skip to main content
research-article

Seamless Virtual Network for International Business Continuity in Presence of Intentional Blocks

Published:15 December 2017Publication History
Skip Abstract Section

Abstract

In developing countries, links are poor among domestic communities or internet service providers. Besides, international internet channels are suddenly blocked by such as Golden Shield (GS) in China. Offshore business communications are involved in these. To avoid such involvement, a seamless virtual network is proposed as an international business communication bridging solution. This uses Round Trip Time (RTT) based multiple thresholds for differential switch to Virtual Private Network (VPN) bypass. The characteristics are (1) using multiple threshold integrated differential calculus of RTT increase, a sign of the block is recognized as the steep staircase increase of RTT, (2) followed by the immediate automatic switch to VPN having RTT below 200ms. (3) Asymmetrically, only the absolute threshold value and continuation time are used to determine when to switch back. This method is analytically and statistically evaluated as being successful (below 3% errors), using around 200 cases of data on GS blocks. Furthermore, it has been validated by the real seamless usage in more than 20 offshore companies for three years. Besides response time in offshore applications, our method can also alleviate problems such as voice echoes and video jitters which irritate business users. These effects were validated analytically and by questionnaires to scores of business customers.

References

  1. N. Abramson. 1970. The aloha system: Another alternative for computer communications. In Proceedings of the Fall Joint Computer Conference (AFIPS’70), 281--285. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Amcham China: American Chamber of Commerce in China. 2016 Business climate survey. Retrieved on May 29, 2016 from http://www.amchamchina.org/policy-advocacy/business-climate-survey/.Google ScholarGoogle Scholar
  3. D. Andersen, H. Balakrishnan, F. Kaashoek, and R. Morris. 2001. Resilient overlay networks. In Proceedings of the 8th Annual Workshop on Hot Topics in Operating Systems (HotOS-VIII). 175--187.Google ScholarGoogle Scholar
  4. C. A. Ardagna and Ernesto Damiani. 2014. Network and storage latency attacks to online trading protocols in the cloud. In Proceedings of the 2014 Workshops on the Move to Meaningful Internet Systems (OTM’14). 8842. 192--201. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. D. Benetti, E. Damiani, and P. Houngue. 2008. VoIP echo suppression in critical environments. Proceedings of the 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies. 558--562Google ScholarGoogle Scholar
  6. R. Beverly, S. Bauer, and A. Berger. 2007. The internet's not a big truck: Toward quantifying network neutrality. In Proceedings of the Passive and Active Measurement Conference (PAM’07). Louvain-la-neuve, Belgium, 135--144. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Y. Byun, S. Narayanan, S. Mottand, and K. Biba. 2013. Wireless broadband measurement in California. In Proceedings of the 10th International Conference on Information Technology: New Generations (ITNG’13), 505--509. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Carlson. 2003. Developing the web100 based network diagnostic tool (NDT). In Proceedings of the Conference on Passive and Active Measurement. 158--170.Google ScholarGoogle Scholar
  9. K. Chen and C. Hu. 2011. Border gateway protocol monitoring system can be cost effective. Commun. IET J. Mag. 5, 15, 2231--2249.Google ScholarGoogle ScholarCross RefCross Ref
  10. Y.-C. Cheng, U. Hoelzle, N. Cardwell, S. Savage, and G. M. Voelker. 2004. Monkey see, monkey do: A tool for TCP tracing and replaying. In Proceedings of the USENIX Technical Conference. 7--19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. China's North-South Divide. 2016. IIJ GIO CHINA Service: Overview. Retrieved on Jan. 21, 2017 from http://www.iij.ad.jp/en/svcsol/service/gio/china/.Google ScholarGoogle Scholar
  12. China State Council. 2000. Regulation of commercial encryption codes. China State Council Directive No. 273.Google ScholarGoogle Scholar
  13. R. Clayton, S. J. Murdoch, and R. N. M. Watson. 2006. Ignoring the Great Firewall of China. Privacy Enhancing Technologies. Springer, Berlin. 20--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. B. Cohen. The Bittorrent protocol specification bittorrent.org. Retrieved on March 24, 2016 from http://www.bittorrent.org/beps/bep_0003.html.Google ScholarGoogle Scholar
