The next generation Internet will face new challenges due to the coexisting heterogeneous networks and highly diverse networking applications. Therefore how to coordinate heterogeneous networking systems to support a wide spectrum of application requirements becomes a significant research problem. A key to solving this problem lies in effective and flexible collaborations among heterogeneous networking systems and interactions between applications and the underlying networks. Network virtualization plays a crucial role in enabling such collaborations and interactions, and the Service-Oriented Architecture (SOA) provides a promising approach to supporting network virtualization. Network service description and discovery are key technologies for applying SOA in networking, and the current service description and discovery technologies must be evolved to meet the special requirements of future Internet. In this paper, we study the problem of network service description and discovery to support network virtualization in the next generation Internet. The main contributions of this paper include a general approach to describing service capabilities of various heterogeneous networking systems, a technology to discover and select the network services that guarantee the QoS requirements of different networking applications, a general profile for specifying networking demands of various applications, a scheme of network resource allocation for QoS provisioning, and a system structure for realizing the network description, discovery, and resource allocation technologies. We also propose information update mechanisms for improving performance of the network service description and discovery system. The approach and technology developed in this paper are general and independent of network architectures and implementations; thus are applicable to the heterogeneous networking systems in the next generation Internet.
A decentralized paradigm for resource-aware computing in wireless Ad hoc netw...TELKOMNIKA JOURNAL
A key factor limiting the democratisation of networked systems is the lack of trust, particularly in the wake of data-intensive applications that work on sensitive and private data, which requires providing strong network security guarantees via encryption and authentication algorithms, as well as rethinking algorithms to compute on the network peripheries without moving data. In many security and privacy-critical domains such as Home Automation IoT networks, AUV networks etc., the existence of a centralized privileged node leads to a vulnerability for leakage of sensitive information. In this paper, we have proposed a decentralized networking architecture that adopts collaborative processing techniques and operates within the tradeoff between network security and performance. We have investigated the design and sustainability of autonomous decentralized systems and evaluated the efficiency of the proposed scheme with the help of extensive simulation tools.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of
managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption
and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP
preservation and optimal data path management according to application needs. A functional setup
validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
This document summarizes a research paper that proposes improvements to distributed mobility management (DMM) in software defined networking (SDN) and network functions virtualization-based mobile network architectures. The paper presents a new "Software defined plus virtualization featured Mobile Network (S+ MN)" architecture that uses SDN controllers and virtualization to distribute gateway functions. This allows for more efficient mobility management across heterogeneous networks, removal of IP address preservation chains during handovers, and optimal data path management according to application needs. The paper then evaluates the S+ MN architecture in terms of inter-system handover performance relative to control plane delay requirements for 5G networks.
An extensible, programmable, commercial-grade platform for internet service a...Tal Lavian Ph.D.
With their increasingly sophisticated applications, users promote the notion that there is more to a network (be it an intranet, or the Internet) than mere L1-3 connectivity. In what shapes a next generation service contract between users and the network, users want the network to offer services that are as ubiquitous and dependable as dial tones. Typical services include application-aware firewalls, directories, nomadic support, virtualization, load balancing, alternate site failover, etc. To fulfill this vision, a service architecture is needed. That is, an architecture wherein end-to-end services compose, on-demand, across network domains, technologies, and administration boundaries. Such an architecture requires programmable mechanisms and programmable network devices for service enabling, service negotiation, and service management. The bedrock foundation of the architecture, and also the key focus of the paper, is an open-source programmable service platform that is explicitly designed to best exploit commercial-grade network devices. The platform predicates a full separation of concerns, in that control-intensive operations are executed in software, whereas, data-intensive operations are delegated to hardware. This way, the platform is capable of performing wire-speed content filtering, and activating network services according to the state of data and control flows. The paper describes the platform and some distinguishing services realized on the platform.
The SAHARA Model for Service Composition Across Multiple Providers (2002)Tal Lavian Ph.D.
The document discusses technical challenges in composing services across multiple independent service providers. It presents a classification of service composition models into cooperative and brokered models. The cooperative model involves distributed responsibility across interacting service providers, while the brokered model involves a single broker composing services and assuming responsibility for the end-to-end service. Key challenges addressed are trust management across providers, adapting to network and user dynamics, resource provisioning and management, and interoperability.
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSIJCNCJournal
This document describes using the Analytic Hierarchy Process (AHP) to evaluate the quality of service (QoS) provided by different 3G mobile data networks to determine which network provides the best QoS for web browsing applications. The AHP method builds a hierarchy with the goal of determining the best network at the top, criteria like latency, jitter, data loss and throughput in the middle, and alternative networks at the bottom. Pairwise comparisons are used to calculate weights for the criteria and alternatives. Measured data is collected for the criteria from drive testing of the networks. The weights are then combined to produce overall scores for each network, with the highest scoring network providing the best QoS. The study implements AHP
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...ijcsa
Intelligent networks are becoming more enveloping and dwelling a new generation of applications are
deployed over the peer-to-peer networks. Intelligent networks are very attractive because of their role in
improving the scalability and enhancing performance by enabling direct and real-time communication
among the participating network stations. A suitable solution for resource management in distributed wireless systems is required which should support fault-tolerant operations, requested resources (at shortest path), minimize overhead generation during network management, balancing the load distribution between the participating stations and high probability of lookup success and many more. This article
presents a Movement Assisted Component Based Scalable Framework (MAC-SF) for the distributed
network which manages the distributed wireless resources and applications; monitors the behavior of the
distributed wireless applications transparently and attains accurate resource projections, manages the
connections between the participating network stations and distributes the active objects in response to the
user requests and changing processing and network conditions. This system is also compared with some
exiting systems. Results shows that MAC-SF is a better system and can be used in any wireless network.
A decentralized paradigm for resource-aware computing in wireless Ad hoc netw...TELKOMNIKA JOURNAL
A key factor limiting the democratisation of networked systems is the lack of trust, particularly in the wake of data-intensive applications that work on sensitive and private data, which requires providing strong network security guarantees via encryption and authentication algorithms, as well as rethinking algorithms to compute on the network peripheries without moving data. In many security and privacy-critical domains such as Home Automation IoT networks, AUV networks etc., the existence of a centralized privileged node leads to a vulnerability for leakage of sensitive information. In this paper, we have proposed a decentralized networking architecture that adopts collaborative processing techniques and operates within the tradeoff between network security and performance. We have investigated the design and sustainability of autonomous decentralized systems and evaluated the efficiency of the proposed scheme with the help of extensive simulation tools.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of
managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption
and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP
preservation and optimal data path management according to application needs. A functional setup
validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
This document summarizes a research paper that proposes improvements to distributed mobility management (DMM) in software defined networking (SDN) and network functions virtualization-based mobile network architectures. The paper presents a new "Software defined plus virtualization featured Mobile Network (S+ MN)" architecture that uses SDN controllers and virtualization to distribute gateway functions. This allows for more efficient mobility management across heterogeneous networks, removal of IP address preservation chains during handovers, and optimal data path management according to application needs. The paper then evaluates the S+ MN architecture in terms of inter-system handover performance relative to control plane delay requirements for 5G networks.
An extensible, programmable, commercial-grade platform for internet service a...Tal Lavian Ph.D.
With their increasingly sophisticated applications, users promote the notion that there is more to a network (be it an intranet, or the Internet) than mere L1-3 connectivity. In what shapes a next generation service contract between users and the network, users want the network to offer services that are as ubiquitous and dependable as dial tones. Typical services include application-aware firewalls, directories, nomadic support, virtualization, load balancing, alternate site failover, etc. To fulfill this vision, a service architecture is needed. That is, an architecture wherein end-to-end services compose, on-demand, across network domains, technologies, and administration boundaries. Such an architecture requires programmable mechanisms and programmable network devices for service enabling, service negotiation, and service management. The bedrock foundation of the architecture, and also the key focus of the paper, is an open-source programmable service platform that is explicitly designed to best exploit commercial-grade network devices. The platform predicates a full separation of concerns, in that control-intensive operations are executed in software, whereas, data-intensive operations are delegated to hardware. This way, the platform is capable of performing wire-speed content filtering, and activating network services according to the state of data and control flows. The paper describes the platform and some distinguishing services realized on the platform.
The SAHARA Model for Service Composition Across Multiple Providers (2002)Tal Lavian Ph.D.
The document discusses technical challenges in composing services across multiple independent service providers. It presents a classification of service composition models into cooperative and brokered models. The cooperative model involves distributed responsibility across interacting service providers, while the brokered model involves a single broker composing services and assuming responsibility for the end-to-end service. Key challenges addressed are trust management across providers, adapting to network and user dynamics, resource provisioning and management, and interoperability.
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSIJCNCJournal
This document describes using the Analytic Hierarchy Process (AHP) to evaluate the quality of service (QoS) provided by different 3G mobile data networks to determine which network provides the best QoS for web browsing applications. The AHP method builds a hierarchy with the goal of determining the best network at the top, criteria like latency, jitter, data loss and throughput in the middle, and alternative networks at the bottom. Pairwise comparisons are used to calculate weights for the criteria and alternatives. Measured data is collected for the criteria from drive testing of the networks. The weights are then combined to produce overall scores for each network, with the highest scoring network providing the best QoS. The study implements AHP
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...ijcsa
Intelligent networks are becoming more enveloping and dwelling a new generation of applications are
deployed over the peer-to-peer networks. Intelligent networks are very attractive because of their role in
improving the scalability and enhancing performance by enabling direct and real-time communication
among the participating network stations. A suitable solution for resource management in distributed wireless systems is required which should support fault-tolerant operations, requested resources (at shortest path), minimize overhead generation during network management, balancing the load distribution between the participating stations and high probability of lookup success and many more. This article
presents a Movement Assisted Component Based Scalable Framework (MAC-SF) for the distributed
network which manages the distributed wireless resources and applications; monitors the behavior of the
distributed wireless applications transparently and attains accurate resource projections, manages the
connections between the participating network stations and distributes the active objects in response to the
user requests and changing processing and network conditions. This system is also compared with some
exiting systems. Results shows that MAC-SF is a better system and can be used in any wireless network.
The exponential rise in wireless communication systems and allied applications has revitalized academiaindustries to achieve more efficient data transmission system to meet Quality-of-Service (QoS) demands. Amongst major wireless communication techniques, Mobile Ad-hoc Network (MANET) is found potential to provide decentralized and infrastructure less communication among multiple distributed nodes across network region. However, dynamic network conditions such as changing topology, congestion, packet drop, intrusion possibilities etc often make MANET’s routing a tedious task. On the other hand, mobile network feature broadens the horizon for intruders to penetrate the network and causes performance degradation. Unlike classical MANET protocols where major efforts have been made on single network parameter based routing decision, this research paper proposes a novel Elitist Genetic Algorithm (EGA) Multi-Objective Optimization assisted Network Condition Aware QoS-Routing Protocol for Mobile Ad-hoc Networks (MNCQM). Our proposed MNCQM protocol exhibits two phase implementation where at first it performs node-profiling under dynamic network topology for which three factors; irregular MAC information exchange, queuing overflow and topological variations have been considered. Towards this objective node features like Packet Forwarding Probability (PFP) at the MAC layer, Success Probability of Data Transmission (SPDT) of a neighboring node, and Probability of Successful Data Delivery (PSDD) have been obtained to estimate Node-Trustworthiness Index (NTI), which is further used to eliminate untrustworthy nodes. In the second phase of implementation, a novel Evolutionary Computing assisted nondisjoint best forwarding path selection model is developed that exploits node’s and allied link’s connectivity and availability features to identify the quasi-sub-optimal forwarding paths. EGA algorithm intends to reduce hop-counts, connectivity-loss and node or link unavailability to estimate best forwarding node. One key feature of the proposed model is dual-supplementary forwarding path selection that enables alternate path formation in case of link outage and thus avoids any iterative network discovery phase.
Network services are services that specialize in the handling of network-related or network-resident resources. Examples of network services are data transport service, network advance reservation service, network Quality of Service (QoS) service, network information service, network monitoring service, and AAA1 service.
This informational draft describes how several network services combine and yield a rich mediation function—a resource manager—between grid applications and legacy networks. Complements of these services, the network resource is seen joining CPU and storage as a first-class, grid-managed resource (and handled, as such, by a community scheduler, or other OGSA services).
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
This document discusses node selection algorithms for peer-to-peer content sharing over mobile cellular networks that consider downlink bandwidth limitations. It proposes two novel algorithms (DBaT-B and DBaT-N) that select peer nodes to maximize load balancing across cells while meeting the requesting peer's bandwidth needs. DBaT-B selects peers to satisfy the requesting peer's minimum bandwidth requirement, while DBaT-N selects a certain number of peers as requested. Both algorithms first choose peers in the least busy cell to improve load balancing.
