Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210124
Edwin D. Vinas, Carla P. Quiblat, Carlo Manuel R. Camus, R. Mendoza, Denis F. Villorente, Tomomitsu Baba
Since it started in 1995, the Asian Internet Interconnection Initiatives (AI3) project has grown into a large satellite-based research network in the Asia Pacific. All partner institutions are connected via the C-band or Ku-band channel of the JCSAT satellite. This paper evaluates the performance of the AI3 testbed in terms of bandwidth consumption, traffic flows, and measurement with the introduction of Open Network Measurements Data Exchange (OpenMDE), a new concept in network measurement systems. OpenMDE will provide a basis for future implementation, and could be applied to specific approaches of certain ABs network operation issues. Furthermore, this paper shows the evaluation of each partner's utilization of the AI3 connection with an analysis of whether the traffic is associated with research or is part of the commercial Internet. Also, it will provide measurement data that will determine weak points of the network, serving as basis for possible upgrades.
{"title":"Characterization, analysis, and visualization of traffic in the Asian Internet Interconnection Initiatives (AI3) satellite-based research network test bed","authors":"Edwin D. Vinas, Carla P. Quiblat, Carlo Manuel R. Camus, R. Mendoza, Denis F. Villorente, Tomomitsu Baba","doi":"10.1109/SAINTW.2003.1210124","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210124","url":null,"abstract":"Since it started in 1995, the Asian Internet Interconnection Initiatives (AI3) project has grown into a large satellite-based research network in the Asia Pacific. All partner institutions are connected via the C-band or Ku-band channel of the JCSAT satellite. This paper evaluates the performance of the AI3 testbed in terms of bandwidth consumption, traffic flows, and measurement with the introduction of Open Network Measurements Data Exchange (OpenMDE), a new concept in network measurement systems. OpenMDE will provide a basis for future implementation, and could be applied to specific approaches of certain ABs network operation issues. Furthermore, this paper shows the evaluation of each partner's utilization of the AI3 connection with an analysis of whether the traffic is associated with research or is part of the commercial Internet. Also, it will provide measurement data that will determine weak points of the network, serving as basis for possible upgrades.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131999824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210118
Yasuo Tsuchimoto, Shoko Mikawa, K. Okawa
This paper concerns the deployment of the Internet over satellite circuits. A lack of operators is problematic to the spread this technology. In order to overcome this obstacle, this paper addresses training of the network's operators. In Internet operation, not only technical issues, but also issues regarding communication between operators become important when configuring routing setups such as BGP. Therefore, an operator learning workshop intended to provide knowledge and experience regarding the network's operation was held in Japan. Through this workshop operators learned to configure routers by themselves and solve problems when they occur. The workshop was also intended to foster a sense of community among its participants, which will help facilitate the configuring of a routing protocol such as BGP.
{"title":"The deployment of UDL network on satellite circuit with training workshop","authors":"Yasuo Tsuchimoto, Shoko Mikawa, K. Okawa","doi":"10.1109/SAINTW.2003.1210118","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210118","url":null,"abstract":"This paper concerns the deployment of the Internet over satellite circuits. A lack of operators is problematic to the spread this technology. In order to overcome this obstacle, this paper addresses training of the network's operators. In Internet operation, not only technical issues, but also issues regarding communication between operators become important when configuring routing setups such as BGP. Therefore, an operator learning workshop intended to provide knowledge and experience regarding the network's operation was held in Japan. Through this workshop operators learned to configure routers by themselves and solve problems when they occur. The workshop was also intended to foster a sense of community among its participants, which will help facilitate the configuring of a routing protocol such as BGP.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131029877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210158
M. Ishiyama, M. Kohno, M. Kunishi, F. Teraoka
This paper presents a new mobility protocol that supports multiple namespaces on IPv6 networks. Our proposed protocol framework allows a mobile node to specify a correspondent node by a name that is defined in any namespace as a node identifier. This technique removes certain restrictions on the space of node identifiers and allows mobile nodes to communicate with each other regardless of their location. Mobile nodes negotiate a pseudo node identifier which is unique between the two nodes, with a correspondent node that is identified by the name. We make this pseudo node identifier compatible with the IPv6 address format; we can thus use existing IPv6 applications with our proposed mobility framework. This framework is based on Location Independent Network Architecture (LINA), and provides mobility support in a simple fashion and with low protocol overhead. We also demonstrate how to provide anonymity to our mobility protocol by using a dynamic pseudo node identifier.
