2024
Cordero, Juan Antonio
AIvolution, Assessing the Potential and Impact of AI and Digital Technologies in the EU Proceedings Article Forthcoming
In: Proc. of the IEEE International Symposium on Technology and Society (ISTAS 2024) , IEEE, Forthcoming.
Abstract | BibTeX | Tags: Scientific dissemination
@inproceedings{nokey,
title = {AIvolution, Assessing the Potential and Impact of AI and Digital Technologies in the EU},
author = {Juan Antonio Cordero},
year = {2024},
date = {2024-09-18},
urldate = {2024-09-18},
booktitle = {Proc. of the IEEE International Symposium on Technology and Society (ISTAS 2024) },
publisher = {IEEE},
abstract = {As automation and digitalisation become more pervasive, understanding their social implications, opportunities and risks, as well as appropriate policies and regulatory needs, require increasing inter-disciplinary efforts.
This paper describes the motivation, format and outcomes of the AIvolution event about AI and digital technologies, organized in the European Parliament (EP) on November 2023, for that purpose.
It presents the main topics addressed, the key contributions that were presented, the discussions that took place, and the main takeaways, as well as the perspectives to continue these exchanges in further initiatives.},
keywords = {Scientific dissemination},
pubstate = {forthcoming},
tppubtype = {inproceedings}
}
This paper describes the motivation, format and outcomes of the AIvolution event about AI and digital technologies, organized in the European Parliament (EP) on November 2023, for that purpose.
It presents the main topics addressed, the key contributions that were presented, the discussions that took place, and the main takeaways, as well as the perspectives to continue these exchanges in further initiatives.
2023
Cordero, Juan Antonio
On the Dynamics of Single-Orbit Requester-Provider Systems Proceedings Article
In: ACM, (Ed.): Proc. 26th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'2023), ACM, 2023.
Abstract | Links | BibTeX | Tags: Autoconfiguration, Constrained Networks, DynSys, Infrastructure for Big Data, IoT, Modeling
@inproceedings{nokey,
title = {On the Dynamics of Single-Orbit Requester-Provider Systems},
author = {Juan Antonio Cordero},
editor = {ACM},
url = {https://dl.acm.org/doi/10.1145/3616388.3617517},
doi = {10.1145/3616388.3617517},
year = {2023},
date = {2023-10-30},
urldate = {2023-10-30},
booktitle = {Proc. 26th ACM International Conference on Modeling, Analysis
and Simulation of Wireless and Mobile Systems (MSWiM'2023)},
publisher = {ACM},
abstract = {This paper considers decentralized systems of multiple agents that interact in order to perform distributed computing or efficient information transfer in variant, constrained environments. These systems appear in various relevant use cases, including reliable multicast distribution, or dynamic resource allocation in systems in the Internet edge (datacenters, IOT deployments). This paper introduces an abstract, mathematical model, that allows to study analytically the behavior of these systems, as a set of interacting requesters and providers. The paper describes system orbits, and concentrates on the study of single-orbit systems. Ergodicity of system behavior in the single-orbit case is proved, and a full description of the stationary system behavior is derived. Closed expressions of the stationary distribution of requester decisions are provided. Analytical results are validated through extensive simulations. These single-orbit results are a necessary step for the analysis and further optimization of dynamic performance of these systems.},
keywords = {Autoconfiguration, Constrained Networks, DynSys, Infrastructure for Big Data, IoT, Modeling},
pubstate = {published},
tppubtype = {inproceedings}
}
Poirrier, Alexandre; Cailleux, Laurent; Clausen, Thomas Heide
An Interoperable Zero Trust Federated Architecture for Tactical Systems
2023.
@{Poirrier2023,
title = {An Interoperable Zero Trust Federated Architecture for Tactical Systems},
author = {Alexandre Poirrier and Laurent Cailleux and Thomas Heide Clausen},
doi = {10.1109/milcom58377.2023.10356247},
year = {2023},
date = {2023-10-30},
publisher = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {}
}
Morales, Jesús A. Cumana; Coupechoux, Marceau; Cordero, Juan Antonio
Metasurface for Enhanced Millimeter-Wave Communications under Imperfect Beam Alignment Proceedings Article Forthcoming
In: Proc. IEEE International Mediterranean Conference on Communications and Networking (MeditCom'2023), IEEE, Forthcoming.
Abstract | BibTeX | Tags: Performance, Performance Evaluation, Wireless
@inproceedings{nokey,
title = {Metasurface for Enhanced Millimeter-Wave Communications under Imperfect Beam Alignment},
author = {Jesús A. Cumana Morales and Marceau Coupechoux and Juan Antonio Cordero},
year = {2023},
date = {2023-09-04},
urldate = {2023-09-04},
booktitle = {Proc. IEEE International Mediterranean Conference on Communications and Networking (MeditCom'2023)},
publisher = {IEEE},
abstract = {In this work, we investigate the impact of beam misalignment in the performance of a wireless system employing a metasurface to improve coverage in a non-line-of-sight (NLOS) scenario. The metasurface is modeled by an array of small radiating elements each of them terminated with a complex load. An equivalent Array Factor is defined, which allows visualizing the beamsteering properties of the metasurface in far-field conditions. Angular misalignment is modeled using a truncated Gaussian distribution and an expression to evaluate signal-to-noise ratio (SNR) in the presence of misalignment is derived. Numerical results show an SNR degradation close to 8 dB for 5° error magnitude and up to 14 dB if high-gain unit cells are used. Three mechanisms are explored, which can be used to reduce SNR degradation: increasing Metasurface dimensions allows recovering SNR by 7.4 dB, low unit cell gain allows improving SNR by close to 10.5 dB when compared to a high-gain cell and base station beamwidth decrease from 25.6° to 12.7° allows recovering SNR by 4 dB thanks to the higher BS beam gain. },
keywords = {Performance, Performance Evaluation, Wireless},
pubstate = {forthcoming},
tppubtype = {inproceedings}
}
Feltin, Thomas; Cordero, Juan Antonio; Clausen, Thomas Heide; Brockners, Frank
Understanding Semantics in Feature Selection for Fault Diagnosis in Network Telemetry Data Proceedings Article
In: IEEE, (Ed.): Proc. IEEE/IFIP Network Operations and Management Symposium 2023, IEEE, 2023.
Abstract | Links | BibTeX | Tags:
@inproceedings{nokey,
title = {Understanding Semantics in Feature Selection for Fault Diagnosis in Network Telemetry Data},
author = {Thomas Feltin and Juan Antonio Cordero and Thomas Heide Clausen and Frank Brockners},
editor = {IEEE},
url = {https://www.epizeuxis.net/wp-content/uploads/2023/06/2023009866.pdf},
year = {2023},
date = {2023-05-08},
urldate = {2023-05-08},
booktitle = {Proc. IEEE/IFIP Network Operations and Management Symposium 2023},
publisher = {IEEE},
abstract = {Expert systems for fault diagnosis are computationally expensive to build and maintain, and lack scalability and inherent adaptability to unknown events or modifications in the topology of the monitored system. While data-driven feature se- lection mechanisms can facilitate diagnosis without the hardship of developing and maintaining expert systems, purely data-driven mechanisms lack understanding of semantic importance within a feature set, and would benefit from additional domain knowledge. Part of this additional knowledge can be extracted from meta-data. The proposed approach combines data-driven metrics and semantic information contained in the feature names to produce selections of features which best represent an underlying event. This study extends a cross entropy based optimization method to join semantic importance with data behavior. A benchmarking architecture is introduced to evaluate the benefits of semantic analysis, and demonstrate the performance and robustness of semantic feature selection on different types of faults in network telemetry datasets, modeled with the YANG data modeling language. The results illustrate the interest of such a complementary meta-data analysis for data-driven fault diagnosis, and highlight the robustness of the studied approach against variations in the input feature set.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Cordero, Juan Antonio
Adaptive Content Distribution in Smart Grid Communication Networks Presentation
Emerging optimization methods: from metaheuristics to quantum approaches, 21th EU/ME Meeting, Troyes, France, 17.04.2023.
Links | BibTeX | Tags: Autoconfiguration, Constrained Networks, Machine Learning, Smart Grid
@misc{nokey,
title = {Adaptive Content Distribution in Smart Grid Communication Networks},
author = {Juan Antonio Cordero},
url = {https://perso.isima.fr/~lacomme/GT2L/EUME_JE/EUME_Joint_Event.php},
year = {2023},
date = {2023-04-17},
urldate = {2023-04-17},
journal = {Emerging optimization methods: from metaheuristics to quantum approaches},
howpublished = {Emerging optimization methods: from metaheuristics to quantum approaches, 21th EU/ME Meeting, Troyes, France},
keywords = {Autoconfiguration, Constrained Networks, Machine Learning, Smart Grid},
pubstate = {published},
tppubtype = {presentation}
}
Feltin, Thomas; Marché, Léo; Cordero, Juan Antonio; Brockners, Frank; Clausen, Thomas
DNN Partitioning for Inference Throughput Acceleration at the Edge Journal Article
In: IEEE Access, 2023, ISSN: 2169-3536.
Abstract | Links | BibTeX | Tags: Chaire Cisco, Constrained Networks, Optimisation
@article{nokey,
title = {DNN Partitioning for Inference Throughput Acceleration at the Edge},
author = {Thomas Feltin and Léo Marché and Juan Antonio Cordero and Frank Brockners and Thomas Clausen},
editor = {IEEE},
url = {https://ieeexplore.ieee.org/document/10042405},
doi = {10.1109/ACCESS.2023.3244497},
issn = {2169-3536},
year = {2023},
date = {2023-02-13},
journal = {IEEE Access},
abstract = {Deep neural network (DNN) inference on streaming data requires computing resources to satisfy inference throughput requirements. However, latency and privacy sensitive deep learning applications cannot afford to offload computation to remote clouds because of the implied transmission cost and lack of trust in third-party cloud providers. Among solutions to increase performance while keeping computation on a constrained environment, hardware acceleration can be onerous, and model optimization requires extensive design efforts while hindering accuracy. DNN partitioning is a third complementary approach, and consists of distributing the inference workload over several available edge devices, taking into account the edge network properties and the DNN structure, with the objective of maximizing the inference throughput (number of inferences per second). This paper introduces a method to predict inference and transmission latencies for multi-threaded distributed DNN deployments, and defines an optimization process to maximize the inference throughput. A branch and bound solver is then presented and analyzed to quantify the achieved performance and complexity. This analysis has led to the definition of the acceleration region, which describes deterministic conditions on the DNN and network properties under which DNN partitioning is beneficial. Finally, experimental results confirm the simulations and show inference throughput improvements in sample edge deployments.},
keywords = {Chaire Cisco, Constrained Networks, Optimisation},
pubstate = {published},
tppubtype = {article}
}
2022
Yao, Zhiyuan; Desmouceaux, Yoann; Cordero, Juan Antonio; Townsley, Mark; Clausen, Thomas Heide
Aquarius-Enable Fast, Scalable, Data-Driven Service Management in the Cloud Journal Article
In: IEEE Transactions on Network and Service Management, 2022, ISSN: 1932-4537.