Effective Approach For Content Based Image Retrieval In Peer-Peer To NetworksIRJET Journal
The document describes a proposed approach for content-based image retrieval in peer-to-peer networks. Existing methods represent images as high-dimensional feature vectors and index them using distributed high-dimensional indexes or locality sensitive hashing over distributed hash tables. However, these approaches have high network costs and workload imbalances. The proposed approach uses the bag-of-visual-words model to represent images, building inverted indexes of visual codewords over the distributed hash table. It also develops a dynamic codebook updating method to optimize the mutual information between the codebook and relevance information, balancing the workload among nodes as the peer-to-peer network and data evolve dynamically.
User Preference based Network Selection in Wireless NetworksIRJET Journal
This document summarizes a research paper on user preference-based network selection in wireless networks. It discusses how next generation wireless networks will integrate different technologies like GPRS, LTE, WiMAX and WLAN. The key challenge is deciding which network to handover to, called handoff decision. Many factors influence this decision, including available bandwidth, cost, security, and user preferences. The paper proposes a new network selection scheme that considers user preferences, network parameters and quality of service requirements to select the optimal network for handoff. It uses the IEEE 802.21 MIH framework to gather information about available networks and make the selection decision.
Performance and handoff evaluation of heterogeneous wireless networks 2IAEME Publication
This document discusses performance evaluations of heterogeneous wireless networks (HWNs) using the OPNET simulator. It implemented WLAN, WiMAX, and UMTS networks with applications like FTP, video conferencing, and VoIP. Handoff management between the networks was also evaluated. Simulation results showed WiMAX throughput was over 30% higher than WLAN and UMTS. Vertical handoff between WLAN-WiMAX and WLAN-UMTS was difficult without carefully engineering the WLAN network due to differences between the networks. Key metrics like delay, throughput, and received traffic were analyzed and WiMAX generally had superior performance.
This paper presents a distributed software mobile agent framework for media access. The
access and delivery of media is enhanced by an agent architecture framework that
utilizesmobile agent characteristics to provide access and delivery of media. Migrating agents
to the media source and destination devices enables the framework to discover the properties of
devices and media within networks dynamically. The mobile agents in this framework make
decisions and work together to enable access and delivery of media through the transcoding of
media based on the properties of the data path and device constraints.
DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...Tal Lavian Ph.D.
An architecture is proposed for data-intensive services enabled by next generation dynamic optical networks. The architecture supports new data communication services that allow for coordinating extremely large sets of distributed data. The architecture allows for novel features including algorithms for optimizing and scheduling data transfers,methods for allocating and scheduling network resources, and an intelligent middleware platform that is capable of interfacing application level services to the underlying optical technologies. The significance of the architecture is twofold: 1) it encapsulates “optical network resources” into a service framework to support dynamically provisioned and advance scheduled data-intensive transport services, and 2) it establishes a generalized enabling framework for intelligent services and applications over next generation networks, not necessarily optical end-to-end. DWDM-RAM1 is an implementation version of the architecture, which is conceptual as well as experimental. This architecture has been implemented in prototype on OMNInet, which is an advanced experimental metro area optical testbed that is based on novel architecture, protocols, control plane services (Optical Dynamic Intelligent Network-ODIN2), and advanced photonic components. This paper presents the concepts behind the DWDM-RAM architecture and its design. The paper also describes an application scenario using the architecture’s data transfer service and network resource services over the agile OMNInet testbed.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
The underlying fabric for communication among intelligent
agents will in many cases be provided by telecommunication
networks. But telecommunication networks have been seen as
a natural domain for the investigation and application of
intelligent agents’ technology as it emerged from the area of
Distributed Artificial Intelligence (DAI). Telecommunication
network administrations are vast organizations dedicated to
operating and managing networks with broad functional
segmentations: telephone network outside plant, switching and
transmission plants, public network, all supporting different
layers of specialized customer or service networks. These
networks are organized into multiple physical and logical
layers built with large quantities of repeated network elements
and sub network structures. All these elements need to be
configured, monitored, and controlled. In the future, this will
preferably be done by automated operation support systems
and without substantial human intervention.
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...Zhenyun Zhuang
Wireless Networks (2010)
http://dl.acm.org/citation.cfm?id=1873504
Peer-to-peer (P2P) data networks dominate
Internet traffic, accounting for over 60% of the overall
traffic in a recent study. In this work, we study the
problems that arise when mobile hosts participate in
P2P networks. We primarily focus on the performance
issues as experienced by the mobile host, but also study
the impact on other fixed peers. Using BitTorrent as a
key example, we identify several unique problems that
arise due to the design aspects of P2P networks being
incompatible with typical characteristics of wireless
and mobile environments. Using the insights gained
through our study, we present a wireless P2P (wP2P)
client application that is backward compatible with existing
fixed-peer client applications, but when used on
mobile hosts can provide significant performance improvements.
Evaluating content-centric communication over power line communication infras...Khaled Ben Driss
"Evaluating content-centric networking over PLC infrastructure for smart grids" (ci-joint), cet article sera présenté à la conférence AWICT du 07 au 09 Octobre 2015 (http://www.awict.net/)
The document discusses key concepts in network management including network analysis, architecture, design, and requirements analysis. It defines important terms like mission-critical networks, bandwidth, network services, quality of service, and performance characteristics. The document also covers topics like systems methodology, identifying system components, and factors that affect network architecture/design decisions. Overall, the document provides an overview of the fundamental concepts and processes involved in network management.
Insights on critical energy efficiency approaches in internet-ofthings applic...IJECEIAES
This document summarizes approaches to improving energy efficiency in internet-of-things (IoT) applications. It discusses how cross-layer schemes can be used to optimize network performance and energy efficiency in IoT systems. It also examines optimization-based approaches using machine learning techniques. While various studies have identified methods to improve energy efficiency, open issues remain that need to be addressed to further enhance IoT system performance and outcomes.
2005-03-29 Web Services: ES Rationale and AssertionsRudolf Husar
The document discusses web services as a technology for building distributed applications and sharing resources over a network. It describes how web services allow data, services, and users to be distributed throughout a peer-to-peer network. Users can compose processing chains from reusable services to add value to data. This architecture helps users find and access resources while reducing their burden. The document also discusses some challenges with using web services, such as inadequate service catalogs and a lack of semantic interoperability.
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...IRJET Journal
This document presents a comparative study on embedded feature selection techniques for internet traffic classification. It discusses using machine learning and deep learning algorithms like Naive Bayes, Random Forest, Support Vector Machine (SVM), and Multilayer Perceptron (MLP) on network traffic datasets to classify traffic. The performance of these techniques is analyzed in terms of error metrics, with the results showing that the proposed deep learning approach using MLP outperforms existing machine learning techniques. The document also provides background on internet traffic classification and related work applying techniques like K-means clustering, C5.0 decision trees, and SVM to classify network application traffic based on flow features.
International journal of computer networks & communications (ijcnc) --no...IJCNCJournal
This document summarizes a research paper that proposes a technique to improve the detection of false report attacks in wireless sensor networks (WSNs) using machine learning and a neural network. The technique evaluates report information gathered from base stations to identify invalid data and detect false report attacks, even when MAC information is compromised. This is an improvement over existing security protocols that rely on MAC-dependent validation, which cannot defend against extreme false report attacks. The proposed method uses a machine learning-based prediction model and evaluation function to verify false report attacks based on analyzing reports from the base station. This intelligent approach aims to help WSNs better defend against evolving attacks.
A survey of models for computer networks managementIJCNCJournal
The virtualization concept along with its underlyin
g technologies has been warmly adopted in many fiel
ds
of computer science. In this direction, network vir
tualization research has presented considerable res
ults.
In a parallel development, the convergence of two d
istinct worlds, communications and computing, has
increased the use of computing server resources (vi
rtual machines and hypervisors acting as active
network elements) in network implementations. As a
result, the level of detail and complexity in such
architectures has increased and new challenges need
to be taken into account for effective network
management. Information and data models facilitate
infrastructure representation and management and
have been used extensively in that direction. In th
is paper we survey available modelling approaches a
nd
discuss how these can be used in the virtual machin
e (host) based computer network landscape; we prese
nt
a qualitative analysis of the current state-of-the-
art and offer a set of recommendations on adopting
any
particular method.
The document describes how to configure and run a Scanner Only test on a QualiPoc phone to perform radio frequency scans for GSM and WCDMA networks. Key steps include selecting the scan technology (GSM or WCDMA), bands, and channel ranges. Performance can vary from 1-20 seconds depending on the configuration and device. Scan results are monitored through log files and bar charts showing signal levels and channels.
This document describes TALX's I-9 management service, which allows employers to complete I-9 forms electronically. Key features include secure online completion of I-9 forms, electronic storage to replace paper forms, automatic notifications of expiring work authorizations, and reporting capabilities. The service aims to help employers maintain immigration compliance and eliminate paper processes.
The exponential rise in wireless communication systems and allied applications has revitalized academiaindustries to achieve more efficient data transmission system to meet Quality-of-Service (QoS) demands. Amongst major wireless communication techniques, Mobile Ad-hoc Network (MANET) is found potential to provide decentralized and infrastructure less communication among multiple distributed nodes across network region. However, dynamic network conditions such as changing topology, congestion, packet drop, intrusion possibilities etc often make MANET’s routing a tedious task. On the other hand, mobile network feature broadens the horizon for intruders to penetrate the network and causes performance degradation. Unlike classical MANET protocols where major efforts have been made on single network parameter based routing decision, this research paper proposes a novel Elitist Genetic Algorithm (EGA) Multi-Objective Optimization assisted Network Condition Aware QoS-Routing Protocol for Mobile Ad-hoc Networks (MNCQM). Our proposed MNCQM protocol exhibits two phase implementation where at first it performs node-profiling under dynamic network topology for which three factors; irregular MAC information exchange, queuing overflow and topological variations have been considered. Towards this objective node features like Packet Forwarding Probability (PFP) at the MAC layer, Success Probability of Data Transmission (SPDT) of a neighboring node, and Probability of Successful Data Delivery (PSDD) have been obtained to estimate Node-Trustworthiness Index (NTI), which is further used to eliminate untrustworthy nodes. In the second phase of implementation, a novel Evolutionary Computing assisted nondisjoint best forwarding path selection model is developed that exploits node’s and allied link’s connectivity and availability features to identify the quasi-sub-optimal forwarding paths. EGA algorithm intends to reduce hop-counts, connectivity-loss and node or link unavailability to estimate best forwarding node. One key feature of the proposed model is dual-supplementary forwarding path selection that enables alternate path formation in case of link outage and thus avoids any iterative network discovery phase.
Network services are services that specialize in the handling of network-related or network-resident resources. Examples of network services are data transport service, network advance reservation service, network Quality of Service (QoS) service, network information service, network monitoring service, and AAA1 service.
This informational draft describes how several network services combine and yield a rich mediation function—a resource manager—between grid applications and legacy networks. Complements of these services, the network resource is seen joining CPU and storage as a first-class, grid-managed resource (and handled, as such, by a community scheduler, or other OGSA services).
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
This document discusses node selection algorithms for peer-to-peer content sharing over mobile cellular networks that consider downlink bandwidth limitations. It proposes two novel algorithms (DBaT-B and DBaT-N) that select peer nodes to maximize load balancing across cells while meeting the requesting peer's bandwidth needs. DBaT-B selects peers to satisfy the requesting peer's minimum bandwidth requirement, while DBaT-N selects a certain number of peers as requested. Both algorithms first choose peers in the least busy cell to improve load balancing.
Effective Approach For Content Based Image Retrieval In Peer-Peer To NetworksIRJET Journal
The document describes a proposed approach for content-based image retrieval in peer-to-peer networks. Existing methods represent images as high-dimensional feature vectors and index them using distributed high-dimensional indexes or locality sensitive hashing over distributed hash tables. However, these approaches have high network costs and workload imbalances. The proposed approach uses the bag-of-visual-words model to represent images, building inverted indexes of visual codewords over the distributed hash table. It also develops a dynamic codebook updating method to optimize the mutual information between the codebook and relevance information, balancing the workload among nodes as the peer-to-peer network and data evolve dynamically.
