{"title":"IP/MPLS OAM: challenges and directions","authors":"P. Dini, M. Hasan, M. Morrow, G. Parr, P. Rolin","doi":"10.1109/IPOM.2004.1547584","DOIUrl":"https://doi.org/10.1109/IPOM.2004.1547584","url":null,"abstract":"This paper reflects different understandings and positions on IP/MPLS OAM functions and management applications, as perceived by representatives from industry and academia. There is a clear effort to improve the state-of-the-art and to apply lessons learnt from the Ethernet/ATM approaches. A series of questions on the short-term, mid-term and long-term directions definitively arises, especially with regard to the separation of control and management functions. The questions mentioned below do not exhaustively cover the topic. Instead, the questions serve as a starting point for a discussion on methodologies to apply, on engineering requirements to consider, and on the technical challenges to resolve harnessing this next stage of evolution of heterogeneous networking. The panel guests present their perception on these issues. What are the lessons learnt from ATM and Ethernet OAM techniques that are oriented to a single network technology? What is equivalent of OAM appropriate for IP/[G]MPLS (it has to be more at link level rather than connection level)? What MPLS MIB information is intended to support OAM functions? What are the challenges on OAM in hybrid and multi-layer networks? How management systems of next generation networks (NGN) and GRID networks make use of the OAM functions and what else is needed to smoothen the control-management interactions? What is the impact of convergent IP networking and autonomic networking on OAM functions and their distribution? How much proactiveness can management applications achieve with and without OAM functionalities.","PeriodicalId":197627,"journal":{"name":"2004 IEEE International Workshop on IP Operations and Management","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125326754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. M. Guirado-Puerta, J. Malgosa-Sanahuja, J. García-Haro, P. Manzanares-Lopez, J. Sánchez-Aarnoutse
{"title":"Peer-to-peer traffic measurement, analysis and management in an institutional network","authors":"A. M. Guirado-Puerta, J. Malgosa-Sanahuja, J. García-Haro, P. Manzanares-Lopez, J. Sánchez-Aarnoutse","doi":"10.1109/IPOM.2004.1547612","DOIUrl":"https://doi.org/10.1109/IPOM.2004.1547612","url":null,"abstract":"Peer-to-peer (P2P) file-sharing applications are drastically changing the role of the Internet service providers (ISP) and institutional networks. This key reason is an unexpected and indiscriminate network bandwidth use that breaks the balance between costs and benefits. In addition, legal issues must be considered due to piracy associated with P2P applications. P2P effects are especially harmful in corporate, institutional and government networks that do not want to assume the responsibility to carry this type of data traffic. This paper presents an extensive analysis of eDonkey protocol that is one of the most popular P2P protocols. The analysis is focused on studying those important characteristics that allow understanding its behavior. A methodology to identify efficiently the associated TCP flows is also proposed. As a result, a mechanism based on spoofing TCP reset packets is tested to mitigate the eDonkey traffic effects and alleviate the network load.","PeriodicalId":197627,"journal":{"name":"2004 IEEE International Workshop on IP Operations and Management","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114713461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The benefits of monitoring routing protocols in live networks","authors":"N. Dubois, M. Capelle, S. Chou, B. Fondeviole","doi":"10.1109/IPOM.2004.1547585","DOIUrl":"https://doi.org/10.1109/IPOM.2004.1547585","url":null,"abstract":"This paper examines the benefits of deploying protocol centric network monitoring tools in IP and BGP/MPLS VPN networks. For the past three years, we have analysed the routing traffic from the following protocols: IS-IS, BGP and MP-BGP in three different autonomous systems. We explain how one can transform routing protocol packets into valid network management information. We demonstrate that protocol-centric monitoring tools allow unprecedented troubleshooting of routing issues, particularly in the case of BGP/MPLS VPN networks. We also outline that in the BGP/MPLS VPN AS, control plane traffic characteristics are very different from the internet control plane traffic. As such handling BGP/MPLS VPN control plane is a challenge for large service providers from the testing, monitoring and deployment point of views.","PeriodicalId":197627,"journal":{"name":"2004 