-
eSIM Technology in IoT Architecture
Authors:
Hang Yuan,
Artiom Baloian,
Jan Janak,
Henning Schulzrinne
Abstract:
eSIM(embedded SIM) is an advanced alternative to traditional physical SIM cards initially developed by the GSM Association(GSMA) in 2013 [1][2]. The eSIM technology has been deployed in many commercial products such as mobile devices. However, the application of the eSIM technology in IoT devices has yet to start being primarily deployed. Understanding the eSIM architecture and the basic ideas of…
▽ More
eSIM(embedded SIM) is an advanced alternative to traditional physical SIM cards initially developed by the GSM Association(GSMA) in 2013 [1][2]. The eSIM technology has been deployed in many commercial products such as mobile devices. However, the application of the eSIM technology in IoT devices has yet to start being primarily deployed. Understanding the eSIM architecture and the basic ideas of the eSIM provisioning and operations is very important for engineers to promote eSIM technology deployment in more areas, both academics and industries.
The report focuses on the eSIM technology in the IoT architecture and two major operations of Remote SIM Provisioning(RSP) procedure: the Common Mutual Authentication procedure, a process used to authenticate eSIM trusted communication parties over the public internet, and the Profile Downloading procedure, the way to download the Profile from the operator SM-DP+ server and eventually remotely provision the end-user devices.
△ Less
Submitted 8 January, 2024;
originally announced January 2024.
-
Roadmap for Edge AI: A Dagstuhl Perspective
Authors:
Aaron Yi Ding,
Ella Peltonen,
Tobias Meuser,
Atakan Aral,
Christian Becker,
Schahram Dustdar,
Thomas Hiessl,
Dieter Kranzlmuller,
Madhusanka Liyanage,
Setareh Magshudi,
Nitinder Mohan,
Joerg Ott,
Jan S. Rellermeyer,
Stefan Schulte,
Henning Schulzrinne,
Gurkan Solmaz,
Sasu Tarkoma,
Blesson Varghese,
Lars Wolf
Abstract:
Based on the collective input of Dagstuhl Seminar (21342), this paper presents a comprehensive discussion on AI methods and capabilities in the context of edge computing, referred as Edge AI. In a nutshell, we envision Edge AI to provide adaptation for data-driven applications, enhance network and radio access, and allow the creation, optimization, and deployment of distributed AI/ML pipelines wit…
▽ More
Based on the collective input of Dagstuhl Seminar (21342), this paper presents a comprehensive discussion on AI methods and capabilities in the context of edge computing, referred as Edge AI. In a nutshell, we envision Edge AI to provide adaptation for data-driven applications, enhance network and radio access, and allow the creation, optimization, and deployment of distributed AI/ML pipelines with given quality of experience, trust, security and privacy targets. The Edge AI community investigates novel ML methods for the edge computing environment, spanning multiple sub-fields of computer science, engineering and ICT. The goal is to share an envisioned roadmap that can bring together key actors and enablers to further advance the domain of Edge AI.
△ Less
Submitted 27 November, 2021;
originally announced December 2021.
-
Centralization is about Control, not Protocols (Position Paper)
Authors:
Henning Schulzrinne
Abstract:
Many common ``consumer'' applications, i.e., applications widely used by non-technical users, are now provided by a very small number of companies, even if that set of companies differ across geographic regions, or rely on a very small number of implementations even if the applications are largely standards-based. While likely only a partial solution, we can draw on earlier regulatory experiences…
▽ More
Many common ``consumer'' applications, i.e., applications widely used by non-technical users, are now provided by a very small number of companies, even if that set of companies differ across geographic regions, or rely on a very small number of implementations even if the applications are largely standards-based. While likely only a partial solution, we can draw on earlier regulatory experiences to facilitate competition or at least lessen the impact of the lack thereof.
△ Less
Submitted 5 November, 2021;
originally announced November 2021.
