JRHRLWx - SIUE Computer Science
Download
Report
Transcript JRHRLWx - SIUE Computer Science
Michael Jenkins Presents:
Host-to-Host Congestion Control
for TCP
By:
Alexander Afanasyev, Neil Tilley
Peter Reiher, and Leonard
Kleinrock
•
http://lesfuretsdeiffage.com/wp-content/uploads/COURSE-DU-VIADUC-DE-MILLAU-PhotoVO2-MAGAZINE.jpg
Congestion Control needs to be
Updated to Increase the
Functionality of TCP
•
•
•
•
Standard Sliding Window
No notifications from the network
Intelligent solutions
Different network types
Congestion Collapse
• As a network becomes congested, the
amount of acknowledged packets
decrease
• Slow Start and Congestion Avoidance
• TCP Tahoe
• TCP Reno
Packet Reordering
• Multiple duplicated acknowledgements
• Differentiation between transmitted and
Retransmitted Packets
• TCP Eifel
/
High-Speed Long-Delay Networks
• Optical Vs Satellite Networks
• Standard algorithms do not efficiently
work on high-speed networks.
• HS-TCP (High-Speed TCP)
Feature Research
• No universal congestion control
approach for every network type
• Rules to measure packet loss
• Short-Lived Flows
• Fairness between TCP flows
• Excusive buffering Syndrome
Michael Jenkins Presents:
Host-to-Host Congestion Control
for TCP
By:
Alexander Afanasyev, Neil Tilley
Peter Reiher, and Leonard
Kleinrock
•
http://lesfuretsdeiffage.com/wp-content/uploads/COURSE-DU-VIADUC-DE-MILLAU-PhotoVO2-MAGAZINE.jpg
Presented by:
Tony Reveldez
GEOFF
HUSTON
B.Sc., M.Sc.
Australian
National
University
MATTIA
ROSSI
B.Eng.,M.Sc.
LeopoldFranzensUniversitaet
GEOFF
ARMITAGE
B.Sc., PhD.
Swinburne
University of
Technology
9
Border Gateway Protocol
What is it?
iBGP vs eBGP
TCP/IP
Distant Vector Routing
Path Vector Routing
Route Selection Process
Messages
AS Path
10
BGP Threat Model
Securing the BGP Session
Injection, eavesdropping, delay messages, replay
Verifying BGP Identity
Are you really who you claim to be?
Verifying BGP Information
Is your information complete?
Verifying Forwarding Paths
Is my information accurate?
11
Consequences of Attacks on the
Routing System
The ability to eavesdrop
Denial of Service
the potential to masquerade
Address Stealing
www.fireblog.com
12
Securing BGP
The Security Toolset
Security Requirements
Securing the data payload and semantics
Piecemeal incremental deployment
Approaches to Securing BGP
sBGP, soBGP, psBGP, pgBGP, IRV
13
Approaches to Securing
BGP
Securing the operation of BGP
TCP session
GTSM
TCP MD5
IPSEC
Security in the Data Level
14
Securing the Integrity of BGP
Data
sBGP
soBGP
psBGP
IRV
pgBGP
15
State of BGP Security
As the table shows, of all proposals, only a few have been implemented
and mostly not deployed
16
by Sommer, Gunreben, Feller, Kohn,
Mifdaoui, SaB, & Scharf
Presented by Isaac Hatton
Ethernet’s Success
•
•
•
•
•
Scalability
Adaptability
Bandwidth
Reliability
Availability
Plant Level – comprises an entire production
facility and connects a large number of
factory cells an machine process controllers
Control Level – connects a moderate
number of specialized computer devices
such as machine control system over a
moderately large area
Device Level – enables communication
between sensors and actuators
Control Domain
• Diagnostics
• Driver Assist
• Safety
Infotanment Domain
• GPS Navigation
• Displays
• Voice Recognition
• In-Vehicle Audio
• Video Displays
• In-vehicle Wireless Internet
• Phone Integration
• Bluetooth
• Satellite & HD Radio
Performance
Requirements
• Low latency
• Jitter constraints
• Deterministic
behavior
Safety Requirements
• Reliability
• Integrity
• Redundancy
• Security
KEVIN REISINGER Presents…
A SURVEY OF PRICING
SCHEMES IN WIRELESS
NETWORKS
Christos A Gizelis
University of Aegean
Mytilene, Greece
Dimitrios D. Vergados
University of the Aegean
Mytilene, Greece
GOALS OF WIRELESS
PRICING SCHEMES
• Assure continuous quality of service.
