482,501 research outputs found

    Scenarios and research issues for a network of information

    Get PDF
    This paper describes ideas and items of work within the framework of the EU-funded 4WARD project. We present scenarios where the current host-centric approach to infor- mation storage and retrieval is ill-suited for and explain how a new networking paradigm emerges, by adopting the information-centric network architecture approach, which we call Network of Information (NetInf). NetInf capital- izes on a proposed identifier/locator split and allows users to create, distribute, and retrieve information using a com- mon infrastructure without tying data to particular hosts. NetInf introduces the concepts of information and data ob- jects. Data objects correspond to the particular bits and bytes of a digital object, such as text file, a specific encod- ing of a song or a video. Information objects can be used to identify other objects irrespective of their particular dig- ital representation. After discussing the benefits of such an indirection, we consider the impact of NetInf with respect to naming and governance in the Future Internet. Finally, we provide an outlook on the research scope of NetInf along with items for future work

    Pricing, Investment, and Network Equilibrium

    Get PDF
    Despite rapidly emerging innovative road pricing and investment principles, the development of a long run network dynamics model for necessary policy evaluation is still lagging. This research endeavors to fill this gap and models the impacts of road financing policies throughout the network equilibration process. The manner in which pricing and investment jointly shape network equilibrium is particularly important and explored in this study. The interactions among travel demand, road supply, revenue mechanisms and investment rules are modeled at the link level in a network growth simulator. After assessing several measures of effectiveness, the proposed network growth model is able to evaluate the short- and long-run impacts of a broad spectrum of road pricing and investment policies on large-scale road networks, which can provide valuable information to decision-makers such as the implications of various policy scenarios on social welfare, financial situation of road authorities and potential implementation problems. Some issues hard to address in theoretical analysis can be examined in the agent-based simulation model. As a demonstration, we apply the network growth model to assess marginal and average pricing scenarios on a sample network. Even this relatively simple application provides new insights into issues around road pricing that have not previously been seriously considered. For instance, the results disclose a potential problem of over-investment when the marginal cost pricing scheme is adopted in conjunction with a myopic profit-neutral investment policy.Transportation network equilibrium; Road growth; Pricing; Congestion toll; Investment; Transport policy analysis.

    Understand Your Chains: Towards Performance Profile-based Network Service Management

    Full text link
    Allocating resources to virtualized network functions and services to meet service level agreements is a challenging task for NFV management and orchestration systems. This becomes even more challenging when agile development methodologies, like DevOps, are applied. In such scenarios, management and orchestration systems are continuously facing new versions of functions and services which makes it hard to decide how much resources have to be allocated to them to provide the expected service performance. One solution for this problem is to support resource allocation decisions with performance behavior information obtained by profiling techniques applied to such network functions and services. In this position paper, we analyze and discuss the components needed to generate such performance behavior information within the NFV DevOps workflow. We also outline research questions that identify open issues and missing pieces for a fully integrated NFV profiling solution. Further, we introduce a novel profiling mechanism that is able to profile virtualized network functions and entire network service chains under different resource constraints before they are deployed on production infrastructure.Comment: Submitted to and accepted by the European Workshop on Software Defined Networks (EWSDN) 201

    The design of cement distribution network in Myanmar : a case study of "X" cement industry

    Get PDF
    The network design problem is one of the most comprehensive strategic decision issues that need to be optimized for the long-term efficient operation of whole supply chain. The problem treated in this thesis is a capacitated location allocation planning of distribution centers for the distribution network design. The distribution network in this research is considered from plants to distribution centers and distribution centers to demand points. The research will explore the optimal number and locations of cement distribution center of “X” cement industry in Myanmar. The Mixed Integer Linear Programming (MILP) was developed as a tool to solve optimization problem which involves 3 manufacturing plants, 6 distribution centers and 6 market regions. The data collection was done by the company. The (MILP) model provides useful information for the Company about which distribution centers should be opened and what would be the best distribution network in order to maximize profit while still satisfies the customers’ demand. In this study, we proposed three scenarios which are scenario two, six and eight. In all scenarios, the solution was to have only two distribution centers from Mandalay and Meikhtila markets are recommended to open in the distribution network

    A new sinkhole attack detection algorithm for RPL in wireless sensor networks (WSN)

    Get PDF
    With the continuous improvement of science and technology, wireless sensor network technology has gradually been widely used, and provides great convenience for people's living, but with the continuous improvement of the degree of application, wireless sensor network security issues also enter people's field of vision. Sensor nodes can be used for continuous sensing, event recognition and event identification. 6LoWPAN plays an important role in this convergence of heterogeneous technologies, which allows sensors to transmit information using IPv6 stack. Sensors perform critical tasks and become targets of attacks. Sinkhole attack is one of the most common attacks to sensor networks, threatening the network availability by dropping data or disturbing routing paths. RPL is a standard routing protocol commonly used in sensor networks. Therefore, this research presents the works in designing and developing Secured-RPL using the eave-listening concept (overhearing) to treating sinkhole attack. The suggested mechanism method could determine transmitted packages then overhear to the received packet, meaning that the node can overhearing to the neighbor node. Furthermore, three different simulation scenarios were applied, which are the scenario without attacker nodes, scenario with attacker nodes and the scenario with attacker and security by using Cooja simulator to Measurement and analysis performance of RPL in terms of packet delivery ratio (PDR) and power consumption over different packet transmission rate. The experimental results show that the proposed recognition method can identify sinkholes attack effectively and with less storage cost under various wireless sensor networks. Where the optimization ratio of the PDR in scenario with attacker node with the security was close to the scenario with a normal node

    Using Covert Means to Establish Cybercraft Command and Control

    Get PDF
    With the increase in speed and availability of computers, our nation\u27s computer and information systems are being attacked with increased sophistication. The Air Force Research Laboratory (AFRL) Information Directorate (RI) is researching a next generation network defense architecture, called Cybercraft, that provides automated and trusted cyber defense capabilities for AF network assets. This research we consider the issues to protect or obfuscate command and control aspects of Cybercraft. In particular, we present a methodology to hide aspects of Cybercraft platform initialization in context to formation of hierarchical, peer-to-peer groups that collectively form the Cybercraft network. Because malicious code networks (known as botnets) currently manifest many properties of obfuscating command and control sequencing, we evaluate and consider our proposed methodology in light of leading bot detection algorithms. This research subjects Bothunter to a series of tests to validate these claims. We use a leading bot detection utility, Bothunter, and an ARP validation tool, XArp, to build a case for the effectiveness of our approach. We present three scenarios that correlate to how we believe Cybercraft platforms integrate in the future and consider stealthiness in terms of these representative tools. Our research gives emphasis on measurable hiding related to the Cybercraft initialization sequence, and we show how common network protocols such as ARP, HTTP, and DNS may be modified to carry C2 commands while evading common detection methods found in current tools

    A Model-driven Approach for the Description of Blockchain Business Networks

    Get PDF
    The concept of blockchain technology has gained significant momentum in practice and research in the past few years, as it provides an effective way for addressing the issues of anonymity and traceability in distributed scenarios with multiple parties, which have to exchange information and want to securely collaborate with each other. However, up-to-date, the impact of the structure and setup of business networks on successfully applying blockchain technology, remains largely unexplored. We propose a model-driven approach, combining an ontology and a layer model, that is capable of capturing the properties of existing blockchain-driven business networks. The layers are used to facilitate the comprehensive description of such networks. We also introduce the Blockchain Business Network Ontology (BBO), formalizing the concepts and properties for describing the integral parts of a blockchain network. We show the practical applicability of our work by evaluating and applying it to an available blockchain use case
    • 

    corecore