124,104 research outputs found
Analisis Performansi Signaling dari Mobile IPv6 yang Terintegrasi pada MPLS Network dengan Xcast6
ABSTRAKSI: MIPv6 merupakan protokol standar untuk manajemen mobilitas pada IPv6 network. Pengintegrasian MIPv6 pada MPLS network dimaksudkan agar MPLS dengan fitur connection-oriented network service yang dimilikinya dapat memberikan dukungan terhadap kerja protokol MIPv6. Secara spesifik, MIPv6 memiliki permasalahan khususnya dalam fase correspondent registration dimana terjadi signaling overhead/high signaling load pada peng-update-an mobility binding (periodik BU message). Untuk menghadapi permasalahan inefisiensi tersebut, diproposalkan agar mengimplementasikan mekanisme Xcast6 dalam pengiriman signaling message. Sehingga, transmisi signaling mobility dengan mekanisme penggunaan Xcast6 yang diimplementasikan kemudian akan melalui skema dari integrasi MIPv6 dengan MPLS network. Dalam Tugas Akhir ini dilakukan analisis terhadap performansi signaling dari MIPv6 yang terintegrasi pada MPLS network dengan menggunakan Xcast6 sebagai mekanisme pembawa mobility message. Secara umum, analisis terhadap simulasi model skenario menyimpulkan bahwa pengimplementasian mekanisme Xcast6 tersebut ternyata dapat memberikan performansi signaling dari MIPv6 menjadi lebih baik.Kata Kunci : : Xcast6, MIPv6, MPLS network, signaling mobilityABSTRACT: MIPv6 is the standard protocol for mobility management on IPv6 networks. Integrating MIPv6 on MPLS network intend to provide MPLS connection-oriented network service to support MIPv6 protocol as extended features on its conventional mobility procedure. Specifically, MIPv6 has a signaling mobility performance problem in correspondent registration phase which there is signaling overhead/high signaling load that incurred on transmission process of periodic BU message. In order to overcome this inefficiency problem, Xcast6 technique have been proposed to be implemented as carrier of signaling messages, especially to handle BU message transmission to multiple correspondent nodes. Thus, transmission mechanism of signaling mobility with Xcast6 that already implemented on standard MIPv6 would pass through the scheme of MIPv6 integrated on MPLS at backbone network. On this final project, it focus on analyzing signaling performance of MIPv6 integrated on MPLS network which using Xcast6 protocol as mechanism to carry its mobility message. Generally, analysis result toward experiment’s data from scenario model simulation concludes that the implementation of Xcast6 mechanism can gives better signaling performance to MIPv6 protocol.Keyword: Xcast6, MIPv6, MPLS network, signaling mobilit
Reasoning About a Service-oriented Programming Paradigm
This paper is about a new way for programming distributed applications: the
service-oriented one. It is a concept paper based upon our experience in
developing a theory and a language for programming services. Both the
theoretical formalization and the language interpreter showed us the evidence
that a new programming paradigm exists. In this paper we illustrate the basic
features it is characterized by
Social-aware Opportunistic Routing Protocol based on User's Interactions and Interests
Nowadays, routing proposals must deal with a panoply of heterogeneous
devices, intermittent connectivity, and the users' constant need for
communication, even in rather challenging networking scenarios. Thus, we
propose a Social-aware Content-based Opportunistic Routing Protocol, SCORP,
that considers the users' social interaction and their interests to improve
data delivery in urban, dense scenarios. Through simulations, using synthetic
mobility and human traces scenarios, we compare the performance of our solution
against other two social-aware solutions, dLife and Bubble Rap, and the
social-oblivious Spray and Wait, in order to show that the combination of
social awareness and content knowledge can be beneficial when disseminating
data in challenging networks
Social-aware Forwarding in Opportunistic Wireless Networks: Content Awareness or Obliviousness?
With the current host-based Internet architecture, networking faces
limitations in dynamic scenarios, due mostly to host mobility. The ICN paradigm
mitigates such problems by releasing the need to have an end-to-end transport
session established during the life time of the data transfer. Moreover, the
ICN concept solves the mismatch between the Internet architecture and the way
users would like to use it: currently a user needs to know the topological
location of the hosts involved in the communication when he/she just wants to
get the data, independently of its location. Most of the research efforts aim
to come up with a stable ICN architecture in fixed networks, with few examples
in ad-hoc and vehicular networks. However, the Internet is becoming more
pervasive with powerful personal mobile devices that allow users to form
dynamic networks in which content may be exchanged at all times and with low
cost. Such pervasive wireless networks suffer with different levels of
disruption given user mobility, physical obstacles, lack of cooperation,
intermittent connectivity, among others. This paper discusses the combination
of content knowledge (e.g., type and interested parties) and social awareness
within opportunistic networking as to drive the deployment of ICN solutions in
disruptive networking scenarios. With this goal in mind, we go over few
examples of social-aware content-based opportunistic networking proposals that
consider social awareness to allow content dissemination independently of the
level of network disruption. To show how much content knowledge can improve
social-based solutions, we illustrate by means of simulation some
content-oblivious/oriented proposals in scenarios based on synthetic mobility
patterns and real human traces.Comment: 7 pages, 6 figure
Implementing Session Centered Calculi
Recently, specific attention has been devoted to the development of service oriented process calculi. Besides the foundational aspects, it is also interesting to have prototype implementations for them in order to assess usability and to minimize the gap between theory and practice. Typically, these implementations are done in Java taking advantage of its mechanisms supporting network applications. However, most of the recurrent features of service oriented applications are re-implemented from scratch. In this paper we show how to implement a service oriented calculus, CaSPiS (Calculus of Services with Pipelines and Sessions) using the Java framework IMC, where recurrent mechanisms for network applications are already provided. By using the session oriented and pattern matching communication mechanisms provided by IMC, it is relatively simple to implement in Java all CaSPiS abstractions and thus to easily write the implementation in Java of a CaSPiS process
MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles
Vehicular Ad-hoc NETwork (VANET), a novel technology holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety. Connected vehicles propagate sensitive information which must be shared with the neighbors in a secure environment. However, VANET may also include dishonest nodes such as Man-in-the-Middle (MiTM) attackers aiming to distribute and share malicious content with the vehicles, thus polluting the network with compromised information. In this regard, establishing trust among connected vehicles can increase security as every participating vehicle will generate and propagate authentic, accurate and trusted content within the network. In this paper, we propose a novel trust model, namely, Man-in-the-middle Attack Resistance trust model IN connEcted vehicles (MARINE), which identifies dishonest nodes performing MiTM attacks in an efficient way as well as revokes their credentials. Every node running MARINE system first establishes trust for the sender by performing multi-dimensional plausibility checks. Once the receiver verifies the trustworthiness of the sender, the received data is then evaluated both directly and indirectly. Extensive simulations are carried out to evaluate the performance and accuracy of MARINE rigorously across three MiTM attacker models and the bench-marked trust model. Simulation results show that for a network containing 35% MiTM attackers, MARINE outperforms the state of the art trust model by 15%, 18%, and 17% improvements in precision, recall and F-score, respectively.N/A
- …