User Preference based Network Selection in Wireless NetworksIRJET Journal
This document summarizes a research paper on user preference-based network selection in wireless networks. It discusses how next generation wireless networks will integrate different technologies like GPRS, LTE, WiMAX and WLAN. The key challenge is deciding which network to handover to, called handoff decision. Many factors influence this decision, including available bandwidth, cost, security, and user preferences. The paper proposes a new network selection scheme that considers user preferences, network parameters and quality of service requirements to select the optimal network for handoff. It uses the IEEE 802.21 MIH framework to gather information about available networks and make the selection decision.
Performance and handoff evaluation of heterogeneous wireless networks 2IAEME Publication
This document discusses performance evaluations of heterogeneous wireless networks (HWNs) using the OPNET simulator. It implemented WLAN, WiMAX, and UMTS networks with applications like FTP, video conferencing, and VoIP. Handoff management between the networks was also evaluated. Simulation results showed WiMAX throughput was over 30% higher than WLAN and UMTS. Vertical handoff between WLAN-WiMAX and WLAN-UMTS was difficult without carefully engineering the WLAN network due to differences between the networks. Key metrics like delay, throughput, and received traffic were analyzed and WiMAX generally had superior performance.
This paper presents a distributed software mobile agent framework for media access. The
access and delivery of media is enhanced by an agent architecture framework that
utilizesmobile agent characteristics to provide access and delivery of media. Migrating agents
to the media source and destination devices enables the framework to discover the properties of
devices and media within networks dynamically. The mobile agents in this framework make
decisions and work together to enable access and delivery of media through the transcoding of
media based on the properties of the data path and device constraints.
DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...Tal Lavian Ph.D.
An architecture is proposed for data-intensive services enabled by next generation dynamic optical networks. The architecture supports new data communication services that allow for coordinating extremely large sets of distributed data. The architecture allows for novel features including algorithms for optimizing and scheduling data transfers,methods for allocating and scheduling network resources, and an intelligent middleware platform that is capable of interfacing application level services to the underlying optical technologies. The significance of the architecture is twofold: 1) it encapsulates “optical network resources” into a service framework to support dynamically provisioned and advance scheduled data-intensive transport services, and 2) it establishes a generalized enabling framework for intelligent services and applications over next generation networks, not necessarily optical end-to-end. DWDM-RAM1 is an implementation version of the architecture, which is conceptual as well as experimental. This architecture has been implemented in prototype on OMNInet, which is an advanced experimental metro area optical testbed that is based on novel architecture, protocols, control plane services (Optical Dynamic Intelligent Network-ODIN2), and advanced photonic components. This paper presents the concepts behind the DWDM-RAM architecture and its design. The paper also describes an application scenario using the architecture’s data transfer service and network resource services over the agile OMNInet testbed.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
The underlying fabric for communication among intelligent
agents will in many cases be provided by telecommunication
networks. But telecommunication networks have been seen as
a natural domain for the investigation and application of
intelligent agents’ technology as it emerged from the area of
Distributed Artificial Intelligence (DAI). Telecommunication
network administrations are vast organizations dedicated to
operating and managing networks with broad functional
segmentations: telephone network outside plant, switching and
transmission plants, public network, all supporting different
layers of specialized customer or service networks. These
networks are organized into multiple physical and logical
layers built with large quantities of repeated network elements
and sub network structures. All these elements need to be
configured, monitored, and controlled. In the future, this will
preferably be done by automated operation support systems
and without substantial human intervention.
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...Zhenyun Zhuang
Wireless Networks (2010)
http://dl.acm.org/citation.cfm?id=1873504
Peer-to-peer (P2P) data networks dominate
Internet traffic, accounting for over 60% of the overall
traffic in a recent study. In this work, we study the
problems that arise when mobile hosts participate in
P2P networks. We primarily focus on the performance
issues as experienced by the mobile host, but also study
the impact on other fixed peers. Using BitTorrent as a
key example, we identify several unique problems that
arise due to the design aspects of P2P networks being
incompatible with typical characteristics of wireless
and mobile environments. Using the insights gained
through our study, we present a wireless P2P (wP2P)
client application that is backward compatible with existing
fixed-peer client applications, but when used on
mobile hosts can provide significant performance improvements.
Evaluating content-centric communication over power line communication infras...Khaled Ben Driss
"Evaluating content-centric networking over PLC infrastructure for smart grids" (ci-joint), cet article sera présenté à la conférence AWICT du 07 au 09 Octobre 2015 (http://www.awict.net/)
The document discusses key concepts in network management including network analysis, architecture, design, and requirements analysis. It defines important terms like mission-critical networks, bandwidth, network services, quality of service, and performance characteristics. The document also covers topics like systems methodology, identifying system components, and factors that affect network architecture/design decisions. Overall, the document provides an overview of the fundamental concepts and processes involved in network management.
Insights on critical energy efficiency approaches in internet-ofthings applic...IJECEIAES
This document summarizes approaches to improving energy efficiency in internet-of-things (IoT) applications. It discusses how cross-layer schemes can be used to optimize network performance and energy efficiency in IoT systems. It also examines optimization-based approaches using machine learning techniques. While various studies have identified methods to improve energy efficiency, open issues remain that need to be addressed to further enhance IoT system performance and outcomes.
2005-03-29 Web Services: ES Rationale and AssertionsRudolf Husar
The document discusses web services as a technology for building distributed applications and sharing resources over a network. It describes how web services allow data, services, and users to be distributed throughout a peer-to-peer network. Users can compose processing chains from reusable services to add value to data. This architecture helps users find and access resources while reducing their burden. The document also discusses some challenges with using web services, such as inadequate service catalogs and a lack of semantic interoperability.
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...IRJET Journal
This document presents a comparative study on embedded feature selection techniques for internet traffic classification. It discusses using machine learning and deep learning algorithms like Naive Bayes, Random Forest, Support Vector Machine (SVM), and Multilayer Perceptron (MLP) on network traffic datasets to classify traffic. The performance of these techniques is analyzed in terms of error metrics, with the results showing that the proposed deep learning approach using MLP outperforms existing machine learning techniques. The document also provides background on internet traffic classification and related work applying techniques like K-means clustering, C5.0 decision trees, and SVM to classify network application traffic based on flow features.
International journal of computer networks & communications (ijcnc) --no...IJCNCJournal
This document summarizes a research paper that proposes a technique to improve the detection of false report attacks in wireless sensor networks (WSNs) using machine learning and a neural network. The technique evaluates report information gathered from base stations to identify invalid data and detect false report attacks, even when MAC information is compromised. This is an improvement over existing security protocols that rely on MAC-dependent validation, which cannot defend against extreme false report attacks. The proposed method uses a machine learning-based prediction model and evaluation function to verify false report attacks based on analyzing reports from the base station. This intelligent approach aims to help WSNs better defend against evolving attacks.
A survey of models for computer networks managementIJCNCJournal
The virtualization concept along with its underlyin
g technologies has been warmly adopted in many fiel
ds
of computer science. In this direction, network vir
tualization research has presented considerable res
ults.
In a parallel development, the convergence of two d
istinct worlds, communications and computing, has
increased the use of computing server resources (vi
rtual machines and hypervisors acting as active
network elements) in network implementations. As a
result, the level of detail and complexity in such
architectures has increased and new challenges need
to be taken into account for effective network
management. Information and data models facilitate
infrastructure representation and management and
have been used extensively in that direction. In th
is paper we survey available modelling approaches a
nd
discuss how these can be used in the virtual machin
e (host) based computer network landscape; we prese
nt
a qualitative analysis of the current state-of-the-
art and offer a set of recommendations on adopting
any
particular method.
The document describes how to configure and run a Scanner Only test on a QualiPoc phone to perform radio frequency scans for GSM and WCDMA networks. Key steps include selecting the scan technology (GSM or WCDMA), bands, and channel ranges. Performance can vary from 1-20 seconds depending on the configuration and device. Scan results are monitored through log files and bar charts showing signal levels and channels.
This document describes TALX's I-9 management service, which allows employers to complete I-9 forms electronically. Key features include secure online completion of I-9 forms, electronic storage to replace paper forms, automatic notifications of expiring work authorizations, and reporting capabilities. The service aims to help employers maintain immigration compliance and eliminate paper processes.
Og 002 service flow of radio network planning issue1.1Ketut Widya
Know the flow of radio network planning
Grasp the key parts of the stages of radio network planning
Make the radio network planning be more standard and controllable
Wcdma Radio Network Planning And OptimizationPengpeng Song
The document discusses WCDMA radio network planning and optimization, including key topics such as:
1) Fundamentals of WCDMA link budget analysis and radio interface protocol architecture.
2) Radio resource utilization techniques like power control, handover control, and congestion control.
3) Issues of coverage and capacity planning as well as enhancement methods.
4) The process of WCDMA radio network planning including dimensioning, detailed planning, and optimization aspects to address interference.
This document outlines the process of cellular network planning and optimization. It discusses collecting radio network data through drive testing, analyzing network performance, and proposing solutions to issues or meet key performance indicators. The objectives of optimization are finding and correcting problems, meeting contract quality criteria, and iterative improvement of overall network quality without degrading other areas. Methodologies proposed include problem analysis, drive testing, simulation, and exporting data to map software to identify solutions.
Resource optimization-based network selection model for heterogeneous wireles...IAESIJAI
The internet of things (IoT) environment prerequisite seamless connectivity for meeting real-time application requirements; thus, required efficient resource management techniques. Heterogeneous wireless networks (HWNs) have been emphasized for providing seamless connectivity with high quality of service (QoS) performance to provision IoT applications. However, the existing resource allocation scheme suffers from interference and fails to provide a quality experience for low-priority users. As a result, induce bandwidth wastage and increase handover failure. In addressing the research issues this paper presented the resource-optimized network selection (RONS) method for HWNs. The RONS method employs better load balancing to reduce handover failure and maximizes resource utilization through dynamic slot optimization. The RONS method assures tradeoffs between high performance to high priority users and quality of experience (QoE) for low priority users. The experiment outcome shows the RONS achieves very good performance in terms of throughput, packet loss, and handover failures in comparison with existing resource selection methods.
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKSIJCNCJournal
Service convergence, content digitization, rapid and flexible service delivery, reduction of capital and operating costs, economies of scale, changes in telecom policy and regulation, and ever increasing competition have been key factors in the evolution of virtualized Next Generation Networks (vNGN). IP-centric converged networks aim to provide a multitude of services over a single network infrastructure. Tremendous success and benefit of server virtualization in data centers is driving the adaption of network virtualization. Network virtualization is applicable to enterprise data center, and enterprise as well as wide area networks. The focus of this paper is network virtualization aspects of service providers’ next generation network. The key factors for moving to virtualized network is optimal use and sharing of network infrastructure even among competitive service providers, programmability of network and rapid introduction of new service and standard based on open platform rather than proprietary implementation. Evolving Software Defined Network (SDN) and Network Function Virtualization (NFV) shall enable common network infrastructure sharing, control, and management at a higher layer thus making network devices more generic and less intelligent, thus enabling cost competitiveness and quick service delivery. Network virtualization shall enable key benefits such as lower cost, flexibility, efficiency, and security, However, the deployment of virtualized next generation networks has brought its unique challenges for network managers and planners, as the network has to be planned in a comprehensive way with effective management of virtual network elements, its correlation with physical infrastructure and monitoring of control functions and server platforms. This paper discusses generic next generation network, its virtualization, and addresses the challenges related to the planning and managing of virtualized next generation networks. This paper proposes a reference OSS model enabling effective management of vNGN, which is key contribution of this paper.
Practical active network services within content-aware gatewaysTal Lavian Ph.D.
The Internet has seen an increase in complexity due to the introduction of new types of networking devices and services, particularly at points of discontinuity known as network edges. As the networking industry continues to add revenue generating services at network edges, there is an increasing need to provide a systematic method for dynamically introducing and providing these new services in lieu of the ad-hoc approach that is in use today. To this end we support a phased approach to "activating" the Internet and suggest that there exists an immediate need for realizing Active Networks concepts at the network edges. In this context, we present our efforts towards the development of a Content-aware Active Gateway (CAG) architecture. With the help of two practical services running on our initial prototype, built from commercial networking devices, we give a qualitative and quantitative view of the CAG potential.
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET Journal
This document proposes a cross-layer resource allocation scheme over wireless relay networks to guarantee quality of service (QoS) in terms of delay. The scheme aims to maximize network throughput subject to a given delay constraint, characterized by a QoS exponent θ. Dynamic resource allocation algorithms are developed for amplify-and-forward and decode-and-forward relay networks based on network channel state information and the QoS constraint. Simulations show the scheme efficiently supports diverse QoS requirements over wireless relay networks, and relay networks outperform direct transmissions under stringent delay constraints.
