2024
Cordero, Juan Antonio
AIvolution, Assessing the Potential and Impact of AI and Digital Technologies in the EU Proceedings Article Forthcoming
In: Proc. of the IEEE International Symposium on Technology and Society (ISTAS 2024) , IEEE, Forthcoming.
@inproceedings{nokey,
title = {AIvolution, Assessing the Potential and Impact of AI and Digital Technologies in the EU},
author = {Juan Antonio Cordero},
year = {2024},
date = {2024-09-18},
urldate = {2024-09-18},
booktitle = {Proc. of the IEEE International Symposium on Technology and Society (ISTAS 2024) },
publisher = {IEEE},
abstract = {As automation and digitalisation become more pervasive, understanding their social implications, opportunities and risks, as well as appropriate policies and regulatory needs, require increasing inter-disciplinary efforts.
This paper describes the motivation, format and outcomes of the AIvolution event about AI and digital technologies, organized in the European Parliament (EP) on November 2023, for that purpose.
It presents the main topics addressed, the key contributions that were presented, the discussions that took place, and the main takeaways, as well as the perspectives to continue these exchanges in further initiatives.},
keywords = {},
pubstate = {forthcoming},
tppubtype = {inproceedings}
}
This paper describes the motivation, format and outcomes of the AIvolution event about AI and digital technologies, organized in the European Parliament (EP) on November 2023, for that purpose.
It presents the main topics addressed, the key contributions that were presented, the discussions that took place, and the main takeaways, as well as the perspectives to continue these exchanges in further initiatives.
2023
Cordero, Juan Antonio
On the Dynamics of Single-Orbit Requester-Provider Systems Proceedings Article
In: ACM, (Ed.): Proc. 26th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'2023), ACM, 2023.
@inproceedings{nokey,
title = {On the Dynamics of Single-Orbit Requester-Provider Systems},
author = {Juan Antonio Cordero},
editor = {ACM},
url = {https://dl.acm.org/doi/10.1145/3616388.3617517},
doi = {10.1145/3616388.3617517},
year = {2023},
date = {2023-10-30},
urldate = {2023-10-30},
booktitle = {Proc. 26th ACM International Conference on Modeling, Analysis
and Simulation of Wireless and Mobile Systems (MSWiM'2023)},
publisher = {ACM},
abstract = {This paper considers decentralized systems of multiple agents that interact in order to perform distributed computing or efficient information transfer in variant, constrained environments. These systems appear in various relevant use cases, including reliable multicast distribution, or dynamic resource allocation in systems in the Internet edge (datacenters, IOT deployments). This paper introduces an abstract, mathematical model, that allows to study analytically the behavior of these systems, as a set of interacting requesters and providers. The paper describes system orbits, and concentrates on the study of single-orbit systems. Ergodicity of system behavior in the single-orbit case is proved, and a full description of the stationary system behavior is derived. Closed expressions of the stationary distribution of requester decisions are provided. Analytical results are validated through extensive simulations. These single-orbit results are a necessary step for the analysis and further optimization of dynamic performance of these systems.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Morales, Jesús A. Cumana; Coupechoux, Marceau; Cordero, Juan Antonio
Metasurface for Enhanced Millimeter-Wave Communications under Imperfect Beam Alignment Proceedings Article Forthcoming
In: Proc. IEEE International Mediterranean Conference on Communications and Networking (MeditCom'2023), IEEE, Forthcoming.
@inproceedings{nokey,
title = {Metasurface for Enhanced Millimeter-Wave Communications under Imperfect Beam Alignment},
author = {Jesús A. Cumana Morales and Marceau Coupechoux and Juan Antonio Cordero},
year = {2023},
date = {2023-09-04},
urldate = {2023-09-04},
booktitle = {Proc. IEEE International Mediterranean Conference on Communications and Networking (MeditCom'2023)},
publisher = {IEEE},
abstract = {In this work, we investigate the impact of beam misalignment in the performance of a wireless system employing a metasurface to improve coverage in a non-line-of-sight (NLOS) scenario. The metasurface is modeled by an array of small radiating elements each of them terminated with a complex load. An equivalent Array Factor is defined, which allows visualizing the beamsteering properties of the metasurface in far-field conditions. Angular misalignment is modeled using a truncated Gaussian distribution and an expression to evaluate signal-to-noise ratio (SNR) in the presence of misalignment is derived. Numerical results show an SNR degradation close to 8 dB for 5° error magnitude and up to 14 dB if high-gain unit cells are used. Three mechanisms are explored, which can be used to reduce SNR degradation: increasing Metasurface dimensions allows recovering SNR by 7.4 dB, low unit cell gain allows improving SNR by close to 10.5 dB when compared to a high-gain cell and base station beamwidth decrease from 25.6° to 12.7° allows recovering SNR by 4 dB thanks to the higher BS beam gain. },
keywords = {},
pubstate = {forthcoming},
tppubtype = {inproceedings}
}
Feltin, Thomas; Cordero, Juan Antonio; Clausen, Thomas Heide; Brockners, Frank
Understanding Semantics in Feature Selection for Fault Diagnosis in Network Telemetry Data Proceedings Article
In: IEEE, (Ed.): Proc. IEEE/IFIP Network Operations and Management Symposium 2023, IEEE, 2023.
@inproceedings{nokey,
title = {Understanding Semantics in Feature Selection for Fault Diagnosis in Network Telemetry Data},
author = {Thomas Feltin and Juan Antonio Cordero and Thomas Heide Clausen and Frank Brockners},
editor = {IEEE},
url = {https://www.epizeuxis.net/wp-content/uploads/2023/06/2023009866.pdf},
year = {2023},
date = {2023-05-08},
urldate = {2023-05-08},
booktitle = {Proc. IEEE/IFIP Network Operations and Management Symposium 2023},
publisher = {IEEE},
abstract = {Expert systems for fault diagnosis are computationally expensive to build and maintain, and lack scalability and inherent adaptability to unknown events or modifications in the topology of the monitored system. While data-driven feature se- lection mechanisms can facilitate diagnosis without the hardship of developing and maintaining expert systems, purely data-driven mechanisms lack understanding of semantic importance within a feature set, and would benefit from additional domain knowledge. Part of this additional knowledge can be extracted from meta-data. The proposed approach combines data-driven metrics and semantic information contained in the feature names to produce selections of features which best represent an underlying event. This study extends a cross entropy based optimization method to join semantic importance with data behavior. A benchmarking architecture is introduced to evaluate the benefits of semantic analysis, and demonstrate the performance and robustness of semantic feature selection on different types of faults in network telemetry datasets, modeled with the YANG data modeling language. The results illustrate the interest of such a complementary meta-data analysis for data-driven fault diagnosis, and highlight the robustness of the studied approach against variations in the input feature set.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2022
Yao, Zhiyuan; Ding, Zihan
Learning Distributed and Fair Policies for Network Load Balancing as Markov Potentia Game Proceedings Article
In: 36th Conference on Neural Information Processing Systems (NeurIPS 2022), 2022.
@inproceedings{nokeyj,
title = {Learning Distributed and Fair Policies for Network Load Balancing as Markov Potentia Game},
author = {Zhiyuan Yao and Zihan Ding},
url = {https://arxiv.org/pdf/2206.01451},
year = {2022},
date = {2022-11-28},
urldate = {2022-11-28},
booktitle = {36th Conference on Neural Information Processing Systems (NeurIPS 2022)},
abstract = {This paper investigates the network load balancing problem in data centers (DCs) where multiple load balancers (LBs) are deployed, using the multi-agent reinforcement learning (MARL) framework. The challenges of this problem consist of the heterogeneous processing architecture and dynamic environments, as well as limited and partial observability of each LB agent in distributed networking systems, which can largely degrade the performance of in-production load balancing algorithms in real-world setups. Centralised-training-decentralised-execution (CTDE) RL scheme has been proposed to improve MARL performance, yet it incurs -- especially in distributed networking systems, which prefer distributed and plug-and-play design scheme -- additional communication and management overhead among agents. We formulate the multi-agent load balancing problem as a Markov potential game, with a carefully and properly designed workload distribution fairness as the potential function. A fully distributed MARL algorithm is proposed to approximate the Nash equilibrium of the game. Experimental evaluations involve both an event-driven simulator and real-world system, where the proposed MARL load balancing algorithm shows close-to-optimal performance in simulations, and superior results over in-production LBs in the real-world system.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Yao, Zhiyuan; Desmouceaux, Yoann; Cordero, Juan Antonio; Townsley, Mark; Clausen, Thomas Heide
Efficient Data-Driven Network Functions Proceedings Article
In: 30th International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2022), 2022.
@inproceedings{nokeyg,
title = {Efficient Data-Driven Network Functions},
author = {Zhiyuan Yao and Yoann Desmouceaux and Juan Antonio Cordero and Mark Townsley and Thomas Heide Clausen},
url = {https://arxiv.org/pdf/2208.11385},
year = {2022},
date = {2022-10-18},
urldate = {2022-10-18},
booktitle = {30th International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2022)},
abstract = {Cloud environments require dynamic and adaptive networking policies. It is preferred to use heuristics over advanced learning algorithms in Virtual Network Functions (VNFs) in production becuase of high-performance constraints. This paper proposes Aquarius to passively yet efficiently gather observations and enable the use of machine learning to collect, infer, and supply accurate networking state information-without incurring additional signalling and management overhead. This paper illustrates the use of Aquarius with a traffic classifier, an autoscaling system, and a load balancer-and demonstrates the use of three different machine learning paradigms-unsupervised, supervised, and reinforcement learning, within Aquarius, for inferring network state. Testbed evaluations show that Aquarius increases network state visibility and brings notable performance gains with low overhead.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Yao, Zhiyuan; Ding, Zihan; Clausen, Thomas Heide
Multi-agent reinforcement learning for network load balancing in data center Proceedings Article
In: 31st ACM International Conference on Information and Knowledge Management (CIKM'22), 2022.
