Research Roadmap Driven by Network Benchmarking
Lab (NBL): Deep Packet Inspection, Traffic Forensics, Embedded Benchmarking, Software
Defined Networking and Beyond
Ying-Dar Lin, Fellow, IEEE
Department of Computer Science,
National Chiao Tung University, Hsinchu, Taiwan
Abstract
Most researchers look for topics from the literature.
But our research derived mostly from development, in turn driven by industrial
projects or product testing. We spanned into the areas of cable TV networks,
multi-hop cellular, Internet QoS, deep packet inspection, traffic forensics,
embedded benchmarking, and software defined networking. Among them, our
multi-hop cellular work was the first along this line and has a high impact on
both academia and industry, with over 600 citations and standardizations in WLAN
mesh (IEEE 802.11s), WiMAX (IEEE 802.16j), Bluetooth (IEEE 802.15.5), and 3GPP
LTE-advanced. Side products from our research include a startup (L7 Networks
Inc., in 2002), a test lab (Network Benchmarking Lab, NBL, since 2002), and a
textbook ¡§Computer Networks: An Open Source Approach¡¨ (McGraw-Hill, 2011). It
is a perfect time to have my 20-year half-time report as we celebrate the 70th
birthday of my Ph.D. thesis advisor, Prof. Mario Gerla. This report could serve
as a reference for researchers in developing their own roadmap.
Keywords: research model, research roadmap,
development and research, network research, deep packet inspection, traffic
forensics, embedded benchmarking, software defined networking.
1. Roadmap and Footprints
From
Development to Research
Research
topics in the academia are often drawn from three sources: literature
repository, development projects, and industrial discussions. The literature
repository accounts for the dominant percentage as it is the easiest way to
find a topic by following a crowd of researchers. Your papers could also enjoy
being well cited if you are slightly ahead of the crowd or the fever on the
topic persists for many years. The only problem with this source might be minor improvement on existing problems defined by others or
wasted resources on pseudo, instead
of real, problems. On the other hand, deriving a research topic from a
development effort is an expensive approach, where research is defined as the non-trivial parts within the development
process. The virtue in return is a real problem with a feasible solution. The
problem or the solution might be new to the academia and the industry.
Researching a real problem from the industrial discussions is an inexpensive
alternative. However, as there might not be real development involved, the
research result might not be a feasible solution. How tight research and
development should go together is a choice. I myself prefer a tighter
relationship because after all the nature of data communications is engineering
instead of pure science.
With the
choice of a tighter relationship between research and development, over a half of
my research topics derived from development projects. This is particularly true
with the prevalence of Linux and open source resources since late 90s. A rule
of thumb is if I don¡¦t know how to develop
it I would not research on it. My 20-year research career at National Chiao
Tung University (NCTU) has spanned into several areas, including cable TV
networks, wireless, Internet QoS, deep packet inspection, traffic forensics, and
network and embedded testing. In addition to 102 journal papers, 51 conference
papers, and 31 filed patents, 165 industry-oriented articles (in Chinese) and
3 books were written.
Cable
and Multi-hop Cellular
Triggered by the development
of bi-directional coaxial cable TV networks in mid-90s and a project sponsored
by a company were our research on hybrid fiber coaxial (HFC) networks, with some
well cited works on minislot allocation and scheduling, including HFC protocol
design [1], IEEE 802.14 standardization [2], combined allocation and scheduling
[3], MPEG-aware scheduling [4], HFC protocol design and implementation issues
[5], optimal minislot allocation [6], optimal ranging [7], uplink
scheduling [8], and n-ary collision detection [9].
Inspired by
the weakness and instability in the connectivity
of ad hoc networks, we were the first to propose in the year 2000 the wireless architecture
that combines cellular and ad hoc networking into multi-hop cellular. Multi-hop
cellular [10] and multi-hop WLAN [11] have been cited over 600 times with many
follow-up works, including two special issues and four main-stream industrial
standards. Supported by an industry project, we later extended this direction
of research into mesh networking, with a turn-key development [12], a design of
multi-channel with fewer radios [13], and an experimental study [14].
Internet
QoS
Research works on Internet
QoS were fostered by the surge of Internet growth in late 90s and early 2000s. With
the abundant Linux and open source resources, we were able to prototype a
QoS-enabled router. On that router, we developed and experimented a series of algorithms
for (1) admission control (bandwidth brokers [15] and measurement-based
admission control [16]), (2) scheduling (preemptive DRR [17], applying fair
queuing to WLAN [18], applying fair queuing to request scheduling [19], request
scheduling for DiffServ [20], multi-resource request scheduling for
DiffServ [21], scheduling for GPRS [22], scheduling for WiMAX [23], DiffServ
over network processors [24]), (3) classification (lookup-and-bypass
classification [25]), (4) queue management (benchmarking bandwidth
management techniques [26], TCP rate shaping [27], link load balancing [28], codec-aware
VoIP playout [29]), (5) QoS routing (QoS routing granularity in MPLS [30], service-sensitive
routing in MPLS [31]), (6) multicasting (RP relocation in PIM-SM [32]), and (7)
TCP-friendly congestion control (comparing TCP-friendly congestion control schemes
[33], TCP-equivalent rate control [34]).
Deep
Packet Inspection with Two Spin-offs
While bandwidth became
abundant and security issues arose in early 2000s, we moved the focus to deep
packet inspection mainly for Internet security. The previous prototyped
QoS-enabled router was turned into a 7-in-1
security gateway with routing, bandwidth management, NAT (Network Address
Translation), firewall, VPN (Virtual Private Network), IDS (Intrusion Detection
System), and content filtering (or called application firewall). The latter two
and some other new functions require deep packet inspection on application
headers and payloads, which is much slower than handling TCP/IP headers. To
speed up deep packet inspection, we profiled many security packages (profiling
string matching [35]), changed software architectures (integrated security
gateway [36], content security gateway [37], in-kernel P2P management [38], stream-based
anti-virus [39], scalable one-to-many streaming [40]), designed new algorithms
for string matching (string matching for deep packet inspection [41], sub-linear
string matching [42], content filtering with early decision [43]), and
implemented string or classification matching into network processor (core-centric
network processor [44], memory-intensive network processors [45], thread allocation
in network processors [46], VPN over network processors [47]) and FPGA/SoC
hardware (sub-linear string matching hardware with bloom filters [48], string
matching automata with root hashing [49], scalable automata with indexing and
hashing [50], automata in SoC [51]). In this stage, we built the d¡÷R
research model where Linux-based development (open source development [52], embedded
Linux [53]) triggered research issues and the proposed solutions were evaluated
through experiments on developed systems. The side effects of this research
model include a start-up, L7 Networks Inc. (www.L7.com.tw)
since 2002, and a test lab, Network Benchmarking Lab (NBL, www.nbl.org.tw) since 2002, examining and benchmarking
security, switch/router, WLAN, and VoIP, and more recently LTE and handheld
products.
