Abstract
In developing countries, links are poor among domestic communities or internet service providers. Besides, international internet channels are suddenly blocked by such as Golden Shield (GS) in China. Offshore business communications are involved in these. To avoid such involvement, a seamless virtual network is proposed as an international business communication bridging solution. This uses Round Trip Time (RTT) based multiple thresholds for differential switch to Virtual Private Network (VPN) bypass. The characteristics are (1) using multiple threshold integrated differential calculus of RTT increase, a sign of the block is recognized as the steep staircase increase of RTT, (2) followed by the immediate automatic switch to VPN having RTT below 200ms. (3) Asymmetrically, only the absolute threshold value and continuation time are used to determine when to switch back. This method is analytically and statistically evaluated as being successful (below 3% errors), using around 200 cases of data on GS blocks. Furthermore, it has been validated by the real seamless usage in more than 20 offshore companies for three years. Besides response time in offshore applications, our method can also alleviate problems such as voice echoes and video jitters which irritate business users. These effects were validated analytically and by questionnaires to scores of business customers.
- N. Abramson. 1970. The aloha system: Another alternative for computer communications. In Proceedings of the Fall Joint Computer Conference (AFIPS’70), 281--285. ACM. Google Scholar
Digital Library
- Amcham China: American Chamber of Commerce in China. 2016 Business climate survey. Retrieved on May 29, 2016 from http://www.amchamchina.org/policy-advocacy/business-climate-survey/.Google Scholar
- D. Andersen, H. Balakrishnan, F. Kaashoek, and R. Morris. 2001. Resilient overlay networks. In Proceedings of the 8th Annual Workshop on Hot Topics in Operating Systems (HotOS-VIII). 175--187.Google Scholar
- C. A. Ardagna and Ernesto Damiani. 2014. Network and storage latency attacks to online trading protocols in the cloud. In Proceedings of the 2014 Workshops on the Move to Meaningful Internet Systems (OTM’14). 8842. 192--201. Google Scholar
Digital Library
- D. Benetti, E. Damiani, and P. Houngue. 2008. VoIP echo suppression in critical environments. Proceedings of the 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies. 558--562Google Scholar
- R. Beverly, S. Bauer, and A. Berger. 2007. The internet's not a big truck: Toward quantifying network neutrality. In Proceedings of the Passive and Active Measurement Conference (PAM’07). Louvain-la-neuve, Belgium, 135--144. Google Scholar
Digital Library
- Y. Byun, S. Narayanan, S. Mottand, and K. Biba. 2013. Wireless broadband measurement in California. In Proceedings of the 10th International Conference on Information Technology: New Generations (ITNG’13), 505--509. Google Scholar
Digital Library
- R. Carlson. 2003. Developing the web100 based network diagnostic tool (NDT). In Proceedings of the Conference on Passive and Active Measurement. 158--170.Google Scholar
- K. Chen and C. Hu. 2011. Border gateway protocol monitoring system can be cost effective. Commun. IET J. Mag. 5, 15, 2231--2249.Google Scholar
Cross Ref
- Y.-C. Cheng, U. Hoelzle, N. Cardwell, S. Savage, and G. M. Voelker. 2004. Monkey see, monkey do: A tool for TCP tracing and replaying. In Proceedings of the USENIX Technical Conference. 7--19. Google Scholar
Digital Library
- China's North-South Divide. 2016. IIJ GIO CHINA Service: Overview. Retrieved on Jan. 21, 2017 from http://www.iij.ad.jp/en/svcsol/service/gio/china/.Google Scholar
- China State Council. 2000. Regulation of commercial encryption codes. China State Council Directive No. 273.Google Scholar
- R. Clayton, S. J. Murdoch, and R. N. M. Watson. 2006. Ignoring the Great Firewall of China. Privacy Enhancing Technologies. Springer, Berlin. 20--35. Google Scholar
Digital Library
- B. Cohen. The Bittorrent protocol specification bittorrent.org. Retrieved on March 24, 2016 from http://www.bittorrent.org/beps/bep_0003.html.Google Scholar
- W. Cui, M. Peinado, K. Chen, H. J. Wang, and L. Irun-Briz. Tupni. 2008. Automatic reverse engineering of input formats. In Proceedings of the Conference on Computer and Communications Security (CCS’08). 391--402. Google Scholar
