internet backbone
Recently Published Documents


TOTAL DOCUMENTS

143
(FIVE YEARS 15)

H-INDEX

21
(FIVE YEARS 1)

2022 ◽  
Vol 2146 (1) ◽  
pp. 012035
Author(s):  
Zhihong Li ◽  
Ran Li ◽  
Yiying Yan ◽  
Siyu Lu ◽  
Yadi Gao

Abstract Under the background of digital and intelligent transformation, all walks of life are facing the conflict between internal stability and rapidly changing external needs, and the conflict between stable background and dynamic foreground. To solve these conflicts and problems, it needs to take new means to adjust from multiple dimensions. Draw support from the new info and communication operation support system, it could form a digital Internet info support system with the cloud platform, which can effectively establish fast and flexible front-end utilizations and support the rapid development, agile iteration and on-demand adjustment of related businesses. The Internet backbone network needs to make the info open. The new info communication operation support system based on the Internet can enable the info resources to be transmitted as needed. The research and utilization of cloud resource visualization and controllability has gradually become the key to the development of new Internet communication operation system. On the premise of systematically combing the Internet info and communication operation support system, this paper comprehensively studies the utilization of cloud resources, and analyses the utilization scenarios of cloud resources of the new education communication operation system, in order to better ameliorate the more efficient and secure utilization of cloud resources and communication operation system inside and outside the enterprise.


Author(s):  
Taku Wakui ◽  
Takao Kondo ◽  
Fumio Teraoka

AbstractThis paper proposes a general-purpose anomaly detection mechanism for Internet backbone traffic named GAMPAL (General-purpose Anomaly detection Mechanism using Prefix Aggregate without Labeled data). GAMPAL does not require labeled data to achieve general-purpose anomaly detection. For scalability to the number of entries in the BGP RIB (Border Gateway Protocol Routing Information Base), GAMPAL introduces prefix aggregate. The BGP RIB entries are classified into prefix aggregates, each of which is identified with the first three AS (Autonomous System) numbers in the AS_PATH attribute. GAMPAL establishes a prediction model for traffic sizes based on past traffic sizes. It adopts a LSTM-RNN (Long Short-Term Memory Recurrent Neural Network) model that focuses on the periodicity of the Internet traffic patterns at a weekly scale. The validity of GAMPAL is evaluated using real traffic information, BGP RIBs exported from the WIDE backbone network (AS2500), a nationwide backbone network for research and educational organizations in Japan, and the dataset of an ISP (Internet Service Provider) in Spain. As a result, GAMPAL successfully detects anomalies such as increased traffic due to an event, DDoS (Distributed Denial of Service) attacks targeted at a stub organization, a connection failure, an SSH (Secure Shell) scan attack, and anomaly spam.


2021 ◽  
pp. 016224392110390
Author(s):  
Ben Collier ◽  
James Stewart

This paper explores, through empirical research, how values, engineering practices, and technological design decisions shape one another in the development of privacy technologies. We propose the concept of “privacy worlds” to explore the values and design practices of the engineers of one of the world’s most notable (and contentious) privacy technologies: the Tor network. By following Tor’s design and development we show a privacy world emerging—one centered on a construction of privacy understood through the topology of structural power in the Internet backbone. This central “cipher” discourse renders privacy as a problem that can be “solved” through engineering, allowing the translation and representation of different groups of imagined users, adversaries, and technical aspects of the Internet in the language of the system. It also stabilizes a “flattened,” neutralized conception of privacy, risking stripping it of its political and cultural depth. We argue for an enriched empirical focus on design practices in privacy technologies, both as sites where values and material power are shaped, and as a place where the various worlds that will go on to cluster around them—of users, maintainers, and others—are imagined and reconciled.


2021 ◽  
Author(s):  
Upama Vyas

Abstract A huge torrent of information being generated from various heterogeneous applications and services is passing to and from the Internet backbone. Accommodating such heterogeneity and preserving the quality of service (QoS) of each traffic profile is a challenging task for operators. The heterogeneous traffic profile (HTP) considered in this work includes permanent lightpath demands (PLDs) and scheduled lightpath demands (SLDs). We propose various distance adaptive routing and spectrum assignment (DA-RSA) heuristics to resolve resource conflict among these two traffic profiles in elastic optical networks (EONs) under a full sharing environment. Conventionally, preemption was the only technique to resolve such conflict and ensure QoS for HTPs. Since excessive preemption leads to poor performance and lowers the degree of customer satisfaction, this work aims at reducing the preemption of demands. In order to do this, we propose to utilize bandwidth splitting as an alternative solution in such situations. Moreover, an integrated solution consisting of splitting and preemption is also proposed. We call this new integration as flow-based preemption. The simulation results demonstrate that utilizing splitting in place of preemption yields significant improvement in terms of all metrics of interest. Moreover, flow-based preemption is proved to be superior in performance than the only splitting-based solution. To the best of our knowledge, this is the first work addressing resource conflicts under a full-sharing environment by focusing on resource utilization at the link and node level. We believe that proposed heuristics support network operators to smoothly orchestrate network resources in the presence of such HTPs.


Author(s):  
Zouheir El-Sahli

Submarine cables are undersea digital bridges that allow ideas and information to move across space. Submarine cables are expensive infrastructure investments and their high costs raise the question about their economic returns, especially in developing countries. Specifically, It is not known what laying submarine cables means for services trade, which depends heavily on exchanging ideas and information. Using a novel data set for connecting the world countries by submarine cables, this study considers the variation in the number of submarine cables as well as the timing of connection to identify the effects of submarine cables. To deal with endogeneity, two novel instruments are developed. The results confirm that submarine cables stimulate services trade in some sectors. Benefits to developing countries are higher where more sectors expand their services trade and no sectors lose. This suggests a catch-up effect and higher gains from laying submarine cables in developing countries.


2020 ◽  
Vol 18 (3) ◽  
pp. 169-204
Author(s):  
Soo Jin Kim

AbstractThis paper analyzes the effects of direct interconnection agreements in the Internet backbone on content quality investment for content providers (CPs). The model assumes that when the Internet service provider (ISP) has a vertical affiliation with one CP, the ISP directly interconnects the affiliated CP’s traffic to its network for free while collecting a direct interconnection fee from the unaffiliated CP. If the unaffiliated CP’s traffic is indirectly interconnected to the ISP’s network via a third party transit provider, its network quality is lower than that via a direct interconnection. For the CPs’ content quality investments, I find that the affiliated CP invests more in content when the rival indirectly interconnects, leading to a higher total level of content investment. Accordingly, there is a condition under which the ISP does not want to offer direct interconnection to the unaffiliated CP. However, consumers are not always worse off from this interconnection foreclosure. Thus, the regulation of a paid direct interconnection does not necessarily enhance welfare in terms of consumer surplus.


2020 ◽  
Vol 245 ◽  
pp. 04041
Author(s):  
Edgar Fajardo ◽  
Derek Weitzel ◽  
Mats Rynge ◽  
Marian Zvada ◽  
John Hicks ◽  
...  

A general problem faced by opportunistic users computing on the grid is that delivering cycles is simpler than delivering data to those cycles. In this project XRootD caches are placed on the internet backbone to create a content delivery network. Scientific workflows in the domains of high energy physics, gravitational waves, and others profit from this delivery network to increases CPU efficiency while decreasing network bandwidth use.


2020 ◽  
Vol 53 (3) ◽  
pp. 155-160
Author(s):  
Manuel Herrera ◽  
Marco Pérez-Hernández ◽  
Amit Kumar Jain ◽  
Ajith Kumar Parlikad

Sign in / Sign up

Export Citation Format

Share Document