-
NSF Broadband Research 2020 Report
Authors:
Henning Schulzrinne,
Marie-José Montpetit
Abstract:
The internet has become a critical communications infrastructure, and access is among the ``assets, systems, and networks, whether physical or virtual, [that] are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.'' [CISA] But the in…
▽ More
The internet has become a critical communications infrastructure, and access is among the ``assets, systems, and networks, whether physical or virtual, [that] are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.'' [CISA] But the internet is more than an issue for the nation as a whole. Internet access affects the security, health, safety, and opportunities in life for individuals and communities, and the economic vitality of businesses everywhere.
On the one hand, the COVID-19 pandemic has revealed the success of broadband access in allowing society to function, even during lockdowns. On the other hand, the pandemic has exposed weak, unreliable, or even nonexistent, broadband access and usability in many areas and for many individuals, including especially rural residents and children in many school districts, urban, and rural, as well as a compelling need for universal reach and affordability. It was thus timely that in November 2020, the National Science Foundation (NSF) sponsored a series of workshops to identify new research areas to drive the broadband NSF agenda for the next five years. This request followed similar initiatives during the past twenty years, the most recent in 2016.
This Broadband Research Workshop Report of 2021 discusses the research questions and challenges that need to be addressed to provide robust, affordable, and meaningful broadband access to every resident of the United States.
△ Less
Submitted 5 November, 2021;
originally announced November 2021.
-
An Analysis of Amazon Echo's Network Behavior
Authors:
Jan Janak,
Teresa Tseng,
Aliza Isaacs,
Henning Schulzrinne
Abstract:
With over 20 million units sold since 2015, Amazon Echo, the Alexa-enabled smart speaker developed by Amazon, is probably one of the most widely deployed Internet of Things consumer devices. Despite the very large installed base, surprisingly little is known about the device's network behavior. We modify a first generation Echo device, decrypt its communication with Amazon cloud, and analyze the d…
▽ More
With over 20 million units sold since 2015, Amazon Echo, the Alexa-enabled smart speaker developed by Amazon, is probably one of the most widely deployed Internet of Things consumer devices. Despite the very large installed base, surprisingly little is known about the device's network behavior. We modify a first generation Echo device, decrypt its communication with Amazon cloud, and analyze the device pairing, Alexa Voice Service, and drop-in calling protocols. We also describe our methodology and the experimental setup. We find a minor shortcoming in the device pairing protocol and learn that drop-in calls are end-to-end encrypted and based on modern open standards. Overall, we find the Echo to be a well-designed device from the network communication perspective.
△ Less
Submitted 22 August, 2021; v1 submitted 27 May, 2021;
originally announced May 2021.
-
Checkpointing and Migration of IoT Edge Functions
Authors:
Pekka Karhula,
Jan Janak,
Henning Schulzrinne
Abstract:
The serverless and functions as a service (FaaS) paradigms are currently trending among cloud providers and are now increasingly being applied to the network edge, and to the Internet of Things (IoT) devices. The benefits include reduced latency for communication, less network traffic and increased privacy for data processing. However, there are challenges as IoT devices have limited resources for…
▽ More
The serverless and functions as a service (FaaS) paradigms are currently trending among cloud providers and are now increasingly being applied to the network edge, and to the Internet of Things (IoT) devices. The benefits include reduced latency for communication, less network traffic and increased privacy for data processing. However, there are challenges as IoT devices have limited resources for running multiple simultaneous containerized functions, and also FaaS does not typically support long-running functions. Our implementation utilizes Docker and CRIU for checkpointing and suspending long-running blocking functions. The results show that checkpointing is slightly slower than regular Docker pause, but it saves memory and allows for more long-running functions to be run on an IoT device. Furthermore, the resulting checkpoint files are small, hence they are suitable for live migration and backing up stateful functions, therefore improving availability and reliability of the system.
△ Less
Submitted 21 March, 2021;
originally announced March 2021.