Abstract | Links | BibTeX | Tags: Chaire Cisco, Infrastructure for Big Data, Machine Learning, Network Monitoring
@article{nokeyi,
title = {Aquarius-Enable Fast, Scalable, Data-Driven Service Management in the Cloud},
author = {Zhiyuan Yao and Yoann Desmouceaux and Juan Antonio Cordero and Mark Townsley and Thomas Heide Clausen},
url = {https://ieeexplore.ieee.org/abstract/document/9852806},
doi = {10.1109/TNSM.2022.3197130},
issn = {1932-4537},
year = {2022},
date = {2022-12-01},
urldate = {2022-12-01},
journal = {IEEE Transactions on Network and Service Management},
abstract = {In order to dynamically manage and update networking policies in cloud data centers, Virtual Network Functions (VNFs) use, and therefore actively collect, networking state information -and in the process, incur additional control signaling and management overhead, especially in larger data centers. In the meantime, VNFs in production prefer distributed and straightforward heuristics over advanced learning algorithms to avoid intractable additional processing latency under high-performance and low-latency networking constraints. This paper identifies the challenges of deploying learning algorithms in the context of cloud data centers, and proposes Aquarius to bridge the application of machine learning (ML) techniques on distributed systems and service management. Aquarius passively yet efficiently gathers reliable observations, and enables the use of ML techniques to collect, infer, and supply accurate networking state information -without incurring additional signaling and management overhead. It offers fine-grained and programmable visibility to distributed VNFs, and enables both open-and close-loop control over networking systems. This paper illustrates the use of Aquarius with a traffic classifier, an auto-scaling system, and a load balancer -and demonstrates the use of three different ML paradigms -unsupervised, supervised, and reinforcement learning, within Aquarius, for network state inference and service management. Testbed evaluations show that Aquarius suitably improves network state visibility and brings notable performance gains for various scenarios with low overhead.},
keywords = {Chaire Cisco, Infrastructure for Big Data, Machine Learning, Network Monitoring},
pubstate = {published},
tppubtype = {article}
}
Yao, Zhiyuan; Ding, Zihan
Learning Distributed and Fair Policies for Network Load Balancing as Markov Potentia Game Proceedings Article
In: 36th Conference on Neural Information Processing Systems (NeurIPS 2022), 2022.
Abstract | Links | BibTeX | Tags: Chaire Cisco, Infrastructure for Big Data, load balancing, Machine Learning
@inproceedings{nokeyj,
title = {Learning Distributed and Fair Policies for Network Load Balancing as Markov Potentia Game},
author = {Zhiyuan Yao and Zihan Ding},
url = {https://arxiv.org/pdf/2206.01451},
year = {2022},
date = {2022-11-28},
urldate = {2022-11-28},
booktitle = {36th Conference on Neural Information Processing Systems (NeurIPS 2022)},
abstract = {This paper investigates the network load balancing problem in data centers (DCs) where multiple load balancers (LBs) are deployed, using the multi-agent reinforcement learning (MARL) framework. The challenges of this problem consist of the heterogeneous processing architecture and dynamic environments, as well as limited and partial observability of each LB agent in distributed networking systems, which can largely degrade the performance of in-production load balancing algorithms in real-world setups. Centralised-training-decentralised-execution (CTDE) RL scheme has been proposed to improve MARL performance, yet it incurs -- especially in distributed networking systems, which prefer distributed and plug-and-play design scheme -- additional communication and management overhead among agents. We formulate the multi-agent load balancing problem as a Markov potential game, with a carefully and properly designed workload distribution fairness as the potential function. A fully distributed MARL algorithm is proposed to approximate the Nash equilibrium of the game. Experimental evaluations involve both an event-driven simulator and real-world system, where the proposed MARL load balancing algorithm shows close-to-optimal performance in simulations, and superior results over in-production LBs in the real-world system.},
keywords = {Chaire Cisco, Infrastructure for Big Data, load balancing, Machine Learning},
pubstate = {published},
tppubtype = {inproceedings}
}
Yao, Zhiyuan; Desmouceaux, Yoann; Cordero, Juan Antonio; Townsley, Mark; Clausen, Thomas Heide
Efficient Data-Driven Network Functions Proceedings Article
In: 30th International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2022), 2022.
Abstract | Links | BibTeX | Tags: Chaire Cisco, Infrastructure for Big Data, Machine Learning, Network Management
@inproceedings{nokeyg,
title = {Efficient Data-Driven Network Functions},
author = {Zhiyuan Yao and Yoann Desmouceaux and Juan Antonio Cordero and Mark Townsley and Thomas Heide Clausen},
url = {https://arxiv.org/pdf/2208.11385},
year = {2022},
date = {2022-10-18},
urldate = {2022-10-18},
booktitle = {30th International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2022)},
abstract = {Cloud environments require dynamic and adaptive networking policies. It is preferred to use heuristics over advanced learning algorithms in Virtual Network Functions (VNFs) in production becuase of high-performance constraints. This paper proposes Aquarius to passively yet efficiently gather observations and enable the use of machine learning to collect, infer, and supply accurate networking state information-without incurring additional signalling and management overhead. This paper illustrates the use of Aquarius with a traffic classifier, an autoscaling system, and a load balancer-and demonstrates the use of three different machine learning paradigms-unsupervised, supervised, and reinforcement learning, within Aquarius, for inferring network state. Testbed evaluations show that Aquarius increases network state visibility and brings notable performance gains with low overhead.},
keywords = {Chaire Cisco, Infrastructure for Big Data, Machine Learning, Network Management},
pubstate = {published},
tppubtype = {inproceedings}
}
Yao, Zhiyuan; Ding, Zihan; Clausen, Thomas Heide
Multi-agent reinforcement learning for network load balancing in data center Proceedings Article
In: 31st ACM International Conference on Information and Knowledge Management (CIKM'22), 2022.
Abstract | Links | BibTeX | Tags: Chaire Cisco, Infrastructure for Big Data, load balancing
@inproceedings{nokeyh,
title = {Multi-agent reinforcement learning for network load balancing in data center},
author = {Zhiyuan Yao and Zihan Ding and Thomas Heide Clausen},
url = {https://www.researchgate.net/profile/Zhiyuan_Yao13/publication/358163217_Multi-Agent_Reinforcement_Learning_for_Network_Load_Balancing_in_Data_Center/links/62fe5fd3e3c7de4c34666311/Multi-Agent-Reinforcement-Learning-for-Network-Load-Balancing-in-Data-Center.pdf},
doi = {10.1145/3511808.3557133},
year = {2022},
date = {2022-10-17},
urldate = {2022-10-17},
booktitle = {31st ACM International Conference on Information and Knowledge Management (CIKM'22)},
abstract = {This paper presents the network load balancing problem, a challenging real-world task for multi-agent reinforcement learning (MARL) methods. Conventional heuristic solutions like Weighted-Cost Multi-Path (WCMP) and Local Shortest Queue (LSQ) are less flexible to the changing workload distributions and arrival rates, with a poor balance among multiple load balancers. The cooperative network load balancing task is formulated as a Dec-POMDP problem, which naturally induces the MARL methods. To bridge the reality gap for applying learning-based methods, all models are directly trained and evaluated on a real-world system from moderate- to large-scale setups. Experimental evaluations show that the independent and “selfish” load balancing strategies are not necessarily the globally optimal ones, while the proposed MARL solution has a superior performance over different realistic settings. Additionally, the potential difficulties of the application and deployment of MARL methods for network load balancing are analysed, which helps draw the attention of the learning and network communities to such challenges.},
keywords = {Chaire Cisco, Infrastructure for Big Data, load balancing},
pubstate = {published},
tppubtype = {inproceedings}
}
Dowling, Benjamin; Günther, Felix; Poirrier, Alexandre
Continuous Authentication in Secure Messaging Proceedings Article
In: Atluri, Vijayalakshmi; Pietro, Roberto Di; Jensen, Christian D.; Meng, Weizhi (Ed.): Lecture Notes in Computer Science, pp. 361–381, Springer Nature Switzerland, Cham, 2022, ISBN: 978-3-031-17146-8.
Abstract | Links | BibTeX | Tags: Protocols, Signal
@inproceedings{dowling2022continuous,
title = {Continuous Authentication in Secure Messaging},
author = {Benjamin Dowling and Felix Günther and Alexandre Poirrier},
editor = {Vijayalakshmi Atluri
and Roberto Di Pietro
and Christian D. Jensen
and Weizhi Meng},
url = {https://link.springer.com/chapter/10.1007/978-3-031-17146-8_18},
doi = {10.1007/978-3-031-17146-8_18},
isbn = {978-3-031-17146-8},
year = {2022},
date = {2022-09-22},
urldate = {2022-09-22},
booktitle = {Lecture Notes in Computer Science},
volume = {13555},
pages = {361--381},
publisher = {Springer Nature Switzerland},
address = {Cham},
series = {Computer Security – ESORICS 2022},
abstract = {Secure messaging schemes such as the Signal protocol rely on out-of-band channels to verify the authenticity of long-running communication. Such out-of-band checks however are only rarely actually performed by users in practice.
In this paper, we propose a new method for performing continuous authentication during a secure messaging session, without the need for an out-of-band channel. Leveraging the users’ long-term secrets, our Authentication Steps extension guarantees authenticity as long as long-term secrets are not compromised, strengthening Signal’s post-compromise security. Our mechanism further allows to detect a potential compromise of long-term secrets after the fact via an out-of-band channel.
Our protocol comes with a novel, formal security definition capturing continuous authentication, a general construction for Signal-like protocols, and a security proof for the proposed instantiation. We further provide a prototype implementation which seamlessly integrates on top of the official Signal Java library, together with bandwidth and storage overhead benchmarks.},
keywords = {Protocols, Signal},
pubstate = {published},
tppubtype = {inproceedings}
}
In this paper, we propose a new method for performing continuous authentication during a secure messaging session, without the need for an out-of-band channel. Leveraging the users’ long-term secrets, our Authentication Steps extension guarantees authenticity as long as long-term secrets are not compromised, strengthening Signal’s post-compromise security. Our mechanism further allows to detect a potential compromise of long-term secrets after the fact via an out-of-band channel.
Our protocol comes with a novel, formal security definition capturing continuous authentication, a general construction for Signal-like protocols, and a security proof for the proposed instantiation. We further provide a prototype implementation which seamlessly integrates on top of the official Signal Java library, together with bandwidth and storage overhead benchmarks.
Haddad, Rami; Melki, Reem; Cosma, Serban
OpenAPI Extended Security Scheme: A Method to Reduce the Prevalence of BOLA Proceedings Article
In: API Specifications Conference (ASC), OpenAPI Initiative 2022.
BibTeX | Tags: Chaire Cisco, Security
@inproceedings{nokey,
title = {OpenAPI Extended Security Scheme: A Method to Reduce the Prevalence of BOLA},
author = {Rami Haddad and Reem Melki and Serban Cosma},
year = {2022},
date = {2022-09-19},
urldate = {2022-09-19},
booktitle = {API Specifications Conference (ASC)},
organization = {OpenAPI Initiative},
keywords = {Chaire Cisco, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Clausen, Thomas; Cordero, Juan Antonio; Oustry, Antoine; Vanier, Sonia; Xu, Liding
Optimization in Wireless Networks Book Chapter
In: Prokopyev, Oleg A. (Ed.): Springer, Encyclopedia of Optimization, 3rd edition, 2022.
