328 research outputs found

    A Fairness Algorithm for High-speed Networks based on a Resilient Packet Ring Architecture

    Get PDF
    IEEE is currently standardizing a spatial reuse ring topology network called the Resilient Packet Ring (RPR, IEEE P802.17). The goal of the RPR development is to make a LAN/MAN standard, but also WANs are discussed. A ring network needs a fairness algorithm that regulates each stations access to the ring. The RPR fairness algorithm is currently being developed with mostly long distances between stations in mind. In this paper we discuss the feedback aspects of this algorithm and how it needs to be changed in order to give good performance if and when RPR is used for high-speed networks and LANs with shorter distances between stations. We discuss different architectural parameters including buffers sizes and distances between stations. We suggest the use of triggers instead of timers to meet the response requirements of high-speed networks. We have developed a discrete event simulator in the programming language Java. The proposed improvements are compared and evaluated using a ring network model that we have built using our simulator. (c) 2002 IEEE. Personal use of this material is permitted

    Ethernet - a survey on its fields of application

    Get PDF
    During the last decades, Ethernet progressively became the most widely used local area networking (LAN) technology. Apart from LAN installations, Ethernet became also attractive for many other fields of application, ranging from industry to avionics, telecommunication, and multimedia. The expanded application of this technology is mainly due to its significant assets like reduced cost, backward-compatibility, flexibility, and expandability. However, this new trend raises some problems concerning the services of the protocol and the requirements for each application. Therefore, specific adaptations prove essential to integrate this communication technology in each field of application. Our primary objective is to show how Ethernet has been enhanced to comply with the specific requirements of several application fields, particularly in transport, embedded and multimedia contexts. The paper first describes the common Ethernet LAN technology and highlights its main features. It reviews the most important specific Ethernet versions with respect to each application field’s requirements. Finally, we compare these different fields of application and we particularly focus on the fundamental concepts and the quality of service capabilities of each proposal

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Novel algorithms for fair bandwidth sharing on counter rotating rings

    Get PDF
    Rings are often preferred technology for networks as ring networks can virtually create fully connected mesh networks efficiently and they are also easy to manage. However, providing fair service to all the stations on the ring is not always easy to achieve. In order to capitalize on the advantages of ring networks, new buffer insertion techniques, such as Spatial Reuse Protocol (SRP), were introduced in early 2000s. As a result, a new standard known as IEEE 802.17 Resilient Packet Ring was defined in 2004 by the IEEE Resilient Packet Ring (RPR) Working Group. Since then two addenda have been introduced; namely, IEEE 802.17a and IEEE 802.17b in 2006 and 2010, respectively. During this standardization process, weighted fairness and queue management schemes were proposed to be used in the standard. As shown in this dissertation, these schemes can be applied to solve the fairness issues noted widely in the research community as radical changes are not practical to introduce within the context of a standard. In this dissertation, the weighted fairness aspects of IEEE 802.17 RPR (in the aggressive mode of operation) are studied; various properties are demonstrated and observed via network simulations, and additional improvements are suggested. These aspects have not been well studied until now, and can be used to alleviate some of the issues observed in the fairness algorithm under some scenarios. Also, this dissertation focuses on the RPR Medium Access Control (MAC) Client implementation of the IEEE 802.17 RPR MAC in the aggressive mode of operation and introduces a new active queue management scheme for ring networks that achieves higher overall utilization of the ring bandwidth with simpler and less expensive implementation than the generic implementation provided in the standard. The two schemes introduced in this dissertation provide performance comparable to the per destination queuing implementation, which yields the best achievable performance at the expense of the cost of implementation. In addition, till now the requirements for sizing secondary transit queue of IEEE 802.17 RPR stations (in the aggressive mode of operation) have not been properly investigated. The analysis and suggested improvements presented in this dissertation are then supported by performance evaluation results and theoretical calculations. Last, but not least, the impact of using different capacity links on the same ring has not been investigated before from the ring utilization and fairness points of view. This dissertation also investigates utilizing different capacity links in RPR and proposes a mechanism to support the same