IEEE International Workshop on IP Operations and Management","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116246500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance optimizations for certificate revocation","authors":"Bao-Hong Li, Yinliang Zhao, Yi-Bin Hou","doi":"10.1109/IPOM.2004.1547598","DOIUrl":"https://doi.org/10.1109/IPOM.2004.1547598","url":null,"abstract":"Certificate revocation is an outstanding problem in PKI. This paper extends Naor's scheme of dynamic hash tree in order to optimize performance. Set of revoked certificates is divided into groups. In each group, proofs for certificate status are computed by using one-way accumulator, while all groups are still organized in hash tree. The main advantage of the proposed scheme is that it can adjust traffic between CA-to-directory and directory-to-user according to certificate update rate and query rate in applications, thus can remarkably reduce overall traffic consumed for certificate revocation, and can efficiently accommodate a wide range of scenarios. Compared with Naor's origin scheme, performance analysis shows it can reduce traffic by about 50% in typical environments.","PeriodicalId":197627,"journal":{"name":"2004 IEEE International Workshop on IP Operations and Management","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115112412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel disjoint-LSP selection scheme with SRLG in GMPLS-based networks","authors":"Qing Huang, G. Kuo","doi":"10.1109/IPOM.2004.1547610","DOIUrl":"https://doi.org/10.1109/IPOM.2004.1547610","url":null,"abstract":"In order to enhance the survivability of networks, network community must provide efficient recovery techniques to guarantee service continuity. In future generalized multi-protocol label switching (GMPLS)-based networks, several kinds of protection and restoration (P&R) mechanisms are provisioned. Finding physically disjoint label switched paths (LSPs) with shared risk link group (SRLG) is a crucial factor for all P&R mechanisms in GMPLS-based networks. The purpose of this paper is to propose an efficient disjoint-LSP selection scheme with SRLG (DLSSWS) in GMPLS-based networks. The proposed scheme can utilize SRLG information correctly and efficiently. Most important, it provides a common framework for conventional disjoint-path selection algorithms to find SRLG disjoint LSPs in GMPLS-based networks. In addition, the proposed scheme has lower cost than that of others (E. Oki, et al, 2002).","PeriodicalId":197627,"journal":{"name":"2004 IEEE International Workshop on IP Operations and Management","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115773178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The analysis of algorithm for efficient network flow monitoring","authors":"Liu Xianghui, Yin Jianping","doi":"10.1109/IPOM.2004.1547588","DOIUrl":"https://doi.org/10.1109/IPOM.2004.1547588","url":null,"abstract":"Effective monitoring of network flow is a key enabling technology for networks and gains extensive attention of researcher. In this paper, we focus efficient monitoring by passive measurement for the network flow on reducing the generation overhead communication as much as possible. The problem of efficient monitoring for the network flow is regarded as the problem to find out the minimum flow partition marked set for a given graph, which is NP-hard by proof. Approximation algorithm to find out the minimum flow partition marked set is presented with approximation ratio. Simulation results indicate that our proposed algorithms dramatically reduce monitoring nodes compared to scenarios in which vertex cover is employed.","PeriodicalId":197627,"journal":{"name":"2004 IEEE International Workshop on IP Operations and Management","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114265123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Streamlining traceroute by estimating path lengths","authors":"T. Moors","doi":"10.1109/IPOM.2004.1547603","DOIUrl":"https://doi.org/10.1109/IPOM.2004.1547603","url":null,"abstract":"Traditional traceroute determines the path through a network by sending probe packets with progressively increasing TTL/hop count values so that routers that are progressively further from the inquirer send ICMP time exceeded messages and so reveal their identity. This process can be slow (because traceroute must wait for a timeout or response to one probe before sending the next) and inefficient (through repeated probing of routers near the inquirer that lie on the intersection of paths leading to multiple targets). This paper shows how this process can be streamlined by the inquirer sending a scout packet to the (reachable) target before sending