Top PDF A Framework for Reliable Multicast in the Internet

A Framework for Reliable Multicast in the Internet

A Framework for Reliable Multicast in the Internet

A Framework for Reliable Multicast in the Internet Michael Fuchs, Christophe Diot, Thierry Turletti, Markus Hofmann.. To cite this version: Michael Fuchs, Christophe Diot, Thierry Turlet[r]

131 Read more

On the Ultra-Reliable and Low-Latency Communications for Tactile Internet in 5G Era

On the Ultra-Reliable and Low-Latency Communications for Tactile Internet in 5G Era

New generations of mobile telephony succeed every decade, each bringing an evolution or even a revolution. Nowadays, the Internet of Things and the tactile Internet are starting to grow, and 5G technology is there to enable these services. 5G technology has introduced three types of services, namely eMBB (for services requiring very high bit rates), mMTC (for massive connection of user equipment), and uRLLC (for critical services requiring very high reliability and extremely reduced latency). In this paper, we have dealt with some issues encountered by uRLLC services for tactile Internet services. In this article, we have studied the transmission of very small packets as required by the 5G uRLLC services. We also examined the probability of transmission error and its variation concerning the transmission delay and the length of the packet transmitted. This study was conducted considering its application in the Tactile Internet.
Show more

10 Read more

Reliable multicast transport by satellite: a hybrid satellite/terrestrial solution with erasure codes

Reliable multicast transport by satellite: a hybrid satellite/terrestrial solution with erasure codes

A practical solution to implement IP multicast service may consist in using a geostationary satellite. The broadcast nature and the large coverage zone of such systems make it possible for a source to reach a huge number of receivers with only one hop. Satellite broadcasting seems expensive at first sight, but per-receiver cost becomes less than using terrestrial network when the number of receivers increases. For this reason this study is focused on large scale reliable multipoint communications. Moreover we consider applications with no time constraints, because the long transmission delay of satellite links is not really compatible with such applications. Software updates or cache feeding in content delivery networks are examples of possible target applications.
Show more

11 Read more

Reliable and Available Wireless Architecture/Framework

Reliable and Available Wireless Architecture/Framework

The decision to apply the RAW techniques must be done quickly, and depends on a very recent and precise knowledge of the forwarding conditions within the complex Track. There is a need for an observation method to provide the RAW Data Plane with the specific knowledge of the state of the Track for the type of flow of interest (e.g., for a QoS level of interest). To observe the whole Track in quasi real time, RAW considers existing tools such as L2-triggers, DLEP, BFD and leverages in-band and out-of-band OAM to capture and repotr that information to the SRE.
Show more

29 Read more

Reliable Multicast Sessions Provisioning in Sparse Light-Splitting DWDM Networks using P-Cycles

Reliable Multicast Sessions Provisioning in Sparse Light-Splitting DWDM Networks using P-Cycles

Maintaining network survivability is very important since a single link or node failure would affect a large number of communication sessions. In multicast communications, this impact is more severe as a link or node may carry traffic for multiple destinations. Hence, protecting multicast sessions in all-optical DWDM networks is a crucial task. The p-cycle protection approach, introduced by W.D. Grover in [3] for unicast traffic, ensures a fast restoration time since p-cycles are pre-cross-connected. When a link fails, the restoration process is handled by the end nodes of the failed link. Moreover, the p- cycle protection approach provides a high capacity efficiency as it allows both on-cycle and straddling links to be protected by the p-cycle. In 2007, F. Zhang and W.D. Zhong showed in [4] that applying p-cycle protection concept for multicast traffic leads to a blocking probability very low compared with that of the OPP-SDP algorithm [5].
Show more