• Maximize profits for service providers
QUALITY OF SERVICE
CHALLENGES
• Tracking the location of subscribers.
• Ensure continuous connectivity when
moving between networks.
• Avoid service termination due to the
lack of bandwidth
PRICING SCHEMES
Static Schemes
Subscribers are charged
a pre-defined amount
for their service.
Dynamic Schemes
Service priorities can be
modified according to the
subscriber’s network
demands.
STATIC PRIORITY
PRICING
• Bandwidth is shared among all
subscribers.
• Subscribers are allowed to select
their priority class.
DYNAMIC PRIORITY
PRICING
• Priority classes can be modified
during the service usage.
• Network resources are optimized by
guaranteed bandwidth.
OTHER NOTABLE
PRICING SCHEMES
Cumulus Pricing
(Static)
Probabilistic Pricing
(Dynamic)
• Subscribers pay a flat
rate based on their
expected resource
requirements.
• Future demand for a
service is predicted using
historical data.
• If that limit is exceeded,
the contract is renegotiated.
• The service provider sets
the prices according to
demand.
Questions?
David Lynn Presents…
HANDOVER IN MOBILE
WIMAX NETWORKS: THE
STATE OF ART AND
RESEARCH ISSUES
Sayan
Kumar Ray
Krzysztof
Harsha
Pawlikowski Sirisena
HARD HANDOVERS
•Acquisition Phase
•BS advertises the Network Topology
•Scanning of advertised neighboring BSs and MS
•Ranging and Optional Association Activates
•Actual Handover Phase
•Deciding on the TBS
•Initiating the Handover
•TBS synchronization and Ranging Process
•Authorization and Registration Phase
FAST BASE STATION SWITCHING
HANDOVERS
•Diversity Set Updating
•Updating and Selecting the new ABS
•Handover Occurrence
RESEARCH ISSUES: LAYER 2 HANDOVER
ISSUES
Excessive Scanning
and Associating
Activates
Optimizing Scanning
Interval
Efficient Exploitation
of DL and UL Signals
Wastage of Ranging
Slots
Prolonged Handover
Connection
Disruption Time
Network Re-Entry
Activity due to Ping
Pong Effects
IP Connectivity
Delay during
Network Re-entry
Optimizing
Handover-based
Load Distribution
http://www.integration1.com.au/NetSecScanInfo.htm
http://directorblue.blogspot.com/2008/12/importance-of-load-distribution.html
http://chaka4612.blogspot.com/2011/11/family-time-and-ping-pong.html
http://science.howstuffworks.com/apollo-spacecraft7.htm
http://cnx.org/content/m13596/latest/
http://www.winnersedgetrading.com/forex-signal-gbpusd/
http://www.playslots.org.uk/
RESEARCH ISSUES: LAYER 2 HANDOVER
SOLUTIONS
Select the potential TBS
before the scanning
operations.
MAC management
message can enable the
MS to receive traffic
immediately after the
handover.
NBSs can exchange
configuration
parameters.
Traffic for MS will remain
buffered in the SBS for a
set amount of time.
MS’s uplink signal
strengths and SBS’s
downlink signal
strengths.
Selection of the TBS prior
to the handover
preregistration phase.
TBS know the MS’s
previous AR and the IP
address.
BS-initiated directed
handovers and MSinitiated rescue
handovers are conducted
in parallel.
