scispace - formally typeset
Search or ask a question

Showing papers on "Internetworking published in 2005"


Patent
16 May 2005
TL;DR: In this paper, the authors present a method and system for detecting unauthorized signatures to or from a local network, where multiple sensors operate in parallel and each receives a portion of traffic through the internetworking device, at a session-based level or at a lower (packet-based) level.
Abstract: Various embodiments of a method and system for detecting unauthorized signatures to or from a local network. Multiple sensors are connected at an internetworking device, which can be a router or a switch. The sensors operate in parallel and each receives a portion of traffic through the internetworking device, at a session-based level or at a lower (packet-based) level. Depending on the type of internetworking device (router or switch) the load balancing mechanism that distributes the packets can be internal or external to the internetworking device. Also depending on the level of packet distribution (session-based or packet-based), the sensors share a network analyzer (if session-based) or both a network analyzer and a session analyzer (if packet-based).

268 citations


Journal ArticleDOI
TL;DR: A non-classic algebraic theory is developed for investigating the convergence properties of dynamic routing protocols and shows that routing protocols can be made to converge to shortest and widest paths, but that the composite metric of Internet Gateway Routing Protocol (IGRP) does not lead to optimal paths.
Abstract: We develop a non-classic algebraic theory for the purpose of investigating the convergence properties of dynamic routing protocols. The algebraic theory can be regarded as a generalization of shortest-path routing, where the new concept of free cycle generalizes that of a positive-length cycle. A primary result then states that routing protocols always converge, though not necessarily onto optimal paths, in networks where all cycles are free. Monotonicity and isotonicity are two algebraic properties that strengthen convergence results. Monotonicity implies protocol convergence in every network, and isotonicity assures convergence onto optimal paths. A great many applications arise as particular instances of the algebraic theory. In intra-domain routing, we show that routing protocols can be made to converge to shortest and widest paths, for example, but that the composite metric of Internet Gateway Routing Protocol (IGRP) does not lead to optimal paths. The more interesting applications, however, relate to inter-domain routing and its Border Gateway Protocol (BGP), where the algebraic framework provides a mathematical template for the specification, design, and verification of routing policies. We formulate existing guidelines for inter-domain routing in algebraic terms, propose new guidelines contemplating backup relationships between domains, and derive a sufficient condition for signaling correctness of internal-BGP.

183 citations


Proceedings ArticleDOI
06 Nov 2005
TL;DR: This paper presents a generic model that captures various filtering policy semantics using Boolean expressions and uses this model to derive a canonical representation for IPSec policies using ordered binary decision diagrams, and develops a comprehensive framework to classify and identify conflicts that could exist in a single IPSec device or between different IPSec devices in enterprise networks.
Abstract: IPSec has become the defacto standard protocol for secure Internet communications, providing traffic integrity, confidentiality and authentication. Although IPSec supports a rich set of protection modes and operations, its policy configuration remains a complex and error-prone task. The complex semantics of IP Sec policies that allow for triggering multiple rule actions with different security modes/operations coordinated between different IPSec gateways in the network increases significantly the potential of policy misconfiguration and thereby insecure transmission. Successful deployment of IPSec requires thorough and automated analysis of the policy configuration consistency for IPSec devices across the entire network. In this paper, we present a generic model that captures various filtering policy semantics using Boolean expressions. We use this model to derive a canonical representation for IPSec policies using ordered binary decision diagrams. Based on this representation, we develop a comprehensive framework to classify and identify conflicts that could exist in a single IPSec device (intra-policy conflicts) or between different IPSec devices (inter-policy conflicts) in enterprise networks. Our testing and evaluation study on different network environments demonstrates the effectiveness and efficiency of our approach.

154 citations


Proceedings ArticleDOI
04 Apr 2005
TL;DR: The authors presented a modeling and simulation framework for WSNs in J-Sim - an open-source, component-based compositional network simulation environment that is developed entirely in Java that provides an object-oriented definition of target, sensor and sink nodes and physical media.
Abstract: Wireless sensor networks (WSNs) have gained considerable attention in the past few years. As such, there has been an increasing need for defining and developing simulation frameworks for carrying out high-fidelity WSN simulation. In this paper, the authors presented a modeling and simulation framework for WSNs in J-Sim - an open-source, component-based compositional network simulation environment that is developed entirely in Java. This framework is built upon the autonomous component architecture (ACA) and the extensible internetworking framework (INET) of J-Sim, and provides an object-oriented definition of (i) target, sensor and sink nodes, (ii) sensor and wireless communication channels, and (iii) physical media such as seismic channels, mobility model and power model (both energy-producing and energy-consuming components). Application-specific models can be defined by sub-classing classes in the simulation framework and customizing their behaviors. The use of the proposed WSN simulation framework was demonstrated by implementing several well-known localization, geographic routing, and directed diffusion protocols. In addition, performance comparisons were performed (in terms of execution time incurred, and the memory used) in simulating several typical WSN scenarios in J-Sim and ns-2. The simulation study indicates that the proposed WSN simulation framework in J-Sim is much more scalable than ns-2 (especially in memory usage).

