• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 29
  • 7
  • 4
  • 3
  • Tagged with
  • 45
  • 45
  • 32
  • 13
  • 12
  • 12
  • 11
  • 10
  • 10
  • 9
  • 9
  • 8
  • 7
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Toward an internet protocol (version 6) deployable information-centric framework

Heath, Laura 12 January 2015 (has links)
This research defines a new information-centric networking (ICN) framework and associated protocol that is implementable in the existing internet with feasible minimal changes to the existing internet infrastructure. We create a protocol that assigns globally unique data item names and embeds these names, plus associated metadata, into an IPv6 header. This technique allows the use of the existing IPsec suite of protocols to mitigate user privacy and security concerns which exist in other existing non-implementable ICN designs. We demonstrate that this technique allows the use of standard routing and switching methods, which ensures network stability and reachability, and it permits self-assembly into internetworks. Next, we analyze the layer four functionality which must be provided by a general-purpose transport protocol, and we give an initial implementation which is used by our prototype. Lastly, using the Mininet network virtualization suite, we show that using RFC-compliant IPv6 datagrams as the named content allows information-centric routing and switching to be done using unmodified hardware and software, and that it also ensures backwards compatibility with unmodified networks.
2

Two challenges of software networking : name-based forwarding and table verification / Deux défis des réseaux logiciels : relayage par le nom et vérification des tables

Linguaglossa, Leonardo 09 September 2016 (has links)
Cette thèse aborde des problèmes liés à deux aspects majeurs de l'évolution d'Internet : l'aspect«comportemental», qui correspond aux nouvelles interactions entre les utilisateurs et le réseau, et l'aspect «structurel», lié aux changements d'Internet d'un point de vue architectural.Le manuscrit est composé d'un chapitre introductif qui donne les grandes lignes de recherche de ce travail de thèse, suivi d'un chapitre consacré à la description de l'état de l'art sur les deux aspects mentionnés ci-dessus. Parmi les solutions proposées par la communauté scientifique pour s'adapter à l'évolution d'Internet, deux nouveaux paradigmes réseaux sont particulièrement décrits : Information- Centric Networking (ICN) et Software-Defined Networking (SDN).La thèse continue avec la proposition de «Caesar», un dispositif réseau, inspiré par ICN, capable de gérer la distribution de contenus à partir de primitives de routage basées sur le nom des données et non les adresses des serveurs. Caesar est présenté dans deux chapitres, qui décrivent l'architecture et deux des principaux modules : le relayage et la gestion de la traçabilité des requêtes.La suite du manuscrit décrit un outil mathématique pour la détection efficace de boucles dans un réseau SDN d'un point de vue théorique. Les améliorations de l'algorithme proposé par rapport à l'état de l'art sont discutées. „,La thèse se conclue par un résumé des principaux résultats obtenus et une présentation des travaux en cours et futurs. / This thesis addresses two major aspects of the Internet evolution problem: a behavioral aspect, corresponding to a new type of interactions between users and the network, and a structural aspect, which refers to the evolution problem from an architectural point of view.The manuscript consists of an introductory chapter which outlines the research directions of this thesis, followed by a chapter on the description of the state of the art on the two aforementioned aspects.Among the solutions proposed by the scientific community to adapt to the evolution of the Internet, two new network paradigms are described: Information- Centric Networking (ICN) and Software-Defined Networking (SDN).The thesis continues with the description of "Caesar", a network device, inspired by ICN, capable of managing the distribution of content using forwarding primitives based on the content name and not a server address. Caesar is presented in two chapters describing the architecture of two main modules: theforwarding module, and the pending request management.The second part of the manuscript describes a mathematical tool for the effective loop detection in an SDN network from a theoretical point of view. Some algorithms are proposed and the improvements with respect ta the prior work are discussed.The thesis is concluded with a summary of the main results and a presentation of current and future work.
3

Performance analysis and optimisation of in-network caching for information-centric future Internet