BibTeX | Tags: Optimisation, Wireless
@inbook{nokey,
title = {Optimization in Wireless Networks},
author = {Thomas Clausen and Juan Antonio Cordero and Antoine Oustry and Sonia Vanier and Liding Xu},
editor = {Oleg A. Prokopyev},
year = {2022},
date = {2022-07-25},
urldate = {2022-07-25},
publisher = {Springer},
edition = {Encyclopedia of Optimization, 3rd edition},
keywords = {Optimisation, Wireless},
pubstate = {published},
tppubtype = {inbook}
}
Yao, Zhiyuan; Desmouceaux, Yoann; Cordero, Juan Antonio; Clausen, Thomas Heide
HLB: Towards Load-Aware Load-Balancing Journal Article
In: IEEE/ACM Transactions on Networking, 2022, ISSN: 1558-2566.
Abstract | Links | BibTeX | Tags: Chaire Cisco, Infrastructure for Big Data, load balancing
@article{nokey,
title = {HLB: Towards Load-Aware Load-Balancing},
author = {Zhiyuan Yao and Yoann Desmouceaux and Juan Antonio Cordero and Thomas Heide Clausen},
doi = {10.1109/TNET.2022.3177163},
issn = {1558-2566},
year = {2022},
date = {2022-06-05},
urldate = {2022-06-05},
journal = {IEEE/ACM Transactions on Networking},
abstract = {The purpose of network load balancers is to optimize quality of service to the users of a set of servers - basically, to improve response times and to reducing computing resources - by properly distributing workloads. This paper proposes a distributed, application-agnostic, Hybrid Load Balancer (HLB) that - without explicit monitoring or signaling - infers server occupancies and processing speeds, which allows making optimised workload placement decisions. This approach is evaluated both through simulations and extensive experiments, including synthetic workloads and Wikipedia replays on a real-world testbed. Results show significant performance gains, in terms of both response time and system utilisation, when compared to existing load-balancing algorithms.},
keywords = {Chaire Cisco, Infrastructure for Big Data, load balancing},
pubstate = {published},
tppubtype = {article}
}
Cordero, Juan Antonio
Réactivité, efficacité et apprentissage: problèmes d’aide à la prise de décision dans des réseaux décentralisés Proceedings Article
In: 23ème Congrès de la ROADEF, Société Française de Recherche Opérationnelle et d'Aide à la Décision (ROADEF) 2022.
BibTeX | Tags: Autoconfiguration, IoT, Scientific dissemination
@inproceedings{nokey,
title = {Réactivité, efficacité et apprentissage: problèmes d’aide à la prise de décision dans des réseaux décentralisés},
author = {Juan Antonio Cordero},
year = {2022},
date = {2022-02-23},
urldate = {2022-02-23},
booktitle = {23ème Congrès de la ROADEF},
organization = {Société Française de Recherche Opérationnelle et d'Aide à la Décision (ROADEF)},
keywords = {Autoconfiguration, IoT, Scientific dissemination},
pubstate = {published},
tppubtype = {inproceedings}
}
Cordero, Juan Antonio
Enseñar a aprender a las máquinas: mito, tecnología y política Miscellaneous
Claves de Razón Práctica, Jan-Feb 2022 (In Spanish), 2022.
Links | BibTeX | Tags: Machine Learning, Scientific dissemination
@misc{nokey,
title = {Enseñar a aprender a las máquinas: mito, tecnología y política},
author = {Juan Antonio Cordero},
url = {https://www.epizeuxis.net/wp-content/uploads/2022/07/cordero-claves280-1.pdf},
year = {2022},
date = {2022-01-01},
issue = {282},
howpublished = {Claves de Razón Práctica, Jan-Feb 2022 (In Spanish)},
keywords = {Machine Learning, Scientific dissemination},
pubstate = {published},
tppubtype = {misc}
}
2021
Yao, Zhiyuan; Ding, Zihan; Clausen, Thomas Heide
Reinforced Workload Distribution Fairness Proceedings Article
In: Machine Learning for Systems at 35th Conference on Neural Information Processing Systems (NeurIPS 2021), 2021.
Abstract | Links | BibTeX | Tags: Chaire Cisco, Infrastructure for Big Data, load balancing
@inproceedings{yao2021reinforced,
title = {Reinforced Workload Distribution Fairness},
author = {Zhiyuan Yao and Zihan Ding and Thomas Heide Clausen},
url = {https://www.thomasclausen.net/wp-content/uploads/2021/11/2111.00008-1.pdf},
year = {2021},
date = {2021-12-01},
urldate = {2021-12-01},
booktitle = {Machine Learning for Systems at 35th Conference on Neural Information Processing Systems (NeurIPS 2021)},
abstract = {Network load balancers are central components in data centers, that distributes workloads across multiple servers and thereby contribute to offering scalable services. However, when load balancers operate in dynamic environments with limited monitoring of application server loads, they rely on heuristic algorithms that require manual configurations for fairness and performance. To alleviate that, this paper proposes a distributed asynchronous reinforcement learning mechanism to-with no active load balancer state monitoring and limited network observations-improve the fairness of the workload distribution achieved by a load balancer. The performance of proposed mechanism is evaluated and compared with stateof-the-art load balancing algorithms in a simulator, under configurations with progressively increasing complexities. Preliminary results show promise in RLbased load balancing algorithms, and identify additional challenges and future research directions, including reward function design and model scalability.},
keywords = {Chaire Cisco, Infrastructure for Big Data, load balancing},
pubstate = {published},
tppubtype = {inproceedings}
}
Yao, Zhiyuan; Desmouceaux, Yoann; Townsley, Mark; Clausen, Thomas Heide
Towards Intelligent Load Balancing in Data Centers Proceedings Article
In: Machine Learning for Systems at 35th Conference on Neural Information Processing Systems (NeurIPS 2021), Dec 2021, Sydney, Australia, 2021.
Abstract | Links | BibTeX | Tags: Chaire Cisco, Infrastructure for Big Data
@inproceedings{yao2021intelligent,
title = {Towards Intelligent Load Balancing in Data Centers},
author = {Zhiyuan Yao and Yoann Desmouceaux and Mark Townsley and Thomas Heide Clausen},
url = {https://www.thomasclausen.net/wp-content/uploads/2021/11/2110.15788.pdf},
year = {2021},
date = {2021-12-01},
urldate = {2021-12-01},
booktitle = {Machine Learning for Systems at 35th Conference on Neural Information Processing Systems (NeurIPS 2021), Dec 2021, Sydney, Australia},
abstract = {Network load balancers are important components in data centers to provide scalable services. Workload distribution algorithms are based on heuristics, e.g., Equal-Cost Multi-Path (ECMP), Weighted-Cost Multi-Path (WCMP) or naive machine learning (ML) algorithms, e.g., ridge regression. Advanced ML-based approaches help achieve performance gain in different networking and system problems. However, it is challenging to apply ML algorithms on networking problems in real-life systems. It requires domain knowledge to collect features from low-latency, high-throughput, and scalable networking systems, which are dynamic and heterogenous. This paper proposes Aquarius to bridge the gap between ML and networking systems and demonstrates its usage in the context of network load balancers. This paper demonstrates its ability of conducting both offline data analysis and online model deployment in realistic systems. The results show that the ML model trained and deployed using Aquarius improves load balancing performance yet they also reveals more challenges to be resolved to apply ML for networking systems.},
keywords = {Chaire Cisco, Infrastructure for Big Data},
pubstate = {published},
tppubtype = {inproceedings}
}
Rizzi, Carmine; Yao, Zhiyuan; Desmouceaux, Yoann; Townsley, Mark; Clausen, Thomas Heide
Charon: Load-Aware Load-Balancing in P4 Proceedings Article
In: 1st Joint International Workshop on Network Programmability & Automation (NetPA) at 17th International Conference on Network and Service Management (CNSM 2021),, 2021.
Abstract | Links | BibTeX | Tags: Chaire Cisco, Infrastructure for Big Data, load balancing
@inproceedings{rizzi2021charon,
title = {Charon: Load-Aware Load-Balancing in P4},
author = {Carmine Rizzi and Zhiyuan Yao and Yoann Desmouceaux and Mark Townsley and Thomas Heide Clausen},
url = {https://www.thomasclausen.net/wp-content/uploads/2021/11/2110.14389.pdf},
year = {2021},
date = {2021-10-01},
urldate = {2021-01-01},
booktitle = {1st Joint International Workshop on Network Programmability & Automation (NetPA) at 17th International Conference on Network and Service Management (CNSM 2021),},
abstract = {Load-Balancers play an important role in data centers as they distribute network flows across application servers and guarantee per-connection consistency. It is hard however to make fair load balancing decisions so that all resources are efficiently occupied yet not overloaded. Tracking connection states allows to infer server load states and make informed decisions, but at the cost of additional memory space consumption. This makes it hard to implement on programmable hardware, which has constrained memory but offers line-rate performance. This paper presents Charon, a stateless load-aware load balancer that has line-rate performance implemented in P4-NetFPGA. Charon passively collects load states from application servers and employs the power-of-2-choices scheme to make data-driven load balancing decisions and improve resource utilization. Perconnection consistency is preserved statelessly by encoding server ID in a covert channel. The prototype design and implementation details are described in this paper. Simulation results show performance gains in terms of load distribution fairness, quality of service, throughput and processing latency.},
keywords = {Chaire Cisco, Infrastructure for Big Data, load balancing},
pubstate = {published},
tppubtype = {inproceedings}
}
Hawari, Mohammed; Clausen, Thomas
OP4T: Bringing Advanced Network Packet Timestamping into the Field Proceedings Article
In: 2021 International Conference on Information Networking (ICOIN), pp. 137-142, 2021.
Abstract | Links | BibTeX | Tags: Chaire Cisco, Infrastructure for Big Data
@inproceedings{Hawari2021,
title = {OP4T: Bringing Advanced Network Packet Timestamping into the Field},
author = {Mohammed Hawari and Thomas Clausen},
url = {https://www.thomasclausen.net/wp-content/uploads/2021/03/paper.pdf},
doi = {10.1109/ICOIN50884.2021.9333927},
year = {2021},
date = {2021-01-13},
booktitle = {2021 International Conference on Information Networking (ICOIN)},
pages = {137-142},
abstract = {Because it is very bursty, the microsecond-scale temporal behaviour of network traffic in data-centres is chal- lenging to measure and understand. To bring observability into data-centre networks, this paper introduces the Open Platform for Programmable Precise Packet Timestamping (OP4T), a hardware architecture, targeting Field-Programmable Gateway Arrays (FPGAs), integrated into data-centre servers as a Smart Network Interface Card (SmartNIC), and flexible enough to enable advanced latency diagnosis.
In this paper, OP4T is specified, and an open-source im- plementation of that architecture is proposed, targeting the NetFPGA SUME prototyping board. By leveraging the P4 programming language, and partial reconfiguration, that open- source implementation is experimentally shown to enable in-band, precise packet timestamping, without sacrificing the achievable throughput. As an illustration, OP4T is shown to be usable to measure fine-grained properties of a software packet forwarder, e.g., packet batching.},
keywords = {Chaire Cisco, Infrastructure for Big Data},
pubstate = {published},
tppubtype = {inproceedings}
}
In this paper, OP4T is specified, and an open-source im- plementation of that architecture is proposed, targeting the NetFPGA SUME prototyping board. By leveraging the P4 programming language, and partial reconfiguration, that open- source implementation is experimentally shown to enable in-band, precise packet timestamping, without sacrificing the achievable throughput. As an illustration, OP4T is shown to be usable to measure fine-grained properties of a software packet forwarder, e.g., packet batching.
2020
Desmouceaux, Yoann; Enguehard, Marcel; Clausen, Thomas
Joint Monitorless Load-Balancing and Autoscaling for Zero-Wait-Time in Data Centers Journal Article
In: IEEE Transactions on Network and Service Management, 2020.