    Design and Analysis of RT-Ring: A Protocol for Supporting Real-Time Communications

    Get PDF
    Distributed applications with quality of service (QoS) requirements are more and more used in several areas (e.g., automated factory networks, embedded systems, conferencing systems). These applications produce a type of traffic with hard timing requirements, i.e., transmissions must be completed within specified deadlines. To handle these transmissions, the communication system must use real-time protocols to provide a communication service that is able to satisfy the QoS requirements of the distributed applications. In this paper, we propose a new real-time protocol, called RT-Ring, able to support transmissions of both real-time and generic traffic over a ring network. RT-Ring provides both network guarantees and high network resource utilization, while ensuring the compatibility with the emerging differentiated service architectures. Network guarantees are fully proved and high network utilization is highlighted by a comparative study with the FDDI protocol. This comparison shows that RT-Ring network capacities are greater than the corresponding FDDI capacities. In fact, by assuming the FDDI frames with a length equal to the RT-Ring slot size and by using the same traffic load we show that the capacities of FDDI are equal to the lower bound capacities of RT-Ring. Index Terms Real-time protocol, quality of service (QoS) traffic, worst case analysis

    Evaluation of on-demand routing in mobile ad hoc networks and proposal for a secure routing protocol

    Get PDF
    Secure routing Mobile Ad hoc Networks (MANETs) has emerged as an important MANET research area. Initial work in MANET focused mainly on the problem of providing efficient mechanisms for finding paths in very dynamic networks, without considering the security of the routing process. Because of this, a number of attacks exploit these routing vulnerabilities to manipulate MANETs. In this thesis, we performed an in-depth evaluation and performance analysis of existing MANET Routing protocols, identifying Dynamic Source Routing (DSR) as the most robust (based on throughput, latency and routing overhead) which can be secured with negligible routing efficiency trade-off. We describe security threats, specifically showing their effects on DSR. We proposed a new routing protocol, named Authenticated Source Routing for Ad hoc Networks (ASRAN) which is an out-of-band certification-based, authenticated source routing protocol with modifications to the route acquisition process of DSR to defeat all identified attacks. Simulation studies confirm that ASRAN has a good trade-off balance in reference to the addition of security and routing efficiency

    Performance evaluation of real-time schedulers for HCCA function in IEEE 802.11e wireless networks

    Get PDF
    IEEE 802.11 standard for wireless networks recently has been enhanced with IEEE 802.11e amendment to this protocol which introduces Quality of Service support. It provides differentiation mechanisms at the Medium Access Control layer, using two additional access functions: the Enhanced Distributed Channel Access (EDCA) function and the HCF Controlled Channel Access (HCCA) function. The EDCA function is based on a distributed control and enables prioritized channel access while the latter requires centralized scheduling and allows the applications to negotiate parameterized service guarantees. Only HCCA mechanism is suitable for serving traffic streams with real-time requirements such as multimedia applications and Voice Over IP. The IEEE 802.11e standard does not specify a mandatory HCCA scheduling algorithm, while it offers a reference scheduler. In this paper we analyze four HCCA schedulers which are alternative to the reference one and which offer real-time guarantees. A performance evaluation through simulation is conducted to show the main differences between the considered schedulers, including the reference one

    IP and ATM - current evolution for integrated services

    Get PDF
    Current and future applications make use of different technologies as voice, data, and video. Consequently network technologies need to support them. For many years, the ATM based Broadband-ISDN has generally been regarded as the ultimate networking technology, which can integrate voice, data, and video services. With the recent tremendous growth of the Internet and the reluctant deployment of public ATM networks, the future development of ATM seems to be less clear than it used to be. In the past IP provided (and was though to provide) only best effort services, thus, despite its world wide diffution, was not considered as a network solution for multimedia application. Currently many of the IETF working groups work on areas related to integrated services, and IP is also proposing itself as networking technology for supporting voice, data, and video services. This paper give a technical overview on the competing integrated services network solutions, such as IP, ATM and the different available and emerging technologies on how to run IP over ATM, and tries to identify their potential and shortcomings
    corecore