7 Read more

IANVS: A Moving Target Defense Framework for a Resilient Internet of Things

IANVS: A Moving Target Defense Framework for a Resilient Internet of Things

∗ Lab-STICC, UMR CNRS 6285, F-35700. † IRISA, UMR CNRS 6074, F-35700. ∗† IMT Atlantique, Rennes, France. Email: {firstname.lastname}@imt-atlantique.fr § University of Oslo, Oslo, Norway. Email: hasa@student.matnat.uio.no Abstract—The Internet of Things (IoT) is more and more present in fundamental aspects of our societies and personal life. Billions of objects now have access to the Internet. This networking capability allows for new beneficial services and applications. However, it is also the entry-point for a wide variety of cyber-attacks that target these devices. The security measures present in real IoT systems lag behind those of the standard Internet. Security is sometimes completely absent. Moving Target Defense (MTD) is a 10-year-old cyber-defense paradigm. It proposes to randomize components of a system. Reasonably, an attacker will have a higher cost attacking an MTD-version of a system compared with a static-version of it. Even if MTD has been successfully applied to standard systems, its deployment for IoT is still lacking. In this paper, we propose a generic MTD framework suitable for IoT systems: IANVS (pronounced Janus). Our framework has a modular design. Its components can be adapted according to the specific constraints and requirements of a particular IoT system. We use it to instantiate two concrete MTD strategies. One that targets the UDP port numbers (port- hopping), and another a CoAP resource URI. We implement our proposal on real hardware using Pycom LoPy4 nodes. We expose the nodes to a remote Denial-of-Service attack and evaluate the effectiveness of the IANVS-based port-hopping MTD proposal.
Show more

7 Read more

Design Framework for Reliable and Environment Aware Management of Smart Environment Devices

Design Framework for Reliable and Environment Aware Management of Smart Environment Devices

1 Introduction Smart environments are equipped with numerous de- vices that are automatically controlled to achieve different objectives. For instance, a window can be opened to cool or ventilate a room. Controlling smart environments devices raises several problems. First, devices are built by different manufacturers and use heterogeneous communication technologies. Second, a device may become unreachable due to a hardware fail- ure or a communication error. In this case, a command sent to this device is not received and the correspond- ing action is not performed. Assuming that the action has been performed leads to a runtime inconsistency (inconsistency in the rest of the paper). For instance, sending the command close to a door and assuming that it is closed becomes an inconsistency if the door remains opened due to a communication error or a failure. Third, the decisions taken to achieve the ob- jectives may be conflicting or violate other objectives. Conflicts and violations are either explicit or implicit. Implicit conflicts and violations are due to environ- ment dependencies and are not easy to detect. For in- stance, opening a window to cool a room can raise the
Show more

20 Read more

A scalable based multicast model for P2P Conferencing applications

A scalable based multicast model for P2P Conferencing applications

LAMOS, Bejaia University, Algeria k kabyle2000@yahoo.fr Abstract—Multicast conferencing is a rapidly-growing area of Internet use. Audio, video and other media such as shared whiteboard data can be distributed efficiently between groups of conference participants using multicast algorithms that minimize the amount of traffic sent over the network. This is far more effective than systems that maintain a separate link between each participant. On the other hand Peer-to-Peer (P2P) model is inherently characterized by high scalability, robustness and fault tolerance. With its decentralized and distributed architecture, a P2P network is somehow able to self organized dynamically. Peer- to-Peer model or architecture is well adapted to conferencing applications, effectively it can greatly benefit from P2P attributes such as: flexibility, scalability and robustness, particularly in critical environments such as: mobile networks. In this paper we propose a novel and scalable approach for P2P Conferencing. This model combines a call control and signalling protocol (SIP) with a ”P2P” protocol (Chord) for maintaining (dynamically) a well stabilized and optimized architecture topology. This model is also based on an application layer multicast mechanism. Per- formance evaluation shows that our proposed approach benefits from SIP protocol flexibility, with the robustness and scalability of Chord protocol. The use of a multicast mechanism optimizes the overall traffic flow (control and media) and transmission efficiency.
Show more

5 Read more

A novel middleware for the mobility management over the Internet

A novel middleware for the mobility management over the Internet

1 Introduction Mobility management has become one of the most chal- lenging topics. In [5], we have already introduced a cross- layer based communication architecture for end to end mo- bility management over the Internet. Based on the current advances on mobility management, we have developed a middleware composed of innovative configurable mecha- nisms that aim to satisfy advanced mobility requirements and make the mobility management more efficient. This pa- per briefly details the different configurable modules of our proposed middleware (3MOI) developed in Java framework and presents demonstration scenarios showing the benefits for the user in terms of QoS enhancement and seamless communication support.
Show more

