scispace - formally typeset
Search or ask a question

Showing papers in "arXiv: Networking and Internet Architecture in 2003"


Posted Content
TL;DR: OCEAN is found that, in many scenarios, OCEAN can do as well as, or even better than, schemes requiring second-hand reputation exchanges, and could possibly help obviate solutions requiring trust-management for some contexts.
Abstract: Ad hoc networks rely on the cooperation of the nodes participating in the network to forward packets for each other. A node may decide not to cooperate to save its resources while still using the network to relay its traffic. If too many nodes exhibit this behavior, network performance degrades and cooperating nodes may find themselves unfairly loaded. Most previous efforts to counter this behavior have relied on further cooperation between nodes to exchange reputation information about other nodes. If a node observes another node not participating correctly, it reports this observation to other nodes who then take action to avoid being affected and potentially punish the bad node by refusing to forward its traffic. Unfortunately, such second-hand reputation information is subject to false accusations and requires maintaining trust relationships with other nodes. The objective of OCEAN is to avoid this trust-management machinery and see how far we can get simply by using direct first-hand observations of other nodes' behavior. We find that, in many scenarios, OCEAN can do as well as, or even better than, schemes requiring second-hand reputation exchanges. This encouraging result could possibly help obviate solutions requiring trust-management for some contexts.

414 citations


Posted Content
TL;DR: In this paper, the Interactive Growth (IG) model is introduced based on the joint growth of new nodes and new links, which matches the degree distribution of the AS graph and accurately matches the hierarchical structure.
Abstract: The Internet topology at the Autonomous Systems level (AS graph) has a power--law degree distribution and a tier structure. In this paper, we introduce the Interactive Growth (IG) model based on the joint growth of new nodes and new links. This simple and dynamic model compares favorable with other Internet power--law topology generators because it not only closely resembles the degree distribution of the AS graph, but also accurately matches the hierarchical structure, which is measured by the recently reported rich-club phenomenon.

27 citations


Posted Content
TL;DR: The Optimized Flooding Protocol (OFP) is proposed, based on a variation of The Covering Problem that is encountered in geometry, to minimize the unnecessary transmissions drastically and still be able to cover the whole region.
Abstract: Flooding provides important control and route establishment functionality for a number of unicast and multicast protocols in Mobile Ad Hoc Networks Considering its wide use as a building block for other network layer protocols, the flooding methodology should deliver a packet from one node to all other network nodes using as few messages as possible In this paper, we propose the Optimized Flooding Protocol (OFP), based on a variation of The Covering Problem that is encountered in geometry, to minimize the unnecessary transmissions drastically and still be able to cover the whole region OFP does not need hello messages and hence OFP saves a significant amount of wireless bandwidth and incurs lesser overhead We present simulation results to show the efficiency of OFP in both ideal cases and randomly distributed networks Moreover, OFP is scalable with respect to density; in fact OFP requires lesser number of transmissions at higher densities OFP is also resilient to transmission errors

24 citations


Posted Content
TL;DR: In this paper, the performance of TCP and UDP over IEEE802.11 ad hoc networks is investigated. But, the authors focus on the interaction between UDP and TCP traffic over the wireless link.
Abstract: TCP is the De facto standard for connection oriented transport layer protocol, while UDP is the De facto standard for transport layer protocol, which is used with real time traffic for audio and video. Although there have been many attempts to measure and analyze the performance of the TCP protocol in wireless networks, very few research was done on the UDP or the interaction between TCP and UDP traffic over the wireless link. In this paper, we tudy the performance of TCP and UDP over IEEE802.11 ad hoc network. We used two topologies, a string and a mesh topology. Our work indicates that IEEE802.11 as a ad-hoc network is not very suitable for bulk transfer using TCP. It also indicates that it is much better for real-time audio. Although one has to be careful here since real-time audio does require much less bandwidth than the wireless link bandwidth. Careful and detailed studies are needed to further clarify that issue.

16 citations


Posted Content
TL;DR: The article analyzes a proposed network topology for the ATLAS DAQ DataFlow, and identifies the Ethernet features required for a proper operation of the network: MAC address table size, switch performance in terms of throughput and latency, the use of Flow Control, Virtual LANs and Quality of Service.
Abstract: The article analyzes a proposed network topology for the ATLAS DAQ DataFlow, and identifies the Ethernet features required for a proper operation of the network: MAC address table size, switch performance in terms of throughput and latency, the use of Flow Control, Virtual LANs and Quality of Service We investigate these features on some Ethernet switches, and conclude on their usefulness for the ATLAS DataFlow network

11 citations


Journal Article
TL;DR: PAM2003 - The Passive and Active Measurement Workshop(http://www.pam2003.org), San Diego, USA, April 2003
Abstract: PAM2003 - The Passive and Active Measurement Workshop(http://www.pam2003.org), San Diego, USA, April 2003