Traffic
Forensics at NBL
NBL operations were
purely development efforts without research until we established an on campus
beta site in the dormitory network. Research issues arose when we started to
use real traffic to test network products. Real traffic has been proved to be
effective in triggering product defects which would otherwise become customer found defects instead of lab found defects. However, understanding
and manipulating real traffic is non-trivial. Thus, another series of research
were conducted, including testbed design (on campus beta site [54], NAT
compatibility testbed [55-57], IPv6 beta site [58]), traffic replay (Socket Replay
[59], WLAN Replay [60], ProxyReplay [61], Multi-Port Replay [62]), test coverage
analysis and optimization [63], traffic forensics (PCAP Lib [64], bug traces
[65]), intrusion analysis (taint tracker for buffer overflow detection [66],
evasion through IDS [67], attack session extraction [68], false positive and
negative analysis in intrusion detection [69], weighted voting [70]), malware
analysis (secure malware analysis environment [71], active and passive malware
collection [72], malware classification [73], botnet detection [74]), and
security criteria [75]. Research along this track is still on-going and may
continue for a few more years.
Embedded
Benchmarking Lab (EBL)
In the meantime, to span from network
devices to handheld client devices, we established another lab, Embedded
Benchmarking Lab (EBL, www.ebl.org.tw) in
2011. EBL reviews smartphones and touchpads in terms of functionality,
performance, power consumption, stability, and GUI smoothness. Another series
of research works are being developed from EBL, which range from performance
profiling (bottleneck analysis on Android applications [76], multi-resolution
profiler on Android applications [77]), cloud offloading with time-and-energy
awareness [78], Android malware detection [79], and smartphone GUI testing [80-81].
This is a relatively young research area with potentials of good impact on
embedded systems in general, smartphones, tablets, and other handheld or future
wearable devices. The concerned issues are usually not on protocol aspects but
on software and hardware components in embedded systems.
Software Defined
Networking (SDN)
With
the same process of research led by development, we are getting into an
emerging area, namely software defined networking (SDN). We view SDN as the
second wave of cloud computing happening to networking, with the control plane being
centralized and virtualized into the cloud while leaving the data plane at the
customer side. SDN deployment started from data centers and now expands to the
model of ¡§networking as a service¡¨ (NaaS) offered by the operators to
enterprise and residential subscribers. By centralizing the control-plane
software of routers and switches to the controller and its applications, and
controlling the data-plane of these devices remotely, SDN reduces the capital
expenditure (CAPEX) and operational expenditure (OPEX) because the devices
become simpler and hence cheaper and number of administrators could be reduced.
SDN also enables fast service orchestration because the data plane is highly
programmable from the remote control plane at controllers and applications. It
is deemed to bring the biggest change to the data communications industry in
this decade.
We are in the process of developing an SDN
solution to control and manage campus switches and Wi-Fi access points, a test
lab with test capabilities on conformance, interoperability, performance,
stability, and test tools. Through this development process, research issues
are being identified and investigated. Among them, standardization plays the foundation
role to evolve the OpenFlow, the southbound API between controllers and
switches, converge the northbound API between controllers and applications,
extend the basic SDN architecture by service chaining (SC) and network function
virtualization (NFV) to accommodate value-added services, and test systems and
products in terms of conformance, interoperability, performance, and
functionality. Other advanced research issues include performance and
scalability of switches, controllers, and applications, security of SDN itself
and security services offered by SDN, and use cases in all possible domains
from data centers, operators of wired and wireless infrastructures,
enterprises, homes, down to smartphones, wearable computers, and machine-to-machine
(M2M) systems. Though there are papers published or being published on SDN,
generic architectures and algorithms, and solid modeling and analysis are yet
to be researched.
The rest of
this article is organized as follows. We highlight five results and their
impacts in five short sections. Section 2 gives a closer look at multi-hop
cellular. Section 3 expands the roadmap on deep packet inspection. Section 4 and
Section 5 zoom into the operations of NBL and EBL. The textbook ¡§Computer
Networks: An Open Source Approach¡¨ [82] is briefed in Section 6. Learned
lessons summarized in Section 7 could be useful career tips for junior
researchers.
2. Multi-hop Cellular
Communications
This work presents a new architecture,
multi-hop cellular network (MCN), for wireless communications. MCN preserves
the benefit of conventional single-hop cellular networks (SCN) where the
service infrastructure is constructed by fixed bases, and it also incorporates
the flexibility of ad-hoc networks where wireless transmission through mobile
stations in multiple hops is allowed. MCN can reduce the required number of
bases or improve the throughput performance, while limiting path vulnerability
encountered in ad-hoc networks. In addition, MCN and SCN are analyzed, in terms
of mean hop count, hop-by-hop throughput, end-to-end throughput, and mean
number of channels (i.e. simultaneous transmissions) under different traffic
localities and transmission ranges. Numerical results demonstrate that the
throughput of MCN exceeds that of SCN, the former also increases as the
transmission range decreases. The above results can be accounted for by the
different orders, linear and square, at which the mean hop count and mean
number of channels increase, respectively.
We were the first to propose
the architecture and analyze the capacity of multi-hop cellular networking back
in 2000. The concept of ¡§relaying within a cell¡¨ started from our Infocom 2000
paper. We proposed the architecture that evolved from ad hoc and cellular networks.
It has been proved mathematically that its capacity grows linearly as the
transmission range decreases because the hop count and the number of channels
grow linearly and quadratically, respectively. We also designed and implemented
a WLAN prototype with multi-hop relaying to access points. Recently we combined
the multiple channel concept with 802.11s mesh networking, where few radios switch
between channels. The solution and its firmware were licensed to Realtek
Semiconductor as a turn-key solution bundled with Realtek¡¦s WLAN chipsets.