New generations of applications call for new demands
that are totally different from previous uses of the Internet (e.g.,
cross-layer and network function virtualization), and the existing
networks are not optimized for these new demands due to being
overwhelmed by enormous numbers of external network
protocols. Overlay network technologies aim to respond to such
future network demands. Systems on overlay networks mitigate
this protocol overload by exploiting the unlimited
programmability of the overlay nodes comprising the system.
This paper proposes an overlay node that works as a transparent
proxy server and router for encrypted communication over
overlay networks. This overlay node acts as a virtual switch over
multiple layers of the OSI reference model (the datalink, network, transport, and session layers) using general-purpose components (a personal computer, physical network interface card, and
virtual network interface card, developed using the C language).
The ideas behind this proposal derive from the effectiveness of
software-defined networks and network function virtualization.
Finally, we examine the performance of the overlay node
experimentally and suggest possible designs for future overlay
networks.
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET Journal
This document summarizes a research paper on virtual network recognition and optimization in an SDN-enabled cloud environment. The paper proposes using SDN and cloud computing technologies to increase the functionality and capacity of wireless networks. It formulates an online routing problem to maximize traffic flow over time while meeting constraints. A fast approximation algorithm is developed based on time-dependent duals. Extensive simulations show the algorithm outperforms heuristics by enabling end-to-end optimization and awareness of congestion and budgets. The paper concludes SDN is still emerging but highlights areas of expanding its scope and applications.
In this paper, an application-based QoS evaluation approach for heterogeneous networks is proposed.It is possible to expand the network capacity and coverage in a dynamic fashion by applying heterogeneous wireless network architecture. However, the Quality of Service (QoS) evaluation of this type of network architecture is very challenging due to the presence of different communication technologies. Different communication technologies have different characteristics and the applications that utilize them have unique QoS requirements. Although, the communication technologies have different performance measurement parameters, the applications using these radio access networks have the same QoS requirements. As a result, it would be easier to evaluate the QoS of the access networks and the overall network configuration based on the performance of applications running on them. Using such applicationbased QoS evaluation approach, the heterogeneous nature of the underlying networks and the diversity of their traffic can be adequately taken into account. Through simulation studies, we show that the application performance based assessment approach facilitates better QoS management and monitoring of heterogeneous network configurations.
This document summarizes network virtualization. It begins by discussing how current service platforms do not sufficiently consider network infrastructure or quality of service requirements. Network virtualization is introduced as a mechanism to run multiple customized networks over shared infrastructure. The document then discusses definitions of network virtualization, key features like segmentation and isolation, examples of network virtualization architectures including Intelligent Service Oriented Network Infrastructure and VNET architecture, and concludes by discussing the Cabo infrastructure model that separates network infrastructure providers from service providers.
Application-Based QoS Evaluation of Heterogeneous Networks csandit
Heterogeneous wireless networks expand the network capacity and coverage by leveraging the
network architecture and resources in a dynamic fashion. However, the presence of different
communication technologies makes the Quality of Service (QoS) evaluation, management, and
monitoring of these networks very challenging. Each communication technology has its own
characteristics while the applications that utilize them have their specific QoS requirements.
Although, the communication technologies have different performance assessment parameters,
the applications using these radio access networks have the same QoS requirements. As a
result, it would be easier to evaluate the QoS of the access networks and the overall network
configuration depending on the performance of applications running on them. Using such
application-based QoS evaluation approach, the heterogeneous nature of the underlying
networks and the diversity of their traffic can be adequately taken into account. In this paper,
we propose an application-based QoS evaluation approach for heterogeneous networks.
Through simulation studies, we show that this assessment approach facilitates better QoS
management and monitoring of heterogeneous network configurations.
APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS cscpconf
Heterogeneous wireless networks expand the network capacity and coverage by leveraging the network architecture and resources in a dynamic fashion. However, the presence of different communication technologies makes the Quality of Service (QoS) evaluation, management, and monitoring of these networks very challenging. Each communication technology has its own characteristics while the applications that utilize them have their specific QoS requirements. Although, the communication technologies have different performance assessment parameters, the applications using these radio access networks have the same QoS requirements. As a result, it would be easier to evaluate the QoS of the access networks and the overall network configuration depending on the performance of applications running on them. Using such application-based QoS evaluation approach, the heterogeneous nature of the underlying networks and the diversity of their traffic can be adequately taken into account. In this paper, we propose an application-based QoS evaluation approach for heterogeneous networks. Through simulation studies, we show that this assessment approach facilitates better QoS management and monitoring of heterogeneous network configurations.
Enhancing qo s and qoe in ims enabled next generation networksgraphhoc
Managing network complexity, accommodating greater numbers of subscribers, improving coverage to support data services (e.g. email, video, and music downloads), keeping up to speed with fast-changing technology, and driving maximum value from existing networks – all while reducing CapEX and OpEX and ensuring Quality of Service (QoS) for the network and Quality of Experience (QoE) for the user. These are just some of the pressing business issues faced by mobileservice providers, summarized by the demand to “achieve more, for less.” The ultimate goal of optimization techniques at the network and application layer is to ensure End-user perceived QoS. The next generation networks (NGN), a composite environment of proven telecommunications and Internet-oriented mechanisms have become generally recognized as the telecommunications environment of the future. However, the nature of the NGN environment presents several complex issues regarding quality assurance that have not existed in the legacy environments (e.g., multi-network, multi-vendor, and multi-operator IP-based telecommunications environment, distributed intelligence, third-party provisioning, fixed-wireless and mobile access, etc.). In this Research Paper, a service aware policy-based approach to NGN quality assurance is presented, taking into account both perceptual quality of experience and technologydependant quality of service issues. The respective procedures, entities, mechanisms, and profiles are discussed. The purpose of the presented approach is in research, development, and discussion of pursuing the end-to-end controllability of the quality of the multimedia NGN-based communications in an environment that is best effort in its nature and promotes end user’s access agnosticism, service agility, and global mobility
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...IJCNCJournal
This work investigates the QoS provisioning of various traffic classes on an SDN-enabled network. We
propose and implement the class-based adaptive QoS control scheme on SDN-enabled network for various
traffic classes, namely VoIP, Video Streaming and File Transfer. The effectiveness of our proposed scheme
is validated by simulation using Mininet and Ryu controller. The procedure to create the simulation
platform and all details relevant to all software used are described step-by-step in detail. The main
performance evaluation metric is the Maximum Number of Traffic Flows admittable with QoS while
Average Throughput, Latency, Jitter, and Packet Loss Rate are maintained at the comparable level of the
existing work in the literature called JMABC [11]. Our simulation results are illustrated with 95%
confidence interval. According to the simulation results, it is obvious that our proposed class-based
adaptive QoS control scheme adopting the optimization technique significantly outperforms the existing
similar QoS provision scheme in terms of the maximum number of the high priority traffic flows (VoIP)
admittable with QoS while the other evaluation metrics are maintained at the same level.
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...IJCNCJournal
This work investigates the QoS provisioning of various traffic classes on an SDN-enabled network. We propose and implement the class-based adaptive QoS control scheme on SDN-enabled network for various traffic classes, namely VoIP, Video Streaming and File Transfer. The effectiveness of our proposed scheme is validated by simulation using Mininet and Ryu controller. The procedure to create the simulation platform and all details relevant to all software used are described step-by-step in detail. The main performance evaluation metric is the Maximum Number of Traffic Flows admittable with QoS while Average Throughput, Latency, Jitter, and Packet Loss Rate are maintained at the comparable level of the existing work in the literature called JMABC [11]. Our simulation results are illustrated with 95% confidence interval. According to the simulation results, it is obvious that our proposed class-based adaptive QoS control scheme adopting the optimization technique significantly outperforms the existing similar QoS provision scheme in terms of the maximum number of the high priority traffic flows (VoIP) admittable with QoS while the other evaluation metrics are maintained at the same level.
This PhD proposal aims to develop a framework that enhances Information-Centric Networking (ICN) with dynamic configuration capabilities inspired by Software Defined Networking (SDN). The framework seeks to overcome ICN's static limitations and provide a more flexible solution for future networks. Specifically, the proposal involves studying and developing new mechanisms that integrate ICN and SDN, allowing for dynamic configuration of ICN networks. The framework will be evaluated using open-source ICN and SDN solutions to demonstrate feasibility and identify benefits for areas like mobile video delivery across different access networks.
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...IJCNCJournal
As SD-WAN disrupts legacy WAN technologies and becomes the preferred WAN technology adopted by corporations, and Kubernetes becomes the de-facto container orchestration tool, the opportunities for deploying edge-computing containerized applications running over SD-WAN are vast. Service orchestration in SD-WAN has not been provided with enough attention, resulting in the lack of research focused on service discovery in these scenarios. In this article, an in-house service discovery solution that works alongside Kubernetes’ master node for allowing improved traffic handling and better user experience when running micro-services is developed. The service discovery solution was conceived following a design science research approach. Our research includes the implementation of a proof-ofconcept SD-WAN topology alongside a Kubernetes cluster that allows us to deploy custom services and delimit the necessary characteristics of our in-house solution. Also, the implementation's performance is tested based on the required times for updating the discovery solution according to service updates. Finally, some conclusions and modifications are pointed out based on the results, while also discussing possible enhancements.
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc NetworksIJCNCJournal
Multimedia services with required Quality of Service (QoS) is one of the most critical challenges in Software Defined Network (SDN) based Vehicular Ad-Hoc Networks (VANETs). It forms an essential part of the Intelligent Transport System (ITS), where infotainment services play an essential role. Streaming multimedia is one of the most popular applications and has a high demand for VANET infotainment services. The major issues for multimedia streaming on VANET are scalability, mobility of vehicles, frequent connection failures, frequent change in network topology, and distributed architecture with heterogeneous devices. To overcome these problems and provide a better QoS, we propose using a hybridarchitecture with a combination of VANET and SDN called Software-Defined Vehicular Networks (SDVN). This work presents a modified POX controller-based SDN framework for VANETs, especially for multimedia streaming applications in realistic traffic patterns. The proposed work has a real-world setup developed using Simulation of Urban Mobility (SUMO), where iPerf generates multimedia traffic. Also, streaming standard-definition YouTube videos in real-time between the vehicular nodes was done. The modified POX controller could take advantage of the centralised perspective of the network for action determination, and the integrated spanning tree algorithm reduced the redundancy. Despite the dynamic nature of the testing environments, the proposed Modified POX Controller consistently outperformed VANET, with up to 21 to 42% better packet delivery ratio for higher data transfer rates. The overall improvement in QoS parameters also accompanies an improvement in the consumers Quality of Experience (QoE) factors.
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc NetworksIJCNCJournal
Multimedia services with required Quality of Service (QoS) is one of the most critical challenges in
Software Defined Network (SDN) based Vehicular Ad-Hoc Networks (VANETs). It forms an essential part
of the Intelligent Transport System (ITS), where infotainment services play an essential role. Streaming
multimedia is one of the most popular applications and has a high demand for VANET infotainment
services. The major issues for multimedia streaming on VANET are scalability, mobility of vehicles,
frequent connection failures, frequent change in network topology, and distributed architecture with
heterogeneous devices. To overcome these problems and provide a better QoS, we propose using a
hybridarchitecture with a combination of VANET and SDN called Software-Defined Vehicular Networks
(SDVN). This work presents a modified POX controller-based SDN framework for VANETs, especially for
multimedia streaming applications in realistic traffic patterns. The proposed work has a real-world setup
developed using Simulation of Urban Mobility (SUMO), where iPerf generates multimedia traffic.
Energy-aware strategy for data forwarding in IoT ecosystem IJECEIAES
The Internet of Things (IoT) is looming technology rapidly attracting many industries and drawing research attention. Although the scale of IoT-applications is very large, the capabilities of the IoT-devices are limited, especially in terms of energy. However, various research works have been done to alleviate these shortcomings, but the schemes introduced in the literature are complex and difficult to implement in practical scenarios. Therefore, considering the energy consumption of heterogeneous nodes in IoT eco-system, a simple energy-efficient routing technique is proposed. The proposed system has also employed an SDN controller that acts as a centralized manager to control and monitor network services, there by restricting the access of selfish nodes to the network. The proposed system constructs an analytical algorithm that provides reliable data transmission operations and controls energy consumption using a strategic mechanism where the path selection process is performed based on the remaining energy of adjacent nodes located in the direction of the destination node. The proposed energy-efficient data forwarding mechanism is compared with the existing AODV routing technique. The simulation result demonstrates that the protocol is superior to AODV in terms of packet delivery rate, throughput, and end-to-end delay.
