55 research outputs found
Recommended from our members
Models for quality improvement and assurance in English and Welsh primary care
Proportional bandwidth distribution in IP networks implementing the assured forwarding PHB
Recent demands for new applications are giving rise
to an increasing need of Quality of Service (QoS).
Nowadays, most IP-based networks tend to use the
DiffServ architecture to provide end-to-end QoS.
Traffic conditioners are a key element in the
deployment of DiffServ. In this paper, we introduce a
new approach for traffic conditioning based on feedback
signaling among boundary nodes and traffic
conditioners. This new approach is intended to provide
a poportional distribution of excess bandwidth to endusers.
We evaluate through extensive simulations the
performance of our proposal in terms of final
throughput, considering contracted target rates and
distribution of spare bandwidth. Results show a high
level of fairness in the excess bandwidth allocation
among TCP sources under different network
conditions
Entropy/IP: Uncovering Structure in IPv6 Addresses
In this paper, we introduce Entropy/IP: a system that discovers Internet
address structure based on analyses of a subset of IPv6 addresses known to be
active, i.e., training data, gleaned by readily available passive and active
means. The system is completely automated and employs a combination of
information-theoretic and machine learning techniques to probabilistically
model IPv6 addresses. We present results showing that our system is effective
in exposing structural characteristics of portions of the IPv6 Internet address
space populated by active client, service, and router addresses.
In addition to visualizing the address structure for exploration, the system
uses its models to generate candidate target addresses for scanning. For each
of 15 evaluated datasets, we train on 1K addresses and generate 1M candidates
for scanning. We achieve some success in 14 datasets, finding up to 40% of the
generated addresses to be active. In 11 of these datasets, we find active
network identifiers (e.g., /64 prefixes or `subnets') not seen in training.
Thus, we provide the first evidence that it is practical to discover subnets
and hosts by scanning probabilistically selected areas of the IPv6 address
space not known to contain active hosts a priori.Comment: Paper presented at the ACM IMC 2016 in Santa Monica, USA
(https://dl.acm.org/citation.cfm?id=2987445). Live Demo site available at
http://www.entropy-ip.com
Towards Robust Traffic Engineering in IP Networks
To deliver a reliable communication service it is essential for
the network operator to manage how traffic flows in the network.
The paths taken by the traffic is controlled by the routing function.
Traditional ways of tuning routing in IP networks are designed
to be simple to manage and are not designed to adapt to the
traffic situation in the network. This can lead to congestion in
parts of the network while other parts of the network is
far from fully utilized. In this thesis we explore issues related
to optimization of the routing function to balance load in the network.
We investigate methods for efficient derivation of the
traffic situation using link count measurements. The advantage
of using link counts is that they are easily obtained and yield
a very limited amount of data. We evaluate and show that estimation
based on link counts give the operator a fast and accurate description
of the traffic demands. For the evaluation we have access to a unique data
set of complete traffic demands from an operational
IP backbone.
Furthermore, we evaluate performance of search heuristics to
set weights in link-state routing protocols. For the evaluation
we have access to complete traffic data from a Tier-1 IP network.
Our findings confirm previous studies who use partial traffic data or
synthetic traffic data. We find that optimization using estimated
traffic demands has little significance to the performance of
the load balancing.
Finally, we device an algorithm that finds a routing setting that is
robust to shifts in traffic patterns due to changes in the
interdomain routing. A set of worst case scenarios caused by the interdomain routing changes
is identified and used to solve a robust routing problem. The evaluation
indicates that performance of the robust routing is close to optimal for
a wide variety of traffic scenarios.