Wang, Haozhe January 2017 (has links)
The rapid development in wireless technologies and multimedia services has radically shifted the major function of the current Internet from host-centric communication to service-oriented content dissemination, resulting a mismatch between the protocol design and the current usage patterns. Motivated by this significant change, Information-Centric Networking (ICN), which has been attracting ever-increasing attention from the communication networks research community, has emerged as a new clean-slate networking paradigm for future Internet. Through identifying and routing data by unified names, ICN aims at providing natural support for efficient information retrieval over the Internet. As a crucial characteristic of ICN, in-network caching enables users to efficiently access popular contents from on-path routers equipped with ubiquitous caches, leading to the enhancement of the service quality and reduction of network loads. Performance analysis and optimisation has been and continues to be key research interests of ICN. This thesis focuses on the development of efficient and accurate analytical models for the performance evaluation of ICN caching and the design of optimal caching management schemes under practical network configurations. This research starts with the proposition of a new analytical model for caching performance under the bursty multimedia traffic. The bursty characteristic is captured and the closed formulas for cache hit ratio are derived. To investigate the impact of topology and heterogeneous caching parameters on the performance, a comprehensive analytical model is developed to gain valuable insight into the caching performance with heterogeneous cache sizes, service intensity and content distribution under arbitrary topology. The accuracy of the proposed models is validated by comparing the analytical results with those obtained from extensive simulation experiments. The analytical models are then used as cost-efficient tools to investigate the key network and content parameters on the performance of caching in ICN. Bursty traffic and heterogeneous caching features have significant influence on the performance of ICN. Therefore, in order to obtain optimal performance results, a caching resource allocation scheme, which leverages the proposed model and targets at minimising the total traffic within the network and improving hit probability at the nodes, is proposed. The performance results reveal that the caching allocation scheme can achieve better caching performance and network resource utilisation than the default homogeneous and random caching allocation strategy. To attain a thorough understanding of the trade-off between the economic aspect and service quality, a cost-aware Quality-of-Service (QoS) optimisation caching mechanism is further designed aiming for cost-efficiency and QoS guarantee in ICN. A cost model is proposed to take into account installation and operation cost of ICN under a realistic ISP network scenario, and a QoS model is presented to formulate the service delay and delay jitter in the presence of heterogeneous service requirements and general probabilistic caching strategy. Numerical results show the effectiveness of the proposed mechanism in achieving better service quality and lower network cost. In this thesis, the proposed analytical models are used to efficiently and accurately evaluate the performance of ICN and investigate the key performance metrics. Leveraging the insights discovered by the analytical models, the proposed caching management schemes are able to optimise and enhance the performance of ICN. To widen the outcomes achieved in the thesis, several interesting yet challenging research directions are pointed out.
4

SECURITY RESEARCH FOR BLOCKCHAIN IN SMART GRID

Sang, Lanqin 01 May 2023 (has links) (PDF)
Smart grid is a power supply system that uses digital communication technology to detect and react to local changes for power demand. Modern and future power supply system requires a distributed system for effective communication and management. Blockchain, a distributed technology, has been applied in many fields, e.g., cryptocurrency exchange, secure sharing of medical data, and personal identity security. Much research has been done on the application of blockchain to smart grid. While blockchain has many advantages, such as security and no interference from third parties, it also has inherent disadvantages, such as untrusted network environment, lacking data source privacy, and low network throughput.In this research, three systems are designed to tackle some of these problems in blockchain technology. In the first study, Information-Centric Blockchain Model, we focus on data privacy. In this model, the transactions created by nodes in the network are categorized into separate groups, such as billing transactions, power generation transactions, etc. In this model, all transactions are first encrypted by the corresponding pairs of asymmetric keys, which guarantees that only the intended receivers can see the data so that data confidentiality is preserved. Secondly, all transactions are sent on behalf of their groups, which hides the data sources to preserve the privacy. Our preliminary implementation verified the feasibility of the model, and our analysis demonstrates its effectiveness in securing data source privacy, increasing network throughput, and reducing storage usage. In the second study, we focus on increasing the network’s trustworthiness in an untrusted network environment. A reputation system is designed to evaluate all node’s behaviors. The reputation of a node is evaluated on its computing power, online time, defense ability, function, and service quality. The performance of a node will affect its reputation scores, and a node’s reputation scores will be used to assess its qualification, privileges, and job assignments. Our design is a relatively thorough, self-operated, and closed-loop system. Continuing evaluation of all node’s abilities and behaviors guarantees that only nodes with good scores are qualified to handle certain tasks. Thus, the reputation system helps enhance network security by preventing both internal and external attacks. Preliminary implementation and security analysis showed that the reputation model is feasible and enhances blockchain system’s security. In the third research, a countermeasure was designed for double spending. Double spending is one of the two most concerned security attacks in blockchain. In this study, one of the most reputable nodes was selected as detection node, which keeps checking for conflict transactions in two consecutive blocks. Upon a problematic transaction was discovered, two punishment transactions were created to punish the current attack behavior and to prevent it to happen in future. The experiment shows our design can detect the double spending effectively while using much less detection time and resources.
5

