854 results on '"Internet backbone"'
Search Results
2. GAMPAL: an anomaly detection mechanism for Internet backbone traffic by flow size prediction with LSTM-RNN.
- Author
-
Wakui, Taku, Kondo, Takao, and Teraoka, Fumio
- Abstract
This paper proposes a general-purpose anomaly detection mechanism for Internet backbone traffic named GAMPAL (General-purpose Anomaly detection Mechanism using Prefix Aggregate without Labeled data). GAMPAL does not require labeled data to achieve general-purpose anomaly detection. For scalability to the number of entries in the BGP RIB (Border Gateway Protocol Routing Information Base), GAMPAL introduces prefix aggregate. The BGP RIB entries are classified into prefix aggregates, each of which is identified with the first three AS (Autonomous System) numbers in the AS_PATH attribute. GAMPAL establishes a prediction model for traffic sizes based on past traffic sizes. It adopts a LSTM-RNN (Long Short-Term Memory Recurrent Neural Network) model that focuses on the periodicity of the Internet traffic patterns at a weekly scale. The validity of GAMPAL is evaluated using real traffic information, BGP RIBs exported from the WIDE backbone network (AS2500), a nationwide backbone network for research and educational organizations in Japan, and the dataset of an ISP (Internet Service Provider) in Spain. As a result, GAMPAL successfully detects anomalies such as increased traffic due to an event, DDoS (Distributed Denial of Service) attacks targeted at a stub organization, a connection failure, an SSH (Secure Shell) scan attack, and anomaly spam. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
3. Analysis and modeling of Internet backbone traffic with 5G/B5G
- Author
-
Yuan YANG, Mingwei XU, and Hao CHEN
- Subjects
5G ,Internet backbone ,edge computing ,modelling and evaluation ,Telecommunication ,TK5101-6720 - Abstract
The effects that the 5th generation mobile network (5G) bring to Internet backbone were investigated qualitatively and quantitatively.First,the challenges that the characteristics of 5G,i.e.ultra-high data rate,ultra-low latency,and ultra-large number of connections,introduce to Internet backbone in terms of traffic,latency,and security were analyzed.Second,a model was proposed to capture the characteristics of 5G users and Internet traffic with the coordination of 5G,edge computing,and cloud computing.Then,numerical simulations were used to evaluate the model.The QoS requirements that Internet backbone faces under different extent of 5G deployment were evaluated.According to the study,increment of backbone traffic,increment of the ratio of propagation delay,and movement of bandwidth bottleneck are predicted after 5G/B5G deployment.
- Published
- 2019
- Full Text
- View/download PDF
4. Go-Index: Applying Supply Networks Principles as Internet Robustness Metrics
- Author
-
Bachmann, Ivana, Morales, Fernando, Silva, Alonso, Bustos-Jimenez, Javier, Başar, Tamer, Series editor, Bernhard, Pierre, Advisory board, Zaccour, Georges, Advisory board, Kurzhanski, Alexander, Advisory board, Acemoglu, Daron, Advisory board, Falcone, Maurizio, Advisory board, Rubinstein, Ariel, Advisory board, Sandholm, William H., Advisory board, Shoham, Yoav, Advisory board, Lasaulce, Samson, editor, Jimenez, Tania, editor, and Solan, Eilon, editor
- Published
- 2017
- Full Text
- View/download PDF
5. 5G/后 5G 部署对互联网主干影响的分析与建模.
- Author
-
杨芫, 徐明伟, and 陈浩
- Abstract
Copyright of Journal on Communication / Tongxin Xuebao is the property of Journal on Communications Editorial Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
- Full Text
- View/download PDF
6. Integrated optimization of test case selection and sequencing for reliability testing of the mainboard of Internet backbone routers
- Author
-
Hanxiao Zhang and Yan-Fu Li
- Subjects
Router ,Information Systems and Management ,General Computer Science ,business.industry ,Computer science ,Reliability (computer networking) ,Internet backbone ,Software maintenance ,Management Science and Operations Research ,Industrial and Manufacturing Engineering ,Reliability engineering ,Test case ,Core router ,Modeling and Simulation ,Regression testing ,The Internet ,business - Abstract
Internet backbone refers to the principal data routes between large, strategically interconnected networks and core routers on the Internet. Internet backbone router is essentially the core router of Internet backbone and its performance is mainly relevant to the reliability of its mainboard. The mainboard is an embedded system consisting of hardware and software. Its reliability testing involves executing a number of test cases, which are designed to expose potential defects, under harsh environmental conditions. The testing process is largely prolonged due to the dramatic increase of the number of test cases, mainly due to the continuous increase and upgrade of its functional modules. Thus, there is a big demand from industry to improve the reliability testing efficiency and effectiveness. In this work, we exploit the principles of regression testing in software maintenance: test case selection and prioritization, and construct two testing planning models to largely reduce the testing time as well as to improve the effectiveness of failure detections. The former is a two-step model we introduced in previous work that optimizes test case selection and test case sequencing sequentially. The latter, an integrated model is newly developed, optimizing the test case selection and sequencing simultaneously with the precedence constraints among the test cases. Moreover, we propose exact algorithms based on branch-and-price for solving these two models. Finally, we present a case study demonstrating that the integrated model outperforms the two-step method and the advantage is more significant if the sequencing objective has greater weight in the integrated objective function.
- Published
- 2022
7. Tracking Malicious Hosts on a 10Gbps Backbone Link
- Author
-
Almgren, Magnus, John, Wolfgang, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Aura, Tuomas, editor, Järvinen, Kimmo, editor, and Nyberg, Kaisa, editor
- Published
- 2012
- Full Text
- View/download PDF
8. TCP-Oriented Restoration Objectives for SONET/SDH Networks
- Author
-
Ye, Qiang, MacGregor, Mike H., and Ma, Maode, editor
- Published
- 2009
- Full Text
- View/download PDF
9. Detection of Leaps/sLumps in Traffic Volume of Internet Backbone
- Author
-
Hirokawa, Yutaka, Yamamoto, Kimihiro, Harada, Shigeaki, Kawahara, Ryoichi, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Ma, Yan, editor, Choi, Deokjai, editor, and Ata, Shingo, editor
- Published
- 2008
- Full Text
- View/download PDF
10. Moving to the Net
- Author
-
Banks, Michael A.
- Published
- 2008
- Full Text
- View/download PDF
11. GAMPAL: an anomaly detection mechanism for Internet backbone traffic by flow size prediction with LSTM-RNN
- Author
-
Fumio Teraoka, Taku Wakui, and Takao Kondo
- Subjects
Backbone network ,computer.internet_protocol ,business.industry ,Computer science ,Secure Shell ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Autonomous system (Internet) ,Internet backbone ,Denial-of-service attack ,Border Gateway Protocol ,Anomaly detection ,The Internet ,Electrical and Electronic Engineering ,business ,computer ,Computer network - Abstract
This paper proposes a general-purpose anomaly detection mechanism for Internet backbone traffic named GAMPAL (General-purpose Anomaly detection Mechanism using Prefix Aggregate without Labeled data). GAMPAL does not require labeled data to achieve general-purpose anomaly detection. For scalability to the number of entries in the BGP RIB (Border Gateway Protocol Routing Information Base), GAMPAL introduces prefix aggregate. The BGP RIB entries are classified into prefix aggregates, each of which is identified with the first three AS (Autonomous System) numbers in the AS_PATH attribute. GAMPAL establishes a prediction model for traffic sizes based on past traffic sizes. It adopts a LSTM-RNN (Long Short-Term Memory Recurrent Neural Network) model that focuses on the periodicity of the Internet traffic patterns at a weekly scale. The validity of GAMPAL is evaluated using real traffic information, BGP RIBs exported from the WIDE backbone network (AS2500), a nationwide backbone network for research and educational organizations in Japan, and the dataset of an ISP (Internet Service Provider) in Spain. As a result, GAMPAL successfully detects anomalies such as increased traffic due to an event, DDoS (Distributed Denial of Service) attacks targeted at a stub organization, a connection failure, an SSH (Secure Shell) scan attack, and anomaly spam.
