Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
  • Raj Jain is a Fellow of IEEE, a Fellow of ACM, a Fellow of AAAS, a winner of 2017 ACM SIGCOMM Lifetime Achievement Aw... moreedit
The next generation Internet needs to support multiple diverse application contexts. In this paper, we present Internet 3.0, a diversified, multi-tier architecture for the next generation Internet. Unlike the current Internet, Internet... more
The next generation Internet needs to support multiple diverse application contexts. In this paper, we present Internet 3.0, a diversified, multi-tier architecture for the next generation Internet. Unlike the current Internet, Internet 3.0 defines a new set of primitives that allows diverse applications to compose and optimize their specific contexts over resources belonging to multiple ownerships. The key design philosophy is to enable diversity through explicit representation, negotiation and enforcement of policies at the granularity of network infrastructure, compute resources, data and users. The basis of the Internet 3.0 architecture is a generalized three-tier object model. The bottom tier consists of a high-speed network infrastructure. The second tier consists of compute resources or hosts. The third tier consists of data and users. The “tiered” organization of the entities in the object model depicts the natural dependency relationship between these entities in a communica...
This paper presents the development of a Supervisory Control and Data Acquisition (SCADA) system testbed used for cybersecurity research. The testbed consists of a water storage tank’s control system, which is a stage in the process of... more
This paper presents the development of a Supervisory Control and Data Acquisition (SCADA) system testbed used for cybersecurity research. The testbed consists of a water storage tank’s control system, which is a stage in the process of water treatment and distribution. Sophisticated cyber-attacks were conducted against the testbed. During the attacks, the network traffic was captured, and features were extracted from the traffic to build a dataset for training and testing different machine learning algorithms. Five traditional machine learning algorithms were trained to detect the attacks: Random Forest, Decision Tree, Logistic Regression, Naïve Bayes and KNN. Then, the trained machine learning models were built and deployed in the network, where new tests were made using online network traffic. The performance obtained during the training and testing of the machine learning models was compared to the performance obtained during the online deployment of these models in the network. ...
In this paper we describe a hands-on laboratoryoriented learning and instructional package thatwe have developed for data communications and networking.The package consists of a software tool, together withinstructional material for a... more
In this paper we describe a hands-on laboratoryoriented learning and instructional package thatwe have developed for data communications and networking.The package consists of a software tool, together withinstructional material for a laboratory based networkingcurriculum. The software is based on a simulation environmentthat enables the student to experiment withvarious networking protocols, on an easy to use graphicaluser interface (GUI). Data message
QoS for Real Time Applications over Next Generation Data Networks, Project Status Report, Part 2, Project Status Report. Raj Jain Quality of Service for Real-Time Applications Over Next Generation Data Networks, 5/2001. This viewgraph... more
QoS for Real Time Applications over Next Generation Data Networks, Project Status Report, Part 2, Project Status Report. Raj Jain Quality of Service for Real-Time Applications Over Next Generation Data Networks, 5/2001. This viewgraph presentation provides information on the management of traffic congestion in satellite communication networks. 32 Communications and Radar(AH).
Abstract: Asynchronous transfer mode (ATM) networks must define multicast capabilities in order to efficiently support numerous applications, such as video conferencing and distributed applications, in addition to LAN emulation (LANE) and... more
Abstract: Asynchronous transfer mode (ATM) networks must define multicast capabilities in order to efficiently support numerous applications, such as video conferencing and distributed applications, in addition to LAN emulation (LANE) and Internet protocol (IP) multicasting. Several problems and issues arise in ATM multicasting, such as signaling, routing, connection admission control, and traffic management problems. IP integrated services over ATM poses further challenges to ATM multicasting. Scalability and simplicity ...
Abstract—The Internet has evolved immensely since its inception to being a network of academic and government institutions to its present magnanimous commercial avatar. It is currently deemed to be the single largest resource for... more
Abstract—The Internet has evolved immensely since its inception to being a network of academic and government institutions to its present magnanimous commercial avatar. It is currently deemed to be the single largest resource for information and services. From the times it was managed by central authorities, first by DARPA and then by NSF, the present internet has matured to become a commercially driven, distributed structure with minimal centralized control. The availability of large-scale distributed heterogeneous networks and ...
Research Interests:
Research Interests:
In this paper, we take a fresh look at stub-site multihoming within the paradigms of an identifier/locator split architecture. More specifically, we investigate the possibility of enabling multi-homed stub network sites to improve the... more
In this paper, we take a fresh look at stub-site multihoming within the paradigms of an identifier/locator split architecture. More specifically, we investigate the possibility of enabling multi-homed stub network sites to improve the performance of their end-to-end TCP flows by leveraging the path diversity of the underlying network. We design a host-network co-operative mechanism for end-to-end flow path switching based on reliable transport layer protocol "hints" indicating probable path problems. Our evaluations of actual Internet routing/topology data strongly suggest significant degree of path diversity across path switches available to multihomed stub networks, even within the restricted precincts of inter-domain policy routing. Additionally, we also address the problems of global routing scalability and inbound traffic engineering control as pertaining to stub-site multi-homing.