Since 2000, our Infocom paper has received over 600 citations
from papers, patents, books, and special issues. It was included as a theme topic
in at least two books: Next Generation Mobile Access Technologies (Haas and
McLaughlin, Cambridge, 2007) and Ad Hoc Networks (Wu and Stojmenovic (editors),
IEEE Computer Society, 2004). Two special issues have been dedicated to the
concept of multi-hop cellular: IEEE Communications Magazine (2007) and EURASIP
Journal on Advanced in Signal Processing (2008). The paper was cited by several
patents (US 7,145,892 in 2006, EP 1,481,517 in 2006, etc.) and has served as
the foundation of many other patents that utilize relaying within a cell. One
recent Ph.D. dissertation in Finland (Doppler, 2010) investigated various
relaying techniques within cellular systems, and started by citing our Infocom
paper. The work on multi-hop cellular has had long lasting impact not only on
academia but also on industry. Relaying within a cell or towards an access
point or base station has been standardized in IEEE 802.11s (1.0 in 2006, 2.0
in 2008, 3.0 in 2009 and 2011), WiMAX (IEEE 802.16j-06/013r3 in 2007, IEEE
C802.16m-08/1436r1 in 2008), Bluetooth (IEEE 802.15.5), and under development within
3GPP LTE-advanced.
3. Deep Packet Inspection
From 2000, we started an
investigation of deep packet inspection (DPI) examining application headers and
payloads of incoming packets for application-aware and malicious traffic
management. In comparison with table lookup of destination IP address and
5-tuple (source/dest IP address and port number, protocol ID) done in routers
and firewalls, DPI requires signature matching on the variable-length
application header and payload to look for specific applications, intrusions,
viruses, malware, and spam, a much heavier process than the traditional table
lookup. We started from restructuring packet flows within Linux systems. Next we
designed string matching algorithms that could scale well over tens of
thousands of signatures, and then implemented the algorithms in hardware and
SoC designs to scale to multi-Gbps in throughput. This research roadmap on DPI,
software ¡V algorithm ¡V hardware ¡V SoC, has interleaved development with
research. The Linux-based development fostered a startup in 2002, L7 Networks
Inc. L7 addressed the market of content-aware networking with DPI, and was
later acquired by D-Link Corp.
After developing and researching DPI engines, we moved
on to apply DPI to traffic forensics, in particular for product testing at NBL.
We established the first ¡§on campus beta site¡¨, where potential defects could
be detected earlier from ¡§live¡¨ traffic at the beta site or from ¡§replayed¡¨
traffic at NBL than at customer premises. NBL has developed the techniques of
Beta Site (with redundancy for fast recovery), PCAP Lib (a classified library
of packet traces), ILLT (In-Lab Live Testing, replay framework and tools), etc.
Compared to the other test labs that depend solely on artificial traffic
generated by test tools, NBL¡¦s approach to use live and replayed real traffic,
labeled RealFlow, is world-wide unique. It has opened a unique opportunity for
traffic forensics research in academia and for real traffic testing in
industry.
4. Network Benchmarking
Lab (NBL)
Founded
NBL in 2002, NBL started as a customized testing service
provider, grew to be a test solution/tool provider from 2005, and added the
world-wide unique RealFlow real traffic testing from 2007. It has served over
100 companies, tested over 600 products, grown to a staff of 23
full-time engineers plus 20 students, and has been 2/3-supported by industry
and 1/3 by government agencies. Positioning itself as a real traffic test lab,
NBL has also developed its research roadmap along beta site, packet trace
library, in-lab replay
testing, malware sample database, etc. Based on
the local significance established in the first decade, NBL has a chance to
establish its global significance in the next decade.
NBL is
operated in a 3-line structure, where the 1st-line (mostly full-time
engineers) test products, the 2nd-line (a mixture of engineers and
students) develop tools, and the 3rd-line (mostly graduate students)
research techniques. Students are arranged to help engineers in the 1st
and 2nd lines for one year to get familiar with the products, tools,
and development environments, which enables them to identify a research topic
from the development work. Important milestones are listed as follows.
l 2001 ¡X
Pre-NBL: public benchmarking events with an IT magazine (2001~2010: security
gateway, bandwidth manager, Web switch, ISP QoS, e-commerce, WLAN, CDN, IPv6
router, L2/L3 switch, VoIP, IDS, VoWLAN, 10G, Android smartphone, etc.)
l 2002 ¡X
Officially launched
l 2003 ¡X
MOU signed with UNH-IOL
l 2004 ¡X
First Plugfest (interoperability) in Taiwan
l 2007 ¡X
NCTU Beta Site established
l 2009 ¡X
First RealFlow certificate issued, Live SOHO launched
l 2010 ¡X
Live Security launched, PCAP Lib and ILLT released
l 2011 ¡X
ACTS (Automatic Control Test System) first version released, sister lab EBL
(Embedded Benchmarking Lab) launched
l 2012 ¡X
ISO 17025 certified lab, NCC certified lab, NCC security criteria developed
5.
Embedded Benchmarking Lab
(EBL)
Following the
same philosophy and footprint of NBL, EBL digs into handheld devices, including
smartphones and tablets. These devices are client-side devices instead of
networking devices, which means the industry served by EBL would be different
from the one served by NBL. We consolidated a series of test methodologies and
tools into EBL Test Suite v1.0 in the first three years with efforts on benchmarking,
profiling, and optimization. In most cases, benchmarking, profiling, and
optimization treat the devices as black boxes, grey boxes, and white boxes,
respectively.
The overall
objective is to provide methodologies and tools to cover all layers of
smartphones. In particular, for Android systems, this could range from Java apps,
Dalvik virtual machine, runtime library, Linux kernel, down to drivers and
hardware.
6. Computer Networks: An Open Source Approach
Computer Networks undoubtedly is one of the key technologies
of Information Technologies. Many textbooks are available on the shelves which
adopted quite different approaches, from traditional, and sometimes dry,
protocol descriptions to the application-driven top-down approach and the
system-aspect approach. This book, as its title indicated, takes a different
approach from that of previous books, i.e., an open source approach. Besides written with logic
reasoning minds and emphasizing more on why
a protocol is designed that way than how
a protocol works, this book tries to fill the gap between knowledge and skills by tracing the source code such that readers could learn where and how the protocol designs could be implemented. We found this ¡§open
source approach¡¨ quite effective in building readers¡¦ know-how on protocol
implementation, which makes this book very unique.
