Spelling suggestions: "subject:"pcp/Ip (computer network protocol)"" "subject:"pcp/Ip (coomputer network protocol)""
141 |
Network mobility management for next generation mobile systemsPerera, Algamakoralage Eranga Gayani, Electrical Engineering & Telecommunications, Faculty of Engineering, UNSW January 2007 (has links)
The future Internet will need to cater for an increasing number of powerful devices and entire groups of networks to roam in heterogeneous access networks. The current approach towards meeting such requirements, which is to retrofit mobility solutions to different layers of the protocol stack, has given rise to an increasingly fragmented network control layer. Furthermore, retrofitting solutions in an ad-hoc manner to the protocol stack does not provide consistent support from the network to different applications. This lack of a common control layer for facilitating roaming in heterogeneous networking environments represents a crucial challenge both technically and from a user perspective. To this end, a novel mobility architecture forms the basis and the first part of this dissertation. The work on investigating current network mobility solutions and improving these solutions if deemed necessary, in order to reuse within the novel mobility architecture constitutes the second part of this dissertation. The IETF standard protocol for network mobility was implemented and its performance was analysed on a real networking environment. This enabled to identify problems in the standard which affect the handover and routing performance. To address the identified routing and protocol header overheads of the standard network mobility protocol a novel optimal routing framework, OptiNets was proposed. To address the handover latency issues, optimizations to IPv6 network attachment were incorporated and also an access technology independent multiple interface Make-Before-Break handover mechanism was proposed. The viability of the OptiNets framework and the handover optimizations were demonstrated by analysis and by implementation. A more general external factor that affects the performance of mobile networks which is bandwidth scarcity of Wireless Wide Area Networks was addressed, by proposing a bandwidth fuelling architecture for on-board mobile networks. The feasibility of the bandwidth fuelling architecture was analysed by implementing a prototype and evaluating its performance.
|
142 |
Infinitesimal Perturbation Analysis for Active Queue ManagementAdams, Richelle Vive-Anne 12 November 2007 (has links)
Active queue management (AQM) techniques for congestion control in Internet Protocol (IP) networks have been designed using both heuristic and analytical methods. But so far, there has been found no AQM scheme designed in the realm of stochastic optimization. Of the many options available in this arena, the gradient-based stochastic approximation method using Infintesimal Perturbation Analysis (IPA) gradient estimators within the Stochastic Fluid Model (SFM) framework is very promising. The research outlined in this thesis provides the theoretical basis and foundational layer for the development of IPA-based AQM schemes. Algorithms for computing the IPA gradient estimators for loss volume and queue workload were derived for the following cases: a single-stage queue with instantaneous, additive loss-feedback, a single-stage queue with instantaneous, additive loss-feedback and an unresponsive competing flow, a single-stage queue with delayed, additive loss-feedback, and a multi-stage tandem network of $m$ queues with instantaneous, additive loss-feedback. For all cases, the IPA gradient estimators were derived with the control parameter, $ heta$, being the buffer-limits of the queue(s). For the single-stage case and the multi-stage case with instantaneous, additive loss-feedback, the IPA gradient estimators for when the control parameter, $ heta$, is the loss-feedback constant, were also derived. Sensitivity analyses and optimizations were performed with control parameter, $ heta$, being the buffer-limits of the queue(s), as well as the loss-feedback constant.