@inproceedings{nokeyh,
title = {Multi-agent reinforcement learning for network load balancing in data center},
author = {Zhiyuan Yao and Zihan Ding and Thomas Heide Clausen},
url = {https://www.researchgate.net/profile/Zhiyuan_Yao13/publication/358163217_Multi-Agent_Reinforcement_Learning_for_Network_Load_Balancing_in_Data_Center/links/62fe5fd3e3c7de4c34666311/Multi-Agent-Reinforcement-Learning-for-Network-Load-Balancing-in-Data-Center.pdf},
doi = {10.1145/3511808.3557133},
year = {2022},
date = {2022-10-17},
urldate = {2022-10-17},
booktitle = {31st ACM International Conference on Information and Knowledge Management (CIKM'22)},
abstract = {This paper presents the network load balancing problem, a challenging real-world task for multi-agent reinforcement learning (MARL) methods. Conventional heuristic solutions like Weighted-Cost Multi-Path (WCMP) and Local Shortest Queue (LSQ) are less flexible to the changing workload distributions and arrival rates, with a poor balance among multiple load balancers. The cooperative network load balancing task is formulated as a Dec-POMDP problem, which naturally induces the MARL methods. To bridge the reality gap for applying learning-based methods, all models are directly trained and evaluated on a real-world system from moderate- to large-scale setups. Experimental evaluations show that the independent and “selfish” load balancing strategies are not necessarily the globally optimal ones, while the proposed MARL solution has a superior performance over different realistic settings. Additionally, the potential difficulties of the application and deployment of MARL methods for network load balancing are analysed, which helps draw the attention of the learning and network communities to such challenges.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Dowling, Benjamin; Günther, Felix; Poirrier, Alexandre
Continuous Authentication in Secure Messaging Proceedings Article
In: Atluri, Vijayalakshmi; Pietro, Roberto Di; Jensen, Christian D.; Meng, Weizhi (Ed.): Lecture Notes in Computer Science, pp. 361–381, Springer Nature Switzerland, Cham, 2022, ISBN: 978-3-031-17146-8.
@inproceedings{dowling2022continuous,
title = {Continuous Authentication in Secure Messaging},
author = {Benjamin Dowling and Felix Günther and Alexandre Poirrier},
editor = {Vijayalakshmi Atluri
and Roberto Di Pietro
and Christian D. Jensen
and Weizhi Meng},
url = {https://link.springer.com/chapter/10.1007/978-3-031-17146-8_18},
doi = {10.1007/978-3-031-17146-8_18},
isbn = {978-3-031-17146-8},
year = {2022},
date = {2022-09-22},
urldate = {2022-09-22},
booktitle = {Lecture Notes in Computer Science},
volume = {13555},
pages = {361--381},
publisher = {Springer Nature Switzerland},
address = {Cham},
series = {Computer Security – ESORICS 2022},
abstract = {Secure messaging schemes such as the Signal protocol rely on out-of-band channels to verify the authenticity of long-running communication. Such out-of-band checks however are only rarely actually performed by users in practice.
In this paper, we propose a new method for performing continuous authentication during a secure messaging session, without the need for an out-of-band channel. Leveraging the users’ long-term secrets, our Authentication Steps extension guarantees authenticity as long as long-term secrets are not compromised, strengthening Signal’s post-compromise security. Our mechanism further allows to detect a potential compromise of long-term secrets after the fact via an out-of-band channel.
Our protocol comes with a novel, formal security definition capturing continuous authentication, a general construction for Signal-like protocols, and a security proof for the proposed instantiation. We further provide a prototype implementation which seamlessly integrates on top of the official Signal Java library, together with bandwidth and storage overhead benchmarks.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
In this paper, we propose a new method for performing continuous authentication during a secure messaging session, without the need for an out-of-band channel. Leveraging the users’ long-term secrets, our Authentication Steps extension guarantees authenticity as long as long-term secrets are not compromised, strengthening Signal’s post-compromise security. Our mechanism further allows to detect a potential compromise of long-term secrets after the fact via an out-of-band channel.
Our protocol comes with a novel, formal security definition capturing continuous authentication, a general construction for Signal-like protocols, and a security proof for the proposed instantiation. We further provide a prototype implementation which seamlessly integrates on top of the official Signal Java library, together with bandwidth and storage overhead benchmarks.
Haddad, Rami; Melki, Reem; Cosma, Serban
OpenAPI Extended Security Scheme: A Method to Reduce the Prevalence of BOLA Proceedings Article
In: API Specifications Conference (ASC), OpenAPI Initiative 2022.
@inproceedings{nokey,
title = {OpenAPI Extended Security Scheme: A Method to Reduce the Prevalence of BOLA},
author = {Rami Haddad and Reem Melki and Serban Cosma},
year = {2022},
date = {2022-09-19},
urldate = {2022-09-19},
booktitle = {API Specifications Conference (ASC)},
organization = {OpenAPI Initiative},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Cordero, Juan Antonio
Réactivité, efficacité et apprentissage: problèmes d’aide à la prise de décision dans des réseaux décentralisés Proceedings Article
In: 23ème Congrès de la ROADEF, Société Française de Recherche Opérationnelle et d'Aide à la Décision (ROADEF) 2022.
@inproceedings{nokey,
title = {Réactivité, efficacité et apprentissage: problèmes d’aide à la prise de décision dans des réseaux décentralisés},
author = {Juan Antonio Cordero},
year = {2022},
date = {2022-02-23},
urldate = {2022-02-23},
booktitle = {23ème Congrès de la ROADEF},
organization = {Société Française de Recherche Opérationnelle et d'Aide à la Décision (ROADEF)},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2021
Yao, Zhiyuan; Ding, Zihan; Clausen, Thomas Heide
Reinforced Workload Distribution Fairness Proceedings Article
In: Machine Learning for Systems at 35th Conference on Neural Information Processing Systems (NeurIPS 2021), 2021.
@inproceedings{yao2021reinforced,
title = {Reinforced Workload Distribution Fairness},
author = {Zhiyuan Yao and Zihan Ding and Thomas Heide Clausen},
url = {https://www.thomasclausen.net/wp-content/uploads/2021/11/2111.00008-1.pdf},
year = {2021},
date = {2021-12-01},
urldate = {2021-12-01},
booktitle = {Machine Learning for Systems at 35th Conference on Neural Information Processing Systems (NeurIPS 2021)},
abstract = {Network load balancers are central components in data centers, that distributes workloads across multiple servers and thereby contribute to offering scalable services. However, when load balancers operate in dynamic environments with limited monitoring of application server loads, they rely on heuristic algorithms that require manual configurations for fairness and performance. To alleviate that, this paper proposes a distributed asynchronous reinforcement learning mechanism to-with no active load balancer state monitoring and limited network observations-improve the fairness of the workload distribution achieved by a load balancer. The performance of proposed mechanism is evaluated and compared with stateof-the-art load balancing algorithms in a simulator, under configurations with progressively increasing complexities. Preliminary results show promise in RLbased load balancing algorithms, and identify additional challenges and future research directions, including reward function design and model scalability.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Yao, Zhiyuan; Desmouceaux, Yoann; Townsley, Mark; Clausen, Thomas Heide
Towards Intelligent Load Balancing in Data Centers Proceedings Article
In: Machine Learning for Systems at 35th Conference on Neural Information Processing Systems (NeurIPS 2021), Dec 2021, Sydney, Australia, 2021.
@inproceedings{yao2021intelligent,
title = {Towards Intelligent Load Balancing in Data Centers},
author = {Zhiyuan Yao and Yoann Desmouceaux and Mark Townsley and Thomas Heide Clausen},
url = {https://www.thomasclausen.net/wp-content/uploads/2021/11/2110.15788.pdf},
year = {2021},
date = {2021-12-01},
urldate = {2021-12-01},
booktitle = {Machine Learning for Systems at 35th Conference on Neural Information Processing Systems (NeurIPS 2021), Dec 2021, Sydney, Australia},
abstract = {Network load balancers are important components in data centers to provide scalable services. Workload distribution algorithms are based on heuristics, e.g., Equal-Cost Multi-Path (ECMP), Weighted-Cost Multi-Path (WCMP) or naive machine learning (ML) algorithms, e.g., ridge regression. Advanced ML-based approaches help achieve performance gain in different networking and system problems. However, it is challenging to apply ML algorithms on networking problems in real-life systems. It requires domain knowledge to collect features from low-latency, high-throughput, and scalable networking systems, which are dynamic and heterogenous. This paper proposes Aquarius to bridge the gap between ML and networking systems and demonstrates its usage in the context of network load balancers. This paper demonstrates its ability of conducting both offline data analysis and online model deployment in realistic systems. The results show that the ML model trained and deployed using Aquarius improves load balancing performance yet they also reveals more challenges to be resolved to apply ML for networking systems.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Rizzi, Carmine; Yao, Zhiyuan; Desmouceaux, Yoann; Townsley, Mark; Clausen, Thomas Heide
Charon: Load-Aware Load-Balancing in P4 Proceedings Article
In: 1st Joint International Workshop on Network Programmability & Automation (NetPA) at 17th International Conference on Network and Service Management (CNSM 2021),, 2021.
@inproceedings{rizzi2021charon,
title = {Charon: Load-Aware Load-Balancing in P4},
author = {Carmine Rizzi and Zhiyuan Yao and Yoann Desmouceaux and Mark Townsley and Thomas Heide Clausen},
url = {https://www.thomasclausen.net/wp-content/uploads/2021/11/2110.14389.pdf},
year = {2021},
date = {2021-10-01},
urldate = {2021-01-01},
booktitle = {1st Joint International Workshop on Network Programmability & Automation (NetPA) at 17th International Conference on Network and Service Management (CNSM 2021),},
abstract = {Load-Balancers play an important role in data centers as they distribute network flows across application servers and guarantee per-connection consistency. It is hard however to make fair load balancing decisions so that all resources are efficiently occupied yet not overloaded. Tracking connection states allows to infer server load states and make informed decisions, but at the cost of additional memory space consumption. This makes it hard to implement on programmable hardware, which has constrained memory but offers line-rate performance. This paper presents Charon, a stateless load-aware load balancer that has line-rate performance implemented in P4-NetFPGA. Charon passively collects load states from application servers and employs the power-of-2-choices scheme to make data-driven load balancing decisions and improve resource utilization. Perconnection consistency is preserved statelessly by encoding server ID in a covert channel. The prototype design and implementation details are described in this paper. Simulation results show performance gains in terms of load distribution fairness, quality of service, throughput and processing latency.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Hawari, Mohammed; Clausen, Thomas
OP4T: Bringing Advanced Network Packet Timestamping into the Field Proceedings Article
In: 2021 International Conference on Information Networking (ICOIN), pp. 137-142, 2021.