-
Talking After Lights Out: An Ad Hoc Network for Electric Grid Recovery
Authors:
Jan Janak,
Dana Chee,
Hema Retty,
Artiom Baloian,
Henning Schulzrinne
Abstract:
When the electric grid in a region suffers a major outage, e.g., after a catastrophic cyber attack, a "black start" may be required, where the grid is slowly restarted, carefully and incrementally adding generating capacity and demand. To ensure safe and effective black start, the grid control center has to be able to communicate with field personnel and with supervisory control and data acquisiti…
▽ More
When the electric grid in a region suffers a major outage, e.g., after a catastrophic cyber attack, a "black start" may be required, where the grid is slowly restarted, carefully and incrementally adding generating capacity and demand. To ensure safe and effective black start, the grid control center has to be able to communicate with field personnel and with supervisory control and data acquisition (SCADA) systems. Voice and text communication are particularly critical. As part of the Defense Advanced Research Projects Agency (DARPA) Rapid Attack Detection, Isolation, and Characterization Systems (RADICS) program, we designed, tested and evaluated a self-configuring mesh network architecture and prototype called the Phoenix Secure Emergency Network (PhoenixSEN). PhoenixSEN is designed as a drop-in replacement for primary communication networks, combines existing and new technologies, can work with a variety of link-layer protocols, emphasizes manageability and auto-configuration, and provides a core set of services and applications for coordination of people and devices including voice, text, and SCADA communication. The PhoenixSEN prototype was evaluated in the field through a series of DARPA-led exercises. The same system is also likely to support coordination of recovery efforts after large-scale natural disasters.
△ Less
Submitted 11 February, 2021;
originally announced February 2021.
-
Computing Research Challenges in Next Generation Wireless Networking
Authors:
Elisa Bertino,
Daniel Bliss,
Daniel Lopresti,
Larry Peterson,
Henning Schulzrinne
Abstract:
By all measures, wireless networking has seen explosive growth over the past decade. Fourth Generation Long Term Evolution (4G LTE) cellular technology has increased the bandwidth available for smartphones, in essence, delivering broadband speeds to mobile devices. The most recent 5G technology is further enhancing the transmission speeds and cell capacity, as well as, reducing latency through the…
▽ More
By all measures, wireless networking has seen explosive growth over the past decade. Fourth Generation Long Term Evolution (4G LTE) cellular technology has increased the bandwidth available for smartphones, in essence, delivering broadband speeds to mobile devices. The most recent 5G technology is further enhancing the transmission speeds and cell capacity, as well as, reducing latency through the use of different radio technologies and is expected to provide Internet connections that are an order of magnitude faster than 4G LTE. Technology continues to advance rapidly, however, and the next generation, 6G, is already being envisioned. 6G will make possible a wide range of powerful, new applications including holographic telepresence, telehealth, remote education, ubiquitous robotics and autonomous vehicles, smart cities and communities (IoT), and advanced manufacturing (Industry 4.0, sometimes referred to as the Fourth Industrial Revolution), to name but a few. The advances we will see begin at the hardware level and extend all the way to the top of the software "stack."
Artificial Intelligence (AI) will also start playing a greater role in the development and management of wireless networking infrastructure by becoming embedded in applications throughout all levels of the network. The resulting benefits to society will be enormous.
At the same time these exciting new wireless capabilities are appearing rapidly on the horizon, a broad range of research challenges loom ahead. These stem from the ever-increasing complexity of the hardware and software systems, along with the need to provide infrastructure that is robust and secure while simultaneously protecting the privacy of users. Here we outline some of those challenges and provide recommendations for the research that needs to be done to address them.
△ Less
Submitted 4 January, 2021;
originally announced January 2021.
-
Social Distancing and the Internet: What Can Network Performance Measurements Tell Us?
Authors:
Jessica De Oliveira Moreira,
Amey Praveen Pasarkar,
Wenjun Chen,
Wenkai Hu,
Jan Janak,
Henning Schulzrinne
Abstract:
The COVID-19 pandemic and related restrictions forced many to work, learn, and socialize from home over the internet. There appears to be consensus that internet infrastructure in the developed world handled the resulting traffic surge well. In this paper, we study network measurement data collected by the Federal Communications Commission's Measuring Broadband America program before and during th…
▽ More
The COVID-19 pandemic and related restrictions forced many to work, learn, and socialize from home over the internet. There appears to be consensus that internet infrastructure in the developed world handled the resulting traffic surge well. In this paper, we study network measurement data collected by the Federal Communications Commission's Measuring Broadband America program before and during the pandemic in the United States (US). We analyze the data to understand the impact of lockdown orders on the performance of fixed broadband internet infrastructure across the US, and also attempt to correlate internet usage patterns with the changing behavior of users during lockdown. We found the key metrics such as change in data usage to be generally consistent with the literature. Through additional analysis, we found differences between metro and rural areas, changes in weekday, weekend, and hourly internet usage patterns, and indications of network congestion for some users.
