Traffic Engineering (TE) mechanisms in data center networks make distributed forwarding decisions based on the global network state. Thus, new TE mechanisms require the design and implementation of effective informati...
详细信息
Traffic Engineering (TE) mechanisms in data center networks make distributed forwarding decisions based on the global network state. Thus, new TE mechanisms require the design and implementation of effective information exchange and efficient decentralized algorithms to compute forwarding decisions, which is challenging and time-intensive. To automate and simplify this process, we propose Mistill. Mistill distills the forwarding behavior of TE policies from exemplary forwarding decisions into a Neural network. Mistill learns (i) how to encode local state into update messages, (ii) which network devices must exchange updates, and (iii) how to map the exchanged updates into forwarding decisions. We demonstrate the abilities of Mistill by learning three TE policies, verifying their performance in simulations on synthetic and real-world traffic patterns, and by showing that the learned policies generalize to unseen traffic patterns. We implement Mistill as a proof-of-concept and show that Mistill reacts on average within 1.3ms to changes in the network.
Designing a communication network is a challenging task that requires selecting a network topology, as well as specific protocols and mechanisms, to meet current and future demands. Equally daunting, managing the netw...
详细信息
ISBN:
(纸本)1424403499
Designing a communication network is a challenging task that requires selecting a network topology, as well as specific protocols and mechanisms, to meet current and future demands. Equally daunting, managing the network requires tuning these protocols and mechanisms over time in response to changing constraints and conditions. However, the protocols underlying today's data networks, such as the Internet, were not designed with manageability in mind. As a result, managing these networks is, at best, a black art practiced by an increasingly overwhelmed community of engineers. Optimization tools can help the operators tune the protocol configuration and diagnose performance problems, based on measurements of the underlying network. However, many of the existing protocols were not designed with optimization in mind, leading to computationally difficult optimization problems even for the simplest of objective functions. In this position paper. we argue that future protocols should be designed with optimization in mind from the beginning, to simplify the process of configuring the protocols and diagnosing performance problems.
Recently, distributed wireless microsensor systems have provided more flexible leverage to emerging industrial applications. The tiny distributed wireless microsensor network systems, however, should be designed to ov...
详细信息
Recently, distributed wireless microsensor systems have provided more flexible leverage to emerging industrial applications. The tiny distributed wireless microsensor network systems, however, should be designed to overcome various constraints such as limited energy, bandwidth limit, and unexpected failure of communication under disturbances. In addition, their network topologies need to be managed with designated communication protocols. Thus, design of microsensor network protocols still needs to be application-specific. It should be also evaluated through designated tools at each level of networking characteristics. This research describes essential factors that affect the performance of sensor network systems in the design of wireless microsensor network protocols, and presents effective time-based network protocol and performance evaluation tool which are applicable for various protocols in industrial applications. The developed network evaluation tool, called TIE/MEMS, also includes functional comparison with recent protocols proposed for wireless microsensor networks, and provides design guidelines for multi-sensor network systems needed for emerging industrial applications.
Wireless networking has witnessed an explosion of interest from consumers in recent years for its applications in mobile and personal communications. As wireless networks become an integral component of the modern com...
详细信息
Wireless networking has witnessed an explosion of interest from consumers in recent years for its applications in mobile and personal communications. As wireless networks become an integral component of the modern communication infrastructure, energy efficiency will be an important design consideration due to the limited battery life of mobile terminals. Power conservation techniques are commonly used in the hardware design of such Systems. Since the network interface is a significant consumer of power, considerable research has been devoted to low-power design of the entire network protocol stack of wireless networks in an effort to enhance energy efficiency. This paper presents a comprehensive summary of recent work addressing energy efficient and low-power design within all layers of the wireless network protocol stack.
With the ongoing adoption of remotely communicating and interacting control systems harbored by critical infrastructures, the potential attack surface of such systems also increases drastically. Therefore, not only th...
详细信息
With the ongoing adoption of remotely communicating and interacting control systems harbored by critical infrastructures, the potential attack surface of such systems also increases drastically. Therefore, not only the need for standardized and manufacturer-agnostic control system communication protocols has grown, but also the requirement to protect those control systems' communication. There have already been numerous security analyses of different control system communication protocols;yet, these have not been combined with each other sufficiently, mainly due to three reasons: First, the life cycles of such protocols are usually much longer than those of other Internet and communication technologies, therefore legacy protocols are often not considered in current security analyses. Second, the usage of certain control system communication protocols is usually restricted to a particular infrastructure domain, which leads to an isolated view on them. Third, with the accelerating pace at which both control system communication protocols and threats against them develop, existing surveys are aging at an increased rate, making their re-investigation a necessity. In this paper, a comprehensive survey on the security of the most important control system communication protocols, namely Modbus, OPC UA, TASE.2, DNP3, IEC 60870-5-101, IEC 60870-5-104, and IEC 61850 is performed. To achieve comparability, a common test methodology based on attacks exploiting well-known control system protocol vulnerabilities is created for all protocols. In addition, the effectiveness of the related security standard IEC 62351 is analyzed by a pre- and post-IEC 62351 comparison.