A multifold approach to address the security issues of stateful forwarding mechanisms in Information-Centric Networks / Une approche multidimensionnelle pour aborder les problèmes de sécurité des mécanismes d'acheminement à états dans les réseaux orientés contenus

Signorello, Salvatore 21 June 2018 (has links)
Ce travail illustre comment les tendances actuelles d'utilisation dominantes sur Internet motivent la recherche sur des architectures futures de réseau plus orientées vers le contenu. Parmi les architectures émergentes pour l'Internet du futur, le paradigme du Information-Centric Networking (ICN) est présenté. ICN vise à redéfinir les protocoles de base d'Internet afin d'y introduire un changement sémantique des hôtes vers les contenus. Parmi les architectures ICN, le Named-Data Networking (NDN) prévoit que les demandes nommées de contenus des utilisateurs soient transmises par leur nom dans les routeurs le long du chemin d'un consommateur à une ou plusieurs sources de contenus. Ces demandes de contenus laissent des traces dans les routeurs traversés qui sont ensuite suivis par les paquets de contenus demandés. La table d'intérêt en attente (PIT) est le composant du plan de données de l'NDN qui enregistre temporairement les demandes de contenus acheminés dans les routeurs. D'une part, ce travail explique que le mécanisme d'acheminement à états de la PIT permet des propriétés comme l'agrégation de requêtes, le multicast de réponses et le contrôle natif de flux hop-by-hop. D'autre part, ce travail illustre comment l'acheminement à états de la PIT peut facilement être mal utilisé par des attaquants pour monter des attaques de déni de service distribué (DDoS) disruptives, appelées Interest Flooding Attacks (IFAs). Dans les IFAs, des botnets vaguement coordonnés peuvent inonder le réseau d'une grande quantité de demandes difficiles à satisfaire dans le but de surcharger soit l'infrastructure du réseau soit les producteurs de contenus. Ce travail de thèse prouve que bien que des contre-mesures contre les IFAs aient été proposées, il manque une compréhension complète de leur efficacité réelle puisque celles-ci ont été testées sous des hypothèses simplistes sur les scénarios d'évaluation. Dans l'ensemble, le travail présenté dans ce manuscrit permet de mieux comprendre les implications des IFAs et les opportunités d'améliorer les mécanismes de défense existants contre ces attaques. Les principales contributions de ce travail de thèse tournent autour d'une analyse de sécurité du plan d'acheminement dans l'architecture NDN. En particulier, ce travail définit un modèle d'attaquant plus robuste pour les IFAs à travers l'identification des failles dans les contre-mesures IFA existantes. Ce travail introduit un nouvel ensemble d'IFAs basé sur le modèle d'attaquant proposé. Les nouveaux IFAs sont utilisés pour réévaluer les plus efficaces contre-mesures IFA existantes. Les résultats de cette évaluation réfutent l'efficacité universelle des mécanismes de défense existants contre l'IFA et, par conséquent, appellent à différentes contre-mesures pour protéger le NDN contre cette menace de sécurité. Pour surmonter le problème révélé, ce travail définit également des contre-mesures proactives contre l'IFA, qui sont de nouveaux mécanismes de défense contre les IFA inspirés par les problèmes rencontrés dans l'état de l'art. Ce travail présente Charon, une nouvelle contre-mesure proactive contre l'IFA, et la teste contre les nouvelles IFAs. Ce travail montre que Charon est plus efficace que les contre-mesures IFA réactives existantes. Enfin, ce travail illustre la conception NDN.p4, c'est-à-dire la première implémentation d'un protocole ICN écrit dans le langage de haut niveau pour les processeurs de paquets P4. Le travail NDN.p4 est la première tentative dans la littérature visant à tirer parti des nouveaux techniques de réseaux programmables pour tester et évaluer différentes conceptions de plan de données NDN. Cette dernière contribution classe également les mécanismes alternatifs d'acheminement par rapport à un ensemble de propriétés cardinales de la PIT. Le travail souligne qu'il vaut la peine d'explorer d'autres mécanismes d'acheminement visant à concevoir un plan de données NDN moins vulnérable à la menace IFA / This work illustrates how today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the emerging future Internet proposals, the promising Information-Centric Networking (ICN) research paradigm is presented. ICN aims to redesign Internet's core protocols to promote a shift in focus from hosts to contents. Among the ICN architectures, the Named-Data Networking (NDN) envisions users' named content requests to be forwarded by their names in routers along the path from one consumer to 1-or-many sources. NDN's requests leave trails in traversed routers which are then followed backwards by the requested contents. The Pending Interest Table (PIT) is the NDN's data-plane component which temporarily records forwarded content requests in routers. On one hand, this work explains that the PIT stateful mechanism enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, this work illustrates how the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets can flood the network with a large amount of hard to satisfy requests with the aim to overload both the network infrastructure and the content producers. This work proves that although countermeasures against IFAs have been proposed, a fair understanding of their real efficacy is missing since those have been tested under simplistic assumptions about the evaluation scenarios. Overall, the work presented in this manuscript shapes a better understanding of both the implications of IFAs and the possibilities of improving the state-of-the-art defense mechanisms against these attacks. The main contributions of this work revolves around a security analysis of the NDN's forwarding plane. In particular, this work defines a more robust attacker model for IFAs by identifying flaws in the state-of-the-art IFA countermeasures. This work introduces a new set of IFAs built upon the proposed attacker model. The novel IFAs are used to re-assess the most effective existing IFA countermeasures. Results of this evaluation disproves the universal efficacy of the state-of-the-art IFA defense mechanisms and so, call for different countermeasures to protect the NDN against this threat. To overcome the revealed issue, this work also defines proactive IFA countermeasures, which are novel defense mechanisms against IFAs inspired by the issues with the state-of-the-art ones. This work introduces Charon, a novel proactive IFA countermeasure, and tests it against the novel IFA attacks. This work shows Charon counteracts latest stealthy IFAs better than the state-of-the-art reactive countermeasures. Finally, this work illustrates the NDN.p4 design, that is, the first implementation of an ICN protocol written in the high-level language for packet processors P4. The NDN.p4 work is the first attempt in the related literature to leverage novel programmable-networks technologies to test and evaluate different NDN forwarding plane designs. This last contribution also classifies existing alternative forwarding mechanisms with respect to a set of PIT cardinal properties. The work outlines that it is worth to explore alternative forwarding mechanisms aiming to design an NDN forwarding plane less vulnerable to the IFA threat
6

Resource and crowd management in mobile networks / Gestion de ressources et de congestion dans les réseaux mobiles

