The scalability issues the global routing system has been experienc- ing over the past years have raised serious concerns in the Internet community. One of the main culprits for the rapidly growing BGP routing table is the defragmentation process of the address blocks allocated to ASes, also known as prefix deaggreation. The Internet is a complex system and understanding its behavioural evolution is certainly a challenging task. For this reason, the use of eco- nomic models can provide intuitive explanations of the complex interactions between networks that result in the aforementioned phenomenon of prefix deaggreation. In this paper, we propose a game theoretic model to analyze the incentives behind the deag- gregating strategies of the networks. Announcing more-specific prefixes in the Internet impacts the size of the global routing table and increases the network operators’ capital expenditure for rout- ing equipment capable of sustaining the growing Internet. How- ever, we prove that the ASes are driven by fundamental economic reasons towards this type of apparently harming behaviour. We find that by announcing more prefixes the originating network achieves a more predictable traffic pattern and reduces the peak levels of bandwidth consumption. We show that this happens because, both in the equilibrium point and the social welfare point, the cost re- duction achieved by smoothing the traffic distribution outweighs the additional cost incurred by the routing table expansion.
Read more arrow_right_altThe second Workshop on "far out" research ideas of the institute is to be held on January 19th, 2011. The purpose of the second edition of this series of workshops is to have researchers from the institute present very innovative ideas that could lead to internal projects or even the offspring of a full line of research. The sessions encourage brain-storming around the ideas presented, in order to help give them shape and evaluate their potential.
Read more arrow_right_altA frequent problem in settings where a unique resource must be shared among users is how to resolve the contention that arises when all of them must use it, but the resource allows only for one user each time. The application of efficient solutions for this problem spans a myriad of settings such as radio communication networks or databases.
Read more arrow_right_altCarrier Sense Multiple Access with Enhanced Collision Avoidance (CSMA/ECA) is a distributed MAC protocol that allows collision-free access to the medium in WLAN. The only difference between CSMA/ECA and the well-known CSMA/CA is that the former uses a deterministic backoff after successful transmissions. Collision-free operation is reached after a transient state during which some collisions may occur. This article shows that the duration of the transient state can be shortened by appropriately setting the contention parameters. Standard absorbing Markov Chain theory is used to describe the behaviour of the system in the transient state and to predict the expected number of slots to reach the collision-free operation.
Read more arrow_right_altThe seminar will cover essential aspects of tech-based entrepreneurship, with special regard to ventures in the field of ICTs.
Resources for entrepreneurs at UC3M within the Campus del Emprendedor UC3M Programme will be detailed. An inspiring speech by young entrepreneurs from our Business Incubator will stimulate a discussion with attendees.
Read more arrow_right_alt
Some among the most widespread applications of the Internet (real-time streaming multimedia applications) are based on packet exchanges that assume a very low packet delay. In order to offer some form of better service to this kind of traffic some architectural frameworks have been proposed, in which traffic sources obey some form of constraints on the maximum number of packets sent in every time interval, in which traffic is subdivided into classes, and where at any node all packets are served taking only into account the class to which they belong to. For these networks an open issue is their stability, that is the possibility to derive finite bounds to packet delay and queue size at each node.
Read more arrow_right_altCloud computing has great potential to change how enterprises run and manage their IT systems. Cloud computing platforms provide customers with flexible, on demand resources at low cost. However, while existing offerings are useful for providing basic computation and storage resources, they fail to provide the security and network controls that enterprise customers need. The CloudNet architecture provides more comprehensive control over network resources and security for users by utilizing Virtual Private Networks to securely and seamlessly link cloud and enterprise sites. CloudNet incorporates VM migration over WANs. CloudNet's capability for WAN migration transforms the scope of provisioning from a single data center to multiple data centers spread across the country or the world. This will open new opportunities for cross data center load balancing and dynamic application placement based on metrics like latency to users or energy cost. It also provides the foundation for a range of Disaster Recovery solutions. (The talk is based on joint work with Timothy Wood (UMass), Jacobus van der Merwe (AT&T Labs Research), and Prashant Shenoy (UMass) ).
Read more arrow_right_altIn this talk I will briefly overview the research topics I have been working on, as well as describe new topics I recently began looking into. The former includes behavior-based Internet worm detection, Internet routing forensics, IP spoofing prevention, and trusted and incentivized peer-to-peer data sharing between distrusted and selfish clients. The latter includes reliable IP prefix monitoring, active phishing disruption, social networks for access control, security and privacy for homecare rehabilitation environments, and the clean-slate architecture design for future Internet.
The purpose of this talk is to provide a glimpse of my fights, so you can weigh which fights you would like to join me to win, or leverage my weapons to help win yours, or even better, we find and beat a common enemy.
Read more arrow_right_altMobile networks allow accessing and sharing information everywhere, but current infrastructures are limited by their legacies from circuit-switched networks. Although mobile ad-hoc networks (MANETs) solve many of these shortcomings, they face important challenges regarding routing and security. Localized geographic forwarding schemes are very promising for handling the routing challenge even in large multihop wireless networks, since they enable nodes to take routing decisions based only on information about their neighbors.
Read more arrow_right_altWe consider multi-class single server queueing networks that have a product form stationary distribution. A new limit result proves a sequence of such networks converges weakly to a stochastic flow level model. The stochastic flow level model found is insensitive. A large deviation principle for the stationary distribution of these multi-class queueing networks is also found. Its rate function has a dual form that coincides with proportional fairness. We then give the first rigorous proof that the stationary throughput of a multi-class single server queueing network converges to a proportionally fair allocation.
Read more arrow_right_alt
Recent Comments