Filters








15 Hits in 5.0 sec

An Interdomain Overlay Network Based on ISP Alliances for Economically Efficient Interdomain Traffic Routing

Xun SHAO, Go HASEGAWA, Yoshiaki TANIGUCHI, Hirotaka NAKANO
2014 IEICE transactions on information and systems  
As economic structure plays very important role in interdomain routing, so we propose an effective and fair charging and pricing scheme within the ISP alliance in correspondence with the overlay routing  ...  by ISPs within an ISP alliance.  ...  We propose an economically efficient interdomain overlay structure operated by ISPs based on an ISP alliance for taking advantage of the benefits of overlay networks while remaining ISP friendly.  ... 
doi:10.1587/transinf.2013edp7367 fatcat:dvrcqrl27zg2vdjh6wgok4heru

Contract-switching paradigm for internet value flows and risk management

Murat Yuksel, Aparna Gupta, Shivkumar Kalyanaraman
2008 IEEE INFOCOM 2008 - IEEE Conference on Computer Communications Workshops  
Just like packet-switching enabled flexible and efficient multiplexing of data, a contract-switched inter-network will enable flexible and economically efficient management of risks and value flows with  ...  Similarly, an enterprise that needs end-to-end capacity contracts between two arbitrary points on the Internet for a short period of time has no way of expressing its needs.  ...  Several economic tools can be used to remedy pricing, risk sharing, and money-back problems of a contractswitched network provider (CSNP), which can operate as an overlay re-seller ISP (or an alliance  ... 
doi:10.1109/infocom.2008.4544624 fatcat:5wvzfvsd5zdb5gohqp64g5mjry

Towards the Future Internet: virtual networks for convergent services

K. Tutschku
2009 e & i Elektrotechnik und Informationstechnik  
The major building blocks of NV are the a) use of application-specific routing overlays, b) the safe consolidation of resources by OS virtualization on a generic infrastructure, and c) the exploitation  ...  of the network diversity for performance enhancements and for new business models, such as the provisioning of intermediates nodes or path oracles.  ...  Tran-Gia for stimulating discussions and D. Klein for the support in the preparation of this manuscript.  ... 
doi:10.1007/s00502-009-0652-2 fatcat:iqmmal5sbfbrvozegh336f7qjm

Economically Efficient Interdomain Overlay Network Based on ISP Alliance

Xun Shao, Go Hasegawa, Yoshiaki Taniguchi, Hirotaka Nakano
unpublished
As interdomain routing protocol, BGP is a fairly simple, and allows plenty of policies based on ISPs' preferences.  ...  As economic structure plays very important role in interdomain routing, we then propose an effective and fair charging and pricing scheme within the ISP alliance in correspondence with the overlay routing  ...  Overlay network structure An ISP alliance is formed by adjacent ISPs by bilateral contract. An example of interdomain overlay network based on ISP alliance is shown in Fig. 2 .  ... 
fatcat:dbvqrjvpjra2lkptuxlslwe52q

Collaborative framework for protection against attacks targeting BGP and edge networks

Rahul Hiran, Niklas Carlsson, Nahid Shahmehri
2017 Computer Networks  
We also include an evaluation of which ASes need to collaborate, to what extent the size and locality of ASes matter, and how many ASes are needed to achieve good efficiency in detecting anomalous route  ...  PrefiSec is a novel distributed IP-prefix-based solution, which maintains information about the activities associated with IP prefixes (blocks of IP addresses) and autonomous systems (AS) and enables efficient  ...  The packet's widearea (interdomain) route is determined by the Border Gateway Protocol (BGP), 115 the de-facto interdomain routing protocol used over the Internet.  ... 
doi:10.1016/j.comnet.2017.04.048 fatcat:qeblxmwhqba5ndryft5cjpas5a

Future internets escape the simulator

Mark Berman, Ivan Seskar, Sachin Sharma, Piet Demeester, Jae Woo Lee, Kiran Nagaraja, Michael Zink, Didier Colle, Dilip Kumar Krishnappa, Dipankar Raychaudhuri, Henning Schulzrinne
2015 Communications of the ACM  
; NetServ, an architecture for in-network services; and a study of resilience in OpenFlow software defined networks.  ...  While these testbeds are built on a variety of underlying technologies, they share certain core capabilities. Space reserved for ACM copyright and permissions notices.  ...  ActiveCDN is a use case that shows how NetServ can facilitate an economic alliance between ISPs and content providers. Second, NetServ provides a unified runtime environment.  ... 
doi:10.1145/2699392 fatcat:zwvcfk5mwnhbpej3qenk7pzeeu

Bandwidth is Political: Reachability in the Public Internet

Nancy E. Paterson
2009 Social Science Research Network  
BGP manages the routing among the AS routers by selecting the best path for the traffic flow based on many factors.  ...  The CIX alliance was a reaction to the uncertainties surrounding the status of commercial traffic on the Internet.  ...  Clickable icons are color-coded and an overlay with a legend is shown which contains a brief summary of the route and exchange points traversed.  ... 
doi:10.2139/ssrn.2355762 fatcat:ydxrj6kzvveq7dvqa36cpetkei