- Published
- 2021
12. Internet Basics
- Author
-
Edwards, Margaret J. A. and Edwards, Margaret J. A.
- Published
- 2002
- Full Text
- View/download PDF
13. An experimental feasibility study on applying SDN technology to disaster-resilient wide area networks.
- Author
-
Nguyen, Kien and Yamada, Shigeki
- Abstract
The Internet may get catastrophic impacts when unexpected disasters such as earthquakes, tsunami, etc. happen. Therefore, it is necessary to equip resilient technologies for the Internet backbones in order to face challenges (e.g., link, device failures, rerouting traffic, etc.) in the disasters. The emerging software-defined networking (SDN) technology, which logically centralizes network function on a controller and remotely manages distributed SDN devices, shows a lot of potential. This paper presents an experimental feasibility study on applying SDN to wide area backbones for the disaster-resilient purpose. To show the efficiency of SDN technology in responding fast to the network situation changes, we conduct three evaluations on real SDN devices and large-scale SDN-based wide area networks (WANs) assuming disaster scenarios. In the first evaluation, we explore the proactive recovery mechanism using the fast failover on SDN devices. In the second one, we investigate the communication latency between controllers and SDN devices, which is one of the most important factors in the reactive recovery in the software-defined backbone. In the last one, we experiment the fast end-to-end reactive recovery behavior of a TCP flow in a disaster scenario. The evaluation results clearly indicate that the SDN-based WAN is technically feasible and effective for fast recovery from disasters. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
14. Critical link analysis of a national internet backbone via dynamic perturbation
- Author
-
Manuel Herrera, Ajith Kumar Parlikad, Marco Pérez-Hernández, and Amit Kumar Jain
- Subjects
0209 industrial biotechnology ,Computer science ,business.industry ,020208 electrical & electronic engineering ,Internet backbone ,02 engineering and technology ,Complex network ,Telecommunications network ,020901 industrial engineering & automation ,Control and Systems Engineering ,0202 electrical engineering, electronic engineering, information engineering ,The Internet ,Centrality ,business ,Link analysis ,Computer network - Abstract
Long-haul backbone communication networks provide internet services across a region or a country. The access to internet at smaller areas and the functioning of other critical infrastructures rely on the long-haul backbone high speed services and resilience. Hence, such networks are key for the decision-making of internet service managers and providers, as well as for the management and control of other critical infrastructures. This paper proposes a critical link analysis of the physical infrastructure of the UK internet backbone network from a dynamic, complex network approach. To this end, perturbation network analyses provide a natural framework to measure the network tolerance facing structural or topological modifcations. Furthermore, there have been taken into account variations on data-traffic for the internet backbone that usually happen in a typical day. The novelty of the proposal is, then, twofold: proposing a weighted (traffic informed) Laplacian matrix to compute a perturbation centrality measure, and enhancing it by a time-dependent perturbation analysis to detect changes in link criticality within the network, coming from data traffic variation in a day. The results show which are the most critical links at every time of the day, being of main importance for protection, maintenance and mitigation plans for the UK internet backbone.
- Published
- 2020
15. Management of the Continental Advanced Networks GEANT and AFRICACONNECT Joint as Two Autonomous Systems by BGP-4 Under IPv6: Using Limited Resources
- Author
-
Itzel-Iliana Rosas-Suarez, Diaan-Laura Fernandez-Tinoco, and Jose-Ignacio Castillo-Velazquez
- Subjects
ComputingMilieux_GENERAL ,Emulation ,Work (electrical) ,business.industry ,Computer science ,Bandwidth (computing) ,Internet backbone ,Joint (building) ,Network topology ,Telecommunications ,business ,Communications protocol ,IPv6 - Abstract
GEANT and AFRICACONNECT are the advanced networks for Europe and Africa respectively, offering advanced Internet backbone infrastructure to 72 countries, interconnecting the national research and education networks in, 43 countries in Europe and 29 countries in Africa. Europe and Africa are closely related, having three communication links among them that, are evolving in time, developing a better infrastructure with increasing bandwidth and backbone equipment capabilities. In this work, management emulation was developed for a network resulting from joining of the GEANT and AFRICACONNECT backbones topologies for 2020 under IPv6 communications protocols. The results show the capabilities of the GNS3 emulator when running these kinds of topologies in a limited computer resources environment and are useful for analysis by ISP companies.
- Published
- 2021
16. Sizing router buffers (redux)
- Author
-
Guido Appenzeller, Nick McKeown, and Isaac Keslassy
- Subjects
Router ,Queueing theory ,Computer Networks and Communications ,Network packet ,business.industry ,Computer science ,Internet backbone ,020206 networking & telecommunications ,02 engineering and technology ,Redux ,Sizing ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,The Internet ,business ,Software ,Computer network - Abstract
The queueing delay faced by a packet is arguably the largest source of uncertainty during its journey. It therefore seems crucial that we understand how big the buffers should be in Internet routers. Our 2004 Sigcomm paper revisited the existing rule of thumb that a buffer should hold one bandwidth-delay product of packets. We claimed that for long-lived TCP flows, it could be reduced by √ N , where N is the number of active flows, potentially reducing the required buffers by well over 90% in Internet backbone routers. One might reasonably expect that such a result, which supports cheaper routers with smaller buffers, would be embraced by the ISP community. In this paper we revisit the result 15 years later, and explain where it has succeeded and failed to affect how buffers are sized.
- Published
- 2019
17. A data-driven method for future Internet route decision modeling
- Author
-
Mohsen Guizani, Xiaojiang Du, Xiang Yu, Shen Su, Wei Shi, and Zhihong Tian
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Internet backbone ,020206 networking & telecommunications ,02 engineering and technology ,Data-driven ,Hardware and Architecture ,Border Gateway Protocol ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Network performance ,The Internet ,Routing (electronic design automation) ,business ,Decision model ,Software - Abstract
Simulating the BGP routing system of Internet is crucial to the analysis of Internet backbone network routing behavior, locating network failure and, evaluating network performance for future Internet. However, the existing BGP routing model lacks in the coarse modeling granularity and the priori knowledge based model. The analysis of BGP routing data that reflects the routing behaviors, directly impacts the BGP routing decision and forward strategy. The efficiency of such analysis dictates the time it takes to come up with such a time-critical decision and strategy. Under the existing model, BGP routing data analysis does not scale up. In this paper, we analyze the inter-domain routing decision making process, then present a prefix level route decision prediction model. More specifically, we apply deep learning methods to build a high-precision BGP route decision process model. Our model handles as much available routing data as possible to promote the prediction accuracy. It analyzes the routing behaviors without any prior knowledge. Beyond discussing the characteristics of the model, we also evaluate the proposed model using experiments explained in detailed cases. For the research community, our method could help in detecting routing dynamics and route anomalies for routing behavior analysis.