@inproceedings{Hawari2021,
title = {OP4T: Bringing Advanced Network Packet Timestamping into the Field},
author = {Mohammed Hawari and Thomas Clausen},
url = {https://www.thomasclausen.net/wp-content/uploads/2021/03/paper.pdf},
doi = {10.1109/ICOIN50884.2021.9333927},
year = {2021},
date = {2021-01-13},
booktitle = {2021 International Conference on Information Networking (ICOIN)},
pages = {137-142},
abstract = {Because it is very bursty, the microsecond-scale temporal behaviour of network traffic in data-centres is chal- lenging to measure and understand. To bring observability into data-centre networks, this paper introduces the Open Platform for Programmable Precise Packet Timestamping (OP4T), a hardware architecture, targeting Field-Programmable Gateway Arrays (FPGAs), integrated into data-centre servers as a Smart Network Interface Card (SmartNIC), and flexible enough to enable advanced latency diagnosis.
In this paper, OP4T is specified, and an open-source im- plementation of that architecture is proposed, targeting the NetFPGA SUME prototyping board. By leveraging the P4 programming language, and partial reconfiguration, that open- source implementation is experimentally shown to enable in-band, precise packet timestamping, without sacrificing the achievable throughput. As an illustration, OP4T is shown to be usable to measure fine-grained properties of a software packet forwarder, e.g., packet batching.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
In this paper, OP4T is specified, and an open-source im- plementation of that architecture is proposed, targeting the NetFPGA SUME prototyping board. By leveraging the P4 programming language, and partial reconfiguration, that open- source implementation is experimentally shown to enable in-band, precise packet timestamping, without sacrificing the achievable throughput. As an illustration, OP4T is shown to be usable to measure fine-grained properties of a software packet forwarder, e.g., packet batching.
2020
Feltin, Thomas; Foroughi, Parisa; Shao, Wenqin; Brockners, Frank; Clausen, Thomas
Semantic feature selection for network telemetry event description Proceedings Article
In: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, pp. 1-6, 2020, ISBN: 2374-9709.
@inproceedings{Feltin2020,
title = {Semantic feature selection for network telemetry event description},
author = {Thomas Feltin and Parisa Foroughi and Wenqin Shao and Frank Brockners and Thomas Clausen},
url = {https://www.thomasclausen.net/wp-content/uploads/2020/08/AnNet20201-1.pdf},
doi = {10.1109/NOMS47738.2020.9110382},
isbn = {2374-9709},
year = {2020},
date = {2020-04-20},
booktitle = {NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium},
pages = {1-6},
abstract = {Model driven telemetry (MDT) enables the real-time collection of hundreds of thousands of counters on large-scale networks, with contextual information to each counter provided in the telemetry data structure definition. Explaining network events in such datasets implies substantial analysis by a domain expert. This paper presents an semantic feature selection method, to find the most important counters which describe a given event in a telemetry dataset, and facilitate the explanation process. This paper proposes a metric for estimating the importance of features in a dataset with descriptive feature names, to find those that are most meaningful to a human. With this estimation, this paper presents a cross-entropy based metric describing the quality of a selection of counters, which is combined with the data behavior to define an optimization goal. The computation of optimal selections distills intelligible and precise selections of counters with adjustable verbosity, and describes events with a few selected counters outlining the root cause of network events.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2019
Cordero, Juan Antonio; Lou, Wei
Modeling Dynamic Resource Allocation in the Edge Proceedings Article
In: Proceedings of the 8th IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN'2019). , IEEE, 2019.
@inproceedings{Cordero2019,
title = { Modeling Dynamic Resource Allocation in the Edge},
author = {Juan Antonio Cordero and Wei Lou},
year = {2019},
date = {2019-11-26},
urldate = {2019-11-26},
booktitle = {Proceedings of the 8th IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN'2019).
},
publisher = {IEEE},
abstract = {Edge computing technologies and integrated archi- tectures have been deployed to accommodate Internet traffic growth. These architectures include facilities (cloudlets, micro DCs) to cache and serve contents close to consumers. Resulting systems adapt to observed request/consumption patterns by allowing cloudlet coordination for content caching/dissemination. This paper presents a novel analytical model of transient dy- namics of the cloudlets set. The model is used to study system convergence, stability and delivered content locality. Results from this model are validated via simulations.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2018
Desmouceaux, Yoann; Townsley, Mark; Clausen, Thomas
Zero-Loss Virtual Machine Migration with IPv6 Segment Routing Proceedings Article
In: Proceedings 1st SR+SFC Workshop at IEEE CNSM, 2018.
@inproceedings{Desmouceaux2018e,
title = {Zero-Loss Virtual Machine Migration with IPv6 Segment Routing},
author = {Yoann Desmouceaux and Mark Townsley and Thomas Clausen},
url = {https://www.thomasclausen.net/wp-content/uploads/2019/11/Zero-Loss-Virtual-Machine-Migration-with-Segment-Routing.pdf},
year = {2018},
date = {2018-11-01},
booktitle = {Proceedings 1st SR+SFC Workshop at IEEE CNSM},
abstract = {With the development of large-scale data centers, Virtual Machine (VM) migration is a key component for resource optimization, cost reduction, and maintenance. From a network perspective, traditional VM migration mechanisms rely on the hypervisor running at the destination host advertising the new location of the VM once migration is complete. However, this creates a period of time during which the VM is not reachable, yielding packet loss.
This paper introduces a method to perform zero-loss VM migration by using IPv6 Segment Routing (SR). Rather than letting the hypervisor update a locator mapping after VM migration is complete, a logical path consisting of the source and destination hosts is pre-provisioned. Packets destined to the migrating VM are sent through this path using SR, shortly before, during, and shortly after migration – the virtual router on the source host being in charge of forwarding packets locally if the VM migration has not completed yet, or to the destination host otherwise. The proposed mechanism is implemented as a VPP plugin, and feasibility of zero-loss VM migration is demonstrated with various workloads. Evaluation shows that this yields benefits in terms of session opening latency and TCP throughput.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
This paper introduces a method to perform zero-loss VM migration by using IPv6 Segment Routing (SR). Rather than letting the hypervisor update a locator mapping after VM migration is complete, a logical path consisting of the source and destination hosts is pre-provisioned. Packets destined to the migrating VM are sent through this path using SR, shortly before, during, and shortly after migration – the virtual router on the source host being in charge of forwarding packets locally if the VM migration has not completed yet, or to the destination host otherwise. The proposed mechanism is implemented as a VPP plugin, and feasibility of zero-loss VM migration is demonstrated with various workloads. Evaluation shows that this yields benefits in terms of session opening latency and TCP throughput.
Pit--Claudel, Benoit; Desmouceaux, Yoann; Pfister, Pierre; Townsley, Mark; Clausen, Thomas
Stateless Load-Aware Load Balancing in P4 Proceedings Article
In: 1st P4 European Workshop (P4EU), 2018.
@inproceedings{Pit--Claudel2018,
title = {Stateless Load-Aware Load Balancing in P4},
author = {Benoit Pit--Claudel and Yoann Desmouceaux and Pierre Pfister and Mark Townsley and Thomas Clausen},
url = {http://www.thomasclausen.net/en/p4eu-2018/},
year = {2018},
date = {2018-09-24},
publisher = {1st P4 European Workshop (P4EU)},
abstract = {Leveraging the performance opportunities offered by programmable hardware, stateless load-balancing architectures allowing line-rate processing are appealing. Moreover, it has been demonstrated that significantly fairer load-balancing can be achieved by an architecture that considers the actual load of application instances when dispatching connection requests. Architectures which maintain per-connection state for resiliency and/or track application load state for fairness are, however, at odds with hardware-imposed memory constraints. Thus, a desirable load-balancer for programmable hardware would be both stateless and able to dispatch queries to application instances according to their current load.
This paper presents SHELL, a stateless application-aware load-balancer combining (i) a power-of-choices scheme using IPv6 Segment Routing to dispatch new flows to a suitable application instance from among multiple candidates, and (ii) the use of a covert channel to record/report which flow was assigned to which candidate in a stateless fashion. In addition, consistent hashing versioning is used to ensure that connections are maintained to the correct application instance, using Segment Routing to “browse” through the history when needed. The stateless design of SHELL makes it suitable for hardware implementation, and this paper describes the implementation of a P4-NetFPGA prototype. A performance evaluation of this SHELL implementation demonstrates throughput and latency characteristics comparable to other stateless load-balancing implementations, while enabling application instance-load-aware dispatching and significantly increasing per-connection consistency resiliency.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
This paper presents SHELL, a stateless application-aware load-balancer combining (i) a power-of-choices scheme using IPv6 Segment Routing to dispatch new flows to a suitable application instance from among multiple candidates, and (ii) the use of a covert channel to record/report which flow was assigned to which candidate in a stateless fashion. In addition, consistent hashing versioning is used to ensure that connections are maintained to the correct application instance, using Segment Routing to “browse” through the history when needed. The stateless design of SHELL makes it suitable for hardware implementation, and this paper describes the implementation of a P4-NetFPGA prototype. A performance evaluation of this SHELL implementation demonstrates throughput and latency characteristics comparable to other stateless load-balancing implementations, while enabling application instance-load-aware dispatching and significantly increasing per-connection consistency resiliency.
Radu, Dan; Cretu, Adrian; Parrein, Benoit; Yi, Jiazi; Avram, Camelia; Astilean, Adina
Flying Ad Hoc Network for Emergency Applications Connected to a Fog System Proceedings Article
In: Barolli, Leonard; Xhafa, Fatos; Javaid, Nadeem; Spaho, Evjola; Kolici, Vladi (Ed.): pp. 675–686, Springer International Publishing, Cham, 2018, ISBN: 978-3-319-75928-9.
@inproceedings{10.1007/978-3-319-75928-9_60,
title = {Flying Ad Hoc Network for Emergency Applications Connected to a Fog System},
author = {Dan Radu and Adrian Cretu and Benoit Parrein and Jiazi Yi and Camelia Avram and Adina Astilean},
editor = {Leonard Barolli and Fatos Xhafa and Nadeem Javaid and Evjola Spaho and Vladi Kolici},
url = {https://www.researchgate.net/publication/323361307_Flying_Ad_Hoc_Network_for_Emergency_Applications_Connected_to_a_Fog_System},
doi = {10.1007/978-3-319-75928-9_60},
isbn = {978-3-319-75928-9},
year = {2018},
date = {2018-01-01},
pages = {675--686},
publisher = {Springer International Publishing},
address = {Cham},
abstract = {The main objective of this paper is to improve the efficiency of vegetation fire emergency interventions by using MP-OLSR routing protocol for data transmission in Flying Ad Hoc NETwork (FANET) applications. The presented conceptual system design could potentially increase the rescuing chances of people caught up in natural disaster environments, the final goal being to provide public safety services to interested parties. The proposed system architecture model relies on emerging technologies (Internet of Things & Fog, Smart Cities, Mobile Ad Hoc Networks) and actual concepts available in the scientific literature. The two main components of the system consist in a FANET, capable of collecting fire detection data from GPS and video enabled drones, and a Fog/Edge node that allows data collection and analysis, but also provides public safety services for interested parties. The sensing nodes forward data packets through multiple mobile hops until they reach the central management system. A proof of concept based on MP-OLSR routing protocol for efficient data transmission in FANET scenarios and possible public safety rescuing services is given.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2017
Perez, Samuel; Cordero, Juan Antonio; Coupechoux, Marceau
ODMAC++: An IoT Communication Manager based on Energy Harvesting Prediction Proceedings Article
In: Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'2017)., IEEE, 2017.