|
143 |
Traffic engineering for multi-homed mobile networks.Chung, Albert Yuen Tai, Computer Science & Engineering, Faculty of Engineering, UNSW January 2007 (has links)
This research is motivated by the recent developments in the Internet Engineering Task Force (IETF) to support seamless integration of moving networks deployed in vehicles to the global Internet. The effort, known as Network Mobility (NEMO), paves the way to support high-speed Internet access in mass transit systems, e.g. trains; buses; ferries; and planes; through the use of on-board mobile routers embedded in the vehicle. One of the critical research challenges of this vision is to achieve high-speed and reliable back-haul connectivity between the mobile router and the rest of the Internet. The problem is particularly challenging due to the fact that a mobile router must rely on wireless links with limited bandwidth and unpredictable quality variations as the vehicle moves around. In this thesis, the multi-homing concept is applied to approach the problem. With multi-homing, mobile router has more than one connection to the Internet. This is achieved by connecting the mobile router to a diverse array of wireless access technologies (e.g., GPRS, CDMA, 802.11, and 802.16) and/or a multiplicity of wireless service providers. While the aggregation helps addressing the bandwidth problem, quality variation problem can be mitigated by employing advanced traffic engineering techniques that dynamically control inbound and outbound traffic over multiple connections. More specifically, the thesis investigates traffic engineering solutions for mobile networks that can effectively address the performance objectives, e.g. maximizing profit for mobile network operator; guaranteeing quality of service for the users; and maintaining fair access to the back-haul bandwidth. Traffic engineering solutions with three different levels of control have been investigated. First, it is shown, using detailed computer simulation of popular applications and networking protocols(e.g., File Transfer Protocol and Transmission Control Protocol), that packet-level traffic engineering which makes decisions of which Internet connection to use for each and every packet, leads to poor system throughput. The main problem with packet-based traffic engineering stems from the fact that in mobile environment where link bandwidths and delay can vary significantly, packets using different connections may experience different delays causing unexpected arrivals at destinations. Second, a maximum utility flow-level traffic engineering has been proposed that aims to maximize a utility function that accounts for bandwidth utilization on the one hand, and fairness on the other. The proposed solution is compared against previously proposed flow-level traffic engineering schemes and shown to have better performance in terms of throughput and fairness. The third traffic engineering proposal addresses the issue of maximizing operator?s profit when different Internet connections have different charging rates, and guaranteeing per user bandwidth through admission control. Finally, a new signaling protocol is designed to allow the mobile router to control its inbound traffic.
|
144 |
Network mobility management for next generation mobile systemsPerera, Algamakoralage Eranga Gayani, Electrical Engineering & Telecommunications, Faculty of Engineering, UNSW January 2007 (has links)
The future Internet will need to cater for an increasing number of powerful devices and entire groups of networks to roam in heterogeneous access networks. The current approach towards meeting such requirements, which is to retrofit mobility solutions to different layers of the protocol stack, has given rise to an increasingly fragmented network control layer. Furthermore, retrofitting solutions in an ad-hoc manner to the protocol stack does not provide consistent support from the network to different applications. This lack of a common control layer for facilitating roaming in heterogeneous networking environments represents a crucial challenge both technically and from a user perspective. To this end, a novel mobility architecture forms the basis and the first part of this dissertation. The work on investigating current network mobility solutions and improving these solutions if deemed necessary, in order to reuse within the novel mobility architecture constitutes the second part of this dissertation. The IETF standard protocol for network mobility was implemented and its performance was analysed on a real networking environment. This enabled to identify problems in the standard which affect the handover and routing performance. To address the identified routing and protocol header overheads of the standard network mobility protocol a novel optimal routing framework, OptiNets was proposed. To address the handover latency issues, optimizations to IPv6 network attachment were incorporated and also an access technology independent multiple interface Make-Before-Break handover mechanism was proposed. The viability of the OptiNets framework and the handover optimizations were demonstrated by analysis and by implementation. A more general external factor that affects the performance of mobile networks which is bandwidth scarcity of Wireless Wide Area Networks was addressed, by proposing a bandwidth fuelling architecture for on-board mobile networks. The feasibility of the bandwidth fuelling architecture was analysed by implementing a prototype and evaluating its performance.
|
145 |
Stochastic modeling and simulation of the TCP protocol /Olsén, Jörgen, January 1900 (has links)
Diss. (sammanfattning) Uppsala : Univ., 2003. / Härtill 6 uppsatser.
|
146 |
Securing softswitches from malicious attacksOpie, Jake Weyman January 2007 (has links)
Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. Of all the limitations that these networks had, the ability of malicious attacks to cripple communication was not a crucial one. This situation has changed radically now that real-time communication and data have merged to share the same network. The objective of this project is to investigate the securing of softswitches with functionality similar to Private Branch Exchanges (PBX) from malicious attacks. The focus of the project will be a practical investigation of how to secure ILANGA, an ASTERISK-based system under development at Rhodes University. The practical investigation that focuses on ILANGA is based on performing six varied experiments on the different components of ILANGA. Before the six experiments are performed, basic preliminary security measures and the restrictions placed on the access to the database are discussed. The outcomes of these experiments are discussed and the precise reasons why these attacks were either successful or unsuccessful are given. Suggestions of a theoretical nature on how to defend against the successful attacks are also presented.