11 citations


Posted Content
TL;DR: This work compares two expressions for backbone traffic that have different scopes of applicability and proposes a methodology for plotting a curve that shows dependence of utilization of a link on a number of active flows in it, determining the working area and the overloading point of the network.
Abstract: We propose flow-based analysis to estimate quality of an Internet connection. Using results from the queuing theory we compare two expressions for backbone traffic that have different scopes of applicability. A curve that shows dependence of utilization of a link on a number of active flows in it describes different states of the network. We propose a methodology for plotting such a curve using data received from a Cisco router by NetFlow protocol, determining the working area and the overloading point of the network. Our test is an easy way to find a moment for upgrading the backbone.

10 citations


Journal ArticleDOI
TL;DR: Active Internet Traffic Filtering (AITF) as mentioned in this paper is a new automatic filter propagation protocol that provides a guaranteed, significant level of protection against DoS attacks in exchange for a reasonable, bounded amount of router resources.
Abstract: Denial of Service (DoS) attacks are one of the most challenging threats to Internet security. An attacker typically compromises a large number of vulnerable hosts and uses them to flood the victim's site with malicious traffic, clogging its tail circuit and interfering with normal traffic. At present, the network operator of a site under attack has no other resolution but to respond manually by inserting filters in the appropriate edge routers to drop attack traffic. However, as DoS attacks become increasingly sophisticated, manual filter propagation becomes unacceptably slow or even infeasible. In this paper, we present Active Internet Traffic Filtering, a new automatic filter propagation protocol. We argue that this system provides a guaranteed, significant level of protection against DoS attacks in exchange for a reasonable, bounded amount of router resources. We also argue that the proposed system cannot be abused by a malicious node to interfere with normal Internet operation. Finally, we argue that it retains its efficiency in the face of continued Internet growth.

6 citations


Journal Article
TL;DR: Topological structures of Traceroute AS graph and BGP AS graph are analyzed and compared with two synthetic Internet topologies generated by the IG model and the well-known Barabasi-Albert (BA) model, which shows that both AS graphs show the rich-club phenomenon and have similar tier structures, which are closely matched by theIG model.
Abstract: Recently we introduced the rich-club phenomenon as a quantitative metric to characterize the tier structure of the Autonomous Systems level Internet topology (AS graph) and we proposed the Interactive Growth (IG) model, which closely matches the degree distribution and hierarchical structure of the AS graph and compares favourble with other available Internet power-law topology generators. Our research was based on the widely used BGP AS graph obtained from the Oregon BGP routing tables. Researchers argue that Traceroute AS graph, extracted from the traceroute data collected by the CAIDA's active probing tool, Skitter, is more complete and reliable. To be prudent, in this paper we analyze and compare topological structures of Traceroute AS graph and BGP AS graph. Also we compare with two synthetic Internet topologies generated by the IG model and the well-known Barabasi-Albert (BA) model. Result shows that both AS graphs show the rich-club phenomenon and have similar tier structures, which are closely matched by the IG model, however the BA model does not show the rich-club phenomenon at all.

6 citations


Posted Content
TL;DR: This memo describes a simple implementation of an Open Network Handle System using the security extensions to the Domain Name System (DNSSEC).
Abstract: An Open Network Handle System (ONHS) provides an intermediate level of service between IP numbers and domain names. A handle adheres permanently to an owner, who may assign and reassign it to different addresses at will. But a handle is a number, carrying no significance in natural language. Any user desiring a handle may generate one from a public key. This memo describes a simple implementation of an Open Network Handle System using the security extensions to the Domain Name System (DNSSEC).

5 citations


Posted Content
TL;DR: This work introduces a framework consisting of complex subsystems, and a new element, called -theodolite- element, since its function is similar to that of a transponder, and analyzes the architectural implications on the network structure.
Abstract: Several tools exist that collect host-to-host connectivity measurements. To improve the usability of such measurements, they should be mapped into a framework consisting of complex subsystems, and the infrastructure that connects them. We introduce one such framework, and analyze the architectural implications on the network structure. In our framework, a complex subsystem consists of several computing facilities and the infrastructure that connects them: we call it a -monitoring domain-. The task of measuring the connectivity between -monitoring domains- is considered distinct from the activity of -storage- and -computing- elements. Therefore we introduce a new element in our topology: we call it -theodolite- element, since its function is similar to that of a transponder. Using these basic concepts, we analyze the architectural implications on the network structure: in a nutshell, if we want that -theodolites- serve as a reference, than the contribution to the relevant network metrics due to the -monitoring domain- infrastructure must be negligible with respect to contributions of the inter-domain infrastructure. In addition all -theodolites- of a -monitoring domain- must give an image of the inter-domain infrastructure that is consistent with that experienced by network applications. We conclude giving a running SQL example of how information about -monitoring domains- and -theodolites- could be organized, and we outline the application of such framework in the GLUE schema activity for the network element