@inproceedings{Perez2017,
title = {ODMAC++: An IoT Communication Manager based on Energy Harvesting Prediction},
author = {Samuel Perez and Juan Antonio Cordero and Marceau Coupechoux},
year = {2017},
date = {2017-10-08},
booktitle = {Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'2017).},
publisher = {IEEE},
abstract = {In large low-power networks of battery-driven sen- sors, power outages are a major concern and communication rates have to be carefully designed in order to optimize energy consumption, network connectivity and sensors lifetime. In some IoT use cases, power can be supplied to sensors by way of renewable energy automatic harvesting (solar panels, etc.). Given the high variability of energy arrival processes, energy consumption in sensors, in particular caused by transmissions to the sink, has to be aligned with energy harvesting patterns, so as to maximize throughput while avoiding power outages that may arise when the battery is empty. This paper proposes ODMAC++, an extension to a well-known protocol for sensor transmission scheduling in a WSN. ODMAC++ relies on learning techniques to adapt sensors communication rate to energy harvesting patterns, and uses a beaconing mechanism whose frequency is adjusted based on past measurements on the harvested energy process. Simulations based on analytical energy arrival models and on real solar radiation measurements indicate that ODMAC++ is able to avoid power outages and to cope with battery limitation and energy variations due to variability in time.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Desmouceaux, Yoann; Pfister, Pierre; Tollet, Jerome; Townsley, W. Mark; Clausen, Thomas
SRLB: The Power of Choices in Load Balancing with Segment Routing Proceedings Article
In: In Proceedings of the 37th IEEE International Conference on Distributed Computing Systems (ICDCS), 2017.
@inproceedings{Desmouceaux2017b,
title = {SRLB: The Power of Choices in Load Balancing with Segment Routing},
author = {Yoann Desmouceaux and Pierre Pfister and Jerome Tollet and W. Mark Townsley and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2017/05/camera-ready-ieeepdfexpress.pdf},
year = {2017},
date = {2017-06-05},
booktitle = {In Proceedings of the 37th IEEE International Conference on Distributed Computing Systems (ICDCS)},
abstract = {Network load-balancers generally either do not take application state into account, or do so at the cost of a central- ized monitoring system. This paper introduces a load-balancer running exclusively within the IP forwarding plane, i.e. in an application protocol agnostic fashion – yet which still provides application-awareness and makes real-time, decentralized deci- sions. To that end, IPv6 Segment Routing is used to direct data packets from a new flow through a chain of candidate servers, until one decides to accept the connection, based on its local state. This way, applications themselves naturally decide on how to share incoming connections, while incurring minimal network overhead, and no out-of-band signaling.
Tests on different workloads – including realistic workloads such as replaying actual Wikipedia access traffic towards a set of replica Wikipedia instances – show significant performance benefits, in terms of shorter response times, when compared to a traditional random load-balancer.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Tests on different workloads – including realistic workloads such as replaying actual Wikipedia access traffic towards a set of replica Wikipedia instances – show significant performance benefits, in terms of shorter response times, when compared to a traditional random load-balancer.
2016
Cordero, Juan Antonio; Lou, Wei
Not So Far: Improving Autonomous Content Discovery and Delivery within Mobile Pedestrian Crowds Proceedings Article
In: Proceedings of the 25th International Conference on Computer Communication and Networks (ICCCN 2016)., 2016, (Accepted).
@inproceedings{Cordero2016b,
title = {Not So Far: Improving Autonomous Content Discovery and Delivery within Mobile Pedestrian Crowds},
author = {Juan Antonio Cordero and Wei Lou},
year = {2016},
date = {2016-08-01},
publisher = {Proceedings of the 25th International Conference on Computer Communication and Networks (ICCCN 2016).},
abstract = {The explosion of traffic demands in the edge of the Internet, mostly by mobile users, is putting under pressure current networking infrastructure. This is particularly acute when huge amounts of users and active wireless devices gather in reduced geographical spaces, increasing the risk of exceeding planned capacity of deployed infrastructure. This trend motivates research on mechanisms to offload part of the user injected traffic from the access infrastructure networks and reduce the need of Internet requests and retrievals. This paper concentrates on the ability of mobile meshes to fulfill the requests for contents originated within the mesh, with minimal intervention of the Internet access infrastructure. We propose, discuss and evaluate simple heuristics to improve autonomous content discovery and dissemination within such mobile meshes, characterized by high density and low (pedestrian) mobility, by combining notions already explored in the context of MANET routing: deliberate jittering and autonomous overlay pruning based on link distance. Results over synthetic networks and real mobility traces indicate that proposed mechanisms can be easily deployed and are able to improve efficiency and quality of content request discoveries, by reducing significantly the collisions and increasing the stability of discovered paths in crowded mesh pedestrian networks.},
note = {Accepted},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Jin, Kaiwan; Pfister, Pierre; Yi, Jiazi
Distributed Node Consensus Protocol: Analysis, Evaluation and Performance Proceedings Article
In: Proceedings of the IEEE International Conference on Communications (ICC) 2016, 2016.
@inproceedings{Jin2016,
title = {Distributed Node Consensus Protocol: Analysis, Evaluation and Performance},
author = {Kaiwan Jin and Pierre Pfister and Jiazi Yi},
doi = {10.1109/ICC. 2016.7510939},
year = {2016},
date = {2016-05-23},
publisher = {Proceedings of the IEEE International Conference on Communications (ICC) 2016},
abstract = {Abstract—This paper analyzes and evaluates the Distributed Node Consensus Protocol (DNCP), a state synchronization mech- anism developed by the IETF Homenet working group. DNCP enables network function automation for home networks, which are growing in size and complexity. The basic mechanisms of DNCP are studied in this paper, including the state abstraction, synchronization process and keep-alive mechanism. The over- head is analyzed in single-link topology type. To evaluate the performance of DNCP in more complex scenarios, a reference implementation of DNCP is integrated into ns3 simulator. The convergence time and transmission overhead in various topology types are measured. Based on the obtained results, the correctness of DNCP is verified, and the behavior of DNCP can be concluded.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2015
Toubaline, Sonia; Poirion, Pierre-Louis; D’Ambrosio, Claudia; Liberti, Leo
Observing the State of a Smart Grid Using Bilevel Programming Proceedings Article
In: In Proceeding of the 9th Annual International Conference on Combinatorial Optimization and Applications (COCOA'15),, LNCS 9486, 364-376, 2015.
@inproceedings{Toubaline2015,
title = {Observing the State of a Smart Grid Using Bilevel Programming},
author = {Sonia Toubaline and Pierre-Louis Poirion and Claudia D’Ambrosio and Leo Liberti},
url = {https://epizeuxis.net/site/wp-content/uploads/2016/01/cocoa15a.pdf},
year = {2015},
date = {2015-12-18},
booktitle = {In Proceeding of the 9th Annual International Conference on Combinatorial Optimization and Applications (COCOA'15),},
publisher = {LNCS 9486, 364-376},
abstract = {Monitoring an electrical network is an important and chal- lenging task. Phasor measurement units are measurement devices that can be used for a state estimation of this network. In this paper we consider a PMU placement problem without conventional measurements and with zero injection nodes for a full observability of the network. We propose two new approaches to model this problem, which take into ac- count a propagation rule based on Ohm’s and Kirchoff’s law. The natural binary linear programming description models an iterative observability process. We remove the iteration by reformulating its fixed point con- ditions to a bilevel program, which we then further reformulate to a single-level mixed-integer linear program. We also present a bilevel al- gorithm to solve directly the proposed bilevel model. We implemented and tested our models and algorithm: the results show that the bilevel algorithm is better in terms of running time and size of instances which can be solved.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Jiménez, Yury Andrea; Cordero, Juan Antonio; Cervelló-Pastor, Cristina
Measuring Robustness of SDN Control Layers Proceedings Article
In: Proceedings of the 14th IFIP/IEEE International Symposium on Integrated Network Management (IM 2015), 2015.
@inproceedings{Jiménez2015,
title = {Measuring Robustness of SDN Control Layers},
author = {Yury Andrea Jiménez and Juan Antonio Cordero and Cristina Cervelló-Pastor},
url = {http://dl.ifip.org/db/conf/im/im2015p/137468.pdf},
year = {2015},
date = {2015-05-01},
publisher = {Proceedings of the 14th IFIP/IEEE International Symposium on Integrated Network Management (IM 2015)},
abstract = {The controller placement problem remains a key aspect of Software Defined Networking (SDN). The selection of a suboptimal controller may impact severely the performance of the control layer and, in consequence, cause a substantial degradation in the data layer. Different approaches for controller placement have been proposed with various objectives in mind, but most of them do not consider the characteristics of the resulting control layer in terms of robustness. In this paper we propose and formalize a complete metric for estimating robustness of a SDN control layer, and we evaluate two heuristics for controller selection and control layer construction: Fast Failover and a simplified version of k-Critical. The results of the performed evaluation indicate that the control layer topology induced by k-Critical is less prone to failures, more robust and more homogenous than those computed by Fast Failover.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2014
Cordero, Juan Antonio; Bonaventure, Olivier
Understanding the topological properties of Internet traffic: a view from the edge Proceedings Article
In: Proceedings of the IFIP Networking 2014 Conference, 2014.