  15. W. Cui, M. Peinado, K. Chen, H. J. Wang, and L. Irun-Briz. Tupni. 2008. Automatic reverse engineering of input formats. In Proceedings of the Conference on Computer and Communications Security (CCS’08). 391--402. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, and F. Violante. 2002. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the ACM Conference on Computer and Communications Security (CCS’02). 207--216 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. B. Davie and J. Gross. 2013. A stateless transport tunneling protocol for network virtualization (STT). Internet draft retrieved from Draft-davie-stt-08.pdf, IETF. http://www.ibenit.com/post/22687196256/a-stateless-transport-tunneling-protocol-for.Google ScholarGoogle Scholar
  18. R. Dingledine, N. Mathewson, and P. Syverson. 2004. Tor: The second-generation onion router. Naval Research Lab.Google ScholarGoogle ScholarCross RefCross Ref
  19. M. Dischinger, A. Mislove, A. Haeberlen, and K. P. Gummadi. 2008. Detecting bittorrent blocking. In Proceedings of the Internet Measurement Conference (IMC’08). 3--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Dischinger, M. Marcon, S. Guha, K. P. Gummadi, R. Mahajan, and S. Saroiu. 2010. Glasnost: Enabling end users to detect traffic differentiation. In Proceedings of the USENIX Symposium on Networked System Design and Implementation (NSDI’10). 405--418. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. EFF. “Test Your ISP” Project. Retrieved on March 24, 2016 from http://www.eff.org/testyourisp.Google ScholarGoogle Scholar
  22. C. Fraleigh, F. Tobagi, and C. Diot. INFOCOM 2003. Provisioning IP backbone networks to support latency-sensitive traffic. In Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, 1, 375--385.1.Google ScholarGoogle Scholar
  23. H. Fujikawa, H. Yamaki, Y. Yamamoto, and S. Tsuruta. 2015. Network virtualization using VPN for stable communication with offshore cloud. In Proceedings of the 11th International Conference on Signal-Image Technology 8 Internet-Based Systems (SITIS’15). 200--207. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. D. Geneiatakis, G. Portokalidis, and A. D. Keromytis. 2011. A multilayer overlay network architecture for enhancing IP services availability against DOS. In Proceedings of the Springer Conference on Information Science and Security (ICISS’11). 322--336. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Great Firewall of China. Retrieved on May 29, 2016 from www.greatfirewallofchina.org.Google ScholarGoogle Scholar
  26. K. Hamzeh et al. 1999. RFC 2637—Point-to-point tunneling protocol (PPTP). Network Working Group. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. J. Ioannidis and S. M. Bellovin. 2002. Implementing pushback: Router-based defense against DDoS attacks. In Proceedings of the Network and Distributed System Security Symposium (NDSS’02). 1--8.Google ScholarGoogle Scholar
  28. K. Jeong and R. Figueiredo. 2016. Self-configuring software-defined overlay bypass for seamless inter- and intra-cloud virtual networking. In Proceedings of the 25th ACM International Symposium on High-Performance Parallel and Distributed Computing (HPDC’16). 153--164. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. P. Kanuparthy and C. Dovrolis. 2010. DiffProbe: Detecting ISP service discrimination. In Proceedings of the International Conference on Computer Communications (INFOCOM’10). 113--126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. S. Kent and K. Seo. 2005. RFC 4301—Security architecture for the internet protocol. Network Working Group.Google ScholarGoogle Scholar
  31. T. Koponen et al. 2014. Network virtualization in multi-tenant datacenters, technical report TR2013-001E. International Computer Science Institute UC Berkeley.Google ScholarGoogle Scholar
  32. J. Lau, M. Townsley, and I. Goyret. 2005. RFC 3931—layer two tunneling protocol—version 3 (L2TPv3). Network Working Group.Google ScholarGoogle Scholar
  33. S. Luo, K. Ota, M. Dong, J. Wu, J. Li, and B. Pei. 2016. Toward high available SDN/NFV-based virtual network service in multi-provider scenario. Proceedings of 2016 World Automation Congress (WAC’16). 1--5.Google ScholarGoogle Scholar
  34. B. S. Madden. 2003. Citrix metaframe Xp: Advanced technical design guide. Brianmadden.Com Publishing Group. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Measurement Lab (M-Lab). Retrieved on March 24, 2016 from http://www.measurementlab.net/.Google ScholarGoogle Scholar
  36. National Science Foundation and the Planète group. Retrieved on March 24, 2016 from https://www.nsnam.org/.Google ScholarGoogle Scholar
  37. NLANR/DAST, iPerf. Retrieved on March 24, 2016 from http://sourceforge.net/projects/iperf/.Google ScholarGoogle Scholar