RESEARCH ISSUES: LAYER 3 HANDOVER
ISSUES
Large L3 Handover
Latency
MAC State Migration
Problem
http://applewallpapers.net/view/mac_os_wallpaper-1440x900.html
http://capitalmarketalerts.com/living-with-no-growth/slow-road-sign-378px/
http://anchorsholme.org.uk/2012/01/2580/hand-over-keys/
Interworking with
MIPv6
RESEARCH ISSUES: LAYER 3 HANDOVER
SOLUTIONS
Timely indication of
organized L2 triggers.
Serving network can
buffer the IP packets
meant for the MS to
reset the lost MAC
frames.
FMIPv6, HMIPv6 and
PMIPv6.
RESEARCH ISSUES: LAYER 2&3 HANDOVER
ISSUES & SOLUTIONS
Explicit HO Notification
to Upper Layers
Imprecise L2 Triggers
Seamless Integration of
L2 and L3 Mobility
Management Messages
Two-Way Cross-Layer
Handover Information
Flow
Explicit L2 to L3 event
triggers during the
various stages of the
overall MWiMAX HO
activity.
Send the L2-HO trigger
early enough to the
upper layers in the
form of predicted RSSI
values.
Removal of related HO
management messages
from both the
MWiMAX L2 and L3
HO.
Multiple event and
command services to
improve the FMIPv6
HO support over the
MWIMAX MAC.
http://news.softpedia.com/newsImage/Imprecise-Chips-Could-Revolutionize-Electronics-2.jpg/
http://hackbymak.blogspot.com/2012/02/get-notification-when-any-program.html
http://dna-of-humancapital.blogspot.com/2011/03/end-of-managementlong-live-management.html
http://www.nowpublic.com/environment/massive-river-flow-through-arctic
A Survey of Protocols to Support
IP Mobility in Aeronautical
Communications
Written by
Christian Bauer
Martina Zitterbart
Presented by
Corey Whitley
Aeronautical Telecommunication
Network
The Old
◦ Analog
◦ Overloaded
The New
◦ Digital (IPv6 Based)
◦ Unified
Air Traffic Services (ATS)
Airline Operational Communications (AOC)
Airline Administrative Communications (AAC)
Aeronautical Passenger Communications (APC)
creategenius.com
Mobile Topology
Network A
Network B
Correspondent
Node
Mobility Requirements
Secondary
Mobile Network
Support
Convergence
Time
Session
Continuity
Inherent
Applicability
to ACC/APC
(Routing)
Scalability
HEADER
PAYLOAD
Packet
Overhead
Multihoming
RTT Overhead
Security
(Masquerading)
Support for Ground-Initiated
Communication
End-toEnd Delay
Security
(DoS)
Primary
freestockphotos.biz; en.clipart-fr.com; clker.com; artalbum.org.ua; openclipart.org
Solutions
BGP
HIP
NEMO
HEADER
PAYLOAD
IPsec
SCTP
NEMO Signaling
Mobile Router
Binding Update
Binding Update
Packet
Mobile Network Node
Access
Network A
Records show that the destination
is accessable through Network A.
(CoA)
Access
Network B
Binding Ack
Home Agent
This Mobile Router is
accessible through
Network A (CoA)
The Mobile Router is
now accessible
through Network B
(CoA)
Correspondent
Node
Packet
NEMO Analysis
Secondary
Mobile Network
Support
Convergence
Time
RTT Overhead
Packet
Overhead
Support for Ground-Initiated
Communication
Session
Continuity
Inherent
Applicability
to ACC/APC
(Routing)
Scalability
Multihoming
Security
(Masquerading)
End-toEnd Delay
Security
(DoS)
Primary
easyvectors.com
Route Optimization
MNN
MR
HEADER
PAYLOAD
Access
Network
Correspondent
Node
Adaptability
Correspondent
Router
Separability
MNN to CN
MR to CN
Access
Network A
Mobile
Router
Multihoming
Access
Network B
Efficient
Signaling
MR to CR
Security
MR to HA
Home Agent
Correspondent
Node
Home Agent