4,444 research outputs found
The Effect of Network and Infrastructural Variables on SPDY's Performance
HTTP is a successful Internet technology on top of which a lot of the web
resides. However, limitations with its current specification, i.e. HTTP/1.1,
have encouraged some to look for the next generation of HTTP. In SPDY, Google
has come up with such a proposal that has growing community acceptance,
especially after being adopted by the IETF HTTPbis-WG as the basis for
HTTP/2.0. SPDY has the potential to greatly improve web experience with little
deployment overhead. However, we still lack an understanding of its true
potential in different environments. This paper seeks to resolve these issues,
offering a comprehensive evaluation of SPDY's performance using extensive
experiments. We identify the impact of network characteristics and website
infrastructure on SPDY's potential page loading benefits, finding that these
factors are decisive for SPDY and its optimal deployment strategy. Through
this, we feed into the wider debate regarding HTTP/2.0, exploring the key
aspects that impact the performance of this future protocol
Recommended from our members
Understanding user interaction problems with wireless connection via research through design
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University LondonPeople frequently have problems making multiple devices work together. In this thesis, I use the Research‐through‐Design approach to understand the issues and propose solutions. Through an iterative series of investigations, the problems people have with the connection of multiple devices has been examined, including usability issues, difficulties with the sequential connection procedure, and difficulties performing an
action. I found non‐expert users to have difficulties with interpreting and evaluating the devices’ interaction status regarding the sequence of the connection procedure. When an evaluation problem occurs, they have problems dealing with the required sequence or diagnosing the error in their interactions. The problem understanding was examined from additional cases. The comprehension of the problems allowed me to generate design implications and propose a design solution. I proposed two implications with which to solve the stated problem. I suggested helping users evaluate device interaction and reduce unnecessary user interactions. A design framework was suggested as a solution by providing diagrammatic representations of system interaction and signals revealing device status. I then assessed the suggested solutions using paper prototypes, and demonstrated their effectiveness. The improved interfaces helped users evaluate device connection status so they may determine how to proceed with sequential interaction. With the Research‐through‐Design approach constructing knowledge by integrating theories and hypothesis, I found the feature of user‐multiple device interaction in which a user is required to manage the interaction between the devices. A single device cannot aid the user interaction. In the dissertation, I proposed a desirable state of user interaction, which is achieved by two devices revealing connection states together so that a user can earn a useful system image
From mechatronics to the Cloud
At its conception mechatronics was viewed purely in terms of the ability to integrate the technologies of mechanical and electrical engineering with computer science to transfer functionality, and hence complexity, from the mechanical domain to the software domain. However, as technologies, and in particular computing technologies, have evolved so the nature of mechatronics has changed from being purely associated with essentially stand-alone systems such as robots to providing the smart objects and systems which are the building blocks for Cyber-Physical Systems, and hence for Internet of Things and Cloud-based systems. With the possible advent of a 4th Industrial Revolution structured around these systems level concepts, mechatronics must again adapt its world view, if not its underlying technologies, to meet this new challenge
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed
Running off-site software middleboxes at third-party service providers has
been a popular practice. However, routing large volumes of raw traffic, which
may carry sensitive information, to a remote site for processing raises severe
security concerns. Prior solutions often abstract away important factors
pertinent to real-world deployment. In particular, they overlook the
significance of metadata protection and stateful processing. Unprotected
traffic metadata like low-level headers, size and count, can be exploited to
learn supposedly encrypted application contents. Meanwhile, tracking the states
of 100,000s of flows concurrently is often indispensable in production-level
middleboxes deployed at real networks.