{"title":"A mobility protocol framework to support multiple namespaces","authors":"M. Ishiyama, M. Kohno, M. Kunishi, F. Teraoka","doi":"10.1109/SAINTW.2003.1210158","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210158","url":null,"abstract":"This paper presents a new mobility protocol that supports multiple namespaces on IPv6 networks. Our proposed protocol framework allows a mobile node to specify a correspondent node by a name that is defined in any namespace as a node identifier. This technique removes certain restrictions on the space of node identifiers and allows mobile nodes to communicate with each other regardless of their location. Mobile nodes negotiate a pseudo node identifier which is unique between the two nodes, with a correspondent node that is identified by the name. We make this pseudo node identifier compatible with the IPv6 address format; we can thus use existing IPv6 applications with our proposed mobility framework. This framework is based on Location Independent Network Architecture (LINA), and provides mobility support in a simple fashion and with low protocol overhead. We also demonstrate how to provide anonymity to our mobility protocol by using a dynamic pseudo node identifier.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123260299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210161
D. Sisalem, J. Fiedler, R. Ruppelt
The session initiation protocol (SIP) is constantly gaining in popularity and acceptance as the signaling protocol for next generation multimedia communication. While current networks are still mostly based on IPv4, IPv6 is being proposed for next generation networks. This paper describes the benefits of using IPv6 for SIP and presents approaches for establishing SIP based communication in heterogeneous environments.
{"title":"SIP and IPv6: why and how?","authors":"D. Sisalem, J. Fiedler, R. Ruppelt","doi":"10.1109/SAINTW.2003.1210161","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210161","url":null,"abstract":"The session initiation protocol (SIP) is constantly gaining in popularity and acceptance as the signaling protocol for next generation multimedia communication. While current networks are still mostly based on IPv4, IPv6 is being proposed for next generation networks. This paper describes the benefits of using IPv6 for SIP and presents approaches for establishing SIP based communication in heterogeneous environments.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"123 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129641182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210187
G. Suarez
Many corporations and government organizations spend millions of dollars in the protection of their company or organizational data. These protection mechanisms often follow a secured layered approach, called defense in depth (DiD), which allow these organizations to have a more secured network based on security mechanisms at different areas of their network design. Defense in depth is the concept of protecting a computer network with a series of defensive mechanisms such that if one mechanism fails, another will already be in place to thwart an attack. Because there are so many potential attackers with such a wide variety of attack methods available, there is no single method for successfully protecting a computer network. Utilizing the strategy of defense in depth will reduce the risk of having a successful-and likely very costly-attack on a network. In today's environment there is more of a need than ever for increased security in enterprise level networks. Companies are finding themselves with offices around the world and needing a way to provide an affordable high speed secure communications between them as well as provide ways to implement wireless technologies in a secured environment. This paper describes an example of how this can be done and the special issues and challenges associated with securing these types of networks.
{"title":"Challenges affecting a defense-in-depth security architected network by allowing operations of wireless access points (WAPs)","authors":"G. Suarez","doi":"10.1109/SAINTW.2003.1210187","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210187","url":null,"abstract":"Many corporations and government organizations spend millions of dollars in the protection of their company or organizational data. These protection mechanisms often follow a secured layered approach, called defense in depth (DiD), which allow these organizations to have a more secured network based on security mechanisms at different areas of their network design. Defense in depth is the concept of protecting a computer network with a series of defensive mechanisms such that if one mechanism fails, another will already be in place to thwart an attack. Because there are so many potential attackers with such a wide variety of attack methods available, there is no single method for successfully protecting a computer network. Utilizing the strategy of defense in depth will reduce the risk of having a successful-and likely very costly-attack on a network. In today's environment there is more of a need than ever for increased security in enterprise level networks. Companies are finding themselves with offices around the world and needing a way to provide an affordable high speed secure communications between them as well as provide ways to implement wireless technologies in a secured environment. This paper describes an example of how this can be done and the special issues and challenges associated with securing these types of networks.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121669912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210160
Jun-ichiro itojun Hagino
KAME project was started in 1998 to provide BSD-licensed reference implementation for IPv6, IPsec and other recent Internet technologies. This paper tries to describe our motivation, where are we right now, technical hurdles we have faced and solutions against them. All of our source code is, and will be distributed under a BSD-like license.
{"title":"Implementing IPv6: experiences at KAME project","authors":"Jun-ichiro itojun Hagino","doi":"10.1109/SAINTW.2003.1210160","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210160","url":null,"abstract":"KAME project was started in 1998 to provide BSD-licensed reference implementation for IPv6, IPsec and other recent Internet technologies. This paper tries to describe our motivation, where are we right now, technical hurdles we have faced and solutions against them. All of our source code is, and will be distributed under a BSD-like license.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126643937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210154
Kazunori Sugiura, A. Ogawa, Osamu Nakamura, J. Murai
This research discloses the practical resource consumption of portable computers using broadband applications using IPv4 and IPv6. We tested with major broadband applications in a variety of operating system and network connections to verify the resource consumption. Resource consumption can be power consumption, bus utilization, device utilization, and processor utilization. Past application ignores its resource management which affects the efficiency of the usage. With collaboration and management of devices and its resource availability, effective use of resources can be performed resulting in the extension of battery time, lowering the heat, and economizing the bus utilization. Furthermore, this research introduces the sample application with the transport method for lazy resource adaptive streams using DVTS in IPv6, which effectively reduces the resource consumption. Implementation of resource management feature into a typical computer infrastructure may decrease the power consumption, and power conservation.