Towards automated service-oriented lifecycle management for 5G networksEricsson
5G networks will be a key enabler for the Internet of Things by providing a platform for connecting a massive number of devices with heterogeneous sets of network quality requirements. In this environment, 5G network operators will have to solve the complex challenge of managing network services for diverse customer sectors (such as automotive, health or energy) with different requirements throughout their lifecycle.
Talhunt is a leader in assisting and executing IEEE Engineering projects to Engineering students - run by young and dynamic IT entrepreneurs. Our primary motto is to help Engineering graduates in IT and Computer science department to implement their final year project with first-class technical and academic assistance.
Project assistance is provided by 15+ years experienced IT Professionals. Over 100+ IEEE 2015 and 200+ yester year IEEE project titles are available with us. Projects are based on Software Development Life-Cycle (SDLC) model.
Similar to Network Service Description and Discovery for the Next Generation Internet (20)
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Network Service Description and Discovery for the Next Generation Internet
1. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 46
Network Service Description and Discovery for the Next
Generation Internet
Qiang Duan qduan@psu.edu
Information Science and Technology Department
The Pennsylvania State University Abington College
Abington, PA 19001, USA
Enyue Lu ealu@salisbury.edu
Mathematics and Computer Science Department
Salisbury University
Salisbury, MD, 21801, USA
Abstract
The next generation Internet will face new challenges due to the coexisting
heterogeneous networks and highly diverse networking applications. Therefore how to
coordinate heterogeneous networking systems to support a wide spectrum of application
requirements becomes a significant research problem. A key to solving this problem lies
in effective and flexible collaborations among heterogeneous networking systems and
interactions between applications and the underlying networks. Network virtualization
plays a crucial role in enabling such collaborations and interactions, and the Service-
Oriented Architecture (SOA) provides a promising approach to supporting network
virtualization. Network service description and discovery are key technologies for
applying SOA in networking, and the current service description and discovery
technologies must be evolved to meet the special requirements of future Internet. In this
paper, we study the problem of network service description and discovery to support
network virtualization in the next generation Internet. The main contributions of this
paper include a general approach to describing service capabilities of various
heterogeneous networking systems, a technology to discover and select the network
services that guarantee the QoS requirements of different networking applications, a
general profile for specifying networking demands of various applications, a scheme of
network resource allocation for QoS provisioning, and a system structure for realizing
the network description, discovery, and resource allocation technologies. We also
propose information update mechanisms for improving performance of the network
service description and discovery system. The approach and technology developed in
this paper are general and independent of network architectures and implementations;
thus are applicable to the heterogeneous networking systems in the next generation
Internet.
Keywords: SOA, Internet, network virtualization, service description, service discovery, QoS.
2. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 47
1. INTRODUCTION
Although became a global communication platform in a short period of time, the Internet has
fallen victim to its own stunning success. The next generation Internet will face many challenges,
which essentially come from the diversity in the networking architectures and technologies
coexisting in the Internet and the wide spectrum of networking applications supported by the
Internet. The numerous distributed computing applications with diverse networking requirements
motive research on alternative networking technologies and architectures for the future Internet.
The newly developed networking technologies vary in almost all aspects of network
functionalities, including data forwarding mechanisms, routing and signaling protocols, and
control and management schemes. So far no single network architecture has demonstrated the
capability of supporting all kinds of networking applications effectively and efficiently. The
coexistence of various heterogeneous networking systems will be one of the essential features of
the next generation Internet. Recently the networking research community started exploring
“clean-slate” approaches to develop new Internet architectures, and an important aspect of the
objective is to enable alternative network architectures coexist and collaborate inside future
Internet. Therefore, how to coordinate heterogeneous networking systems to support the wide
variety of application requirements becomes a significant research problem.
A key to solve this problem lies in flexible collaboration across heterogeneous networking
systems and effective interactions between networks and applications. Recent research
progresses toward this direction include new network architecture for diversifying the Internet
[23], a concurrent architecture (CABO) that separates the roles of service providers and network
infrastructure providers [10], a new network control plane developed in the DRAGON project [17],
and the network composition mechanism for Ambient Networks [6]. Examples of current
standardization efforts for supporting various applications across heterogeneous networks include
the ITU-T Next Generation Network (NGN) structure [28] and the Open Service Environment
(OSE) defined by the Open Mobile Alliance (OMA) [29]. Although the above researches address
the heterogeneous networking problem from different aspects, they share a similarity in which the
notion of network virtualization plays a crucial role. Essentially network virtualization is to abstract
networking resources into reusable components that can be discovered, selected, and composed
to meet different networking requirements. Therefore an effective mechanism for network
virtualization will greatly facilitate the next generation Internet.
The Service-Oriented Architecture (SOA) [25] is currently gaining high attention and acceptance
in IT industry, especially in the fields of Web services and Grid/Cloud Computing. In SOA,
heterogeneous computational resources are virtualized into services that are discoverable,
selectable, and composable for supporting various computing application requirements. A key
feature of SOA is the loose-coupling mechanism that enables flexible and effective interactions
among services and applications. Therefore applying ideas of SOA in networking will greatly
facilitate network virtualization in the next generation Internet. Following the SOA principles,
heterogeneous networking systems can be virtualized into network services which are reusable
network components whose functions and access methods are described in standard-format
documents called network service descriptions. The network service descriptions can be
published at a service registry. When an application needs to utilize networking resources, it
sends a request to a network service broker, which will discover and select the appropriate
network service that meets the application requirements. Therefore network service description
and discovery form the foundation of this service-oriented networking paradigm.
Although SOA has been successfully applied in the field of distributed computing, currently
available technologies for service description and discovery must to be enhanced to meet the
special requirements of the next generation networking. One of the key requirements is to support
the network Quality of Service (QoS) required by applications. The current service description
standard in SOA mainly focuses on functional information instead of service provisioning
capabilities; thus limiting service discovery to be function-based instead of performance-based.
Although progresses have been made toward enabling performance-based Web and Grid
3. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 48
services discovery, the obtained results may not be applied directly to networking systems.
Therefore, new approaches to describing network QoS capability and discovering network
services based on their achievable QoS must be developed.
In this paper we address the problem of service-oriented network description and discovery to
meet the requirements of network virtualization in the next generation Internet. The heterogeneity
of networking systems and the diversity of application requirements in future Internet make this
problem challenging. The main contribution made by this paper include a general approach to
describing data delivery capabilities of various heterogeneous networking systems, a technology
to discover and select the network services that can guarantee the QoS required by different
networking applications, a general profile for specifying the networking demands of various
applications, a scheme of network resource allocation for QoS provisioning, and a system
structure for realizing the developed network description, discovery, and resource allocation
technologies. We also propose information update mechanisms for improving the scalability and
performance of the network service description and discovery system.
The rest of this paper is organized as follows. Section 2 reviews networking for the next
generation Internet and discusses the application of SOA in this area. Section 3 proposes a new
approach for describing network service capabilities. Section 4 develops the technology for
network service discovery and resource allocation for network service provisioning. Numerical
examples are provided in Section 5 to illustrate applications of the developed technologies. In
Section 6 we design a system structure for network service description and discovery, and
discuss scalable mechanisms for updating network service information. Section 7 draws
conclusions.
2. SERVICE-ORIENTED NETWORKING FOR THE NEXT GENERATON
INTERNET
2.1 Networking for the Next Generation Internet
The next generation Internet will be featured by a wide spectrum of supported networking
applications and the diverse coexisting network infrastructures. The diversity of network
infrastructures referenced here includes the type of networking technologies, service capabilities
and provisioning mechanisms, administrative ownership, network management and control
policies, among others. The coexisting diverse networking systems must cooperate with each
other in order to deliver end-to-end network services for supporting various network applications.
The current Internet architecture lacks the flexibility to face this challenge, therefore developing
new network architectures for enabling flexible interactions among heterogeneous networks to
support various applications has become an active research area.
Recently a new network architecture was proposed for diversifying the Internet [23]. This
architecture enables various meta-networks built on top of a shared substrate comprising
heterogeneous networking resources. Such an architecture allows network providers to
automatically deploy, configure, and operate meta-networks to meet application requirements. A
similar idea was also developed in the CABO architecture (“Concurrent Architecture are Better
Than One”) [10] for the future Internet. The CABO architecture decouples infrastructure providers
(who manage the physical infrastructure) and network service providers (who deploy network
protocols and offer end-to-end services); thus supporting multiple simultaneous network
architectures on top of shared physical infrastructures. An inter-domain network control plane was
developed in the DRAGON (Dynamic Resource Allocation in GMPLS Optical Networks) project
[17] for enabling dynamic provisioning of networking resources for high-performance Grid and e-
science applications. A crucial component in this control plane is the Network-Aware Resource
Broker (NARB) that represents the local autonomous systems. A networking paradigm called
Ambient Network (AN) [6] was developed to support ubiquitous provisioning of network services
4. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 49
over any type of network. A core feature of Ambient Network is a uniform mechanism called
network composition for dynamic and scalable cooperation between heterogeneous networks. A
service plane architecture for multi-domain network connections was also reported in [12], which
introduced the notion of inter-domain network service as the result of composing a set of service
elements. Some network standard organizations are also working on supporting applications
across heterogeneous networks. The Open Mobile Alliance (OMA) recently developed an Open
Service Environment (OSE) that delivers network services by composing a set of standard
service components called service enablers [29]. The Next Generation Network (NGN) structure
defined by ITU-T promotes separation between service delivery from network transport
infrastructure [28].
Although the above mentioned research and standardization efforts tackle the problem of
coordinating heterogeneous networking systems to support various applications from different
aspects, the notion of network virtualization plays a significant role in all these proposed
solutions. Through network virtualization, the underlying networking resources are de-coupled
from network service provisioning. Networking resources are encapsulated into reusable
components, which can be discovered, selected, and composed to meet application
requirements. In the new Internet architecture proposed in [23], a meta-network is a virtual
network that serves as an abstraction of a collection of heterogeneous networking resources. The
CABO architecture employs network virtualization as a key mechanism to enable service
providers share the underlying network infrastructures for end-to-end service delivery. In the
DRAGON network control plane, a key technology for realizing NARB is network domain
virtualization, which provides a mechanism to advertise a simplified view of a network domain.
Network composition in Ambient Networks is based on a connectivity and resource virtualization
framework that hides the differences of heterogeneous networking systems and enables
applications to operate across them. The service element proposed in [12] is also a type of
virtualization of networking resources, which can be discovered and composed to form inter-
domain network services. The service enablers in the OMA OSE are reusable virtualizations of
networking resources that provide access to network capabilities. The separation between
service provisioning and network transportation in the NGN structure is also realized through
network virtualization. Therefore, an effective and flexible mechanism for network virtualization
will greatly facilitate the development of new networking architectures and technologies for the
next generation Internet.
2.2 The Service-Oriented Architecture and Its Application in Networking
The Service-Oriented Architecture (SOA) is a system architecture initially developed by the IT
community, especially in the areas of Web services and Grid/Cloud computing, as an effective
solution to coordinating computing resources crossing heterogeneous systems to support various
applications. The SOA is described as “an architecture within which all functions are defined as
independent services with invokable interfaces that can be called in defined sequences to form
business processes” [9]. Services in SOA are self-contained and reusable computing
components that can cooperate with other services through pre-defined standard interfaces.
Essentially the SOA enables virtualization of various computing resources in form of services and
provides a flexible interaction mechanism among services.
The interaction mechanism in the SOA is briefly illustrated in Figure 1. A service provider
publishes a machine-readable document called service description at a service registry. The
service description gives descriptive information about the functions provided by the service and
the interfaces for utilizing such functions. When a service customer, either an application or
another service, needs to utilize computing resources to perform a certain function, it starts a
service discovery process to locate an available service that meets its requirement. Typically a
service broker handles service discovery for service customers by searching the service
descriptions published at the registry and selecting a service that matches the criteria specified by
the customer. After discovering a service, the service customer contacts the service provider and
invokes the service by following the interface defined in the service description. Currently the
5. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 50
SOA is realized by a set of Web Services standards, including Web Service Description
Language (WSDL) [35], Universal Description Discovery and Integration (UDDI) [32], Simple
Object Access Protocol (SOAP) [36], which are all based on Extensible Markup Language (XML).
FIGURE 1: The service-oriented architecture.
A key feature of SOA is the “loose-coupling” interactions among heterogeneous systems in the
architecture, including service providers, service customers, and the service broker and registry.