We present LightBox, the first system that can drive off-site middleboxes at
near-native speed with stateful processing and the most comprehensive
protection to date. Built upon commodity trusted hardware, Intel SGX, LightBox
is the product of our systematic investigation of how to overcome the inherent
limitations of secure enclaves using domain knowledge and customization. First,
we introduce an elegant virtual network interface that allows convenient access
to fully protected packets at line rate without leaving the enclave, as if from
the trusted source network. Second, we provide complete flow state management
for efficient stateful processing, by tailoring a set of data structures and
algorithms optimized for the highly constrained enclave space. Extensive
evaluations demonstrate that LightBox, with all security benefits, can achieve
10Gbps packet I/O, and that with case studies on three stateful middleboxes, it
can operate at near-native speed.Comment: Accepted at ACM CCS 201
Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities
Optimization of energy consumption in future intelligent energy networks (or
Smart Grids) will be based on grid-integrated near-real-time communications
between various grid elements in generation, transmission, distribution and
loads. This paper discusses some of the challenges and opportunities of
communications research in the areas of smart grid and smart metering. In
particular, we focus on some of the key communications challenges for realizing
interoperable and future-proof smart grid/metering networks, smart grid
security and privacy, and how some of the existing networking technologies can
be applied to energy management. Finally, we also discuss the coordinated
standardization efforts in Europe to harmonize communications standards and
protocols.Comment: To be published in IEEE Communications Surveys and Tutorial
Game theoretic modeling of AIMD network equilibrium
This paper deals with modeling of network’s dynamic using game theory approach. The process of interaction among players (network users), trying to maximize their payoffs (e.g. throughput) could be analyzed using game-based concepts (Nash equilibrium, Pareto efficiency, evolution stability etc.). In this work we presented the model of TCP network’s dynamic and proved existence and uniqueness of solution, formulated payoff matrix for a network game and found conditions of equilibrium existence depending of loss sensitivity parameter. We consider influence if denial of service attacks on the equilibrium characteristics and illustrate results by simulations.В данной работе исследуется моделирования динамики сети на основе теоретико-игрового подхода. Процесс взаимодействия между пользоватлями, которые пытаются максимизировать свои выигрыши (например, долю сети) допускает представление в форме игры и применение методов анализа равновесия. В работе предлагается модель TCP сети и доказано существование и единственность точки устойчивого распределения ресурсов, построена матрица сетевой игры и найдены условия существования равновесия в зависимости от чувствительности пользователей к наличию ошибок. Рассмотрены также влияние атак на характеристики равновесия и проведено имитационное моделирование.В даній роботі досліджується моделювання динаміки мережі на основі теоретико-ігрового підходу. Процес взаємодії між користувачами, що намагаються максимізувати свої виграші (наприклад, частку мережі) допускає представлення у формі гри та застосування методів аналізу рівноваги. В роботі пропонується модель TCP мережі та доведено існування і єдність точки стійкого розподілу ресурсів, побудована матриця мережевої гри та знайдені умови існування рівноваги в залежності від чутливості користувачів до наявності помилок. Розглянуто також вплив атак на характеристики рівноваги та проведене імітаційне моделювання
COINSENSUS: The Need for Uniform National Virtual Currency Regulations
Google search volume for bitcoin and bitcoin-related keywords increased by as much as 1000 percent in 2017 from previous years. This increased interest comes hand-in-hand with increased regulatory and legislative scrutiny. Currently, there is disparate regulation for virtual currencies across national and state borders alike. States’ promulgation of various and incongruous virtual currency regulations have forced service providers to withdraw from different states within the country. However, transactions are not contained within state lines, and disparate state-by-state regulation is impracticable.
The Uniform Law Commission recognized the need for uniform guidance for those entering the North American market and drafted the Uniform Regulation of Virtual Currency Businesses Act for each state to adopt in 2017. This Comment argues that every state should implement language identical or similar to the Uniform Law Commission’s proposed regulation.
Implementing a uniform regulation applicable to clearly defined entities in this explosively growing field would provide harmony amongst the states and create an environment where both service providers and end-users have clear guidance on how to conform to the law. Further, regulatory clarity would provide consumers with much needed protection.
This Comment begins by examining the history and development of bitcoin and blockchain assets. Next, this Comment dis- cusses the need for regulations in the United States. Then, this Comment provides an overview of the existing laws and regulations at both state and federal levels, and examines the simultaneous yet inconsistent legal characterizations imposed on virtual currencies. Virtual currencies can be: a piece of property, a se- curity, a commodity, and of course, a currency. This Comment further analyzes the language and criticisms of the Uniform Law Commission’s proposed Uniform Regulation of Virtual Currency Businesses Act. Finally, this Comment argues that the adoption of a uniform regulation is vital for the blockchain community’s continued existence in America
- …