@inproceedings{Cordero2014,
title = {Understanding the topological properties of Internet traffic: a view from the edge},
author = {Juan Antonio Cordero and Olivier Bonaventure},
url = {https://www.researchgate.net/publication/263584074_Understanding_the_topological_properties_of_Internet_traffic_A_view_from_the_edge},
year = {2014},
date = {2014-06-01},
publisher = {Proceedings of the IFIP Networking 2014 Conference},
abstract = {Traffic between an edge network and the rest of the Internet can be represented as a dynamic loop-free graph. Understanding in depth the dynamics in time and space (spatial structure, topological breadth, destination persistency, traffic dominating paths) of this graph provides significant insight on the Internet internal architecture and capabilities. This paper analyzes interdomain traffic from a large campus network based on one month by way of Netflow measurements. Our analysis reveals the topological properties and structure of the traffic graph (breadth, depth, volume), the stability of contacted destinations and the relationship between their popularity and their path length. Based on the observed traffic, we explore the suitability of a simple mathematical model to describe the structure of the outgoing traffic graph.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Yi, Jiazi; Clausen, Thomas; Herberg, Ulrich
Depth First Forwarding for Low Power and Lossy Networks: Application and Extension Proceedings Article
In: Proceedings of IEEE World Forum on Internet of Things WF-IoT 2014, 2014.
@inproceedings{LIX-NET-conference-153,
title = {Depth First Forwarding for Low Power and Lossy Networks: Application and Extension},
author = {Jiazi Yi and Thomas Clausen and Ulrich Herberg},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2014-IEEE-WF-IoT-Depth-First-Forwarding-for-Low-Power-and-Lossy-Networks-Application-and-Extension.pdf},
doi = {10.1109/WF-IoT.2014.6803211},
year = {2014},
date = {2014-03-01},
publisher = {Proceedings of IEEE World Forum on Internet of Things WF-IoT 2014},
abstract = {Data delivery across a multi-hop low-power and lossy networks (LLNs) is a challenging task: devices participating in such a network have strictly limited computational power and storage, and the communication channels are of low capacity, time-varying and with high loss rates. Consequently, routing protocols finding paths through such a network must be frugal in their control traffic and state requirements, as well as in algorithmic complexity – and even once paths have been found, these may be usable only intermittently, or for a very short time due to changes on the channel. Routing protocols exist for such networks, balancing reactivity to topology and channel variation with frugality in resource requirements. Complementary compo- nent to routing protocols for such LLNs exist, intended not to manage global topology, but to react rapidly to local data delivery failures and (attempt to) successfully deliver data while giving a routing protocol time to recover globally from such a failure. Specifically, this paper studies the “Depth-First Forwarding (DFF) in Unreliable Networks” protocol, standardised within the IETF in June 2013. Moreover, this paper proposes optimisations to that protocol, denoted DFF++, for improved performance and reactivity whilst remaining fully interoperable with DFF as standardised, and incurring neither additional data sets nor protocol signals to be generated.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Clausen, Thomas; Yi, Jiazi
Path Accumulation Extensions for the LOADng Routing Protocol in Sensor Networks Proceedings Article
In: Hsu, RobertC. -H.; Wang, Shangguang (Ed.): Internet of Vehicles – Technologies and Services, pp. 150-159, Springer International Publishing, 2014, ISBN: 978-3-319-11166-7.
@inproceedings{Clausen2014,
title = {Path Accumulation Extensions for the LOADng Routing Protocol in Sensor Networks},
author = {Thomas Clausen and Jiazi Yi},
editor = {RobertC.-H. Hsu and Shangguang Wang},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2014-IoV-Path-Accumulation-Extensions-for-the-LOADng-Routing-Protocol-in-Sensor-Networks.pdf http://dx.doi.org/10.1007/978-3-319-11167-4_15},
doi = {10.1007/978-3-319-11167-4_15},
isbn = {978-3-319-11166-7},
year = {2014},
date = {2014-01-01},
booktitle = {Internet of Vehicles – Technologies and Services},
volume = {8662},
pages = {150-159},
publisher = {Springer International Publishing},
series = {Lecture Notes in Computer Science},
abstract = {The “Light-weight On-demand Ad-hoc Distance-vector Routing Protocol – Next Generation” (LOADng) is a simple, yet efficient and flexible routing protocol, specifically designed for use in lossy networks with constrained devices. A reactive protocol, LOADng – as a basic mode of operation – offers discovery and maintenance of hop-by-hop routes and imposes a state in intermediate routers proportional to the number of traffic paths served by that intermediate router. This paper offers an extension to LOADng, denoted LOADng-PA (Path Accumulation). LOADng-PA is designed with the motivation of requiring even less state in each intermediate router, and with that state being independent on the number of concurrent traffic flows carried. Another motivation the design of LOADng-PA is one of monitoring and managing networks: providing more detailed topological visibility of traffic paths through the network, for either traffic or network engineering purposes.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2013
Clausen, Thomas; Yi, Jiazi; Bas, Antonin; Herberg, Ulrich
A Depth First Forwarding (DFF) Extension for the LOADng Routing Protocol Proceedings Article
In: ASON 2013 Sixth International Workshop on Autonomous Self-Organizing Networks, 2013.
@inproceedings{Clausen2013,
title = {A Depth First Forwarding (DFF) Extension for the LOADng Routing Protocol},
author = {Thomas Clausen and Jiazi Yi and Antonin Bas and Ulrich Herberg},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2013-ASON-A-Depth-First-Forwarding-DFF-Extension-for-the-LOADng-Routing-Protocol.pdf},
doi = {10.1109/CANDAR.2013.72},
year = {2013},
date = {2013-12-01},
publisher = {ASON 2013 Sixth International Workshop on Autonomous Self-Organizing Networks},
abstract = {This paper explores the cooperation between the new standards for “Low Power and Lossy Networks” (LLNs): IETF RFC 6971, denoted “Depth-First Forwarding in Unreliable Networks” (DFF) and the ITU-T standardised routing protocol “LOADng” (Lightweight On-demand ad hoc Distance-vector Routing - next generation). DFF is a data-forwarding mechanism for increasing reliability of data delivery in networks with dynamic topology and lossy links, using a mechanism similar to a “depth-first search” for the destination of a packet. LOADng is a reactive on-demand routing protocol used in LLNs. The purpose of this study is to evaluate the benefit of using DFF conjointly with a routing protocol. To this end, the paper compares the performance of LOADng and LOADng+DFF using Ns2 simulations, showing a 20% end-to-end data delivery ratio increase at expense of expected longer path lengths.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Yi, Jiazi; Clausen, Thomas; Igarashi, Yuichi
Evaluation of Routing Protocol for Low Power and Lossy Networks: LOADng and RPL Proceedings Article
In: 2013 IEEE Conference on Wireless Sensors, 2013.
@inproceedings{Clausen2013a,
title = {Evaluation of Routing Protocol for Low Power and Lossy Networks: LOADng and RPL},
author = {Jiazi Yi and Thomas Clausen and Yuichi Igarashi},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2013-ICWiSE-Evaluation-of-Routing-Protocol-for-Low-Power-and-Lossy-Networks-LOADng-and-RPL.pdf},
doi = {10.1109/ICWISE.2013.6728773},
year = {2013},
date = {2013-12-01},
publisher = {2013 IEEE Conference on Wireless Sensors},
abstract = {Routing protocol is a critical component of Low- power and Lossy Networks for Smart Grid. The protocols are used for data forwarding, which includes data acquisition, information dissemination, etc. This paper evaluates two main routing protocols used for Low-power and Lossy Networks: RPL and LOADng, to understand their strengths and limitations. Observations are provided based on analysis of specification and experimental experience, regarding the protocol’s routing overhead, traffic pattern, resource requirement, fragmentation, etc. Simulations are further launched to study the performance in different traffic patterns, which include sensor-to-sensor traffic, sensor-to-root traffic and root-to-sensor bidirectional traffic. By evaluating those protocols, the readers could have better under- standing of the protocol applicability, and choose the appropriate protocol for desired applications.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Clausen, Thomas; de Verdiere, Axel Colin; Yi, Jiazi
Performance analysis of Trickle as a flooding mechanism Proceedings Article
In: IEEE 15th International Conference on Communication Technology, 2013.
@inproceedings{Clausen2013b,
title = {Performance analysis of Trickle as a flooding mechanism},
author = {Thomas Clausen and Axel Colin de Verdiere and Jiazi Yi},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2013-ICCT-Performance-analysis-of-Trickle-as-a-flooding-mechanism.pdf},
doi = {http://dx.doi.org/10.1109/ICCT.2013.6820439},
year = {2013},
date = {2013-11-01},
publisher = {IEEE 15th International Conference on Communication Technology},
abstract = {“The Trickle Algorithm” is conceived as an adaptive mechanism for allowing efficient and reliable information sharing among nodes, communicating across a lossy and shared medium. Its basic principle is, for each node, to monitor transmissions from its neighbours, compare what it receives with its cur- rent state, and schedule future transmissions accordingly: if an inconsistency of information is detected, or if few or no neighbours have transmitted consistent information “recently”, the next transmission is scheduled “soon” – and, in case consistent information from a sufficient number of neighbours is received, the next transmission is scheduled to be “later”. Developed originally as a means of distributing firmware updates among sensor devices, this algorithm has found use also for distribution of routing information in the routing protocol RPL, standardised within the IETF for maintaining a routing topology for low-power and lossy networks (LLNs). Its use is also proposed in a protocol for multicast in LLNs, denoted “Multicast Forwarding Using Trickle”. This paper studies the performance of the Trickle algorithm, as it is used in that multicast protocol.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Yi, Jiazi; Cordero, Juan Antonio; Clausen, Thomas
Jitter Considerations in On-demand Route Discovery for Mobile Ad Hoc Networks Proceedings Article
In: The 16th International Conference on Network-Based Information Systems (NBiS-2013), 2013.