“Loose-coupling” means entities can effectively interact with each other while keep themselves
independent. It is this feature makes the SOA a very effective architecture for coordinating
heterogeneous systems to support various application requirements, which is essentially the
same challenge faced by the next generation Internet. Therefore, applying the SOA principles in
the field of networking provides a promising approach to constructing the next generation
Internet. In this paper we refer to such SOA-based networking paradigm as Service-Oriented
Networking. In this paradigm network virtualization can be realized through encapsulating
networking resources into network services. A network service may represent any type of
networking component, could be a network domain, a collection of networks, a single physical
network, or just a network node. Multiple network services can be composed into one composite
inter-network service. By publishing a network service description, each network service can
advertise its functions and capabilities without exposing internal implementation details.
The service-oriented networking paradigm is shown in Figure 2. In this paradigm a network
service provisioning layer is deployed between networking applications and the underlying
networking platform. The networking platform consists of heterogeneous networking resources
encapsulated in network services. When an application needs to utilize networking resources, it
sends a request to a network service broker. The network broker searches the network service
descriptions published at the service registry and selects the network service that can meet the
application requirement. After receiving a response from the service broker with a network
selection result, the application may start accessing the networking resources provided by the
selected network service.
SOA-based network virtualization gives Internet service providers and network operators the
ability to view their underlying network infrastructure more as a commodity and allows
infrastructure development to become more consistent. SOA-based network service provisioning
also enables faster time to market as new initiatives can reuse existing services and components,
thus reducing design, development, testing, and deployment time in addition to the cost and risk
of undertaking such projects.
6. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 51
FIGURE 2: Network service description and discovery in the service-oriented networking paradigm.
2.3 Network Service Description and Discovery
Network service description and discovery are key components for adopting SOA in networking.
Service-oriented network virtualization introduces new challenges to description and discovery of
network services. A distinguishing feature for network services is their service provisioning
capabilities, namely the capability of guaranteeing a certain level of QoS performance to an
application. Therefore, service description for network virtualization should provide information
about network service provisioning capability. Since most applications for the next generation
Internet require high-performance networking, the key to network service discovery is selecting
the appropriate network services that meet application performance requirements; that is,
performance-based network service selection. The currently available service description and
discovery technologies in SOA must be enhanced to meet these new requirements.
The current standards for service description and discovery are Web Service Description
Language (WSDL) [35] and Universal Description, Discovery and Integration (UDDI) [32]. The
WSDL specification defines an abstract interface describing the functionality of a service and a
concrete interface that describes how to contact and invoke the service. The UDDI specification
defines the interfaces for publishing and searching service descriptions and the data structures
for organizing service description information. Currently the WSDL specification focuses on
providing functional information about services and UDDI lacks effective mechanism to publish
and search non-functional features such as service provisioning capability. Therefore, the service
description and discovery technologies based on WSDL and UDDI are function-based instead of
performance-based.
Research efforts have been made for enabling QoS-capable service description, discovery, and
selection. For example, R.Al-Ali and his colleagues developed an extended UDDI registry
(UDDIe) and the G-QoSM framework for supporting QoS-based Grid service discovery [1, 2].
However, the UDDIe was mainly tied with the G-QoSM framework for Grid computing and had
limited support for QoS details. A QoS-capable service broker algorithm was developed to
discover, select, and compose Web services that meet end-to-end QoS constraints [26, 27]. Al-
Masri and Mahmoud introduced a relevancy ranking function based on QoS parameters to find
the best Web service that meet client QoS preferences [3]. Technologies for QoS-aware run-time
service discovery and selection were proposed in [4, 24] and a model to filter discovered services
with their QoS features to maximize user satisfaction was developed in [18]. These technologies
were mainly developed for Web or Grid services focusing on data processing and computing
instead of data communications and networking. Therefore, the obtained results may not be
applied directly to network service description and discovery.
7. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 52
World Wide Web Consortium (W3C) recently offered WS-Policy [37] and WS-PolicyAttachment
[38] specifications for standardizing the description of non-functional characteristics of Web
services. WS-Policy aims to provide a general-purpose framework and model for expressing non-
functional service characteristics such as requirements, preference, and capabilities as policies.
WS-PolicyAttachment defines a mechanism to associate the policy expressions with the existing
WSDL standard. The WS-Agreement specification [31] developed by the Open Grid Forum
(OGF) defines a protocol between service providers and users for establishing and managing
service level agreements. These specifications have made significantly progresses toward QoS-
enable Web/Grid service description and discovery. However, modeling and describing network
service provisioning capability are left opened as domain-specific issues in these specifications.
Research results on network modeling and description have also been reported. A network
modeling tool called Effective Network Views was developed in [21]. The application of this tool is
mainly limited to local area networks and it is not scalable to the Internet. S. Lacour and his
colleagues employed the directed acyclic graph (DAG) to describe network topology and
developed a scalable network description model [16]. This description model focuses on a
functional view of network topology instead of service provisioning capabilities; thus lacks the
information needed for performance-based network service discovery. A Network Description
Language (NDL) was developed in [14] as a semantic schema for describing network topology.
The NDL language serves more as a vocabulary to present network topology than an approach to
modeling network service capabilities, and the reported application of NDL mainly focused on
optical networks. However the next generation Internet may consist of a wide variety of networks
with different implementations.
To the best of our knowledge little work has been reported with regard to network capability
description and performance-based network discovery technologies that are applicable to the
heterogeneous networks in the next generation Internet. The research presented in this article
addresses this problem by developing a general approach for describing network service
capabilities and a technology for discovering network services that meet the QoS performance
required by different networking applications.
3. NETWORK SERVICE DESCRIPTION
In this section, we will develop a new approach to describing network service capabilities for
supporting the service-oriented network virtualization. The main challenge to network service
description lies in the heterogeneity of the networking systems that will be coexisting in the
Internet. Therefore, the network service description approach must be (a) general so as to be
applicable to various network implementations and (b) flexible so as to support composing
multiple heterogeneous networks into one cross-domain network service. A key for network
service description is to provide sufficient amount of information about the data delivery capability
of a network without exposing its implementation details. In general, network data delivery
capability includes two aspects: the connectivity of the network service, which can be described
by enumerating the pairs of sources and destinations between which the network transports data;
and the capability of data transportation between each pair of source-destination
In order to provide a formal description for network service capabilities, we define the Capability
Matrix C. Given a network service S with m ingress ports and n egress ports, the capability matrix
C is an m×n matrix
8. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 53
=
ccc
ccc
ccc
nmmm
n
n
C
,2,1,
,22,21,2
,12,11,1
...
............
...
...
(1)
where Ci,j is defined as
=
ji
ji
C ji
tofromexistsRrouteaifQ
tofromexistsroutenoif0
ji,ji,
, (2)
and Qi,j is called the QoS descriptor for the route Ri,j, which will be further developed in the rest of
this section.
According to the definitions given in (1) and (2), the capability matrix element Cij = 0 if the network
service cannot reach the egress j from the ingress i. That is, all non-zero elements in the matrix C
describes the connectivity of the network services. If the network service provides a route from i
to j, then the transportation capability of this route is described by the descriptor Qi,j.
We adopt the notion of service curve from network calculus theory [7] to design a general QoS
descriptor that is applicable to various network implementations. The network calculus theory has
evolved to an effective tool for network modeling and analysis. The service curve is defined as
follows in network calculus. Let T
in
(t) and T
out
(t) respectively be the accumulated amount of traffic
of a flow that arrives at and departs from a server by time t. Given a non-negative, non-
decreasing function, S(·), where S(0) = 0, we say that the server guarantees a service curve S(·)
for the flow, if for any t ≥ 0 in the busy period of the server,
)()()( tStTtT inout
⊗≥ (3)
where ⊗denotes the min-plus convolution operation defined in network calculus as h(t) ⊗x(t) =
inf s:0≤s≤t{ h(t-s) + x(s)}. Essentially a service curve gives the minimum amount of service offered
by the server to a client in an arbitrary time interval within a busy period. Therefore a service
curve describes the lower bound of the service provisioning capability offered to a client.
A typical server model for networking systems is the Latency-Rate (LR) server [22], which
guarantees each flow a service curve βr,Θ(t) = r (t - θ), where θ and r are respectively called the
latency and service rate for the flow. LR server is particularly interesting to us because many
packet schedulers such as Weighted Fair Queuing (WFQ) and Weighted Round-Robin (WRR),
which are widely deployed in practical networking equipments, belong to this server category.
In our service description approach, we adopt the service curve guaranteed by the route Ri,j as
the QoS descriptor Qi,j in the matrix C. Since a service curve is a general data structure that is
independent with network implementations, it is flexible enough to describe various networking
systems. In a network where a route Ri,j can be modeled by a LR server with a service curve ri,j (t
- θ i,j ), the matrix element Ci,j can be represented by a data structure [ri,j, θ i,j]. Currently there are
various mechanisms available for measuring and managing network state information, for
example the technologies reported in [13,15, 20], which could be used to obtain the data for
constructing service curves and building the matrix C. The methods of collecting network state
information are implementation dependent and may vary in different networks, but the matrix C
provides all network services with a general and standard approach to describing their service
provisioning capabilities.
An end-to-end Internet connection typical crosses multiple networks, each of which can be
virtualized as a network service. Therefore, how to compose the QoS capabilities of a set of
heterogeneous links into one descriptor for the end-to-end connection is an important and
challenging problem. The service curve-based description approach supports QoS descriptor
composition. Known from network calculus, the service curve S(t) guaranteed by a series of
9. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 54
tandem servers G1, G2, …, Gn, which respectively guarantees the service curves S1(t), S2(t), …,
Sn(t) to a flow, can be obtained through the convolution of all the service curves; that is,
)()()()( 21 tStStStS n⊗⊗= L (4)
Therefore, the QoS descriptor of the end-to-end route can be obtained from the convolution of the
QoS descriptors of the links provided by all single network services.
Since typical networking systems can be modeled as LR servers, we are particularly interested in
composing LR servers. Suppose each network server Si, i = 1, 2, …, n, guarantees a service
curve βri, θi = ri (t – θi), it can be proved that the convolution of these service curves is
)()()( ,,, 11
ttt rrr nn ∑
=⊗⊗ θθθ βββ L
(5)
where
∑=
∑ ==
n
i
inrrrr
1
21 and},,min{ θθL
(6)
Equations (5) and (6) imply that if each link on an end-to-end network route can be described by
a latency-rate server, then the end-to-end route also guarantees a latency-rate service curve,
whose latency parameter is equal to the summation of all link latency parameters and the service
rate parameter is limited by the link with the least service rate.
In this section we developed a general description for network service capabilities. Due to the
network calculus technique employed in our development, this description approach is
independent with network implementations; thus applicable to various heterogeneous networking
systems in the Internet. This approach can also easily support capability description for
composite network services.
4. NETWORK SERVICE DISCOVERY
In this section we develop a new technology for performance-based discovery of network
services, which enables the network service broker to discover network services that guarantee
QoS performance required by networking applications. This newly developed technology focus on
network service selection while other components of the discovery procedure, including
publishing service descriptions, searching the registry for available services, negotiating service
level agreement, and binding the selected service with the application, can be implemented
based on current SOA service discovery standards.
4.1 Performance Prediction for Network Service Discovery
Three aspects of information are needed by a network service broker for performance-based
network service discovery for an application: (a) the provisioning capabilities of available network
services; (b) the performance requirement of the application; and (c) the characteristic of network
traffic generated by the application. The information (a) can be obtained from the capability matrix
C published by the network service provider. The other two aspects of information (b) and (c),
which specify the demand of a networking application, should be provided to the service broker
by the application as part of its request.
Due to the large number of networking applications with various requirements, it is very important
to have a common approach for describing networking demands. In this paper we define a
Demand Profile P (d, L, a) as a general specification of application requirements. This profile
consists of three elements: an address set d; a traffic load descriptor L; and a performance
requirement set a. The address set d specifies the addresses of the source and destination of
data transportation required by the application. If the application only needs unicast (point to
point) data delivery, the address set will consist of a pair of network addresses. If multicast (point
to multi-points or multi-points to multi-points) communication is required, the set d may include
multiple address pairs. The set a consists of the performance parameters required by the
10. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 55
application. Different parameters may be included in a for different applications, but the minimum
bandwidth breq and the maximum delay dreq for data transportation are typical requirements; i.e.
typically a = {breq , dreq}. The descriptor L is used to characterize the network traffic that the
application will load on a network service.