△ Less
Submitted 13 January, 2021; v1 submitted 17 December, 2020;
originally announced December 2020.
-
SynGAN: Towards Generating Synthetic Network Attacks using GANs
Authors:
Jeremy Charlier,
Aman Singh,
Gaston Ormazabal,
Radu State,
Henning Schulzrinne
Abstract:
The rapid digital transformation without security considerations has resulted in the rise of global-scale cyberattacks. The first line of defense against these attacks are Network Intrusion Detection Systems (NIDS). Once deployed, however, these systems work as blackboxes with a high rate of false positives with no measurable effectiveness. There is a need to continuously test and improve these sy…
▽ More
The rapid digital transformation without security considerations has resulted in the rise of global-scale cyberattacks. The first line of defense against these attacks are Network Intrusion Detection Systems (NIDS). Once deployed, however, these systems work as blackboxes with a high rate of false positives with no measurable effectiveness. There is a need to continuously test and improve these systems by emulating real-world network attack mutations. We present SynGAN, a framework that generates adversarial network attacks using the Generative Adversial Networks (GAN). SynGAN generates malicious packet flow mutations using real attack traffic, which can improve NIDS attack detection rates. As a first step, we compare two public datasets, NSL-KDD and CICIDS2017, for generating synthetic Distributed Denial of Service (DDoS) network attacks. We evaluate the attack quality (real vs. synthetic) using a gradient boosting classifier.
△ Less
Submitted 26 August, 2019;
originally announced August 2019.
-
Capacity and Energy-Efficiency of Delayed Access Scheme for Small Cell Networks
Authors:
Haluk Celebi,
Ismail Guvenc,
Henning Schulzrinne
Abstract:
Data applications may typically tolerate a moderate delay before packet transmission between user equipment (UE) and cell begins. This delay can be taken advantage to reduce the communication distance, improve coverage probability, and increase overall energy-efficiency of the small cell network. To demonstrate such merits, we suggest a simple access scheme and analyze the distribution of coverage…
▽ More
Data applications may typically tolerate a moderate delay before packet transmission between user equipment (UE) and cell begins. This delay can be taken advantage to reduce the communication distance, improve coverage probability, and increase overall energy-efficiency of the small cell network. To demonstrate such merits, we suggest a simple access scheme and analyze the distribution of coverage probability and throughput as a function of delay and transmit distance. Sufficient number of small base stations (SBSs) handle the peak traffic load. To improve energy-efficiency of the network, a number of SBSs are switched off at low traffic periods. Energy-efficiency can be further improved by turning all of the SBSs on and off, rather than selecting a subset and leaving them off. By doing so, coverage probability and bit-rate can be improved by delaying their transmissions and waiting for a closer SBS to become available. Results show that by turning SBSs on and off continuously and taking advantage of initial delay to connect a SBS yield an order of magnitude improvement in energy-efficiency, improves the coverage probability significantly at low signal to interference and noise (SINR) regime.
△ Less
Submitted 17 April, 2019; v1 submitted 10 April, 2019;
originally announced April 2019.
-
The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research
Authors:
Vaibhav Bajpai,
Anna Brunstrom,
Anja Feldmann,
Wolfgang Kellerer,
Aiko Pras,
Henning Schulzrinne,
Georgios Smaragdakis,
Matthias Wählisch,
Klaus Wehrle
Abstract:
Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.
Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.
△ Less
Submitted 12 January, 2019;
originally announced February 2019.