149 citations


Proceedings ArticleDOI
13 Mar 2005
TL;DR: It is shown that, with sufficient path diversity, path switching can yield meaningful improvements in voice quality, and by exploiting the inherent path diversity of the Internet, application-driven path switching is a viable option in providing quality-of-service to applications.
Abstract: The current best-effort Internet cannot readily provide the service guarantees that VoIP applications often require. Path switching can potentially address this problem without requiring new network mechanisms, simply by leveraging the robustness to performance variations available from connectivity options such as multi-homing and overlays. In this paper, we evaluate the effectiveness and benefits of path switching in improving the quality of VoIP applications, and demonstrate its feasibility through the design and implementation of a prototype gateway. We argue for an application-driven path switching system that accounts for both network path characteristics and application-specific factors (e.g., codec algorithms, playout buffering schemes). We also develop an application path quality estimator based on the ITU-T E-model for voice quality assessment, and an application-driven path switching algorithm that dynamically adapts the time scales over which path switching decisions are made to maximize voice quality. Through network emulation and experiments over a wide-area multi-homed test bed, we show that, with sufficient path diversity, path switching can yield meaningful improvements in voice quality. Hence by exploiting the inherent path diversity of the Internet, application-driven path switching is a viable option in providing quality-of-service to applications.

117 citations


Journal ArticleDOI
TL;DR: It is shown that LAF can save a significant amount of energy compared to prior methods, and achieves energy savings by reducing the redundant transmissions of the same packet by a node.
Abstract: We present a new information dissemination protocol for wireless sensor networks. This protocol uses location information to reduce redundant transmissions, thereby saving energy. The sensor network is divided into virtual grids and each sensor node associates itself with a virtual grid based on its location. Sensor nodes within a virtual grid are classified as either gateway nodes or internal nodes. While gateway nodes are responsible for forwarding the data across virtual grids, internal nodes forward the data within a virtual grid. The proposed approach, termed location-aided flooding (LAF), achieves energy savings by reducing the redundant transmissions of the same packet by a node. We study the performance of LAF for different grid sizes and different node densities and compare it to other well-known methods. We show that LAF can save a significant amount of energy compared to prior methods.

106 citations


Proceedings ArticleDOI
16 May 2005
TL;DR: A novel framework is presented to evaluate the impact of VHO algorithm design on system resource utilization and user perceived quality-of-service (QoS) requirements and clarifies the tradeoff between achieving high resource utilized and satisfying user QoS expectations.
Abstract: The next generation (4G) wireless network is envisioned as a convergence of different wireless access technologies providing the user with the best anywhere anytime connection and improving the system resource utilization. The integration of wireless local area network (WLAN) hotspots and the third generation (3G) cellular network has recently received much attention. While the 3G-network can provide global coverage with a low data-rate service, the WLAN can provide a high data-rate service within the hotspots. Although increasing the underlay network utilization is expected to increase the user available bandwidth, it may violate the quality-of-service (QoS) requirements of active real-time applications. Hence, achieving seamless handoff between different wireless technologies, known as vertical handoff (VHO), is a major challenge for 4G-system implementation. Several factors, such as application QoS requirements and handoff delay, should be considered to realize an application transparent handoff. We present a novel framework to evaluate the impact of VHO algorithm design on system resource utilization and user perceived QoS. We used this framework to compare the performance of two different VHO algorithms. The results show a very good match between simulation and analytical results. In addition, it clarifies the tradeoff between achieving high resource utilization and satisfying user QoS expectations.