route tracing probes. The inquirer uses the TTL of the response to this scout packet to estimate the length of the path to the target (with tolerance for path asymmetry), and can then either expedite the route tracing process (by sending probes to each of the estimated number of routers on the path in quick succession) or reduce the number of probes needed (by inverting the direction of traditional traceroute, tracing the path from the target towards the inquirer, and terminating the process when it reaches a router on a known path from the inquirer).","PeriodicalId":197627,"journal":{"name":"2004 IEEE International Workshop on IP Operations and Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134271732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yanlei Shang, W. Guo, Shiduan Cheng, Biao Ren, Fei Wang
{"title":"Enhanced MAC architecture for differentiated services in IEEE 802.11 WLAN","authors":"Yanlei Shang, W. Guo, Shiduan Cheng, Biao Ren, Fei Wang","doi":"10.1109/IPOM.2004.1547619","DOIUrl":"https://doi.org/10.1109/IPOM.2004.1547619","url":null,"abstract":"In this paper we propose a novel MAC architecture to support differentiated services in IEEE 802.11 WLAN. By limiting the number of the contending STAs and distributing different priorities to the traffic classes with particular QoS requirements, the resulting MAC can provide prioritized services with different delays and collision probabilities. For this QoS-enabled MAC scheme, we give analytical results of the collision probability and successful transmit probability. We also evaluate the performance by using the ns-2 simulator.","PeriodicalId":197627,"journal":{"name":"2004 IEEE International Workshop on IP Operations and Management","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114230301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mapping sub-flows to p2mp LSPs","authors":"F. Solano, R. Fabregat, Y. Donoso, J. Marzo","doi":"10.1109/IPOM.2004.1547594","DOIUrl":"https://doi.org/10.1109/IPOM.2004.1547594","url":null,"abstract":"In previous work we proposed a multi-objective traffic engineering scheme (MHDB-S model) using different distribution trees to multicast several flows. In this paper, we propose a heuristic algorithm to create multiple point-to-multipoint (p2mp) LSPs based on the optimum sub-flow values obtained with our MHDB-S model. Moreover, a general problem for supporting multicasting in MPLS networks is the lack of labels. To reduce the number of labels used, a label space reduction algorithm solution is also considered.","PeriodicalId":197627,"journal":{"name":"2004 IEEE International Workshop on IP Operations and Management","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115191557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multicommodity flow optimization in support for packet-switched network traffic engineering","authors":"Tze-Ven Poh, Jing Jiang, M. Reed","doi":"10.1109/IPOM.2004.1547587","DOIUrl":"https://doi.org/10.1109/IPOM.2004.1547587","url":null,"abstract":"Many contemporary IP routing protocols are based on algorithms that are non-traffic-aware. The chief problem is that very often many comparable traffic flows are misled to converge on bottleneck links since these algorithms are oblivious to traffic characteristics and link loading. One possible remedy to this is to reconstitute them with a better algorithm. We recommend the maximum concurrent multicommodity flow (MCMF) algorithm. It considers traffic demands, network topology and resources in its computation to generate an optimal solution that satisfies all traffic demands as much and as fairly as possible while not overusing the resources. It does this by spreading traffic load across all feasible links in the network. In simpler terms it means placing traffic where the capacity exists. We develop a basic traffic engineering framework that shows how the MCMF algorithm can be applied. There exists numerous algorithms for solving this kind of problem. But this paper focuses particularly on a fully polynomial time approximation scheme (FPTAS), namely, the Garg-Konemann (1997) algorithm. However, its convergence rate is inconsistent due to its dependency on initial guess of a crucial parameter. We extend this algorithm in order to eliminate this issue and include empirical results that demonstrate its superiority over the original version. We conclude our paper with our opinion whether if the algorithm is fast enough to qualify as an on-line IP routing engine.","PeriodicalId":197627,"journal":{"name":"2004 IEEE International Workshop on IP Operations and Management","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114395463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}