-
Should I stay or should I go: Analysis of the impact of application QoS on user engagement in YouTube
Authors:
Maria Plakia,
Evripides Tzamousis,
Thomais Asvestopoulou,
Giorgos Pantermakis,
Nick Filippakis,
Henning Schulzrinne,
Yana Kane-Esrig,
Maria Papadopouli
Abstract:
To improve the quality of experience (QoE), especially under moderate to high traffic demand, it is important to understand the impact of the network and application QoS on user experience. This paper comparatively evaluates the impact of impairments, their intensity and temporal dynamics, on user engagement in the context of video streaming. The analysis employed two large YouTube datasets. To ch…
▽ More
To improve the quality of experience (QoE), especially under moderate to high traffic demand, it is important to understand the impact of the network and application QoS on user experience. This paper comparatively evaluates the impact of impairments, their intensity and temporal dynamics, on user engagement in the context of video streaming. The analysis employed two large YouTube datasets. To characterize the user engagement and the impact of impairments, several new metrics were defined. We assessed whether or not there is a statistically significant relationship between different types of impairments and QoE and user engagement metrics, taking into account not only the characteristics of the impairments but also the covariates of the session (e.g., video duration, mean datarate). After observing the relationships across the entire dataset, we tested whether these relationships also persist under specific conditions with respect to the covariates. The introduction of several new metrics and of various covariates in the analysis are two innovative aspects of this work. We found that the number of negative bitrate changes (BR-) is a stronger predictor of abandonment than rebufferrings (RB). Even positive bitrate changes (BR+) are associated with increases in abandonment. Specifically, BR+ in low resolution sessions is not well received. Temporal dynamics of the impairments have also an impact: a BR- that follows much later a RB appears to be perceived as a worse impairment than a BR- that occurs immediately after a RB. These results can be used to guide the design of the video streaming adaptation as well as suggest which parameters should be varied in controlled field studies.
△ Less
Submitted 15 March, 2019; v1 submitted 6 January, 2019;
originally announced January 2019.
-
Load-Based On/Off Scheduling for Energy-Efficient Delay-Tolerant 5G Networks
Authors:
Haluk Celebi,
Yavuz Yapici,
Ismail Guvenc,
Henning Schulzrinne
Abstract:
Dense deployment of small cells is seen as one of the major approaches for addressing the traffic demands in next-generation 5G wireless networks. The energy efficiency, however, becomes a key concern together with this massive amount of small cells. In this study, we therefore consider the energy-efficient small cell networks (SCN) using smart on/off scheduling (OOS) strategies, where a certain f…
▽ More
Dense deployment of small cells is seen as one of the major approaches for addressing the traffic demands in next-generation 5G wireless networks. The energy efficiency, however, becomes a key concern together with this massive amount of small cells. In this study, we therefore consider the energy-efficient small cell networks (SCN) using smart on/off scheduling (OOS) strategies, where a certain fraction of small base stations (SBS) are put into less energy-consuming sleeping states to save energy. To this end, we first represent the overall SCN traffic by a new load variable, and analyze its statistics rigorously using Gamma approximation. We then propose two novel OOS algorithms exploiting this load variable in centralized and distributed fashions. We show that proposed load based OOS algorithms can lead to as high as 50\% of energy savings without sacrificing the average SCN throughput. In addition, load based strategies are shown to work well under high SCN traffic and delay-intolerant circumstances, and can be implemented efficiently using the load statistics. We also show that the performance of load based algorithms gets maximized for certain length of sleeping periods, where assuming short sleep periods is as energy-inefficient as keeping SBSs in sleep states for very long.
△ Less
Submitted 21 December, 2018;
originally announced December 2018.