Posted Content
TL;DR: The time has come to provide a distinct open network handle system (ONHS), using handles that are not meaningful in natural language and are therefore not subject to the disputes surrounding the use of names.
Abstract: Networked communications inherently depend on the ability of the sender of a message to indicate through some token how the message should be delivered to a particular recipient. The tokens that refer messages to recipients are variously known as routes, addresses,handles, and names} ordered by their relative nearness to network topology vs. human meaning. All four sorts of token refer in some way to a recipient, but they are controlled by different authorities and their meanings depend on different contextual parameters. Today's global Internet employs dynamically determined routes, IP addresses, and domain names. Domain names combine the functions of handles and names. The high value of domain names as names leads to substantial social and legal dispute about their assignment, degrading their value as handles. The time has come to provide a distinct open network handle system (ONHS), using handles that are not meaningful in natural language and are therefore not subject to the disputes surrounding the use of names. A handle service may be deployed easily as a handle domain within the current Domain Name System. In order to minimize the administrative load, and maximize their own autonomy, netizens may use public-key cryptography to assign their own handles.

Posted Content
TL;DR: In this paper, the authors propose a data sharing graph for characterizing sharing patterns in large-scale data distribution systems and uncover small-world patterns for data-sharing relationships, which can be exploited for mechanism design.
Abstract: We propose a novel structure, the data-sharing graph, for characterizing sharing patterns in large-scale data distribution systems We analyze this structure in two such systems and uncover small-world patterns for data-sharing relationships Using the data-sharing graph for system characterization has potential both for basic science, because we can identify new structures emerging in real, dynamic networks; and for system design, because we can exploit these structures when designing data location and delivery mechanisms We conjecture that similar patterns arise in other large-scale systems and that these patterns can be exploited for mechanism design

ReportDOI
TL;DR: The requirement that data-taking would be independent of the gateway was adopted, so that, in the event of a gateway failure, data- taking would be uninterrupted and the security of the IOCs themselves was improved by removing them from the public BaBar network.
Abstract: It starts out innocently enough--users want to monitor Online data and so run their own copies of the detector control GUIs in their offices and at home. But over time, the number of processes making requests for values to display on GUIs, webpages and stripcharts can grow, and affect the performance of an Input/Output Controller (IOC) such that it is unable to respond to requests from requests critical to data-taking. At worst, an IOC can hang, its CPU having been allocated 100% to responding to network requests. For the BaBar Online Detector Control System, we were able to eliminate this problem and make great gains in security by moving all of the IOCs to a non-routed, virtual LAN and by enlisting a workstation with two network interface cards to act as the interface between the virtual LAN and the public BaBar network. On the interface machine, we run the Experimental Physics Industrial Control System (EPICS) Channel Access (CA) gateway software (originating from Advanced Photon Source). This software accepts as inputs, all the channels which are loaded into the EPICS databases on all the IOCs. It polls them to update its copy of the values. It answers requests from applications bymore » sending them the currently cached value. We adopted the requirement that data-taking would be independent of the gateway, so that, in the event of a gateway failure, data-taking would be uninterrupted. In this way, we avoided introducing any new risk elements to data-taking. Security rules already in use by the IOC were propagated to the gateway's own security rules and the security of the IOCs themselves was improved by removing them from the public BaBar network.« less

Posted Content
TL;DR: The aim of this paper is an experimental study of cache systems in order to optimize proxy cache systems and to modernize construction principles and the results obtained and the plan of the experiment follow from the theoretical model.
Abstract: The aim of this paper is an experimental study of cache systems in order to optimize proxy cache systems and to modernize construction principles. Our investigations lead to the criteria for the optimal use of storage capacity and allow the description of the basic effects of the ratio between construction parts, steady-state performance, optimal size, etc. We want to outline that the results obtained and the plan of the experiment follow from the theoretical model. Special consideration is given to the modification of the key formulas supposed by Wolman at al.

