According to wikipedia[1], blackholes in networking refer to places in the network where incoming traffic is silently discarded or dropped without informing the source that the data did not reached its intended recipient.
References:
[1]. http://en.wikipedia.org/wiki/Black_hole_%28networking%29
[2]. http://research.microsoft.com/netres/publications/infocom07-score.pdf
Detection and localization of network black holes was the main concern of this research. The main purpose also for doing such research is that there is a need for providing a new algorithm for detection and localization of network blackholes. The paper discussed the importance of creating such algorithm and how they have done it. The paper also included the experimentation and evaluation of the algorithm. This research is very interesting since network blackholes are very difficult to detect and to localized in a network since we are only dealing with signals and bits. It is very challenging to study such type of application.
When it comes to relevance, this paper is very relevant since this type of network problem is inevitable when transmitting data packets through a medium. There is a tendency that data packets silently drops w/out informing the sender that the connection was unsuccessful. Detection at the same time localization of this blackhole is very intelligent idea to solve the problem by providing algorithms for sending alarms if such scenario occurs. But take note of the title of the research, it focuses only on the detection and localization, not on recovery. It leaves as a challenge to other researchers and other technical reader that will read the paper to continue the development of an algorithm not only detect and localize but also allows the automatic recovery from network blackholes. When it comes to the presentation, the researchers explained the topic very well and provided information such as the experimentation. But one problem of the paper is that there are many technical terms and acronyms w/c is very difficult to understand specially for readers who are not familiar with the context of the research.
References:
[1]. http://en.wikipedia.org/wiki/Black_hole_%28networking%29
[2]. http://research.microsoft.com/netres/publications/infocom07-score.pdf
"Security"
ReplyDeleteAccording to what i saw in the net,"there is no such thing as secured". But if there's something that can be dine, well, that a very good thing.
tama?