{"title":"Resource friendly platform requirements for portable computers using broadband applications","authors":"Kazunori Sugiura, A. Ogawa, Osamu Nakamura, J. Murai","doi":"10.1109/SAINTW.2003.1210154","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210154","url":null,"abstract":"This research discloses the practical resource consumption of portable computers using broadband applications using IPv4 and IPv6. We tested with major broadband applications in a variety of operating system and network connections to verify the resource consumption. Resource consumption can be power consumption, bus utilization, device utilization, and processor utilization. Past application ignores its resource management which affects the efficiency of the usage. With collaboration and management of devices and its resource availability, effective use of resources can be performed resulting in the extension of battery time, lowering the heat, and economizing the bus utilization. Furthermore, this research introduces the sample application with the transport method for lazy resource adaptive streams using DVTS in IPv6, which effectively reduces the resource consumption. Implementation of resource management feature into a typical computer infrastructure may decrease the power consumption, and power conservation.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126900610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210191
Lingxuan Hu, David Evans
An emerging class of important applications uses ad hoc wireless networks of low-power sensor devices to monitor and send information about a possibly hostile environment to a powerful base station connected to a wired network. To conserve power, intermediate network nodes should aggregate results from individual sensors. However, this opens the risk that a single compromised sensor device can render the network useless, or worse, mislead the operator into trusting a false reading. We present a protocol that provides a secure aggregation mechanism for wireless networks that is resilient to both intruder devices and single device key compromises. Our protocol is designed to work within the computation, memory and power consumption limits of inexpensive sensor devices, but takes advantage of the properties of wireless networking, as well as the power asymmetry between the devices and the base station.
{"title":"Secure aggregation for wireless networks","authors":"Lingxuan Hu, David Evans","doi":"10.1109/SAINTW.2003.1210191","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210191","url":null,"abstract":"An emerging class of important applications uses ad hoc wireless networks of low-power sensor devices to monitor and send information about a possibly hostile environment to a powerful base station connected to a wired network. To conserve power, intermediate network nodes should aggregate results from individual sensors. However, this opens the risk that a single compromised sensor device can render the network useless, or worse, mislead the operator into trusting a false reading. We present a protocol that provides a secure aggregation mechanism for wireless networks that is resilient to both intruder devices and single device key compromises. Our protocol is designed to work within the computation, memory and power consumption limits of inexpensive sensor devices, but takes advantage of the properties of wireless networking, as well as the power asymmetry between the devices and the base station.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125794335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210144
T. Chown, J. Palet
We present an overview of the IPv6 projects being undertaken within the European Commission's Fifth Framework Information Society Technologies (IST) Programme. The Programme's coverage reaches to a broad range of topics across the computing and networking spectrum. It includes GEANT the network connecting the European National Research and Education Networks (NRENs). It also covers projects focusing on IPv6, and those focusing elsewhere but seeking to embrace IPv6 in their scope. The major projects are GEANT, which is now planning introduction of IPv6 services to the existing IPv4 backbone, 6NET which has deployed a pan-European IPv6-only academic network, and Euro6IX, which is building a network of IPv6 exchange points.
{"title":"Results and plans of the IPv6 test-bed initiatives within the European Commission IST Programme","authors":"T. Chown, J. Palet","doi":"10.1109/SAINTW.2003.1210144","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210144","url":null,"abstract":"We present an overview of the IPv6 projects being undertaken within the European Commission's Fifth Framework Information Society Technologies (IST) Programme. The Programme's coverage reaches to a broad range of topics across the computing and networking spectrum. It includes GEANT the network connecting the European National Research and Education Networks (NRENs). It also covers projects focusing on IPv6, and those focusing elsewhere but seeking to embrace IPv6 in their scope. The major projects are GEANT, which is now planning introduction of IPv6 services to the existing IPv4 backbone, 6NET which has deployed a pan-European IPv6-only academic network, and Euro6IX, which is building a network of IPv6 exchange points.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133770262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210131
E. Colombo, C. Francalanci
This paper presents a model that helps to specify patterns of control and coordination among different actors within a cooperative workflow. The paper explains how the model can be applied according to a methodological approach structured in three steps from requirements analysis to detailed design. A set of patterns is provided at each step to support specification activities. Patterns are designed by analyzing and modeling different mechanisms of governance among organizations.
{"title":"Formalizing governance in virtual districts","authors":"E. Colombo, C. Francalanci","doi":"10.1109/SAINTW.2003.1210131","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210131","url":null,"abstract":"This paper presents a model that helps to specify patterns of control and coordination among different actors within a cooperative workflow. The paper explains how the model can be applied according to a methodological approach structured in three steps from requirements analysis to detailed design. A set of patterns is provided at each step to support specification activities. Patterns are designed by analyzing and modeling different mechanisms of governance among organizations.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134358101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}