Events agenda

13 May
2014

Adaptable Human-Centric Mobile and Wireless Systems

Veljko Pejovic, Postdoctoral Research Fellow, School of Computer Science, University of Birmingham, UK
Information and communication technologies (ICTs) often fail to perform well in environments and scenarios that were not envisioned at the time of the ICTs creation. Examples of such failures include poor usability of traditional WiFi networks in resource-constrained rural areas, geographically-dependent performance of centralised networked systems, and context-insensitive behaviour of ubiquitous computing devices.
Read more arrow_right_alt
8 May
2014

The Throughput of Underwater Networks: Analysis and Validation

Paolo Casari, Senior Postdoctoral Research Fellow, Department of Information Engineering, University of Padova, Italy
In this talk, we discuss a theoretical framework to evaluate the throughput of underwater networks over an ensemble of node topologies and propagation environments. We start with a review of the properties of underwater acoustic communications.
Read more arrow_right_alt
6 May
2014

Expressive and efficient data path provision

Kirill Kogan, Post-doctoral research fellow, Department of Computer Science, Purdue University, West Lafayette, Indiana, USA
One of the most important achievements of Software-Defined Networking is a possibility to redefine existing invariants in network management, This talk covers three important aspects of data path provision: (1) what should be flexible at the network element level to express various economic models and how different characteristics impact desired objective functions?; (2) how to represent this expressiveness efficiently on data plane; and 3) new abstractions that allow to integrate services from heterogeneous controllers without standardization of Northbound API.
Read more arrow_right_alt
25 Apr
2014

Separating Wheat from Chaff: Winnowing Unintended Prefixes using Machine Learning

Andra Lutu, PhD Student, IMDEA Networks Institute & University Carlos III of Madrid (UC3M), Spain
In this paper, we propose the use of prefix visibility at the interdomain level as an early symptom of anomalous events in the Internet. We focus on detecting anomalies which, despite their significant impact on the routing system, remain concealed from state of the art tools. We design a machine learning system to winnow the prefixes with unintended limited visibility – symptomatic of anomalous events – from the prefixes with intended limited visibility – resulting from legitimate routing operations.
Read more arrow_right_alt
4 Apr
2014

WONS 2014 – The 11th IEEE/IFIP Annual Conference on Wireless On-demand Network Systems and Services

Providing secure, reliable, and dependable wireless services is the primary objective of modern data networks. While enabling technology for “on-demand” services through any of the common wireless architectures, such as WiMax, WiFi, ad hoc networks, sensor networks, and vehicular networks, has made large strides, many formidable challenges remain to be overcome, such as the integration of infrastructure-based and ad hoc networks, robust algorithms for self-organizing, reconfigurable wireless networks, on-demand service models and their performance in highly-volatile interconnect topologies as well as interoperability of different architectures.
Read more arrow_right_alt
1 Apr
2014

Architecting an Evolvable Internet with XIA

John Byers, Professor of Computer Science & Fellow of the Rafik B. Hariri Institute for Computing and Computational Science & Engineering, Boston University, USA
Motivated by limitations in today's host-centric IP network, several recent "clean-slate" network architectures have proposed alternate first-class principals, such as content, services, or users.
Read more arrow_right_alt
31 Mar
2014

Understanding the Reachability of IPv6 Limited Visibility Prefixes

Andra Lutu, PhD Student, IMDEA Networks Institute
The main functionality of the Internet is to provide global connectivity for every node attached to it. In light of the IPv4 address space depletion, large networks are in the process of deploying IPv6. In this paper we perform an extensive analysis of how BGP route propagation affects global reachability of the active IPv6 address space in the context of this unique transition of the Internet infrastructure. We propose and validate a methodology for testing the reachability of an IPv6 address block active in the routing system. Leveraging the global visibility status of the IPv6 prefixes evaluated with the BGP Visibility Scanner, we then use this methodology to verify if the visibility status of the prefix impacts its reachability at the interdomain level. We perform active measurements using the RIPE Atlas platform. We test destinations with different BGP visibility degrees (i.e., limited visibility – LV, high visibility – HV and dark prefixes). We show that the IPv6 LV prefixes (v6LVPs) are generally reachable, mostly due to a less-specific HV covering prefix (v6HVP). However, this is not the case of the dark address space, which, by not having a covering v6HVP is largely unreachable. When talking about the results we present in this paper a better explanation of trace route and some basic concepts of BGP will be provided.
Read more arrow_right_alt
26 Mar
2014

Utility Optimization for Multi-Transmitter Wireless Data Systems

Lisa Zhang, Researcher on Computing Sciences Principals at Alcatel-Lucent Bell Laboratories, USA
We study algorithms for carrier and rate allocation in cellular systems with distributed components such as a heterogeneous LTE system with macrocells and femtocells.  Existing work on LTE systems often involves centralized techniques or requires significant signaling, and is therefore not always applicable in the presence of femtocells. More distributed CSMA-based algorithms (carrier-sense multiple access) were developed in the context of 802.11 systems and have been proven to be utility optimal. However, the proof typically assumes a single transmission rate on each carrier. Further, it relies on the CSMA collision detection mechanisms to know whether a transmission is feasible. In this talk we present a framework for LTE scheduling that is based on CSMA techniques. In particular we first prove that CSMA-based algorithms can be generalized to handle multiple transmission rates in a multi-carrier setting while maintaining utility optimality.  We then show how such an algorithm can be implemented in a heterogeneous LTE system where the existing Channel Quality Indication (CQI) mechanism is used to decide transmission feasibility.
Read more arrow_right_alt
3 Mar
2014

Stateless DNS for Efficient Private Service Discovery

Marcel Waldvogel, Professor of Computer Science and Head of IT Infrastructure, University of Konstanz, Germany
Discovering services in the local broadcast domain is easy from the application point of view. However, from the network point of view, especially when wireless networks are also involved, it is wasteful, as query and response are broadcast on all access points at the lowest data rate, ignoring efficient transmission modes. It also does not scale beyond the single broadcast domain, as this would require deployment of IP multicast, which has yet to happen despite decades of trying. We introduce Stateless DNS as an efficient and broader range alternative. Stateless DNS requires no action from the network service provider, improves upon privacy and comes with incremental deployment options. While providing a well-known DNS interface to the applications, it can identify organizational boundaries and uses existing DNS caches for performance.
Read more arrow_right_alt
27 Feb
2014

Understanding the Reachability of the IPv6 Limited Visibility Prefixes

Andra Lutu, PhD Student, IMDEA Networks Institute & University Carlos III of Madrid (UC3M), Spain
The main functionality of the Internet is to provide global connectivity for every node attached to it. In light of the IPv4 address space depletion, large networks are in the process of deploying IPv6.
Read more arrow_right_alt