The main contribution of this thesis is that we demonstrate that it is
possible to estimate the traffic matrix with good accuracy and to develop
methods that optimize the routing settings to give strong and robust network
performance. Only minor changes might be necessary in order to implement our
algorithms in existing networks
Multidomain Network Based on Programmable Networks: Security Architecture
This paper proposes a generic security architecture
designed for a multidomain and multiservice network
based on programmable networks. The multiservice
network allows users of an IP network to run
programmable services using programmable nodes
located in the architecture of the network. The
programmable nodes execute codes to process active
packets, which can carry user data and control
information. The multiservice network model defined
here considers the more pragmatic trends in
programmable networks. In this scenario, new security
risks that do not appear in traditional IP networks become
visible. These new risks are as a result of the execution of
code in the programmable nodes and the processing of the
active packets. The proposed security architecture is based
on symmetric cryptography in the critical process,
combined with an efficient manner of distributing the
symmetric keys. Another important contribution has been
to scale the security architecture to a multidomain
scenario in a single and efficient way.Publicad
Stressors on the detectives of the Prince William County Police Department
Law enforcement is a highly stressful occupation, with law enforcement officials facing critical incidents such as violent crime scenes and potential loss of life. These incidents, however, are not a daily occurrence. The most common daily stressors associated with law enforcement originate from the law enforcement organization itself, the daily interactions with coworkers, the usage or misusage of the assigned equipment, and the individual\u27s perception of the work environment. This study collected survey data to analyze the prevalence and effects of the daily stressors perceived by the detectives of the Prince William County Police Department. This study identified three areas that required improvement in the work environment and provides the following recommendations; department should develop an ergonomics program, as well as, a procedure for the purchase of equipment, and a formal recognition program
Network overload avoidance by traffic engineering and content caching
The Internet traffic volume continues to grow at a great rate, now driven by video and TV distribution. For network operators it is important to avoid congestion in the network, and to meet service level agreements with their customers. This thesis presents work on two methods operators can use to reduce links loads in their networks: traffic engineering and content caching.
This thesis studies access patterns for TV and video and the potential for caching. The investigation is done both using simulation and by analysis of logs from a large TV-on-Demand system over four months.
The results show that there is a small set of programs that account for a large fraction of the requests and that a comparatively small local cache can be used to significantly reduce the peak link loads during prime time. The investigation also demonstrates how the popularity of programs changes over time and shows that the access pattern in a TV-on-Demand system very much depends on the content type.
For traffic engineering the objective is to avoid congestion in the network and to make better use of available resources by adapting the routing to the current traffic situation. The main challenge for traffic engineering in IP networks is to cope with the dynamics of Internet traffic demands.
This thesis proposes L-balanced routings that route the traffic on the shortest paths possible but make sure that no link is utilised to more than a given level L. L-balanced routing gives efficient routing of traffic and controlled spare capacity to handle unpredictable changes in traffic. We present an L-balanced routing algorithm and a heuristic search method for finding L-balanced weight settings for the legacy routing protocols OSPF and IS-IS. We show that the search and the resulting weight settings work well in real network scenarios
Aspects of proactive traffic engineering in IP networks
To deliver a reliable communication service over the Internet
it is essential for
the network operator to manage the traffic situation in the network.
The traffic situation is controlled by
the routing function which determines what path traffic follows from source
to destination.
Current practices for setting routing parameters in IP networks are
designed to be simple to manage. This can lead to congestion in
parts of the network while other parts of the network are
far from fully utilized. In this thesis we explore issues related
to optimization of the routing function to balance load in the network
and efficiently deliver a reliable communication service to the users.
The optimization takes into account not only the traffic situation under
normal operational conditions, but also traffic situations that appear
under a wide variety of circumstances deviating from the nominal case.
In order to balance load in the network knowledge of the traffic
situations is needed. Consequently, in this thesis
we investigate methods for efficient derivation of the
traffic situation. The derivation is based on estimation of
traffic demands from link load measurements. The advantage
of using link load measurements is that they are easily obtained and consist
of a limited amount of data that need to be processed. We evaluate and demonstrate how estimation
based on link counts gives the operator a fast and accurate description
of the traffic demands. For the evaluation we have access to a unique data
set of complete traffic demands from an operational
IP backbone.
However, to honor service level agreements at all times the variability
of the traffic needs to be accounted for in the load balancing.
In addition, optimization techniques are often sensitive to errors and
variations in input data. Hence, when an optimized routing setting is
subjected to real traffic demands in the network, performance often
deviate from what can be anticipated from the optimization. Thus,
we identify and model different traffic uncertainties and describe
how the routing setting can be optimized, not only for a nominal case,
but for a wide range of different traffic situations that might appear
in the network.
Our results can be applied in MPLS enabled networks as well as in
networks using link state routing protocols such as the widely used
OSPF and IS-IS protocols. Only minor changes may be needed in current
networks to implement our algorithms.
The contributions of this thesis is that we: demonstrate that it is
possible to estimate the traffic matrix with acceptable precision, and
we develop methods and models for common traffic uncertainties to
account for these uncertainties in the optimization of the routing
configuration. In addition, we identify important properties in the
structure of the traffic to successfully balance uncertain and
varying traffic demands
- …