3 Read more

Towards a Secure Email Service for The Future Internet

Towards a Secure Email Service for The Future Internet

A clean slate approach for a new Internet architecture, like NetInf, is clearly an alternative. The proposed email service presented in this work is in the context of the NetInf. A service that is secure, reliable and where an information is created, stored and retrieved without requiring dedicated infrastructure. The basic NetInf prototype has already been implemented. Our ongoing work includes the development of an interface for the email service. The performance evaluation of the service will have to include various tests with different parameters measuring latency, reducing the overall overhead due to the use of asymmetric key cryptography and reputation tests to take care of Spam emails. Most of Spam emails are related to companies for advertisement purposes. One solution is to make the such senders pay the subscription fee to use email service for their product advertisement. This will possibly reduce the bulk of Spam emails which consume a big part of users mailbox Storage Space.
Show more

7 Read more

A Cognitive Protection System for the Internet of Things

A Cognitive Protection System for the Internet of Things

Building upon this work, Khan, et al. developed ARMET, a design methodology for industrial control systems based upon computing and physical plant behavior and using deductive synthesis to enforce functional, security and safety properties. ARMET operates as an efficient middleware comparing an application’s actual execution with its specification in realtime in order to detect computational attacks modifying application or system code or data values. 5 Underpinning this system is the concept of a Runtime Security Monitor (RSM), which compares expected application (digital) and executed implementation (physical) specifications to detect inconsistencies. 7 Additional prior art for reliable-and-secure-by-design ICS applications is explored in Khan, et al. (2018) 5 While ARMET and the RSM are ideally suited to identifying data or code manipulation, these systems may not adaptively learn rules based upon observing systems in context, and neither approach tests commands sent over trusted channels for benignness. Extending the concept of ARMET to test commands in fully simulated environments would add an additional layer of robustness to the security system and protect against emerging threats. There is an opportunity to apply artificial intelligence to learn rules adaptively, and to use computational resources to not only compare real and anticipated system models, but to predict the implications of received commands on the future state of a system to determine if known or learned limits are violated. Utilizing models based upon control theory further enhances state-space data richness, allowing observability of a system’s hidden variables with reduced device resource expenditure compared to full sensor mirroring. Additionally, there is an opportunity for an IoT security system to autonomously learn models from time histories of observations, assisting in cases where IoT’s interconnectedness makes developing standard control theory models impractical.
Show more

18 Read more

A Centralized Controller for Reliable and Available Wireless Schedules in Industrial Networks

A Centralized Controller for Reliable and Available Wireless Schedules in Industrial Networks

Abstract—This paper describes our work on a flexible cen- tralized controller for scheduling wireless networks. The context of this work encompasses wireless networks within the wider Internet of Things (IoT) field and in particular addresses the requirements and limitations within the narrower Industrial In- ternet of Things (IIoT) sub-field. The overall aim of this work is to produce wireless networking solutions for industrial applications. The challenges include providing high reliability and low latency guarantees, comparable to existing wired solutions, within a noisy wireless medium and using generally computationally- and energy-restrained network nodes. We describe the development of a centralized controller for Wireless Industrial Networks, currently aimed at IEEE Std 802.15.4-2015 Time Slotted Channel Hopping protocol. Our controller takes a high-level network- centric problem description as input, translates it to a low- level representation and uses that to retrieve a solution from a Satisfiability Modulo Theories (SMT) solver, translating the solution back to a higher-level network-centric representation. The advantages of our solution are the ability to gain the added flexibility, higher ease of deployment, and lower deployment cost offered by wireless networks by generating configurable and flexible schedules for these applications.
Show more

10 Read more

Avoidance of Multicast Incapable Branching Nodes for Multicast Routing in WDM Networks

Avoidance of Multicast Incapable Branching Nodes for Multicast Routing in WDM Networks

