Search For:

Displaying 1-13 out of 13 total
Multipath TCP
Found in: Communications of the ACM
By Christoph Paasch, Olivier Bonaventure
Issue Date:April 2014
pp. 51-57
Decoupled from IP, TCP is at last able to support multihomed hosts.
     
Multipath TCP
Found in: Queue
By Christoph Paasch, Olivier Bonaventure
Issue Date:February 2014
pp. 40-51
Decoupled from IP, TCP is at last able to support multihomed hosts.
     
Exploring mobile/WiFi handover with multipath TCP
Found in: Proceedings of the 2012 ACM SIGCOMM workshop on Cellular networks: operations, challenges, and future design (CellNet '12)
By Christoph Paasch, Costin Raiciu, Fabien Duchene, Gregory Detal, Olivier Bonaventure
Issue Date:August 2012
pp. 31-36
Mobile Operators see an unending growth of data traffic generated by their customers on their mobile data networks. As the operators start to have a hard time carrying all this traffic over 3G or 4G networks, offloading to WiFi is being considered. Multipa...
     
Performance based traffic control with IDIPS
Found in: Proceedings of the ACM SIGCOMM 2011 conference on SIGCOMM (SIGCOMM '11)
By Damien Saucez, Olivier Bonaventure
Issue Date:August 2011
pp. 436-437
Nowadays Internet is ubiquitous resulting in an increasing path diversity and content duplication. However, while content can be retrieved from many different places, the paths to those places are not equivalent. Indeed, some paths offer better bandwidth w...
     
Revisiting next-hop selection in multipath networks
Found in: Proceedings of the ACM SIGCOMM 2011 conference on SIGCOMM (SIGCOMM '11)
By Gregory Detal, Olivier Bonaventure, Simon van der Linden
Issue Date:August 2011
pp. 420-421
Multipath routing strategies such as Equal-Cost MultiPath (ECMP) are widely used in IP and data-center networks. Most current methods to balance packets over the multiple next hops toward the destination base their decision on a hash computed over selected...
     
Seamless network-wide IGP migrations
Found in: Proceedings of the ACM SIGCOMM 2011 conference on SIGCOMM (SIGCOMM '11)
By Cristel Pelsser, Laurent Vanbever, Olivier Bonaventure, Pierre Francois, Stefano Vissicchio
Issue Date:August 2011
pp. 314-325
Network-wide migrations of a running network, such as the replacement of a routing protocol or the modification of its configuration, can improve the performance, scalability, manageability, and security of the entire network. However, such migrations are ...
     
Enhanced wireless roaming security using three-party authentication and tunnels
Found in: Proceedings of the 1st ACM workshop on User-provided networking: challenges and opportunities (U-NET '09)
By Damien Leroy, Mark Manulis, Olivier Bonaventure
Issue Date:December 2009
pp. 7-12
Many organizations and many home users have deployed WiFi networks permitting external users to connect to the Internet through their networks. Such WiFi sharing poses many security risks for the visited network as well as for the visiting user. In this pa...
     
An adaptive three-party accounting protocol
Found in: Proceedings of the 5th international student workshop on Emerging networking experiments and technologies (Co-Next Student Workshop '09)
By Damien Leroy, Gregory Detal, Olivier Bonaventure
Issue Date:December 2009
pp. 3-4
Three-party tunnel-based roaming infrastructures may become a future trend to permit mobile users to connect to the Internet when they are not at home. Those solutions takle security issues for both visited networks and mobile users, but require an efficie...
     
A hierarchical model for BGP routing policies
Found in: Proceedings of the 2nd ACM SIGCOMM workshop on Programmable routers for extensible services of tomorrow (PRESTO '09)
By Bruno Quoitin, Laurent Vanbever, Olivier Bonaventure
Issue Date:August 2009
pp. 101-104
BGP routing policies are mainly used by network operators to enforce business relationships between Autonomous Systems (AS), and to prefer some routes over others. In this paper, we propose a hierarchical policy model to express each policy at the most app...
     
Authenticated wireless roaming via tunnels: making mobile guests feel at home
Found in: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS '09)
By Damien Leroy, Francois Koeune, Jean-Jacques Quisquater, Mark Manulis, Olivier Bonaventure
Issue Date:March 2009
pp. 48-54
In wireless roaming a mobile device obtains a service from some foreign network while being registered for the similar service at its own home network. However, recent proposals try to keep the service provider role behind the home network and let the fore...
     
A secure role-based address allocation and distribution mechanism
Found in: Proceedings of the 2007 ACM CoNEXT conference (CoNEXT '07)
By Damien Leroy, Olivier Bonaventure
Issue Date:December 2007
pp. 89-97
The growth of the BGP routing tables in the default-free zone is again a concern for many network operators. So as to tackle this problem, the IRTF has chartered the Routing Research Group to propose new solutions to improve the scalability of the Internet...
     
Implementation and preliminary evaluation of an ISP-driven informed path selection
Found in: Proceedings of the 2007 ACM CoNEXT conference (CoNEXT '07)
By Benoit Donnet, Damien Saucez, Olivier Bonaventure
Issue Date:December 2007
pp. 89-97
During the past ten years, we have seen the emergence of a set of applications requiring more and more quality of service (QoS). For instance, IPTV needs large bandwidth and delays as lows as possible. Further, while previously a content was located in a s...
     
On the cost of caching locator/ID mappings
Found in: Proceedings of the 2007 ACM CoNEXT conference (CoNEXT '07)
By Luigi Iannone, Olivier Bonaventure
Issue Date:December 2007
pp. 89-97
Very recent activities in the IETF and in the Routing Research Group (RRG) of the IRTG focus on defining a new Internet architecture, in order to solve scalability issues related to interdo-main routing. The approach that is being explored is based on the ...
     
 1