Abstract | Links | BibTeX | Tags: Chaire Cisco, load balancing, segment routing
@article{Desmouceaux2020,
title = {Joint Monitorless Load-Balancing and Autoscaling for Zero-Wait-Time in Data Centers},
author = {Yoann Desmouceaux and Marcel Enguehard and Thomas Clausen},
url = {https://www.epizeuxis.net/wp-content/uploads/2020/12/Joint-Monitorless-Load-Balancing-and-Autoscaling-for-Zero-Wait-Time-in-Data-Centers.pdf},
doi = {10.1109/TNSM.2020.3045059},
year = {2020},
date = {2020-12-31},
urldate = {2020-12-31},
journal = {IEEE Transactions on Network and Service Management},
abstract = {Cloud architectures achieve scaling through two main functions: (i) load-balancers, which dispatch queries among replicated virtualized application instances, and (ii) autoscalers, which automatically adjust the number of replicated instances to accommodate variations in load patterns. These functions are often provided through centralized load monitoring, incurring operational complexity. This paper introduces a unified and centralized-monitoring-free architecture achieving both autoscal- ing and load-balancing, reducing operational overhead while increasing response time performance. Application instances are virtually ordered in a chain, and new queries are forwarded along this chain until an instance, based on its local load, accepts the query. Autoscaling is triggered by the last application instance, which inspects its average load and infers if its chain is under- or over-provisioned. An analytical model of the system is derived, and proves that the proposed technique can achieve asymptotic zero-wait time with high (and controlable) probability. This result is confirmed by extensive simulations, which highlight close-to- ideal performance in terms of both response time and resource costs.},
keywords = {Chaire Cisco, load balancing, segment routing},
pubstate = {published},
tppubtype = {article}
}
Feltin, Thomas; Foroughi, Parisa; Shao, Wenqin; Brockners, Frank; Clausen, Thomas
Semantic feature selection for network telemetry event description Proceedings Article
In: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, pp. 1-6, 2020, ISBN: 2374-9709.
Abstract | Links | BibTeX | Tags: contextual information, cross-entropy based metric, data analysis, data behavior, data structures, Decision support, explanation, explanation process, feature selection, large-scale networks, model driven telemetry, Network Management, network telemetry event description, real-time systems, Selection process, semantic feature selection, telemetry, telemetry data structure
@inproceedings{Feltin2020,
title = {Semantic feature selection for network telemetry event description},
author = {Thomas Feltin and Parisa Foroughi and Wenqin Shao and Frank Brockners and Thomas Clausen},
url = {https://www.thomasclausen.net/wp-content/uploads/2020/08/AnNet20201-1.pdf},
doi = {10.1109/NOMS47738.2020.9110382},
isbn = {2374-9709},
year = {2020},
date = {2020-04-20},
booktitle = {NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium},
pages = {1-6},
abstract = {Model driven telemetry (MDT) enables the real-time collection of hundreds of thousands of counters on large-scale networks, with contextual information to each counter provided in the telemetry data structure definition. Explaining network events in such datasets implies substantial analysis by a domain expert. This paper presents an semantic feature selection method, to find the most important counters which describe a given event in a telemetry dataset, and facilitate the explanation process. This paper proposes a metric for estimating the importance of features in a dataset with descriptive feature names, to find those that are most meaningful to a human. With this estimation, this paper presents a cross-entropy based metric describing the quality of a selection of counters, which is combined with the data behavior to define an optimization goal. The computation of optimal selections distills intelligible and precise selections of counters with adjustable verbosity, and describes events with a few selected counters outlining the root cause of network events.},
keywords = {contextual information, cross-entropy based metric, data analysis, data behavior, data structures, Decision support, explanation, explanation process, feature selection, large-scale networks, model driven telemetry, Network Management, network telemetry event description, real-time systems, Selection process, semantic feature selection, telemetry, telemetry data structure},
pubstate = {published},
tppubtype = {inproceedings}
}
Hawari, Mohammed; Cordero, Juan Antonio; Clausen, Thomas
High-Accuracy Packet Pacing on Commodity Servers for Constant-Rate Flows Journal Article
In: IEEE/ACM Transactions on Networking, pp. 1-15, 2020, ISSN: 1558-2566.
Abstract | Links | BibTeX | Tags: Infrastructure for Big Data, Packet Pacing
@article{9130915,
title = {High-Accuracy Packet Pacing on Commodity Servers for Constant-Rate Flows},
author = {Mohammed Hawari and Juan Antonio Cordero and Thomas Clausen},
url = {https://www.thomasclausen.net/wp-content/uploads/2020/08/2020-IEEE-TNET-High-Accuracy-Packet-Pacing-on-Commodity-Servers-for-Constant-Rate-Flows.pdf},
doi = {10.1109/TNET.2020.3001672},
issn = {1558-2566},
year = {2020},
date = {2020-01-01},
urldate = {2020-01-01},
journal = {IEEE/ACM Transactions on Networking},
pages = {1-15},
abstract = {This addresses the problem of high-quality packet pacing for constant-rate packet consumption systems, with strict buffering limitations. A mostly-software pacing architecture is developed, which has minimal hardware requirements, satisfied by commodity servers - rendering the proposed solution easily deployable in existing (data-centre) infrastructures. Two algorithms (free-running and frequency-controlled pacing, for explicitly and implicitly indicated target rates, respectively) are specified, and formally analysed. The proposed solution, including both algorithms, is implemented, and is tested on real hardware and under real conditions. The performance of these implementations is experimentally evaluated and compared to existing mechanisms, available in general-purpose hardware. Results of both exhaustive experiments, and of an analytical modeling, indicate that the proposed approach is able to perform low-jitter packet pacing on commodity hardware, being thus suitable for constant rate transmission and consumption in media production scenarios.},
keywords = {Infrastructure for Big Data, Packet Pacing},
pubstate = {published},
tppubtype = {article}
}
2019
Cordero, Juan Antonio; Lou, Wei
Modeling Dynamic Resource Allocation in the Edge Proceedings Article
In: Proceedings of the 8th IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN'2019). , IEEE, 2019.
Abstract | BibTeX | Tags: Modeling, Performance Evaluation
@inproceedings{Cordero2019,
title = { Modeling Dynamic Resource Allocation in the Edge},
author = {Juan Antonio Cordero and Wei Lou},
year = {2019},
date = {2019-11-26},
urldate = {2019-11-26},
booktitle = {Proceedings of the 8th IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN'2019).
},
publisher = {IEEE},
abstract = {Edge computing technologies and integrated archi- tectures have been deployed to accommodate Internet traffic growth. These architectures include facilities (cloudlets, micro DCs) to cache and serve contents close to consumers. Resulting systems adapt to observed request/consumption patterns by allowing cloudlet coordination for content caching/dissemination. This paper presents a novel analytical model of transient dy- namics of the cloudlets set. The model is used to study system convergence, stability and delivered content locality. Results from this model are validated via simulations.},
keywords = {Modeling, Performance Evaluation},
pubstate = {published},
tppubtype = {inproceedings}
}
Desmouceaux, Yoann; Cordero, Juan Antonio; Clausen, Thomas
Reliable B.I.E.R. with Peer Caching Journal Article
In: IEEE Transactions on Network and Service Management, 2019, ISSN: 1932-4537.
Abstract | Links | BibTeX | Tags: B.I.E.R., Broadcast, Chaire Cisco, Multicast, Reliable Content Distribution
@article{Desmouceaux2019,
title = {Reliable B.I.E.R. with Peer Caching},
author = {Yoann Desmouceaux and Juan Antonio Cordero and Thomas Clausen},
url = {https://www.thomasclausen.net/wp-content/uploads/2019/11/Reliable-B.I.E.R.-with-Peer-Caching.pdf},
doi = {10.1109/TNSM.2019.2950158},
issn = {1932-4537},
year = {2019},
date = {2019-11-01},
journal = {IEEE Transactions on Network and Service Management},
abstract = {Multicast protocols usually require building multicast trees and maintaining state in intermediate routers, incurring operation complexity. B.I.E.R. (Bit-Indexed Explicit Replication) ambitions to alleviate this complexity by allowing for source-driven selection of destinations and state-less packet forwarding. B.I.E.R. can also be used to achieve reliable delivery of content, by retransmitting packet to the exact set of destinations which have missed it. While B.I.E.R.- based reliable multicast exhibits attractive performance attributes, repair of a lost packet is achieved through source retransmissions, which may be costly and even unnecessary if close peers are able to provide a copy of the packet.
Thus, this paper extends the use of reliable B.I.E.R. multicast to allow recoveries from peers, using Segment Routing (SR) to steer retransmission requests through potential candidates. A framework is introduced, which can accommodate different policies for the selection of candidate peers for retransmissions. Simple (both static and adaptive) policies are introduced and analyzed, both (i) theoretically and (ii) by way of simulations in data-center-like and real-world topologies. Results indicate that local peer recovery is able to substantially reduce the overall retransmission traffic, and that this can be achieved through simple policies, where no signaling is required to build a set of candidate peers.},
keywords = {B.I.E.R., Broadcast, Chaire Cisco, Multicast, Reliable Content Distribution},
pubstate = {published},
tppubtype = {article}
}
Thus, this paper extends the use of reliable B.I.E.R. multicast to allow recoveries from peers, using Segment Routing (SR) to steer retransmission requests through potential candidates. A framework is introduced, which can accommodate different policies for the selection of candidate peers for retransmissions. Simple (both static and adaptive) policies are introduced and analyzed, both (i) theoretically and (ii) by way of simulations in data-center-like and real-world topologies. Results indicate that local peer recovery is able to substantially reduce the overall retransmission traffic, and that this can be achieved through simple policies, where no signaling is required to build a set of candidate peers.
2018
Desmouceaux, Yoann; Townsley, Mark; Clausen, Thomas
Zero-Loss Virtual Machine Migration with IPv6 Segment Routing Proceedings Article
In: Proceedings 1st SR+SFC Workshop at IEEE CNSM, 2018.
Abstract | Links | BibTeX | Tags: Chaire Cisco, segment routing
@inproceedings{Desmouceaux2018e,
title = {Zero-Loss Virtual Machine Migration with IPv6 Segment Routing},
author = {Yoann Desmouceaux and Mark Townsley and Thomas Clausen},
url = {https://www.thomasclausen.net/wp-content/uploads/2019/11/Zero-Loss-Virtual-Machine-Migration-with-Segment-Routing.pdf},
year = {2018},
date = {2018-11-01},
booktitle = {Proceedings 1st SR+SFC Workshop at IEEE CNSM},
abstract = {With the development of large-scale data centers, Virtual Machine (VM) migration is a key component for resource optimization, cost reduction, and maintenance. From a network perspective, traditional VM migration mechanisms rely on the hypervisor running at the destination host advertising the new location of the VM once migration is complete. However, this creates a period of time during which the VM is not reachable, yielding packet loss.