75 citations


Journal ArticleDOI
TL;DR: The pedagogical and technical considerations that influence the design and implementation of the remote laboratory environment given the constraints of the special hardware and learning outcomes of the program are discussed.
Abstract: A Web-based remote interactive laboratory (RIL) developed to deliver Internetworking laboratory experience to geographically remote graduate students is presented in this paper. The onsite Internetworking program employs hands-on laboratories in a group setting that correlates with the constructivist and collaborative pedagogical approach. This paper discusses the pedagogical and technical considerations that influence the design and implementation of the remote laboratory environment given the constraints of the special hardware and learning outcomes of the program. For wide-ranging usability, the remote Internetworking (INWK) laboratory uses de facto networking standards and commercial and broad-band Internet connectivity to ensure real-time secure interaction with equipment. A four-tier role architecture consisting of faculty, local facilitators, remote facilitators, and students has been determined appropriate to maintain academic integrity and ensure good quality of interaction with the remote laboratory. A survey employing a five-point scale has been devised to measure the usability of the remote access INWK laboratory.

71 citations


Book
01 Jan 2005
TL;DR: This work focuses on the development of satellite ATM networks in the context of Next Generation Internet (NGI) over Satellite, with a focus on the architecture of the GEO satellite ATM network.
Abstract: List of Tables. List of Figures. Preface. Acknowledgements. 1. Introduction. 1.1 Applications and services of satellite networks. 1.2 ITU-R definitions of satellite services. 1.3 ITU-T definitions of network services. 1.4 Internet services and applications. 1.5 Circuit-switching network. 1.6 Packet-switching networks. 1.7 OSI/ISO reference model. 1.8 The ATM protocol reference model. 1.9 Internet protocols reference model. 1.10 Satellite network. 1.11 Characteristics of satellite networks. 1.12 Channel capacity of digital transmissions. 1.13 Internetworking with terrestrial networks. 1.14 Digital video broadcasting (DVB). 1.15 Historical development of computer and data networks. 1.16 Historical development of satellite communications. 1.17 Convergence of network technologies and protocols. 2. Satellite Orbits and Networking Concepts. 2.1 Laws of physics. 2.2 Satellite orbit parameters. 2.3 Useful orbits. 2.4 Satellite link characteristics and modulations for transmissions. 2.5 Forward error correction (FEC). 2.6 Multiple access techniques. 2.7 Bandwidth allocation. 2.8 Satellite networking issues. 3. ATM and Internet Protocols. 3.1 ATM protocol and fundamental concepts. 3.2 ATM layer. 3.3 ATM adaptation layer (AAL). 3.4 The physical layer. 3.5 ATM interfaces and ATM networking. 3.6 Network traffic, QoS and performance issues. 3.7 Network resource management. 3.8 Internet protocols. 3.9 Transport layer protocols: TCP and UDP. 3.10 IP and ATM internetworking. 4. Satellite Internetworking with Terrestrial Networks. 4.1 Networking concepts. 4.2 Networking terminology. 4.3 Network elements and connections. 4.4 Network traffic and signaling. 4.5 Access and transit transmission networks. 4.6 Digital telephony networks. 4.7 Synchronous digital hierarchy (SDH). 4.8 Integrated services digital networks (ISDN). 4.9 ISDN over satellite. 4.10 Interworking with heterogeneous networks. 5. ATM over Satellite Networks. 5.1 Background. 5.2 Design issues of satellite ATM systems. 5.3 The GEO satellite ATM networking architecture. 5.4 Advanced satellite ATM networks. 5.5 ATM performance. 5.6 Evolution of ATM satellite systems. 6. Internet Protocol (IP) over Satellite Networks. 6.1 Different viewpoints of satellite networking. 6.2 IP packet encapsulation. 6.3 Satellite IP networking. 6.4 IP multicast over satellite. 6.5 Basic network security mechanisms. 6.6 Satellite networking security. 6.7 DVB over satellite. 6.8 Internet quality of service (IP QoS). 6.9 Integrated services (Intserv) architectures for QoS. 6.10 Differentiated services (Diffserv) for QoS. 7. Impact of Satellite Networks on Transport Layer Protocols. 7.1 Introduction. 7.2 TCP performance analysis. 7.3 Slow-start enhancement for satellite networks. 7.4 Loss recovery enhancement. 7.5 Enhancements for satellite networks using interruptive mechanisms. 7.6 Impacts on applications. 7.7 Real-time transport protocol (RTP). 7.8 Voice over IP. 8. Next Generation Internet (NGI) over Satellite. 8.1 Introduction. 8.2 New services and applications. 8.3 Traffic modelling and characterization. 8.4 The nature of internet traffic. 8.5 Traffic engineering. 8.6 Multi-protocol label switching (MPLS). 8.7 Internet protocol version 6 (IPv6). Index.