Hoteit, Sahar 19 September 2014 (has links)
L’Internet a été initialement conçu pour servir des usages fixes et sédentaires, cependant les projections montrent que les futurs utilisateurs d'Internet seront de plus en plus mobiles. A l'heure actuelle, la rapidité avec laquelle cette évolution se déroule et la gestion souvent insuffisante des réseaux d'accès représentent un obstacle majeur au développement de services avancés. Afin de résoudre ces problèmes et répondre aux besoins de l'Internet mobile, les fournisseurs de services ont besoin de maîtriser l'expansion de la capacité nécessaire dans leurs réseaux de collecte, sinon le trafic de donnés va pouvoir boucher leurs réseaux dans le futur. Le déploiement des nouvelles générations de réseaux fournit des hautes bandes passantes et débits mais implique souvent des grandes dépenses en capital et en exploitation. Une alternative économiquement et techniquement viable est représentée par les solutions de déchargement du trafic mobile. Ces solutions peuvent réduire la surcharge sur le spectre radio et sur les stations de base et sur le réseau de collecte. Les solutions de déchargement les plus couramment utilisées sont le déchargement sur les réseaux de femtocellules et les réseaux Wi-Fi. Dans le même contexte, pour résoudre le problème de congestion dans le réseau cellulaire, une nouvelle solution est récemment apparue: Information Centric networking permettant la mise en cache des contenus dans le réseau ce qui minimise le temps d'accès aux contenus. L'objectif de cette thèse est donc d'étudier ces nouvelles solutions de déchargement de trafic et de contenu dans les réseaux cellulaires en prenant en considération les schémas de mobilité et les comportements humains. / The Internet was initially conceived to serve fix and sedentary usages, while current socio-technological trends clearly show that future Internet users will be increasingly mobile and nomadic. At present, the speed at which this evolution takes place and the inadequate management of access networks represent a major obstacle in the development of advanced services. To solve these problems and to meet the needs of mobile Internet, service providers need to master the needed capacity expansion in their backhauling network, otherwise the data traffic will clog their networks in the future. Next-generation network deployments promise to deliver higher bandwidth and speed, but they often imply high capital and operational expenditures. An alternative economically and technically viable way is represented by mobile data offloading solutions. These solutions can reduce the load on radio spectrum, on base stations and on backhauling network. The most commonly used offloading solutions are over small-networks and over Wi-Fi networks. In the same context, and in order to solve the problem of congestion in the cellular network, a new solution has emerged recently : Information Centric Networking for in-network caching that permits to minimize content access latency. The objective of this thesis is to study these new traffic and content offloading solutions in cellular networks while taking into account the mobility patterns and human behavior.
7

Connected cars : a networking challenge and a computing resource for smart cities / Voitures connectées : un défi de réseautage et une ressource de calcul pour les villes intelligentes