This paper introduces a method to perform zero-loss VM migration by using IPv6 Segment Routing (SR). Rather than letting the hypervisor update a locator mapping after VM migration is complete, a logical path consisting of the source and destination hosts is pre-provisioned. Packets destined to the migrating VM are sent through this path using SR, shortly before, during, and shortly after migration – the virtual router on the source host being in charge of forwarding packets locally if the VM migration has not completed yet, or to the destination host otherwise. The proposed mechanism is implemented as a VPP plugin, and feasibility of zero-loss VM migration is demonstrated with various workloads. Evaluation shows that this yields benefits in terms of session opening latency and TCP throughput.},
keywords = {Chaire Cisco, segment routing},
pubstate = {published},
tppubtype = {inproceedings}
}
This paper introduces a method to perform zero-loss VM migration by using IPv6 Segment Routing (SR). Rather than letting the hypervisor update a locator mapping after VM migration is complete, a logical path consisting of the source and destination hosts is pre-provisioned. Packets destined to the migrating VM are sent through this path using SR, shortly before, during, and shortly after migration – the virtual router on the source host being in charge of forwarding packets locally if the VM migration has not completed yet, or to the destination host otherwise. The proposed mechanism is implemented as a VPP plugin, and feasibility of zero-loss VM migration is demonstrated with various workloads. Evaluation shows that this yields benefits in terms of session opening latency and TCP throughput.
Toussaint, Arthur; Hawari, Mohammed; Clausen, Thomas
Chasing Linux Jitter Sources for Uncompressed Video Book Section
In: In Proceedings of the 1st Workshop on High-Precision Networks Operations and Control (HiPNet 2018) ad the IEEE 14th International Conference on Network and Service Management (CNSM), 2018.
Abstract | Links | BibTeX | Tags: Chaire Cisco, Linux, Network Greedy Applications, Performance
@incollection{Toussaint2018,
title = {Chasing Linux Jitter Sources for Uncompressed Video},
author = {Arthur Toussaint and Mohammed Hawari and Thomas Clausen},
url = {https://www.thomasclausen.net/wp-content/uploads/2019/11/CNSM-HipNet-Toussaint-et.-al.-Chasing-Linux-Jutter-Sources-for-Uncompressed-Video.pdf},
year = {2018},
date = {2018-11-01},
booktitle = {In Proceedings of the 1st Workshop on High-Precision Networks Operations and Control (HiPNet 2018) ad the IEEE 14th International Conference on Network and Service Management (CNSM)},
abstract = {Beyond the transport of uncompressed video over IP networks, defined in standards such as ST2022-6, the ability to build software-based Video Processing Functions (VPF) on commodity hardware and using general purpose Operating Systems is the next logical step in the evolution of the media industry towards an “all-IP” world. In that context, understand- ing the jitter induced on an ST2022-6 stream by a commodity platform is essential. This paper describes a general methodology to enumerate jitter sources on commodity platforms and to quantify their relative contribution to the overall system jitter. The methodology is applied to the Linux kernel, producing a classification of the different sources of jitter, and a quantification of their impact.},
keywords = {Chaire Cisco, Linux, Network Greedy Applications, Performance},
pubstate = {published},
tppubtype = {incollection}
}
Pit--Claudel, Benoit; Desmouceaux, Yoann; Pfister, Pierre; Townsley, Mark; Clausen, Thomas
Stateless Load-Aware Load Balancing in P4 Proceedings Article
In: 1st P4 European Workshop (P4EU), 2018.
Abstract | Links | BibTeX | Tags: Chaire Cisco, load balancing, NetFPGA, segment routing
@inproceedings{Pit--Claudel2018,
title = {Stateless Load-Aware Load Balancing in P4},
author = {Benoit Pit--Claudel and Yoann Desmouceaux and Pierre Pfister and Mark Townsley and Thomas Clausen},
url = {http://www.thomasclausen.net/en/p4eu-2018/},
year = {2018},
date = {2018-09-24},
publisher = {1st P4 European Workshop (P4EU)},
abstract = {Leveraging the performance opportunities offered by programmable hardware, stateless load-balancing architectures allowing line-rate processing are appealing. Moreover, it has been demonstrated that significantly fairer load-balancing can be achieved by an architecture that considers the actual load of application instances when dispatching connection requests. Architectures which maintain per-connection state for resiliency and/or track application load state for fairness are, however, at odds with hardware-imposed memory constraints. Thus, a desirable load-balancer for programmable hardware would be both stateless and able to dispatch queries to application instances according to their current load.
This paper presents SHELL, a stateless application-aware load-balancer combining (i) a power-of-choices scheme using IPv6 Segment Routing to dispatch new flows to a suitable application instance from among multiple candidates, and (ii) the use of a covert channel to record/report which flow was assigned to which candidate in a stateless fashion. In addition, consistent hashing versioning is used to ensure that connections are maintained to the correct application instance, using Segment Routing to “browse” through the history when needed. The stateless design of SHELL makes it suitable for hardware implementation, and this paper describes the implementation of a P4-NetFPGA prototype. A performance evaluation of this SHELL implementation demonstrates throughput and latency characteristics comparable to other stateless load-balancing implementations, while enabling application instance-load-aware dispatching and significantly increasing per-connection consistency resiliency.},
keywords = {Chaire Cisco, load balancing, NetFPGA, segment routing},
pubstate = {published},
tppubtype = {inproceedings}
}
This paper presents SHELL, a stateless application-aware load-balancer combining (i) a power-of-choices scheme using IPv6 Segment Routing to dispatch new flows to a suitable application instance from among multiple candidates, and (ii) the use of a covert channel to record/report which flow was assigned to which candidate in a stateless fashion. In addition, consistent hashing versioning is used to ensure that connections are maintained to the correct application instance, using Segment Routing to “browse” through the history when needed. The stateless design of SHELL makes it suitable for hardware implementation, and this paper describes the implementation of a P4-NetFPGA prototype. A performance evaluation of this SHELL implementation demonstrates throughput and latency characteristics comparable to other stateless load-balancing implementations, while enabling application instance-load-aware dispatching and significantly increasing per-connection consistency resiliency.
Cordero, Juan Antonio; Lou, Wei
Take your time, get it closer: content dissemination within mobile pedestrian crowds Journal Article
In: Wireless Networks, 2018, ISSN: 1572-8196.
Abstract | Links | BibTeX | Tags: Ad-Hoc, Chaire Cisco, MESH
@article{Cordero2018,
title = {Take your time, get it closer: content dissemination within mobile pedestrian crowds},
author = {Juan Antonio Cordero and Wei Lou},
url = {https://doi.org/10.1007/s11276-018-1731-2},
doi = {10.1007/s11276-018-1731-2},
issn = {1572-8196},
year = {2018},
date = {2018-05-05},
journal = {Wireless Networks},
abstract = {The explosion of traffic demands in the edge of the Internet, mostly by mobile users, is putting under pressure current networking infrastructures. This is particularly acute when huge amounts of users and active wireless devices gather in reduced geographical spaces, increasing the risk of exceeding planned capacity of deployed infrastructure. This trend motivates research on edge computing, and in particular, on mechanisms to offload or address locally part of the user injected traffic at the access infrastructure, thus reducing the need of Internet requests and retrievals. This paper concentrates on the ability of mobile crowds --and corresponding access networks---to fulfill content requests originated within the mesh, with minimal intervention of the Internet infrastructure. Simple heuristics are revisited, proposed, discussed and evaluated to improve autonomous content discovery and dissemination within high-density, low-mobility crowds, by combining notions already explored for MANET routing: deliberate jittering and autonomous distance-based overlay pruning. Results over synthetic networks and real mobility traces indicate that these mechanisms improve efficiency and quality of content request discoveries, by reducing significantly collisions and increasing stability of discovered paths in dense pedestrian crowds.},
keywords = {Ad-Hoc, Chaire Cisco, MESH},
pubstate = {published},
tppubtype = {article}
}
Clausen, Thomas; YI, Jiazi; Cordero, Juan Antonio; Igarashi, Yuichi
Use 'em or Lose 'em: On Unidirectional Links in Reactive Routing Protocols Journal Article
In: Elsevier Ad Hoc Networks, vol. 73, pp. 51-64, 2018.
Abstract | Links | BibTeX | Tags: Ad-Hoc, LLN, LOADng, MANET, Reactive, Routing
@article{Clausen2018unidirectional,
title = {Use 'em or Lose 'em: On Unidirectional Links in Reactive Routing Protocols},
author = {Thomas Clausen and Jiazi YI and Juan Antonio Cordero and Yuichi Igarashi},
url = {https://ac.els-cdn.com/S1570870518300325/1-s2.0-S1570870518300325-main.pdf?_tid=0b7f4a7e-b489-4317-b96c-f18cec2af56f&acdnat=1520779362_84dbf04f92cfc3c7ef2448f3b4c3ebf7},
doi = {10.1016/j.adhoc.2018.02.004},
year = {2018},
date = {2018-05-01},
journal = {Elsevier Ad Hoc Networks},
volume = {73},
pages = {51-64},
abstract = {In reactive unicast routing protocols, Route Discovery aims to include only bidirectional links in discovered routing paths. This is typically accomplished by having routers maintain a “blacklist” of links recently confirmed (through Route Reply processing) to be unidirectional – which is then used for excluding subsequent Route Discovery control messages received over these links from being processed and forwarded.
This paper first presents an analytical model, which allows to study the impact of unidirectional links being present in a network, on the performance of reactive routing protocols. Next, this paper identifies that despite the use of a “blacklist”, the Route Discovery process may result in discovery of false forward routes, i.e., routes containing unidirec- tional links – and proposes a counter-measure denoted Forward Bidirectionality Check. This paper further proposes a Loop Exploration mechanism, allowing to properly include unidirectional links in a discovered routing topology – with the goal of providing bidirectional connectivity even in absence of bidirectional paths in the network.
Finally, each of these proposed mechanisms are subjected to extensive network simulations in static scenarios. When the fraction of unidirectional links is moderate (15 50%), simulations find Forward Bidirectionality Check to significantly increase the probability that bidirectional routing paths can be discovered by a reactive routing protocol, while incurring only an insignificant additional overhead. Further, in networks with a significant fraction of unidirectional links ( 50%), simulations reveal that Loop Exploration preserves the ability of a reactive routing protocol to establish bidirectional communication (possibly through non-bidirectional paths), but at the expense of a substantial additional overhead.},
keywords = {Ad-Hoc, LLN, LOADng, MANET, Reactive, Routing},
pubstate = {published},
tppubtype = {article}
}
This paper first presents an analytical model, which allows to study the impact of unidirectional links being present in a network, on the performance of reactive routing protocols. Next, this paper identifies that despite the use of a “blacklist”, the Route Discovery process may result in discovery of false forward routes, i.e., routes containing unidirec- tional links – and proposes a counter-measure denoted Forward Bidirectionality Check. This paper further proposes a Loop Exploration mechanism, allowing to properly include unidirectional links in a discovered routing topology – with the goal of providing bidirectional connectivity even in absence of bidirectional paths in the network.
Finally, each of these proposed mechanisms are subjected to extensive network simulations in static scenarios. When the fraction of unidirectional links is moderate (15 50%), simulations find Forward Bidirectionality Check to significantly increase the probability that bidirectional routing paths can be discovered by a reactive routing protocol, while incurring only an insignificant additional overhead. Further, in networks with a significant fraction of unidirectional links ( 50%), simulations reveal that Loop Exploration preserves the ability of a reactive routing protocol to establish bidirectional communication (possibly through non-bidirectional paths), but at the expense of a substantial additional overhead.
Desmouceaux, Yoann; Toubaline, Sonia; Clausen, Thomas
Flow-Aware Workload Migration in Data Centers Journal Article
In: Springer - Journal of Network and Systems Management (JONS), 2018.