- Published
- 2019
18. Planning While Flying: A Measurement-Aided Dynamic Planning of Drone Small Cells
- Author
-
Bin Li, Lin Cai, Nan Cheng, Yi Zhou, Chenhao Shi, and Ning Lu
- Subjects
Channel allocation schemes ,Computer Networks and Communications ,Computer science ,Distributed computing ,Core network ,Internet backbone ,020302 automobile design & engineering ,020206 networking & telecommunications ,Provisioning ,Throughput ,02 engineering and technology ,Drone ,Computer Science Applications ,0203 mechanical engineering ,Hardware and Architecture ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Online algorithm ,Information Systems - Abstract
The deployment of drone small cells has emerged as a promising solution to agile provisioning of Internet backbone access for Internet of Things devices, and many other types of users/devices. In this paper, we consider the problem of deploying a set of drone cells operating on multiple channels in a target area to provide access to the backbone/core network, which is formulated as a combinatorial network utility maximization problem. Since an offline and centralized solution to such a problem is not feasible, a low-complexity and distributed online algorithm is highly desired. Therefore, we propose a measurement-aided dynamic planning (MAD-P) algorithm, where the dispatched drones perform position and channel configurations autonomously on the fly based on the real-time measurement of network throughput to solve the problem in a distributed fashion during flight with minimal centralized control. We prove that the proposed MAD-P algorithm is asymptotically optimal, and investigate how long it takes for the convergence to stationarity under the MAD-P algorithm by giving a mixing time analysis. We also derive an upper bound of the performance gap in presence of measurement errors. Simulation results are provided to validate our analytic results and demonstrate the effectiveness of our algorithm.
- Published
- 2019
19. Measuring and Improving Network Robustness: A Chilean Case Study
- Author
-
Javier Bustos-Jiménez, Marcia Helena Moreira Paiva, and Fernando Morales
- Subjects
Backbone network ,business.industry ,Computer science ,Internet backbone ,020206 networking & telecommunications ,02 engineering and technology ,Network topology ,Computer Science Applications ,Betweenness centrality ,Robustness (computer science) ,Modeling and Simulation ,0202 electrical engineering, electronic engineering, information engineering ,The Internet ,Electrical and Electronic Engineering ,business ,Variable neighborhood search ,Computer network - Abstract
Robustness is a desired feature for any backbone network. As a minimum requirement to be considered robust, a network must remain connected after any single node or link failure, so that each node is able to communicate with all other nodes. It turns out that some national optical backbones do not satisfy this condition, the Chilean Internet backbone being an example. To solve this problem, it is needed the addition of link(s) to the network, which can usually be done in different ways, leaving room to do that while minimizing other metrics of interest. This letter discusses metrics to evaluate the robustness of such networks (specifically, edge betweenness centrality, the number of link cutsets, and node Wiener impact) and proposes a variable neighborhood search heuristic to improve it by adding a few well-placed links. As a case of study, results are presented for the Chilean Internet backbone, considering three and four extra links.
- Published
- 2019
20. Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks
- Author
-
Daria S. Lavrova, Peter D. Zegzhda, and Anna A. Shtyrkina
- Subjects
021110 strategic, defence & security studies ,Backbone network ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,0211 other engineering and technologies ,Internet backbone ,Denial-of-service attack ,02 engineering and technology ,Multifractal system ,Control and Systems Engineering ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Software ,Computer Science::Cryptography and Security ,Computer network - Abstract
This paper proposes to use multifractal analysis to detect backbone network traffic anomalies that indicate network failures or attacks. Multifractal spectrum characteristics are used as security metrics. The effectiveness of the proposed approach is confirmed by experimental results on detecting Denial of Service attacks.
- Published
- 2018
21. Optical Impairment Compensation in Fiber Communication Systems Based on Artificial Intelligence: A Comprehensive Survey
- Author
-
Alaa H. Jarad and Ibrahim A. Murdas
- Subjects
business.industry ,computer.internet_protocol ,Computer science ,Internet backbone ,Optical polarization ,Cloud computing ,Transmission system ,Communications system ,Internet protocol suite ,Transmission (telecommunications) ,Augmented reality ,Artificial intelligence ,business ,computer - Abstract
The global demand for high-speed communication has increased dramatically over the past few years when data beginning to dominating of the traffic according to the Cisco Visual Networking Index (VNI). Data traffic is triple between 2014 and 2020, mainly, due to developing applications that consume bandwidth such as cloud services, HD video, high quality of real-time video transmission, virtual- augmented reality (VR-AR), online- games (video games), exchange of multimedia via smartphones and the more like. In fact, in 2020, more than a million minutes of multimedia (video) content is transiting the IP network every second according to the VNI; and the demands will exceed the capability of the current (core) internet backbone systems, in which optical communications are the main infrastructure. In this paper, the focus was on reviewing the mechanisms used for the most important and most effective techniques used to increase the capacity of optical transmission systems, namely Nonlinear Compensation (NLC) which work to reduce the nonlinear impairments that represent the main intrinsic challenges and the main capacity limitations facing the optical systems. The traditional NLC techniques were determined based on the approximate solution of the Nonlinear Schrodinger Equation (NLSE) through Digital Back Propagation (DBP), or Split- step Fourier Method (SSFM). however, their implementation demands excessive signal processing resources, and high-level accurate knowledge. A completely new approach that uses artificial intelligence (AI) algorithms to identify and solve these impairments has been studied in this paper. Traditional NLC techniques are reviewed in the first part to mitigation the nonlinearities and estimate the quality of transmission (QoT). Whereas in the second part, we review the uses of AI techniques that have been studied in applications related to monitoring performance, reduce nonlinearity, and quantify QoT. Finally, this paper presents a summary with a conclusion and outlook for development and challenges in optical fiber communication systems where AI is predictable to represent a hot major role in the near future.
- Published
- 2021
22. Who owns the international Internet networks?
- Author
-
Ruiz, Jeanette B. and Barnett, George A.
- Subjects
INTERNET service providers ,INTERNET protocol address ,TELECOMMUNICATION ,INFORMATION technology ,INTERNET laws ,INTELLECTUAL property - Abstract
This research examines who controls the international Internet using a multi-level network analysis. Internet provider (IP) address ownership data obtained from TeleGeography (http://www.telegeography.com/) are used to describe the structure of the international network of private companies and Internet service providers (ISPs). The results indicate that 16 companies, headquartered in seven countries, are at the center of the network, each accounting for more than 1% of international Internet connections. Level 3 Communications, based in the United States, is at the center of the network. The United States is the most central nation in the ownership network. American corporations account for almost 40% of the international links. A cluster analysis found a single group centered about the United States. The ownership network is consistent with other measures of the international Internet network. Its structure replicates and maintains the global hierarchy as suggested by world system and globalization theory. Policy implications are discussed. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
