416 research outputs found

    Architectures for the Future Networks and the Next Generation Internet: A Survey

    Get PDF
    Networking research funding agencies in the USA, Europe, Japan, and other countries are encouraging research on revolutionary networking architectures that may or may not be bound by the restrictions of the current TCP/IP based Internet. We present a comprehensive survey of such research projects and activities. The topics covered include various testbeds for experimentations for new architectures, new security mechanisms, content delivery mechanisms, management and control frameworks, service architectures, and routing mechanisms. Delay/Disruption tolerant networks, which allow communications even when complete end-to-end path is not available, are also discussed

    A framework for the dynamic management of Peer-to-Peer overlays

    Get PDF
    Peer-to-Peer (P2P) applications have been associated with inefficient operation, interference with other network services and large operational costs for network providers. This thesis presents a framework which can help ISPs address these issues by means of intelligent management of peer behaviour. The proposed approach involves limited control of P2P overlays without interfering with the fundamental characteristics of peer autonomy and decentralised operation. At the core of the management framework lays the Active Virtual Peer (AVP). Essentially intelligent peers operated by the network providers, the AVPs interact with the overlay from within, minimising redundant or inefficient traffic, enhancing overlay stability and facilitating the efficient and balanced use of available peer and network resources. They offer an “insider‟s” view of the overlay and permit the management of P2P functions in a compatible and non-intrusive manner. AVPs can support multiple P2P protocols and coordinate to perform functions collectively. To account for the multi-faceted nature of P2P applications and allow the incorporation of modern techniques and protocols as they appear, the framework is based on a modular architecture. Core modules for overlay control and transit traffic minimisation are presented. Towards the latter, a number of suitable P2P content caching strategies are proposed. Using a purpose-built P2P network simulator and small-scale experiments, it is demonstrated that the introduction of AVPs inside the network can significantly reduce inter-AS traffic, minimise costly multi-hop flows, increase overlay stability and load-balancing and offer improved peer transfer performance

    Improving Dependability of Networks with Penalty and Revocation Mechanisms

    Get PDF
    Both malicious and non-malicious faults can dismantle computer networks. Thus, mitigating faults at various layers is essential in ensuring efficient and fair network resource utilization. In this thesis we take a step in this direction and study several ways to deal with faults by means of penalties and revocation mechanisms in networks that are lacking a centralized coordination point, either because of their scale or design. Compromised nodes can pose a serious threat to infrastructure, end-hosts and services. Such malicious elements can undermine the availability and fairness of networked systems. To deal with such nodes, we design and analyze protocols enabling their removal from the network in a fast and a secure way. We design these protocols for two different environments. In the former setting, we assume that there are multiple, but independent trusted points in the network which coordinate other nodes in the network. In the latter, we assume that all nodes play equal roles in the network and thus need to cooperate to carry out common functionality. We analyze these solutions and discuss possible deployment scenarios. Next we turn our attention to wireless edge networks. In this context, some nodes, without being malicious, can still behave in an unfair manner. To deal with the situation, we propose several self-penalty mechanisms. We implement the proposed protocols employing a commodity hardware and conduct experiments in real-world environments. The analysis of data collected in several measurement rounds revealed improvements in terms of higher fairness and throughput. We corroborate the results with simulations and an analytic model. And finally, we discuss how to measure fairness in dynamic settings, where nodes can have heterogeneous resource demands

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This Issue New Bandwidth Boosts Opportunities at the University of ldaho Colleges Meld Data Functionality to Afford Larger, Better Facilities Focusing on Video Demands Wireless Optical Mesh Networking Wireless LANs for Voice Delivering Broadband over Power Lines The Real lmpact of Napster ACUTA Awards Presentations Interview President\u27s Message From the Executive Director Here\u27s My Advic

    A Network of One’s Own: Struggles to Domesticate the Internet

    Get PDF
    This thesis is a design research practice-led inquiry into the domesticated Internet. It first seeks to complicate simplistic corporate and academic visions by naming some of the struggles it encounters – not least to assert a private home and network of one's own. It is argued that a century of domestic technologies has emphasised invisibility, ubiquity, and automation in ways that obscure a network of exploited people and finite resources. Furthermore, these technological ambitions are met through machine surveillance, in ways newly enabled by the domesticated Internet, that threaten the privacy of the home. In response, this thesis seeks some practical ways to design alternatives that assert a network of one's own and makes the work it implicates visible. The methodological approach is broadly Research Through Design supplemented by a practice described as designerly hacking through which hidden technical potential is revealed and given meaning. Two empirical studies are described that together make an account of the technical possibility and social reality of the networked home: an autobiographical technical exploration of the author's home and network with the making of hacks and Research Products privately and in public; and a cultural probe engagement with six rented households surfacing contemporary accounts of the domesticated Internet and in particular the challenges and opportunities of wireless networking. Together this yields a series of technical and social insights for design and two forms are offered to communicate these: a framework for understanding change in the networked home (The Stuff of Home) and a set of 30 design patterns for a network of one's own; each invites different analyses. The conclusion then draws together the multiple threads developed through this thesis and offers some reflection on the complexity of doing contemporary technical design work

    Design and evaluation of a self-configuring wireless mesh network architecture

    Get PDF
    Wireless network connectivity plays an increasingly important role in supporting our everyday private and professional lives. For over three decades, self-organizing wireless multi-hop ad-hoc networks have been investigated as a decentralized replacement for the traditional forms of wireless networks that rely on a wired infrastructure. However, despite the tremendous efforts of the international wireless research community and widespread availability of devices that are able to support these networks, wireless ad-hoc networks are hardly ever used. In this work, the reasons behind this discrepancy are investigated. It is found that several basic theoretical assumptions on ad-hoc networks prove to be wrong when solutions are deployed in reality, and that several basic functionalities are still missing. It is argued that a hierarchical wireless mesh network architecture, in which specialized, multi-interfaced mesh nodes form a reliable multi-hop wireless backbone for the less capable end-user clients is an essential step in bringing the ad-hoc networking concept one step closer to reality. Therefore, in a second part of this work, algorithms increasing the reliability and supporting the deployment and management of these wireless mesh networks are developed, implemented and evaluated, while keeping the observed limitations and practical considerations in mind. Furthermore, the feasibility of the algorithms is verified by experiment. The performance analysis of these protocols and the ability to deploy the developed algorithms on current generation off-the-shelf hardware indicates the successfulness of the followed research approach, which combines theoretical considerations with practical implementations and observations. However, it was found that there are also many pitfalls to using real-life implementation as a research technique. Therefore, in the last part of this work, a methodology for wireless network research using real-life implementation is developed, allowing researchers to generate more reliable protocols and performance analysis results with less effort

    Design and implementation of an ITS station to bridge automotive and IoT systems

    Get PDF
    This thesis is about the development of a software package for on-board and road side devices in Intelligent Transport Systems. Such a software implements the stack of an ITS station as standardized by ETSI. The main innovation relies in the integration of an IoT segment based on IETF standards for wireless constrained devices. Prototyped hardware and software are being adopted and field tested in the URBELOG project focusing on last mile logistics in smart cities
    • 

    corecore