55,172 research outputs found
Optimizing IGP Link Costs for Improving IP-level Resilience
Recently, major vendors have introduced new router
platforms to the market that support fast IP-level failure pro-
tection out of the box. The implementations are based on the
IP Fast ReRouteâLoop Free Alternates (LFA) standard. LFA
is simple, unobtrusive, and easily deployable. This simplicity,
however, comes at a severe price, in that LFA usually cannot
protect all possible failure scenarios. In this paper, we give new
graph theoretical tools for analyzing LFA failure case coverage
and we seek ways for improvement. In particular, we investigate
how to optimize IGP link costs to maximize the number of
protected failure scenarios, we show that this problem is NP-
complete even in a very restricted formulation, and we give exact
and approximate algorithms to solve it. Our simulation studies
show that a deliberate selection of IGP costs can bring many
networks close to complete LFA-based protection
An Architecture for Network Layer Privacy
We present an architecture for the provision of network layer privacy based on the SHIM6 multihoming protocol. In its basic form, the architecture prevents on-path eavesdroppers from using SHIM6 network layer information to correlate packets that belong to the same communication but use different locators. To achieve this, several extensions to the SHIM6 protocol and to the HBA (Hash Based Addresses) addressing model are defined. On its full-featured mode of operation, hosts can vary dynamically the addresses of the packets of on-going communications. Single-homed hosts can adopt the SHIM6 protocol with the privacy enhancements to benefit from this protection against information collectors.IEEE Communications SocietyPublicad
Access and metro network convergence for flexible end-to-end network design
This paper reports on the architectural, protocol, physical layer, and integrated testbed demonstrations carried out by the DISCUS FP7 consortium in the area of access - metro network convergence. Our architecture modeling results show the vast potential for cost and power savings that node consolidation can bring. The architecture, however, also recognizes the limits of long-reach transmission for low-latency 5G services and proposes ways to address such shortcomings in future projects. The testbed results, which have been conducted end-to-end, across access - metro and core, and have targeted all the layers of the network from the application down to the physical layer, show the practical feasibility of the concepts proposed in the project
Energy management in communication networks: a journey through modelling and optimization glasses
The widespread proliferation of Internet and wireless applications has
produced a significant increase of ICT energy footprint. As a response, in the
last five years, significant efforts have been undertaken to include
energy-awareness into network management. Several green networking frameworks
have been proposed by carefully managing the network routing and the power
state of network devices.
Even though approaches proposed differ based on network technologies and
sleep modes of nodes and interfaces, they all aim at tailoring the active
network resources to the varying traffic needs in order to minimize energy
consumption. From a modeling point of view, this has several commonalities with
classical network design and routing problems, even if with different
objectives and in a dynamic context.
With most researchers focused on addressing the complex and crucial
technological aspects of green networking schemes, there has been so far little
attention on understanding the modeling similarities and differences of
proposed solutions. This paper fills the gap surveying the literature with
optimization modeling glasses, following a tutorial approach that guides
through the different components of the models with a unified symbolism. A
detailed classification of the previous work based on the modeling issues
included is also proposed
Spare capacity modelling and its applications in survivable iP-over-optical networks
As the interest in IP-over-optical networks are becoming the preferred core network architecture, survivability has emerged as a major concern for network service providers; a result of the potentially huge traffic volumes that will be supported by optical infrastructure. Therefore, implementing recovery strategies is critical. In addition to the traditional recovery schemes based around protection and restoration mechanisms, pre-allocated restoration represents a potential candidate to effect and maintain network resilience under failure conditions. Preallocated restoration technique is particularly interesting because it provides a trade-off in terms of recovery performance and resources between protection and restoration schemes. In this paper, the pre-allocated restoration performance is investigated under single and dual-link failures considering a distributed GMPLSbased IP/WDM mesh network. Two load-based spare capacity optimisation methods are proposed in this paper; Local Spare Capacity Optimisation (LSCO) and Global Spare Capacity Optimisation (GSCO)
IP Fast Reroute with Remote Loop-Free Alternates: the Unit Link Cost Case
Up to not so long ago, Loop-Free Alternates (LFA)
was the only viable option for providing fast protection in pure
IP and MPLS/LDP networks. Unfortunately, LFA cannot provide
protection for all possible failure cases in general. Recently, the
IETF has initiated the Remote Loop-Free Alternates (rLFA)
technique, as a simple extension to LFA, to boost the fraction
of failure cases covered by fast protection. Before further stan-
dardization and deployment, however, it is crucial to determine
to what extent rLFA can improve the level of protection in a
general IP network, as well as to find optimization methods to
tweak a network for 100% rLFA coverage. In this paper, we take
the first steps towards this goal by solving these problems in the
special, but practically relevant, case when each network link is
of unit cost. We also provide preliminary numerical evaluations
conducted on real IP network topologies, which suggest that rLFA
significantly improves the level of protection, and most networks
need only 2 â 3 new links to be added to attain 100% failure
case coverage
On the security of the Mobile IP protocol family
The Internet Engineering Task Force (IETF) has worked on\ud
network layer mobility for more than 10 years and a number\ud
of RFCs are available by now. Although the IETF mobility\ud
protocols are not present in the Internet infrastructure as of\ud
today, deployment seems to be imminent since a number\ud
of organizations, including 3GPP, 3GPP2 and Wimax, have\ud
realized the need to incorporate these protocols into their architectures.\ud
Deployment scenarios reach from mobility support\ud
within the network of a single provider to mobility support\ud
between different providers and technologies. Current Wimax\ud
specifications, for example, already support Mobile IPv4,\ud
Proxy Mobile IPv4 and Mobile IPv6. Future specifications will\ud
also support Proxy Mobile IPv6. Upcoming specifications in\ud
the 3GPP Evolved Packet Core (EPC) will include the use of\ud
Mobile IPv4, Dual Stack MIPv6 and Proxy Mobile IPv6 for\ud
interworking between 3GPP and non 3GPP networks.\ud
This paper provides an overview on the state-of-the-art\ud
in IETF mobility protocols as they are being considered by\ud
standardization organizations outside the IETF and focusing\ud
on security aspects
Security for the Industrial IoT: The Case for Information-Centric Networking
Industrial production plants traditionally include sensors for monitoring or
documenting processes, and actuators for enabling corrective actions in cases
of misconfigurations, failures, or dangerous events. With the advent of the
IoT, embedded controllers link these `things' to local networks that often are
of low power wireless kind, and are interconnected via gateways to some cloud
from the global Internet. Inter-networked sensors and actuators in the
industrial IoT form a critical subsystem while frequently operating under harsh
conditions. It is currently under debate how to approach inter-networking of
critical industrial components in a safe and secure manner.
In this paper, we analyze the potentials of ICN for providing a secure and
robust networking solution for constrained controllers in industrial safety
systems. We showcase hazardous gas sensing in widespread industrial
environments, such as refineries, and compare with IP-based approaches such as
CoAP and MQTT. Our findings indicate that the content-centric security model,
as well as enhanced DoS resistance are important arguments for deploying
Information Centric Networking in a safety-critical industrial IoT. Evaluation
of the crypto efforts on the RIOT operating system for content security reveal
its feasibility for common deployment scenarios.Comment: To be published at IEEE WF-IoT 201
- âŠ