@inproceedings{Clausen2013g,
title = {Jitter Considerations in On-demand Route Discovery for Mobile Ad Hoc Networks},
author = {Jiazi Yi and Juan Antonio Cordero and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2013-NBIS-Jitter-Considerations-in-On-demand-Route-Discovery-for-Mobile-Ad-Hoc-Networks.pdf},
doi = {10.1109/NBiS.2013.28},
year = {2013},
date = {2013-09-01},
publisher = {The 16th International Conference on Network-Based Information Systems (NBiS-2013)},
abstract = {Jittering (a small, random variation in timing of control message emission) is widely used in protocols for wireless communication, in order to avoid simultaneous packet transmis- sions over the same channel by adjacent nodes in the network. Used for both regularly scheduled packets, for event-triggered packets, and for scheduled resets in the network, jittering is a particularly important mechanism when a network event may cause multiple adjacent nodes to react concurrently. Introduced in the proactive MANET routing protocol OLSR, the “LLN On-demand Ad hoc Distance-vector Routing Protocol - Next Generation” (LOADng), a derivative of AODV, is specified so as to also use jitter for flooding Route Request (RREQ) messages during route discovery. This use of jitter in RREQ flooding is, however, not without drawbacks, which are identified and addressed in this paper within the framework of a more general study of jitter mechanisms used for route discovery in reactive routing protocols. The paper studies the behavior of route discovery when using “naive” jitter (simply, delaying RREQ retransmission by a small uniformly distributed random delay), in order to identify and analyze the problems hereof, mostly related to route sub-optimality and excessive control traffic overhead. A Window Jitter mechanism is then proposed to address these issues – with the performance hereof, when compared to “naive” jitter being evaluated by way of modeling, theoretical analysis and experiments. The paper shows that the use of Window Jitter improves indeed the efficiency of route discovery in AODV and overcome the drawbacks identified for “naive” jitter.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Cordero, Juan Antonio; Yi, Jiazi; Clausen, Thomas
Optimization of jitter configuration for reactive route discovery in wireless mesh networks Proceedings Article
In: Modeling & Optimization in Mobile, Ad Hoc & Wireless Networks (WiOpt), 2013 11th International Symposium on, 2013, ISBN: 978-1-61284-824-2.
@inproceedings{Clausen2013c,
title = {Optimization of jitter configuration for reactive route discovery in wireless mesh networks},
author = {Juan Antonio Cordero and Jiazi Yi and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2013-WiOpt-Optimization-of-Jitter-Configuration-for-Reactive-Route-Discovery-in-Wireless-Mesh-Networks.pdf},
isbn = {978-1-61284-824-2},
year = {2013},
date = {2013-05-01},
publisher = {Modeling & Optimization in Mobile, Ad Hoc & Wireless Networks (WiOpt), 2013 11th International Symposium on},
abstract = {Jitter is a small, random variation of timing before message emission that is widely used in non-synchronized wireless communication. It is employed to avoid collisions caused by simultaneous transmissions by adjacent nodes over the same channel. In reactive (on-demand) routing protocols, such as AODV and LOADng, it is recommended to use jitter during the flooding of Route Request messages. This paper analyzes the cost of jitter mechanisms in route discovery of on-demand routing protocols, and examines the drawbacks of the standard and commonly used uniformly distributed jitter. The main studied drawback is denominated delay inversion effect. Two variations on the jitter mechanism --window jitter and adaptive jitter-- are proposed to address this effect, which take the presence and the quality of traversed links into consideration to determine the per-hop forwarding delay. These variations allow to effectively reduce the routing overhead, and increase the quality of the computed paths with respect to the standard uniform jitter mechanism. Simulations are also performed to compare the performance of different jitter settings in various network scenarios.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2012
Yi, Jiazi; Clausen, Thomas; Bas, Antonin
Smart Route Request for On-demand Route Discovery in Constrained Environments Proceedings Article
In: 2012 IEEE International Conference on Wireless Information Technology and Systems, 2012.
@inproceedings{Clause2012f,
title = {Smart Route Request for On-demand Route Discovery in Constrained Environments},
author = {Jiazi Yi and Thomas Clausen and Antonin Bas},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2012-IEEE-ICWITS-Smart-Route-Request-for-On-demand-Route-Discovery-in-Constrained-Environments.pdf},
doi = {10.1109/ICWITS.2012.6417755},
year = {2012},
date = {2012-11-01},
publisher = {2012 IEEE International Conference on Wireless Information Technology and Systems},
abstract = {A derivative of AODV , denoted LOADng, is proposed for use in very constrained environment, sacrificing a number of features from AODV for the benefit of smaller control messages and simpler processing logic. Among these sacrifices is intermediate route replies. This paper presents an alternative to intermediate router replies, denoted Smart Route Request, which provides an optimization similar to that attainable by intermediate route requests, but without imposing additional processing complexity or additional signaling. A performance study is presented, showing that the use of Smart Route Requests can effectively reduce the control traffic overhead from Route Requests, while retaining the simplicity of LOADng. LOADng with Smart Route Requests effectively reduces control traffic overhead and on-link traffic collisions, and this especially for multipoint-to-point traffic.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Bas, Antonin; Yi, Jiazi; Clausen, Thomas
Expanding Ring Search for Route Discovery in LOADng Routing Protocol Proceedings Article
In: The 1st International Workshop on Smart Technologies for Energy, Information and Communication, 2012.
@inproceedings{Bas2012,
title = {Expanding Ring Search for Route Discovery in LOADng Routing Protocol},
author = {Antonin Bas and Jiazi Yi and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2012-STEIC-Expanding-Ring-Search-for-Route-Discovery-in-LOADng-Routing-Protocol.pdf},
year = {2012},
date = {2012-10-01},
publisher = {The 1st International Workshop on Smart Technologies for Energy, Information and Communication},
abstract = {LOADng is an on-demand routing protocol, derived from AODV, simplified for use in lossy, low-power and constrained environments, where the ability for devices to communicate is a commodity to their primary function, and where therefore not only the communications channel offers limited capacity, but also the resources available to the device’s communica- tions subsystem are limted. LOADng simplifies AODV in a number of ways, notably the route discovery process by removing intermediate/gratuitous Route Replies – sacrificing that functionality in order to attain smaller control messages and less router state and processing. Alas, this comes at an expense: in some situations, LOADng produces increased control traffic overhead (as com- pared to AODV), and more control messages transmissions means tapping into the device’s limited resources. This paper presents a simple mechanism by which to integrate Expanding Ring flooding into LOADng. The mechanism is described, and the result of simulation studies are presented, showing that both in scenarios with “point-to-point” (any-to-any) traffic and in scenarios with “multipoint-to-point” (all traffic sent to the same destination, as in a data acquisition sensor network) traffic, considerable savings in control traffic overhead can be achieved – without loss in data delivery ratios.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Yi, Jiazi; Clausen, Thomas; de Verdiere, Axel Colin
Efficient Data Acquisition in Sensor Networks:Introducing (the) LOADng Collection Tree Protocol Proceedings Article
In: IEEE WiCom 2012, The 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing., 2012.
@inproceedings{Clausen2012,
title = {Efficient Data Acquisition in Sensor Networks:Introducing (the) LOADng Collection Tree Protocol},
author = {Jiazi Yi and Thomas Clausen and Axel Colin de Verdiere},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2012-IEEE-WiCOM-Efficient-Data-Acquisition-in-Sensor-NetworksIntroducing-the-LOADng-Collection-Tree-Protocol.pdf},
doi = {10.1109/WiCOM.2012.6478508},
year = {2012},
date = {2012-09-01},
publisher = {IEEE WiCom 2012, The 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing.},
abstract = {This paper proposes an extension to the “LLN On-demand Ad hoc Distance-vector Routing Protocol - Next Generation” (LOADng), for efficient construction of a collection tree for data acquisition in sensor networks. The extension uses the mechanisms from LOADng, imposes minimal overhead and complexity, and enables a deployment to efficiently support both “point-to-point” and “multipoint-to-point” traffic, avoiding complications of uni-directional links in the collection tree. This paper further compares the performance of proposed pro-tocol extension to that of basic LOADng and to the protocol RPL (“IPv6 Routing Protocol for Low power and Lossy Networks”).},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Clausen, Thomas; Yi, Jiazi; de Verdiere, Axel Colin
LOADng: Towards AODV Version 2 Proceedings Article
In: 2012 IEEE 76th Vehicular Technology Conference, 2012.
@inproceedings{Clausen2012b,
title = {LOADng: Towards AODV Version 2},
author = {Thomas Clausen and Jiazi Yi and Axel Colin de Verdiere},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2012-IEEE-VTC-LOADng-Towards-AODVv2.pdf},
doi = {10.1109/VTCFall.2012.6399334},
year = {2012},
date = {2012-09-01},
publisher = {2012 IEEE 76th Vehicular Technology Conference},
abstract = {The Ad hoc On-demand Distance-Vector routing protocol (AODV) was published in 2003 by the IETF, as ex- perimental RFC 3561. This routing protocol was one of four routing protocols, developed by the IETF for use in mobile ad hoc networks (MANETs) – with the other being DSR, TBRPF and OLSR. As operational experiences with these protocols accumulated, the IETF set forth on standardization of OLSRv2, a successor to OLSR, and DYMO – with DYMO being the intended successor to DSR and AODV. Alas, while there was traction for and standardization of OLSRv2, interest in, development, standardization, and use of DYMO in MANETs slowly withered. AODV did, however, attract interest for routing in Low-power Lossy Networks (LLNs) due to its limited state requirements. Since 2005, several proposals for simplifying and adapting AODV specifically for LLNs emerged, in 2011 and 2012 with the use of one such adaptation of AODV in the G3-PLC standard for power line communications in smart grids, and with efforts within the IETF emerging towards a single LOADng specification, as next version of AODV. This paper presents this development – from AODV, as specified in RFC3561 – to LOADng. While the basic operation remains unchanged, LOADng presents simplifications, and additional features and flexibilities are introduced. This paper studies the impact of these changes “from AODV to LOADng”, and observes that LOADng unites simplification, flexibility and performance improvements.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Yi, Jiazi; Clausen, Thomas
Vulnerability Analysis of Relay Set Selection Algorithms for the Simplified Multicast Forwarding (SMF) Protocol for Mobile Ad Hoc Networks Proceedings Article
In: The 15th International Conference on Network-Based Information Systems (NBiS-2012), 2012.
@inproceedings{Yi2012,
title = {Vulnerability Analysis of Relay Set Selection Algorithms for the Simplified Multicast Forwarding (SMF) Protocol for Mobile Ad Hoc Networks},
author = {Jiazi Yi and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2012-NBIS-Vulnerability-Analysis-of-Relay-Set-Selection-Algorithms-for-the-Simplified-Multicast-Forwarding-SMF-Protocol-for-Mobile-Ad-Hoc-Networks.pdf},
doi = {10.1109/NBiS.2012.48},
year = {2012},
date = {2012-09-01},
publisher = {The 15th International Conference on Network-Based Information Systems (NBiS-2012)},
abstract = {After more than a decade of research and stan-dardization, Mobile Ad Hoc NETworks (MANET) are finding their place in real-world deployments, such as in community, tactical and vehicular networks. Becoming so present in “the real world” also means that MANETs, and the protocols operating them, are affronted with a more hostile environment, where misconfiguration, eavesdropping, and attacks must be addressed. A first step in addressing MANET security is understanding the vulnerabilities of MANET protocols, and how an attacker can exploit these. This paper studies the Relay Set Selection (RSS) algorithms that are commonly used in multicast routing protocol for MANETs, and which are undergoing standardization as part of the Simplified Multicast Forwarding (SMF) protocol, developed within the Internet Engineering Task Force (IETF). Attack vectors for these different RSS algorithms are described, with the purpose of enabling future development of security solutions.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Cordero, Juan Antonio; Philipp, Matias; Baccelli, Emmanuel
Routing across Wired and Wireless Mesh Networks: Experimental Compound Internetworking with OSPF Proceedings Article
In: Proceedings of the 8th IEEE International Wireless Communications and Mobile Computing Conference (WCMC 2012), 2012.
