Change search
ReferencesLink to record
Permanent link

Direct link
Internet services and security
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Embedded Internet Systems Lab.
2005 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

This thesis presents my research on IP Traceback and on QoS admission control. It also includes a brief discussion about the security problems we are facing today and how adding new network services affects the original Internet design. Internet security is an ever rising problem. One identified problem is that the basic Internet design, with mutual trust between the communicating entities and stateless intermediate nodes, does not provide any functions that will reveal the path a packet with incorrect source address has travelled through the network. In an attack situation this makes it really difficult for the victim to fight the attack. IP Traceback refers to the mechanism of tracing an IP packet back to its source. In the work presented in this thesis, a selection of the most promising proposals on IP Traceback, using packet marking, are evaluated and also compared with our new proposal. Quality of service in the Internet is becoming a reality. The idea is to split Internet traffic into different forwarding classes, where each class will be provided a specified quality in terms of bandwidth, delay and loss. Some type of admission control algorithm may be used to decide which flows to admit and which to reject. From the operator perspective the ideal situation is to find the threshold where you reach a maximum utilization of the reserved bandwidth for a specific class, without violating the stated QoS objectives. Several admission control algorithms have been proposed, but do not seem to reach deployment. The motivation for the work presented in this thesis was to design an algorithm that should be simple, yet robust, and easily deployed in existing Internet infrastructure. The core idea of our proposal is to use existing router mechanisms, originally used for traffic shaping and policing, to measure current traffic load. We then utilize the delta between reserved capacity according to peak rate, and measurments, to make current and future admission limit estimations.

Place, publisher, year, edition, pages
Luleå: Luleå tekniska universitet, 2005. , 49 p.
Series
Licentiate thesis / Luleå University of Technology, ISSN 1402-1757 ; 2005:96
Identifiers
URN: urn:nbn:se:ltu:diva-18652Local ID: 99ac9c90-a091-11db-8975-000ea68e967bOAI: oai:DiVA.org:ltu-18652DiVA: diva2:991662
Note
Godkänd; 2005; 20060922 (ysko)Available from: 2016-09-29 Created: 2016-09-29Bibliographically approved

Open Access in DiVA

fulltext(481 kB)4 downloads
File information
File name FULLTEXT01.pdfFile size 481 kBChecksum SHA-512
ad2b0e91fb716d2e4313a4cb2eb92a518de20c413f3ecb0edee378a0f7486a725c2982da46097fbb795ee6456b6d40a930d257bd5315c446b48ad64e5a4e8145
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Sandström, Helena
By organisation
Embedded Internet Systems Lab

Search outside of DiVA

GoogleGoogle Scholar
Total: 4 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 6 hits
ReferencesLink to record
Permanent link

Direct link