In order to describe application traffic loads in a general form, we employ the arrival curve as the
traffic descriptor L. Arrival curve is another important concept in the network calculus theory. Let
T
in
(t) denote the accumulated amount of traffic generated from an application by time t. Given a
non-decreasing, non-negative function, A(•), the application is said to have an arrival curve A(•) if
for any nonnegative t and s
)()()( stAtTtT inin
−≤− . (7)
Essentially the arrival curve of an application gives an upper bound for the amount of traffic that
the application loads on a network service.
Currently most QoS-capable networks apply traffic regulation mechanisms at network boundaries
to shape arrival traffic from applications. The traffic regulators most commonly used in practice
are leaky buckets. A traffic flow constrained by a leaky bucket has an arrival curve
}{ tPttA ρσ += ,min)( ,
where Ρ, ρ, and σ are respectively the peak rate, the sustained rate, and the maximal burst size
of this flow.
Now we develop a technique to predict the performance that can be guaranteed by a network
service to a networking request. Among various performance requirements, in this paper we
focus on the minimum bandwidth and the maximum delay for data transportation, which are
important performances required by most high-performance networking applications. Network
calculus provides us with an effective approach for analyzing the minimum bandwidth and
maximum delay performances guaranteed by a network service. A service curve itself is a
description of the minimum service capacity offered by a network, which essentially gives the
minimum bandwidth guaranteed by the network to an application. Therefore, given the QoS
descriptor for a route Ri,j, which is described by a service curve Si,j(t), the minimum bandwidth
guaranteed by this route can be determined as
[ ]ttSb ij
t
/)(limmin
∞→
= . (8)
Suppose the traffic load of a networking request is described by an arrival curve A(t), then the
maximum delay dmax guaranteed by the network to this request can be determined as,
{ }{ })()(,0:minmax
0
max δδδ +≤≥=
≥
tStAd
t
. (9)
Since the LR server is a typical network server model and the leaky bucket is a typical traffic
regulator, we specifically give the performance analysis for a network route modeled by a LR
server under traffic load constrained by a leaky bucket regulator. Suppose the load descriptor of
an application is A(t) = min{Pt, σ + ρt}, and the QoS descriptor of the route provided by a network
to this application is Q = [r, θ], then the minimum bandwidth that can be guaranteed by the route
is
r
t
r
r
t
tr
b
tt
=
−=
−
=
∞→∞→
θθ
lim
)(
limmin . (10)
By following (9) we can get that the maximum delay guaranteed to the application is
rp
rp
d
σ
ρ
θ
−
−
+=max for r ≥ ρ. (11)
After determining the achievable performance of a network service S for an networking request R,
the network broker compares the predicted performance with the requirement given in the set a of
the demand profile P to decide if S can be selected for R. Networking requests can be classified
into three categories according to their networking performance requirements: (a) with only
bandwidth requirement; i.e. a=breq; (b) with only delay requirement; i.e. a=dreq; and (c) with both
11. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 56
bandwidth and delay requirements; i.e. a={ breq, dreq}. If R belongs to category (a), then S can be
selected only when bmin ≥ breq. If R belongs to category (b), then S can be selected only when dmax
≤ dreq. If R belongs to category (c), then S can selected only when bmin ≥ breq and dmax ≤dreq. If
there are multiple network services meet the performance requirements, selection among them
may be based on other criteria such as service cost or load balance.
4.2 Resource Allocation for Network QoS Provisioning
The selected network service should allocate sufficient amount of networking resources in order
to actually guarantee network QoS provisioning. The main resource in a network service is
bandwidth, therefore in this subsection we give a discussion on bandwidth allocation for QoS
provisioning in network services.
Equation (11) shows that given the traffic parameters (Ρ, ρ, σ) of a networking request, the
achievable delay upper bound dmax is a function of the available bandwidth r. This implies that the
required delay performance can be guaranteed by allocating sufficient amount of bandwidth.
Equation (11) also shows that the minimum possible delay Dmin= θ when r = P; that is when the
allocated bandwidth is equal to the traffic peak rate. Although achieving optimal delay
performance, allocating bandwidth according to the peak rate causes low resource utilization,
especially for applications with fluctuating load. We can also see from (11) that dmax is upper
bounded only if r ≤ ρ; that is, the allocated bandwidth should be at least the sustain rate ρ of the
traffic load in order to achieve any delay performance guarantee. Therefore, a reasonable
bandwidth allocation scheme is to determine the minimum bandwidth ra (ρ ≤ ra ≤ P) that is
sufficient to guarantee the required delay dreq given by a networking request.
Analysis on (11) shows that dmax is a decreasing function of r that achieves the maximum value
Dmax = θ + σ / ρ when r = ρ. This implies that if r > ρ, the application will be guaranteed a delay
upper bound that is less than Dmax. Given the delay requirement dreq, the network service must
guarantee a delay upper bound no greater than dreq; that is,
reqd
rP
rP
d ≤
−
−
+=
σ
ρ
θmax . (12)
Therefore, the minimum bandwidth that must be allocated for meeting (ref{delay2}) is
σθρ
σ
+−−
=
))(( req
a
dP
P
r . (13)
Equation (13) implies that ra is always less than the peak rate P. As traffic becomes more smooth;
that is the sustain rate ρ gets closer to the peak rate P, the required bandwidth ra approaches P.
In summary, the bandwidth allocation for guaranteeing a delay requirement dreq can be
determined as
<
≤≤
+−−
≥
=
min
maxmin
max
/
))((
DdAN
DdD
dP
P
Dd
r
req
req
req
req
a
σθρ
σ
ρ
(14)
where Dmax = θ + σ / ρ and Dmin= θ .
If the networking request has both delay and bandwidth requirements; i.e. a={breq, dreq}, then the
minimum amount of bandwidth that must be allocated for this request will be
{ }reqa brb ,maxmin = . (15)
Specifically we analyze bandwidth allocation for network services that can be modeled by the
weighted fair queuing (WFQ) server [19], which is widely deployed in practical networking
systems. It is known from [22] that for a WFQ the latency parameter for a traffic flow is θ = L(1/R
12. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 57
+ 1/r ), where L is the maximum packet length of this flow, R is the total transmission capacity of
the network route, and r is the bandwidth available to the flow on this route. For a networking
application that generates a leaky bucket constrained flow with traffic parameters (Ρ, ρ, σ), if the
QoS descriptor of the route provided by a network service for the application is S=[r, θ ], then we
can predict that the maximum delay guaranteed to the application is
rP
rP
rR
Ld
σ
ρ
−
−
+
+=
11
max . (16)
Given a delay requirement dreq, Dmin ≤ dreq ≤ Dmax , the bandwidth allocation requirement can be
determined as
σρ
ρσ
+−−
−+
=
)/)((
)(
RLdP
PLP
r
req
a . (17)
5. NUMERICAL EXAMPLES
In this section, we use numerical examples to illustrate the applications of the performance
prediction and bandwidth allocation techniques developed for network service discovery. We
considered two networking applications utilizing a network service in our examples. The
application A1 uses the network to deliver a stream of video packets and loads the network with a
flow f1. The application A2 transmits a flow of audio packets f2 through the network. Both A1 and
A2 require a small maximum packet transmission delay. We adopt the traffic parameters given in
[11] for f1; that is, the peak rate P=5.3 Mb/s, the sustained rate ρ =1.5 Mb/s, and the maximum
burst size σ =140 kbits. The traffic parameters for f2 are given in [8]; that is, the peak rate P=3.2
Mb/s, the sustained rate ρ =1.1 Mb/s, and the maximum burst size σ =300 kbits. We assume that
the maximum transmission unit (MTU) of the network is L=1K bytes, and the total link capacity of
the route is R=1Gb/s.
FIGURE 3: Delay performance prediction for a single network service
We first analyzed the maximum packet delay dmax that can be guaranteed for the flows f1 and f2
by a single network service with various amounts of available bandwidth r on the assigned
network routes. The results are plotted in Figure 3, where ds
1
and ds
2
denote the maximum delay
for f1 and f2 respectively. From this figure we can see that both ds
1
and ds
2
decrease when the
available bandwidth r increases. This means that the more bandwidth is available to an
application, the tighter is the delay upper bound guaranteed to the application. Comparison
between the curves of ds
1
and ds
2
shows that although both of them are decreasing functions of r
ds
2
drops faster than ds
1
, which means that the same amount of bandwidth increment can make
more significant improvement in delay performance for f2 than what it does for f1. This observation
implies that the QoS performance guaranteed by a network service to an application is
associated with application traffic characteristics as well as the QoS capability of the network.
13. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 58
FIGURE 4: Delay performance prediction for a composite network service
We also predicted delay performance for A1 and A2 in a composite network service consisting of
three network domains. To simplify the analysis, we assume that the three domains provide an
identical QoS descriptor for each application. We calculated the maximum end-to-end packet
delay for the traffic flows f1 and f2 that pass through the three domains, which are denoted by dc
1
and dc
2
respectively. We plotted the results of ds
1
and ds
2
with data for dc
1
and dc
2
in Figure 4.
From this figure we can see that dc
1
and dc
2
are also decreasing function of available bandwidth
$r$. This figure also shows that for any available bandwidth r, ds
1
< dc
1
and ds
2
< dc
2
. This implies
that the maximum packet delay guaranteed to each application by the composite network service
is always greater than what is guaranteed by a single network service in the composite service.
An interesting observation in Figure 4 is that for each application, the delay upper bound
achieved by the composite network service is only slightly greater than the maximum delay
guaranteed by a single service, which is much less than the summation of the maximum delays of
all domains passed by the traffic flow.
FIGURE 5: Bandwidth allocation for delay performance guarantee
We also analyzed the bandwidth allocation requirements in a network service to guarantee a set
of delay upper-bounds for the two applications. The results are plotted in Figure 5, where ra
1
and
ra
2
are respectively the required amounts of bandwidth for applications A1 and A2 to achieve the
required delay upper-bound dreq. From this figure we can see that both ra
1
and ra
2
are decreasing
functions of dreq. This means that the tighter the required delay upper-bound is, the more
bandwidth must be allocated in the network to guarantee it. Figure 5 also shows that ra
1
decreases with the increment of dreq faster than ra
2
does. This implies that in the same network
service, applications with different traffic load characteristics need different amounts bandwidth to
14. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 59
achieve the same level of delay performance. This also justifies the necessary of having a traffic
load descriptor L as part of the networking demand profile P for performance-based network
service discovery.
6. NETWORK SERVICE DESCRIPTION AND DISCOVERY SYSTEM
In this section, we discuss a system for realizing the network service description and discovery
technologies developed in previous sections. Figure 6 shows the structure of this system, which
consists of a Network Service Broker (NSB), a Network Service Registry (NSR), multiple Network
Service Providers (NSPs), and a Network Service Consumer (NSC). A network service provider
could be single networking system, a network domain with multiple networking systems, or a
collection of network domains that belong to an Internet Service Provider (ISP). The network
service consumer could be user equipment, or a networking application, or maybe a network
service provider that needs to access networking resources managed by other network service
providers.
FIGURE 6: A system structure for network service description and discovery.
Each network service provider is required to support two functional modules for realizing the
service-oriented networking paradigm: a Network Service Management (NSM) module and a
Network Resource Management (NRM) module. The NSM module registers the network service
at the broker, collects network state information from the NRM module to compile a network
service description (including the capability matrix C), and publishes the description at the service
registry. The NSM module is also responsible for updating the network service description at the
service registry when network information changes.
The network service broker consists of three modules: Consumer Interface (CI), Network Service
Discovery (NSD), and Network Service Selection (NSS). When a network service consumer
needs to discover a service provider for accessing networking resources, it submits a networking
request to the service broker through the CI interface. This request includes a networking
demand profile P[d, L, a]. On receiving the networking request and the demand profile, the
discovery module (NSD) of the broker accesses the service registry to find all available network
services that provide a network route between the source and destination specified in d of the
demand profile. These network services are selected as candidate services and their capability
matrixes will be further analyzed by the broker. For each candidate service, the selection module
(NSS) uses the QoS descriptor from the matrix C and the load descriptor L in the demand profile
P to evaluate the achievable QoS performance that the service can offer to the consumer. Then
the NSS module compares the predicted performance with the requirements given in the set a of
the profile P and selects the service that meets all performance requirements given by the
15. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 60
consumer. If multiple candidate network services meet the requirements, selection among them is
based on other criteria such as service cost or load balance. After selecting a network service,
the network service broker will send a reply message through the CI interface to the service
consumer to notify the network selection result. Then the consumer may contact the selected
network service provider to negotiate a Service Level Agreement (SLA). The NRM module in the
network service provider may need to allocate a certain amount of resources for QoS
provisioning. After resource reservation, the NSM module of the service provider will accordingly
update the capability matrix C and republish the latest service description at the service registry.
