124,104 research outputs found

    Analisis Performansi Signaling dari Mobile IPv6 yang Terintegrasi pada MPLS Network dengan Xcast6

    Get PDF
    ABSTRAKSI: MIPv6 merupakan protokol standar untuk manajemen mobilitas pada IPv6 network. Pengintegrasian MIPv6 pada MPLS network dimaksudkan agar MPLS dengan fitur connection-oriented network service yang dimilikinya dapat memberikan dukungan terhadap kerja protokol MIPv6. Secara spesifik, MIPv6 memiliki permasalahan khususnya dalam fase correspondent registration dimana terjadi signaling overhead/high signaling load pada peng-update-an mobility binding (periodik BU message). Untuk menghadapi permasalahan inefisiensi tersebut, diproposalkan agar mengimplementasikan mekanisme Xcast6 dalam pengiriman signaling message. Sehingga, transmisi signaling mobility dengan mekanisme penggunaan Xcast6 yang diimplementasikan kemudian akan melalui skema dari integrasi MIPv6 dengan MPLS network. Dalam Tugas Akhir ini dilakukan analisis terhadap performansi signaling dari MIPv6 yang terintegrasi pada MPLS network dengan menggunakan Xcast6 sebagai mekanisme pembawa mobility message. Secara umum, analisis terhadap simulasi model skenario menyimpulkan bahwa pengimplementasian mekanisme Xcast6 tersebut ternyata dapat memberikan performansi signaling dari MIPv6 menjadi lebih baik.Kata Kunci : : Xcast6, MIPv6, MPLS network, signaling mobilityABSTRACT: MIPv6 is the standard protocol for mobility management on IPv6 networks. Integrating MIPv6 on MPLS network intend to provide MPLS connection-oriented network service to support MIPv6 protocol as extended features on its conventional mobility procedure. Specifically, MIPv6 has a signaling mobility performance problem in correspondent registration phase which there is signaling overhead/high signaling load that incurred on transmission process of periodic BU message. In order to overcome this inefficiency problem, Xcast6 technique have been proposed to be implemented as carrier of signaling messages, especially to handle BU message transmission to multiple correspondent nodes. Thus, transmission mechanism of signaling mobility with Xcast6 that already implemented on standard MIPv6 would pass through the scheme of MIPv6 integrated on MPLS at backbone network. On this final project, it focus on analyzing signaling performance of MIPv6 integrated on MPLS network which using Xcast6 protocol as mechanism to carry its mobility message. Generally, analysis result toward experiment’s data from scenario model simulation concludes that the implementation of Xcast6 mechanism can gives better signaling performance to MIPv6 protocol.Keyword: Xcast6, MIPv6, MPLS network, signaling mobilit

    Reasoning About a Service-oriented Programming Paradigm

    Full text link
    This paper is about a new way for programming distributed applications: the service-oriented one. It is a concept paper based upon our experience in developing a theory and a language for programming services. Both the theoretical formalization and the language interpreter showed us the evidence that a new programming paradigm exists. In this paper we illustrate the basic features it is characterized by

    Social-aware Opportunistic Routing Protocol based on User's Interactions and Interests

    Full text link
    Nowadays, routing proposals must deal with a panoply of heterogeneous devices, intermittent connectivity, and the users' constant need for communication, even in rather challenging networking scenarios. Thus, we propose a Social-aware Content-based Opportunistic Routing Protocol, SCORP, that considers the users' social interaction and their interests to improve data delivery in urban, dense scenarios. Through simulations, using synthetic mobility and human traces scenarios, we compare the performance of our solution against other two social-aware solutions, dLife and Bubble Rap, and the social-oblivious Spray and Wait, in order to show that the combination of social awareness and content knowledge can be beneficial when disseminating data in challenging networks

    Social-aware Forwarding in Opportunistic Wireless Networks: Content Awareness or Obliviousness?

    Full text link
    With the current host-based Internet architecture, networking faces limitations in dynamic scenarios, due mostly to host mobility. The ICN paradigm mitigates such problems by releasing the need to have an end-to-end transport session established during the life time of the data transfer. Moreover, the ICN concept solves the mismatch between the Internet architecture and the way users would like to use it: currently a user needs to know the topological location of the hosts involved in the communication when he/she just wants to get the data, independently of its location. Most of the research efforts aim to come up with a stable ICN architecture in fixed networks, with few examples in ad-hoc and vehicular networks. However, the Internet is becoming more pervasive with powerful personal mobile devices that allow users to form dynamic networks in which content may be exchanged at all times and with low cost. Such pervasive wireless networks suffer with different levels of disruption given user mobility, physical obstacles, lack of cooperation, intermittent connectivity, among others. This paper discusses the combination of content knowledge (e.g., type and interested parties) and social awareness within opportunistic networking as to drive the deployment of ICN solutions in disruptive networking scenarios. With this goal in mind, we go over few examples of social-aware content-based opportunistic networking proposals that consider social awareness to allow content dissemination independently of the level of network disruption. To show how much content knowledge can improve social-based solutions, we illustrate by means of simulation some content-oblivious/oriented proposals in scenarios based on synthetic mobility patterns and real human traces.Comment: 7 pages, 6 figure

    Implementing Session Centered Calculi

    Get PDF
    Recently, specific attention has been devoted to the development of service oriented process calculi. Besides the foundational aspects, it is also interesting to have prototype implementations for them in order to assess usability and to minimize the gap between theory and practice. Typically, these implementations are done in Java taking advantage of its mechanisms supporting network applications. However, most of the recurrent features of service oriented applications are re-implemented from scratch. In this paper we show how to implement a service oriented calculus, CaSPiS (Calculus of Services with Pipelines and Sessions) using the Java framework IMC, where recurrent mechanisms for network applications are already provided. By using the session oriented and pattern matching communication mechanisms provided by IMC, it is relatively simple to implement in Java all CaSPiS abstractions and thus to easily write the implementation in Java of a CaSPiS process

    MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles

    Get PDF
    Vehicular Ad-hoc NETwork (VANET), a novel technology holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety. Connected vehicles propagate sensitive information which must be shared with the neighbors in a secure environment. However, VANET may also include dishonest nodes such as Man-in-the-Middle (MiTM) attackers aiming to distribute and share malicious content with the vehicles, thus polluting the network with compromised information. In this regard, establishing trust among connected vehicles can increase security as every participating vehicle will generate and propagate authentic, accurate and trusted content within the network. In this paper, we propose a novel trust model, namely, Man-in-the-middle Attack Resistance trust model IN connEcted vehicles (MARINE), which identifies dishonest nodes performing MiTM attacks in an efficient way as well as revokes their credentials. Every node running MARINE system first establishes trust for the sender by performing multi-dimensional plausibility checks. Once the receiver verifies the trustworthiness of the sender, the received data is then evaluated both directly and indirectly. Extensive simulations are carried out to evaluate the performance and accuracy of MARINE rigorously across three MiTM attacker models and the bench-marked trust model. Simulation results show that for a network containing 35% MiTM attackers, MARINE outperforms the state of the art trust model by 15%, 18%, and 17% improvements in precision, recall and F-score, respectively.N/A
    • …
    corecore