61 citations


Journal ArticleDOI
TL;DR: An approach to the integration of WLAN and cellular networks based on loose coupling and the use of emerging mobility protocols and a method of eliminating any packet loss at the network layer during handoff is presented and evaluated.
Abstract: We review the problem of network mobility and internetworking between heterogeneous data networks and present an approach to the integration of WLAN and cellular networks based on loose coupling and the use of emerging mobility protocols. The handoff performance of such an approach is studied, at the network and transport levels, in a realistic scenario along with the impact on global performance of transport protocols. Finally, a method of eliminating any packet loss at the network layer during handoff is presented and evaluated.

59 citations


Patent
13 Jun 2005
TL;DR: The Peerouette-Net as mentioned in this paper is a modified P2P network in that it consists of two levels of connection between end-user devices, rather than one level of end-users devices.
Abstract: Provided are improved systems and methods for networking and internetworking personal servers and associated end-user devices in a modified peer-to-peer (P2P) format, or Peerouette-Net. A personal server, or peersona, may be part of a network of peersonas where each peersona represents a user of the Peerouette-Net. Associated with each peersona are the devices of the user, or edge-peers, that communicate with the peersona and through the peersona as part of the Peerouette-Net. The Peerouette-Net is a modified P2P network in that it consists of two levels of connection between end-user devices, rather than one level of end-user devices. The software that executes in the peersonas rather than the software that executes in the edge-peers may facilitate the P2P nature and functionality of the Peerouette-Net.

Proceedings ArticleDOI
18 Apr 2005
TL;DR: A framework for implementing a rule processing system in reconfigurable hardware that integrates the functionality to scan dataflows for regular expressions, fixed strings, and header values and allows modules to be added to perform extended functionality to support all features found in Snort rules.
Abstract: High-performance rule processing systems are needed by network administrators in order to protect Internet systems from attack. Researchers have been working to implement components of intrusion detection systems (IDS), such as the highly popular Snort system, in reconfigurable hardware. While considerable progress has been made in the areas of string matching and header processing, complete systems have not yet been demonstrated that effectively combine all of the functionality necessary to perform rule processing for network systems. In this paper, a framework for implementing a rule processing system in reconfigurable hardware is presented. The framework integrates the functionality to scan dataflows for regular expressions, fixed strings, and header values. It also allows modules to be added to perform extended functionality to support all features found in Snort rules. Reconfigurability and flexibility are key components of the framework that enable it to adapt to protect Internet systems from threats including malicious worms, computer viruses, and network intruders. To prove the framework viable, a system has been built that scans all bytes of transmission control protocol/Internet protocol (TCP/IP) traffic entering and leaving a network's gateway at multi-gigabit rates. Using Xilinx FPGA hardware on the field programmable port extender (FPX) platform, the framework can process 32,768 complex rules at data rates of 2.5 Gbps. Systems to handle data at 10 Gbps rates can be built today using the same framework in the latest reconfigurable hardware devices such as the Virtex 4.

Journal ArticleDOI
TL;DR: Details on the use of the framework include a robust architecture for mobility management for varying user mobility spans, provisioning for QoS mapping, intersystem message translation, and mechanisms in the WLAN to support user-subscribed services.
Abstract: In the future, wireless and mobile users will have increased demands for seamless roaming across different types of wireless networks, quality of service guarantees, and support for a variety of services. This awareness has led to research activities directed toward intersystem and global roaming, and can be noticed in numerous products like multimode handsets, interworking gateways, and ongoing standards and research work on intersystem roaming. The authors of this article proposed a global mobility management framework to support seamless roaming across heterogeneous wireless networks. In this article we provide details on the use of the framework to support roaming across cellular and wireless local area networks. Highlights of the framework include a robust architecture for mobility management for varying user mobility spans, provisioning for QoS mapping, intersystem message translation, and mechanisms in the WLAN to support user-subscribed services. Performance aspects related to handoff delays, data redirection, and processing overheads are presented and discussed. Performance comparison of intersystem roaming between cellular and WLAN with and without the framework is presented.

Proceedings ArticleDOI
11 Sep 2005
TL;DR: This paper presents abstraction and naming mechanisms that address challenges in the Ambient Networks project that enable end-to-end communication across otherwise independent internetworks and supports advanced networking capabilities through dynamic bindings between named entities.
Abstract: Providing end-to-end communication in heterogeneous internetworking environments is a challenge. Two fundamental problems are bridging between different internetworking technologies and hiding of network complexity and differences from both applications and application developers. This paper presents abstraction and naming mechanisms that address these challenges in the Ambient Networks project. Connectivity abstractions hide the differences of heterogeneous internetworking technologies and enable applications to operate across them. A common naming framework enables end-to-end communication across otherwise independent internetworks and supports advanced networking capabilities, such as indirection or delegation, through dynamic bindings between named entities

