center operator needs to decide which VMs should be assigned to a physical server for a given period of time. As assignment decisions are based on historical workload traces, deviations from forecasted demands potentially require the adaptation of VM assignments. However, VM live migrations are inherently overhead afflicted control operations. While it is mandatory to anticipate overload situations in order to trigger VM migrations in a proactive manner, unnecessary VM migrations may have negative impact on the underlying computing infrastructure. Hence, an autonomic controller should accurately predict situations where the aggregated workload of a set of collocated VMs will hit the capacity limit of a server without requiring manual adjustments of control model parameters. In this paper we propose an automated, non-parametric approach for proactive filtering of multivariate workload behavior. We learn an orthonormal projection from historical workload traces and extract a set of key metrics that concisely describe relevant developments in the joint workload behavior of physical servers. A geometric interpretation, in combination with simple short term forecasting techniques allows for reliable decision making. Based on a set of real world workload traces we conduct numerical experiments that validates its superiority and predictive capabilities over simple threshold based approaches.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133445708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Inoyatov, S. Tursunova, Igor Kim, Young-Tak Kim
{"title":"IEEE 802.21 MIH in Linux Kernel space for cognitive and smart handovers","authors":"K. Inoyatov, S. Tursunova, Igor Kim, Young-Tak Kim","doi":"10.1109/INM.2011.5990653","DOIUrl":"https://doi.org/10.1109/INM.2011.5990653","url":null,"abstract":"This paper proposes an implementation of IEEE 802.21 MIH (Media Independent Handover) in Linux kernel space for cognitive and smart handovers. In the proposed scheme, the surrounding wireless access network information is collected and provided by IEEE 802.21 MIH, and the mobile node (MN) performs time-limited smart scanning with interleaved packet delivery for target access point. For better performance, the MIH functions have been implemented as Linux kernel modules that minimize the overheads in event notification and command processing. During the smart channel scanning,MIH is used to inform the change of MN's operation mode to network (e.g., MAG - mobile access gateway), asking the buffering of downlink packets during the smart scanning. The smart scanning is controlled to limit the service interruption time to be less than 50 ms, in order to guarantee the QoS requirement of realtime multimedia service, especially jitter and packet loss. The overall performances of the MIH operations and QoS provisioning are analyzed in detail. The proposed IEEE 802.21 MIH on Linux kernel can support various horizontal and vertical handovers across heterogeneous wireless access networks for QoS-guaranteed seamless realtime service provisioning1.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133491118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Presence based network topology tracing system for VoIP networks","authors":"A. Acharya, Shachi Sharma, N. Banerjee","doi":"10.1109/INM.2011.5990601","DOIUrl":"https://doi.org/10.1109/INM.2011.5990601","url":null,"abstract":"Tracing topology of services in real-time is a challenging problem in VoIP networks. The primary reason is that the VoIP networks operate with diverse interconnecting protocols, technologies, and multitude of access technologies. In addition, alliances, changing rules and regulations, mergers, new technologies and services impact architecture of VoIP networks consistently. All of these together results in heterogeneous, complex and dynamic VoIP networks where the network topology changes very frequently. Secondly, in case of voice, each call can follow a different path over the core IP infrastructure in the network. Even the signaling and media path of the same voice call can follow different paths to destination (callee's device). Stitching and providing integrated end to end cross layer view of the path in real-time of an ongoing service flow e.g. voice call under such unpredictable network conditions is difficult.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116049280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cover-VT: Converged Security Visualization Tool","authors":"W. Urbanski, M. Dunlop, R. Marchany, J. Tront","doi":"10.1109/INM.2011.5990663","DOIUrl":"https://doi.org/10.1109/INM.2011.5990663","url":null,"abstract":"The amount of data that floods today's networks is well beyond what security analysts can manage by textual means alone. In an effort to solve this problem, researchers have explored different methods of visualizing network security threats. There is little debate that humans can perceive more information visually than textually. The problem is that the majority of visualization tools in practice or proposed do not take efficient visualization techniques into consideration. As a result, it is difficult to get a high-level view of the network that facilitates rapid isolation of network attacks. We propose the Converged Security Visualization Tool (Cover-VT) to solve the efficient visualization problem. Cover-VT was designed to provide analysts with a high-level view of network threats using geographic information systems. The tool allows for rapid identification of threats by minimizing the cognitive obstacles to efficient threat location. Cover-VT includes the capability to drill-down on a node of interest for additional details and even filter out unwanted data. Cover-VT was designed with usability in mind, making it easy to comprehend while assisting the analyst in rapid threat identification. Many different security tools make up a security analyst's tool kit. Cover-VT was developed as an effective security visualization system that integrates existing security tools and network security systems.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130224404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}