-
Networking Research - A Reflection in the Middle Years
Authors:
Henning Schulzrinne
Abstract:
Networking is no longer a new area of computer science and engineering -- it has matured as a discipline and the major infrastructure it supports, the Internet, is long past being primarily a research artifact. I believe that we should consider ourselves as the civil engineers of the Internet, primarily helping to understand and improve a vast and critical infrastructure. This implies that impleme…
▽ More
Networking is no longer a new area of computer science and engineering -- it has matured as a discipline and the major infrastructure it supports, the Internet, is long past being primarily a research artifact. I believe that we should consider ourselves as the civil engineers of the Internet, primarily helping to understand and improve a vast and critical infrastructure. This implies that implementing changes takes decades, not conference cycles, and that implementation is largely driven by compatibility with existing infrastructure and considerations of cost effectiveness, where resources that research focuses on, such as bandwidth and compute cycles, often play a much smaller role than limited organizational capacity for change. Telecommunications carriers, in particular, have become akin to airlines, largely operating equipment designed by others, with emphasis on marketing, not innovation. Even more than in other engineering disciplines, standards matter, whether set by standards bodies or dominant players. Given the multi-year time frames of standards and the limited willingness of national funding bodies to support standardization work, this makes research impact harder, as does the increasing complexity of cellular networks and barriers to entry that shut out most researchers from contributing to large parts of commercial mobile networks.
△ Less
Submitted 3 September, 2018;
originally announced September 2018.
-
Predicting Floor-Level for 911 Calls with Neural Networks and Smartphone Sensor Data
Authors:
William Falcon,
Henning Schulzrinne
Abstract:
In cities with tall buildings, emergency responders need an accurate floor level location to find 911 callers quickly. We introduce a system to estimate a victim's floor level via their mobile device's sensor data in a two-step process. First, we train a neural network to determine when a smartphone enters or exits a building via GPS signal changes. Second, we use a barometer equipped smartphone t…
▽ More
In cities with tall buildings, emergency responders need an accurate floor level location to find 911 callers quickly. We introduce a system to estimate a victim's floor level via their mobile device's sensor data in a two-step process. First, we train a neural network to determine when a smartphone enters or exits a building via GPS signal changes. Second, we use a barometer equipped smartphone to measure the change in barometric pressure from the entrance of the building to the victim's indoor location. Unlike impractical previous approaches, our system is the first that does not require the use of beacons, prior knowledge of the building infrastructure, or knowledge of user behavior. We demonstrate real-world feasibility through 63 experiments across five different tall buildings throughout New York City where our system predicted the correct floor level with 100% accuracy.
△ Less
Submitted 15 September, 2018; v1 submitted 28 October, 2017;
originally announced October 2017.
-
Gossip-based Signaling Dissemination Extension for Next Steps In Signaling
Authors:
M. Femminella,
R. Francescangeli,
G. Reali,
H. Schulzrinne
Abstract:
In this paper, we propose a new gossip-based signaling dissemination method for the Next Steps in Signaling protocol family. In more detail, we propose to extend the General Internet Signaling Transport (GIST) protocol, so as to leverage these new dissemination capabilities from all NSIS Signaling Layer Protocol applications using its transport capabilities. The new GIST extension consists of two…
▽ More
In this paper, we propose a new gossip-based signaling dissemination method for the Next Steps in Signaling protocol family. In more detail, we propose to extend the General Internet Signaling Transport (GIST) protocol, so as to leverage these new dissemination capabilities from all NSIS Signaling Layer Protocol applications using its transport capabilities. The new GIST extension consists of two main procedures: a bootstrap procedure, during which new GIST-enabled nodes discover each other, and a service dissemination procedure, which is used to effectively disseminate signaling messages within an Autonomous System. To this aim, we defined three dissemination models, bubble, balloon, and hose, so as to fulfill requirements of different network and/or service management scenarios. An experimental campaign carried out on the GENI testbed shows the effectiveness of the proposed solution.
△ Less
Submitted 17 March, 2015; v1 submitted 30 June, 2014;
originally announced June 2014.
-
Advanced Caching for Distributing Sensor Data through Programmable Nodes
Authors:
M. Femminella,
G. Reali,
D. Valocchi,
R. Francescangeli,
H. Schulzrinne
Abstract:
This paper shows an innovative solution for distributing dynamic sensor data by using distributed caches. Our proposal is based on the concepts of service modularization and virtualization of network nodes made available by the NetServ hosting environment, which has been defined and implemented with the aim of extending the functions of the network nodes. Through a lab experiment involving tens of…
▽ More
This paper shows an innovative solution for distributing dynamic sensor data by using distributed caches. Our proposal is based on the concepts of service modularization and virtualization of network nodes made available by the NetServ hosting environment, which has been defined and implemented with the aim of extending the functions of the network nodes. Through a lab experiment involving tens of nodes, we have demonstrated a significant performance improvements in term of traffic saving and download time in comparison with a legacy, Internet-based, approach. Beyond this performance improvements, the proposed solution holds also functional improvements, in terms of dynamic deployment and easy integration with services making use of sensor data.