- Full Text
- View/download PDF
23. On the efficacy of WDM virtual topology design strategies.
- Author
-
Ma, Xuezhou and Harfoush, Khaled
- Abstract
Existing WDM virtual topology models mainly aim at maximizing the network throughput by optimizing predetermined objective functions. While the literature is rich in variants of such objective functions, they share a few deficiencies. Specifically, they abstract the problem with one fixed objective assuming that the throughput hindrance is uniform across the network, and do not consider node structure nor router utilization. These factors, when considered, affect network bottlenecks limiting a network throughput. As a result, none of the existing models fits all ISP networks. In this paper, we introduce a novel algorithm to determine a network bottleneck based on the 1) physical topology, 2) traffic demand and 3) technology constraints, and a topology model leading to optimized network throughput. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
24. An Efficient Fault Localization in Communication Networks Using SRGA Algorithm
- Author
-
K. Sashi Rekha
- Subjects
Router ,Computer science ,business.industry ,Distributed computing ,Internet backbone ,The Internet ,business ,Fault (power engineering) ,Greedy algorithm ,Telecommunications network ,Fault management ,Tier 1 network - Abstract
The Internet is today a key constituent of daily life and the driving force in the field of communication, research, education, e-commerce, and the like. The ISP, an internet backbone, has undergone sea changes in technology, outpacing existing fault localization and fault management methodologies. Active diagnosis risk modeling is vital for ISP backbone requirements (GonzaAndlez&Helvik 2011). An automated fault localization based on risk modelling can be used to identify faults at IP (higher) layers and map them to the (lower) optical layer so as to establish the exact root cause of the failure. The construction of a complete and accurate risk model is extremely difficult taking into consideration all types of faults, so the risk model is constructed for three main scenarios - link, path, and router faults in Tier 1 ISP-backbone networks. In this approach of fault localization, shared failure components are identified by implementing a Shared Risk Greedy Algorithm (SRGA). (RamanaRaoKompellaet al. 2010).
- Published
- 2021
25. An Effıcıent Fault Management in Communication Networks Usıng On Demand Link State Algorıthm
- Author
-
K. Sashi Rekha
- Subjects
Router ,Link-state routing protocol ,business.industry ,Network packet ,Computer science ,Shortest path problem ,Internet backbone ,Unavailability ,business ,Telecommunications network ,Computer network ,Fault management - Abstract
Today’s Internet backbone network offers enhanced performance to overcome loss, delay, and unavailability. In the occurence of failure of a component, the network becomes susceptible to problems like link faults, path faults, and router failure. Link failure causes looping, packet dropping, loss of data and unreliable network communication. So an efficient fault management implementation is vital to handle multiple link failures. Fault management is vital to get the network back to normal.To properly operate and maintain a complex network, the system as a whole, and each of its essential individual components, must work in tandem. In this proposed approach On-demand Link State (OLS) routing, with shared bandwidth technology is implemented for fault management, for handling multiple link failures. It guarantees the forwarding of loop free data to destinations in case of any number of network failures. The core idea of OLS routing is a blacklist, which carries information on downgraded links identified along the path that are to be avoided. This ensures uninterrupted data packet forwarding without packets getting dropped. Also, the shortest path to the destination is located, based on the state and cost of the link (Robertson and Nelakuditi 2012).
- Published
- 2021
26. Current Situation and Prospect of CERNET
- Author
-
Ying Liu
- Subjects
Public infrastructure ,business.industry ,Internet backbone ,High education ,The Internet ,Business ,Telecommunications ,China ,IPv6 - Abstract
China Education and Research Network (CERNET) is the first nationwide education and research computer network in China. It has become an important public infrastructure greatly supports China’s high education, science and technology development. CNGI-CERNET2/6IX is the largest and only academic one of the network backbones of CNGI. It is the largest pure IPv6 Internet backbone around the world. CNGI-CERNET2 has become an important infrastructure for promoting the Chinese next-generation Internet strategy. This chapter introduces the development progress of CERNET and CNGI-CERNET2 since 2015.
- Published
- 2021
27. Edge (of the Earth) Replication: Optimizing Content Delivery in Large LEO Satellite Communication Networks
- Author
-
David Bermbach and Tobias Pfandzelter
- Subjects
FOS: Computer and information sciences ,business.product_category ,Computer science ,business.industry ,Internet backbone ,Network topology ,Replication (computing) ,Backhaul (telecommunications) ,Computer Science - Distributed, Parallel, and Cluster Computing ,Internet access ,Communications satellite ,Satellite Internet access ,The Internet ,Distributed, Parallel, and Cluster Computing (cs.DC) ,business ,Computer network - Abstract
Large low earth orbit (LEO) satellite networks such as SpaceX's Starlink constellation promise to deliver low-latency, high-bandwidth Internet access with global coverage. As an alternative to terrestrial fiber as a global Internet backbone, they could potentially serve billions of Internet-connected devices. Currently, operators of CDNs exploit the hierarchical topology of the Internet to place points-of-presence near users, yet this approach is no longer possible when the topology changes to a single, wide-area, converged access and backhaul network. In this paper, we explore the opportunities of points-of-presence for CDNs within the satellite network itself, as it could provide better access latency for users while reducing operational costs for the satellite Internet service providers. We propose four strategies for selecting points-of-presence in satellite constellations that we evaluate through extensive simulation. In one case, we find that replicating web content within satellites can reduce bandwidth use in the constellation by 93% over an approach without replication in the network, while storing just 0.01% of all content in individual satellites., Accepted for the 21st IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGrid '21)
- Published
- 2020
28. Piper: A Unified Machine Learning Pipeline for Internet-scale Traffic Analysis
- Author
-
Kenji Takahashi, Akihiro Nakao, Kazunori Kamiya, and Bo Hu
- Subjects
Traffic analysis ,business.industry ,Computer science ,Feature extraction ,Botnet ,Internet backbone ,02 engineering and technology ,Machine learning ,computer.software_genre ,Pipeline (software) ,020204 information systems ,Server ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,The Internet ,Artificial intelligence ,business ,computer - Abstract
Machine learning has been applied to network traffic analysis for a variety of purposes, including botnet detection. To improve the computational efficiency, several architectures have been proposed to consolidate processes common across multiple applications that use the same traffic data. However, when introducing conventional architectures to real-world traffic analysis at Internet scale, the amount of input traffic data and the variety of output features to represent global access patterns become new challenges. To address the challenges, we have developed Piper, a machine learning pipeline, that consolidates diversified machine learning applications in a highly efficient manner. On top of the consolidated architecture, Piper employs two novel techniques: (1) selective sampling to reduce traffic data efficiently while maintaining prediction performance, and (2) a set of enriched features to extract temporal and spatial characteristics in global traffic. For the evaluation, we have been deploying Piper to detect botnets from internet backbone traffic over nine months. The evaluation has confirmed the effectiveness of Piper in terms of computational performance, prediction performance, and lead time to detect botnets.
- Published
- 2020
29. Traffic concentration for a green Internet.
- Author
-
Ma, Xuezhou and Harfoush, Khaled
- Abstract
Cooling equipment accounts for a sizable fraction of Internet energy footprint. Existing network design models, that assume a linear router power spectrum, are mislead by ignoring the impact of cooling consumption. In this paper, we make a case that the overall energy consumed by a router is polynomial to traffic demand and increases rapidly when the router is loaded. An energy-smart network design is thus formulated to mostly spread out traffic evenly among routers across the network. We further propose a heuristic and compare our design with popular traffic concentration model on two published backbone networks: NSFNET and AT&T. The simulation results reveal that our design saves at least 25% of the consumed energy, and the proposed heuristic closely matches the optimal results. Thus, mitigating network bottleneck routers, rather than creating ones, leads to a greener Internet backbone network. Our conclusions challenge the common wisdom about existing energy saving protocols. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
30. The Cohesion Degree Based Method for the Critical Rout Nodes Detection of Internet Backbone.
- Author
-
Lei, Xu, Zhiming, Liu, Jin, Cao, Jin, He, and Di, Xie
- Abstract
In order to determine the critical nodes of internet backbone, a cohesion degree based detection method is proposed. By the analysis of node aggregation and cohesion degree, the mathematic model of the relations between the cohesion performance and node importance is given, hence the critical nodes' detection is turned to the cohesion degree calculation of a certain topology. The feasibility and validity are proved by the experiment. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
31. Minimizing the provisioning delay in the cloud network: Benefits, overheads and challenges.
- Author
-
Kantarci, Burak and Mouftah, Hussein T.