01 Sep 2005
TL;DR: In this paper, an architecture and a gateway-to-gateway protocol for the implementation of fiber channel fabric functionality over an IP network is described, which is provided through TCPprotocols for fibre channel frame transport and the distributed fabric services specified by the fibre channel standards.
Abstract: This document specifies an architecture and a gateway-to-gateway protocol for the implementation of fibre channel fabric functionality over an IP network. This functionality is provided through TCP protocols for fibre channel frame transport and the distributed fabric services specified by the fibre channel standards. The architecture enables internetworking of fibre channel devices through gateway- accessed regions with the fault isolation properties of autonomous systems and the scalability of the IP network. [STANDARDS-TRACK]

Journal ArticleDOI
TL;DR: Results show that in both implementations of the proposed QRG (QoS-aware residential gateway), QRG successfully performs DiffServ-QoS and CBQ bandwidth management functions so that good quality of service and video performance are maintained during network congestion.
Abstract: The residential gateway (RG) is the core device of the digital home network. The RG translates communication protocols, coordinates information sharing and serves as a gateway to external networks for integrated multimedia entertainment, on-line services, home security, home automation, information exchange and data storage. Modern home network applications especially for real-time are demanding guaranteed quality of service (QoS) for bounded network bandwidth resources. In order to initiate a DiffServ-QoS (differentiated services-QoS) bandwidth management mechanism during network congestion, this paper proposes a QRG (QoS-aware residential gateway) with both real-time traffic monitoring, DiffServ-QoS and CBQ bandwidth management. Firstly, QRG classifies traffic flow into separate types, with specialized treatment per traffic type to optimize compliance with user-specified priorities. Applications with higher priority get the right to deliver first. Additionally, QRG with built-in traffic control function adopts class based queuing (CBQ) as DiffServ-QoS bandwidth/traffic management for optimized use of bounded network resources. QRG is experimentally implemented on a Linux platform. High-end application is simulated by hosting QRG in a general-purpose PC, while minimum-cost modular application is simulated by hosting QRG in a light-weight low-power ARM920T embedded system. Results show that in both implementations, QRG successfully performs DiffServ-QoS and CBQ bandwidth management functions so that good quality of service and video performance are maintained during network congestion.

Proceedings ArticleDOI
31 Oct 2005
TL;DR: This work proposes an architecture to deliver emergency services in SIP-based VoIP networks, which can accommodate PSTN calls through PSTN to SIP gateways and addresses the issues of identifying emergency calls, determining callers' locations, routing emergency calls to appropriate public safety answering points (PSAPs), and presenting required information to emergency call takers.
Abstract: Providing emergency services in VoIP networks are vital to the success of VoIP. It not only presents design and implementation challenges, but also gives an opportunity to enhance the existing emergency call handling infrastructure. We propose an architecture to deliver emergency services in SIP-based VoIP networks, which can accommodate PSTN calls through PSTN to SIP gateways. Our architecture addresses the issues of identifying emergency calls, determining callers' locations, routing emergency calls to appropriate public safety answering points (PSAPs), and presenting required information to emergency call takers. We have developed a prototype implementation to prove our architecture's feasibility and scalability. We expect to undertake a pilot project at a working PSAP with our implementation once it is thoroughly tested.

Patent
22 Aug 2005
TL;DR: In this article, a network solution for integrated control of electronic devices between different sites is provided to enable complete control of home electronic devices, automotive devices, watercraft devices and aircraft electronic device with an affordable cost to the general public.
Abstract: A network solution for integrated control of electronic devices between different sites is provided to enable complete control of home electronic devices, automotive devices, watercraft devices and aircraft electronic device with an affordable cost to the general public. The network solution has a hardware solution and a software solution integrated with each other. The hardware has a main server located at a first site to link with and control various electronic devices located at the first site, and a computer located at a second site to link with and control various electronic devices at the second site. The software provides a user interface program for interfacing the main server and the computer with the electronic devices linked therewith, respectively, and an internetworking model interacting with the user interface program to communicate the main server and the computer. Therefore, the user is able to control the electronic devices at a distant site.