Grassi, Giulio 31 October 2017 (has links)
Récemment, les villes sont devenues "de plus en plus intelligentes", avec une multitude de périphériques IoT et de capteurs déployés partout. Parmi ces objets intelligents, les voitures peuvent jouer un rôle important. Les véhicules sont (ou seront), en effet, équipés avec plusieurs interfaces réseau, ils ont (ou auront) des capacités de calcul et des dispositifs capables d'analyser l'environnement. Pour réaliser le concept de "connected-car" il faut un changement de modèle Internet, à partir d'une architecture centrée sur l'hôte (IP) vers un paradigme centré sur l'information, comment l'architecture ICN (Information Centric Networking). Cette thèse analyse ainsi les avantages et les défis du paradigme ICN, en particulier du Named Data Networking (NDN), dans le domaine VANET, en présentant la première implémentation de NDN pour VANET (V-NDN). Il propose ensuite Navigo, un mécanisme de forwarding basé sur NDN pour la récupération de contenu en utilisant les communications V2V et V2I. Ensuite, le problème de la mobilité des fournisseurs de données est traité, proposant une solution distribuée basée sur NDN, MAP-Me. Toutefois, le rôle du véhicule dans les villes intelligentes ne s'arrête pas au niveau de la connectivité. Les voitures, avec leurs nouvelles capacités de calcul, sont les candidates idéales pour jouer un rôle dans l'architecture Fog Computing, en déplaçant des tâches de calcul vers l'edge du réseau. En tant que preuve de concept, cette thèse présente ParkMaster, un système qui combine les techniques de machine learning, le cloud et l'edge pour analyser l'environnement et traiter le problème de la disponibilité du stationnement. / In the recent years we have seen a continuous integration of technology with the urban environment. This fusion aims to improve the efficiency and the quality of living in big urban agglomerates, while reducing the costs for their management. Cities are getting “smarter and smarter”, with a plethora of IoT devices and sensors deployed all over the urban areas. Among those intelligent objects, an important role may be played by cars. Modern vehicles are (or will be) indeed equipped with multiple network interfaces, they have (or will have) computational capabilities and devices able to sense the environment. However, smart and connected cars do not represent only an opportunity, but also a challenge. Computation capabilities are limited, mobility and the diversity of network interfaces are obstacles when providing connectivity to the Internet and to other vehicles. When addressing the networking aspect, we believe that a shift in the Internet model is needed, from a host oriented architecture (IP) to a more content focused paradigm, the Information Centric Networking (ICN) architectures. This thesis thus analyzes the benefits and the challenges of the ICN paradigm, in particular of Named Data Networking (NDN), in the VANET domain, presenting the first implementation running on real cars of NDN for VANET (V-NDN). It then proposes Navigo, an NDN based forwarding mechanism for content retrieval over V2V and V2I communications, with the goal of efficiently discovering and retrieving data while reducing the network overhead. Networking mobility is not only a challenge for vehicles, but for any connected mobile device. For this reason, this thesis extends its initial area of interest — VANET — and addresses the network mobility problem for generic mobile nodes, proposing a NDN-based solution, dubbed MAP–Me. MAP-Me tackles the intra-AS content provider mobility problem without relying on any fixed node in the network. It exploits notifications messages at the time of a handover and the forwarding plane to maintain the data provider “always” reachable.Finally, the “connected car” concept is not the only novel element in modern vehicles. Cars indeed won’t be only connected, but also smart, able to locally process data produced by in-car sensors. Vehicles are the perfect candidates to play an important role in the recently proposed Fog Computing architecture. Such an architecture moves computational tasks typical of the cloud away from it and brings them to the edge, closer to where the data is produced. To prove that such a model, with the car as computing edge node, is already feasible with the current technology and not only a vision for the future, this thesis presents ParkMaster. Parkmaster is a fully deployed edge-based system that combines vision and machine learning techniques, the edge (driver’s smartphone) and the cloud to sense the environment and tackle the parking availability problem.
8

Leveraging relations among objects to improve the performance of information-centric networks / Utilizando relações entre objetos para melhorar o desempenho de redes orientadas a conteúdo

