7,408 research outputs found
The Embedding Capacity of Information Flows Under Renewal Traffic
Given two independent point processes and a certain rule for matching points
between them, what is the fraction of matched points over infinitely long
streams? In many application contexts, e.g., secure networking, a meaningful
matching rule is that of a maximum causal delay, and the problem is related to
embedding a flow of packets in cover traffic such that no traffic analysis can
detect it. We study the best undetectable embedding policy and the
corresponding maximum flow rate ---that we call the embedding capacity--- under
the assumption that the cover traffic can be modeled as arbitrary renewal
processes. We find that computing the embedding capacity requires the inversion
of very structured linear systems that, for a broad range of renewal models
encountered in practice, admits a fully analytical expression in terms of the
renewal function of the processes. Our main theoretical contribution is a
simple closed form of such relationship. This result enables us to explore
properties of the embedding capacity, obtaining closed-form solutions for
selected distribution families and a suite of sufficient conditions on the
capacity ordering. We evaluate our solution on real network traces, which shows
a noticeable match for tight delay constraints. A gap between the predicted and
the actual embedding capacities appears for looser constraints, and further
investigation reveals that it is caused by inaccuracy of the renewal traffic
model rather than of the solution itself.Comment: Sumbitted to IEEE Trans. on Information Theory on March 10, 201
Towards Provably Invisible Network Flow Fingerprints
Network traffic analysis reveals important information even when messages are
encrypted. We consider active traffic analysis via flow fingerprinting by
invisibly embedding information into packet timings of flows. In particular,
assume Alice wishes to embed fingerprints into flows of a set of network input
links, whose packet timings are modeled by Poisson processes, without being
detected by a watchful adversary Willie. Bob, who receives the set of
fingerprinted flows after they pass through the network modeled as a collection
of independent and parallel queues, wishes to extract Alice's embedded
fingerprints to infer the connection between input and output links of the
network. We consider two scenarios: 1) Alice embeds fingerprints in all of the
flows; 2) Alice embeds fingerprints in each flow independently with probability
. Assuming that the flow rates are equal, we calculate the maximum number of
flows in which Alice can invisibly embed fingerprints while having those
fingerprints successfully decoded by Bob. Then, we extend the construction and
analysis to the case where flow rates are distinct, and discuss the extension
of the network model
Markov Chain Methods For Analyzing Complex Transport Networks
We have developed a steady state theory of complex transport networks used to
model the flow of commodity, information, viruses, opinions, or traffic. Our
approach is based on the use of the Markov chains defined on the graph
representations of transport networks allowing for the effective network
design, network performance evaluation, embedding, partitioning, and network
fault tolerance analysis. Random walks embed graphs into Euclidean space in
which distances and angles acquire a clear statistical interpretation. Being
defined on the dual graph representations of transport networks random walks
describe the equilibrium configurations of not random commodity flows on
primary graphs. This theory unifies many network concepts into one framework
and can also be elegantly extended to describe networks represented by directed
graphs and multiple interacting networks.Comment: 26 pages, 4 figure
Performance Modelling and Measurements of TCP Transfer Throughput in 802.11based WLANs
The growing popularity of the 802.11 standard for building local wireless networks has generated an extensive literature on the performance modelling of its MAC protocol. However, most of the available studies focus on the throughput analysis in saturation conditions, while very little has been done on investigating the interactions between the 802.11 MAC protocol and closed-loop transport protocols such as TCP. This paper addresses this issue by developing an analytical model to compute the stationary probability distribution of the number of backlogged nodes in a WLAN in the presence of persistent TCP-controlled download and upload data transfers. By embedding the network backlog distribution in the MAC protocol modelling, we can precisely estimate the throughput performance of TCP connections. A large set of experiments conducted in a real network validates the model correctness for a wide range of configurations. A particular emphasis is devoted to investigate and explain the TCP fairness characteristics. Our analytical model and the supporting experimental outcomes demonstrate that using default settings for the capacity of devices\u27 output queues provides a fair allocation of channel bandwidth to the TCP connections, independently of the number of downstream and upstream flows. Furthermore, we show that the TCP total throughput does not degrade by increasing the number of wireless stations
Privatisation and Franchising of British Train Operations: the decline and derailment of the Great North Eastern Railway
As a result of the 1993 Railways Act, the British railways industry was privatised which resulted in the separation of ownership and control of the railway infrastructure (track, signals and stations) from that of passenger train operations. The Great North Eastern Railway (GNER), a major train operator, was unable to meet its contractual obligations shortly after successfully re-tendering for its second franchise. Within the context of incomplete contract theory, this paper discusses the main problems inherent in the franchising process and which specifically contributed to the collapse of GNER. In particular, the paper argues that the fragmented structure of asset ownership, the lack of coordination and investment incentives and flaws in the franchise method itself explain the demise of GNER and have undermined the general objectives of railway privatisation
- …