Proceedings ArticleDOI
05 Dec 2005
TL;DR: The evaluation showed that MMIP6 is a suitable solution providing a scalable mobility support with an acceptable performance characteristic, and Whereas existing approaches are focused on small-scale ad hoc networking scenarios, MMIP 6 is highly optimized for scalability and efficiency.
Abstract: Vehicular ad hoc networks are gaining importance for inter-vehicle communication, because they allow for the local communication between vehicles without any infrastructure, configuration effort, and without the high costs of cellular networks. Besides local data exchange, vehicular applications may be extended by accessing Internet services. The access is provided by Internet gateways installed along the roadside. However, the Internet integration requires a respective mobility support of the vehicular ad hoc network. In this paper we propose MMIP6, a communication protocol that integrates multihop IPv6-based vehicular ad hoc networks into the Internet. Whereas existing approaches are focused on small-scale ad hoc networking scenarios, MMIP6 is highly optimized for scalability and efficiency. The evaluation showed that MMIP6 is a suitable solution providing a scalable mobility support with an acceptable performance characteristic.

Proceedings ArticleDOI
05 Dec 2005
TL;DR: This paper presents an adaptive gateway discovery scheme that can change TTL value of agent advertisements according the scale of Internetworking ad hoc networks dynamically and shows that this approach achieves good connectivity while keeping overhead costs low when connecting various scale ad hoc network to the Internet.
Abstract: Mobile ad hoc networks are autonomous, infrastructureless networks that can establish low cost, limited range networks for the purpose of sharing data between devices. When an ad hoc network is connected to the Internet, it is important for the mobile nodes to detect available gateways providing access to the Internet. Therefore, a gateway discovery mechanism is required. In this paper, we present an adaptive gateway discovery scheme that can change TTL value of agent advertisements according the scale of Internetworking ad hoc networks dynamically. Simulation results with NS2 shows that our approach achieves good connectivity while keeping overhead costs low when connecting various scale ad hoc network to the Internet.

Proceedings ArticleDOI
01 Jan 2005
TL;DR: This paper presents a generalized naming convention for the enhanced DTN architecture that permits separate representations based on network topology, administrative control, physical location, and other factors, and illustrates possible system operations in this enhancedDTN architecture.
Abstract: Data communication challenges exist in some emerging network scenarios where an instantaneous end-to-end path between a source and destination may not exist, and the links between nodes may be opportunistic, predictably connectable, or periodically-(dis)connected. We propose an enhanced disruption tolerant network architecture to address such challenges. In this paper, we present a generalized naming convention for the enhanced DTN architecture that permits separate representations based on network topology, administrative control, physical location, and other factors. In addition, we illustrate possible system operations in this enhanced DTN architecture such as DTN neighbor discovery, gateway selection, mobility management, and route discovery

Book
19 Oct 2005
TL;DR: The illustrators worked overtime, as well, to link Internetwork Operating System (IOS) listings with network diagrams and thereby more effectively illustrate routing behaviors, and an excellent index and troubleshooting exercises similar to those on the CCIE practical exam round out this package.
Abstract: Nothing's more central to the Internet than the TCP/IP protocol stack, so internetworking engineers need to know--or have access to--as much information about it as possible. That's the function of Routing TCP/IP, Volume II, an encyclopedic reference that covers pretty much every aspect of TCP/IP internetworking in deep, practical detail. This is one of the books that working experts should always have at hand, and one of the best choices for people studying for the higher-level Cisco certification examinations, especially the Cisco Certified Internetwork Expert (CCIE) laboratory protocols. Jeff Doyle and Jennifer Carroll, both CCIEs, share their background knowledge and practical wisdom in nearly 1,000 information-dense, hardbound pages. This book works well on a lot of levels, but its careful integration of explanations (statements of applicability and references to standards documents), case studies (usually illustrated with network diagrams), configuration details (input/output listings from Cisco routers), and practical advice (a note on why network address translation isn't much of a barrier against attackers) is key to its success. The illustrators worked overtime, as well, to link Internetwork Operating System (IOS) listings with network diagrams and thereby more effectively illustrate routing behaviors. An excellent index and troubleshooting exercises similar to those on the CCIE practical exam round out this package. --David Wall Topics covered: How TCP/IP routing works, and how to configure the routing effects you want on Cisco routing equipment. Emphasis falls on Exterior Gateway Protocol (EGP), Border Gateway Protocol 4 (BGP-4), IP multicasting, IPv6, and network address translation (NAT).