Abstract | Links | BibTeX | Tags: Chaire Cisco, dc-optimization, Infrastructure for Big Data
@article{Desmouceaux2018a,
title = {Flow-Aware Workload Migration in Data Centers},
author = {Yoann Desmouceaux and Sonia Toubaline and Thomas Clausen},
url = {https://link.springer.com/epdf/10.1007/s10922-018-9452-5?author_access_token=qm_40d91CsNLlZ_vZ0tZFPe4RwlQNchNByi7wbcMAY4xSrvbLplDMLQ3AN9vWEoUIxtZAIdnOGAzJH5W3YOrbGteOLvaEXsEE1xFv66lVxTKlL40BAS25fsaLf8w1RJAvY69owHWqhJkTmAZpvdCkQ%3D%3D
https://www.epizeuxis.net/wp-content/uploads/2018/03/jons-2018.pdf},
doi = {10.1007/s10922-018-9452-5},
year = {2018},
date = {2018-03-10},
journal = {Springer - Journal of Network and Systems Management (JONS)},
abstract = {In data centers, subject to workloads with heterogeneous (and sometimes short) lifetimes, workload migration is a way of attaining a more efficient utilization of the underlying physical machines.
To not introduce performance degradation, such workload migration must take into account not only machine resources, and per-task resource requirements, but also application dependencies in terms of network communication.
This articleformat presents a workload migration model capturing all of these constraints.
A linear programming framework is developed allowing accurate representation of per-task resources requirements and inter-task network demands. Using this, a multi-objective problem is formulated to compute a re-allocation of tasks that (i) maximizes the total inter-task throughput, while (ii) minimizing the cost incurred by migration and (iii) allocating the maximum number of new tasks.
A baseline algorithm, solving this multi-objective problem using the $epsilon$-constraint method is proposed, in order to generate the set of Pareto-optimal solutions. As this algorithm is compute-intensive for large topologies, a heuristic, which computes an approximation of the Pareto front, is then developed, and evaluated on different topologies and with different machine load factors. These evaluations show that the heuristic can provide close-to-optimal solutions, while reducing the solving time by one to two order of magnitudes.
},
keywords = {Chaire Cisco, dc-optimization, Infrastructure for Big Data},
pubstate = {published},
tppubtype = {article}
}
To not introduce performance degradation, such workload migration must take into account not only machine resources, and per-task resource requirements, but also application dependencies in terms of network communication.
This articleformat presents a workload migration model capturing all of these constraints.
A linear programming framework is developed allowing accurate representation of per-task resources requirements and inter-task network demands. Using this, a multi-objective problem is formulated to compute a re-allocation of tasks that (i) maximizes the total inter-task throughput, while (ii) minimizing the cost incurred by migration and (iii) allocating the maximum number of new tasks.
A baseline algorithm, solving this multi-objective problem using the $epsilon$-constraint method is proposed, in order to generate the set of Pareto-optimal solutions. As this algorithm is compute-intensive for large topologies, a heuristic, which computes an approximation of the Pareto front, is then developed, and evaluated on different topologies and with different machine load factors. These evaluations show that the heuristic can provide close-to-optimal solutions, while reducing the solving time by one to two order of magnitudes.
Desmouceaux, Yoann; Clausen, Thomas; Cordero, Juan Antonio; Townsley, W. Mark
Reliable Multicast with B.I.E.R. Journal Article
In: IEEE/KICS Journal of Communications and Networks (JCN), vol. 20, no. 2, pp. 182-197, 2018.
Abstract | Links | BibTeX | Tags: B.I.E.R., Broadcast, Chaire Cisco, Internet Broadcast, Multicast, Performance Evaluation, Reliable Content Distribution
@article{Desmouceaux0000,
title = {Reliable Multicast with B.I.E.R.},
author = {Yoann Desmouceaux and Thomas Clausen and Juan Antonio Cordero and W. Mark Townsley },
url = {http://www.thomasclausen.net/wp-content/uploads/2018/03/jcn-2018.pdf},
year = {2018},
date = {2018-02-28},
journal = {IEEE/KICS Journal of Communications and Networks (JCN)},
volume = {20},
number = {2},
pages = {182-197},
abstract = {Inter-network multicast protocols, which build and maintain multicast trees, incur both explicit protocol signalling, and maintenance of state in intermediate routers in the network. B.I.E.R. (Bit-Indexed Explicit Replication) is a technique which can provide a multicast service yet removes such complexities: in- termediate routers are unencumbered by group management, and no per-group state is to be maintained.
This paper explores the use of B.I.E.R. as a basis for develop- ing an efficient and reliable multicast mechanism, where redun- dant traffic is avoided, essential traffic is forwarded along shortest paths, and no per-flow state is required in intermediate routers. Evaluated by way of both an analytical model and network sim- ulation both in generic and in real network topologies with vary- ing background traffic loads, the proposed B.I.E.R.-based reliable multicast mechanism exhibits attractive performance attributes: it attains delivery success rates as high as any other reliable multicast service, but with significantly better link utilisation and no per-flow or per-group state in intermediate routers of the network.},
keywords = {B.I.E.R., Broadcast, Chaire Cisco, Internet Broadcast, Multicast, Performance Evaluation, Reliable Content Distribution},
pubstate = {published},
tppubtype = {article}
}
This paper explores the use of B.I.E.R. as a basis for develop- ing an efficient and reliable multicast mechanism, where redun- dant traffic is avoided, essential traffic is forwarded along shortest paths, and no per-flow state is required in intermediate routers. Evaluated by way of both an analytical model and network sim- ulation both in generic and in real network topologies with vary- ing background traffic loads, the proposed B.I.E.R.-based reliable multicast mechanism exhibits attractive performance attributes: it attains delivery success rates as high as any other reliable multicast service, but with significantly better link utilisation and no per-flow or per-group state in intermediate routers of the network.
Desmouceaux, Yoann; Pfister, Pierre; Tollet, Jérôme; Townsley, W. Mark; Clausen, Thomas
6LB: Scalable and Application-Aware Load Balancing with Segment Routing Journal Article
In: IEEE/ACM Transactions on Networking, vol. 26, no. 2, pp. 819-834, 2018, ISSN: 1063-6692.
Abstract | Links | BibTeX | Tags: Chaire Cisco, Infrastructure for Big Data, load balancing, Scalability, segment routing
@article{Desmouceaux2018,
title = {6LB: Scalable and Application-Aware Load Balancing with Segment Routing},
author = {Yoann Desmouceaux and Pierre Pfister and Jérôme Tollet and W. Mark Townsley and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2018/02/2018-IEEE-Transactions-on-Networking-6LB-Scalable-and-Application-Aware-Load-Balancing-with-Segment-Routing.pdf},
doi = {10.1109/TNET.2018.2799242},
issn = {1063-6692},
year = {2018},
date = {2018-02-15},
urldate = {2018-02-15},
journal = {IEEE/ACM Transactions on Networking},
volume = {26},
number = {2},
pages = {819-834},
abstract = {Network load-balancers generally either do not take application state into account, or do so at the cost of a central- ized monitoring system. This paper introduces a load-balancer running exclusively within the IP forwarding plane, i.e. in an application protocol agnostic fashion – yet which still provides application-awareness and makes real-time, decentralized deci- sions. To that end, IPv6 Segment Routing is used to direct data packets from a new flow through a chain of candidate servers, until one decides to accept the connection, based solely on its local state. This way, applications themselves naturally decide on how to fairly share incoming connections, while incurring minimal network overhead, and no out-of-band signaling. A consistent hashing algorithm, as well as an in-band stickiness protocol, allow for the proposed solution to be able to be reliably distributed across a large number of instances.
Performance evaluation by means of an analytical model and actual tests on different workloads (including a Wikipedia replay as a realistic workload) show significant performance benefits in terms of shorter response times, when compared to a traditional random load-balancer. In addition, this paper introduces and compares kernel bypass high-performance implementations of both 6LB and a state-of-the-art load-balancer, showing that the significant system-level benefits of 6LB are achievable with a negligible data-path CPU overhead.},
keywords = {Chaire Cisco, Infrastructure for Big Data, load balancing, Scalability, segment routing},
pubstate = {published},
tppubtype = {article}
}
Performance evaluation by means of an analytical model and actual tests on different workloads (including a Wikipedia replay as a realistic workload) show significant performance benefits in terms of shorter response times, when compared to a traditional random load-balancer. In addition, this paper introduces and compares kernel bypass high-performance implementations of both 6LB and a state-of-the-art load-balancer, showing that the significant system-level benefits of 6LB are achievable with a negligible data-path CPU overhead.
Radu, Dan; Cretu, Adrian; Parrein, Benoit; Yi, Jiazi; Avram, Camelia; Astilean, Adina
Flying Ad Hoc Network for Emergency Applications Connected to a Fog System Proceedings Article
In: Barolli, Leonard; Xhafa, Fatos; Javaid, Nadeem; Spaho, Evjola; Kolici, Vladi (Ed.): pp. 675–686, Springer International Publishing, Cham, 2018, ISBN: 978-3-319-75928-9.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MP-OLSR, Multipath, OLSR
@inproceedings{10.1007/978-3-319-75928-9_60,
title = {Flying Ad Hoc Network for Emergency Applications Connected to a Fog System},
author = {Dan Radu and Adrian Cretu and Benoit Parrein and Jiazi Yi and Camelia Avram and Adina Astilean},
editor = {Leonard Barolli and Fatos Xhafa and Nadeem Javaid and Evjola Spaho and Vladi Kolici},
url = {https://www.researchgate.net/publication/323361307_Flying_Ad_Hoc_Network_for_Emergency_Applications_Connected_to_a_Fog_System},
doi = {10.1007/978-3-319-75928-9_60},
isbn = {978-3-319-75928-9},
year = {2018},
date = {2018-01-01},
pages = {675--686},
publisher = {Springer International Publishing},
address = {Cham},
abstract = {The main objective of this paper is to improve the efficiency of vegetation fire emergency interventions by using MP-OLSR routing protocol for data transmission in Flying Ad Hoc NETwork (FANET) applications. The presented conceptual system design could potentially increase the rescuing chances of people caught up in natural disaster environments, the final goal being to provide public safety services to interested parties. The proposed system architecture model relies on emerging technologies (Internet of Things & Fog, Smart Cities, Mobile Ad Hoc Networks) and actual concepts available in the scientific literature. The two main components of the system consist in a FANET, capable of collecting fire detection data from GPS and video enabled drones, and a Fog/Edge node that allows data collection and analysis, but also provides public safety services for interested parties. The sensing nodes forward data packets through multiple mobile hops until they reach the central management system. A proof of concept based on MP-OLSR routing protocol for efficient data transmission in FANET scenarios and possible public safety rescuing services is given.},
keywords = {Ad-Hoc, MP-OLSR, Multipath, OLSR},
pubstate = {published},
tppubtype = {inproceedings}
}
2017
Clausen, Thomas; Yi, Jiazi; Herberg, Ulrich
Lightweight On-demand Ad hoc Distance-vector Routing-Next Generation (LOADng): Protocol, Extension, and Applicability Journal Article
In: Computer Networks, vol. 126, pp. 125-140, 2017.
