Empirical Survey: Experimentation and Implementations of High Speed Protocol Data Transfer for GRID

D. Bernardo, D. Hoang
{"title":"Empirical Survey: Experimentation and Implementations of High Speed Protocol Data Transfer for GRID","authors":"D. Bernardo, D. Hoang","doi":"10.1109/WAINA.2011.42","DOIUrl":null,"url":null,"abstract":"Many TCP protocol variants have demonstrated better performance in simulation and several limited network experiments. However, practical use in real applications of these protocols is still very limited because of the implementation and installation difficulties. On the other hand, users who need to transfer bulk data (e.g., ingrid/cloud computing) usually turn to application level solutions where these variants do not fair well. Among protocols considered in the application level solutions are UDP-based protocols, such as UDT (UDP-based DataTransport Protocol). UDT is considered one of the most recently developed new transport protocols with congestion control algorithms. It was developed to support next generation high-speed networks, including wide area optical networks. It is considered a state-of-the-art protocol, which promptly addresses various infrastructure requirements for transmitting data in high-speed networks. Its development, however, creates new vulnerabilities because like many other protocols, it is designed to rely solely on existing security mechanisms for existing protocols such as the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Some of these security mechanisms cannot be used to absolutely protect UDT, just as security mechanisms devised for wired networks cannot be used to protect unwired ones. Both the recently developed UDT and the decades-old TCP/UDP lack a well-thought-out security architecture that addresses problems in today’snetworks. In this paper, we extend our previous work and implement our developed security methodology that can assist network and security investigators, designers, and users who consider and incorporate security when implementing UDT across wide area networks. These can support security architectural designs of UDP-based protocols as well as assist in the future development of other state-of-the-art fast data transfer protocols.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"131 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WAINA.2011.42","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Many TCP protocol variants have demonstrated better performance in simulation and several limited network experiments. However, practical use in real applications of these protocols is still very limited because of the implementation and installation difficulties. On the other hand, users who need to transfer bulk data (e.g., ingrid/cloud computing) usually turn to application level solutions where these variants do not fair well. Among protocols considered in the application level solutions are UDP-based protocols, such as UDT (UDP-based DataTransport Protocol). UDT is considered one of the most recently developed new transport protocols with congestion control algorithms. It was developed to support next generation high-speed networks, including wide area optical networks. It is considered a state-of-the-art protocol, which promptly addresses various infrastructure requirements for transmitting data in high-speed networks. Its development, however, creates new vulnerabilities because like many other protocols, it is designed to rely solely on existing security mechanisms for existing protocols such as the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Some of these security mechanisms cannot be used to absolutely protect UDT, just as security mechanisms devised for wired networks cannot be used to protect unwired ones. Both the recently developed UDT and the decades-old TCP/UDP lack a well-thought-out security architecture that addresses problems in today’snetworks. In this paper, we extend our previous work and implement our developed security methodology that can assist network and security investigators, designers, and users who consider and incorporate security when implementing UDT across wide area networks. These can support security architectural designs of UDP-based protocols as well as assist in the future development of other state-of-the-art fast data transfer protocols.
网格高速协议数据传输的实验与实现
许多TCP协议变体在仿真和一些有限的网络实验中显示出更好的性能。然而,由于实现和安装困难,这些协议在实际应用中的实际使用仍然非常有限。另一方面,需要传输大量数据(例如,英格丽/云计算)的用户通常会转向应用级解决方案,而这些变体并不能很好地发挥作用。应用层解决方案中考虑的协议包括基于udp的协议,如UDT(基于udp的数据传输协议)。UDT被认为是最近开发的具有拥塞控制算法的新传输协议之一。它的开发是为了支持下一代高速网络,包括广域光网络。它被认为是最先进的协议,可以迅速解决高速网络中传输数据的各种基础设施要求。然而,它的开发产生了新的漏洞,因为像许多其他协议一样,它被设计为仅依赖于现有协议的现有安全机制,如传输控制协议(TCP)和用户数据报协议(UDP)。其中一些安全机制不能用于绝对保护UDT,正如为有线网络设计的安全机制不能用于保护非有线网络一样。最近开发的UDT和几十年前的TCP/UDP都缺乏一个经过深思熟虑的安全架构来解决当今网络中的问题。在本文中,我们扩展了我们以前的工作并实现了我们开发的安全方法,可以帮助网络和安全调查人员、设计人员和在跨广域网实施UDT时考虑并纳入安全性的用户。它们可以支持基于udp的协议的安全体系结构设计,并有助于未来开发其他最先进的快速数据传输协议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信