Proceedings ArticleDOI
18 Apr 2005
TL;DR: The proposed solution does not require cooperation of the intermediate ASes and can be incrementally deployed in today's Internet, and it is shown that in a load-balancing scenario, a multi-homed AS only needs to request a few dozens of Virtual Peerings to balance its incoming traffic.
Abstract: For performance or cost reasons, autonomous systems (AS) often need to control the flow of their incoming interdomain traffic. Controlling its incoming traffic is a difficult task since it often implies influencing ASes on the path. The current BGP-based techniques that an AS can use for this purpose are primitive. Moreover, their effect is often difficult to predict. In this paper, we propose to solve this problem by using Virtual Peerings. A Virtual Peering is an IP tunnel between a border router of a source AS and a border router of a destination AS. This tunnel is established upon request from the destination AS. These tunnels can be negotiated by using backward compatible modifications to the border gateway protocol (BGP). By using Virtual Peerings, the source and destination ASes can achieve various traffic engineering objectives such as traffic-balancing or reducing the latency. A key advantage of our solution is that it does not require cooperation of the intermediate ASes and that it can be incrementally deployed in today's Internet. We then show by simulations that in a load-balancing scenario, a multi-homed AS only needs to request a few dozens of Virtual Peerings to balance its incoming traffic.

Proceedings ArticleDOI
S.L. Kota1
13 Mar 2005
TL;DR: The trends of broadband satellite communication networks to meet the emerging aeronautical and fast train applications, and mobile users, in providing ubiquitous global coverage are discussed.
Abstract: The next generation global communication network infrastructure is designed to be all IP based, supporting various heterogeneous core and access technologies for broadband and mobile user applications. In this paper, we discuss the trends of broadband satellite communication networks to meet the emerging aeronautical and fast train applications, and mobile users, in providing ubiquitous global coverage. Mobile satellite systems will be fully integrated with wireless networks and terrestrial segments. The technical challenges for future broadband satellite systems will be to insure seamless integration between satellite and wireless systems and without compromising quality of service (QoS). We discuss briefly the technical challenges and possible solutions, including a QoS reference model, traffic management, dynamic bandwidth allocation, cross-layer protocol design, satellite TCP, mobility management, satellite IP security, internetworking and standardization issues to realize heterogeneous networks.

Proceedings ArticleDOI
31 Oct 2005
TL;DR: Synergy is designed, a utility-based overlay internetworking architecture that fosters overlay cooperation and promotes fair peering relationships to achieve synergism, and results from Internet experiments with cooperative forwarding overlays indicate that the Synergy prototype improves delay, throughput, and loss performance, while maintaining the autonomy and heterogeneity of individual overlay networks.
Abstract: A multitude of overlay network designs for resilient routing, multicasting, quality of service, content distribution, storage, and object location have been recently proposed. Overlay networks offer several attractive features, including ease of deployment, flexibility, adaptivity, and an infrastructure for collaboration among hosts. In this paper, we explore cooperation among co-existing, possibly heterogeneous, overlay networks. We design Synergy, a utility-based overlay internetworking architecture that fosters overlay cooperation. Our architecture promotes fair peering relationships to achieve synergism. Results from Internet experiments with cooperative forwarding overlays indicate that our Synergy prototype improves delay, throughput, and loss performance, while maintaining the autonomy and heterogeneity of individual overlay networks.

Proceedings ArticleDOI
13 Mar 2005
TL;DR: It is shown that TCWA can reduce the traffic cost, relieve the burden of the core UMTS network, and enhance fault tolerance, and a fast handoff algorithm is adopted to reduce handoff latency.
Abstract: The paper proposes an interworking architecture, TCWA (tight coupling with wireless access), for integrating Universal Mobile Telecommunications System (UMTS) and wireless local area networks (WLAN). Based on a tight coupling interworking architecture, TCWA creates an additional wireless link between the base station of a UMTS cell and the gateway router of a WLAN located within this UMTS cell. In TCWA, signaling is routed according to the original tight coupling to preserve network security. However, the data traffic in the inter-network communications can be dynamically distributed as the added wireless link provides alternative routes. The issue of seamless vertical handoff in the TCWA architecture is also addressed in detail. To reduce handoff latency, a fast handoff algorithm is adopted. Based on detailed analysis and numerical results, we show that TCWA can reduce the traffic cost, relieve the burden of the core UMTS network, and enhance fault tolerance.