  38. D. Nobori and Y. Shinjo. 2014. VPN Gate: A volunteer-organized public VPN relay system with blocking resistance for bypassing government censorship firewalls. In Proceedings of the USENIX Symposium on Networked System Design and Implementation (USENIX NSDI’14). 229--241. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. A. Ootsuka. 2014. Retrieved on January 20, 2017 from http://ascii.jp/elem/000/000/933/933306/ (in Japanese).Google ScholarGoogle Scholar
  40. B. Ottenwalder, B. Koldehofe, K. Rothermel, and U. Ramachandran. 2013. Migcep: Operator migration for mobility driven distributed complex event processing. In Proceedings of the 7th ACM International Conference on Distributed Event-based Systems (DEBS’13). ACM, 183--194 Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. V. Paxson, A. K. Adams, and M. Mathis. 2002. Experiences with NIMI. Proceedings of the SAINT Workshop. 108--209. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. PlanetLab. Retrieved on March 24, 2016 from http://www.planet-lab.org/.Google ScholarGoogle Scholar
  43. Run Skype for Business. 2016. Retrieved on Jan. 14, 2017 from https://www.citrix.com/content/dam/citrix/en_us/documents/products-solutions/run-skype-for-business-as-a-secure-virtual-app-with-a-great-user-experience.pdf.Google ScholarGoogle Scholar
  44. A. Stavrou and A. D. Keromytis. 2005. Countering dos attacks with stateless multipath overlays. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS’05). 249--259. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. I. Stojmenovic and S. Wen. 2014. The fog computing paradigm: Scenarios and security issues. In Proceedings of the 2014 Federated Conference on Computer Science and Information Systems (ACSIS’14), 2, 1--8.Google ScholarGoogle Scholar
  46. M. B. Tariq, M. Motiwala, N. Feamster, and M. Ammar. 2009. Detecting network neutrality violations with causal inference. In Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies (CoNEXT’09). 289--300. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. The DIMES Project. Retrieved on March 25, 2016 from http://www.netdimes.org/.Google ScholarGoogle Scholar
  48. The Global Broadband Speed Test. Retrieved on March 25, 2016 from http://www.speedtest.net.Google ScholarGoogle Scholar
  49. The ICSI Netalyzr. Retrieved on March 25, 2016 from http://netalyzr.icsi.berkeley.edu.Google ScholarGoogle Scholar
  50. The Washington Post. 2016. China's scary lesson to the world: Censoring the Internet works. Retrieved on March 25, 2016 from https://www.washingtonpost.com/world/asia_pacific/chinas-scary-lesson-to-the-world-censoring-the-internet-works/2016/05/23/413afe78-fff3-11e5-8bb1-f124a43f84dc_story.html.Google ScholarGoogle Scholar
  51. Viptela 2015. In Proceedings of the 2014 Federated Conference on Computer Science and Information Systems (ACSIS’15). Retrieved on Jan. 22, 2017 from http://network-insight.net/2015/05/viptela-software-defined-wan-sd-wan/.Google ScholarGoogle Scholar
  52. WebSitePulse. Website Monitoring 8 Web Server Monitoring Service by WebSitePulse. Retrieved on May 29, 2016 from http://www.websitepulse.com/.Google ScholarGoogle Scholar
  53. Y. Zhang, Z. M. Mao, and M. Zhang. 2008. Ascertaining the reality of network neutrality violation in backbone ISPs. Proceedings of the 7th ACM Workshop on Hot Topics in NetworksProc. 158--164.Google ScholarGoogle Scholar
  54. Y. Zhang, Z. M. Mao, and M. Zhang. 2009. Detecting traffic differentiation in backbone ISPs with netpolice. In Proceedings of the Internet Measurement Conference (IMC’09). 103--115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. WeChat. Retrieved on May 30 2016 from http://www.wechat.com/en/.Google ScholarGoogle Scholar

Index Terms

  1. Seamless Virtual Network for International Business Continuity in Presence of Intentional Blocks

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM Transactions on Internet Technology
              ACM Transactions on Internet Technology  Volume 18, Issue 1
              Special Issue on Connected Communities
              February 2018
              250 pages
              ISSN:1533-5399
              EISSN:1557-6051
              DOI:10.1145/3155100
              • Editor:
              • Munindar P. Singh
              Issue’s Table of Contents

              Copyright © 2017 ACM

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 15 December 2017
              • Accepted: 1 August 2017
              • Revised: 1 June 2017
              • Received: 1 July 2016
              Published in toit Volume 18, Issue 1

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed
            • Article Metrics

              • Downloads (Last 12 months)9
              • Downloads (Last 6 weeks)1

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader
            About Cookies On This Site

            We use cookies to ensure that we give you the best experience on our website.

            Learn more

            Got it!