Raj jain washington university
Louis , Computer science and engineering , Faculty Member. Unfollow Follow Unblock. Other Affiliations:. Computer Science and Computer Engineering. Raj Jain is currently the Barbara J. Cox, Jr. Eads Award from St. We examine various unspecified bit rate UBR drop policies, TCP mechanisms and network configurations to recommend optimal ICCCN' …. Dec-Tr more. The P-ART framework for placement of virtual network services in a multi-cloud environment more.
Network Slicing for 5G: Challenges and Opportunities more. Network slicing for 5G is receiving significant attention from the telecommunications industry as a means to provide network as a service NaaS for different use cases. Network slicing is a technology which allows network operators to Network slicing is a technology which allows network operators to build multiple virtual networks on a shared infrastructure.
With network slicing, service providers can deploy their applications and services flexibly and quickly to accommodate specific requirements of diverse services such as augmented reality, online games, e-health and others. As an emerging technology with a number of advantages, network slicing has raised many issues for the industry and academia alike.
In this article, we discuss the background and related work in network slicing and propose a framework for 5G network slicing. Finally, we discuss the challenges of network slicing and future research directions.
Doi: This article surveys blockchain-based approaches for several security services. These services include authentication, confidentiality, privacy and access control list ACL , data and resource provenance, and integrity assurance. All these services are critical for the current distributed applications, especially due to the large amount of data being processed over the networks and the use of cloud computing.
Confidentiality guarantees that data cannot be read by unauthorized users. Privacy provides the users the ability to control who can access their data. Provenance allows an efficient tracking of the data and resources along with their ownership and utilization over the network. Integrity helps in verifying that the data has not been modified or altered. These services are currently managed by centralized controllers, for example, a certificate authority. Therefore, the services are prone to attacks on the centralized controller.
On the other hand, blockchain is a secured and distributed ledger that can help resolve many of the problems with centralization. The objectives of this paper are to give insights on the use of security services for current applications, to highlight the state of the art techniques that are currently used to provide these services, to describe their challenges, and to discuss how the blockchain technology can resolve these challenges.
Further, several blockchain-based approaches providing such security services are compared thoroughly. Challenges associated with using blockchain-based security services are also discussed to spur further research in this area. Fault and performance management systems, in the traditional carrier networks, are based on rule-based diagnostics that correlates alarms and other markers to detect and localize faults and performance issues.
As carriers move to Virtual As carriers move to Virtual Network Services, based on Network Function Virtualization and multi-cloud, the traditional methods fail to deliver because of the impalpability of the constituent Virtual Network Functions and increased complexity of the resulting architecture.
In this paper, we propose a framework, called HYPER-VINES, that interfaces with various management platforms involved, to process markers, through a system of shallow and deep machine learning models, to detect and localize manifested and impending fault and performance issues. Our experiments validate the functionality and feasibility of the framework in terms of accurate detection and localization of such issues and unambiguous prediction of impending issues.
Simulations with real network fault datasets show effectiveness of its architecture in large networks. Deployment of Network Function Virtualization NFV over multiple clouds accentuates its advantages like flexibility of virtualization, proximity to customers and lower total cost of operation.
However, NFV over multiple clouds has not However, NFV over multiple clouds has not yet attained the level of performance to be a viable replacement for traditional networks. In NFV, faults and performance issues can have complex geneses within virtual resources as well as virtual networks and cannot be effectively handled by traditional rulebased systems. In the train model, the traffic on the network consists of a number of packet streams between various pairs of nodes on the network.
Each node-pair stream or node-pair process, as we call them consists of a number of trains. Satellite networks play an indispensable role in providing global Internet access and electronic connectivity.
To achieve such global communications, provisioning of quality of service QoS within the advanced satellite systems is the To achieve such global communications, provisioning of quality of service QoS within the advanced satellite systems is the main requirement.
One of the key mechanisms of implementing the quality of service is traffic management. Traffic management becomes a crucial factor in the case of satellite network because of the limited availability of their resources. Enhanced MILSA architecture for naming, addressing, routing and security issues in the next generation internet more.
Abstract In a wireless environment, due to topology changes and characteristics of media interference in radio signals the bandwidth of a link is unpredictable and possibly very low, the error rates are variable and extremely high Abstract In a wireless environment, due to topology changes and characteristics of media interference in radio signals the bandwidth of a link is unpredictable and possibly very low, the error rates are variable and extremely high.
