Repository logo
Communities & Collections
All of DSpace
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Rathod, V.J."

Filter results by typing the first few letters
Now showing 1 - 4 of 4
  • Results Per Page
  • Sort Options
  • No Thumbnail Available
    Item
    Design and Development of an Emulation Model for VPN and VPN Bonding
    (Institute of Electrical and Electronics Engineers Inc., 2024) Sharma, K.; Tahiliani, M.P.; Rathod, V.J.
    Virtual Private Networks (VPNs) have become indispensable for organizations seeking secure remote network access, with a significant rise in their adoption. While the COVID-19 pandemic initially fueled the surge in remote work and VPN usage, the trend has continued post-pandemic as organizations increasingly opt for hybrid work models. VPNs allow users to establish secure connections to their organization's network from any location, ensuring the confidentiality of transmitted data. Moreover, VPN bonding, which combines multiple VPN connections into a unified interface, improves performance and reliability, particularly in areas with limited Internet connectivity. As the usage of VPN and VPN bonding technologies continues to expand, a growing demand arises for research in this field, and consequently, the need for robust emulators and simulators. However, existing network emulators or simulators currently lack comprehensive support for VPN-related technologies. To address these limitations, this paper aims to develop intuitive and user-friendly Application Programming Interfaces (APIs) for emulating VPN and VPN bonding in Network Stack Tester (NeST), a powerful Python package designed to facilitate network emulation for experienced researchers and individuals new to the field. This work utilizes OpenVPN, a secure tunneling daemon, to integrate the support of VPN emulation in NeST. By augmenting the capabilities of NeST, this work intends to provide researchers with a valuable toolset for exploring and testing VPN and VPN bonding technologies across diverse network environments. © 2024 IEEE.
  • No Thumbnail Available
    Item
    Effective RTO estimation using Eifel Retransmission Timer in CoAP
    (Institute of Electrical and Electronics Engineers Inc., 2020) Rathod, V.J.; Krishnam, S.; Kumar, A.; Baraskar, G.; Tahiliani, M.P.
    Internet of Things (IoT) is a system of interrelated devices with communication capabilities. Network congestion increases as the number of devices increase in the system and de-grades the Quality of Service (QoS). Unlike traditional Internet, TCP is not the de facto transport protocol for IoT because of the constrained nature of IoT devices. Therefore, congestion control mechanisms are coupled with application protocols, such as the Constrained Application Protocol (CoAP). Although there have been efforts to use CoAP with TCP, it typically uses UDP for data transport. CoAP defines a conservative congestion control mechanism that uses a fixed Retransmission TimeOut (RTO) for retransmissions regardless of the network conditions (e.g., Round Trip Time (RTT)). The Eifel Retransmission Timer is a popular algorithm originally proposed for TCP. It assesses prevalent network conditions by measuring RTT and accordingly sets the TCP RTO. This paper proposes to leverage the benefits of Eifel Retransmission Timer by integrating it with CoAP (when used with UDP) to obtain better RTO estimates and control congestion. The proposed algorithm is named as CoAP-Eifel. The effectiveness of the proposed approach has been validated by comparing it with the standard RTO estimation technique of CoAP. The experiments are carried out in a real testbed by using FIT/IoT-LAB. The results demonstrate that the proposed approach provides a better trade-off in terms of delay and throughput, without affecting the packet delivery ratio. © 2020 IEEE.
  • No Thumbnail Available
    Item
    Enabling Support for TLS and TLS Fingerprinting in Network Stack Tester
    (Institute of Electrical and Electronics Engineers Inc., 2024) Dabi, N.; Tahiliani, M.P.; Rathod, V.J.
    Transport Layer Security (TLS) is the standard protocol widely used for securing client-server communications over the Internet. It ensures the confidentiality and integrity of data transmitted between systems. With the rising deployment of TLS 1.3, which is the latest version of the protocol, stronger encryption and improved security features are introduced. The adoption of TLS 1.3 brings about the need for techniques such as TLS fingerprinting. TLS fingerprinting involves analyzing the unique characteristics of TLS handshakes to identify and classify different implementations or configurations of TLS. However, researchers currently lack a dedicated platform to test TLS and TLS fingerprinting techniques in a controlled environment. To address this gap, we aim to enhance NeST (Network Stack Tester) by adding support for TLS and TLS fingerprinting. NeST is a Python tool for network emulation that internally uses Linux network namespaces and Linux utilities to create virtual testbeds, perform experiments using various network protocols and collect statistics. By integrating TLS and TLS fingerprinting into NeST, we provide an easy-to-use tool that enables researchers to experiment with TLS, analyze TLS traffic, and evaluate the effectiveness of TLS fingerprinting techniques. © 2024 IEEE.
  • No Thumbnail Available
    Item
    Geometric Sequence Technique for Effective RTO Estimation in CoAP
    (IEEE Computer Society, 2020) Rathod, V.J.; Tahiliani, M.P.
    Internet of Things (IoT) is a network where physical objects with Internet connectivity can interact and exchange information with other connected objects. IoT devices are constrained in terms of power and memory, and have limited communication capabilities. The Constrained Application Protocol (CoAP) is a lightweight messaging protocol which is widely used by various IoT applications in low power and lossy wireless networks. CoAP provides reliability and minimal congestion control via a fixed Retransmission TimeOut (RTO) and Binary Exponential Backoff (BEB). It does not maintain end-to-end connection information and therefore, cannot adapt RTO based on the network conditions. Moreover, CoAP resets the RTO to its default value after having received the ACK for the retransmitted packet. This approach of resetting the RTO degrades the performance in a network with high latency and leads to spurious retransmissions. In this paper, we propose a Geometric Sequence Technique (GST) for effective RTO estimation in CoAP. GST retains the previous RTO value after having received the ACK for the retransmitted packet and eventually returns to the default value by decreasing the RTO depending on the number of consecutive successful transmissions. The proposed technique is implemented in Contiki OS and validated against the existing mechanisms. The experiments have been conducted using the Cooja simulator and the FIT/IoT-LAB testbed to verify the effectiveness of the proposed technique. The results show that GST minimizes the Flow Completion Times (FCT), reduces the number retransmissions and improves the network throughput. © 2020 IEEE.

Maintained by Central Library NITK | DSpace software copyright © 2002-2026 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify