819 research outputs found
Segment Routing: a Comprehensive Survey of Research Activities, Standardization Efforts and Implementation Results
Fixed and mobile telecom operators, enterprise network operators and cloud
providers strive to face the challenging demands coming from the evolution of
IP networks (e.g. huge bandwidth requirements, integration of billions of
devices and millions of services in the cloud). Proposed in the early 2010s,
Segment Routing (SR) architecture helps face these challenging demands, and it
is currently being adopted and deployed. SR architecture is based on the
concept of source routing and has interesting scalability properties, as it
dramatically reduces the amount of state information to be configured in the
core nodes to support complex services. SR architecture was first implemented
with the MPLS dataplane and then, quite recently, with the IPv6 dataplane
(SRv6). IPv6 SR architecture (SRv6) has been extended from the simple steering
of packets across nodes to a general network programming approach, making it
very suitable for use cases such as Service Function Chaining and Network
Function Virtualization. In this paper we present a tutorial and a
comprehensive survey on SR technology, analyzing standardization efforts,
patents, research activities and implementation results. We start with an
introduction on the motivations for Segment Routing and an overview of its
evolution and standardization. Then, we provide a tutorial on Segment Routing
technology, with a focus on the novel SRv6 solution. We discuss the
standardization efforts and the patents providing details on the most important
documents and mentioning other ongoing activities. We then thoroughly analyze
research activities according to a taxonomy. We have identified 8 main
categories during our analysis of the current state of play: Monitoring,
Traffic Engineering, Failure Recovery, Centrally Controlled Architectures, Path
Encoding, Network Programming, Performance Evaluation and Miscellaneous...Comment: SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIAL
The Dynamics of Internet Traffic: Self-Similarity, Self-Organization, and Complex Phenomena
The Internet is the most complex system ever created in human history.
Therefore, its dynamics and traffic unsurprisingly take on a rich variety of
complex dynamics, self-organization, and other phenomena that have been
researched for years. This paper is a review of the complex dynamics of
Internet traffic. Departing from normal treatises, we will take a view from
both the network engineering and physics perspectives showing the strengths and
weaknesses as well as insights of both. In addition, many less covered
phenomena such as traffic oscillations, large-scale effects of worm traffic,
and comparisons of the Internet and biological models will be covered.Comment: 63 pages, 7 figures, 7 tables, submitted to Advances in Complex
System
Analysis of OSPFv3 in LEO satellite networks
Communication via satellite networks is under continuous research and development as it offers many advances over traditional terrestrial networks such as global coverage, but has a major drawback to be solved, the problem of point-to-point routing. In this work we have developed a satellite network emulator using Linux containers, which has allowed us to analyze the behavior of the IP routing protocol OSPFv3 in this type of networks. Specifically, its behavior has been analyzed in the Iridium constellation, which is widely known and used in this type of studies. For this purpose, we have used files of the topology of these networks over time generated with the HypatiaSeam orbital propagator, a modification of Hypatia made by the SeamSAT research group of the UPC. This project is part of a more global project whose objective is to be able to use a network of LEO satellites for communication between aircraft and airspace control centers. This would make it possible to centralize the different control centers, since it would not be necessary for aircraft to be in direct range to communicate with these centers, but thanks to the global coverage provided by these networks, they could communicate from anywhere in the world. Specifically, in this project we have developed an emulation platform that has allowed us to analyze the behavior of the OSPFv3 protocol to find optimal routes, i.e., shortest distance in terms of the cost function of the protocol. We will present the design and implementation of the emulation platform as well as the analysis of OSPFv3 performance in terms of protocol convergence time to topology changes, number of hops between a satellite and a ground station, delay and loss rate
On the Adoption Dynamics of Internet Technologies: Models and Case Studies
Today, more than any time in history, our life-styles depend on networked systems,
ranging from power grids to the Internet and social networks. From shopping
online to attending a conference via P2P technologies, the Internet is changing the
way we perform certain tasks, which incentivizes more users to join the network.
This user population growth as well as higher demand for a better access to the
Internet call for its expansion and development, and therefore, fuel the emergence of
new Internet technologies. However, many such technologies fail to get adopted by
their target user population due to various technical or socio-economical problems.
Understanding these (adoption) problems and the factors that play a significant role
in them, not only gives researchers a better insight into the dynamics of Internet
technology adoption, but also provides them with enhanced guidelines for designing
new Internet technologies. The primary motivation of this thesis is, therefore, to
provide researchers and network technology developers with an insight into what
factors are responsible for, or at least correlated with, the success or failure of an
Internet technology. We start by delving deeply into (arguably) the salient adoption problem the Internet has faced in its 40+ years of existence, and continues to face
for at least a foreseeable future, namely, IPv6 adoption. The study is composed of
an extensive measurement component, in addition to models that capture the roles
of different Internet stakeholders in the adoption of IPv6. Then, we extend it to a
broad set of Internet protocols, and investigate the factors that affect their adoptions.