The interactions among service consumer, broker, registry, and provider for network service
description and discovery is shown in Figure 7.
FIGURE 7: Interaction procedure for network service description and discovery.
In this paper we focus on capability description and QoS-based selection for network services.
Other technologies for implementing the network description and discovery system, including
publishing service descriptions, maintaining service descriptions at the registry, and searching the
registry for candidate networks can be implemented based the current SOA service description
and discovery standards [32, 34, 35]. The negotiation and establishment of a service level
agreement between the network service consumer and provider can be implemented based on
the WS-Agreement specification [31].
In a large scale dynamic networking environment such as the Internet, the states and capability
information of various networking systems change frequently. Therefore keeping the latest
network description information at the network service registry is significant for discovering and
selecting the appropriate network services. However, republishing the entire service description,
including the capability matrix C, whenever network state changes cause a large amount of
communications and management overhead between service providers and the registry, and
make the service registry a performance bottleneck. In order to solve this problem, an event-
driven subscription-notification mechanism can be applied to reduce the overhead caused by
frequent description update; thus improving the overall performance of the service discovery
system.
Event-driven processing and notification introduces a notification pattern for SOA
implementations. In this pattern an information producer sends one-way notification messages to
one or more interested receivers. The message typically carries information about an event that
has occurred. The message receivers must register to the producer before receiving the
notifications. The OASIS Web Service Notification [33] is a family of related specifications that
16. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 61
define a standard approach to notification using a topic-based subscription-publication pattern.
Following this pattern, the network service registry can subscribe to a network service provider
and specify a set of network states as subscription topics. Then, the service registry will receive a
notification message from the service provider whenever a network state subscribed as a topic
changes. A threshold can also be set to each subscription topic so that update notification is only
triggered when the amount of change in that topic is greater than the threshold. In this way, the
network service registry can obtain the latest network state and capability information for
supporting real-time network discovery and selection. Since an update only happens when a
network state changes more than a pre-specified threshold and the notification message contains
only the changed states instead of the entire description document, this updating mechanism can
greatly reduce communications and management overhead.
FIGURE 8: Event driven network service description update.
The interaction procedure for network service description and discovery with event-driven
information update is shown in Figure 8. When a network service provider first time publishes its
network service description at the service registry, the registry will also subscribe itself to the
service provider to receive notification for network state change. The registry can specify what
network states are subscription topics. After this registration-subscription procedure completed,
the network service registry will be notified whenever the specified subscription topics change in
the network service. Then the description for this network service will be updated at the registry
accordingly.
The performance of the network service description and discovery system could be further
improved by reducing the information updating overhead through a partial publication technology.
This technology allows network service providers publish only part of their service descriptions
that are relatively static at the service registry. This part of description could include information
such as the network types (e.g., connectionless IP network or circuit switching telecommunication
network, cellular mobile network or WiFi WLAN), network service operators (e.g., AT&T or
Verizon), and also the connectivity parameters of the capability matrix C, which are relatively
stable for typical networks. If a network service is selected as a candidate, then the service
selection module of the broker will contact the NSM module in the provider of this service to
retrieve additional information needed for decision making on network service selection, for
example retrieving the QoS descriptor of the matrix C for performance evaluation. In this way the
17. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 62
dynamic network state information such as the QoS capability descriptors of each network
service is maintained within the service provider itself instead of at the service registry; thus can
be updated in real time without generating communication overhead between networks and the
service registry. The partial publication technology can be used together with the event-driven
update mechanism. Update on the published part of description can be implemented by the
notifications from the network service provider. Since only the relatively static part of description
is published at the registry, the update frequency and the messaging load will be further reduced.
Figure 9 shows the interactions for network service discovery and selection with partial
description publication.
FIGURE 9: Partial publication of network service description.
7. CONCLUSIONS
The next generation Internet will be highly diversified in both underlying networking technologies
and supported networking applications. Therefore coordination among heterogeneous networks
to support the wide spectrum of application requirements is significant for building the next
generation Internet. Although recently various research projects started addressing this challenge
from different aspects, the notion of network virtualization plays a crucial role in all the efforts. The
Service-Oriented Architecture, which has been widely applied in Web services and Grid/Cloud
computing areas, provides a promising approach to supporting network virtualization. Network
service capability description and performance-based network service selection are keys to
enabling the application of SOA in the next generation Internet.
In this paper we developed a general approach to describing service capabilities of
heterogeneous networking systems and a technology for selecting the network services that can
guarantee application performance requirements. The core component of the network description
approach is a capability matrix that describes both connectivity and QoS capability of a network
service. The key of the network selection technology is to predict the achievable performance for
a network service and check it against the performance requirement specified by the application.
In order to allow various applications to specifying their networking requests, this paper gives a
general demand profile that includes a traffic load descriptor and a performance requirement set.
We also developed a scheme for allocation resources in network services for QoS provisioning. A
system structure for realizing the network service description and discovery technologies is also
described in this paper. In a large scale dynamic networking environment such as the Internet,
keeping network service descriptions up-to-date is challenging and may cause significant
18. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 63
communication and management load. We proposed an event-driven information update
mechanism and a partial description publishing technology that may significantly improve the
performance of the network service description and discovery system. Our analysis methods and
the developed technologies for network service description, discovery, resource allocation, and
information update are general and independent of network implementations; thus are applicable
to heterogeneous networking systems in the next generation Internet. The service description and
performance analysis techniques are also flexible to support composite network services that
comprise multiple networking systems.
8. REFERENCES
1. R. J. Al-Ali, O. M. Rana and D. W. Walker. “G-QoSM: Grid service discovery using QoS
properties''. J. of Computing and Informatics, 21(4):1--15, 2002
2. R. J. Al-Ali, A. ShaikhAli, O. M. Rana and D. W. Walker. “Supporting QoS-based discovery in
service-oriented grids''. In Proceedings of the 17th Intl. Parallel and Distributed Processing
symposium, 2003
3. E. Al-Marsri and Q. H. Mahmoud. “QoS-based discovery and ranking of Web services''. In
Proceedings of the 16th IEEE International Conference on Computer Communications and
Networks, August 2007
4. E. Ambrosi, M. Bianchi, C. Gaibisso, G. Gambosi and F. Lombardi. “A system for predicting
the run-time behavior of Web Services''. In Proceedings of the 2005 International Conference
on Services Systems and Services Management, June 2005
5. T. Anderson, L. Peterson, S. Shenker and J. Turner. “Overcoming the Internet impasses
through virtualization''. IEEE Computer Magazine, 38(4):34--41, 2005
6. F. Belqasmi, R. Glitho and R. Dssouli. “Ambient Network Composition''. IEEE Network
Magazine, 22(4):6--12, 2008
7. J. L. Boudec and P. Thiran. “Network calculus: a theory of deterministic queueing systems for
the Internet'', Springer Verlag LNCS 2050, June 2001
8. M. Butto, E. Cavallero and A. Tonietti. “Effectiveness of the leaky bucket policing
mechanisms in ATM networks''. IEEE J. Select. Areas Commun., 9(4):335--342, 1991
9. K. Channabasavaiah, K. Holley and E. Tuggle. “Migrating to a Service-Oriented Archiecture''.
IBM DeveloperWorks, Dec. 2003
10. N. Feamster, L. Gao and J. Rexford. “How to lease the Internet in your spare time''. ACM
SIGCOMM Computer Communications Review, 37(1):61--64, 2007
11. P. Fizek and M. Reisslein. “MPEG-4 and H.263 video traces for network performance
evaluation''. IEEE Network Magazine, 15(6):40--54, 2001
12. R. Douville, J.-L. Le Roux, J.-L. Rougier and S. Secci. “A service plane over the PCE
architecture for automatic multidomain connection-oriented services''. IEEE Communications
Magazine, 46(6):90--102, 2008.
13. T. S. Eugene Ng and H. Zhang. “Predicting Internet network distance with coordinates-based
approaches''. In Proceedings of IEEE INFOCOM'02, New York, June 2002
19. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 64
14. J. Ham, P. Grosso, R. Pol, A. Toonk and C. de Laat. “Using the network description
lanaguage in optical networks''. In Proceedings of the 10th IFIP/IEEE Intl. Symposium on
Integrated Network Management, May 2007
15. A. Kind, X. Dimitropoulos, S. Denazis and B. Claise. “Advanced network monitoring brings
life to the wareness plane''. IEEE Communicatins Magazine, 46(10):140--146, 2008
16. S. Lacour, C. Perez and T. PriolA. “Network topology description model for {G}rid application
deployment''. In Proceedings of the 5th IEEE/ACM Intl. Workshop on Grid Computing, Nov.
2004
17. T. Lehman, J. Sobieski and B. Jabbari. “DRAGON: A Framework for Service Provisioning in
Heterogeneous Grid Networks''. IEEE Communications Magazine, 44(3):84--90, 2006
18. M. Li, B. Yu, O. Rana and Z. Wang. “Grid service discovery with rough sets''. IEEE
Transcations on Knowledge and Data Engineering, 20(6):851--862, 2008
19. A. K. Parekh and R. G. Gallager. “A generalized processor sharing approach to flow control
in integrated services networks: the single-node case''. IEEE/ACM Trans. Networking,
1(3):344--357, 1993
20. R. Prasad, M. Murray, C. Dovrolis and K. Claffy. “Bandwidth estimation: metrics,
measurement techniques, and tools''. IEEE Network Magazine, 17(6):27--35, 2003
21. G. Shao and F. Berman. “Using effective network views to promote distributed application
performance''. In Proceedings of the 1999 Intl. Conf. on Parallel and Distributed Processing
Techniques and Applications, June 1999
22. D. Stiliadis and A. Varma. “Latency-rate servers: a general model for analysis of traffic
scheduling algorithms''. IEEE/ACM Trans. Networking, 6(5):611--624, 1998
23. J. Turner and D. E. Taylor. “Diversifying the Internet''. In Proceedings of IEEE Globecom
2005, Nov. 2005
24. C. Wan, C. Ullrich, L. Chen, R. Huang, J. Luo and A. Shi. “On solving QoS-aware service
selection problem with service composition''. In Proceedings of the 7th Internatinal
Conference on Grid and Cooperative Computing, Oct. 2008
25. S. Weerawarana, F. Curbera, F. Leymann, T. Storey and D. F. Ferguson. “Web Services
Platform Architecture''. Prentice Hall, 2005.
26. T. Yu and K-J. Lin. “The design of QoS broker algorithms for QoS-capable Web Services''.
International Journal of Web Services Research, 1(4):10--16, 2004
27. T. Yu and K-J. Lin. “Service selection algorithm for Web services with end-to-end QoS
constraints''. Journal of Information Systems and E-Business Management, 3(2):20--30, 2005
28. ITU-T, “Functional Requirements and Architecture of the NGN Release 1,'' Recommendation
Y.2012, Sept. 2006
29. Open Mobile Alliance, “OMA Enabler Releases and Specifications - OMA Service
Environment Architecture Document,'' Nov. 2007
30. Open Grid Forum (OGF) OGSA-WG, “The Open Grid Service Architecture, version 1.0,'' Jan.
2005
20. Q. Duan & E. Lu
International Journal of Computer Networks (IJCN) Volume (1): Issue (1) 65
31. Open Grid Forum (OGF) “Web Services Agreement Specification (WS-Agreement),'' March
1007, available online: http://www.ogf.org/documents/GFD.107.pdf
32. Organization for the Advancement of Structured Information Standards (OASIS), “Universal
Description, Discovery and Integration Version 3.0.2,'' Feb. 2005, available online:
http://www.oasis-open.org/specs/
33. Organization for the Advancement of Structured Information Standards (OASIS), “Web
Services Base Notification (WS-BaseNotification) v1.3,'' Oct. 2006
34. Organization for the Advancement of Structured Information Standards (OASIS), “Web
Services Resource Framework (WSRF) v1.2,'' April 2006
35. World Wide Web Consortium (W3C), “Web Service Description Language Version 2,'' March
2006
36. World Wide Web Consortium (W3C), “Simple Object Access Protocol (SOAP) Version 1.2,''
April 2007
37. World Wide Web Consortium (W3C), “Web Services Policy Framwork (WS-Policy) Version
1.5,'' Sept. 2007, available online: http://www.w3.org/TR/ws-policy/
38. World Wide Web Consortium (W3C), “Web Services Policy Attachment (WS-
PolicyAttachment) Version 1.5,'' Sept. 2007, available online: http://www.w3.org/TR/ws-
policy-attach/