Distributed Media Plays (DMP) is a futuristic architecture for the Internet. It is specifically designed keeping in mind that a number of futuristic Internet services have real-time constraints, particularly the end-t...
详细信息
Distributed Media Plays (DMP) is a futuristic architecture for the Internet. It is specifically designed keeping in mind that a number of futuristic Internet services have real-time constraints, particularly the end-to-end delay has to be less than 20 ms. These constraints need to be fulfilled by the network and the current RTP/UDP/ip protocol stack is found to be limited in this regard. Thus an alternative network architecture is proposed and being developed with special, although compatible with ipv6, packets. The handling of these packets in DMP network is explained in this paper. The foundation of DMP system is laid on the quality requirements of the futuristic Internet services. Therefore, one of the features of DMP is that the content quality is gracefully degraded in case the network is overloaded and the traffic injection has to be reduced. This is provided by introducing a scheme for ``Quality Shaping'' which is explained in detail in this paper. Also a new ``Link Flow control (LFC)'' functionality is introduced in DMP architecture to enhance quality control of contents, which is also explained herein. The LFC functionality helps the DMP network nodes to have an overview of the capacity bottlenecks in the network and hence adjust the traffic flow accordingly.
One of the most important technical problems in reliable multicast protocol is to reduce redundant control packets and retransmitted packets. An approach for reducing them by making use of newly-invented network archi...
详细信息
One of the most important technical problems in reliable multicast protocol is to reduce redundant control packets and retransmitted packets. An approach for reducing them by making use of newly-invented network architecture, the active network technology, has been proposed. In the paper we compare a network-initiated approach, i.e. a reliable multicast protocol with network support, and conventional end-to-end approaches. These are compared under more realistic situations such as part of routers are equipped with the newly-invented active network technology. Our simulation results show that the network-initiated approach with 15% active routers outperforms conventional end-to-end approaches from the viewpoint of scalability. We also investigate the desirable location of active routers with a sophisticated network topology model, Tiers model, which reflects hierarchical structure of the Internet. Our simulation results suggest that at first active routers should be implemented in WANs because delay performance can be improved with a small number of active routers. After active routers are broadly implemented in WAN, the policy for location of active routers should be switched to MAN with expecting a decrease of redundant NAK transmission inside a network.
This work studies a transportation problem called as lane reservation problem, which is to complete some special transportation tasks within pre-given deadline by optimally selecting lanes to be reserved from the netw...
详细信息
ISBN:
(纸本)9781479980703
This work studies a transportation problem called as lane reservation problem, which is to complete some special transportation tasks within pre-given deadline by optimally selecting lanes to be reserved from the network and designing source-destination paths for the special tasks. Because of the exclusive use of the reserved lanes by the special tasks, negative impact such as increase of travel time on adjacent general-purpose lanes is caused on normal traffic. Then, the objective of the lane reservation problem is to minimize the total negative impact caused by the reserved lanes. To solve this problem, a tabu search based algorithm is developed. Numerical computational results on randomly generated instances show the efficiency of the proposed algorithm compared with a referenced ip solver CPLEX 12.5.
This poster proposes the creation of actuating triggers to deal with UDP flood attacks. We focus on improving responsiveness to such attacks by adopting the actuating triggers technique proposed by Shin et al [1]. We ...
详细信息
This poster proposes the creation of actuating triggers to deal with UDP flood attacks. We focus on improving responsiveness to such attacks by adopting the actuating triggers technique proposed by Shin et al [1]. We propose two types of UDP triggers: a traffic percentage trigger, and an amplification rate trigger. These two new triggers are specific to UDP.
The purpose of this paper is the modelization and simulation of zombie machines for the evaluation of Network Intrusion Detection Systems (NIDS), used to detect botnets. We propose an automatic method to infer zombies...
