{"title":"Managing IPv4-to-IPv6 transition process in cellular networks and introducing new peer-to-peer services","authors":"J. Wijakka, J. Soininen","doi":"10.1109/IPOM.2003.1251221","DOIUrl":"https://doi.org/10.1109/IPOM.2003.1251221","url":null,"abstract":"The paper describes the acute problems with the current Internet Protocol (IPv4), especially from the IP-based cellular network point of view. As a solution to the problem, the document proposes the use of the new Internet Protocol (IPv6). Its adequate address space is clearly needed to enable new type of peer-to-peer services in mobile networks. Transition from IPv4 to IPv6 is a challenging task. Hence, this paper analyzes how the transition process in Third Generation Partnership Project (3GPP) cellular networks can be efficiently handled.","PeriodicalId":128315,"journal":{"name":"Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128686856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A reordering-free multipath traffic engineering architecture for DiffServ-MPLS networks","authors":"N. Akar, I. Hokelek, M. Atik, Ezhan Karasan","doi":"10.1109/IPOM.2003.1251231","DOIUrl":"https://doi.org/10.1109/IPOM.2003.1251231","url":null,"abstract":"We propose a novel traffic engineering architecture for IP networks with multiprotocol label switching (MPLS) backbones. In this architecture, two (primary and secondary) label switched paths (LSPs) are established among every pair of IP routers located at the edge of an MPLS cloud. Traffic between a source-destination pair is then split between the primary and secondary LSPs using an ABR-like explicit-rate feedback gathered from the network. Taking into consideration the packet reordering effect of packet-based load balancing schemes, we propose a novel traffic splitting mechanism that operates on a per-flow basis. We show, using a variety of scenarios, that deploying flow-based multipath traffic engineering not only provides significantly and consistently better throughput than that of a single path, but is also void of any packet reordering.","PeriodicalId":128315,"journal":{"name":"Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127720961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of adjusted probabilistic packet marking","authors":"Bilal Rizvi, Emmanuel Femandez-Gaucherand","doi":"10.1109/IPOM.2003.1251218","DOIUrl":"https://doi.org/10.1109/IPOM.2003.1251218","url":null,"abstract":"Probabilistic packet marking (PPM) has been proposed for the identification of the source of a denial of service (DoS) attack (Savage, S. et al., Proc. ACM SIGCOM, p.295-305, 2000). PPM is based on marking packets with a fixed probability by all routers. However, using a fixed marking probability allows a large number of packets to reach the victim unmarked, which can be spoofed to impede traceback. Also, using a fixed marking probability, the victim receives fewer marked packets from routers further away from the victim, which increases the computational time needed for traceback. Hence, we study the adjusted probabilistic packet marking (APPM) scheme (Teo Peng et al., Proc. Networking, 2002), where variable marking probability is used so that the victim receives packets from all routers with equal probability. However, using the analysis similar to that of Kihomg Park and Heejo Lee (see Proc. IEEE INFOCOM, 2001) we show that APPM is also subject to spoofing of the marking field for smaller path lengths. A modified version of APPM is proposed that reduces unmarked packets reaching the victim and the computational time needed for traceback.","PeriodicalId":128315,"journal":{"name":"Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764)","volume":"1999 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123547302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flow-level upstream traffic behavior in broadband access networks: DSL versus broadband fixed wireless","authors":"A. Sinha, K. Mitchell, D. Medhi","doi":"10.1109/IPOM.2003.1251235","DOIUrl":"https://doi.org/10.1109/IPOM.2003.1251235","url":null,"abstract":"We present flow-level upstream traffic behavior based on data collected from broadband fixed wireless (BFW) and digital subscriber line (DSL) access services. The study involves data collected using Cisco's NetFlow tools on both access networks. The observations indicate that a number of applications based on peer-to-peer (P2P) concepts create most of the upstream traffic. The flows observed are mostly short-lived for both BFW and DSL access, with DSL being the lesser of the two. The inter-arrival time displays near-range correlation for the DSL flows. There is a significant periodicity observed in the interarrival time distribution for flows on BFW access, which is indicative of the influence of the underlying medium access control (MAC) protocol on traffic behavior. These analysis of upstream traffic characteristics form the first step towards constructing a generalized parametric model for broadband access networks.","PeriodicalId":128315,"journal":{"name":"Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131717923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RTTometer: measuring path minimum RTT with confidence","authors":"A. Zeitoun, Zhiheng Wang, S. Jamin","doi":"10.1109/IPOM.2003.1251234","DOIUrl":"https://doi.org/10.1109/IPOM.2003.1251234","url":null,"abstract":"Internet path delay is a substantial metric in determining path quality. Therefore, it is not surprising that round-trip time (RTT) plays a tangible role in several protocols and applications, such as overlay network construction protocol, peer-to-peer services, and proximity-based server redirection. Unfortunately, current RTT measurement tools report delay without any further insight