This book adopts traditional bottom up approach when
introducing the architecture of computer networks. It consists of eight
chapters where chapter 1 covers network concepts and philosophies that even
junior instructors might benefit from reading it, chapter 2 to chapter 6 covers
the TCP/IP reference model. Chapter 7 and chapter 8 cover advanced topics on
Internet QoS and security, respectively. The protocol description text
is interleaved with 56 representative open source implementations, ranging from
the Verilog or VHDL code of codec, modem, CRC32, CSMA/CD, and crypto, to the C
code of adaptor driver, PPP daemon and driver, longest prefix matching, IP/TCP/UDP
checksum, NAT, RIP/OSPF/BGP routing daemons, TCP slow-start and congestion
avoidance, socket, popular packages supporting DNS, FTP, SMTP, POP3, SNMP,
HTTP, SIP, streaming, P2P, to QoS features such as traffic shaper and
scheduler, and security features such as firewall, VPN, and intrusion
detection. In addition, each open source is explained in a systematic way,
including overview, data structures, call flow, algorithm, and code tracing.
Furthermore, each open source is followed by hands-on exercises to equip readers with system-awareness and
hands-on skills.
At the end of each chapter, besides written exercises,
this book also provides hands-on Linux-based exercises which echo its goal
again. It also provides end-of-chapter FAQ to help readers identify key
concepts of each chapter. It also embeds 69 sidebars of Historical Evolution
(33), Principle in Action (26), and Performance Matters (10) to highlight
evolutions, principles, and performance numbers, respectively.
As compared to the most popular textbook on computer
networks written by Kurose and Ross, this book emphasizes less on socket
programming and java programming on applications, and network simulations.
Kurose and Ross¡¦s book also spends more pages on discussing the underlying
rationale on a specific topic, such as reliable transmission, which makes their
book more suitable for undergraduate students. On the other hand, this book
provides wider coverage on current technologies, especially on physical layer,
Internet QoS, security, and wireless technologies, which makes it more suitable
for senior undergraduate and graduate students in Computer Science or
Electrical Engineering. We have maintained a Facebook community for Q&A at
www.facebook.com/CNFBs, which is a plus for both instructors and students.
Here are two quotes from the book reviews: ¡§The exposure to real life
implementation details in this book is phenomenal...Definitely one of the
better books written in the area of Computer Networks.¡¨ ¡§I have never seen a book giving such
details on explaining the design and implementation of such practical
systems...Those open source implementations are excellent demonstrations for
practical networking systems.¡¨
7. Lessons
There are
several lessons accumulated over the past two decades and summarized as
follows.
(1) Development vs. Research
1.1
Build the depth of the research team with the front line on development and the back line on research, which helps
identifying real problems and feasible solutions.
1.2
The best way to tightly couple both lines is to
send researchers to the front line for quite a while before they do research in
the back line.
1.3
Develop first, then research. Research is the
non-trivial parts identified in the process of development.
1.4
The performance numbers on most (>90%) papers
are from analysis or simulation. Very few are from the experiments on real
implementations. The solutions on papers might not be feasible, and their problems might not be real either. There are very few societies in IEEE with a
good balance between development and research, and, unfortunately, the
communications society is not one of
them.
1.5
The industry needs big development (i.e.,
products) and small research (i.e., patents), while the academia needs big
research (i.e., papers) and small development (i.e., prototypes). To
collaborate better, the industry needs to grow its research and the academia
needs to grow its development.
(2) Research Roadmap vs. Random Picks
2.1
Compared to random picks of topics, it is
certainly better to form a research roadmap with a series of works addressing
related problems in the same area, which helps researchers to construct deeper
understanding about domain knowledge and related works.
2.2
However, don¡¦t rule out the possibility of
innovation out of imagination. The off-roadmap
topics could be rewarding too as we often see more clearly what goes wrong than
the existing players when we are newcomers to an issue.
(3)
Conferences
vs. Journals/Magazines
3.1
In US, it is very common to clock research by conference deadlines. However, it is difficult in
Taiwan due to the constraints on travel budget. One could publish a dozen of
journal papers per year but not even three conference papers per year. Thus, in
Taiwan, we are forced to abandon the conference-driven model and embrace the
journal-driven model which does not
have clear clock ticks.
3.2
The review process in journals and magazines has
been shortened compared to last decade, due to the on-line processing. The time-to-publish in journals and
magazines becomes more comparable to conferences. However, in the computer
society and communications society, several top conferences appear to be more
influential than journals and magazines.
(4)
Academic
Services vs. Academic Cooperation
4.1
Academic services through editorial boards, program
committees, or technical committees
might or might not bring academic cooperation. But knowing the rules of the
game certainly helps in planning the publication venues.
4.2
It takes extra effort to build and maintain the
external or international cooperation. But it still pays to do so because it
brings in new or different thoughts and resources.
(5) Other Lessons
5.1
Duplicating others (e.g. UNH/IOL) has no value.
5.2
Real traffic testing is indeed unique.
5.3
A work with high impact on the industry might not
have high impact on the academia, and vice versa.
5.4
A high-impact paper might be rejected in its
early version.
5.5
Many papers in top journals or conferences have
low impact eventually. The review process can screen regarding quality but usually not impact.
References
[1]
Ying-Dar Lin, Chia-Jen Wu, and
Wei-Ming Yin, "PCUP:
Pipelined Cyclic Upstream Protocol over Hybrid Fiber Coax," IEEE
Network, Vol. 11, No. 1, pp.24-34, January/February 1997.
[2]
Ying-Dar Lin, "On IEEE 802.14 Medium
Access Control Protocol," IEEE Communications Surveys, September 1998.
[3]
Ying-Dar Lin, Chen-Yu Huang,
Wei-Ming Yin, "Allocation and
Scheduling Algorithms for IEEE 802.14 and MCNS in Hybrid Fiber Coaxial Networks,"
IEEE Transactions on Broadcasting, Vol.44, No.4, pp. 427-435, December 1998.