- Abstract
In the cloud computing era, virtualized data centers are expected to host most of the cloud services such as computation, storage and multimedia applications. Cloud services are expected to be transported over the Internet backbone based on anycast/manycast paradigms between the users and data centers. In this paper, we present an optimization model which aims at reconfiguring the cloud network topology so that the delay of cloud service provisioning is minimized without disrupting the service quality of regular Internet services. We compare the performance of the proposed model to the delay performance of an optimization model which aims at minimizing the operational expenditure of the operator. Through numerical results, we show that the proposed optimization model is capable of assuring minimum delay guarantee for the traffic demands destined to/from the data centers, as well as the traffic demands destined to/from the core nodes of the cloud network. Furthermore, we study the overheads and challenges of delay minimized reconfiguration of the cloud network. Numerical results confirm that minimum delay objective does not introduce significant overhead to the data centers in terms of operational expenditure, namely power consumption. On the other hand, we show that the increase in the power consumption of the network equipment in the cloud backbone arises as an important challenge of the presented optimization model. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
32. Towards a robust and green internet backbone network.
- Author
-
Ma, Xuezhou and Harfoush, Khaled
- Abstract
Networking infrastructure consumes a sizable fraction of the electricity supply. A network design model aimed at maximizing energy savings by aggregating traffic demand at a small set of resources, to put under-utilized resources to sleep, is offset by legacy models aimed at maximizing the network throughput by spreading the load across network resources. Traffic fluctuations and sudden spikes further complicate the problem. In this paper, we show that the problem is NP-hard, and propose a heuristic which targets optimal power usage for common traffic demand, while accommodating traffic fluctuations. The efficacy of our design is tested on two published backbone networks: NLR and NSFNET. Simulation results reveal that the proposed heuristic closely matches the results of the optimal algorithm in both energy savings and network utilization, while enjoying polynomial time complexity. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
33. Effect of adding physical links on the robustness of the Internet modeled as a physical–logical interdependent network using simple strategies
- Author
-
Valeria Valdés, Javier Bustos-Jiménez, Benjamin Bustos, and Ivana Bachmann
- Subjects
Information Systems and Management ,Cost efficiency ,computer.internet_protocol ,Interdependent networks ,business.industry ,Distributed computing ,Simple Features ,Physical Internet ,Autonomous system (Internet) ,Internet backbone ,Computer Science Applications ,Robustness (computer science) ,Modeling and Simulation ,The Internet ,Safety, Risk, Reliability and Quality ,business ,computer - Abstract
In this work we model the Internet as a physical-logical interdependent network composed by the logical Internet network (Autonomous System level network), the physical Internet network (Internet backbone), and their interactions. We have tested the effect of adding physical links over the Internet’s robustness against both physical random attacks, and localized attacks. We add links using strategies that are simple enough to be used when information of the physical network is incomplete or not accurate enough to use more complex strategies. To measure the effect of adding links to the physical network our tests consider the logical network, and the set of interlinks to be constant. We tested four physical link addition strategies: random addition, distance addition, local hubs addition, and degree addition, over three different physical network models: Gabriel Graphs, n -nearest neighbors, and relative neighborhood graphs, and two extreme space shapes based on the geography of real countries: a long and narrow space with a width to length ratio of (1:25), and square space with a (1:1) width to length ratio. Our results show that there are High Damage Localized Attacks (HDLA): localized attacks that cause the failure of more than half of the logical network after removing less than 9% of the physical nodes. Some HDLA can even result in total failure. We found that HDLA are caused by the failure of “bridge nodes” in the logical network. Our results show that adding links to the physical network improves the robustness against localized attacks, and physical random attacks. Adding physical links also decreases the damage caused by HDLA, but does not fully prevent them. We found that degree and random addition strategies improve the Internet’s robustness the most, while distance addition is the most cost efficient link addition strategy in terms of robustness improvement. We also found that the high robustness and low cost efficiency of random strategy is related to the length of the links added, highlighting the importance of simple features such as the length of the links added over the robustness of physical-logical interdependent networks . Our findings suggest that given cost constraints it may be better to add more physical links using distance addition than it is to add fewer physical links using degree or random link addition strategies, and that more cost efficient versions of degree strategy could be obtained by simply limiting the length of the links added by the strategy.
- Published
- 2022
34. DOOM: a Training-Free, Real-Time Video Flow Identification Method for Encrypted Traffic
- Author
-
Yong Sun, Youting Liu, Li Shu, Chengwei Zhang, Chao Zheng, and Qingyun Liu
- Subjects
Traffic analysis ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Internet backbone ,Service provider ,Encryption ,Network congestion ,Identification (information) ,Traffic classification ,Default gateway ,The Internet ,business ,Computer network - Abstract
The internet traffic is mainly dominated by videos, limiting video transmission is thus required to manage the traffic when network congestion occurs. Besides, service providers want to guarantee video transmission for customers’ satisfaction. However, traffic encryption is becoming increasingly common, making conventional payload-based methods unsuitable, while traffic analysis (TA) still works. In this paper, we implement and evaluate machine learning (ML)-based TA for video flow identification and propose a method named detecting ON-OFF mode (DOOM), which is a training-free, real-time and lightweight video flow identification method suitable for Gateway or Internet Backbone Provider (IBP) middle-boxes.
- Published
- 2020
35. WhatsThat? On the Usage of Hierarchical Clustering for Unsupervised Detection & Interpretation of Network Attacks
- Author
-
Pedro Casas, Pavol Mulinka, Kensuke Fukuda, and Lukas Kencl
- Subjects
Interpretation (logic) ,Computer science ,Internet backbone ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,Data structure ,Hierarchical clustering ,Identification (information) ,0202 electrical engineering, electronic engineering, information engineering ,Unsupervised learning ,020201 artificial intelligence & image processing ,Anomaly detection ,Data mining ,Density based clustering ,computer - Abstract
The automatic detection and interpretation of network attacks through machine learning is a well-known problem, for which no general solution is available. Super-vised learning and anomaly detection approaches require prior knowledge on the system under analysis, either in the form of normal operation profiles, or on the specific attacks to detect. As a consequence, both approaches have clear limitations when it comes to detecting, and in particular interpreting, previously unseen attacks and anomalies.In this paper we present WhatsThat, a novel approach to unsupervised network anomaly detection, which can both detect and interpret anomalous behaviors in a completely black-box manner, without relying on any ground-truth on the system under analysis. WhatsThat relies on hierarchical–clustering techniques to discover and characterize anomalous patterns present in nested or hierarchically structured multi–dimensional data, which is common in network traffic – e.g., due to multi–layer protocols. The solution uses unsupervised cluster validity metrics to automatically explore the data structure, and builds on automatic identification of relevant features to provide meaningful descriptions for the detected patterns. We showcase WhatsThat in the detection and interpretation of network attacks hidden in real, large-scale network traffic collected at a transit Internet backbone network. While WhatsThat is mainly tailored for unsupervised anomaly detection and interpretation, it can also be applied to the unsupervised analysis of any kind of nested or hierarchically structured multi-dimensional data, showing the potential of hierarchical clustering for general unsupervised data analysis.
