[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3444370.3444595acmotherconferencesArticle/Chapter ViewAbstractPublication PagesciatConference Proceedingsconference-collections
research-article

Mapping approach for multiscale emulation networks in heterogeneous environments

Published: 04 January 2021 Publication History

Abstract

As real network environments become increasingly complex, the scale of network emulation topologies is expanding. To address this problem, on the one hand, the multiscale integration emulation approach can effectively account for emulation fidelity and computational overhead; on the other hand, multiple heterogeneous physical clusters in parallel can provide a scalable resource environment. An important focus of current research is determining how to better map multiscale network emulation topologies to heterogeneous physical clusters while enhancing resource utilization and load balance. For this purpose, this paper proposes a multiscale integration mapping method for heterogeneous environments (MIM-HE) that uses the multiscale integration approach for mapping and realizes network mapping based on heterogeneous physical clusters. MIM-HE increases the feasible scale of emulation. Experiments show that compared with a method of load balancing based on METIS (MLBM) and random network mapping (RNM), MIM-HE reduces the load imbalance index by 44.68% and 81.81%, respectively, and the remote throughput index by 15.01% and 49.18%, respectively.

References

[1]
Tian Z H, Fang B X, Yun X C. An architecture for intrusion detection using honey pot[C]//Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No. 03EX693). IEEE, 2003, 4: 2096--2100.
[2]
Tian Z, Zhang W, Ye J, et al. Reduction of false positives in intrusion detection via adaptive alert classifier[C]//2008 International Conference on Information and Automation. IEEE, 2008: 1599--1602.
[3]
Wang Z H, Liu C G, Qiu J, et al. Automatically traceback RDP-based targeted ransomware attacks[J]. Wireless Communications and Mobile Computing, 2018, 2018.
[4]
Tian Z, Jiang W, Li Y, et al. A digital evidence fusion method in network forensics systems with Dempster-shafer theory[J]. China Communications, 2014, 11(5): 91--97.
[5]
Jiang W, Fang B, Zhang H, et al. Optimal network security strengthening using attack-defense game model[C]//2009 Sixth International Conference on Information Technology: New Generations. IEEE, 2009: 475--480.
[6]
Li M, Sun Y, Lu H, et al. Deep reinforcement learning for partially observable data poisoning attack in crowdsensing systems[J]. IEEE Internet of Things Journal, 2019.
[7]
Li M, Sun Y, Jiang Y, et al. Answering the min-cost quality-aware query on multi-sources in sensor-cloud systems[J]. Sensors, 2018, 18(12): 4486.
[8]
Ferguson B, Tall A, Olsen D. National cyber range overview[C]//2014 IEEE Military Communications Conference. IEEE, 2014: 123--128.
[9]
Andel T R, Stewart K E, Humphries J W. Using virtualization for cyber security education and experimentation[C]//14th Colloquium for Information System Security Education (CISSE). 2010.
[10]
Nogueira J, Melo M, Carapinha J, et al. Virtual network mapping into heterogeneous substrate networks[C]//2011 IEEE symposium on computers and communications (ISCC). IEEE, 2011: 438--444.
[11]
Menascé D A. Virtualization: Concepts, applications, and performance modeling[C]//Int. CMG Conference. 2005: 407--414.
[12]
Varga A. Discrete event simulation system[C]//Proc. of the European Simulation Multiconference (ESM'2001). 2001: 1--7.
[13]
Gouda K, Patro A, Dwivedi D, et al. Virtualization approaches in cloud computing[J]. International Journal of Computer Trends and Technology (IJCTT), 2014, 12(4): 161--166.
[14]
Kacamarga M F, Pardamean B, Wijaya H. Lightweight virtualization in cloud computing for research[C]//International Conference on Soft Computing, Intelligence Systems, and Information Technology. Springer, Berlin, Heidelberg, 2015: 439--445.
[15]
Morabito R, Kjällman J, Komu M. Hypervisors vs. lightweight virtualization: a performance comparison[C]//2015 IEEE International Conference on Cloud Engineering. IEEE, 2015: 386--393.
[16]
Renard K, Peri C, Clarke J. A performance and scalability evaluation of the ns-3 distributed scheduler[C]//SimuTools. 2012: 378--382.
[17]
Melo M, Carapinha J, Sargento S, et al. Virtual network mapping--an optimization problem[C]//International Conference on Mobile Networks and Management. Springer, Berlin, Heidelberg, 2011: 187--200.
[18]
Simmonds R, Bradford R, Unger B. Applying parallel discrete event simulation to network emulation[C]//Proceedings Fourteenth Workshop on Parallel and Distributed Simulation. IEEE, 2000: 15--22.
[19]
Zhu K, Yao Z, He N, et al. Toward full virtualization of the network topology[J]. IEEE Systems Journal, 2018, 13(2): 1640--1649.
[20]
Pothen A. Graph partitioning algorithms with applications to scientific computing[M]//Parallel Numerical Algorithms. Springer, Dordrecht, 1997: 323--368.
[21]
Fjällström P O. Algorithms for graph partitioning: A survey[M]. Linköping: Linköping University Electronic Press, 1998.
[22]
Liu Z, Qin L, Liu Q, et al. A hybrid virtual network mapping algorithm based on threshold load[J]. International Journal of Satellite Communications & Networks, 2019, 37(3):224--233.
[23]
Zheng X, Tian J, Xiao X, et al. A heuristic survivable virtual network mapping algorithm[J]. Soft Computing, 2019, 23(5): 1453--1463.
[24]
Yuan L, Changling Q, Xiaofeng W, et al. Research on Topology Mapping Method for Multiscale Integration Network Emulation[J]. Journal of System Simulation, 2019, 31(10): 2030.
[25]
Li X L, Wang H M, Ding B, et al. Research and development of virtual network mapping problem[J]. Ruanjian Xuebao/Journal of Software, 2012, 23(11): 3009--3028.
[26]
Calvert K, Eagan J, Merugu S, et al. Extending and enhancing GT-ITM[C]//Proceedings of the ACM SIGCOMM workshop on Models, methods and tools for reproducible network research. 2003: 23--27.01

Index Terms

  1. Mapping approach for multiscale emulation networks in heterogeneous environments

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CIAT 2020: Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies
    December 2020
    597 pages
    ISBN:9781450387828
    DOI:10.1145/3444370
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Sun Yat-Sen University
    • CARLETON UNIVERSITY: INSTITUTE FOR INTERDISCIPLINARY STUDIES
    • Beijing University of Posts and Telecommunications
    • Guangdong University of Technology: Guangdong University of Technology
    • Deakin University

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 January 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. heterogeneous physical clusters
    2. mapping
    3. network emulation
    4. virtualization

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CIAT 2020

    Acceptance Rates

    CIAT 2020 Paper Acceptance Rate 94 of 232 submissions, 41%;
    Overall Acceptance Rate 94 of 232 submissions, 41%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 28
      Total Downloads
    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 14 Dec 2024

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media