36 research outputs found

    Resource virtualisation of network routers

    Get PDF
    There is now considerable interest in applications that transport time-sensitive data across the best-effort Internet. We present a novel network router architecture, which has the potential to improve the Quality of Service guarantees provided to such flows. This router architecture makes use of virtual machine techniques, to assign an individual virtual routelet to each network flow requiring QoS guarantees. We describe a prototype of this virtual routelet architecture, and evaluate its effectiveness. Experimental results of the performance and flow partitioning of this prototype, compared with a standard software router, suggest promise in the virtual routelet architecture

    A trustworthy mobile agent infrastructure for network management

    Get PDF
    Despite several advantages inherent in mobile-agent-based approaches to network management as compared to traditional SNMP-based approaches, industry is reluctant to adopt the mobile agent paradigm as a replacement for the existing manager-agent model; the management community requires an evolutionary, rather than a revolutionary, use of mobile agents. Furthermore, security for distributed management is a major concern; agent-based management systems inherit the security risks of mobile agents. We have developed a Java-based mobile agent infrastructure for network management that enables the safe integration of mobile agents with the SNMP protocol. The security of the system has been evaluated under agent to agent-platform and agent to agent attacks and has proved trustworthy in the performance of network management tasks

    Real-time detection of grid bulk transfer traffic

    Get PDF
    The current practice of physical science research has yielded a continuously growing demand for interconnection network bandwidth to support the sharing of large datasets. Academic research networks and internet service providers have provisioned their networks to handle this type of load, which generates prolonged, high-volume traffic between nodes on the network. Maintenance of QoS for all network users demands that the onset of these (Grid bulk) transfers be detected to enable them to be reengineered through resources specifically provisioned to handle this type of traffic. This paper describes a real-time detector that operates at full-line-rate on Gb/s links, operates at high connection rates, and can track the use of ephemeral or non-standard ports

    Analysis of RSVP-TE graceful restart

    Get PDF
    GMPLS is viewed as an attractive intelligent control plane for different network technologies and graceful restart is a key technique in ensuring this control plane is resilient and able to recover adequately from faults. This paper analyses the graceful restart mechanism proposed for a key GMPLS protocol, RSVP-TE. A novel analytical model, which may be readily adapted to study other protocols, is developed. This model allows the efficacy of graceful restart to be evaluated in a number of scenarios. It is found that, unsurprisingly, increasing control message loss and increasing the number of data plane connections both increased the time to complete recovery. It was also discovered that a threshold exists beyond which a relatively small change in the control message loss probability causes a disproportionately large increase in the time to complete recovery. The interesting findings in this work suggest that the performance of graceful restart is worthy of further investigation, with emphasis being placed on exploring procedures to optimise the performance of graceful restart

    RSVP performance optimisation using multi-objective evolutionary optimisation

    Get PDF
    The proposed uses of the resource reservation protocol (RSVP) now extend beyond reserving resources in Internet Protocol (IP) networks to being a generic signaling protocol for generalised multi-protocol label switching (GMPLS). In any implementation of RSVP, there are a number of discretionary timing parameters, the values of which affect the efficacy of RSVP in establishing and maintaining reservations/connections. This work frames the interactions between key RSVP timing parameters and performance metrics as a multi-objective optimisation problem which, due to its intractable nature, is tackled using a reputable multi-objective evolutionary algorithm. It is shown that this approach is a feasible means of exploring many of the innate tradeoffs in soft-state protocols such as RSVP. This approach facilitates an extensive comparison of a number of variants of RSVP: standard RSVP, RSVP featuring the recently standardised retransmission algorithm and two subsequent variants of this algorithm, supporting the asymmetric delivery of RSVP control messages. These RSVP variants are compared in terms of multiple performance metrics under a number of different exemplar network conditions, giving insight into their relative merits. Furthermore, the relative significance of the different timing parameters is investigated and their most expedient values determined

    Service quality measurements for IPv6 inter-networks

    Get PDF
    Measurement-based performance evaluation of network traffic is becoming very important, especially for networks trying to provide differentiated levels of service quality to the different application flows. The non-identical response of flows to the different types of network-imposed performance degradation raises the need for ubiquitous measurement mechanisms, able to measure numerous performance properties, and being equally applicable to different applications and transports. This paper presents a new measurement mechanism, facilitated by the steady introduction of IPv6 in network nodes and hosts, which exploits native features of the protocol to provide support for performance measurements at the network (IP) layer. IPv6 Extension Headers have been used to carry the triggers involving the measurement activity and the measurement data in-line with the payload data itself, providing a high level of probability that the behaviour of the real user traffic flows is observed. End-to-end one-way delay, jitter, loss, and throughput have been measured for applications operating on top of both reliable and unreliable transports, over different-capacity IPv6 network configurations. We conclude that this technique could form the basis for future Internet measurements that can be dynamically deployed where and when required in a multi-service IP environment

    An architecture supporting multi-media integration

    No full text
    An architecture supporting the construction of integrated, multi-media applications is presented. The main characteristics of such applications are described first. A model which permits the I/O devices associated with a multi-media station to be incorporated into an object model for distributed systems is then presented. The architectural features required to permit temporal synchronization of the data from the different devices are then discussed. The utility of the architecture is established through its application to several examples. Future areas of investigation are outlined

    The distributed application architecture

    No full text
    The Distributed Application Architecture (DAA) is designed to allow users of a computer network to access information, applications, and services, as well as to exchange information with others, through a single, consistent user environment. It enables the construction of new applications and services; it also provides facilities for the integration and migration of existing applications

    Portability Issues in the Design of Distributed Applications: A Portable, Electronic-Mail System

    No full text
    The effects of virtual machine concepts on the design and implementation of distributed applications are explored. After outlining the critical features of such an approach, a test case of an electronic mail system is described. The results of the experiment are summarized and future directions of this work are outlined
    corecore