about path condition. Therefore, applications usually estimate minimum RTT by sending a large number of probes to gain confidence in the measured RTT. Nevertheless, a large number of probes does not directly translate to better confidence. Usually, minimum RTT can be measured using few probes. Based on observations of path RTT presented by Z. Wang et al. (see Proc. Passive & Active Measurement Workshop - PAM'03, 2003), we develop a set of techniques, not only to measure minimum path RTT, but also to associate it with a confidence level that reveals the condition on the path during measurement. Our tool, called RTTometer, is able to provide a confidence measure associated with path RTT. Besides, given a required confidence level, RTTometer dynamically adjusts the number of probes based on a path's condition. We describe our techniques implemented in RTTometer and present our preliminary experiences using RTTometer to estimate RTT on various representative paths of the Internet.","PeriodicalId":128315,"journal":{"name":"Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116886356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An alarm management approach in the management of multi-layered networks","authors":"J. Zupan, D. Medhi","doi":"10.1109/IPOM.2003.1251227","DOIUrl":"https://doi.org/10.1109/IPOM.2003.1251227","url":null,"abstract":"We consider large interconnected networks that operate under a user-provider paradigm (such as IP over SONET) where networks from different layers are in different administrative domains. In such a relationship, the overall network survivability can benefit from a limited sharing of network management data between networks of different layers. The paper proposes a multi-layered alarm management framework in such a setting. The alarm manager uses a finite state machine to represent an alarm instance with state transitions triggered as a result of the correlation of multiple alarms. We present a constructive argument to demonstrate the correctness of the finite state machine. Alarm correlation is handled by a rule-based reasoning engine. The set of correlation rules and corresponding actions depends on the definition of alarms that can enter the system. Therefore, based on the multi-layered paradigm and the inclusion of a performance management agent, three alarm categories are created: provider network alarms; user network alarms; predictive alarms.","PeriodicalId":128315,"journal":{"name":"Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115216295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An integrated service and network management system for MPLS traffic engineering and VPN services","authors":"Changhoon Kim, T. Choi, T. Jeong, Youngseok Lee","doi":"10.1109/IPOM.2003.1251226","DOIUrl":"https://doi.org/10.1109/IPOM.2003.1251226","url":null,"abstract":"MPLS technology has recently been widely adopted, not only in large-scale IP backbones, but in metro and enterprise networks as well. Among the merits of MPLS, effective and efficient support of TE (traffic engineering) and VPN (virtual private network) services is the most influential factor that has facilitated the diffusion of the technology. However, although MPLS itself has become a currently operational technology, issues regarding the management of various services that are built on top of individually operating MPLS capable network elements have not been well identified or solved. These service level management issues arise, not only under heterogeneous conditions, but even when the target network is homogeneously composed. The paper discusses the requirements and architectural aspects of an integrated service management system for MPLS TE and VPN services. The discussion encompasses fault and performance management issues and information models which should be flexible to support newer services that can be rendered by merging TE, VPN, and QoS technologies. We also examine performance, fault tolerance, and scalability issues that cannot be neglected when such systems are deployed in a real-world environment.","PeriodicalId":128315,"journal":{"name":"Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123214488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A QoS specification proposal for IP virtual private networks","authors":"M. Girish, John Yu, T. Soon","doi":"10.1109/IPOM.2003.1251228","DOIUrl":"https://doi.org/10.1109/IPOM.2003.1251228","url":null,"abstract":"Demand for virtual private networks (VPN) are on the increase as enterprises opt for secure cost effective data networking solutions with specific quality of service (QoS) guarantees. The advantages of the Internet Protocol (IP) have made it the primary network layer protocol of choice for the future as well. Nevertheless, the concept of service differentiation and how to specify and guarantee it in IP VPN are rather difficult and often fuzzy. We propose a class of service (CoS) classification with an associated QoS parameter set for IP virtual private networks in the wide area. We study various scenarios and, in each case, we derive the conditions under which appropriate QoS can be guaranteed for each CoS by policing the aggregate arrival rates of each class from each VPN access interface into the IP network, thereby eliminating the difficulties associated with accurately estimating the end-to-end traffic profiles. In addition to simplifying the specifications, our proposal enables the users to exploit fully the potential of service differentiation in connectionless networks.","PeriodicalId":128315,"journal":{"name":"Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764)","volume":"443 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132851010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}