Digital Library
- E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, and F. Violante. 2002. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the ACM Conference on Computer and Communications Security (CCS’02). 207--216 Google Scholar
Digital Library
- B. Davie and J. Gross. 2013. A stateless transport tunneling protocol for network virtualization (STT). Internet draft retrieved from Draft-davie-stt-08.pdf, IETF. http://www.ibenit.com/post/22687196256/a-stateless-transport-tunneling-protocol-for.Google Scholar
- R. Dingledine, N. Mathewson, and P. Syverson. 2004. Tor: The second-generation onion router. Naval Research Lab.Google Scholar
Cross Ref
- M. Dischinger, A. Mislove, A. Haeberlen, and K. P. Gummadi. 2008. Detecting bittorrent blocking. In Proceedings of the Internet Measurement Conference (IMC’08). 3--8. Google Scholar
Digital Library
- M. Dischinger, M. Marcon, S. Guha, K. P. Gummadi, R. Mahajan, and S. Saroiu. 2010. Glasnost: Enabling end users to detect traffic differentiation. In Proceedings of the USENIX Symposium on Networked System Design and Implementation (NSDI’10). 405--418. Google Scholar
Digital Library
- EFF. “Test Your ISP” Project. Retrieved on March 24, 2016 from http://www.eff.org/testyourisp.Google Scholar
- C. Fraleigh, F. Tobagi, and C. Diot. INFOCOM 2003. Provisioning IP backbone networks to support latency-sensitive traffic. In Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, 1, 375--385.1.Google Scholar
- H. Fujikawa, H. Yamaki, Y. Yamamoto, and S. Tsuruta. 2015. Network virtualization using VPN for stable communication with offshore cloud. In Proceedings of the 11th International Conference on Signal-Image Technology 8 Internet-Based Systems (SITIS’15). 200--207. Google Scholar
Digital Library
- D. Geneiatakis, G. Portokalidis, and A. D. Keromytis. 2011. A multilayer overlay network architecture for enhancing IP services availability against DOS. In Proceedings of the Springer Conference on Information Science and Security (ICISS’11). 322--336. Google Scholar
Digital Library
- Great Firewall of China. Retrieved on May 29, 2016 from www.greatfirewallofchina.org.Google Scholar
- K. Hamzeh et al. 1999. RFC 2637—Point-to-point tunneling protocol (PPTP). Network Working Group. Google Scholar
Digital Library
- J. Ioannidis and S. M. Bellovin. 2002. Implementing pushback: Router-based defense against DDoS attacks. In Proceedings of the Network and Distributed System Security Symposium (NDSS’02). 1--8.Google Scholar
- K. Jeong and R. Figueiredo. 2016. Self-configuring software-defined overlay bypass for seamless inter- and intra-cloud virtual networking. In Proceedings of the 25th ACM International Symposium on High-Performance Parallel and Distributed Computing (HPDC’16). 153--164. Google Scholar
Digital Library
- P. Kanuparthy and C. Dovrolis. 2010. DiffProbe: Detecting ISP service discrimination. In Proceedings of the International Conference on Computer Communications (INFOCOM’10). 113--126. Google Scholar
Digital Library
- S. Kent and K. Seo. 2005. RFC 4301—Security architecture for the internet protocol. Network Working Group.Google Scholar
- T. Koponen et al. 2014. Network virtualization in multi-tenant datacenters, technical report TR2013-001E. International Computer Science Institute UC Berkeley.Google Scholar
- J. Lau, M. Townsley, and I. Goyret. 2005. RFC 3931—layer two tunneling protocol—version 3 (L2TPv3). Network Working Group.Google Scholar
- S. Luo, K. Ota, M. Dong, J. Wu, J. Li, and B. Pei. 2016. Toward high available SDN/NFV-based virtual network service in multi-provider scenario. Proceedings of 2016 World Automation Congress (WAC’16). 1--5.Google Scholar
- B. S. Madden. 2003. Citrix metaframe Xp: Advanced technical design guide. Brianmadden.Com Publishing Group. Google Scholar
Digital Library
- Measurement Lab (M-Lab). Retrieved on March 24, 2016 from http://www.measurementlab.net/.Google Scholar
- National Science Foundation and the Planète group. Retrieved on March 24, 2016 from https://www.nsnam.org/.Google Scholar
- NLANR/DAST, iPerf. Retrieved on March 24, 2016 from http://sourceforge.net/projects/iperf/.Google Scholar