@inproceedings{Cordero2012b,
title = {Routing across Wired and Wireless Mesh Networks: Experimental Compound Internetworking with OSPF},
author = {Juan Antonio Cordero and Matias Philipp and Emmanuel Baccelli},
url = {https://www.researchgate.net/publication/236883800_Routing_Across_Wired_and_Wireless_Mesh_Networks_Experimental_Compound_Internetworking_with_OSPF},
doi = {10.1109/IWCMC.2012.6314296},
year = {2012},
date = {2012-08-01},
publisher = {Proceedings of the 8th IEEE International Wireless Communications and Mobile Computing Conference (WCMC 2012)},
abstract = {As wireless mesh networks are deployed, a new concept emerges: compound internetworks, i.e., internetworks that contain both wired networks and wireless mesh networks. Routing is one of the key challenges that arises in compound internetworks: indeed, while specific routing protocols are typically used for wired networks on one hand, and for wireless mesh networks on the other hand, it has been observed that operating a single routing protocol to manage a compound internetwork as a whole brings several advantages. In this realm, the IETF has thus standardized protocol extensions to Open Shortest Path First (OSPF, the routing protocol used by more than 50 % of the wired routers in today's Internet), enabling OSPF to operate simultaneously on wired networks, and on wireless mesh or moderately mobile ad hoc networks (MANETs). This paper evaluates the performance of OSPF coupled with such a protocol extension for MANETs on an experimental compound internetwork testbed. This paper reports on experiments carried out with OSPF operating simul-taneously over Ethernet and 802.11b. Despite the limitations of the testbed, these experiments provide both a proof-of-concept and complementary results compared to prior work in the domain, which was mostly based on simulations, and focused on wireless ad hoc network scenarios only.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Cordero, Juan Antonio; Jacquet, Philippe; Baccelli, Emmanuel
Impact of Jitter-based Techniques on Flooding over Wireless Ad hoc Networks: Model and Analysis Proceedings Article
In: pp. 2059-2067, IEEE Proceedings of the 31st Annual IEEE International Conference on Computer Communications (INFOCOM 2012)., Orlando, FI, United States., 2012, ISSN: 0743-166X.
@inproceedings{Cordero2012,
title = {Impact of Jitter-based Techniques on Flooding over Wireless Ad hoc Networks: Model and Analysis},
author = {Juan Antonio Cordero and Philippe Jacquet and Emmanuel Baccelli},
url = {https://www.researchgate.net/publication/236883781_Impact_of_Jitter-based_Techniques_on_Flooding_over_Wireless_Ad_hoc_Networks_Model_and_Analysis},
doi = {10.1109/INFCOM.2012.6195587},
issn = {0743-166X},
year = {2012},
date = {2012-03-25},
pages = {2059-2067},
publisher = {Proceedings of the 31st Annual IEEE International Conference on Computer Communications (INFOCOM 2012).},
address = {Orlando, FI, United States.},
organization = {IEEE},
abstract = {Jitter is used in wireless ad hoc networks to reduce the number of packet collisions and the number of transmissions. This is done by scheduling random back-off for each packet to be transmitted and by piggybacking multiple packets in a single transmission. This technique has been standardized by the IETF in RFC 5148. This paper investigates on the impact of the standardized jitter mechanism on network-wide packet dissemination – i.e. flooding, an important component for many protocols used today. A novel analytical model is introduced, capturing standard jitter traits. From this model is derived accurate characterization of the effects of jittering on flooding performance, including the additional delay for flooded packets on each traversed network interface, the reduction of the number of transmissions over each network interface, and the increased length of transmissions, depending on jitter parameters. This paper also presents an analysis of the use of jitter in practice, over an 802.11 wireless link layer based on CSMA. The analytical results are then validated via statistical discrete event simulations. The paper thus provides a comprehensive overview of the impact of jittering in wireless ad hoc networks.
},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2011
Herberg, Ulrich; Clausen, Thomas
A Comparative Performance Study of the Routing Protocols LOAD and RPL with Bi-Directional Traffic in Low-power and Lossy Networks (LLN) Proceedings Article
In: Proceedings of the Eighth ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN), 2011.
@inproceedings{Clausen2011a,
title = {A Comparative Performance Study of the Routing Protocols LOAD and RPL with Bi-Directional Traffic in Low-power and Lossy Networks (LLN)},
author = {Ulrich Herberg and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2011-PE-WASUN-A-Comparative-Performance-Study-of-the-Routing-Protocols-LOAD-and-RPL-with-Bi-Directional-Traffic-in-Low-power-and-Lossy-Networks-LLN.pdf},
doi = {10.1145/2069063.2069076},
year = {2011},
date = {2011-10-01},
publisher = {Proceedings of the Eighth ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN)},
abstract = {Routing protocols for sensor networks are often designed with explicit assumptions, serving to simplify design and re-duce the necessary energy, processing and communications requirements. Different protocols make different assump-tions – and this paper considers those made by the designers of RPL – an IPv6 routing protocol for such networks, de-veloped within the IETF. Specific attention is given to the predominance of bi-directional traffic flows in a large class of sensor networks, and this paper therefore studies the per-formance of RPL for such flows. As a point of comparison, a different protocol, called LOAD, is also studied. LOAD is derived from AODV and supports more general kinds of traffic flows. The results of this investigation reveal that for scenarios where bi-directional traffic flows are predomi-nant, LOAD provides similar data delivery ratios as RPL, while incurring less overhead and being simultaneously less constrained in the types of topologies supported.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Clausen, Thomas; Herberg, Ulrich; Philipp, Matias
A Critical Evaluation of the “IPv6 Routing Protocol for Low Power and Lossy Networks” (RPL) Proceedings Article
In: Proceedings of the 5th IEEE International Conference on Wireless & Mobile Computing, Networking & Communication (WiMob), 2011.
@inproceedings{Clausen2011b,
title = {A Critical Evaluation of the “IPv6 Routing Protocol for Low Power and Lossy Networks” (RPL)},
author = {Thomas Clausen and Ulrich Herberg and Matias Philipp},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2011-WiMOB-A-Critical-Evaluation-of-the-IPv6-Routing-Protocol-for-Low-Power-and-Lossy-Networks-RPL.pdf},
doi = {10.1109/WiMOB.2011.6085374},
year = {2011},
date = {2011-10-01},
publisher = {Proceedings of the 5th IEEE International Conference on Wireless & Mobile Computing, Networking & Communication (WiMob)},
abstract = {With RPL – the “IPv6 Routing Protocol for Low-power Lossy Networks” – emerging as a Proposed Standard “Request For Comment” (RFC) in the Internet Engineering Task Force (IETF) after a ∼2-year development cycle, this paper presents a critical evaluation of the resulting protocol and its applicability and limits. The paper presents a selection of observations of the protocol characteristics, exposes experiences acquired when producing a prototype implementation of RPL, and presents results obtained from testing this protocol – both in a network simulator, and in real-world experiments on a wireless sensor network testbed. The paper aims at providing a better understanding of possible weaknesses and limits of RPL, notably the possible directions that further protocol developments should explore, in order to address these.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Herberg, Ulrich; Clausen, Thomas
Delay Tolerant Routing with OLSRv2 Proceedings Article
In: Proceedings of the The 9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC), 2011.
@inproceedings{Herberg2011,
title = {Delay Tolerant Routing with OLSRv2},
author = {Ulrich Herberg and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2011-EUC-Delay-Tolerant-Networking-with-OLSRv2.pdf},
doi = {10.1109/EUC.2011.27},
year = {2011},
date = {2011-10-01},
publisher = {Proceedings of the The 9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC)},
abstract = {This paper proposes a simple mechanism for en-abling basic delay tolerant networking with off-the-shelf MANET routing protocols – with the objective being to enable trading off slightly longer data delivery delays against resilience to a temporary lack of connectivity between a router and the ultimate destination of an IP datagram. As part of testing the benefit of said mechanism, an extreme network mobility model is proposed, entitled the “PopUp model”: a router appears in the network, and operates normally – then may disable and disappear from the network to appear later elsewhere. Observed to cause severely degraded performance for MANET routing protocols, this model is used for testing the proposed mechanism in OLSRv2-routed MANETs. The proposed mechanism shows to vastly increase the data delivery ration, with reasonably low increases in delays and control traffic overhead incurred.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Yi, Jiazi; Clausen, Thomas; Herberg, Ulrich
Vulnerability Analysis of the SMF Protocol for Mobile Ad Hoc Networks Proceedings Article
In: IEEE CPSCom 2011, 2011, (http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6142260).
@inproceedings{Yi2011c,
title = {Vulnerability Analysis of the SMF Protocol for Mobile Ad Hoc Networks},
author = {Jiazi Yi and Thomas Clausen and Ulrich Herberg},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2011-CPScom-Vulnerability-Analysis-of-the-Simple-Multicast-Forwarding-SMF-Protocol-for-Mobile-Ad-Hoc-Networks.pdf},
doi = {10.1109/iThings/CPSCom.2011.63},
year = {2011},
date = {2011-10-01},
publisher = {IEEE CPSCom 2011},
abstract = {If deployments of Mobile Ad Hoc Networks (MANETs) are to become common outside of purely experimental settings, protocols operating such MANETs must be able to preserve network integrity, even when faced with careless or malicious participants. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing protocol(s), managing the connectivity. Understanding how these routing protocols can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. One routing protocol for MANETs, developed by the Internet Engineering Task Force (IETF) as a multicast routing protocol for efficient data dissemination, is denoted "Simplified Multicast Forwarding'' (SMF). This protocol is analyzed, and its vulnerabilities described, in this paper. SMF consists of two independent components: (i) duplicate packet detection and (ii) relay set selection, each of which presents its own set of vulnerabilities that an attacker may exploit to compromise network integrity. This paper explores vulnerabilities in each of these, with the aim of identifying attack vectors and thus enabling development of countermeasures.},
note = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6142260},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Clausen, Thomas; Herberg, Ulrich
Some Considerations on Routing in Particular and Lossy Environments Proceedings Article
In: Proceedings of the 1st Interconnecting Smart Objects with the Internet Workshop, 2011.