详细信息
The purpose of this paper is the modelization and simulation of zombie machines for the evaluation of Network Intrusion Detection Systems (NIDS), used to detect botnets. We propose an automatic method to infer zombies behaviours through the analysis of messages exchanged with their masters. Once computed, a model provides a way to generate realistic and manageable traffic, which is mandatory for an NIDS evaluation. We propose to use a Stochastic Mealy Machine to model zombies behaviours, and an active inference algorithm to learn it. With our approach, it is possible to generate a realistic traffic corresponding to the communications of botnets while ensuring its controllability in the context of an NIDS evaluation.
In this paper we discuss the throughput achievable in input-queued cell-based switches loaded with multicast traffic. The switch architecture is assumed to comprise a synchronous broadcast switching fabric, where fixe...
详细信息
ISBN:
(纸本)0780370163
In this paper we discuss the throughput achievable in input-queued cell-based switches loaded with multicast traffic. The switch architecture is assumed to comprise a synchronous broadcast switching fabric, where fixed-size data units, called cells, can be transferred in one slot from one Input to any set of outputs. The switch scheduler must select the time slots for transfers of non-conflicting cells, i.e., cells neither coming from the same input nor directed to the same output. Contrary to the case of unicast traffic, for which input-queued switches were proved to yield the same throughput as output queued switches, we show by simulation experiments and analytical modeling that throughput limitations exist in input-queued switches loaded with multicast traffic.
With the security situation in Cyberspace constantly becoming worse, Cyber threat detection has attracted a lot of researching attentions. In this paper, existing detection technologies are firstly reviewed. Secondly,...
详细信息
ISBN:
(纸本)9781509051557
With the security situation in Cyberspace constantly becoming worse, Cyber threat detection has attracted a lot of researching attentions. In this paper, existing detection technologies are firstly reviewed. Secondly, a framework of capturing the abnormal traffic of botnets is proposed. Major modules and key detection techniques are presented at the same time. The hidden threat detection in physically isolated network is also discussed, and a detection system capable of detecting and locating hidden malicious programs is proposed and validated by experiments. Conclusions and future researching suggestions are given finally.
We study an optimal choice of the buffer size in the Internet routers. The objective is to determine the minimum value of the buffer size required in order to fully utilize the link capacity. The reare some empirical ...
详细信息
We study an optimal choice of the buffer size in the Internet routers. The objective is to determine the minimum value of the buffer size required in order to fully utilize the link capacity. The reare some empirical rules for the choice of the buffer size. The most known rule of thumb states that the buffer length should be set to the bandwidth delay product of the network, i.e., the product between the average round trip time in the network and the capacity of the bottleneck link. Several recent works have suggested that as a consequence of the traffic aggregation, the buffer size should be set to smaller values. In this paper we propose an analytical framework for the optimal choice of the router buffer size. We formulate this problem as a multi-criteria optimization problem, in which the Lagrange function corresponds to a linear combination of the average sending rate and average delay in the queue. The solution to this optimization problem provides further evidence that indeed the buffer size should be reduced in the presence of traffic aggregation. Furthermore, our result states that the minimum required buffer is smaller than what previous studies suggested. Our analytical results are confirmed by simulations performed with the NS simulator.
We present a study of voice over ip capacity in 802.11 wireless local area networks (WLANs) using actual conversational speech recordings. Our intention is to give a more realistic view on how voice capacity varies in...
详细信息
We present a study of voice over ip capacity in 802.11 wireless local area networks (WLANs) using actual conversational speech recordings. Our intention is to give a more realistic view on how voice capacity varies in a WLAN environment. To this goal we conducted several parallel studies comparing results based on real speech to those based on the ITU-T Rec. P.59 artificial conversational model. The studies include the use (or not) of silence suppression, distributed and centralized access mechanisms, and a variety of speech conditions. The results show, importantly, that indeed capacity based on real speech differs from that obtained using the artificial model. The reasons for this difference goes beyond observed differences in activity levels. It depends on secondary statistical characteristics of traffic and on the (random) sampling of conversations. With the study we are also able to compare the relative benefits of different approaches to increase capacity.
暂无评论