Ziteng Cui, J. Liao, Jingyu Wang, Q. Qi, Jing Wang
{"title":"Cooperative overlay routing in a multiple overlay environment","authors":"Ziteng Cui, J. Liao, Jingyu Wang, Q. Qi, Jing Wang","doi":"10.1109/ICC.2014.6883797","DOIUrl":"https://doi.org/10.1109/ICC.2014.6883797","url":null,"abstract":"Overlay networks have been widely developed over the past few years. More and more overlays are deployed on the top of the same native network, and share the same physical resources. Competing for these physical resources, co-existing overlays may affect each other adversely. It has been showed that by using selfish overlay routing, co-existing overlays would be likely to converge to a Nash equilibrium which is sub-optimal. However, to achieve the global optimal may also cause the performance degradation of certain overlays, which make it hard to realize. Inspired by the Nash bargaining solution, a cooperative method is proposed for two co-existing overlays to achieve a near Pareto optimal. Simulations are performed to evaluate the proposed approach. The results show that the approach is effective and efficient in the multiple overlay networks environment.","PeriodicalId":444628,"journal":{"name":"2014 IEEE International Conference on Communications (ICC)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126287123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Husnu S. Narman, Md. Shohrab Hossain, Mohammed Atiquzzaman
{"title":"h-DDSS: Heterogeneous Dynamic Dedicated servers scheduling in cloud computing","authors":"Husnu S. Narman, Md. Shohrab Hossain, Mohammed Atiquzzaman","doi":"10.1109/ICC.2014.6883859","DOIUrl":"https://doi.org/10.1109/ICC.2014.6883859","url":null,"abstract":"Simplicity of usage, flexibility of data access, ease of maintenance, time and energy efficiency, and pay as you go policy have increased the usage of cloud computing over traditional computing. Cloud computing should be able to meet the performance expectations of different classes of customers. However, inefficient scheduling algorithms decrease the quality of service experienced by users. To improve quality of service, several scheduling algorithms have been proposed in the literature. However, these scheduling algorithms do not consider heterogeneous servers or different priority classes of customers. Our objective is to satisfy performance expectations of customers by proposing a Heterogeneous Dynamic Dedicated Server Scheduling (h-DDSS) while considering heterogeneous servers and different priority classes of customers. Results show that h-DDSS architecture can provide improved customer throughput and drop rate over homogeneous DDSS in cloud computing. Our proposed scheduling algorithm and related analysis will help cloud service providers build efficient cloud service architectures which are adaptable to homogeneous and heterogeneous environments by considering different types of priority class performances, such as, drop rate, throughput, and utilization.","PeriodicalId":444628,"journal":{"name":"2014 IEEE International Conference on Communications (ICC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126423554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual machine allocation policies against co-resident attacks in cloud computing","authors":"Yi Han, Jeffrey Chan, T. Alpcan, C. Leckie","doi":"10.1109/ICC.2014.6883415","DOIUrl":"https://doi.org/10.1109/ICC.2014.6883415","url":null,"abstract":"While the services-based model of cloud computing makes more and more IT resources available to a wider range of customers, the massive amount of data in cloud platforms is becoming a target for malicious users. Previous studies show that attackers can co-locate their virtual machines (VMs) with target VMs on the same server, and obtain sensitive information from the victims using side channels. This paper investigates VM allocation policies and practical countermeasures against this novel kind of co-resident attack by developing a set of security metrics and a quantitative model. A security analysis of three VM allocation policies commonly used in existing cloud computing platforms reveals that the server's configuration, oversubscription and background traffic have a large impact on the ability to prevent attackers from co-locating with the targets. If the servers are properly configured, and oversubscription is enabled, the best policy is to allocate new VMs to the server with the most VMs. Based on these results, a new strategy is introduced that effectively decreases the probability of attackers achieving co-residence. The proposed solution only requires minor changes to current allocation policies, and hence can be easily integrated into existing cloud platforms to mitigate the threat of co-resident attacks.","PeriodicalId":444628,"journal":{"name":"2014 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126465636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Javed, Haibo Zhang, Zhiyi Huang, Jeremiah D. Deng