[4]
Ying-Dar Lin and Chun-Mo Liu,
"A
Timestamp-Sensitive Scheduling Algorithm for MPEG-II Multiplexers in CATV
Networks," IEEE Transactions on Broadcasting, Vol. 44, No.3,
pp.336-345, September 1998.
[5]
Ying-Dar Lin, Wei-Ming Yin, Chen-Yu
Huang, "An Investigation
on HFC MAC Protocols: Design, Analysis, and Implementation Issues,"
IEEE Communications Surveys, vol.3, no.3, third quarter 2000.
[6]
Wei-Ming Yin and Ying-Dar Lin,
"Statistically
Optimized Minislot Allocation in Hybrid Fiber Coaxial Networks," IEEE
Journal on Selected Areas in Communications, vol. 18, issue 9, pp.1764-1773,
Sept. 2000.
[7]
Yeong-Sung Lin, Wei-Ming Yin,
Ying-Dar Lin, Chih-Hao Lin, "Optimal Ranging
Algorithms for Medium Access Control in Hybrid Fiber Coax Networks,"
IEICE Transactions on Communications, Vol.E85-B, No.10 October 2002.
[8]
Wei-Ming Yin, Chia-Jen Wu, Ying-Dar
Lin, "Two-phase
Minislot Scheduling Algorithm for HFC QoS Services Provisioning,"
IEICE Transactions on Communications, Vol.E85-B, No.3 March 2002.
[9]
Wei-Ming Yin and Ying-Dar Lin,
"Interleaving
Collision Resolution Engines in n-ary Tree Protocols," IEEE
Communications Letters, Vol. 5, No. 12, December 2001.
[10] Ying-Dar
Lin and Yu-Ching Hsu, "Multihop Cellular: A
New Architecture for Wireless Communications," IEEE INFOCOM, Tel Aviv,
Israel, March 2000.
[11] Ying-Dar
Lin, Yu-Ching Hsu, Kuan-Wen Oyang, Dong-Su Yang, Tzu-Chieh Tsai, "Multihop
Wireless IEEE 802.11 LANs: A Prototype Implementation," Journal of
Communications and Networks, vol.2, no.4, Dec. 2000.
[12] Ying-Dar
Lin, Shiao-Li Tsao, Shun-Lee Chang, Shau-Yu Cheng, and Chia-Yu Ku, "Design
Issues and Experimental Studies of Wireless LAN Mesh," IEEE Wireless
Communications, Vol. 17, Issue 2, pp. 32-40, April 2010.
[13] Chia-Yu
Ku, Ying-Dar Lin, Shiao-Li Tsao, Yuan-Cheng Lai, "Utilizing
Multiple Channels with Less Radios in Wireless Mesh Networks," IEEE
Transactions on Vehicular Technology, Vol. 60, Issue 1, pp. 263-275, January
2011.
[14] Ying-Dar
Lin, Shun-Lee Chang, Jui-Hung Yeh, Shau-Yu Cheng, "Indoor
Deployment of IEEE 802.11s Mesh Networks: Lessons and Guidelines," Ad
Hoc Networks, May 2011.
[15] Ying-Dar
Lin, Cheng-Hsien Chang, Yu-Ching Hsu, "Bandwidth Brokers of
Instantaneous and Book-Ahead Requests for Differentiated Services Networks,"
IEICE Transactions on Communications, Vol.E85-B, No.1, January 2002.
[16] Chih-Chiang
Chuang, Yea-Li Sun, Ying-Dar Lin, "Dynamic
Resizing of Utilization Target in Measurement-Based Admission Control,"
Computer Communicatios, Vol. 24, Issues 11-15, pp.1097-1104, June 2001.
[17] Shih-Chiang
Tsao and Ying-Dar Lin, "Pre-order Deficit Round
Robin: A New Scheduling Algorithm for Packet-switched Networks,"
Computer Networks, Vol. 35(2-3), pp. 287-305, 2001.
[18] Huan-Yun
Wei, Ching-Chuan Chiang, and Ying-Dar Lin, "Co-DRR: An Integrated
Uplink and Downlink Scheduler for Bandwidth Management over Wireless LANs,"
IEICE Transactions on Communications, Vol E90-B, No. 12, pp. 2022-2033, August
2007.
[19] Shih-Chiang
Tsao, Yuan-Cheng Lai, Le-Chi Tsao, Ying-Dar Lin, "On
Applying Fair Queuing Discipline to Schedule Requests at Access Gateway for
Downlink Differential QoS," Computer Networks, Sep. 2008.
[20] Ying-Dar
Lin, Ching-Ming Tien, Shih-Chiang Tsao, Shuo-Yen Wen, Yuan-Cheng Lai, "Request
Scheduling for Differentiated Web QoS at Website Gateways," Journal of
Internet Technology, Vol 9, No. 3, Aug 2008.
[21] Ying-Dar
Lin, Ching-Ming Tien, Shih-Chiang Tsao, Ruo-Hua Feng, Yuan-Cheng Lai, "Multi-Resource
Request Scheduling for Differentiated QoS at Website Gateways,"
Computer Communications, Vol. 31, Issue 10, pp. 1993-2004, June 2008.
[22] Yu-Ching
Hsu, Mei-Yen Chiang, Ying-Dar Lin, "Two-Stage Dynamic
Uplink Channel and Slot Assignment for GPRS," IEICE Transactions on
Communications, Vol.E85-A, No.1, January 2003.
[23] Yi-Neng
Lin, Che-Wen Wu, Ying-Dar Lin, Yuan-Cheng Lai, "Highest Urgency First
(HUF): A Latency and Modulation Aware Bandwidth Allocation Algorithm for WiMAX
Base Stations," Computer Communications, Volume 32, Issue 2, Pages
332-342, 12 February 2009.
[24] Ying-Dar
Lin, Yi-Neng Lin, Shun-Chin Yang, Yu-Sheng Lin, "DiffServ Edge Router
over Network Processors: Implementation and Evaluation," IEEE Network,
Special Issue on Network Processors, Vol. 17, Issue 4, pp. 28-34, July-Aug
2003.
[25] Ying-Dar
Lin, Huan-Yun Wei, Kuo-Jui Wu, "Ordered Lookup with
Bypass Matching for Scalable Per-Flow Classification in Layer 4 Routers,"
Computer Communications, Vol. 24, Issues 7-8, pp.667-676, April 2001.
