May 26 2017 cs.NI
Mobility Management (MM) techniques have conventionally been centralized in nature, wherein a single network entity has been responsible for handling the mobility related tasks of the mobile nodes attached to the network. However, an exponential growth in network traffic and the number of users has ushered in the concept of providing Mobility Management as a Service (MMaaS) to the wireless nodes attached to the 5G networks. Allowing for on-demand mobility management solutions will not only provide the network with the flexibility that it needs to accommodate the many different use cases that are to be served by future networks, but it will also provide the network with the scalability that is needed alongside the flexibility to serve future networks. And hence, in this paper, a detailed study of MMaaS has been provided, highlighting its benefits and challenges for 5G networks. Additionally, the very important property of granularity of service which is deeply intertwined with the scalability and flexibility requirements of the future wireless networks, and a consequence of MMaaS, has also been discussed in detail.
Distributed controllers are oftentimes used in large-scale SDN deployments where they run a myriad of network applications simultaneously. Such applications could have different consistency and availability preferences. These controllers need to communicate via east/west interfaces in order to synchronize their state information. The consistency and the availability of the distributed state information are governed by an underlying consistency model. Earlier, we suggested the use of adaptively-consistent controllers that can autonomously tune their consistency parameters in order to meet the performance requirements of a certain application. In this paper, we examine the feasibility of employing adaptive controllers that are built on-top of tunable consistency models similar to that of Apache Cassandra. We present an adaptation strategy that uses clustering techniques (sequential k-means and incremental k-means) in order to map a given application performance indicator into a feasible consistency level that can be used with the underlying tunable consistency model. In the cases that we modeled and tested, our results show that in the case of sequential k-means, with a reasonable number of clusters (>= 50), a plausible mapping (low RMSE) could be estimated between the application performance indicators and the consistency level indicator. In the case of incremental k-means, the results also showed that a plausible mapping (low RMSE) could be estimated using a similar number of clusters (>= 50) by using a small threshold (~$ 0.01).
TLS uses X.509 certificates for server authentication. A X.509 certificate is a complex document and various innocent errors may occur while creating/ using it. Also, many certificates belong to malicious websites and should be rejected by the client and those web servers should not be visited. Usually, when a client finds a certificate that is doubtful using the traditional tests, it asks for human intervention. But, looking at certificates, most people can't differentiate between malicious and non-malicious websites. Thus, once traditional certificate validation has failed, instead of asking for human intervention, we use machine learning techniques to enable a web browser to decide whether the server to which the certificate belongs to is malignant or not ie, whether the website should be visited or not. Once a certificate has been accepted in the above phase, we observe that the website may still turn out to be malicious. So, in the second phase, we download a part of the website in a sandbox without decrypting it and observe the TLS encrypted traffic (encrypted malicious data captured in a sandbox cannot harm the system). As the traffic is encrypted after Handshake is completed, traditional pattern-matching techniques cannot be employed. Thus we use flow features of the traffic along with the features used in the above first phase. We couple these features with the unencrypted TLS header information obtained during TLS Handshake and use these in a machine learning classifier to identify whether the traffic is malicious or not.
May 26 2017 cs.NI
Co-channel coexistence between Dedicated Short-Range Communications (DSRC) and Wi-Fi needs thorough study. The reason is that although the 5.850-5.925 GHz (5.9 GHz) band has been reserved for DSRC so far, the U.S. government is moving swiftly on opening the band to be shared with Wi-Fi. However, most prior work lacks sufficient scientific rigor by relying on performance metrics such as packet delivery rate (PDR) and packet delay that cannot accurately measure performance of a vehicular network that primarily uses broadcast in dissemination of packets. Precise analysis of such broadcast operation is essential for rigorous investigation of DSRC-Wi-Fi coexistence because most safety-critical applications of DSRC operate based on broadcast. This paper proposes a new metric that can more accurately characterize the performance of a broadcast-based DSRC network. The new metric is used to (i) characterize coexistence of DSRC with IEEE 802.11ac-based Wi-Fi and (ii) suggest selection of key medium access control (MAC) parameters for DSRC: inter-broadcast interval (IBI) and contention window (CW).
May 26 2017 cs.NI
TCP's poor performance is identified as the bottleneck of high-speed networks. Extensions to TCP have been proposed and implemented. Some authors abandon TCP at all and suggest new transport protocols to overcome TCP limitations, at the expense of compatibility. This paper reports a research on the most significant TCP extensions and transport alternatives, and comparison between them. The majority of the solutions pointed out are difficult to compare because they are tailored to specific configurations. Still there is no specific criteria to evaluate performance metrics and comparison is done on the most evident issues.