@inproceedings{Clausen2011d,
title = {Some Considerations on Routing in Particular and Lossy Environments},
author = {Thomas Clausen and Ulrich Herberg},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2011-IAB-Some-Considerations-on-Routing-In-Particular-and-Lossy-Environments.pdf},
year = {2011},
date = {2011-03-01},
publisher = {Proceedings of the 1st Interconnecting Smart Objects with the Internet Workshop},
abstract = {RPL – the “Routing Protocol for Low Power and Lossy Networks” (RPL) [1] – is a proposal for an IPv6 routing pro-tocol for Low-power Lossy Networks (LLNs), by the ROLL Working Group in the Internet Engineering Task Force (IETF). The basic construct in RPL is a DODAG – a destination oriented directed acyclic graph, rooted in a “controller”. Traffic inside the LLN flows along this DODAG, either up-ward (towards the “controller”) or downward. In RPL, upward routes, having the controller as destination (either by way of explicitly addressing the destination, or by using the controller as “gateway”), are provided by the DODAG construction mechanism: each LLN router selects a set of parents, on a path towards the controller, as well as a preferred parent. Once a router is part of a DODAG (i.e. has selected parents) will emit DODAG Information Object (DIO) messages, using link-local multicasting, indicating its respective rank in the DODAG (i.e. its position – distance according to some metric(s), in the simplest form hop-count – with respect to the root). Routes for any destination inside the LLN, other than the controller, are provided by these destinations generating Destination Advertisement Objects (DAOs).},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Cordero, Juan Antonio; Clausen, Thomas; Baccelli, Emmanuel
MPR+SP: Towards a Unified MPR-based MANET Extension for OSPF Proceedings Article
In: Hawaii International Conference on System Sciences, 2011.
@inproceedings{Fuertes2011,
title = {MPR+SP: Towards a Unified MPR-based MANET Extension for OSPF},
author = {Juan Antonio Cordero and Thomas Clausen and Emmanuel Baccelli},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2011-HICSS-MPRSP-Towards-a-Unified-MPR-based-MANET-Extension-for-OSPF.pdf},
doi = {10.1109/HICSS.2011.313},
year = {2011},
date = {2011-01-01},
publisher = {Hawaii International Conference on System Sciences},
abstract = {Heterogeneous networks combining both wired and wireless components – fixed routers as well as mobile routers – emerge as wireless mesh networks are being deployed. Such heterogeneity is bound to become more and more present in the near future as mobile ad hoc networking becomes a reality. While it is possible to cope with heterogeneity by employing different routing protocols for the fixed / wired part and for the wireless / ad hoc part of the network, this may lead to sub-optimal performance, e.g. by way of longer routing paths due to these routing protocols sharing prefixes and ”connecting” the network only at distinct gateways between the two routing domains. Thus, the establishment of a single unified routing domain, and the use of a single routing protocol, for such heterogeneous networks is desired. OSPF is a natural candidate for this task, due to its wide deployment, its modularity and its similarity with the popular ad hoc routing protocol OLSR. Multiple OSPF extensions for MANETs have therefore been specified by the IETF. This paper introduces a novel OSPF extension for operation on ad hoc networks, MPRSP, and compares it with the existing OSPF extensions via simulations, which show that MPR+SP outperforms prior art.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2010
Clausen, Thomas; Herberg, Ulrich
Comparative Study of RPL-Enabled Optimized Broadcast in Wireless Sensor Networks Proceedings Article
In: Proceedings of the 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2010.
@inproceedings{Clausen2010e,
title = {Comparative Study of RPL-Enabled Optimized Broadcast in Wireless Sensor Networks},
author = {Thomas Clausen and Ulrich Herberg},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2010-ISSNIP-Comparative-Study-of-RPL-Enabled-Optimized-Broadcast-in-Wireless-Sensor-Networks.pdf},
doi = {10.1109/ISSNIP.2010.5706795},
year = {2010},
date = {2010-12-01},
publisher = {Proceedings of the 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)},
abstract = {Recent trends have suggested convergence to Wire-less Sensor Networks (WSNs) becoming IPv6-based. To this effect, the Internet Engineering Task Force has chartered a Work-ing Group to develop a routing protocol specification, enabling IPv6-based multi-hop Wireless Sensor Networks. The current effort of this working group is development of a uni-cast routing protocol denoted RPL. RPL constructs a “DAG-like” logical structure with a single root, at which the majority of the traffic flows terminate, and assumes restrictions on network dynamics and traffic generality, in order to satisfy strict constraints on router state and processing. This paper investigates the possibility for providing (effi-cient) network-wide broadcast mechanisms in WSNs, using the logical structure already provided by RPL. The aim hereof is to not impose any additional state requirements on WSN routers already running RPL. This paper presents two such broadcast mechanisms for RPL routed WSNs, and evaluates their performances. As part of this evaluation, the paper compares with MPR Flooding – an established efficient flooding optimization, widely used in MANETs.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Baccelli, Emmanuel; Clausen, Thomas; Wakikawa, Ryuji
IPv6 Operation for WAVE - Wireless Access in Vehicular Environments Proceedings Article
In: Proceedings of IEEE VNC 2010, Jersey City, USA, 2010.
@inproceedings{Clausen2010f,
title = {IPv6 Operation for WAVE - Wireless Access in Vehicular Environments},
author = {Emmanuel Baccelli and Thomas Clausen and Ryuji Wakikawa},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2010-VNC-IPv6-Operation-for-WAVE-Wireless-Access-in-Vehicular-Environments.pdf},
doi = {10.1109/VNC.2010.5698260},
year = {2010},
date = {2010-12-01},
publisher = {Proceedings of IEEE VNC 2010, Jersey City, USA},
abstract = {The IEEE WAVE protocol suite is providing commu- nications services to applications in vehicular networks, by way of promising support for two protocol stacks: the Wave Short Message Protocol (WSMP) and IPv6. While WSMP is developed within the IEEE 1609 family of standards, the authors of this paper assert, that considerations for IPv6 operation for WAVE are less developed, and several issues are left unaddressed by the current IEEE 1609 specifications. This paper reviews these issues and analyzes the main challenges in providing proper IPv6 operation for WAVE networks.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Herberg, Ulrich; Clausen, Thomas
Yet Another Autoconf Proposal (YAAP) for Mobile Ad hoc NETworks Proceedings Article
In: Proceedings of the 6th International Conference on Mobile Ad-hoc and Sensor Networks (MSN'10), 2010.
@inproceedings{Clausen2010g,
title = {Yet Another Autoconf Proposal (YAAP) for Mobile Ad hoc NETworks},
author = {Ulrich Herberg and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2010-MSN-Yet-Another-Autoconf-Proposal.pdf},
doi = {10.1109/MSN.2010.48},
year = {2010},
date = {2010-12-01},
publisher = {Proceedings of the 6th International Conference on Mobile Ad-hoc and Sensor Networks (MSN'10)},
abstract = {This paper addresses the issues of automatic address and prefix configuration of MANET routers. Specifically, the paper analyzes the differences between “classic IP networks” and MANETs, emphasizing the interface, link, topology, and addressing assumptions present in “classic IP networks”. The paper presents a model for how this can be matched to the specific constraints and conditions of a MANET – i.e., how MANETs can be configured to adhere to the Internet addressing architecture. This sets the stage for development of a MANET autoconfiguration protocol, enabling automatic configuration of MANET interfaces and prefix delegation. This autoconfiguration protocol is characterized by (i) adhering strictly to the Internet addressing architecture, (ii) being able to configure both MANET interface addresses and handle prefix delegation, and (iii) being able to configure both stand-alone MANETs, as well as MANETs connected to an infrastructure providing, e.g., globally scoped addresses/prefixes for use within the MANET. The protocol is specified through timed automatons which, by way of model checking, enable verification of certain protocol properties. Fur-thermore, a performance study of the basic protocol, as well as an optimization hereto, is conducted based on network simulations.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Baccelli, Emmanuel; Cordero, Juan Antonio; Jacquet, Philippe
Optimization of Critical Data Synchronization via Link Overlay RNG in Mobile Ad Hoc Networks Proceedings Article
In: pp. 402-411, IEEE Proceedings of the 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS’2010)., San Francisco, CA, United States., 2010, ISSN: 2155-6806.
@inproceedings{Baccelli2010b,
title = {Optimization of Critical Data Synchronization via Link Overlay RNG in Mobile Ad Hoc Networks},
author = {Emmanuel Baccelli and Juan Antonio Cordero and Philippe Jacquet},
url = {https://www.researchgate.net/publication/224204276_Optimization_of_Critical_Data_Synchronization_via_Link_Overlay_RNG_in_Mobile_Ad_Hoc_Networks},
doi = {10.1109/MASS.2010.5663945},
issn = {2155-6806},
year = {2010},
date = {2010-11-01},
pages = {402-411},
publisher = {Proceedings of the 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS’2010).},
address = {San Francisco, CA, United States.},
organization = {IEEE},
abstract = {In practice, ad hoc networks are still too unreliable for standard mobile and vehicular communications. It is thus important to complement current protocols in this context, with schemes guaranteeing the exchange of critical data when needed. A promising approach in this realm is to use an overlay subgraph, over which critical messages are exchanged and acknowledged in a peer to peer fashion. Overlay nodes' local databases remain thus synchronized over time, at least concerning critical data. This paper elaborates on the problem of performance, related to the discovery and maintenance of such overlay networks in a mobile ad hoc context. We analyze SLOT, an overlay selected based on a Relative Neighbour Graph (RNG) scheme. We then apply SLOT to a standard IP protocol: OSPF, a popular routing protocol which has recently been extended, with RFC 5449 and RFC 5614, to work also on mobile ad hoc networks, and which makes use of a similar overlay synchronization subgraph. This paper compares the performance of these existing OSPF mechanisms with that of SLOT-OSPF, a novel OSPF extension for mobile ad hoc networks using SLOT. Simulations show that SLOT-OSPF produces drastically less control traffic than RFC 5449 or RFC 5614, allowing SLOT-OSPF to function correctly while the other existing approaches stall, when the number of routers in the domain is large.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}