|
147 |
Extending the reach of personal area networks by transporting Bluetooth communications over IP networksMackie, David Sean 29 March 2007 (has links)
This thesis presents an investigation of how to extend the reach of a Bluetooth personal area network by introducing the concept of Bluetooth Hotspots. Currently two Bluetooth devices cannot communicate with each other unless they are within radio range, since Bluetooth is designed as a cable-replacement technology for wireless communications over short ranges. An investigation was done into the feasibility of creating Bluetooth hotspots that allow distant Bluetooth devices to communicate with each other by transporting their communications between these hotspots via an alternative network infrastructure such as an IP network. Two approaches were investigated, masquerading of remote devices by the local hotspot to allow seamless communications and proxying services on remote devices by providing them on a local hotspot using a distributed service discovery database. The latter approach was used to develop applications capable of transporting Bluetooth’s RFCOMM and L2CAP protocols. Quantitative tests were performed to establish the throughput performance and latency of these transport applications. Furthermore, a number of selected Bluetooth services were tested which lead us to conclude that most data-based protocols can be transported by the system.
|
148 |
A framework for the application of network telescope sensors in a global IP networkIrwin, Barry Vivian William January 2011 (has links)
The use of Network Telescope systems has become increasingly popular amongst security researchers in recent years. This study provides a framework for the utilisation of this data. The research is based on a primary dataset of 40 million events spanning 50 months collected using a small (/24) passive network telescope located in African IP space. This research presents a number of differing ways in which the data can be analysed ranging from low level protocol based analysis to higher level analysis at the geopolitical and network topology level. Anomalous traffic and illustrative anecdotes are explored in detail and highlighted. A discussion relating to bogon traffic observed is also presented. Two novel visualisation tools are presented, which were developed to aid in the analysis of large network telescope datasets. The first is a three-dimensional visualisation tool which allows for live, near-realtime analysis, and the second is a two-dimensional fractal based plotting scheme which allows for plots of the entire IPv4 address space to be produced, and manipulated. Using the techniques and tools developed for the analysis of this dataset, a detailed analysis of traffic recorded as destined for port 445/tcp is presented. This includes the evaluation of traffic surrounding the outbreak of the Conficker worm in November 2008. A number of metrics relating to the description and quantification of network telescope configuration and the resultant traffic captures are described, the use of which it is hoped will facilitate greater and easier collaboration among researchers utilising this network security technology. The research concludes with suggestions relating to other applications of the data and intelligence that can be extracted from network telescopes, and their use as part of an organisation’s integrated network security systems
|
149 |
Estudo da qualidade de voz em redes IP / Study of voice quality in IP networksMagro, Julio Cesar 07 July 2005 (has links)
Orientador: Helio Waldman / Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação / Made available in DSpace on 2018-08-04T21:18:47Z (GMT). No. of bitstreams: 1
Magro_JulioCesar_M.pdf: 1795144 bytes, checksum: cc5adfc75b6040f36e37ce144569c2be (MD5)
Previous issue date: 2005 / Resumo: Este trabalho descreve o estudo da qualidade de voz em redes IP a partir de uma revisão dos protocolos e mecanismos relativos a qualidade de serviço (QoS) e os aspectos do impacto sistêmico na presença ou ausência destes; revisão dos diversos métodos de avaliação da qualidade da voz com ênfase nos métodos automáticos (objetivos e repetitivos) para auxiliar na análise dos efeitos na voz dos diversos fatores presentes em uma rede de pacotes, tais como perda de pacote, atraso e jitter, bem como a própria codificação da voz em baixas taxas; revisão dos principais protocolos de sinalização utilizados para implementação de voz sobre IP (VoIP) ou telefonia sobre IP, evidenciando-se seus pontos fortes e fracos com relação a facilidade de implementação, extensibilidade e adequabilidade para várias aplicações de rede e qualidade de serviço (QoS) e realização de testes em redes IP simulada e experimental. O principal objetivo é a caracterização do serviço de voz em redes IP levando-se em consideração os efeitos dos fatores de rede e gateway no tempo de estabelecimento de uma chamada (conexão) e na qualidade da voz. Para simulação da rede IP foi utilizado o software Cloud da Shunra onde é possível tratar, de forma isolada, a influência da perda de pacote, do atraso fixo, do atraso variável (jitter), bem como do efeito conjunto da perda de pacote e jitter. Soluções a tais efeitos são investigadas em testes experimentais. Resultados de simulações sistêmicas são apresentados e discutidos. As degradações na voz devidas a tais efeitos são avaliadas e um método prático para solucionar é testado. Os resultados experimentais