- Published
- 2020
36. Classifying Anomalies for Network Security
- Author
-
Vijay Gadepally and Emily H. Do
- Subjects
Network security ,business.industry ,Computer science ,Internet backbone ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,Flow network ,Statistical classification ,Packet analyzer ,0202 electrical engineering, electronic engineering, information engineering ,Entropy (information theory) ,020201 artificial intelligence & image processing ,Anomaly detection ,Data mining ,business ,computer - Abstract
Detecting and classifying anomalous behaviors in computer networks remains a formidable challenge. This work outlines a machine learning technique that uses deep neural networks to detect and classify a variety of network attacks. Our approach is based on that hypothesis that different network attacks generate a distinguishable change in entropy of certain network flow features. To generate a training and validation dataset, we inject synthetic attacks of different types and intensities into raw packet capture data collected from an internet backbone link by the MAWI group. Experimental results show that our machine learning classification model can achieve high accuracy for network attacks in which attack intensities are as low as 5% of overall traffic.
- Published
- 2020
37. Space Geometry Effect over the Internet as a Physical-Logical Interdependent Network
- Author
-
Javier Bustos-Jiménez, Francisco Sanhueza, and Ivana Bachmann
- Subjects
business.industry ,Interdependent networks ,Computer science ,media_common.quotation_subject ,Physical layer ,Internet backbone ,Preferential attachment ,Topology ,Interdependence ,Robustness (computer science) ,The Internet ,business ,Network model ,media_common - Abstract
In this article we study the Internet’s robustness under physical node failures, given that the physical layer is built over spaces with geometry/shape restrictions. This is of special interest for countries prone to natural catastrophes, and long and narrow geographies such as Chile and Japan. We model the Internet as an interdependent network composed of the Internet’s physical layer (Internet backbone) and he Internet’s logical layer (Autonomous System level network) coupled. Here, the robustness is tested by measuring the amount of functional nodes on the logical network after randomly removing physical nodes. In this work, we tested six different spatially constrained network models to generate the Internet’s physical layer (Yao graphs, geometric preferential attachment, Erdős-Renyi, n-nearest neighbours, Gabriel graphs, and Modified relative neighbourhood model), and three different geometries with width to lengths ratios going from a square geometry to a Chile-like space geometry. Additionally, we study the relation between the amount of physical edges and the Internet’s robustness. Our findings suggest that both: the edge addition strategy (i.e. the physical network model used) and the amount of physical edges play an important role on the Internet’s robustness. Our results also suggest that Internet based interdependent systems whose robustness is affected by the space geometry (geometry-sensitive) can become more robust by randomly adding few edges. Furthermore, these interdependent systems can become geometry-insensitive after the edge addition, meaning that the robustness of the interdependent system is no longer affected by the space geometry.
- Published
- 2020
38. GAMPAL: Anomaly Detection for Internet Backbone Traffic by Flow Prediction with LSTM-RNN
- Author
-
Takao Kondo, Taku Wakui, Fumio Teraoka, Keio University, Graduate School of the Natural Science and Technology [Kanazawa], Kanazawa University (KU), Faculty of Science and Technology [Tokyo], Seikei University, Selma Boumerdassi, Éric Renault, Paul Mühlethaler, and TC 6
- Subjects
Backbone network ,Internet Backbone ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Internet backbone ,020206 networking & telecommunications ,Denial-of-service attack ,Throughput ,02 engineering and technology ,Airfield traffic pattern ,General-Purpose Anomaly Detection ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,LSTM-RNN ,020201 artificial intelligence & image processing ,The Internet ,Anomaly detection ,[INFO]Computer Science [cs] ,business ,Network Traffic Analysis ,Computer network - Abstract
International audience; This paper proposes a general-purpose anomaly detection mechanism for Internet backbone traffic named GAMPAL (General-purpose Anomaly detection Mechanism using Path Aggregate without Labeled data). GAMPAL does not require labeled data to achieve a general-purpose anomaly detection. For scalability to the number of entries in the BGP RIB (Routing Information Base), GAMPAL introduces path aggregates. The BGP RIB entries are classified into the path aggregates, each of which is identified with the first three AS numbers in the AS_PATH attribute. GAMPAL establishes a prediction model of traffic throughput based on past traffic throughput. It adopts the LSTM-RNN (Long Short-Term Memory Recurrent Neural Network) model focusing on periodicity in weekly scale of the Internet traffic pattern. The validity of GAMPAL is evaluated using the real traffic information and the BGP RIB exported from the WIDE backbone network (AS2500), a nation-wide backbone network for research and educational organizations in Japan. As a result, GAMPAL successfully detects traffic increases due to events and DDoS attacks targeted to a stub organization.
- Published
- 2019
39. Characteristics and Temporal Behavior of Internet Backbone Traffic
- Author
-
Muharrem Shefkiu, Arianit Maraj, and Artan Salihu
- Subjects
Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Internet backbone ,The Internet ,business ,Computer network - Abstract
With the rapid increase demand for data usage, Internet has become complex and harder to analyze. Characterizing the Internet traffic might reveal information that are important for Network Operators to formulate policy decisions, develop techniques to detect network anomalies, help better provision network resources (capacity, buffers) and use workload characteristics for simulations (typical packet sizes, flow durations, common protocols). In this paper, using passive monitoring and measurements, we show collected data traffic at Internet backbone routers. First, we reveal main observations on patterns and characteristics of this dataset including packet sizes, traffic volume for inter and intra domain and protocol composition. Second, we further investigate independence structure of packet size arrivals using both visual and computational statistics. Finally, we show the temporal behavior of most active destination IP and Port addresses.
- Published
- 2018
40. Research on the problems of interconnection settlement in China’s Internet backbone network
- Author
-
Yajie Zhu and Meijuan Li
- Subjects
Interconnection ,Backbone network ,Computer science ,business.industry ,media_common.quotation_subject ,Internet backbone ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,010502 geochemistry & geophysics ,01 natural sciences ,Competition (economics) ,General Earth and Planetary Sciences ,The Internet ,Quality (business) ,business ,Settlement (litigation) ,Telecommunications ,0105 earth and related environmental sciences ,General Environmental Science ,media_common - Abstract
The settlement price of the backbone network affects the competition efficiency of the Internet market.Therefore, how to optimize the interconnection settlement system of Internet backbone network has become the problem that the regulatory agencies most needed to solve, and it is the core issue of the interconnection regulation for the network backbone. On the basis of summarizing the internationally accepted interconnection settlement method of the backbone network and the status quo of interconnection settlement in China’s Internet backbone network.we mainly focuses on the major problems of the interconnection settlement in China’s Internet backbone network.For example, the current interconnection settlement method restricts the improvement of interconnection quality between backbone networks.The leading backbone networks have the motive of implementing discriminatory pricing, which is not conducive to the healthy development of the Internet industry. For the existing problems, we put forward the countermeasures,which is of great significance to improve the quality of interconnection between China’s Internet backbone networks, resolve the problems of interconnection settlement and promote the healthy development of China’s Internet market.
