Princeton, NJ, United States
Princeton, NJ, United States

Time filter

Source Type

Motamedi R.,University of Oregon | Rejaie R.,University of Oregon | Willinger W.,Niksun Inc.
IEEE Communications Surveys and Tutorials | Year: 2015

Capturing an accurate view of the Internet topology is of great interest to the networking research community as it has many uses ranging from the design and evaluation of new protocols and services to the vulnerability analysis of the network's infrastructure. However, the scale of today's Internet coupled with its distributed and heterogeneous nature makes it very challenging to acquire a complete and accurate snapshot of the topology. The purpose of this survey is to examine the main research studies that have been conducted on topics related to Internet topology discovery in the last 15-20 years and present some of the main lessons learned from these past efforts. To this end, we classify these prior studies according to the 'resolution' or 'level' of the topology; that is, interface-level, router-level, PoP-level and AS-level. For each resolution, we describe the main techniques and tools used for data collection, identify their major limitations and issues, and discuss the key implications that these limitations have on the quality of the collected data. In the process, we present the latest efforts in modeling the Internet's topology at the different levels and report on the role that geographic characteristics play in this context. We present the lessons learned as a checklist that every researcher working on Internet topology discovery-related problems should consult to minimize the risk of repeating some of the same or similar mistakes that have been made in the past and as a result have hampered progress in this important area of Internet research. © 1998-2012 IEEE.

Chatzis N.,TU Berlin | Smaragdakis G.,TU Berlin | Feldmann A.,TU Berlin | Willinger W.,Niksun Inc.
Computer Communication Review | Year: 2013

Internet eXchange Points (IXPs) are generally considered to be the successors of the four Network Access Points (NAPs) that were mandated as part of the decommissioning of the National Science Foundation Network (NSFNET) in 1994/95 to facilitate the transition from the NSFNET to the "public Internet" as we know it today. While this popular view does not tell the whole story behind the early beginnings of IXPs, what is true is that since around 1994, the number of operational IXPs worldwide has grown to more than 300 (as of May 20131), with the largest IXPs handling daily traffic volumes comparable to those carried by the largest Tier-1 ISPs. However, IXPs have never really attracted much attention from the networking research community. At first glance, this lack of interest seems understandable as IXPs have apparently little to do with current "hot" topic areas such as data centers and cloud services or Software Defined Networking (SDN) and mobile communication. However, we argue in this article that, in fact, IXPs are all about data centers and cloud services and even SDN and mobile communication and should be of great interest to networking researchers interested in understanding the current and future Internet ecosystem. To this end, we survey the existing but largely fragmented sources of publicly available information about IXPs to describe their basic technical and operational aspects and highlight the critical differences among the various IXPs in the different regions of the world, especially in Europe and North America. More importantly, we illustrate the important role that IXPs play in today's Internet ecosystem and discuss how IXP-driven innovation in Europe is shaping and redefining the Internet marketplace, not only in Europe but increasingly so around the world.

The field of Robotics is one of the most fascinating areas of research in the world. Right now, hundreds of universities, corporations, and governments are spending billions researching and developing intelligent robotic systems for use in automation, military, medicine, electronics, food and beverage, service and a host of other industries. There is no doubt that robotic systems will play a major role in shaping the future of the world and as research and industry merge, progress in robotics technology will advance several times beyond the current level. This progress will be driven by a need to not only make life easier for consumers, but also to improve communities and even nations as a whole. The market for wireless robots and robotic systems far exceeds the current utilization and as technology advances, the use of robots will be incorporated primarily or indirectly in almost all fields. Of course the most interesting application is use of mobile and communicative robotic systems in everyday life. The possibilities are limited only by human creativity and intellect - the driving force that can turn this industry into the forerunner for an autonomous robot assisted future. Two of the most important areas for furthering the wide scale adaption of robotics are "autonomous mobility" and "wireless communications". The field of endeavor by which robotic systems communicate wirelessly is known as Wireless Robotics. Advances in the field of Wireless Robotics are necessary to further the growth of robotic systems and their use in everyday life. Research and development in this field needs to progress more rapidly in order to see faster adoption of robots in everyday life. One way to stimulate this growth is by leveraging expertise on a global scale. But for people to cooperate in a global environment and be able to design systems without running into compatibility issues, standards are necessary. In this paper, we shall provide a brief background on the origin of robots and our fascination with them, discuss various use cases in current life, and provide the motivation for standardization in the field of Wireless Robotics. © Springer Science+Business Media, LLC. 2012.

Niksun Inc. | Date: 2014-03-10

Computer hardware and software for monitoring communication networks; computer hardware and software for network security, network performance, network monitoring, recording, analysis or reconstruction of network traffic; network monitor for use in providing information for performance evaluation, design, testing, planning, management, and security of networks and systems; computer hardware and software for network security; computer hardware and software for intrusion detection and prevention; enterprise security hardware and software; computer hardware and software for detecting, shaping or selectively blocking traffic; computer hardware and software for traffic management.

Niksun Inc. | Date: 2012-09-13

Methods and systems for dynamically provisioning a network are disclosed. A network may be dynamically provisioned by detecting network congestion due to data on the network, identifying a transmission from a source computer to a destination computer for distinct routing based on at least one packet of the transmission, directing at least one other packet of the identified transmission to be marked for distinct routing, and instructing a router to distinctively route the other marked packets in response to the detection of network congestion. A controller and a monitoring device may be used to implement dynamic network provisioning.

A method of monitoring data on a first communication line. Data is received from the first communication line (402) and a plurality of packets (406) are extracted (416) from the data. Statistics are then recursively generated (408), the statistics corresponding to the plurality of packets.

Niksun Inc. | Date: 2014-07-03

Methods, systems, and apparatus for monitoring network devices and identifying packet anomalies are described herein. Anomalies may be identified by receiving packets from a network device at a network monitor, each packet having a first time stamp added by the network device, adding a second time stamp to the packets by the network monitor, comparing the first time stamp and the second time stamp of each packet, and identifying an anomaly associated with a packet in response to a difference metric generated based on the first and second time stamps exceeding a threshold.

Configurable network monitoring systems, apparatus, and methods are described. The configurable system includes storage devices, processing modules, and a system chassis housing the processing modules. Each processing module includes a processing unit, a network interface card coupled to the processing unit and configured for receiving data from a communication network, a storage controller coupled to the processing unit and configured to access a corresponding one of the storage devices, and a module chassis housing the processing unit, the network interface card, and the storage controller. The system can be reconfigured by adding/removing processing modules from the system chassis.

Niksun Inc. | Date: 2014-03-17

Computer hardware and software for network security; computer hardware and software for intrusion detection and prevention; enterprise security hardware and software; computer hardware and software for monitoring and recording network traffic; computer hardware and software for limiting website, social media and application access; computer hardware and software for filtering content and access.

Loading Niksun Inc. collaborators
Loading Niksun Inc. collaborators