Antunes, Rodolfo Stoffel January 2016 (has links)
Redes Orientadas a Conteúdo (Information-Centric Networks, ICN) são um novo paradigma de comunicação criado para aproximar as infraestruturas de rede às necessidades de sistemas de distribuição de conteúdo. ICN utiliza mecanismos de roteamento e cache projetados para atender requisições por objetos de dados unicamente identificados e desassociados de um localizador fixo. Até o momento, pesquisas sobre ICN focaram principalmente na avaliação de aspectos arquiteturais, tais como o desempenho de diferentes esquemas de roteamento e cache. Entretanto, o método aplicado para distribuir dados utilizando o conceito de objetos também pode impactar a comunicação em uma ICN. Esta tese explora um modelo que permite a distribuição de um conteúdo através de múltiplos objetos de dados. Emprega-se o conceito de relações, definidas como elos entre dois objetos indicando que os dados de um complementam de alguma forma os dados do outro. Tal modelo baseado em relações permite que clientes identifiquem e recuperem os objetos necessários para a reconstrução do conteúdo. Ele é agnóstico ao formato de dados das aplicações, suporta diferentes estruturas de relações e é retrocompatível com especificações atuais de arquiteturas ICN. Também discute-se os principais aspectos de projeto relativos à implementação do modelo na arquitetura NDN. Para avaliar o impacto de relações no desempenho da rede e aplicações, foi realizada uma série de experimentos com dois estudos de caso baseados em cenários relevantes da Internet atual, sendo eles: conteúdo multimídia e páginasWeb. O estudo de caso sobre conteúdo multimídia explora um cenário favorável, no qual relações apresentam uma sobrecarga negligível em contraste ao grande volume de dados dos conteúdos. Os resultados deste estudo de caso mostram que, em comparação com a implementação padrão do NDN, o uso de relações pode reduzir os tempos de download em 34% e o tráfego de rede em 43%. Por sua vez, o estudo de caso sobre páginasWeb explora um cenário no qual relações geram um impacto não negligível na rede e aplicações. A análise deste cenário mostra que, mesmo com a sobrecarga adicional gerada pelas relações, o mecanismo pode reduzir, em média, o tempo de download dos clientes em 28% e o tráfego de rede em 34%. / Information-Centric Networking (ICN) is a communication paradigm created to align the network infrastructures to the needs of content distribution systems. ICN employs routing and caching mechanisms tailored to fulfill requests for uniquely identified data objects not associated to a fixed locator. So far, research about ICN focused primarily on evaluating architectural aspects, such as the performance of di erent routing and caching schemes. However, the method applied to distribute data using the concept of objects can also impact communications in an ICN. In this thesis, we explore a model that enables the distribution of contents as multiple data objects. We employ the concept of relations, defined as links between two objects indicating that the data from one complements in some way the data from the other. Our model based on relations enables clients to identify and retrieve the data pieces required to reconstruct a content. It is application agnostic, supports di erent relation structures, and is backward-compatible with current ICN specifications. We also discuss the main design aspects related to the implementation of the model in the Named Data Networking (NDN) architecture. To evaluate how relations impact network and application performance, we perform a series of experiments with two case studies based on relevant scenarios from the current Internet, namely: multimedia content and Web pages. The multimedia case study explores a favorable scenario in which relations present a negligible overhead in contrast to the high volume of content data. Results from this case study show that, compared to the standard NDN implementation, relations can reduce download times by 34% and network tra c by 43%. In turn, the Web pages case study explores a scenario in which relations generate a non-negligible impact on the network and applications. The analysis of this scenario shows that, even with the additional overhead incurred by relations, the mechanism can reduce on average 28% client download time, and 34%, global network tra c.
9

Paralelizando unidades de cache hierárquicas para roteadores ICN

Mansilha, Rodrigo Brandão January 2017 (has links)