➢ Bob wants to watch a movie➢ Starts it on his media server➢ Continues on his iPhone during commute to work➢ Movie exists on many servers➢ Bob may get it from different servers at different times or multiple servers at the same time❑ Can... more
➢ Bob wants to watch a movie➢ Starts it on his media server➢ Continues on his iPhone during commute to work➢ Movie exists on many servers➢ Bob may get it from different servers at different times or multiple servers at the same time❑ Can we just give IDs/locators to users and treat them as hosts? No!⇒ Policy Oriented Naming Architecture (PONA)
Abstract: Asynchronous transfer mode (ATM) is the new generation of computer and communication networks that are being deployed throughout the telecommunication industry as well as in campus backbones. ATM technology distinguishes itself... more
Abstract: Asynchronous transfer mode (ATM) is the new generation of computer and communication networks that are being deployed throughout the telecommunication industry as well as in campus backbones. ATM technology distinguishes itself from the previous networking protocols in that it has the latest traffic management technology and thus allows guaranteeing delay, throughput, and other performance measures. This in turn, allows users to integrate voice, video, and data on the same network. Available bit rate ( ...
This paper discusses the role of parameters negotiated and used for flow control in the ATM ABR service, and gives guidelines for setting each parameter. The effect of the speed of the links on the path from the source to the destination,... more
This paper discusses the role of parameters negotiated and used for flow control in the ATM ABR service, and gives guidelines for setting each parameter. The effect of the speed of the links on the path from the source to the destination, and the round trip time of the connection, on the ABR parameter values is discussed. We also give simulation results to illustrate the effect of various parameter values on the performance of the ABR connection, in terms of both throughput and queue lengths. Keywords: ATM networks, available bit rate, ABR ...
Abstract: Virtual Private Networks (VPNs) offer an alternative solution using Internet Protocol (IP) tunnels to create secure, encrypted communication between geographically distant networks using a common shared medium such as the... more
Abstract: Virtual Private Networks (VPNs) offer an alternative solution using Internet Protocol (IP) tunnels to create secure, encrypted communication between geographically distant networks using a common shared medium such as the Internet. They use tunneling to establish end-to-end connectivity. OpenVPN is a cross-platform, secure, highly configurable VPN solution. Security in OpenVPN is handled by the OpenSSL cryptographic library which provides strong security over a Secure Socket Layer (SSL) using standard algorithms ...
Abstract: During the design of ABR traffic management at the ATM Forum, we performed several analyses to ensure that the ABR service will operate efficiently over satellite links. In the cases where the performance was unacceptable, we... more
Abstract: During the design of ABR traffic management at the ATM Forum, we performed several analyses to ensure that the ABR service will operate efficiently over satellite links. In the cases where the performance was unacceptable, we suggested modifications to the traffic management specifications. This paper describes one such issue related to the count of missing resource management cells (Crm) parameter of the ABR source behavior. The analysis presented here led to the changes which are now part of the ATM traffic ...
In the network research area, it is very costly to deploy a complete test bed containing multiple networked computers, routers and data links to validate and verify a certain network protocol or a specific network algorithm. The network... more
In the network research area, it is very costly to deploy a complete test bed containing multiple networked computers, routers and data links to validate and verify a certain network protocol or a specific network algorithm. The network simulators in these circumstances save a lot of money and time in accomplishing this task. Network simulators are also particularly useful in allowing the network designers to test new networking protocols or to change the existing protocols in a controlled and reproducible manner. In ...
Abstract: In performance analysis and design of communication netword modeling data traffic is important. With introduction of new applications, the characteristics of the data traffic changes. We present a brief review the different... more
Abstract: In performance analysis and design of communication netword modeling data traffic is important. With introduction of new applications, the characteristics of the data traffic changes. We present a brief review the different models of data traffic and how they have evolved. We present results of data traffic analysis and simulated traffic, which demonstrates that the packet train model fits the traffic at source destination level and long-memory (self-similar) model fits the traffic at the aggregate level.
Current TCP flow control depends on packet losses to find the workload that a network can support. Packet drops not only reduce TCP performance, but also add large transfer delay to the packets. Instead of dropping the overflowed packets,... more
Current TCP flow control depends on packet losses to find the workload that a network can support. Packet drops not only reduce TCP performance, but also add large transfer delay to the packets. Instead of dropping the overflowed packets, Explicit Congestion Notification (ECN) detects incipient congestion and notifies the sources to reduce their windows when the queue length exceeds a threshold. In this paper, we derive closed-form formulae for requirements on threshold and buffer size to achieve zero packet ...
Improved text for measurement procedures, foreground and background traffic, and scalable configurations for the latency section of the baseline text is presented. Source: Gojko Babic, Arjan Durresi, Raj Jain, Justin Dolske The Ohio State... more
Improved text for measurement procedures, foreground and background traffic, and scalable configurations for the latency section of the baseline text is presented. Source: Gojko Babic, Arjan Durresi, Raj Jain, Justin Dolske The Ohio State University Department of CIS Columbus, OH 43210-1277 Phone: 614-292-3989, Fax: 614-292-2911, Email: Jain@ACM.Org The presentation of this contribution at the ATM Forum is sponsored by NASA.

And 558 more