Sensor network protocols exist to satisfy the communication needs of diverse applications, including data collection, event detection, target tracking and control. network protocols to enable these services are constr...
详细信息
Sensor network protocols exist to satisfy the communication needs of diverse applications, including data collection, event detection, target tracking and control. network protocols to enable these services are constrained by the extreme resource scarcity of sensor nodes-including energy, computing, communications and storage-which must be carefully managed and multiplexed by the operating system. These challenges have led to new protocols and operating systems that are efficient in their energy consumption, careful in their computational needs and miserly in their memory footprints, all while discovering neighbours, forming networks, delivering data and correcting failures.
In this investigation, a unifying framework for designing distributed linear-like and nonlinear state-dependent protocols to control the behavior of the multiagent systems over communication networks is presented. Var...
详细信息
In this investigation, a unifying framework for designing distributed linear-like and nonlinear state-dependent protocols to control the behavior of the multiagent systems over communication networks is presented. Various behaviors of the connected agents, mainly on undirected graphs, are achieved by well-designed couplings where consensus, formation, and deployment are some examples of the achievable behaviors. Composite behaviors stored in a behavioral bank can be selected by a suitable behavior selection mechanism that is controlled directly by the agent embedded artificial intelligence or indirectly through a mission planning utility. The detailed structure of the framework is provided, where the integration of first integral and nonlinear eigenvalue approaches constitute its core is presented. The nonlinear protocols can be converted into their equivalent linear-like protocols by applying a simple transformation. However, the needed conditions will be the same in both cases. Consensus protocols-both linear like and nonlinear-to achieve arithmetic, geometric, and harmonic means are covered. A generalization using the mean-of-order-p is also provided. Stability and convergence issues are mainly handled using properties of M-matrices and Lasalle's principle. The use of state-dependent parameterization to control behaviors is presented. The multitude of primitive behaviors is used to build a more sophisticated behavioral bank that resides in each agent such that an agent can choose or follow the recently active behavior.
This paper describes a lab project in computer communications and networks for senior undergraduate students in computer science and engineering. Given detailed specifications, students are asked to implement a data l...
详细信息
This paper describes a lab project in computer communications and networks for senior undergraduate students in computer science and engineering. Given detailed specifications, students are asked to implement a data link layer (DLL) that integrates correctly with other provided layers to obtain a complete working network stack. This lab gives the students the opportunity to learn how to read formal specifications for a network project and write a complete piece of source code. It provides a comprehensive environment for students to write software for a network protocol, test and debug it, and observe its working behavior. In this paper, the authors present a technical description of the project and a discussion of related educational issues.
The Internet continues to flourish, while an increasing number of network applications are found deploying Bloom filters. However, the heterogeneity of the Bloom filter realisations complicates the utilisation of rele...
详细信息
The Internet continues to flourish, while an increasing number of network applications are found deploying Bloom filters. However, the heterogeneity of the Bloom filter realisations complicates the utilisation of relevant applications. Moreover, when applying Bloom filter to traffic that usually has a gigabit capacity, even insignificant delays will accumulate and restrict the effectiveness of the real-time protocols. In this study, the authors present a Bloom filter construction that can be easily and consistently adopted at network nodes, with also considerable processing speed. Specifically, the authors show that AES-based hashes are adequate to create Bloom filters correctly. Then they illustrate how AES new instructions (AES-NI) can be leveraged to accelerate the Bloom filter realisation. According to the authors' experimental results, the proposed Bloom filter enables the best speed performance compared to the competing approaches.
Traditionally, network software has been structured in a monolithic fashion with all protocol stacks executing either within the kernel or in a single trusted user-level server. This organization is motivated by perfo...
详细信息
Traditionally, network software has been structured in a monolithic fashion with all protocol stacks executing either within the kernel or in a single trusted user-level server. This organization is motivated by performance and security concerns. However, considerations of code maintenance, ease of debugging, customization, and the simultaneous existence of multiple protocols argue for separating the implementations into more manageable user-level libraries of protocols. This paper describes the design and implementation of transport protocols as user-level libraries. We begin by motivating the need for protocol implementations as user-level libraries and placing our approach in the context of previous work. We then describe our alternative to monolithic protocol organization, which has been implemented on Mach workstations connected not only to traditional Ethernet, but also to a more modern network, the DEC SRC AN1. Based on our experience, we discuss the implications for host-network interface design and for overall system structure to support efficient user-level implementations of network protocols.
暂无评论