demonstram a viabilidade técnica da utilização da voz sobre IP (ou telefonia IP) pelos provedores de serviço, bem como pelas corporações privadas, podendo trafegar voz e dados em uma mesma rede convergente IP / Abstract: This work describes the study of voice quality in IP networks based on a revision of quality of service (QoS) protocols and mechanisms and aspects of the system impact associated with the presence or absence of them; revision of the diverse evaluation methods of voice quality with emphasis in the automatic methods (objective and repetitive) used to analyze the effects in the voice due to diverse factors presented in packet networks, such as packet loss, delay and jitter, as well as the proper voice coding at low rate; revision of the main protocols of signalling for implementation of voice over IP (VoIP) or IP telephony, considering its strong and weak points with regard to implementation facility, scalability and adequacy for some network applications and quality of service (QoS) and accomplishment of tests in simulated and experimental IP networks. The main objective is the characterization of voice service in IP networks taking into account the effect of the network factors in call set-up (connection) and in voice quality . For the simulation of the IP network the Shunra¿s Cloud software was used where it is possible to deal with, in isolated form, the influence of packet loss, fixed delay, delay variation ( jitter), as well as the composed effect of packet loss and jitter. Solutions to such effects are investigated in experimental tests. Results of system simulations are presented and discussed. Degradations in voice due to such effects are evaluated and a practical method to solve them is considered. The experimental results demonstrate the technical feasibility of using voice over IP (or IP telephony) by service providers, as well as private corporations being able to forward voice and data over the same converged IP network / Mestrado / Telecomunicações e Telemática / Mestre em Engenharia Elétrica
|
150 |
Um protocolo multicast bi-direcional para educação a distancia / A bidirectional multicast protocol for distance learningAlbuquerque, Edison de Queiroz 09 August 2005 (has links)
Orientador: Hugo Enrique Hernandez Figueroa / Tese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação / Made available in DSpace on 2018-08-05T07:05:01Z (GMT). No. of bitstreams: 1
Albuquerque_EdisondeQueiroz_D.pdf: 2450262 bytes, checksum: 1142d9b235574921d845ac5246fbe250 (MD5)
Previous issue date: 2005 / Resumo: Este trabalho está baseado em uma experiência real, vivida no dia-a-dia do nosso trabalho na Empresa Brasileira de Telecomunicações S.A, EMBRATEL, quando da busca de ferramentas capazes de viabilizar o permanente treinamento dos Consultores Técnicos da empresa, localizados em diferentes partes do nosso país, em face da escassez de recursos financeiros e de tempo. Para tanto, iniciamos com uma retrospectiva histórica da Educação a Distância no mundo, seu presente e suas tendências visíveis. Depois, apresentamos uma descrição dos protocolos multicasting existentes, seguido de nossa proposta. Apresentamos, também, uma simulação usando o Simulador ns-2 de maneira a comprovar o correto funcionamento do protocolo proposto e avaliar seu desempenho. O núcleo desta tese é a proposta de um novo protocolo multicasting, elemento essencial para a otimização da rede de suporte, um imperativo para a eficiência de seu funcionamento e, principalmente, da diminuição de seu custo, tendo em vista a situação ideal de se transmitir voz e vídeo para garantir que uma aula a distância será o mais próximo possível de uma aula presencial, conforme aponta o resultado de pesquisas referenciadas no presente texto, uma vez que vídeo é uma aplicação que demanda grande largura de banda / Abstract: This work is based on a real life situation, experienced in our daily work at Empresa Brasileira de Telecomunicações S.A, EMBRATEL, when pursuing tools that would allow the continuous training of its staff of Technical Consultants. The Technical Consultants were spread all over Brasil, a country of continental dimensions. Time and cost were obstac1es to achieve the above mentioned training. This thesis starts providing a short account of the historical milestones on Distance Learning. We added considerations on the state-of-the-art and scenarios of future developments, which were drawn taking into account social and economical policies. Routing and existing multicasting protocols are described and compared with the bidirectional multicast protocol proposed in this thesis. The main purpose of this thesis is the proposal of a new Multicasting Protocol, to support a new concept on which a teacher can be a student on a different subject by taking into account that we aim a Distance Learning environment inside a corporation.
The ns-2 Simulator is used to simulate the perfect operation of the proposed protocol and evaluate its performance. The use of video is mandatory in order to achieve a maximum efficiency at c1ass. The rapid switching of video transmission from the teacher to a remote student that asks a question (so that all other students spread around the country can also see who is asking) and back to the teacher is mandatory and is what motivated the development of this new Multicast Protocol / Doutorado / Telecomunicações e Telemática / Doutor em Engenharia Elétrica
|
Page generated in 0.197 seconds