△ Less
Submitted 2 May, 2013;
originally announced May 2013.
-
On TCP-based Session Initiation Protocol (SIP) Server Overload Control
Authors:
Charles Shen,
Henning Schulzrinne
Abstract:
The Session Initiation Protocol (SIP) server overload management has attracted interest since SIP is being widely deployed in the Next Generation Networks (NGN) as a core signaling protocol. Yet all existing SIP overload control work is focused on SIP-over-UDP, despite the fact that TCP is increasingly seen as the more viable choice of SIP transport. This paper answers the following questions: is…
▽ More
The Session Initiation Protocol (SIP) server overload management has attracted interest since SIP is being widely deployed in the Next Generation Networks (NGN) as a core signaling protocol. Yet all existing SIP overload control work is focused on SIP-over-UDP, despite the fact that TCP is increasingly seen as the more viable choice of SIP transport. This paper answers the following questions: is the existing TCP flow control capable of handling the SIP overload problem? If not, why and how can we make it work? We provide a comprehensive explanation of the default SIP-over-TCP overload behavior through server instrumentation. We also propose and implement novel but simple overload control algorithms without any kernel or protocol level modification. Experimental evaluation shows that with our mechanism the overload performance improves from its original zero throughput to nearly full capacity. Our work leads to the important general insight that the traditional notion of TCP flow control alone is incapable of managing overload for time-critical session-based applications, which would be applicable not only to SIP, but also to a wide range of other common applications such as database servers.
△ Less
Submitted 2 October, 2010;
originally announced October 2010.
-
A VoIP Privacy Mechanism and its Application in VoIP Peering for Voice Service Provider Topology and Identity Hiding
Authors:
Charles Shen,
Henning Schulzrinne
Abstract:
Voice Service Providers (VSPs) participating in VoIP peering frequently want to withhold their identity and related privacy-sensitive information from other parties during the VoIP communication. A number of existing documents on VoIP privacy exist, but most of them focus on end user privacy. By summarizing and extending existing work, we present a unified privacy mechanism for both VoIP users a…
▽ More
Voice Service Providers (VSPs) participating in VoIP peering frequently want to withhold their identity and related privacy-sensitive information from other parties during the VoIP communication. A number of existing documents on VoIP privacy exist, but most of them focus on end user privacy. By summarizing and extending existing work, we present a unified privacy mechanism for both VoIP users and service providers. We also show a case study on how VSPs can use this mechanism for identity and topology hiding in VoIP peering.
△ Less
Submitted 8 July, 2008;
originally announced July 2008.
-
Measurement and Evaluation of ENUM Server Performance
Authors:
Charles Shen,
Henning Schulzrinne
Abstract:
ENUM is a DNS-based protocol standard for mapping E.164 telephone numbers to Internet Uniform Resource Identifiers (URIs). It places unique requirements on the existing DNS infrastructure, such as data scalability, query throughput, response time, and database update rates. This paper measures and evaluates the performance of existing name server implementation as ENUM servers. We compared Power…
▽ More
ENUM is a DNS-based protocol standard for mapping E.164 telephone numbers to Internet Uniform Resource Identifiers (URIs). It places unique requirements on the existing DNS infrastructure, such as data scalability, query throughput, response time, and database update rates. This paper measures and evaluates the performance of existing name server implementation as ENUM servers. We compared PowerDNS (PDNS), BIND and Navitas. Results show that BIND is not suitable for ENUM due to its poor scaling property. Both PDNS and Navitas can serve ENUM. However, Navitas turns out to be highly optimized and clearly outperforms PDNS in all aspects we have tested. We also instrumented the PDNS server to identify its performance bottleneck and investigated ways to improve it.