Posted Content
TL;DR: This paper investigates the performance of the TCP (and UDP) over IEEE802.11 wireless MAC protocol assuming three different traffic patterns and investigates the effect of using forward Error Correction (FEC) technique and the MAC sublayer parameters on the throughput and response time.
Abstract: Cellular phones, wireless laptops, personal portable devices that supports both voice and data access are all examples of communicating devices that uses wireless communication Sine TCP/IP (and UDP) is the dominant technology in use in the internet, it is expected that they will be used (and they are currently) over wireless connections In this paper, we investigate the performance of the TCP (and UDP) over IEEE80211 wireless MAC protocol We investigate the performance of the TCP and UDP assuming three different traffic patterns First bulk transmission where the main concern is the throughput Second real-time audio (using UDP) in the existence of bulk TCP transmission where the main concern is the packet loss for audio traffic Finally web traffic where the main concern is the response time We also investigate the effect of using forward Error Correction (FEC) technique and the MAC sublayer parameters on the throughput and response time

Posted Content
TL;DR: A theoretical study of a cache system in order to optimize proxy cache systems and to modernize construction principles including prefetching schemes based on Zipf-like distribution and normalizing conditions.
Abstract: The aim of this paper is a theoretical study of a cache system in order to optimize proxy cache systems and to modernize construction principles including prefetching schemes. Two types of correlations, Zipf-like distribution and normalizing conditions, play a role of the fundamental laws. A corresponding system of equations allows to describe the basic effects like ratio between construction parts, steady-state performance, optimal size, long-term prefetching, etc. A modification of the fundamental laws leads to the description of new effects of documents' renewal in the global network. An internet traffic caching system based on Zipf-like distribution (ZBS) is invented. The additional module to the cache construction gives an effective prefetching by lifetime.

Posted Content
TL;DR: The time variation of the weekly rate of accesses to the conference files appears that the characteristic time-scales related to access of web-casting files is of the order of a few weeks, which is at least an order of magnitude shorter than that of peer reviewed publications and conference proceedings.
Abstract: There is likeness of the Internet to human brains which has led to the metaphor of the world-wide computer network as a `Global Brain'. We consider conferences as 'binding events' in the Global Brain that can lead to metacognitive structures on a global scale. One of the critical factors for that phenomenon to happen (similar to the biological brain) are the time-scales characteristic for the information exchange. In an electronic newsletter- the Complexity Digest (ComDig) we include webcasting of audio (mp3) and video (asf) files from international conferences in the weekly ComDig issues. Here we present the time variation of the weekly rate of accesses to the conference files. From those empirical data it appears that the characteristic time-scales related to access of web-casting files is of the order of a few weeks. This is at least an order of magnitude shorter than the characteristic time-scales of peer reviewed publications and conference proceedings. We predict that this observation will have profound implications on the nature of future conference proceedings, presumably in electronic form.

Posted Content
TL;DR: In this paper, the authors present a heuristic decision tree that designers can use to judge the likely suitability of a P2P architecture for their applications, based on the characteristics of a wide range of P2PC systems from the literature.
Abstract: In the hope of stimulating discussion, we present a heuristic decision tree that designers can use to judge the likely suitability of a P2P architecture for their applications. It is based on the characteristics of a wide range of P2P systems from the literature, both proposed and deployed.


Posted Content
TL;DR: In this article, the authors presented a new depth rearrangeable network called KR-Benes, which is permutation-specific control-optimal for arbitrary permutations. But it is not optimal for all permutations and its worst-case complexity is bounded by the Benes.
Abstract: The Benes network has been used as a rearrangeable network for over 40 years, yet the uniform $N(2 \log N-1)$ control complexity of the $N \times N$ Benes is not optimal for many permutations. In this paper, we present a novel $O(\log N)$ depth rearrangeable network called KR-Benes that is {\it permutation-specific control-optimal}. The KR-Benes routes {\it every} permutation with the minimal control complexity {\it specific} to that permutation and its worst-case complexity for arbitrary permutations is bounded by the Benes; thus it replaces the Benes when considering control complexity/latency. We design the KR-Benes by first constructing a restricted $2 \log K +2$ depth rearrangeable network called $K$-Benes for routing $K$-bounded permutations with control $2N \log K$, $0 \leq K \leq N/4$. We then show that the $N \times N$ Benes network itself (with one additional stage) contains every $K$-Benes network as a subgraph and use this property to construct the KR-Benes network. With regard to the control-optimality of the KR-Benes, we show that any optimal network for rearrangeably routing $K$-bounded permutations must have depth $2 \log K + 2$, and therefore the $K$-Benes (and hence the KR-Benes) is optimal.

Posted Content
B. Gokden1
TL;DR: In this paper, the authors briefly define distance vector routing algorithms, their advantages and possible drawbacks, and compare them with the currently widely used methods split horizon and poisoned reverse routing algorithms.
Abstract: In this paper we briefly define distance vector routing algorithms, their advantages and possible drawbacks. On these possible drawbacks, currently widely used methods split horizon and poisoned reverse are defined and compared. The count to infinity problem is specified and it is classified to be a halting problem and a proposition stating that entangled states used in quantum computation can be used to handle this problem is examined. Several solutions to this problem by using entangled states are proposed and a very brief introduction to entangled states is presented.