{"title":"Measurements on the Feasibility of TCP NAT Traversal in Cellular Networks","authors":"L. Makinen, J. Nurminen","doi":"10.1109/NGI.2008.42","DOIUrl":"https://doi.org/10.1109/NGI.2008.42","url":null,"abstract":"This paper studies various techniques to overcome the barriers that firewalls and NATs cause to peer-to-peer connectivity. In the mobile context firewalls and NATs are typically managed by the mobile operator and are thus beyond the control of the mobile user. Therefore the focus of this paper is on techniques that take advantage of known behaviors of NATs and firewalls. Instead of studying how to apply explicit control to these devices we analyze how the different NAT and firewall traversal techniques would work in different cellular networks. To get an idea of operator NAT/firewall behavior we measured six cellular networks in different parts of the world. The analysis of the results shows that there is much variance in these networks; three to four (depending on the used approach) of the networks seem to allow TCP traffic between peers behind NATs or firewalls.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129666571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource Efficient Grooming Policy in Groomable WDM Mesh Networks","authors":"Huaxiong Yao, Yan Yang, Xiansi Tan","doi":"10.1109/NGI.2008.8","DOIUrl":"https://doi.org/10.1109/NGI.2008.8","url":null,"abstract":"This paper addresses the traffic grooming problem in wavelength-division multiplexing (WDM) mesh networks. We first introduce a transceiver saving auxiliary graph model, in which various grooming policies can easily be achieved by assigning weight values for various edges. Then we propose a resource efficient grooming policy (REGP) based on the graph model, which take into account the wavelength constraint and transceiver constraint simultaneously according to the correlation between them while other policies consider only one between them. The REGP policy can apply to dynamic traffic and static traffic. In dynamic traffic scenario, REGP utilizes network resources efficiently according to the ratio of the available number of two resources. In static traffic scenario, REGP chooses the most economical routing path according to the cost ratio between the two resources. Simulation results validate that REGP reduces the blocking probability for dynamic traffic and saves the total network cost for static traffic. Results also show that REGP always has a better performance than other policies in various conditions, static traffic, dynamic traffic and various resource deployments.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115203835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Near-Optimal Load Balancing in Dense Wireless Multi-Hop Networks","authors":"E. Hyytia, J. Virtamo","doi":"10.1109/NGI.2008.31","DOIUrl":"https://doi.org/10.1109/NGI.2008.31","url":null,"abstract":"We consider the load balancing problem in wireless multi-hop networks. In the limit of a dense network, there is a strong separation between the macroscopic and microscopic scales, and the load balancing problem can be formulated as finding continuous curves (\"routes\") between all source-destination pairs that minimize the maximum of the so-called scalar packet flux (\"traffic load\"). In this paper we re-formulate the problem by focusing entirely on the so-called d-flows (vector flow field of packets with a common destination x) and by looking at the equation these flows have to satisfy. The general solution to this equation can be written in terms of a single unknown scalar function, psi(r, x), related to the circulation density of the d-flow, for which function the optimization task can be presented as a problem of variational calculus. In this approach, we avoid completely dealing with systems of paths and calculating the load distribution resulting from the use of a given set of paths. Once the optimal solution for psi(r, x) is found the corresponding paths are obtained as the flow lines of the d-flows. In the example of a unit disk with uniform traffic demands we are able to find a set of paths which is considerably better than any previously published results, yielding a low maximal scalar flux and an extraordinarily flat load distribution. We further illustrate the methodology for a unit square with comparable improvements achieved.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128517887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Dzida, M. Zagozdzon, M. Żotkiewicz, M. Pettersson, M. Pióro, M. Duelli, M. Menth
{"title":"Three Methods for Optimizing Single-Shortest Path Routing","authors":"M. Dzida, M. Zagozdzon, M. Żotkiewicz, M. Pettersson, M. Pióro, M. Duelli, M. Menth","doi":"10.1109/NGI.2008.15","DOIUrl":"https://doi.org/10.1109/NGI.2008.15","url":null,"abstract":"Intra-domain routing in IP networks is based on the shortest path principle by assigning administrative weights (costs) to links. The resulting least-cost paths determine routes between pairs of routers. If several such equal-cost paths exist between a pair of routers, it may not be clear which of them is actually used to route traffic. This makes it difficult to predict the network traffic flow distribution. Therefore, the selected link costs should assure uniqueness of the shortest paths. On top of that, the link costs can be optimized with respect to some traffic objective. The resulting optimization problem, referred to as SSPP, turns out to be NP-hard. SSPP can be formulated as a mixed-integer programming problem and, as such, solved with branch-and- bound (B&B). In this paper, we consider three methods for SSPP. Two of them are exact methods based on B&B, namely branch- and-cut and constraint programming. Since the exact solutions of SSPP may require excessive computation time and may not always be effective when applied to practical networks, we also study a fast heuristic method. Finally, in a numerical study, we compare the effectiveness of the three approaches.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133599644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource Adaptation for Continuous Profit Optimization in Overlay and Virtual Networks","authors":"C. Tran, Z. Dziong","doi":"10.1109/NGI.2008.24","DOIUrl":"https://doi.org/10.1109/NGI.2008.24","url":null,"abstract":"Virtual networks and service overlay networks lease bandwidth from Internet autonomous systems to offer end to end quality of service at competitive costs. In this paper, we propose a novel network resource management approach, based on an economic model, which allows continuous optimizing of the network profit, while keeping acceptable grade of service. The proposal integrates leased link capacity adaptation and connection reward adaptation with connection admission control and routing policies. In our approach, these policies are based on a decomposition of the Markov decision process. The approach implementation is based on link traffic measurements. Numerical analysis validates the approach and shows the convergence and stability of the adaptation as a function of measurement parameters.