Abstract | Links | BibTeX | Tags: Ad-Hoc, LLN, LOADng
@article{clausen2017lightweight,
title = {Lightweight On-demand Ad hoc Distance-vector Routing-Next Generation (LOADng): Protocol, Extension, and Applicability},
author = {Thomas Clausen and Jiazi Yi and Ulrich Herberg},
url = {http://www.thomasclausen.net/wp-content/uploads/2017/08/2017-Computer-Networks-Lightweight-On-demand-Ad-hoc-Distance-vector-Routing-Next-Generation-LOADng.pdf},
doi = {10.1016/j.comnet.2017.06.025},
year = {2017},
date = {2017-10-24},
journal = {Computer Networks},
volume = {126},
pages = {125-140},
publisher = {Elsevier},
abstract = {This paper studies the routing protocol “Lightweight On-demand Ad hoc Distance-vector Routing Protocol – Next Generation (LOADng)”, designed to enable efficient, scalable and secure routing in low power and lossy networks. As a reactive protocol, it does not maintain a routing table for all destinations in the network, but initiates a route discovery to a destination only when there is data to be sent to that destination to reduce routing overhead and memory consumption. Designed with a modular approach, LOADng can be extended with additional components for adapting the protocol to different topologies, traffic, and data-link layer characteristics. This paper studies several such additional components for extending LOADng: support for smart route requests and expanding ring search, an extension permitting maintaining collection trees, a fast rerouting extension. All those extensions are examined from the aspects of specification, interoperability with other mechanisms, security vulnerabilities, performance and applicability. A general framework is also proposed to secure the routing protocol.},
keywords = {Ad-Hoc, LLN, LOADng},
pubstate = {published},
tppubtype = {article}
}
Perez, Samuel; Cordero, Juan Antonio; Coupechoux, Marceau
ODMAC++: An IoT Communication Manager based on Energy Harvesting Prediction Proceedings Article
In: Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'2017)., IEEE, 2017.
Abstract | BibTeX | Tags: Chaire Cisco, Constrained Networks, IoT, Sensor Networks
@inproceedings{Perez2017,
title = {ODMAC++: An IoT Communication Manager based on Energy Harvesting Prediction},
author = {Samuel Perez and Juan Antonio Cordero and Marceau Coupechoux},
year = {2017},
date = {2017-10-08},
booktitle = {Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'2017).},
publisher = {IEEE},
abstract = {In large low-power networks of battery-driven sen- sors, power outages are a major concern and communication rates have to be carefully designed in order to optimize energy consumption, network connectivity and sensors lifetime. In some IoT use cases, power can be supplied to sensors by way of renewable energy automatic harvesting (solar panels, etc.). Given the high variability of energy arrival processes, energy consumption in sensors, in particular caused by transmissions to the sink, has to be aligned with energy harvesting patterns, so as to maximize throughput while avoiding power outages that may arise when the battery is empty. This paper proposes ODMAC++, an extension to a well-known protocol for sensor transmission scheduling in a WSN. ODMAC++ relies on learning techniques to adapt sensors communication rate to energy harvesting patterns, and uses a beaconing mechanism whose frequency is adjusted based on past measurements on the harvested energy process. Simulations based on analytical energy arrival models and on real solar radiation measurements indicate that ODMAC++ is able to avoid power outages and to cope with battery limitation and energy variations due to variability in time.},
keywords = {Chaire Cisco, Constrained Networks, IoT, Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
Desmouceaux, Yoann; Pfister, Pierre; Tollet, Jerome; Townsley, W. Mark; Clausen, Thomas
SRLB: The Power of Choices in Load Balancing with Segment Routing Proceedings Article
In: In Proceedings of the 37th IEEE International Conference on Distributed Computing Systems (ICDCS), 2017.
Abstract | Links | BibTeX | Tags: Chaire Cisco, dc-optimization, Infrastructure for Big Data, load balancing, segment routing
@inproceedings{Desmouceaux2017b,
title = {SRLB: The Power of Choices in Load Balancing with Segment Routing},
author = {Yoann Desmouceaux and Pierre Pfister and Jerome Tollet and W. Mark Townsley and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2017/05/camera-ready-ieeepdfexpress.pdf},
year = {2017},
date = {2017-06-05},
booktitle = {In Proceedings of the 37th IEEE International Conference on Distributed Computing Systems (ICDCS)},
abstract = {Network load-balancers generally either do not take application state into account, or do so at the cost of a central- ized monitoring system. This paper introduces a load-balancer running exclusively within the IP forwarding plane, i.e. in an application protocol agnostic fashion – yet which still provides application-awareness and makes real-time, decentralized deci- sions. To that end, IPv6 Segment Routing is used to direct data packets from a new flow through a chain of candidate servers, until one decides to accept the connection, based on its local state. This way, applications themselves naturally decide on how to share incoming connections, while incurring minimal network overhead, and no out-of-band signaling.
Tests on different workloads – including realistic workloads such as replaying actual Wikipedia access traffic towards a set of replica Wikipedia instances – show significant performance benefits, in terms of shorter response times, when compared to a traditional random load-balancer.},
keywords = {Chaire Cisco, dc-optimization, Infrastructure for Big Data, load balancing, segment routing},
pubstate = {published},
tppubtype = {inproceedings}
}
Tests on different workloads – including realistic workloads such as replaying actual Wikipedia access traffic towards a set of replica Wikipedia instances – show significant performance benefits, in terms of shorter response times, when compared to a traditional random load-balancer.
Clausen, Thomas; Herberg, Ulrich; Yi, Jiazi
RFC8116: Security Threats to the Optimized Link State Routing Protocol Version 2 (OLSRv2) Miscellaneous
RFC 8116, 2017.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH, OLSR Security, OLSRv2, RFC, Security
@misc{rfc8116,
title = {RFC8116: Security Threats to the Optimized Link State Routing Protocol Version 2 (OLSRv2)},
author = {Thomas Clausen and Ulrich Herberg and Jiazi Yi},
url = {http://www.thomasclausen.net/wp-content/uploads/2017/05/rfc8116.pdf},
doi = {10.17487/rfc8116},
year = {2017},
date = {2017-01-01},
number = {8116},
publisher = {RFC Editor},
series = {Request for Comments},
abstract = {This document analyzes common security threats to the Optimized Link State Routing Protocol version 2 (OLSRv2) and describes their potential impacts on Mobile Ad Hoc Network (MANET) operations. It also analyzes which of these security vulnerabilities can be mitigated when using the mandatory-to-implement security mechanisms for OLSRv2 and how the vulnerabilities are mitigated.},
howpublished = {RFC 8116},
keywords = {Ad-Hoc, MANET, MESH, OLSR Security, OLSRv2, RFC, Security},
pubstate = {published},
tppubtype = {misc}
}
Yi, Jiazi; Parrein, Benoit
RFC8218: Multipath Extension for the Optimized Link State Routing Protocol Version 2 (OLSRv2) Miscellaneous
RFC 8218, 2017.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MP-OLSR, OLSRv2, RFC
@misc{rfc8218,
title = {RFC8218: Multipath Extension for the Optimized Link State Routing Protocol Version 2 (OLSRv2)},
author = {Jiazi Yi and Benoit Parrein},
url = {https://rfc-editor.org/rfc/rfc8218.txt},
doi = {10.17487/RFC8218},
year = {2017},
date = {2017-01-01},
number = {8218},
publisher = {RFC Editor},
series = {Request for Comments},
abstract = {This document specifies a multipath extension for the Optimized Link State Routing Protocol version 2 (OLSRv2) to discover multiple disjoint paths for Mobile Ad Hoc Networks (MANETs). Considering the characteristics of MANETs, especially the dynamic network topology, using multiple paths can increase aggregated throughput and improve the reliability by avoiding single route failures. The interoperability with OLSRv2 is retained.},
howpublished = {RFC 8218},
keywords = {Ad-Hoc, MANET, MP-OLSR, OLSRv2, RFC},
pubstate = {published},
tppubtype = {misc}
}
Clausen, Thomas; Herberg, Ulrich; Yi, Jiazi
Security Threats to the Optimized Link State Routing Protocol Version 2 (OLSRv2) Miscellaneous
RFC 8116, 2017.
Abstract | Links | BibTeX | Tags:
@misc{RFC8116b,
title = {Security Threats to the Optimized Link State Routing Protocol Version 2 (OLSRv2)},
author = {Thomas Clausen and Ulrich Herberg and Jiazi Yi},
url = {https://rfc-editor.org/rfc/rfc8116.txt},
doi = {10.17487/RFC8116},
year = {2017},
date = {2017-01-01},
number = {8116},
publisher = {RFC Editor},
series = {Request for Comments},
abstract = {This document analyzes common security threats to the Optimized Link State Routing Protocol version 2 (OLSRv2) and describes their potential impacts on Mobile Ad Hoc Network (MANET) operations. It also analyzes which of these security vulnerabilities can be mitigated when using the mandatory-to-implement security mechanisms for OLSRv2 and how the vulnerabilities are mitigated.},
howpublished = {RFC 8116},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
2016
Clausen, Thomas; Yi, Jiazi; Herberg, Ulrich
RFC7985: Security Threats to Simplified Multicast Forwarding (SMF) Miscellaneous
IETF - Informational RFC 7985, 2016, ISSN: 2070-1721.
Abstract | Links | BibTeX | Tags: MANET, MESH, RFC, Security, SMF, SMF Security
@misc{RFC7985,
title = {RFC7985: Security Threats to Simplified Multicast Forwarding (SMF)},
author = {Thomas Clausen and Jiazi Yi and Ulrich Herberg},
url = {http://www.thomasclausen.net/wp-content/uploads/2016/11/rfc7985.txt.pdf},
doi = {http://dx.doi.org/10.17487/RFC7985},
issn = {2070-1721},
year = {2016},
date = {2016-11-02},
abstract = {This document analyzes security threats to Simplified Multicast Forwarding (SMF), including vulnerabilities of duplicate packet detection and relay set selection mechanisms. This document is not intended to propose solutions to the threats described. In addition, this document updates RFC 7186 regarding threats to the relay set selection mechanisms using the Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP) (RFC 6130)},
howpublished = {IETF - Informational RFC 7985},
keywords = {MANET, MESH, RFC, Security, SMF, SMF Security},
pubstate = {published},
tppubtype = {misc}
}
Augustin, Aloys; Yi, Jiazi; Clausen, Thomas; Townsley, Mark
A Study of LoRa: Long Range & Low Power Networks for the Internet of Things Journal Article
In: MDPI Sensors, vol. 16, no. 9, pp. 1466, 2016, ISSN: 1424-8220, ((5 yr Impact Factor: 2.437)).
Abstract | Links | BibTeX | Tags: Chaire Cisco, IoT, LLN, LoRA, LPWAN, Sensor Networks
@article{Augustin2016,
title = {A Study of LoRa: Long Range & Low Power Networks for the Internet of Things},
author = {Aloys Augustin and Jiazi Yi and Thomas Clausen and Mark Townsley},
url = {http://www.thomasclausen.net/2016-a-study-of-lora-long-range-low-power-networks-for-the-internet-of-things/},
doi = {10.3390/s16091466},
issn = {1424-8220},
year = {2016},
date = {2016-09-09},
journal = {MDPI Sensors},
volume = {16},
number = {9},
pages = {1466},
abstract = {LoRa is a long-range, low-power, low-bitrate, wireless telecommunications system, promoted as an infrastructure solution for the Internet of Things: end-devices use LoRa across a single wireless hop to communicate to gateway(s), connected to the Internet and which act as transparent bridges and relay messages between these end-devices and a central network server. This paper provides an overview of LoRa and an in-depth analysis of its functional components. The physical and data link layer performance is evaluated by field tests and simulations. Based on the analysis and evaluations, some possible solutions for performance enhancements are proposed.},
note = {(5 yr Impact Factor: 2.437)},
keywords = {Chaire Cisco, IoT, LLN, LoRA, LPWAN, Sensor Networks},
pubstate = {published},
tppubtype = {article}
}
Cordero, Juan Antonio; Lou, Wei
Not So Far: Improving Autonomous Content Discovery and Delivery within Mobile Pedestrian Crowds Proceedings Article
In: Proceedings of the 25th International Conference on Computer Communication and Networks (ICCCN 2016)., 2016, (Accepted).