[26] Huan-Yun
Wei and Ying-Dar Lin, "A Survey and
Measurement-Based Comparison of Bandwidth Management Techniques," IEEE
Communications Surveys and Tutorials, Vol.5 No.2, 4th Quarter 2003.
[27] Huan-Yun
Wei, Shih-Chiang Tsao, Ying-Dar Lin, "Assessing and Improving
TCP Rate Shaping Over Edge Gateways," IEEE Transactions on Computers,
Vol. 53, Issue 3, pp. 259-275, March 2004.
[28] Ying-Dar
Lin, Shih-Chiang Tsao, Un-Pio Leong, "On-the-Fly TCP Path
Selection Algorithm in Access Link Load Balancing," Computer
Communications, Vol. 30, Issue 2, pp. 351-357, January 2007.
[29] Kuo-Kun
Tseng, Ying-Dar Lin, Yuan-Cheng Lai, "Perceptual Codec and
Interaction Aware Playout Algorithms and Quality Measurement for VoIP Systems,"
IEEE Transactions on Consumer Electronics, Vol. 50, Issue 1, pp. 297-305, Feb
2004.
[30] Ying-Dar
Lin, Nai-Bin Hsu, Ren-Hung Hwang, "QoS Routing
Granularity in MPLS Networks," IEEE Communications Magazine, June
2002.
[31] Nai-Bin
Hsu, Ying-Dar Lin, Mao-Huang Lee, Tsern-Huei Lee, "Service-Sensitive
Routing in DiffServ/MPLS Networks," IEICE Transactions on Communications,
Vol. E84-B, No. 10, October 2001.
[32] Ying-Dar
Lin, Nai-Bin Hsu, Ren-Hung Hwang, "RP
Relocation Extension to PIM-SM Multicast Routing," IETF
Internet-Draft, draft-ydlin-pim-sm-rp-00.txt, April 2001; also RPIM-SM:
Extending PIM-SM for RP Relocation, Computer Communications, Volume 25, Issue
18-1, December 2002, pp. 1774-1781.
[33] Shih-Chiang
Tsao, Yuan-Cheng Lai, and Ying-Dar Lin, "Taxonomy and Evaluation
of TCP-Friendly Congestion-Control Schemes on Fairness, Aggressiveness, and
Responsiveness," IEEE Network, Vol 21, No. 6, pp. 6-15,
November/December 2007.
[34] Shih-Chiang
Tsao, Yuan-Cheng Lai, Ying-Dar Lin, "A
Fast Converging TCP-Equivalent Window-Averaging Rate Control Scheme,"
2012 International Symposium on Performance Evaluation of Computer and
Telecommunications Systems (SPECTS), July 2012. (with Best Paper Award)
[35] Po-Ching
Lin, Zhi-Xiang Li, Ying-Dar Lin, Yuan-Cheng Lai, "Profiling and
Accelerating String Matching Algorithms in Three Network Content Security
Applications ," IEEE Communications Surveys and Tutorials, 2nd
quarter, 2006.
[36] Ying-Dar
Lin, Huan-Yun Wei, Shao-Tang Yu, "Building an Integrated
Security Gateway: Mechanisms, Performance Evaluation, Implementation, and
Research Issues," IEEE Communication Surveys and Tutorials, Vol.4,
No.1, third quarter, 2002.
[37] Ying-Dar
Lin, Chih-Wei Jan, Po-Ching Lin, Yuan-Cheng Lai, "Designing an Integrated
Architecture for Network Content Security Gateways," IEEE Computer,
Vol. 39, Issue 11, pp. 66-72, November 2006.
[38] Ying-Dar
Lin, Po-Ching Lin, Meng-Fu Tasi, Tsao-Jiang Chang and Yuan-Cheng Lai, "kP2PADM: An In-kernel
Architecture of P2P Management Gateway," IEICE Transactions
Information and Systems, vol.E91-D, No.10, Oct. 2008.
[39] Ying-Dar
Lin, Szu-Hao Chen, Po-Ching Lin and Yuang-Chen Lai, "A Stream-based Mail
Proxy with Interleaved Decompression and Virus Scanning," Journal of
Systems and Software, vol. 81, issue. 9, pp. 1517-1524, Sep. 2008.
[40] Ying-Dar
Lin, Chia-Yu Ku, Yuan-Cheng Lai, Chia-Fon Hung, "In-kernel
Relay for Scalable One-to-Many Streaming," IEEE Multimedia, Volume 20,
Issue 1, pp. 69-79, January-March 2013.
[41] Po-Ching
Lin, Ying-Dar Lin, Yuan-Cheng Lai and Tsern-Huei Lee, "Using String
Matching for Deep Packet Inspection," IEEE Computer, Vol. 41, Issue 4,
pp. 23-28, Apr. 2008.
[42] Po-Ching
Lin, Ying-Dar Lin, Yuan-Cheng Lai, Tsern-Huei Lee, "A
Hybrid Algorithm of Backward Hashing and Automaton Tracking for Virus Scanning,"
IEEE Transactions on Computers, Vol. 60, No. 4, pp. 594-601, April 2011.
[43] Po-Ching
Lin, Ming-Dao Liu, Ying-Dar Lin, Yuan-Cheng Lai, "Accelerating Web Content
Filtering by the Early Decision Algorithm," IEICE Trans. Information
and Systems, vol. E91-D, no. 2, Feb. 2008, pp. 251-257.
[44] Yi-Neng
Lin, Ying-Dar Lin, Yuan-Cheng Lai, "Modeling and Analysis of
Core-centric Network Processors," ACM Transactions on Embedded
Computing Systems, Vol. 7, No. 4, Article 41, July 2008.
[45] Yi-Neng
Lin, Yao-Chung Chang, Ying-Dar Lin, and Yuan-Cheng Lai, "Resource Allocation
in Network Processors for Memory Access Intensive Applications,"
Journal of Systems and Software, Vol. 80, Issue 7, July 2007.
[46] Yi-Neng
Lin, Ying-Dar Lin, and Yuan-Cheng Lai, "Thread
Allocation in CMP-based Multithreaded Network Processors," Parallel
Computing, vol. 36, issues 2-3, pp. 104-116, Feb./March 2010.