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131903060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reputation Management for DHT-Based Collaborative Environments","authors":"N. Fedotova, L. Veltri","doi":"10.1109/NGI.2008.49","DOIUrl":"https://doi.org/10.1109/NGI.2008.49","url":null,"abstract":"This article addresses a problem of integration of reputation management mechanisms and lookup processes in (distributed hash table) DHT-based peer-to-peer (P2P) networks with collaborative nature. We present a possible scenario of application of some reputation techniques to lookup and data retrieval processes in a P2P network based on the popular Kademlia algorithm. Unlike most of existing reputation management systems for DHT-based P2P environments, we don't use a number of successful downloads as the main instrument to evaluate a trustworthiness of peers, but we propose to consider any type of interactions between nodes. This choice is motivated by the fact that file sharing is not a unique service supported by DHT-based P2P systems. There are other application areas for P2P (e.g. collaborative and distributed computing) where it is important to consider such aspects as a risk factor, a \"stay on-line\" time or a number of requests without reply.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114528119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved CSMA/CA Protocol for IEEE 802.11","authors":"A. Zúquete","doi":"10.1109/NGI.2008.40","DOIUrl":"https://doi.org/10.1109/NGI.2008.40","url":null,"abstract":"This paper describes a modification of the CSMA/CA protocol used in IEEE 802.11 wireless networks for improving medium reservation actions. The modification promotes bidirectional data transfers between stations that reserve the medium using an RTS/CTS handshake. This approach reduces the amount of RTS/CTS handshakes required when two stations have simultaneously data to send to each other. Consequently, we improve the occupation of the medium with useful data transfers and minimize RTS collisions by reducing the number of RTS/CTS handshakes required to exchange data. Theoretical performance evaluations with several operational parameters and data volumes showed a reduction of 7 to 47% of the elapsed time to complete a bidirectional data exchange. Fairness in the medium access is kept but stations should use extra policies for preventing frames in output queues to take too long to be transmitted; a simple policy based on per-frame counters is sketched.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125166095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BitTorrent Based Solution for Efficient Content Sharing on Next Generation Networks","authors":"P. Ekler, I. Dévai, B. Bakos, A. Kiss","doi":"10.1109/NGI.2008.47","DOIUrl":"https://doi.org/10.1109/NGI.2008.47","url":null,"abstract":"As the architecture of participation became the main design principle in Web2.0, more and more content sharing solutions have appeared on the Internet. These systems encourage end users to create, publish, tag and consume content. Most of them offer a web interface to access the service and are typically implemented with the traditional client-server software architecture. Due to client-server architecture they require additional investments on the backend side as the service attracts more and more users. In this paper we propose an innovative content sharing solution, called Swarm, which offers the following benefits to service providers: cost efficiency, mobility support and necessary control points to prevent misuse of the service. We propose an architecture that combines the advantages of P2P and client-server systems into a single, competitive hybrid solution. First, we introduce the proposed architecture with the most important features, discuss our experience with the reference implementation and finally demonstrate calculations describing the cost efficiency of the Swarm solution.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125001920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CoV(t)-based Traffic and Queuing Modeling","authors":"L. Noirie, G. Post","doi":"10.1109/NGI.2008.44","DOIUrl":"https://doi.org/10.1109/NGI.2008.44","url":null,"abstract":"Accurate performance evaluation and network dimensioning are required for the design and the deployment of new telecommunication networks based on packet-switching technologies (e.g., Ethernet, IP, G/T-MPLS, etc.). In this context, network engineers need simple, efficient and realistic traffic models. In this paper we investigate traffic modeling based on the coefficient of variation CoV(t) of the data rate observed at different time scales t. We derive a simplified CoV(t)-based traffic model, the novelty being that it requires only four parameters easily tunable with the following characteristics: the mean-rate mu, the link capacity C constraining the traffic, the Hurst parameter H and the transition time scale t0 linked to the burst duration. Confronted to some real traffic traces, our model proves to be accurate. We illustrate how to use it in analytical performance calculation by applying it to the \"ideal switch\" case: thanks to our four-parameter simple model, one can derive formulas for node performance estimation or dimensioning. Finally, we propose a new fitting procedure that automatically translates the four-parameter traffic model of this paper into a superposition of Markov fluid ON-OFF sources, and that is simpler than already existing fitting procedures. This superposition can be used to generate traffic for packet switch simulations, simplifying the set-up of the test traffic to the specification of the four parameters we mentioned above.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126681538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Vales-Alonso, E. Egea-López, M. Bueno-Delgado, J. L. Sieiro-Lomba, J. García-Haro
{"title":"Optimal p-Persistent MAC Algorithm for Event-Driven Wireless Sensor Networks","authors":"J. Vales-Alonso, E. Egea-López, M. Bueno-Delgado, J. L. Sieiro-Lomba, J. García-Haro","doi":"10.1109/NGI.2008.34","DOIUrl":"https://doi.org/10.1109/NGI.2008.34","url":null,"abstract":"In event-driven wireless sensor networks nodes transmit information only if the monitored physical magnitude levels have triggered an alarm. In these networks, traffic exhibits a high spatial correlation, since it is likely that neighbor nodes detect and try to notify the same events. Thus, the probability of packet collision raises up, as well as notification delay, just as opposite as required. In this work we propose to use a p- persistent mechanism in the access control layer. The aim is reducing collisions and saving energy. We compute the optimal p for a coherent network deployment and describe the experimental implementation of our proposal. Theoretical computations predict a notable improvement, specially in terms of energy, and experiments reveal that our proposal achieves up to 67% of energy saving compared against a perfect (collision-free) mechanisms.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}