The findings show performance as the primary factor that not only affected
the adoption of IPv6, but also plays a role in the adoption of any other network data
plane protocol. Moreover, they show how backward compatibility as well as other
factors can affect the adoption of various protocols. The study provides a number
of models and methodologies that can be extended to other similar problems in
various research areas, such as network technology adoption and design, two-sided
markets, and network economics
Exploring usable Path MTU in the Internet
This work is funded by the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 644399 (MONROE) through the Open Call. Additionally this work was partially supported by the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 688421 (MAMI). The opinions expressed and arguments employed reflect only the authors’ view. The European Commission is not responsible for any use that may be made of that informationPostprin
Segment Routing based Traffic Engineering
In modern networks, the increasing volume of network traffic and the diverse range of services with varying requirements necessitate the implementation of more advanced routing decisions and traffic engineering. This academic study proposes a QoS adaptive mechanism called ”Sepitto”, which utilizes Segment routing protocols, specifically SRv6, to address network-traffic control and congestion avoidance. Sepitto leverages data-plane traffic to convey Linux Qdisc statistics, such as queue size, packet drops, and buffer occupancy, in each Linux-based virtual router. By incorporating this information, edge routers become aware of the current network status, enabling them to make informed decisions regarding traffic paths based on QoS classes. SRv6 is employed to direct traffic along desired paths, avoiding congested links and minimizing queuing delays and overall latency. Moreover, Sepitto offers network administrators an interface to customize decision-making processes based on their policies, assigning costs to network graph edges by associating the provided statistics to a certain cost. To incorporate these costs, the implementation employs the Dijkstra algorithm to determine the path with the lowest cost. Performance analysis of Sepitto reveals minimal overhead compared to traditional routing methods, while effectively mitigating network congestion. The results demonstrate that Sepitto reduces traffic round-trip time during congestion while maintaining differentiated treatment for various QoS classes
Segurança e privacidade em terminologia de rede
Security and Privacy are now at the forefront of modern concerns, and drive
a significant part of the debate on digital society. One particular aspect that
holds significant bearing in these two topics is the naming of resources in the
network, because it directly impacts how networks work, but also affects how
security mechanisms are implemented and what are the privacy implications
of metadata disclosure. This issue is further exacerbated by interoperability
mechanisms that imply this information is increasingly available regardless of
the intended scope.
This work focuses on the implications of naming with regards to security and
privacy in namespaces used in network protocols. In particular on the imple-
mentation of solutions that provide additional security through naming policies
or increase privacy. To achieve this, different techniques are used to either
embed security information in existing namespaces or to minimise privacy ex-
posure. The former allows bootstraping secure transport protocols on top of
insecure discovery protocols, while the later introduces privacy policies as part
of name assignment and resolution.
The main vehicle for implementation of these solutions are general purpose
protocols and services, however there is a strong parallel with ongoing re-
search topics that leverage name resolution systems for interoperability such
as the Internet of Things (IoT) and Information Centric Networks (ICN), where
these approaches are also applicable.Segurança e Privacidade são dois topicos que marcam a agenda na discus-
sĂŁo sobre a sociedade digital. Um aspecto particularmente subtil nesta dis-
cussĂŁo Ă© a forma como atribuĂmos nomes a recursos na rede, uma escolha
com consequências práticas no funcionamento dos diferentes protocols de
rede, na forma como se implementam diferentes mecanismos de segurança
e na privacidade das várias partes envolvidas. Este problema torna-se ainda
mais significativo quando se considera que, para promover a interoperabili-
dade entre diferentes redes, mecanismos autónomos tornam esta informação
acessĂvel em contextos que vĂŁo para lá do que era pretendido.
Esta tese foca-se nas consequĂŞncias de diferentes polĂticas de atribuição de
nomes no contexto de diferentes protocols de rede, para efeitos de segurança
e privacidade. Com base no estudo deste problema, são propostas soluções
que, atravĂ©s de diferentes polĂticas de atribuição de nomes, permitem introdu-
zir mecanismos de segurança adicionais ou mitigar problemas de privacidade
em diferentes protocolos. Isto resulta na implementação de mecanismos de
segurança sobre protocolos de descoberta inseguros, assim como na intro-
dução de mecanismos de atribuiçao e resolução de nomes que se focam na
protecçao da privacidade.
O principal veĂculo para a implementação destas soluções Ă© atravĂ©s de ser-
viços e protocolos de rede de uso geral. No entanto, a aplicabilidade destas
soluções extende-se também a outros tópicos de investigação que recorrem
a mecanismos de resolução de nomes para implementar soluções de intero-
perabilidade, nomedamente a Internet das Coisas (IoT) e redes centradas na
informação (ICN).Programa Doutoral em Informátic
- …