The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a new Internet architecture based on de-conflated identities (ADI) that explicitly establishes the separation of ownership of hosts from the underlying infrastructure connectivity. A direct impact of this de-conflated Internet architecture is the ability to express organizational policies separately and thus more naturally, from the underlying infrastructure routing policies. Host or organizational...
Traffic engineering and an economical provisioning of bandwidth is crucial for network providers in times of high competition in broadband access networks. We investigate the efficiency of caching as an option to shorten end-to-end paths and delays while at the same time reducing traffic loads. The portion of HTTP based distribution of cacheable content on the Internet is increasing in recent time...
Internet routing system is the fundamental components of Internet. As the Internet growth, Internet routing system is facing the scaling issues of global routing table expanding due to the wide use of multi-homing, traffic engineering, and mobility. Existing proposed solutions need to change host protocol stack or routing architecture, hence, no incentive for practical deployment. In this paper, we...
The locator/identifier separation protocol (LISP) is being considered in the Internet community as an evolutionary path towards future Internet. Routing scalability and enhanced traffic engineering capabilities beyond BGP are major highlights of the proposal. An implementation from Cisco systems is being tested in a global infrastructure named LISP+ALT, while an open source implementation, namely...
The border gateway protocol (BGP) is a fundamental building block of the Internet infrastructure. However, due to the implicit trust assumption among networks, Internet routing remains quite vulnerable to various types of misconfiguration and attacks. Prefix hijacking is one such misbehavior where an attacker AS injects false routes to the Internet routing system that misleads victim's traffic to...
The following topics are dealt with: high speed networking; access networks; data center; routing and traffic engineering; optical networks; energy aware network operations; one-to-many communication; data transport; multicast congestion control; Internet; and resource pooling transport protocol.
An accurate mapping between traffic and their corresponding applications can be very important for a wide range of network management and measurement tasks including traffic engineering, service differentiation, performance/failure monitoring, and security. Having the ability to identify the differentiating characteristics of IP applications is a crucial issue that can form the basis for the development...
Providing Quality of Service (QoS) and Traffic Engineering (TE) capabilities in the internet is essential, especially in supporting the requirement of real- time traffic, as well as mission critical applications. Differentiated Services (DiffServ) is an emerging technology that provides QoS and traffic engineering features in Internet Protocol (IP) Network by programming the IXP2400 Intel Network...
We have developed an identifier/locator split network architecture that uses separate sets of entities for identifiers and locators in order to eliminate certain problems that will arise if conventional Internet architecture, which uses Internet Protocol addresses as both node identifiers and locators, is used in the new generation network, which will have a very large number of heterogeneous devices...
In todaypsilas service provider networks MPLS traffic engineering (MPLS TE) is one of the fastest growing implementation. MPLS adoption in service provider networks has increased manifold due to its inherent TE capabilities. A purpose of traffic engineering in a network is to setting up paths between the edge nodes of the network to meet traffic demands while optimizing network performance. It is...
The resource reservation protocol (RSVP) was originally proposed as a signaling protocol to be used within a QoS architecture for IP networks. However, the modularity and extensibility of the protocol has led to its adoption as a generic signaling protocol that may be used to deliver control plane information to nodes in an IP network. RSVP with traffic engineering (TE) extensions, RSVP-TE, is used...
Currently used IP routing protocols calculate and only use a single path between two nodes of a network, or in the best case, only paths with the same cost (with OSPF2 or IS-IS extension: ECMP). If we want to use the underlying physical network with multipath routing efficiently, the loopfreeness of the used paths has to be guaranteed especially with distributed computation. Indeed different types...
Transmission control protocol (TCP) provides reliable end-to-end data communication under unpredictable and dynamic network conditions. Different variants of TCP have been proposed which show varying degree of resilience in best effort IP networks characteristics. Multi-protocol label switching (MPLS) has proven strength in providing quality of service based data services due to its traffic engineering...
In the Internet today, traffic engineering is performed assuming that the offered traffic is inelastic. In reality, end hosts adapt their sending rates to network congestion, and network operators adapt the routing to the measured traffic. This raises the question of whether the joint system of congestion control and routing is stable and optimal. Using established optimization models for TCP and...
Scaling behaviors of traffic influence network modeling, service providing and traffic engineering. So it has been the focus of many researches. In this paper, an extensive wavelet analysis is performed to the TCP flows. The results show that the TCP flows exhibit non-stationary and uncorrelated scaling behaviors at the small-time scales (1-100 ms). To identify the non-stationary and small-time scaling...
The paper considers a TCP/IP-style network with flow control at end-systems based on congestion feedback, and routing decisions at network nodes on a per-destination basis. The only generalization with respect to standard IP is that routers split their traffic, for each destination, among their outgoing links. We pose two optimization problems, that generalize and combine those used in the congestion...
The advanced information technology (IT) will promote the transformation of communities the world over into an information society and a knowledge-based economy in the next generation. During the past years, the explosive growth of the Internet's popularity has brought a great number of changes in the telecommunications area. The current Internet Protocol (IP)-based networks face tremendous requirements...
In order to preserve quality of service (QoS) in a computer network, implementation of traffic engineering (TE) techniques is critical to meet congestion control. In this paper a systematic control strategy based on discrete time sliding mode control considering the dynamics of the window based TCP flow is proposed. Robustness of the designed controller against disturbance and delay variations has...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.