- Published
- 2018
41. Research on the problems of interconnection in China’s Internet backbone network
- Author
-
Yajie Zhu and Meijuan Li
- Subjects
Interconnection ,Backbone network ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,05 social sciences ,Internet backbone ,010502 geochemistry & geophysics ,01 natural sciences ,0502 economics and business ,Bandwidth (computing) ,General Earth and Planetary Sciences ,The Internet ,Market power ,050207 economics ,Telecommunications ,business ,Monopoly ,0105 earth and related environmental sciences ,General Environmental Science - Abstract
The Internet industry in China is in a period of rapid development. The new businesses of Internet are springing up. As a result, bandwidth users want to improve the quality of the Internet. Interconnection between backbone networks is crucial to network quality. Therefore, the Chinese government is very concerned about the interconnection of backbone networks. This paper mainly analyzes the development status of the interconnection of China’s Internet backbone networks from the interconnection way between the backbone networks, we find out the main problems of the interconnection between the Internet backbone networks, such as the regional monopoly of backbone networks, the resource distribution is not balanced, and the existing interconnection system has raised the market power of the leading backbone network.We put forward corresponding countermeasures and suggestions for the existing problems of the backbone network interconnection. It is great significance to optimize of the interconnection quality of China’s Internet backbone network, improve interconnection efficiency of backbone networks and increase social welfare.
- Published
- 2018
42. THE SPATIAL DISTRIBUTION OF INTERNET BACKBONE NETWORKS IN EUROPE: A METROPOLITAN KNOWLEDGE ECONOMY PERSPECTIVE.
- Author
-
Tranos, Emmanouil and Gillespie, Andy
- Subjects
- *
INTEGRATED circuit interconnections , *INTERNET , *INTEGRATED circuits , *TELECOMMUNICATION systems , *SOCIOECONOMICS , *REGRESSION analysis , *CENTRAL economic planning , *SOCIAL networks - Abstract
This article attempts to explain the factors which determine the spatial distribution of the Internet backbone networks in Europe. These networks facilitate the modern economy by interconnecting cities, enabling communication and exchange and, consequently, enhancing the interaction between them. This infrastructural capital for the knowledge economy is far from evenly spread across Europe. The article uses principal components analysis and regression models to examine the influence of a range of socio-economic variables on the spatial distribution of the Internet backbones in Europe, and concludes that they largely follow existing patterns of development, urban concentrations of knowledge, nodes of transport provision and patterns of high accessibility. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
43. The study of QoS guarantee in the optical burst switching internet backbone.
- Author
-
Shin, Haw-Yun, Wu, Jean-Lien C., and Hsu, Yu-Chi
- Subjects
PACKET switching ,INTERNET ,TECHNOLOGY ,DATA transmission systems - Abstract
Abstract: Optical switching technology can be categorized into optical circuit switching (OCS), optical packet switching (OPS) and optical burst switching (OBS). OCS is suitable for large amounts of data transmission; however, the channel utilization is inefficient when the traffic flows are intermittent. OPS can be easily adapted to any higher layer and is suitable for bursty traffic, but it requires a highly complex technology and optical buffer. The new switching paradigm, OBS, can provide higher bandwidth utilization and meanwhile avoid the complexity in OPS technology. In this paper, we investigate how the quality of service (QoS) can be guaranteed and reliable transmission can be supported in the OBS-based Internet backbone. We propose the adjustable-time-counter-based (ATCB) burst assembly and the non-real time packet retransmission mechanisms and apply them in the ingress router of the OBS Internet backbone to guarantee the quality of real time applications and lossless requirement of non-real time services. Moreover, traffic shaped is performed for real time packets in the egress router so that the real time property is preserved with a low jitter. Simulation results show that the burst blocking probability using the ATCB burst assembly is improved, compared with the time-counter-based (TCB) and burst-length-threshold-based (BLTB) mechanisms. The delay, loss and jitter of real time service conform to the QoS requirement. Meanwhile, the delay of non-real time service also falls in the acceptable range. [Copyright &y& Elsevier]
- Published
- 2006
- Full Text
- View/download PDF
44. An Economic Analysis of Interconnection Arrangements Between Internet Backbone Providers.
- Author
-
Yong Tan, Chiang, I. Robert, and Mookerjee, Vijay S.
- Subjects
INTERNETWORKING ,PRICING ,COMPUTER network architectures ,QUALITY of service ,COST analysis ,ECONOMIC models ,ECONOMIC equilibrium ,RESEARCH methodology ,OPERATIONS research - Abstract
Transit and peering arrangements among Internet backbone providers (IBPs) are essential for the global delivery of communication services on the Internet. In addition, to support delay-sensitive applications (e.g., streaming and multimedia applications) it is important for IBPs to maintain high service quality even if the network is congested. One promising approach is to establish interconnection agreements among providers to dynamically trade network capacity. To make such interconnections possible in a competitive setting, we propose a pricing scheme that considers factors such as network utilization, link capacity, and the cost structure of the interconnecting participants. Our analyses show that the common sender keeps all (SKA) mode of settlement does not provide adequate incentives for collaboration: rather, the provider that delivers the packets should be suitably compensated at an equilibrium price. Two price equilibria are identified: The first favors slower IBPs, whereas the other is congestion based and can be more beneficial for faster IBPs. When cost asymmetries exist, the lower cost IBP needs to offer a price discount to induce participation. We show that a usage-based, utilization-adjusted interconnection agreement could align the costs and revenues of the providers while allowing them to meet more stringent quality of service requirements. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
45. Improved Rule Installation for Real-Time Query Service in Software-Defined Internet of Vehicles
- Author
-
Junqi Zhang, MengChu Zhou, Xin Wang, Cheng Wang, and Changjun Jiang
- Subjects
050210 logistics & transportation ,Engineering ,business.product_category ,business.industry ,Mechanical Engineering ,05 social sciences ,Internet backbone ,020206 networking & telecommunications ,02 engineering and technology ,Networking hardware ,Computer Science Applications ,Network management ,0502 economics and business ,Automotive Engineering ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Internet access ,Multicast address ,Forwarding plane ,business ,Internet appliance ,Computer network - Abstract
Internet of Vehicles (IoV) has gained considerable attention from industry and academia due to the development of communication technology and smart city. However, a proprietary and closed way of operating hardware in network equipment slows down the progress of new service deployment and extension in IoV. Moreover, the tightly coupled control and data planes in traditional networks significantly increase the complexity and cost of network management. By proposing a novel architecture, i.e., software-defined IoV (SDIV), we adopt a software-defined network (SDN) architecture to address these problems by leveraging its separation of the control plane from the data one and a uniform way to configure heterogeneous switches. However, IoV characteristics introduce some great challenges in rule installation due to the limited size of flow tables at OpenFlow-enabled switches that are the main SDN component. It is necessary to build compact flow tables for IoV scalability. Accordingly, we develop a novel rule installation mechanism to reduce the number of rules for real-time query services in SDIV. We separate the wired data plane from the wireless one and use multicast addresses in the latter. We introduce a destination-driven model in the wired data plane to reduce the number of rules at switches. Experiments with a real data trace show that the developed approach significantly reduces the number of rules without degrading the performance of data transmissions for real-time query services in IoV.