Architectures for the future networks and the next generation Internet: A survey

Subharthi Paul, Jianli Pan, Raj Jain
2011 Computer Communications  
routing mechanisms.  ...  Networking research funding agencies in USA, Europe, Japan, and other countries are encouraging research on revolutionary networking architectures that may or may not be bound by the restrictions of the  ...  However, BGP fails to satisfy the needs of an efficient, scalable, secure, and robust interdomain routing protocol.  ... 
doi:10.1016/j.comcom.2010.08.001 fatcat:xjfqlqwv6vbjpbd5op5kgseofy

Enabling Technologies [chapter]

Stefano Santoni, Roberto Cigliutti, Massimo Giltrelli, Pasquale Donadio, Chris Matrakidis, Andrea Paparella, Tanya Politi, Marcello Potenza, Erwan Pincemin, Alexandros Stavdas
2010 Core and Metro Networks  
treatments in networking, middleware and software technologies for communications and distributed systems.  ...  Other titles in the series: Wright: Voice over Packet Networks  ...  Sticht from Alcatel-Lucent Deutschland AG for contributions to Sections 6.4 and 6.5.  ... 
doi:10.1002/9780470683576.ch4 fatcat:6e4hiwr35rbvjl7uvomrwerzb4

5G PPP Architecture Working Group - View on 5G Architecture, Version 4.0

Anastasius Gavras, Ömer Bulakci, Marco Gramaglia, Marius Iordache, Mir Ghoraishi, Antonio Garcia, Tezcan Cogalan, Jesús Gutiérrez, Anna Tzanakaki, Dan Warren, Xi Li, Giada Landi (+4 others)
2021 Zenodo  
operation we are seeing these days; the second one (Phase II) which provided the first proof of concepts; and the third one (Phase III) that has targeted the first large scale platforms.  ...  This effort serves not only to review the current state of the art, but also to identify promising trends towards the next generation of mobile and wireless communication networks, namely, 6G.  ...  route for all the traffic coming from the UEs.  ... 
doi:10.5281/zenodo.5155657 fatcat:xbjiccshe5cnvfurrh345dynue

Access Networks [chapter]

2005 Connection-Oriented Networks  
Virtual concatenation provides an efficient and economic solution to this problem.  ...  Finally, we present a scheme for controlling the amount of traffic in an ATM network based on virtual path connections (VPC).  ...  Explain why the timed setup with timed release is the most efficient scheme for the reservation and release of resources in an OXC. 5.  ... 
doi:10.1002/0470016361.ch11 fatcat:kah6edcdxjgbrpc4ihj7ccvrku

Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network

Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai
2012 Journal of Networks  
Simulation results show that BDFT can achieve over 99% accuracy on traces of real network traffic. .  ...  Two heuristic-based link prioritization strategies for improving network resilience are proposed, which are evaluated through simulation on a large synthetic topology that represents a GMPLS-based transport  ...  ACKNOWLEDGEMENT The authors thank Ontario Centres of Excellence (OCE), Canada, and Alcatel-Lucent, Ottawa, for support.  ... 
doi:10.4304/jnw.7.1.88-100 fatcat:7atjgdr7hngvfjvvfibte6d3pm

The First Workshop on Information Hiding Techniques for Internet Anonymity and Privacy

Massimo Villari
INTERNET 2012 The Fourth International Conference on Evolving Internet IHTIAP 2012   unpublished
Abstract-This research presents a feature-based still image watermarking approach.  ...  To resist geometrical transformations, the extended synchronization templates, which help to ensure that reasonably large invariant regions will be available for carrying the watermark payload and/or for  ...  The interdomain part of the problem has been treated in more details, by combining an overlay topology approach with an interdomain constrained routing and admission control.  ... 
fatcat:qde6lpe4engxxbzy7jry4w6iw4

Reinforcement Learning (Dagstuhl Seminar 13321) The Critical Internet Infrastructure (Dagstuhl Seminar 13322) Coding Theory (Dagstuhl Seminar 13351) Interaction with Information for Visual Reasoning (Dagstuhl Seminar 13352)

Peter Auer, Marcus Hutter, Laurent, Georg Carle, Jochen Schiller, Steve Uhlig, Walter Willinger, Matthias Wählisch, Thore Husfeldt, Ramamohan Paturi, Gregory Sorkin, Ryan Williams (+14 others)
unpublished
We gratefully acknowledge the Dagstuhl staff for helping on all administrative coordination, for their patience, and most importantly for providing an extremely inspiring environment.  ...  Is there a lesson for biology? Anja: We are working in this area. Yet, already agreeing on terminology is difficult. Marc: Sensors are underrated, ON and OFF rates need to be studied.  ...  A typical example are Content Delivery Networks (CDNs). ISPs itself do not need to implement traffic engineering because CDNs can very quickly shift traffic to other CDNs or ISPs.  ... 
fatcat:iz3co5xisfejfbnx2t6ptrorfm

Semantic-based management of federated infrastructures for future internet experimentation [article]

Alexander Willner, Technische Universität Berlin, Technische Universität Berlin, Thomas Magedanz
2016
Based on mechanisms that have their origins in Semantic Web research, the use of semantically annotated graphs allows for automatic reasoning, linking, querying and validation of heterogeneous data.  ...  microservice-based architecture for interface abstraction, and a proof-of-concept implementation.  ...  One application of CIM, the Autonomic Communications Forum (ACF) DEN-ng model, based on CIM with an LDAP syntax, 1145 is a possible model for FI network management [p211] .  ... 
doi:10.14279/depositonce-5012 fatcat:go3yi54hczgj7jp27hj2qwmqaa