Provisioning and guaranteeing quality of service QoS in such an environment is a very challenging problem. In this paper we propose an adaptive and QoS framework to support multimedia applications in a wireless networking environment.
Modeling and resource allocation for mobile video over WiMAX broadband wireless networks more. Abstract The key to proper resource allocation for mobile video on wireless networks is to have a good model for the resource demands.
In this paper, we present the results of analysis of a number of mobile video streams and show that a The model has been implemented to provide both video frame and RTP packet generators. Buffer management for the GFR service more.
A vision of the next generation internet: A policy oriented perspective more. The Internet is emerging as the new universal telecommunication medium.
Consequently survivability is a crucial concern in designing IP over This paper presents a survey of the survivability mechanisms for IP over WDM networks and thus is intended to provide a summary of what has been done in this area and help further research.
A number of optical layer protection techniques have been discussed. FDDI: current issues and future plans more. The timed token access method, used to share the medium among stations in As described in the standard, the mapping from the allocation As described in the standard, the mapping from the allocation into downlink subframe for each burst needs to be in a rectangular shape.
The rectangular mapping problem is a variation of a bin or strip packing problem, which is known to be NP complete. However, the mapping decision needs to be made within a few milliseconds for each Mobile WiMAX frame.
Abstract Many challenges to the Internet including global routing scalability have drawn significant attention from both industry and academia, and have generated several new ideas for the next generation. MILSA Mobility and Multihoming supporting Identifier Locator Split Architecture and related enhancements are designed to address the naming, addressing, and routing scalability challenges, provide mobility and multihoming support, and easy transition from the current Internet.
Terabit switching: a survey of techniques and current products more. This survey paper explains the issues in designing terabit routers and the solutions for them. The discussion includes multi-layer switching, route caching, label switching, and efficient routing table lookups.
Router architecture issues Router architecture issues including queuing and differentiated service are also discussed. A comparison of features of leading products is included. Economically Viable Support for Internet Mobility more. Abstract The support for mobility is a major requirement for the future Internet. Although several mobility solutions have been proposed, none of them has been largely deployed, mostly because they are not economically viable.
We propose We propose a business oriented mobility framework-Mobility Support Service MSS to be offered as a value-added service to paying mobile customers. MSS uses Identifiers IDs to locate the nodes and network addresses as points of attachment for the nodes.
MSS is a scalable distributed service. Congestion control and traffic management in ATM networks: Recent advances and a survey more. Reasons behind these selections are explained. In particular, selection criterion for selection between rate-based and In particular, selection criterion for selection between rate-based and credit-based approach and the key points of the debate between these two approaches are presented.
The approach that was finally selected and several other schemes that were considered are described. Congestion control with explicit rate indication more. Abstract As the speed and the dynamic range of computer networks evolve, the issue of efficient traffic management becomes increasingly important.
The paper describes an approach to traffic management using explicit rate information The paper describes an approach to traffic management using explicit rate information provided to the source by the network. The authors present an asynchronous distributed algorithm for optimal rate calculation across the network, where optimality is understood in the maxmin sense. Analysis of backward congestion notification bcn for ethernet in datacenter applications more.
Abstract IEEE The goal of this work is to enable application of Ethernet in backend datacenter applications. Such applications Such applications typically use fiber channel and infiniband due to their loss-free characteristics. A backward congestion notification BCN scheme is one of the candidate schemes proposed to avoid long delays and minimize loss in Ethernet networks.
This paper presents an analysis of this scheme. Myths about congestion management in high speed networks more. Abstract: Weaknesses in several recently proposed ideas about congestion control and avoidance in high-speed netwroks are identified. Both sides of the debate concerning prior reservation of resources versus walk-in service, open-loop Both sides of the debate concerning prior reservation of resources versus walk-in service, open-loop control versus feedback control, rate control versus window control, and router-based control versus source-based control are presented.
Abstract: An explicit rate indication scheme for congestion avoidance in computer and telecommunication networks is proposed. Denise S. Ponchak, Fred L. Ponchak, F. Templin, R. Jain, G. Sheffield, and P. Xin Li, Mohammed Samaka, H. Lav Gupta, Raj Jain, H. Raj Jain and S.
0コメント