Um desafio fundamental em ICN (do inglês Information-Centric Networking) é desenvolver Content Stores (ou seja, unidades de cache) que satisfaçam três requisitos: espaço de armazenamento grande, velocidade de operação rápida e custo acessível. A chamada Hierarchical Content Store (HCS) é uma abordagem promissora para atender a esses requisitos. Ela explora a correlação temporal entre requisições para prever futuras solicitações. Por exemplo, assume-se que um usuário que solicita o primeiro minuto de um filme também solicitará o segundo minuto. Teoricamente, essa premissa permitiria transferir proativamente conteúdos de uma área de cache relativamente grande, mas lenta (Layer 2 - L2), para uma área de cache mais rápida, porém menor (Layer 1 - L1). A estrutura hierárquica tem potencial para incrementar o desempenho da CS em uma ordem de grandeza tanto em termos de vazão como de tamanho, mantendo o custo. Contudo, o desenvolvimento de HCS apresenta diversos desafios práticos. É necessário acoplar as hierarquias de memória L2 e L1 considerando as suas taxas de transferência e tamanhos, que dependem tanto de aspectos de hardware (por exemplo, taxa de leitura da L2, uso de múltiplos SSD físicos em paralelo, velocidade de barramento, etc.), como de software (por exemplo, controlador do SSD, gerenciamento de memória, etc.). Nesse contexto, esta tese apresenta duas contribuições principais. Primeiramente, é proposta uma arquitetura para superar os gargalos inerentes ao sistema através da paralelização de múltiplas HCS. Em resumo, o esquema proposto supera desafios inerentes à concorrência (especificamente, sincronismo) através do particionamento determinístico das requisições de conteúdos entre múltiplas threads. Em segundo lugar, é proposta uma metodologia para investigar o desenvolvimento de HCS explorando técnicas de emulação e modelagem analítica conjuntamente. A metodologia proposta apresenta vantagens em relação a metodologias baseadas em prototipação e simulação. A L2 é emulada para viabilizar a investigação de uma variedade de cenários de contorno (tanto em termos de hardware como de software) maior do que seria possível através de prototipação (considerando as tecnologias atuais). Além disso, a emulação emprega código real de um protótipo para os outros componentes do HCS (por exemplo L1, gerência das camadas e API) para fornecer resultados mais realistas do que seriam obtidos através de simulação. / A key challenge in Information Centric Networking (ICN) is to develop cache units (also called Content Store - CS) that meet three requirements: large storage space, fast operation, and affordable cost. The so-called HCS (Hierarchical Content Store) is a promising approach to satisfy these requirements jointly. It explores the correlation between content requests to predict future demands. Theoretically, this idea would enable proactively content transfers from a relatively large but slow cache area (Layer 2 - L2) to a faster but smaller cache area (Layer 1 - L1). Thereby, it would be possible to increase the throughput and size of CS in one order of magnitude, while keeping the cost. However, the development of HCS introduces several practical challenges. HCS requires a careful coupling of L2 and L1 memory levels considering their transfer rates and sizes. This requirement depends on both hardware specifications (e.g., read rate L2, use of multiple physical SSD in parallel, bus speed, etc.), and software aspects (e.g., the SSD controller, memory management, etc.). In this context, this thesis presents two main contributions. First, we propose an architecture for overcoming the HCS bottlenecks by parallelizing multiple HCS. In summary, the proposed scheme overcomes racing condition related challenges through deterministic partitioning of content requests among multiple threads. Second, we propose a methodology to investigate the development of HCS exploiting emulation techniques and analytical modeling jointly. The proposed methodology offers advantages over prototyping and simulation-based methods. We emulate the L2 to enable the investigation of a variety of boundary scenarios that are richer (regarding both hardware and software aspects) than would be possible through prototyping (considering current technologies). Moreover, the emulation employs real code from a prototype for the other components of the HCS (e.g., L1, layers management and API) to provide more realistic results than would be obtained through simulation.
10