VII. C ONCLUSION Due to the physical constraint, supporting multicast routing in optical network with spare light splitting and without wavelength conversion is not easy. Many multicast routing algorithms have been proposed to attempt to construct the Steiner tree in all optical networks to get the minimum cost, but this problem is proved to be NP-hard. In fact, QoS required applications become more and more popular in Internet nowadays. The bandwidth (or link stress in WDM optical network) and delay are two important parameters for QoS. Hence, a multicast routing algorithm based on avoidance of MIB nodes is presented for QoS required traffic in WDM networks in order to decrease the link stress and delay. It keeps the good parts of the shortest path tree which results in the optimal delay for if not may at least some multicast members. In order to reduce the number of MIB nodes and link stress in the construction of the shortest path tree step, DijkstraPro algorithm is presented, where higher priority is assigned to MC candidate node and node adoption are
Show more

10 Read more

Design Framework for Reliable Multiple Autonomic Loops in Smart Environments

Design Framework for Reliable Multiple Autonomic Loops in Smart Environments

Figure 16: Room luminosity node and lampCmd). The input flows respectively represent the values measured by the presence sensor and outdoor lumi- nosity sensor. The output flows respectively correspond to the commands to send to the shutter and to the lamp. This node defines a contract to enforce the target objective, through DCS, with the controllable variables c1_lamp, c2_lamp and c_shutter. These controllable variables are respectively related to the lamp and the shutter. The luminosity objective is expressed as follows: presence ⇒ lum in [500,600] where lum is equal to the sum of the luminosity provided by the shutter and the lamp. The fact that natural lighting is preferred to artificial lighting to save energy is expressed by declaring the controllable variables of the lamp before the one of the shutter. The compilation of the Heptagon/BZR program (i.e., nodes presented in Figures 3a, 15, and 16) generates a
Show more

13 Read more

A NAT and Firewall signaling framework for the Internet

A NAT and Firewall signaling framework for the Internet

We can classify the threats to Path-Directed NAT and Firewall signaling into two categories: • On-path attacks: the attacker is on the signaling message path. On-path attackers could possibly drop or change messages when performing active attacks on the signaling mes- sages. Since signaling messages should normally be changed by Middleboxes performing NAT it is difficult to determine if signaling messages were changed by an attacker or by trusted Middleboxes performing genuine NAT functions. Transitive trust with the signaling peers would be required as we shall see in the next chapter to address message integrity attacks. On-path attackers could analyze signaling messages to attack the net- work (for example by opening pinholes or creating NAT binds). The latter type of attack could also be performed by analyzing data flow traffic traversing firewalls and could not be mitigated by the NAT and Firewall PDSP (neither at the CPDSL nor the PDNFS layer) unless performing data source authentication at the entry of the protected network infrastructure. In addition on-path attackers could try to take ownership of the signaled behavior state as well as creating DoS attacks with signaling message floods. The topol- ogy insensitive nature of PDNFS opens the protocol to several threats; the PDNFS SI does not know in advance the Middleboxes that exist in the network infrastructure. Con- sequently the NATs or firewalls (i.e. the PDNFS SFs) discovered by PDNFS might not be trustworthy Middleboxes and could be attackers trying to use PDNFS to attack the network infrastructure.
Show more

228 Read more

A new proposal for reliable unicast and multicast transport in Delay Tolerant Networks

A new proposal for reliable unicast and multicast transport in Delay Tolerant Networks

