Archives: Events

In3 conference: the first international conference on Internet Science

This unique conference will be the venue fostering dialogue among scholars and practitioners belonging to these disciplines.

Event website: http://www.internet-science.eu/1st-internet-science-conference

Read more arrow_right_alt

Understanding the Reachability of IPv6 Limited Visibility Prefixes

The main functionality of the Internet is to provide global connectivity for every node attached to it. In light of the IPv4 address space depletion, large networks are in the process of deploying IPv6. In this paper we perform an extensive analysis of how BGP route propagation affects global reachability of the active IPv6 address space in the context of this unique transition of the Internet infrastructure. We propose and validate a methodology for testing the reachability of an IPv6 address block active in the routing system. Leveraging the global visibility status of the IPv6 prefixes evaluated with the BGP Visibility Scanner, we then use this methodology to verify if the visibility status of the prefix impacts its reachability at the interdomain level. We perform active measurements using the RIPE Atlas platform. We test destinations with different BGP visibility degrees (i.e., limited visibility - LV, high visibility - HV and dark prefixes). We show that the IPv6 LV prefixes (v6LVPs) are generally reachable, mostly due to a less-specific HV covering prefix (v6HVP). However, this is not the case of the dark address space, which, by not having a covering v6HVP is largely unreachable. When talking about the results we present in this paper a better explanation of trace route and some basic concepts of BGP will be provided.

Read more arrow_right_alt

Measuring Large-Scale Distributed Systems: Case of BitTorrent Mainline DHT

Peer-to-peer networks have been quite thoroughly measured over the past years; however it is interesting to note that the BitTorrent Mainline DHT has received very little attention even though it is by far the largest of currently active overlay systems, as our results show. As Mainline DHT differs from other systems, existing measurement methodologies are not appropriate for studying it. In this talk we present an efficient methodology for estimating the number of active users in the network. We have identified an omission in previous methodologies used to measure the size of the network and our methodology corrects this. This omission may lead to inaccuracies of up to 40% in the number of active users. Our method is based on modeling crawling inaccuracies as a Bernoulli process. It guarantees a very accurate estimation and is able to provide the estimate in about 5 seconds. Through experiments in controlled situations, we demonstrate the accuracy of our method and show the causes of the inaccuracies in previous work, by reproducing the incorrect results. Besides accurate network size estimates, our methodology can be used to detect network anomalies, in particular Sybil attacks in the network. We also report on the results from our measurements which have been going on for almost 2.5 years and are the first long-term study of Mainline DHT.

Read more arrow_right_alt

Researchers’ Night 2013 – Science in Your Living Room

Find out what's inside a cellphone, a television set, the human body, ... with the help of researchers from the IMDEA Institutes.

Discover the huge amount of science and technology that surrounds our lives, making them more comfortable, simpler and safer, and meet those who are engaged in advancing science and technology every day.

Science in Your Living Room is the activity of the IMDEA Institutes in European initiative The Researchers' Night 2013. Its main objective is to present to the public the large amount of science and technology involved in almost every object and service around us. The audience is invited to interact and discover the appeal of the work of the researchers. The goal of this activity is to analyze, with the help of the audience, how different our life would be without science, stress the importance of science and technology for social welfare, and show how rewarding and interesting is getting involved in science and technology.

Read more arrow_right_alt

Adaptable Human-Centric Mobile and Wireless Systems

Information and communication technologies (ICTs) often fail to perform well in environments and scenarios that were not envisioned at the time of the ICTs creation. Examples of such failures include poor usability of traditional WiFi networks in resource-constrained rural areas, geographically-dependent performance of centralised networked systems, and context-insensitive behaviour of ubiquitous computing devices.

Read more arrow_right_alt

Stateless DNS for Efficient Private Service Discovery

Discovering services in the local broadcast domain is easy from the application point of view. However, from the network point of view, especially when wireless networks are also involved, it is wasteful, as query and response are broadcast on all access points at the lowest data rate, ignoring efficient transmission modes. It also does not scale beyond the single broadcast domain, as this would require deployment of IP multicast, which has yet to happen despite decades of trying. We introduce Stateless DNS as an efficient and broader range alternative. Stateless DNS requires no action from the network service provider, improves upon privacy and comes with incremental deployment options. While providing a well-known DNS interface to the applications, it can identify organizational boundaries and uses existing DNS caches for performance.

Read more arrow_right_alt

The BGP Visibility Scanner

By tweaking the BGP configurations, the network operators are able to express their interdomain routing preferences, designed to accommodate a myriad goals. Given the complex interactions between policies in the Internet, the origin AS by itself cannot ensure that only by configuring a routing policy it can also achieve the anticipated results. Moreover, the definition of routing policies is a complicated process, involving a number of subtle tuning operations prone to errors. In this paper, we propose the BGP Visibility Scanner which allows network operators to validate the correct implementation of their routing policies, by corroborating the BGP routing information from approximately 130 independent observation points in the Internet. We exemplify the use of the proposed methodology and also perform an initial validation for the BGP Visibility Scanner capabilities through various real operational use cases.

Read more arrow_right_alt

The Rise of the Sharing Economy: Estimating the Impact of Airbnb on the Hotel Industry

Airbnb.com is an online community marketplace that facilitates short-term rentals of "unique spaces" around the world. Since its launch, Airbnb has grown from a few hundred bookings in 2008 to over ten million nights of cumulative bookings worldwide by the end of 2012, spanning more than 300,000 properties in 192 countries. Our work investigates the consequences of the rise of Airbnb as seen by the local economy, focusing on quantifying the impact of Airbnb's growth on the local hotel industry. To explore this question, we consider the state of Texas, where Airbnb adoption exhibits significant spatio-temporal variation across a large number of city-level markets. We leverage a dataset we collected from Airbnb.com,  comprehensively spanning the thousands of Texas properties listed on Airbnb from 2008 to 2013, which we combine with a panel of quarterly tax revenue data for all hotels in the state of Texas from 2001 to 2013. Our analysis provides evidence that the hotel industry has experienced a decrease in revenue due to the entry of Airbnb in the market. Specifically, we find that a 1% increase in the size of the Airbnb market results in a 0.05% decrease in hotel revenue. Furthermore, our results indicate that losses are unevenly distributed among hotels in different price segments, with lower-priced hotels experiencing the largest impact. 

Read more arrow_right_alt

RIA-ICCS: Intercell Coordinated Scheduling Exploiting Application Reservation Information

Intercell coordination and cooperation techniques are some of the most promising approaches to increase the spectral efficiency of future wireless systems as required by
the forecasted market needs. Among them, intercell coordinated scheduling (ICCS) arises as a near-term feasible solution due to its lower inter-BS communication requirements when compared to full cooperative approaches. In this paper we present our proposed Reservation Information Aware Intercell Coordinated Scheduling (RIA-ICCS) solution which considers application reservation information when constructing an interference graph for ICCS purposes.

Read more arrow_right_alt

The Throughput of Underwater Networks: Analysis and Validation

In this talk, we discuss a theoretical framework to evaluate the throughput of underwater networks over an ensemble of node topologies and propagation environments. We start with a review of the properties of underwater acoustic communications.

Read more arrow_right_alt

Recent Comments

    Archives

    Categories