△ Less
Submitted 7 July, 2008;
originally announced July 2008.
-
Session Initiation Protocol (SIP) Server Overload Control: Design and Evaluation
Authors:
Charles Shen,
Henning Schulzrinne,
Erich Nahum
Abstract:
A Session Initiation Protocol (SIP) server may be overloaded by emergency-induced call volume, ``American Idol'' style flash crowd effects or denial of service attacks. The SIP server overload problem is interesting especially because the costs of serving or rejecting a SIP session can be similar. For this reason, the built-in SIP overload control mechanism based on generating rejection messages…
▽ More
A Session Initiation Protocol (SIP) server may be overloaded by emergency-induced call volume, ``American Idol'' style flash crowd effects or denial of service attacks. The SIP server overload problem is interesting especially because the costs of serving or rejecting a SIP session can be similar. For this reason, the built-in SIP overload control mechanism based on generating rejection messages cannot prevent the server from entering congestion collapse under heavy load. The SIP overload problem calls for a pushback control solution in which the potentially overloaded receiving server may notify its upstream sending servers to have them send only the amount of load within the receiving server's processing capacity. The pushback framework can be achieved by either a rate-based feedback or a window-based feedback. The centerpiece of the feedback mechanism is the algorithm used to generate load regulation information. We propose three new window-based feedback algorithms and evaluate them together with two existing rate-based feedback algorithms. We compare the different algorithms in terms of the number of tuning parameters and performance under both steady and variable load. Furthermore, we identify two categories of fairness requirements for SIP overload control, namely, user-centric and provider-centric fairness. With the introduction of a new double-feed SIP overload control architecture, we show how the algorithms can meet those fairness criteria.
△ Less
Submitted 7 July, 2008;
originally announced July 2008.
-
Cooperation Between Stations in Wireless Networks
Authors:
Andrea G. Forte,
Henning Schulzrinne
Abstract:
In a wireless network, mobile nodes (MNs) repeatedly perform tasks such as layer 2 (L2) handoff, layer 3 (L3) handoff and authentication. These tasks are critical, particularly for real-time applications such as VoIP. We propose a novel approach, namely Cooperative Roaming (CR), in which MNs can collaborate with each other and share useful information about the network in which they move. We sho…
▽ More
In a wireless network, mobile nodes (MNs) repeatedly perform tasks such as layer 2 (L2) handoff, layer 3 (L3) handoff and authentication. These tasks are critical, particularly for real-time applications such as VoIP. We propose a novel approach, namely Cooperative Roaming (CR), in which MNs can collaborate with each other and share useful information about the network in which they move. We show how we can achieve seamless L2 and L3 handoffs regardless of the authentication mechanism used and without any changes to either the infrastructure or the protocol. In particular, we provide a working implementation of CR and show how, with CR, MNs can achieve a total L2+L3 handoff time of less than 16 ms in an open network and of about 21 ms in an IEEE 802.11i network. We consider behaviors typical of IEEE 802.11 networks, although many of the concepts and problems addressed here apply to any kind of mobile network.
△ Less
Submitted 8 January, 2007;
originally announced January 2007.
-
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
Authors:
Salman A. Baset,
Henning Schulzrinne
Abstract:
Skype is a peer-to-peer VoIP client developed by KaZaa in 2003. Skype claims that it can work almost seamlessly across NATs and firewalls and has better voice quality than the MSN and Yahoo IM applications. It encrypts calls end-to-end, and stores user information in a decentralized fashion. Skype also supports instant messaging and conferencing. This report analyzes key Skype functions such as…
▽ More
Skype is a peer-to-peer VoIP client developed by KaZaa in 2003. Skype claims that it can work almost seamlessly across NATs and firewalls and has better voice quality than the MSN and Yahoo IM applications. It encrypts calls end-to-end, and stores user information in a decentralized fashion. Skype also supports instant messaging and conferencing. This report analyzes key Skype functions such as login, NAT and firewall traversal, call establishment, media transfer, codecs, and conferencing under three different network setups. Analysis is performed by careful study of Skype network traffic.
△ Less
Submitted 4 December, 2004;
originally announced December 2004.