239 research outputs found

    A Survey on Handover Management in Mobility Architectures

    Full text link
    This work presents a comprehensive and structured taxonomy of available techniques for managing the handover process in mobility architectures. Representative works from the existing literature have been divided into appropriate categories, based on their ability to support horizontal handovers, vertical handovers and multihoming. We describe approaches designed to work on the current Internet (i.e. IPv4-based networks), as well as those that have been devised for the "future" Internet (e.g. IPv6-based networks and extensions). Quantitative measures and qualitative indicators are also presented and used to evaluate and compare the examined approaches. This critical review provides some valuable guidelines and suggestions for designing and developing mobility architectures, including some practical expedients (e.g. those required in the current Internet environment), aimed to cope with the presence of NAT/firewalls and to provide support to legacy systems and several communication protocols working at the application layer

    Network virtualization as an integrated solution for emergency communication

    Get PDF
    In this paper the Virtual Private Ad Hoc Networking (VPAN) platform is introduced as an integrated networking solution for many applications that require secure transparent continuous connectivity using heterogeneous devices and network technologies. This is done by creating a virtual logical self-organizing network on top of existing network technologies reducing complexity and maintaining session continuity right from the start. One of the most interesting applications relies in the field of emergency communication with its specific needs which will be discussed in this paper and matched in detail against the architecture and features of the VPAN platform. The concept and dynamics are demonstrated and evaluated with measurements done on real hardware

    IMPROVING NETWORK POLICY ENFORCEMENT USING NATURAL LANGUAGE PROCESSING AND PROGRAMMABLE NETWORKS

    Get PDF
    Computer networks are becoming more complex and challenging to operate, manage, and protect. As a result, Network policies that define how network operators should manage the network are becoming more complex and nuanced. Unfortunately, network policies are often an undervalued part of network design, leaving network operators to guess at the intent of policies that are written and fill in the gaps where policies don’t exist. Organizations typically designate Policy Committees to write down the network policies in the policy documents using high-level natural languages. The policy documents describe both the acceptable and unacceptable uses of the network. Network operators then take the responsibility of enforcing the policies and verifying whether the enforcement achieves expected requirements. Network operators often encounter gaps and ambiguous statements when translating network policies into specific network configurations. An ill-structured network policy document may prevent network operators from implementing the true intent of the policies, and thus leads to incorrect enforcement. It is thus important to know the quality of the written network policies and to remove any ambiguity that may confuse the people who are responsible for reading and implementing them. Moreover, there is a need not only to prevent policy violations from occurring but also to check for any policy violations that may have occurred (i.e., the prevention mechanisms failed in some way), since unwanted packets or network traffic, were somehow allowed to enter the network. In addition, the emergence of programmable networks provides flexible network control. Enforcing network routing policies in an environment that contains both the traditional networks and programmable networks also becomes a challenge. This dissertation presents a set of methods designed to improve network policy enforcement. We begin by describing the design and implementation of a new Network Policy Analyzer (NPA), which analyzes the written quality of network policies and outputs a quality report that can be given to Policy Committees to improve their policies. Suggestions on how to write good network policies are also provided. We also present Network Policy Conversation Engine (NPCE), a chatbot for network operators to ask questions in natural languages that check whether there is any policy violation in the network. NPCE takes advantage of recent advances in Natural Language Processing (NLP) and modern database solutions to convert natural language questions into the corresponding database queries. Next, we discuss our work towards understanding how Internet ASes connect with each other at third-party locations such as IXPs and their business relationships. Such a graph is needed to write routing policies and to calculate available routes in the future. Lastly, we present how we successfully manage network policies in a hybrid network composed of both SDN and legacy devices, making network services available over the entire network

    Guaranteed access over consumer-level connections

    Get PDF
    TÀssÀ opinnÀytetyössÀ tutkitaan konseptia Redundant Array of Independent Internet Connections (RAIIC), jossa ajatuksena on tarjota luotettava yhteys usean halvan ja epÀluotettavan liittymÀn yli. YhtÀ epÀluotettavaa liittymÀÀ kÀytetÀÀn kerrallaan tÀmÀn tilaa jatkuvasti tarkkaillen. Jos yhteyden tila heikkenee, jÀrjestelmÀ siirtÀÀ liikenteen toiselle liittymÀlle ilman ettÀ kommunikoivat osapuolet huomaavat muutosta. NÀin ollen voidaan tarjota virtuaalinen, luotettava bittiputki halpojen yhteyksien yli. Tutkimusta varten kehitimme Mobile IP -protokollaan pohjautuvan toteutuksen. TÀllÀ pÀÀsimme testaamaan konseptia oikeassa tietoverkossa. Mittasimme, miten liittymÀn vaihtaminen vaikuttaa loppukÀyttÀjÀn kokemaan palvelunlaatuun. TCP-protokollalla liittymÀn vaihto vastasi palvelussa 1 - 1.5 sekunnin katkoa, joka on vielÀ hyvinkin siedettÀvÀ. VoIP-palvelun laatu ei laskenut alle kohtalaisen tason (Mean Opinion Score -asteikolla "Fair").The scope of this thesis was providing guaranteed access over an array of unguaranteed and cheap consumer-grade connections. We tested how well high-availability access can be created with Redundant Array of Independent Internet Connections (RAIIC). In RAIIC, multiple unreliable connections are bundled together. Customer traffic is transferred on one connection at a time. State of the current connection is constantly monitored. If connectivity deteriorates, the system switches the traffic onto another unreliable connection. Connection switching should be invisible to the communicating nodes. For this study we developed a Mobile IP based implementation. We were able to test the concept on running code. We measured how the connection switching affects the end-user experience and the results seemed quite promising. On TCP the switching corresponded to 1 - 1.5 second outage, which is considered to be well tolerable. VoIP quality remained "Fair" in Mean Opinion Score metrics
    • 

    corecore