The CFDP protocol [8] provides file copy services over a single link and require all parts of a file to follow the same path to the destination. The Deep-Space Transport Protocol (DS-TP) [9] is based on double automatic retransmission to provide proactive protection against link errors. The level of redundancy introduced by DS-TP affects both the storage space requirement of intermediate DTN nodes and the end- to-end delivery delay of data to its destination. The TP-Planet protocol [10] employs additive increase multiplicative decrease control mechanism and uses time-delayed SACKs to deal with asymmetric bandwidth. The SCPS-TP protocol [11] adopts TCP’s main functionalities and extends them in order to deal with some of the unique characteristics of deep-space links. The open loop rate control part of SCPS-TP makes also use of SNACKs. In [12], four different acknowledgment strategies are considered, namely, hop-by-hop, active receipt, passive receipt and network-bridged receipt. The Delay-Tolerant Transport Protocol (DTTP) is proposed in [13] in order to increase relia- bility and efficiency (in terms of resource utilization) in DTNs. DTTP provides both reliable and unreliable communication with trade-off between reliability and end-to-end delivery delay. Full reliability requires extensive retransmissions, which obviously extends overall transfer time.
Show more

7 Read more

Group size estimation for hybrid satellite/terrestrial reliable multicast

Group size estimation for hybrid satellite/terrestrial reliable multicast

group size, as it can be included in the pool message. It is also important to note that adjusting parameters λ and T can induce a risk of Nack Implosion. Indeed, packet losses are due to atmospheric perturbations (as explained in section 1). These perturbations affect geographical zones. Thus, numerous re- ceivers can simultaneously suffer from a loss of connection (for example when a perturbation is above a large city). In this situation, the estimation mecha- nism will underestimate the group size. This may lead to the generation of a huge number of packets when the non line-of-sight receivers are visible again. To avoid this Nack Implosion, it may be preferable to set a minimum value
Show more

10 Read more

2009 — Seamless, reliable, video multicast in wireless ad hoc networks

2009 — Seamless, reliable, video multicast in wireless ad hoc networks

channels before hand-off is performed at time slots that are not dedicated for the current communications. We thus consider the well-known CDMA over TDMA channel model at the MAC sub-layer proposed in (Lin et Liu, 1999) (Lin, 2001). That is, CDMA is overlaid on top of the TDMA infrastructure. Namely, multiple sessions can share a common TDMA slot via CDMA. The transmission and reception between two neighbours at the MAC layer are governed by the TDMA model. A node that wishes to transmit signals must use a free timeslot for transmission, and the node that wishes to receive the signals needs to listen to the transmitting node in the same timeslot. In this channel model, a radio station can only receive a single transmission at a time and cannot transmit and receive simultaneously. In addition, the channel is assumed to be time slotted. All nodes keep accurate common time (there exits a global clock or time synchronization mechanism). Each slot includes the number of redundant bits (e.g., for error control coding, retransmission) that must be sent when the channel has a low signal-to-noise ratio in order to get a successful transmission. Furthermore, the assumptions found in most other radio data link protocols (Baker et Ephremides, 1981; Chlamtac et Kutten, 1985; Chlamtac et Pinter, 1987a; Gerla et Tsai, 1995; Goodman et al., 1989; Lin et Gerla, 1997) are considered. That is, the physical layer can provide the service of the slotted channel. Only one data packet can be transmitted in each data slot.
Show more

199 Read more

Finding Yourself on the Internet : proposing a Fait and Reliable System

Finding Yourself on the Internet : proposing a Fait and Reliable System

The life and reign of Mathias Corvin, king of Hungary, saw several turnovers occur during his 32 years of sovereignty [CEVINS, 2016]. The DNS celebrates this year its 32 candles. A reversal is always possible. Thus, we can cite Eircode, an Irish alternative to the system of streets and numbers for the grid of space. A unique identifier allows the location of each building. Although thrusting in its development, Eircode is now accepted by all.

4 Read more

Reliable method for accurate measurements of the breakdown voltage in microgaps

Reliable method for accurate measurements of the breakdown voltage in microgaps

I . I NTRODUCTION Due to the fast development of massive technology solutions, microelectronic industry and nanotechnology products increase very rapidly in numbers and varieties. The era of migration towards smaller dimensions of the outcome devices presents new challenges related among others to the reliability of the equipment. To meet these challenges, an in-depth understanding of the equipment failure on the physical side is required, so that the long-term reliability of products or processes can be evaluated. Accordingly, many research groups renewed their interest to the study of electrical breakdown phenomena in micro- and even nano-gaps [1-9].
Show more

5 Read more

Show all 10000 documents...