{"title":"BWS: Beacon-driven wake-up scheme for train localization using wireless sensor networks","authors":"A. Javed, Haibo Zhang, Zhiyi Huang, Jeremiah D. Deng","doi":"10.1109/ICC.2014.6883331","DOIUrl":"https://doi.org/10.1109/ICC.2014.6883331","url":null,"abstract":"Real-time train localization using wireless sensor networks (WSNs) offers huge benefits in terms of cost reduction and safety enhancement in railway environments. A challenging problem in WSN-based train localization is how to guarantee timely communication between the anchor sensors deployed along the track and the gateway deployed on the train with minimum energy consumption. This paper presents an energy-efficient scheme for timely communication between the gateway and the anchor sensors, in which each anchor sensor runs an asynchronous duty-cycling protocol to conserve energy and wakes up only when it goes into the communication range of the gateway. A beacon-driven wake-up scheme is designed, and we establish the upper bound on the amount of time that an anchor sensor can sleep in one duty cycle to guarantee timely wake-up once a train approaches. We also give a thorough theoretical analysis for the energy efficiency of our scheme and give the optimal amount of time that an anchor sensor should sleep in terms of minimizing the total energy consumption at each anchor sensor. We evaluate the performance of our scheme through simulations, and results show that our scheme can wake up anchor sensors timely at a very low cost on energy consumption.","PeriodicalId":444628,"journal":{"name":"2014 IEEE International Conference on Communications (ICC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128104379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Ntontin, M. Renzo, A. Pérez-Neira, C. Verikoukis
{"title":"Error rate analysis and optimal power allocation in multiple access relay channels with Analog Network Coding","authors":"K. Ntontin, M. Renzo, A. Pérez-Neira, C. Verikoukis","doi":"10.1109/ICC.2014.6883873","DOIUrl":"https://doi.org/10.1109/ICC.2014.6883873","url":null,"abstract":"In this paper, we examine multi-source multi-relay systems that employ Analog Network Coding for which we provide a two-fold contribution: i) We derive a closed-form upper bound of the average symbol error rate (SER) per source of the system, which is shown to be tight in the high-Signal-to-Noise Ratio (SNR) region, especially for an adequate number of relays, and ii) based on this bound, for a given total power budget to be distributed among the source and relay nodes we formulate the power allocation optimization problem with the aim of minimizing the SER per source. Results show that for a common target SER among the sources, an increase in their number results in an increase in the expected energy gains over the equal power allocation for all the nodes policy.","PeriodicalId":444628,"journal":{"name":"2014 IEEE International Conference on Communications (ICC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121941637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topology-aware Virtual Network Embedding based on multiple characteristics","authors":"Min Feng, J. Liao, Jingyu Wang, Sude Qing, Q. Qi","doi":"10.1109/ICC.2014.6883774","DOIUrl":"https://doi.org/10.1109/ICC.2014.6883774","url":null,"abstract":"Network Virtualization provides a promising tool to allow multiple heterogeneous virtual networks to run on a shared substrate network simultaneously. A long-standing challenge in Network Virtualization is the Virtual Network Embedding (VNE) problem: how to embed virtual networks onto specific physical nodes and links in the substrate network effectively and efficiently. Recent research presents several heuristic algorithms that only consider single network topological attribute, which may lead to decreased utilization of resources. In this paper, we introduce seven complementary characteristics that reflect different topological attributes, and propose three topology-aware VNE algorithms by leveraging their respective advantages. Due to overall considering topological attributes of substrate and virtual networks through multiple characteristics, our study better coordinates node and link embedding. Extensive simulations demonstrate that our algorithms improve the long-term average revenue, acceptance ratio, and revenue/cost ratio compared to previous algorithms.","PeriodicalId":444628,"journal":{"name":"2014 IEEE International Conference on Communications (ICC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127908690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalability analysis of SDN-controlled optical ring MAN with hybrid traffic","authors":"R. Veisllari, N. Stol, S. Bjornstad, C. Raffaelli","doi":"10.1109/ICC.2014.6883827","DOIUrl":"https://doi.org/10.1109/ICC.2014.6883827","url":null,"abstract":"The development of software defined networking (SDN) has instigated a growing number of experimental studies which demonstrate the flexibility in network control and management introduced by this technique. Optical networks add new challenges for network designers and operators to successfully dimension and deploy an SDN-based in the optical domain. At present, few performance evaluations and scalability studies that consider the high-bandwidth of the optical domain and the flow characterization from current Internet statistics have been developed. In this paper these parameters are taken as key inputs to study SDN scalability in the optical domain. As a relevant example an optical ring Metropolitan Area Network (MAN) is analyzed with circuit and packet traffic integrated at the wavelength level. The numerical results characterize the limitations in network dimensioning when considering an SDN controller implementation in the presence of different flow mixes. Employing flow aggregation and/or parallel distributed controllers is outlined as potential solution to achieve SDN network scalability.","PeriodicalId":444628,"journal":{"name":"2014 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115759300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Quang-Dung Ho, Chon-Wang Chao, Mahsa Derakhshani, T. Le-Ngoc