Dissertation
01 Jul 2005
TL;DR: This thesis analyses the evolution of British computer networks and the Internet between the years 1970 and 1995 and shows how the networks converged around TCP/IP.
Abstract: The Internet's success in the 21st century has encouraged analysts to investigate the origin of this network. Much of this literature adopts a teleological approach. Works often begin by discussing the invention of packet switching, describe the design and development of the ARPANET, and then examine how this network evolved into the Internet. Although the ARPANET was a seminal computer network, these accounts usually only briefly consider the many other diverse networks that existed. In addition, apart from momentary asides to alternative internetworking solutions, such as the Open Systems Interconnection (OSI) seven-layer reference model, this literature concentrates exclusively on the ARPANET, the Internet, and the World Wide Web. While focusing on these subjects is important and therefore justified, it can leave the reader with the impression that the world of networking started with the ARPANET and ended with the Internet. This thesis is an attempt to help correct this misconception. This thesis analyses the evolution of British computer networks and the Internet between the years 1970 and 1995. After an introduction in Chapter 1, the thesis analyses several networks. In Chapters 2 and 3, the focus is on academic networks, especially JANET and SuperJANET. Attention moves to videotex networks in Chapter 4, specifically Prestel, and in Chapter 5, the dissertation examines electronic mail networks such as Telecom Gold and Cable & Wireless Easylink. Chapter 6 considers online services, including CompuServe, American Online, and the Microsoft Network, and the thesis ends with a conclusion in Chapter 7. All of the networks discussed used protocols that were incompatible with each other which limited the utility of the networks for their users. Although it was possible that OSI or another solution could have solved this problem, the Internet's protocols achieved this objective. This thesis shows how the networks converged around TCP/IP.

Proceedings ArticleDOI
18 Apr 2005
TL;DR: This paper proposes a novel internetworking architecture between WLAN and UMTS cellular networks, hybrid coupling with radio access system (HCRAS), based on IPv6, mobile IP, and fast hand off techniques, and shows that HCRAS outperforms the tight-Coupling and loose-coupling in various scenarios in terms of system routing efficiency, signaling cost, and handoff cost.
Abstract: The seamless internetworking among various communication networks is in demand to provide anywhere, anytime connectivity with high data rate and enhanced service quality. In this paper, we propose a novel internetworking architecture between WLAN and UMTS cellular networks, hybrid coupling with radio access system (HCRAS), based on IPv6, mobile IP, and fast hand off techniques. Inheriting loose coupling internetworking techniques, HCRAS utilizes IEEE 802.16 standard air interface to set up direct wireless communication between base stations in UMTS cellular networks and local WLAN. In particular, we propose two new algorithms for intersystem communications and vertical handoff management in HCRAS system. The HCRAS can dynamically distribute traffic among the internetworking networks and reduce signaling cost and hand off latency significantly. Through mathematical analysis and numerical results, it is shown that HCRAS outperforms the tight-coupling and loose-coupling in various scenarios in terms of system routing efficiency, signaling cost, and handoff cost.

Proceedings ArticleDOI
18 Apr 2005
TL;DR: A new remote-configurable firewall system that provides secure and easy-to-use access to home-network appliances such as network cameras, PVRs, and home file senders, through the Internet, with a simple Web browser operation.
Abstract: We have developed a new remote-configurable firewall system that provides secure and easy-to-use access to home-network appliances such as network cameras, PVRs, and home file senders, through the Internet. Accessing the home-network from the external network is not still popular for low-end users. This is mainly because of the complex configuration of firewall/NAT policy and of the anxiety for security vulnerability which can be caused by statically opening the external ports. To solve these problems, our system provides easy-to-configure, easy-to-use remote accessing method. With a simple Web browser operation, remote users can dynamically open and close the firewall of the home gateway. The firewall rule creation is based on an authentication of the remote client, and thus only packets from the authorized client can pass through the firewall. The system also provides simple policy-template creating system that provides easy installation of the home-network appliances.

Journal Article
TL;DR: TurfNet provides autonomy for individual network domains, or Turfs, through a novel inter-domain communication mechanism that does not require global network addressing or a common network protocol, and maximizes the scope of autonomic management functions.
Abstract: The Intemet architecture is based on design principles such as end-to-end addressing and global routeability. It suits relatively static, well-managed and flat network hierarchies. Recent years have shown, however, that the Internet is evolving beyond what the current architecture can support. The Intemet architecture struggles to support increasingly conflicting requirements from groups with competing interests, such as network, content and application service providers, or end-users of fixed, mobile and ad hoc access networks. This paper describes a new internetworking architecture, called TurfNet. It provides autonomy for individual network domains, or Turfs, through a novel inter-domain communication mechanism that does not require global network addressing or a common network protocol. By minimizing inter-domain dependencies, TurfNet provides a high degree of independence, which in turn facilitates autonomic communications. Allowing network domains to fully operate in isolation maximizes the scope of autonomic management functions. To accomplish this, TurfNet integrates the emerging concept of dynamic network composition with other recent architectural concepts such as decoupling locators from identifiers and establishing end-to-end communication across heterogeneous domains.