7,408 research outputs found

    The Embedding Capacity of Information Flows Under Renewal Traffic

    Full text link
    Given two independent point processes and a certain rule for matching points between them, what is the fraction of matched points over infinitely long streams? In many application contexts, e.g., secure networking, a meaningful matching rule is that of a maximum causal delay, and the problem is related to embedding a flow of packets in cover traffic such that no traffic analysis can detect it. We study the best undetectable embedding policy and the corresponding maximum flow rate ---that we call the embedding capacity--- under the assumption that the cover traffic can be modeled as arbitrary renewal processes. We find that computing the embedding capacity requires the inversion of very structured linear systems that, for a broad range of renewal models encountered in practice, admits a fully analytical expression in terms of the renewal function of the processes. Our main theoretical contribution is a simple closed form of such relationship. This result enables us to explore properties of the embedding capacity, obtaining closed-form solutions for selected distribution families and a suite of sufficient conditions on the capacity ordering. We evaluate our solution on real network traces, which shows a noticeable match for tight delay constraints. A gap between the predicted and the actual embedding capacities appears for looser constraints, and further investigation reveals that it is caused by inaccuracy of the renewal traffic model rather than of the solution itself.Comment: Sumbitted to IEEE Trans. on Information Theory on March 10, 201

    Towards Provably Invisible Network Flow Fingerprints

    Full text link
    Network traffic analysis reveals important information even when messages are encrypted. We consider active traffic analysis via flow fingerprinting by invisibly embedding information into packet timings of flows. In particular, assume Alice wishes to embed fingerprints into flows of a set of network input links, whose packet timings are modeled by Poisson processes, without being detected by a watchful adversary Willie. Bob, who receives the set of fingerprinted flows after they pass through the network modeled as a collection of independent and parallel M/M/1M/M/1 queues, wishes to extract Alice's embedded fingerprints to infer the connection between input and output links of the network. We consider two scenarios: 1) Alice embeds fingerprints in all of the flows; 2) Alice embeds fingerprints in each flow independently with probability pp. Assuming that the flow rates are equal, we calculate the maximum number of flows in which Alice can invisibly embed fingerprints while having those fingerprints successfully decoded by Bob. Then, we extend the construction and analysis to the case where flow rates are distinct, and discuss the extension of the network model

    Markov Chain Methods For Analyzing Complex Transport Networks

    Full text link
    We have developed a steady state theory of complex transport networks used to model the flow of commodity, information, viruses, opinions, or traffic. Our approach is based on the use of the Markov chains defined on the graph representations of transport networks allowing for the effective network design, network performance evaluation, embedding, partitioning, and network fault tolerance analysis. Random walks embed graphs into Euclidean space in which distances and angles acquire a clear statistical interpretation. Being defined on the dual graph representations of transport networks random walks describe the equilibrium configurations of not random commodity flows on primary graphs. This theory unifies many network concepts into one framework and can also be elegantly extended to describe networks represented by directed graphs and multiple interacting networks.Comment: 26 pages, 4 figure

    Performance Modelling and Measurements of TCP Transfer Throughput in 802.11based WLANs

    Get PDF
    The growing popularity of the 802.11 standard for building local wireless networks has generated an extensive literature on the performance modelling of its MAC protocol. However, most of the available studies focus on the throughput analysis in saturation conditions, while very little has been done on investigating the interactions between the 802.11 MAC protocol and closed-loop transport protocols such as TCP. This paper addresses this issue by developing an analytical model to compute the stationary probability distribution of the number of backlogged nodes in a WLAN in the presence of persistent TCP-controlled download and upload data transfers. By embedding the network backlog distribution in the MAC protocol modelling, we can precisely estimate the throughput performance of TCP connections. A large set of experiments conducted in a real network validates the model correctness for a wide range of configurations. A particular emphasis is devoted to investigate and explain the TCP fairness characteristics. Our analytical model and the supporting experimental outcomes demonstrate that using default settings for the capacity of devices\u27 output queues provides a fair allocation of channel bandwidth to the TCP connections, independently of the number of downstream and upstream flows. Furthermore, we show that the TCP total throughput does not degrade by increasing the number of wireless stations

    Privatisation and Franchising of British Train Operations: the decline and derailment of the Great North Eastern Railway

    Get PDF
    As a result of the 1993 Railways Act, the British railways industry was privatised which resulted in the separation of ownership and control of the railway infrastructure (track, signals and stations) from that of passenger train operations. The Great North Eastern Railway (GNER), a major train operator, was unable to meet its contractual obligations shortly after successfully re-tendering for its second franchise. Within the context of incomplete contract theory, this paper discusses the main problems inherent in the franchising process and which specifically contributed to the collapse of GNER. In particular, the paper argues that the fragmented structure of asset ownership, the lack of coordination and investment incentives and flaws in the franchise method itself explain the demise of GNER and have undermined the general objectives of railway privatisation
    corecore