{"title":"An analysis on throughput and feasibility of Narrow-band Power Line Communications in Advanced Distribution Automation scenarios","authors":"Quang-Dung Ho, Chon-Wang Chao, Mahsa Derakhshani, T. Le-Ngoc","doi":"10.1109/ICC.2014.6883985","DOIUrl":"https://doi.org/10.1109/ICC.2014.6883985","url":null,"abstract":"Advanced Distribution Automation (ADA) is one of the key applications of the Smart Grid (SG). Since Narrow-band Power Line Communications (NB-PLC) can offer a cost-effective communication infrastructure supporting data acquisition and automation, it has appeared to be one of the most promising technologies to enable ADA. However, the applicability of NB-PLC needs to be investigated carefully since this technology still exhibits some limitations related to throughput, signal attenuation/distortion and reliability in ADA scenarios. This paper attempts to give a reasonable data rate estimation by considering realistic ADA infrastructures/applications and IEC 61850 as the primary data modeling and communications standard for ADA. Effects of channel contention at Medium Access Control (MAC) layer on the achievable throughput of existing NB-PLC technologies are investigated. The data rate estimation and throughput analysis are then used to evaluate the feasibility of NB-PLC in supporting ADA applications.","PeriodicalId":444628,"journal":{"name":"2014 IEEE International Conference on Communications (ICC)","volume":"54 25","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113937710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DistributedNet: A reasonable pricing and flexible network architecture for datacenter","authors":"Yong Zhan, Du Xu, Yiqi Ou","doi":"10.1109/ICC.2014.6883946","DOIUrl":"https://doi.org/10.1109/ICC.2014.6883946","url":null,"abstract":"Data Center Traffic has the nature of diversity, variability and unpredictability. Due to the varying link state, the network bandwidth value changes. Traditionally, most of the t cloud providers employ static strategies based on predicting or pre-testing tenants' traffic characteristics [5] [8] [6]. Since no perfect traffic prediction methods have been proposed so far, these static methods result in unsatisfactory resource utilization and unreasonable cost. Therefore, this paper aims at designing a decentralized resource allocation method and a dynamic pricing policy based on network state and tenant demands. We can achieve work conservation and adaptability pricing with our network architecture. The simulation results show that DistributedNet can provide performance isolation, differentiated service and min-bandwidth guarantee.","PeriodicalId":444628,"journal":{"name":"2014 IEEE International Conference on Communications (ICC)","volume":"12 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132241345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Kempf, Martin Körling, S. Baucke, S. Touati, Victa McClelland, I. Mas, Olof Backman
{"title":"Fostering rapid, cross-domain service innovation in operator networks through Service Provider SDN","authors":"J. Kempf, Martin Körling, S. Baucke, S. Touati, Victa McClelland, I. Mas, Olof Backman","doi":"10.1109/ICC.2014.6883791","DOIUrl":"https://doi.org/10.1109/ICC.2014.6883791","url":null,"abstract":"Software defined networking (SDN) and Network Function Virtualization (NFV) are new approaches to next generation network architecture for operator networks that have received much discussion in the research literature and in new forums organized to standardize their interfaces. While these approaches to network architecture are important, they only cover part of the problem. A fundamental property required from any next generation architecture is support for rapid, cross-domain service innovation. In this paper, we discuss Service Provider SDN (SP-SDN), an architectural approach to rapid service innovation based on exposure of functionality for cross-domain control at the service layer. The functionality is exposed through Web-style interfaces that feature abstractions crafted by suppressing detail irrelevant for the majority of the created services. The control spans mobile, fixed and cloud operator networks, allowing the rapid and flexible provisioning of services across all three domains. We compare this approach to SDN and NFV, and find that SP-SDN complements rather than competes with the two. We present two examples of prototype systems built with SP-SDN.","PeriodicalId":444628,"journal":{"name":"2014 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132248594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}