- Published
- 2017
46. Coordinated Selfish Distributed Caching for Peering Content-Centric Networks
- Author
-
Valentino Pacifici and Gyorgy Dan
- Subjects
Numerical models ,Computer Networks and Communications ,Computer science ,Distributed computing ,02 engineering and technology ,0202 electrical engineering, electronic engineering, information engineering ,Resource management ,Electrical and Electronic Engineering ,Routing ,Internet ,020203 distributed computing ,Cost efficiency ,business.industry ,IEEE transactions ,Communication Systems ,Internet backbone ,020206 networking & telecommunications ,Computer Science Applications ,Tier 1 network ,Peering ,The Internet ,Cache ,Content centric ,Convergence ,business ,Protocols ,Kommunikationssystem ,Software ,Computer network - Abstract
A future content-centric Internet would likely consist of autonomous systems (ASes) just like today’s Internet. It would thus be a network of interacting cache networks, each of them optimized for local performance. To understand the influence of interactions between autonomous cache networks, in this paper, we consider ASes that maintain peering agreements with each other for mutual benefit and engage in content-level peering to leverage each others’ cache contents. We propose a model of the interaction between the caches managed by peering ASes. We address whether stable and efficient content-level peering can be implemented without explicit coordination between the neighboring ASes. We show that content-level peering leads to stable cache configurations, both with and without coordination. However, peering Internet Service Providers (ISPs) that coordinate to avoid simultaneous updates converge to a stable configuration more efficiently. Furthermore, if the content popularity estimates are inaccurate, content-level peering is likely to lead to cost efficient cache allocations. We validate our analytical results using simulations on the measured peering topology of more than 600 ASes. QC 20190918
- Published
- 2016
47. The Internet Backbone and the American Metropolis.
- Author
-
Moss, Mitchell L. and Townsend, Anthony M.
- Subjects
- *
INTERNET , *COMPUTER networks - Abstract
Despite the rapid growth of advanced telecommunications services, there is a lack of knowledge about the geographic diffusion of these new technologies. The Internet presents an important challenge to communications researchers, as it threatens to redefine the production and delivery of vital services including finance, retailing, and education. This article seeks to address the gap in the current literature by analyzing the development of Internet backbone networks in the United States between 1997 and 1999. We focus upon the intermetropolitan links that have provided transcontinental data transport services since the demise of the federally subsidized networks deployed in the 1970s and 1980s. We find that a select group of seven highly interconnected metropolitan areas consistently dominated the geography of national data networks, despite massive investment in this infrastructure over the study period. Furthermore, while prosperous and internationally oriented American cities lead the nation in adopting and deploying Internet technologies, interior regions and economically distressed cities have failed to keep up. As information-based industries and services account for an increasing share of economic activity, this evidence suggests that the Internet may aggravate the economic disparities among regions, rather than level them. Although the capacity of the backbone system has slowly diffused throughout the metropolitan system, the geographic structure of interconnecting links has changed little. Finally, the continued persistence of the metropolis as the center for telecommunications networks illustrates the need for a more sophisticated understanding of the interaction between societies and technological innovations. [ABSTRACT FROM AUTHOR]
- Published
- 2000
- Full Text
- View/download PDF
48. On the Usage of DSCP and ECN codepoints in internet backbone traffic traces for IPv4 and IPv6
- Author
-
Gabi Dreo Rodosek, Klement Streit, Nils Roddav, Aiko Pras, and Design and Analysis of Communication Systems
- Subjects
Traffic analysis ,Computer science ,Network packet ,business.industry ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Internet backbone ,Quality of Service ,Type of Service ,020206 networking & telecommunications ,02 engineering and technology ,Internet Measurements ,IPv6 ,IP header ,Traffic Analysis ,Differentiated services ,0202 electrical engineering, electronic engineering, information engineering ,Differentiated Services Code Point ,Explicit Congestion Notification ,020201 artificial intelligence & image processing ,business ,Computer network - Abstract
Differentiated Services Code Points are values that can be used on IP packets to mark traffic and allow for different Quality of Service treatment during the traversal through a network. Explicit Congestion Notifications are used to indicate that congestion on a network occurred. Both values are encoded in the previously called Type of Service field in the IP header. In this paper, we look at codepoint values for DSCP and ECN in relation to the ports used on the transport layer, which lets us infer the application that is generating the traffic. We provide new measurement data by analyzing traffic from Internet backbone links collected by CAIDA from the months March, April, and May 2018 in New York City. Our results show that DSCP codepoints are rarely used in IPv4 but even less in IPv6. Moreover, most traffic using DSCP codepoints is only using default values and not values designed for prioritization of packets. ECN-enabled traffic is scarce in IPv4, while in IPv6 it appears to be neglectable. However, we could observe differences for certain application traffic in the usage of DSCP and ECN codepoints and elaborate on their distribution.
- Published
- 2019
49. SICO
- Author
-
Liang Wang, Henry Birge-Lee, Prateek Mittal, and Jennifer Rexford
- Subjects
Routing protocol ,Network packet ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Internet backbone ,020206 networking & telecommunications ,02 engineering and technology ,Internet traffic ,Internet hosting service ,Adversary ,Computer security ,computer.software_genre ,020204 information systems ,Border Gateway Protocol ,0202 electrical engineering, electronic engineering, information engineering ,The Internet ,business ,computer - Abstract
The Border Gateway Protocol (BGP) is the primary routing protocol for the Internet backbone, yet it lacks adequate security mechanisms. While simple BGP hijack attacks only involve an adversary hijacking Internet traffic destined to a victim, more complex and challenging interception attacks require that adversary intercept a victim's traffic and forward it on to the victim. If an interception attack is launched incorrectly, the adversary's attack will disrupt its route to the victim making it impossible to forward packets. To overcome these challenges, we introduce SICO attacks (Surgical Interception using COmmunities): a novel method of launching interception attacks that leverages BGP communities to scope an adversary's attack and ensure a route to the victim. We then show how SICO attacks can be targeted to specific source IP addresses for reducing attack costs. Furthermore, we ethically perform SICO attacks on the real Internet backbone to evaluate their feasibility and effectiveness. Results suggest that SICO attacks can achieve interception even when previously proposed attacks would not be feasible and outperforms them by attracting traffic from an additional 16% of Internet hosts (worst case) and 58% of Internet hosts (best case). Finally, we analyze the Internet topology to find that at least 83% of multi-homed ASes are capable of launching these attacks.
- Published
- 2019
50. Modeling Delay of Haptic Data in CSMA-based Wireless Multi-Hop Networks: A Probabilistic Approach
- Author
-
Frank Engelhardt and Mesut Gunes
- Subjects
Queueing theory ,business.industry ,Computer science ,Probabilistic logic ,Internet backbone ,Hop (networking) ,Computer Science::Performance ,Computer Science::Networking and Internet Architecture ,Wireless ,The Internet ,Mobile telephony ,business ,5G ,Computer network ,Haptic technology - Abstract
The future Tactile Internet is expected to enable ultra-low-latency haptic communication in realtime between peers over arbitrary distances. This vision is currently highly based on the existing Internet Backbone and the upcoming 5G (and beyond) mobile communication networks. However, WiFi networks that are based on the IEEE 802.11 standard have spread widely and will be undiminishedly part of future networks. We derive a probabilistic model for estimation of latency in uncongested 802.11-based Wireless Multi-Hop Networks (WMHNs) with arbitrary topology. The model parameters are: (i) the data rate of the nodes, (ii) the packet error rate, (iii) the sending probability of the nodes, and (iv) the distribution of the queueing delay. In simulations our preliminary model can accurately predict both the minimum and maximum observed delays with multiple haptic flows present.
- Published
- 2019
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.