4,444 research outputs found

    The Effect of Network and Infrastructural Variables on SPDY's Performance

    Get PDF
    HTTP is a successful Internet technology on top of which a lot of the web resides. However, limitations with its current specification, i.e. HTTP/1.1, have encouraged some to look for the next generation of HTTP. In SPDY, Google has come up with such a proposal that has growing community acceptance, especially after being adopted by the IETF HTTPbis-WG as the basis for HTTP/2.0. SPDY has the potential to greatly improve web experience with little deployment overhead. However, we still lack an understanding of its true potential in different environments. This paper seeks to resolve these issues, offering a comprehensive evaluation of SPDY's performance using extensive experiments. We identify the impact of network characteristics and website infrastructure on SPDY's potential page loading benefits, finding that these factors are decisive for SPDY and its optimal deployment strategy. Through this, we feed into the wider debate regarding HTTP/2.0, exploring the key aspects that impact the performance of this future protocol

    From mechatronics to the Cloud

    Get PDF
    At its conception mechatronics was viewed purely in terms of the ability to integrate the technologies of mechanical and electrical engineering with computer science to transfer functionality, and hence complexity, from the mechanical domain to the software domain. However, as technologies, and in particular computing technologies, have evolved so the nature of mechatronics has changed from being purely associated with essentially stand-alone systems such as robots to providing the smart objects and systems which are the building blocks for Cyber-Physical Systems, and hence for Internet of Things and Cloud-based systems. With the possible advent of a 4th Industrial Revolution structured around these systems level concepts, mechatronics must again adapt its world view, if not its underlying technologies, to meet this new challenge

    LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed

    Full text link
    Running off-site software middleboxes at third-party service providers has been a popular practice. However, routing large volumes of raw traffic, which may carry sensitive information, to a remote site for processing raises severe security concerns. Prior solutions often abstract away important factors pertinent to real-world deployment. In particular, they overlook the significance of metadata protection and stateful processing. Unprotected traffic metadata like low-level headers, size and count, can be exploited to learn supposedly encrypted application contents. Meanwhile, tracking the states of 100,000s of flows concurrently is often indispensable in production-level middleboxes deployed at real networks. We present LightBox, the first system that can drive off-site middleboxes at near-native speed with stateful processing and the most comprehensive protection to date. Built upon commodity trusted hardware, Intel SGX, LightBox is the product of our systematic investigation of how to overcome the inherent limitations of secure enclaves using domain knowledge and customization. First, we introduce an elegant virtual network interface that allows convenient access to fully protected packets at line rate without leaving the enclave, as if from the trusted source network. Second, we provide complete flow state management for efficient stateful processing, by tailoring a set of data structures and algorithms optimized for the highly constrained enclave space. Extensive evaluations demonstrate that LightBox, with all security benefits, can achieve 10Gbps packet I/O, and that with case studies on three stateful middleboxes, it can operate at near-native speed.Comment: Accepted at ACM CCS 201

    Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities

    Full text link
    Optimization of energy consumption in future intelligent energy networks (or Smart Grids) will be based on grid-integrated near-real-time communications between various grid elements in generation, transmission, distribution and loads. This paper discusses some of the challenges and opportunities of communications research in the areas of smart grid and smart metering. In particular, we focus on some of the key communications challenges for realizing interoperable and future-proof smart grid/metering networks, smart grid security and privacy, and how some of the existing networking technologies can be applied to energy management. Finally, we also discuss the coordinated standardization efforts in Europe to harmonize communications standards and protocols.Comment: To be published in IEEE Communications Surveys and Tutorial

    Game theoretic modeling of AIMD network equilibrium

    No full text
    This paper deals with modeling of network’s dynamic using game theory approach. The process of interaction among players (network users), trying to maximize their payoffs (e.g. throughput) could be analyzed using game-based concepts (Nash equilibrium, Pareto efficiency, evolution stability etc.). In this work we presented the model of TCP network’s dynamic and proved existence and uniqueness of solution, formulated payoff matrix for a network game and found conditions of equilibrium existence depending of loss sensitivity parameter. We consider influence if denial of service attacks on the equilibrium characteristics and illustrate results by simulations.В данной работе исследуется моделирования динамики сети на основе теоретико-игрового подхода. Процесс взаимодействия между пользоватлями, которые пытаются максимизировать свои выигрыши (например, долю сети) допускает представление в форме игры и применение методов анализа равновесия. В работе предлагается модель TCP сети и доказано существование и единственность точки устойчивого распределения ресурсов, построена матрица сетевой игры и найдены условия существования равновесия в зависимости от чувствительности пользователей к наличию ошибок. Рассмотрены также влияние атак на характеристики равновесия и проведено имитационное моделирование.В даній роботі досліджується моделювання динаміки мережі на основі теоретико-ігрового підходу. Процес взаємодії між користувачами, що намагаються максимізувати свої виграші (наприклад, частку мережі) допускає представлення у формі гри та застосування методів аналізу рівноваги. В роботі пропонується модель TCP мережі та доведено існування і єдність точки стійкого розподілу ресурсів, побудована матриця мережевої гри та знайдені умови існування рівноваги в залежності від чутливості користувачів до наявності помилок. Розглянуто також вплив атак на характеристики рівноваги та проведене імітаційне моделювання

    COINSENSUS: The Need for Uniform National Virtual Currency Regulations

    Get PDF
    Google search volume for bitcoin and bitcoin-related keywords increased by as much as 1000 percent in 2017 from previous years. This increased interest comes hand-in-hand with increased regulatory and legislative scrutiny. Currently, there is disparate regulation for virtual currencies across national and state borders alike. States’ promulgation of various and incongruous virtual currency regulations have forced service providers to withdraw from different states within the country. However, transactions are not contained within state lines, and disparate state-by-state regulation is impracticable. The Uniform Law Commission recognized the need for uniform guidance for those entering the North American market and drafted the Uniform Regulation of Virtual Currency Businesses Act for each state to adopt in 2017. This Comment argues that every state should implement language identical or similar to the Uniform Law Commission’s proposed regulation. Implementing a uniform regulation applicable to clearly defined entities in this explosively growing field would provide harmony amongst the states and create an environment where both service providers and end-users have clear guidance on how to conform to the law. Further, regulatory clarity would provide consumers with much needed protection. This Comment begins by examining the history and development of bitcoin and blockchain assets. Next, this Comment dis- cusses the need for regulations in the United States. Then, this Comment provides an overview of the existing laws and regulations at both state and federal levels, and examines the simultaneous yet inconsistent legal characterizations imposed on virtual currencies. Virtual currencies can be: a piece of property, a se- curity, a commodity, and of course, a currency. This Comment further analyzes the language and criticisms of the Uniform Law Commission’s proposed Uniform Regulation of Virtual Currency Businesses Act. Finally, this Comment argues that the adoption of a uniform regulation is vital for the blockchain community’s continued existence in America
    corecore