- D. Nobori and Y. Shinjo. 2014. VPN Gate: A volunteer-organized public VPN relay system with blocking resistance for bypassing government censorship firewalls. In Proceedings of the USENIX Symposium on Networked System Design and Implementation (USENIX NSDI’14). 229--241. Google Scholar
Digital Library
- A. Ootsuka. 2014. Retrieved on January 20, 2017 from http://ascii.jp/elem/000/000/933/933306/ (in Japanese).Google Scholar
- B. Ottenwalder, B. Koldehofe, K. Rothermel, and U. Ramachandran. 2013. Migcep: Operator migration for mobility driven distributed complex event processing. In Proceedings of the 7th ACM International Conference on Distributed Event-based Systems (DEBS’13). ACM, 183--194 Google Scholar
Digital Library
- V. Paxson, A. K. Adams, and M. Mathis. 2002. Experiences with NIMI. Proceedings of the SAINT Workshop. 108--209. Google Scholar
Digital Library
- PlanetLab. Retrieved on March 24, 2016 from http://www.planet-lab.org/.Google Scholar
- Run Skype for Business. 2016. Retrieved on Jan. 14, 2017 from https://www.citrix.com/content/dam/citrix/en_us/documents/products-solutions/run-skype-for-business-as-a-secure-virtual-app-with-a-great-user-experience.pdf.Google Scholar
- A. Stavrou and A. D. Keromytis. 2005. Countering dos attacks with stateless multipath overlays. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS’05). 249--259. Google Scholar
Digital Library
- I. Stojmenovic and S. Wen. 2014. The fog computing paradigm: Scenarios and security issues. In Proceedings of the 2014 Federated Conference on Computer Science and Information Systems (ACSIS’14), 2, 1--8.Google Scholar
- M. B. Tariq, M. Motiwala, N. Feamster, and M. Ammar. 2009. Detecting network neutrality violations with causal inference. In Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies (CoNEXT’09). 289--300. Google Scholar
Digital Library
- The DIMES Project. Retrieved on March 25, 2016 from http://www.netdimes.org/.Google Scholar
- The Global Broadband Speed Test. Retrieved on March 25, 2016 from http://www.speedtest.net.Google Scholar
- The ICSI Netalyzr. Retrieved on March 25, 2016 from http://netalyzr.icsi.berkeley.edu.Google Scholar
- The Washington Post. 2016. China's scary lesson to the world: Censoring the Internet works. Retrieved on March 25, 2016 from https://www.washingtonpost.com/world/asia_pacific/chinas-scary-lesson-to-the-world-censoring-the-internet-works/2016/05/23/413afe78-fff3-11e5-8bb1-f124a43f84dc_story.html.Google Scholar
- Viptela 2015. In Proceedings of the 2014 Federated Conference on Computer Science and Information Systems (ACSIS’15). Retrieved on Jan. 22, 2017 from http://network-insight.net/2015/05/viptela-software-defined-wan-sd-wan/.Google Scholar
- WebSitePulse. Website Monitoring 8 Web Server Monitoring Service by WebSitePulse. Retrieved on May 29, 2016 from http://www.websitepulse.com/.Google Scholar
- Y. Zhang, Z. M. Mao, and M. Zhang. 2008. Ascertaining the reality of network neutrality violation in backbone ISPs. Proceedings of the 7th ACM Workshop on Hot Topics in NetworksProc. 158--164.Google Scholar
- Y. Zhang, Z. M. Mao, and M. Zhang. 2009. Detecting traffic differentiation in backbone ISPs with netpolice. In Proceedings of the Internet Measurement Conference (IMC’09). 103--115. Google Scholar
Digital Library
- WeChat. Retrieved on May 30 2016 from http://www.wechat.com/en/.Google Scholar
Index Terms
Seamless Virtual Network for International Business Continuity in Presence of Intentional Blocks
Recommendations
Business Building Blocks as Coordination Mechanism for Enterprise Transformations
EDOCW '13: Proceedings of the 2013 17th IEEE International Enterprise Distributed Object Computing Conference WorkshopsEnterprise architecture management (EAM) aims at aligning business and IT. Therefore, EAM analyzes the current and defines the target state. In order to reach the target state, EAM plans and monitors transformations affecting business processes, ...
Business Continuity: Keeping your data available in 10 steps
Bank of America said it lost customer data tapes in February on transit to a backup storage site. The fact that reportedly 1.2 million US Government employee's details were on the tapes has landed the bank in deep water. Although it said that the ...






Comments