[47] Yi-Neng
Lin, Chiuan-Hung Lin, Ying-Dar Lin, Yuan-Cheng Lai, "VPN Gateways
over Network Processors: Implementation and Evaluation," Journal of
Internet Technology, Vol. 11, No. 4, July 2010.
[48] Po-Ching
Lin, Ying-Dar Lin, Yi-Jun Zheng, Yuan-Cheng Lai and Tsern-Huei Lee, "Realizing
a Sub-linear Time String-Matching Algorithm with a Hardware Accelerator Using
Bloom Filters," IEEE Transactions on VLSI Systems, Vol. 17, No. 8, pp.
1008-1020, August 2009.
[49] Kuo-Kun
Tseng, Ying-Dar Lin, Tsern-Huei Lee, Yuan-Cheng Lai, "Deterministic
High-Speed Root-Hashing Automaton Matching Coprocessor for Embedded Network
Processor," ACM Computer Architecture News, Vol. 35, Issue 3, pp.
36-43, June 2007.
[50] Kuo-Kun
Tseng, Yuan-Cheng Lai, Ying-Dar Lin, Tsern-Huei Lee, "A Fast Scalable
Automaton Matching Accelerator for Embedded Content Processors," ACM
Transactions on Embedded Computing Systems, Vol. 8, No. 3, Article 19, April
2009.
[51] Ying-Dar
Lin, Kuo-Kun Tseng, Tseng-Huei Lee, Chen-Chou Hung, and Yuan-Cheng Lai, "A Platform-Based SoC
Design and Implementation of Scalable Automaton Matching for Deep Packet
Inspection," Journal of System Architecture, Vol 53, Issue 12, pp.
937-950, December 2007.
[52] Ming-Wei
Wu and Ying-Dar Lin, "Open Source Software
Development: An Overview," IEEE Computer, pp.33-38, June 2001.
[53] Chi-Heng
Chou, Tsung-Hsien Yang, Shih-Chiang Tsao, and Ying-Dar Lin, "Standard
Operating Procedures for Embedded Linux Systems," Linux Journal, Issue
160, pp. 88-92, Aug 2007.
[54] Ying-Dar
Lin, I-Wei Chen, Po-Ching Lin, Chang-Sheng Chen, Chun-Hung Hsu, "On
Campus Beta Site: Architecture Designs, Operational Experience, and Top Product
Defects," IEEE Communications Magazine, Vol. 48, Issue 12, December
2010.
[55] Ying-Dar Lin, Chien-Chao
Tseng, Cheng-Yuan Ho, and Yu-Hsien Wu, "How NAT-Compatible are VoIP Applications?,"
IEEE Communications Magazine, Vol. 48, Issue 12, pp. 58-65, December 2010.
[56]
Cheng-Yuan Ho, Fu-Yu Wang, Chien-Chao Tseng, Ying-Dar Lin,
"NAT-Compatibility
Testbed: An Environment to Automatically Verify Direct Connection Rate,"
IEEE Communications Letters, Vol. 15, Issue 1, pp. 4-6, January 2011.
[57]
Cheng-Yuan Ho, Chien-Chao Tseng, Fu-Yu Wang, Jui-Tang Wang, and
Ying-Dar Lin, "To
Call or to Be Called behind NATs Is Sensitive in Solving the Direct Connection
Problem," IEEE Communications Letters, Vol. 15, Issue 1, pp. 94-96,
January 2011.
[58]
Ying-Dar Lin, Ren-Hung Hwang, Raghavendra Kulkarni, Shiau-Huey
Wang, Chinyang Henry Tseng, Chun-Hung Hsu, "On Campus IPv6 Beta Site:
Requirements, Solutions, and Product Defect Evaluation," Journal of
Internet Technology, to appear.
[59]
Ying-Dar Lin, Po-Ching Lin, Tsung-Huan Cheng, I-Wei Chen,
Yuan-Cheng Lai, "Low-Storage
Capture and Loss-Recovery Selective Replay of Real Flows," IEEE
Communications Magazine, Volume 50, Issue 4, pp. 114-121, April 2012.
[60]
Chia-Yu Ku, Ying-Dar Lin, Yuan-Cheng Lai, Pei-Hsuan Li, Kate
Ching-Ju Lin, "Real
Traffic Replay over WLAN with Environment Emulation," IEEE Wireeless
Communications and Networking Conference (WCNC 2012), Paris, France, April
2012.
[61] Chun-Ying
Huang, Ying-Dar Lin, Peng-Yu Liao, and Yuan-Cheng Lai, "Stateful Traffic
Replay for Web Application Proxies," Security and Communication Networks,
to appear.
[62] Ying-Dar
Lin, Po-Ching Lin, Yu-An Lin, Yuan-Cheng Lai, "On-The-Fly
Capture and Replay Mechanisms for Multi-port Network Devices in Operational
Networks," IEEE Transactions on Network and Service Management, Vol.
11, No. 2, June 2014.
[63] Ying-Dar
Lin, Chi-Heng Chou, Yuan-Cheng Lai, Tze-Yau Huang, Simon Chung, Jui-Tsun Hung,
Frank C. Lin, "Test
Coverage Optimization for Large Code Problems," Journal of Systems and
Software, Volume 85, Issue 1, pp. 16-27, January 2012.
[64] Ying-Dar Lin,
Po-Ching Lin, Sheng-Hao Wang, I-Wei Chen, Yuan-Cheng Lai, "PCAPLib: A
System of Extracting, Classifying, and Anonymizing Real Packet Traces,"
IEEE Systems Journal, to appear.
[65] Ying-Dar
Lin, Chun-Nan Lu, Yuan-Cheng Lai, Zongo Pawendtaore Eliezer, "Bug Traces:
Identifying and Downsizing Packet Traces with Failures Triggered in Networking
Devices," IEEE Communications Magazine, Volume 52, Issue 4, pp.
112-119, April 2014.
[66] Ying-Dar
Lin, Fan-Cheng Wu, Tze-Yau Huang, Yuan-Cheng Lai, Frank C. Lin, "Embedded
TaintTracker: Lightweight Run-time Tracking of Taint Data Against Buffer
Overflow Attacks," IEICE Transactions on Information and Systems, Vol.
E94.D, No. 11, pp.2129-2138, 2011.