Enabling information-centric networking : architecture, protocols, and applications

Cho, Tae Won, 1978- 23 November 2010 (has links)
As the Internet is becoming information-centric, network services increasingly demand scalable and efficient communication of information between a multitude of information producers and large groups of interested information consumers. Such information-centric services are growing rapidly in use and deployment. Examples of deployed services that are information-centric include: IPTV, MMORPG, VoD, video conferencing, file sharing, software updates, RSS dissemination, online markets, and grid computing. To effectively support future information-centric services, the network infrastructure for multi-point communication has to address a number of significant challenges: (i) how to understand massive information-centric groups in a scalable manner, (ii) how to analyze and predict the evolution of those groups in an accurate and efficient way, and (iii) how to disseminate content from information producers to a vast number of groups with potentially long-lived membership and highly diverse, dynamic group activity levels? This dissertation proposes novel architecture and protocols that effectively address the above challenges in supporting multi-point communication for future information-centric network services. In doing so, we make the following three major contributions: (1) We develop a novel technique called Proximity Embedding (PE) that can approximate a family of path-ensembled based proximity measures for information-centric groups. We develop Clustered Spectral Graph Embedding (SCGE) that captures the essential structure of large graphs in a highly efficient and scalable manner. Our techniques help to explain the proximity (closeness) of users in information-centric groups, and can be applied to a variety of analysis tasks of complex network structures. (2) Based on SCGE, we develop new supervision based link prediction techniques called Clustered Spectral Learning and Clustered Polynomial Learning that enable us to predict the evolution of massive and complex network structures in an accurate and efficient way. By exploiting supervised information from past snapshots of network structures, our methods yield up to 20% improvement in link prediction accuracy when compared to existing state-of-the-art methods. (3) Finally, we develop a novel multicast infrastructure called Multicast with Adaptive Dual-state (MAD). MAD supports large number of group and group membership, and efficient content dissemination in a presence of dynamic group activity. We demonstrate the effectiveness of our approach in extensive simulation, analysis, and emulation through the real system implementation. / text

Page generated in 0.5101 seconds