Abstract | BibTeX | Tags: Broadcast, MANET, MANET Broadcast
@inproceedings{Cordero2016b,
title = {Not So Far: Improving Autonomous Content Discovery and Delivery within Mobile Pedestrian Crowds},
author = {Juan Antonio Cordero and Wei Lou},
year = {2016},
date = {2016-08-01},
publisher = {Proceedings of the 25th International Conference on Computer Communication and Networks (ICCCN 2016).},
abstract = {The explosion of traffic demands in the edge of the Internet, mostly by mobile users, is putting under pressure current networking infrastructure. This is particularly acute when huge amounts of users and active wireless devices gather in reduced geographical spaces, increasing the risk of exceeding planned capacity of deployed infrastructure. This trend motivates research on mechanisms to offload part of the user injected traffic from the access infrastructure networks and reduce the need of Internet requests and retrievals. This paper concentrates on the ability of mobile meshes to fulfill the requests for contents originated within the mesh, with minimal intervention of the Internet access infrastructure. We propose, discuss and evaluate simple heuristics to improve autonomous content discovery and dissemination within such mobile meshes, characterized by high density and low (pedestrian) mobility, by combining notions already explored in the context of MANET routing: deliberate jittering and autonomous overlay pruning based on link distance. Results over synthetic networks and real mobility traces indicate that proposed mechanisms can be easily deployed and are able to improve efficiency and quality of content request discoveries, by reducing significantly the collisions and increasing the stability of discovered paths in crowded mesh pedestrian networks.},
note = {Accepted},
keywords = {Broadcast, MANET, MANET Broadcast},
pubstate = {published},
tppubtype = {inproceedings}
}
Cordero, Juan Antonio
Multi-Path TCP Performance Evaluation in Dual-Homed (Wired/Wireless) Devices Journal Article
In: Journal of Network and Computer Applications , vol. 70, pp. 131-139, 2016, ISSN: 1084-8045.
Abstract | Links | BibTeX | Tags: Internet Measurements, MP-TCP, Performance Evaluation, Wireless Transport
@article{Cordero2016,
title = {Multi-Path TCP Performance Evaluation in Dual-Homed (Wired/Wireless) Devices},
author = {Juan Antonio Cordero},
url = {https://www.epizeuxis.net/wp-content/uploads/2019/11/Multi-Path_TCP_Performance_Evaluation_in-1.pdf
http://www.sciencedirect.com/science/article/pii/S1084804516300819},
doi = {10.1016/j.jnca.2016.05.004},
issn = {1084-8045},
year = {2016},
date = {2016-07-01},
journal = {Journal of Network and Computer Applications },
volume = {70},
pages = {131-139},
abstract = {Multipath TCP is a major extension of TCP, designed for leveraging the increasing availability of multiple interfaces in end hosts, on one side, and the existence of diverse Internet paths between hosts, on the other. This paper proposes a measurement methodology and provides a first evaluation, based on real Internet experiments, of the user benefit of using MPTCP instead of TCP in devices with multiple wireless/wired networking interfaces. We focus on bandwidth utilization and file transfer delays. Our experiments, on a testbed with two disjoint paths connecting a server and a dual-homed probe, indicate that MPTCP is able, in most cases, to take advantage of additional bandwidth with limited cost in terms of delay, but also show that the MPTCP bandwidth benefit substantially degrades when the interfaces have very different bandwidth capacities.},
keywords = {Internet Measurements, MP-TCP, Performance Evaluation, Wireless Transport},
pubstate = {published},
tppubtype = {article}
}
Jin, Kaiwan; Pfister, Pierre; Yi, Jiazi
Distributed Node Consensus Protocol: Analysis, Evaluation and Performance Proceedings Article
In: Proceedings of the IEEE International Conference on Communications (ICC) 2016, 2016.
Abstract | Links | BibTeX | Tags: Chaire Cisco, DNCP, Homenet, MESH
@inproceedings{Jin2016,
title = {Distributed Node Consensus Protocol: Analysis, Evaluation and Performance},
author = {Kaiwan Jin and Pierre Pfister and Jiazi Yi},
doi = {10.1109/ICC. 2016.7510939},
year = {2016},
date = {2016-05-23},
publisher = {Proceedings of the IEEE International Conference on Communications (ICC) 2016},
abstract = {Abstract—This paper analyzes and evaluates the Distributed Node Consensus Protocol (DNCP), a state synchronization mech- anism developed by the IETF Homenet working group. DNCP enables network function automation for home networks, which are growing in size and complexity. The basic mechanisms of DNCP are studied in this paper, including the state abstraction, synchronization process and keep-alive mechanism. The over- head is analyzed in single-link topology type. To evaluate the performance of DNCP in more complex scenarios, a reference implementation of DNCP is integrated into ns3 simulator. The convergence time and transmission overhead in various topology types are measured. Based on the obtained results, the correctness of DNCP is verified, and the behavior of DNCP can be concluded.},
keywords = {Chaire Cisco, DNCP, Homenet, MESH},
pubstate = {published},
tppubtype = {inproceedings}
}
Herberg, Ulrich; Cole, Robert G.; Chakeres, Ian; Clausen, Thomas
RFC7939: Definition of Managed Objects for the Neighborhood Discovery Protocol Miscellaneous
IETF - Proposed Standard RFC 7939, 2016, ISSN: 2070-1721.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH, MIB, Network Management, NHDP, OLSRv2, RFC
@misc{RFC7939,
title = {RFC7939: Definition of Managed Objects for the Neighborhood Discovery Protocol},
author = {Ulrich Herberg and Robert G. Cole and Ian Chakeres and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2016/09/RFC7939.pdf},
doi = {10.17487/rfc7939},
issn = {2070-1721},
year = {2016},
date = {2016-01-01},
number = {7939},
publisher = {RFC Editor},
series = {Request for Comments},
abstract = {This document replaces RFC 6779; it contains revisions and extensions to the original document. It defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes objects for configuring parameters of the Neighborhood Discovery Protocol (NHDP) process on a router. The extensions described in this document add objects and values to support the NHDP optimization specified in RFC 7466. The MIB module defined in this document, denoted NHDP-MIB, also reports state, performance information, and notifications about NHDP. This additional state and performance information is useful to troubleshoot problems and performance issues during neighbor discovery.},
howpublished = {IETF - Proposed Standard RFC 7939},
keywords = {Ad-Hoc, MANET, MESH, MIB, Network Management, NHDP, OLSRv2, RFC},
pubstate = {published},
tppubtype = {misc}
}
2015
Dearlove, Christopher; Clausen, Thomas
RFC7722: Multi-Topology Extension for the Optimized Link State Routing Protocol Version 2 (OLSRv2) Miscellaneous
IETF - Experimental RFC 7722, 2015, ISSN: 2070-1721, (http://tools.ietf.org/html/rfc7722).
Abstract | Links | BibTeX | Tags: Ad-Hoc, IETF, MANET, MESH, OLSRv2, RFC
@misc{RFC7722,
title = {RFC7722: Multi-Topology Extension for the Optimized Link State Routing Protocol Version 2 (OLSRv2)},
author = {Christopher Dearlove and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/rfc7722.txt.pdf},
doi = {10.17487/RFC7722},
issn = {2070-1721},
year = {2015},
date = {2015-12-31},
abstract = {This specification describes an extension to the Optimized Link State Routing Protocol version 2 (OLSRv2) to support multiple routing topologies, while retaining interoperability with OLSRv2 routers that do not implement this extension. This specification updates RFCs 7188 and 7631 by modifying and extending TLV registries and descriptions.},
howpublished = {IETF - Experimental RFC 7722},
note = {http://tools.ietf.org/html/rfc7722},
keywords = {Ad-Hoc, IETF, MANET, MESH, OLSRv2, RFC},
pubstate = {published},
tppubtype = {misc}
}
Toubaline, Sonia; Poirion, Pierre-Louis; D’Ambrosio, Claudia; Liberti, Leo
Observing the State of a Smart Grid Using Bilevel Programming Proceedings Article
In: In Proceeding of the 9th Annual International Conference on Combinatorial Optimization and Applications (COCOA'15),, LNCS 9486, 364-376, 2015.
Abstract | Links | BibTeX | Tags: Optimisation, Smart Grid, SOGRID
@inproceedings{Toubaline2015,
title = {Observing the State of a Smart Grid Using Bilevel Programming},
author = {Sonia Toubaline and Pierre-Louis Poirion and Claudia D’Ambrosio and Leo Liberti},
url = {https://epizeuxis.net/site/wp-content/uploads/2016/01/cocoa15a.pdf},
year = {2015},
date = {2015-12-18},
booktitle = {In Proceeding of the 9th Annual International Conference on Combinatorial Optimization and Applications (COCOA'15),},
publisher = {LNCS 9486, 364-376},
abstract = {Monitoring an electrical network is an important and chal- lenging task. Phasor measurement units are measurement devices that can be used for a state estimation of this network. In this paper we consider a PMU placement problem without conventional measurements and with zero injection nodes for a full observability of the network. We propose two new approaches to model this problem, which take into ac- count a propagation rule based on Ohm’s and Kirchoff’s law. The natural binary linear programming description models an iterative observability process. We remove the iteration by reformulating its fixed point con- ditions to a bilevel program, which we then further reformulate to a single-level mixed-integer linear program. We also present a bilevel al- gorithm to solve directly the proposed bilevel model. We implemented and tested our models and algorithm: the results show that the bilevel algorithm is better in terms of running time and size of instances which can be solved.},
keywords = {Optimisation, Smart Grid, SOGRID},
pubstate = {published},
tppubtype = {inproceedings}
}
Clausen, Thomas; Dearlove, Christopher
RFC7631 – TLV Naming in the Mobile Ad Hoc Network (MANET) Generalized Packet/Message Format Miscellaneous
IETF - Proposed Standard RFC 7631, 2015, ISSN: 2070-1721, (http://tools.ietf.org/html/rfc7631).
Abstract | Links | BibTeX | Tags: Ad-Hoc, IETF, MANET, MESH, OLSRv2, RFC, Standard
@misc{RFC7631,
title = {RFC7631 – TLV Naming in the Mobile Ad Hoc Network (MANET) Generalized Packet/Message Format},
author = {Thomas Clausen and Christopher Dearlove},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/rfc7631.txt.pdf},
doi = {10.17487/RFC7631},
issn = {2070-1721},
year = {2015},
date = {2015-09-01},
abstract = {This document reorganizes the naming of already-allocated TLV (type-length-value) types and type extensions in the "Mobile Ad hoc NETwork (MANET) Parameters" registries defined by RFC 5444 to use names appropriately. It has no consequences in terms of any protocol implementation. This document also updates the Expert Review guidelines in RFC 5444, so as to establish a policy for consistent naming of future TLV type and type extension allocations. It makes no other changes to RFC 5444.},
howpublished = {IETF - Proposed Standard RFC 7631},
note = {http://tools.ietf.org/html/rfc7631},
keywords = {Ad-Hoc, IETF, MANET, MESH, OLSRv2, RFC, Standard},
pubstate = {published},
tppubtype = {misc}
}