[67] Tsung-Huan
Cheng, Ying-Dar Lin, Yuan-Cheng Lai, Po-Ching Lin, "Evasion
Techniques: Sneaking through Your Intrusion Detection/Prevention Systems,"
IEEE Communications Surveys and Tutorials, Volume 13, Issue 4, 2012.
[68]
I-Wei Chen, Po-Ching Lin, Tsung-Huan Cheng, Chi-Chung Luo,
Ying-Dar Lin, Yuan-Cheng Lai, Frank C. Lin, "Extracting
Ambiguous Sessions from Real Traffic with Intrusion Prevention Systems,"
International Journal of Network Security, Vol.14, No.5, pp. 243-250, September
2012.
[69]
Cheng-Yuan Ho, Ying-Dar Lin, Yuan-Cheng Lai, I-Wei Chen, Fu-Yu
Wang and Wei-Hsuan Tai, "False
Positives and Negatives from Real Traffic with Intrusion Detection/Prevention
Systems," International Journal of Future Computer and Communication,
Vol.1, No.2, August 2012.
[70]
Ying-Dar Lin, Yuan-Cheng Lai, Cheng-Yuan Ho, Wei-Hsuan Tai,
"Creditability-based
Weighted Voting for Reducing False Positives and Negatives in Intrusion
Detection," Computers & Security, October 2013.
[71]
Ying-Dar Lin, Tzung-Bi Shih, Yu-Sung Wu, Yuan-Cheng Lai, "Secure
and Transparent Network Traffic Replay, Redirect, Relay in a Dynamic Malware
Analysis Environment," Security and Communication Networks, March 2014.
[72]
Ying-Dar Lin, Chia-Yin Lee, Yu-Sung Wu, Pei-Hsiu Ho, Fu-Yu Wang,
Yi-Lang Tsai, "Active
versus Passive Malware Collection," IEEE Computer, April 2014.
[73] Ying-Dar Lin, Yi-Ta Chiang,
Yu-Sung Wu, Yuan-Cheng Lai, "Automatic Analysis
and Classification of Obfuscated Bot Binaries," International Journal
of Network Security, Vol. 16, No. 6, pp. 506-515, November 2014.
[74]
Kuochen Wang, Chun-Ying Huang, Li-Yang Tsai, Ying-Dar Lin,
"Behavior-based Botnet Detection in Parallel," Security and
Communication Networks, to appear.
[75]
Ying-Dar Lin, Chia-Yin Lee, Hao-Chuan Tsai, "Redefining
Security Criteria for Networking Devices with Case Studies," IEEE
Security & Privacy, January-February 2014.
[76]
Ying-Dar Lin, Cheng-Yuan Ho, Yuan-Cheng Lai, Tzu-Hsiung Du,
Shun-Lee Chang, "Booting,
Browsing and Streaming Time Profiling, and Bottleneck Analysis on Android-Based
Systems," Journal of Network and Computer Applications (JNCA), March
2013.
[77]
Ying-Dar Lin, Kuei-Chung Chang, Yuan-Cheng Lai, Yu-Sheng Lai,
"Reconfigurable
Multi-Resolution Performance Profiling in Android Applications," IEICE
Transactions on Information and Systems, Vol.E96-D, No.9, pp.2039-2046,
September 2013.
[78] Ying-Dar Lin, Edward T.-H.
Chu, Yuan-Cheng Lai, and Ting-Jun Huang, "Time-and-Energy
Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds,"
IEEE Systems Journal, November 2013.
[79]
Ying-Dar Lin, Yuan-Cheng Lai, Chien-Hung Chen, and Hao-Chuan
Tsai, "Identifying
Android Malicious Repackaged Applications by Thread-grained System Call
Sequences," Computers & Security, August 2013.
[80]
Ying-Dar Lin, Edward T.-H. Chu, Shang-Che Yu, Yuan-Cheng Lai,
"Improving
Accuracy of Automated GUI Testing for Embedded Systems," IEEE
Software, issue 99, January/February 2014.
[81]
Ying-Dar Lin, Jose F. Rojas, Edward T.-H. Chu, and Yuan-Cheng
Lai, "On the Accuracy, Efficiency, and Reusability of Automated Test
Oracles for Android Devices," IEEE Transactions on Software Engineering,
to appear.
[82]
Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, "Computer Networks: An Open Source Approach,"
McGraw-Hill, February 2012.
Biography
Ying-Dar Lin
is Distinguished Professor of Computer Science at National Chiao Tung
University (NCTU) in Taiwan. He received his Ph.D. in Computer Science from
UCLA in 1993. He served as the CEO of Telecom Technology Center during
2010-2011 and a visiting scholar at Cisco Systems in San Jose during 2007¡V2008.
Since 2002, he has been the founder and director of Network Benchmarking Lab
(NBL, www.nbl.org.tw), which reviews network products with real traffic. He
also cofounded L7 Networks Inc. in 2002, which was later acquired by D-Link
Corp. In May 2011, he founded Embedded Benchmarking Lab (www.ebl.org.tw) to
extend into the review of handheld devices. His research interests include
design, analysis, implementation, and benchmarking of network protocols and
algorithms, quality of services, network security, deep packet inspection, P2P
networking, and embedded hardware/software co-design. He recently stepped into
software defined networking (SDN) and was appointed as a Research Associate from
June 2014 by Open Networking Foundation (ONF). His work on ¡§multi-hop cellular¡¨
was the first along this line, and has been cited over 600 times and
standardized into WLAN mesh (IEEE 802.11s), WiMAX (IEEE 802.16j), Bluetooth
(IEEE 802.15.5), and 3GPP LTE-Advanced. He was elevated to IEEE Fellow in 2013
for his contributions to multi-hop cellular communications and deep packet
inspection. He is also an IEEE Distinguished Lecturer for 2014 & 2015, and currently
on the editorial boards of IEEE Transactions on Computers, IEEE Computer, IEEE
Network, IEEE Communications Magazine - Network Testing Series, IEEE Wireless
Communications, IEEE Communications Surveys and Tutorials, IEEE Communications
Letters, Computer Communications, Computer Networks, and IEICE Transactions on
Information and Systems; and the lead guest editor of several special issues of
IEEE journals and magazines. He published a textbook "Computer Networks:
An Open Source Approach" (www.mhhe.com/lin), with Ren-Hung Hwang and Fred
Baker (McGraw-Hill, 2011).