Multihoming and Intelligent Route Control
|
-
Date: October, 9th 16:00
-
Place: Salón de Grados Edifidio Padre Soler
-
Title: Multihoming and Intelligent Route Control
- Abstract:
Recently, there is significant interest in Intelligent Route Control
(IRC) systems. IRC systems come in two main flavors: Routing Overlays
and Intelligent Multihoming. Routing Overlays require a distributed
infrastructure of ``overlay routers''. Packets can be forwarded from
the source to the destination through one or more intermediate overlay
routers, bypassing congested Internet links or networks with poor
reliability. In Intelligent Multihoming, a stub network can
dynamically choose among a number of upstream Internet providers.
A multihomed network can receive its ingress traffic among different
providers, and it can steer its egress traffic to the provider with
the best performance or least cost.
IRC systems may revolutionize the Internet routing and traffic
engineering landscape for three primary reasons:
-
IRC systems perform load-sensitive routing, allowing dynamic
path changes based on the measured performance of the candidate
paths.
-
With IRC systems it becomes possible to route different classes
of traffic to the same destination through different paths.
-
IRC systems give edge networks the flexibility to choose their
path to common destinations.
This talk will focus on the following three research issues:
-
the performance and stability of IRC systems,
-
the interactions between IRC and TCP congestion control, and
-
the economics behind IRC systems and how to exploit them to
design a profitable ISP that does not own a network!
-
Speaker short bio:
Dr. Constantine Dovrolis is an Associate Professor at the College
of Computing of the Georgia Institute of Technology. He received
the Computer Engineering degree from the Technical University of
Crete (Greece) in 1995, the M.S. degree from the University of
Rochester in 1996, and the Ph.D. degree from the University of
Wisconsin-Madison in 2000.
His research interests include Internet protocols and technologies,
network measurements and their applications, intelligent route
control, router buffer sizing, service provisioning and traffic
engineering, and biology-inspired network architectures.
He received the NSF CAREER award in 2003.
|
Peer to Peer SIP
|
-
Date: December, 20th from 16:00 to 20:00
-
Place: 3.S.D01
-
Title: Peer to Peer SIP
- Abstract:
This presentation will start with an introduction to SIP (Session
Initiation Protocol). This introduction will include the functionality
SIP provides, the entities SIP defines, how SIP addressing works, how
SIP transactions and dialogs are handled, the relation between SIP and
SDP (Session Description Protocol), the offer/answer model, and the most
important SIP extensions. After this introduction, the presentation will
focus on P2P (Peer-to-peer) SIP. This part of the presentation will
include how the SIP registration and routing functions can be
distributed using DHTs (Distributed Hash Tables), DHT basics, and how
DHTs can be maintained by the P2PSIP peers.
-
Speaker short bio:
Gonzalo Camarillo leads the Advanced Signalling Research Laboratory of
Ericsson in Helsinki, Finland. He is an active participant in the
IETF, where he has authored and co-authored several specifications
used in the IMS. In particular, he is a co-author of the main SIP
specification, RFC 3261. In addition, he co-chairs the IEFT SIPPING
working group, which handles the requirements from 3GPP and 3GPP2
related to SIP, and the IETF HIP (Host Identity Protocol) working
group, which deals with lower-layer mobility and security. He is the
Ericsson representative in the SIP Forum and is a regular speaker at
different industry conferences. During his stay as a visitor
researcher at Columbia University in New York, USA, he published a
book entitled "SIP Demystified". Gonzalo received an M.Sc. degree in
Electrical Engineering from Universidad Politecnica de Madrid, Spain,
and another M.Sc. degree (also in Electrical Engineering) from th
Royal Institute of Technology in Stockholm, Sweden. He is currently
continuing his studies as a Ph.D. candidate at Helsinki University of
Technology.
|
- Title: End-host mobility and multihoming with HIP
- Student: Javier Diez
- Supervisor: Carlos J. Bernardos
- Summary:
There is currently ongoing work at the IETF defining mobility and
multihoming extensions to the Host Identity Protocol (HIP). You should
understand the mobility and multihoming problem in the current Internet
and evaluate how HIP could solve that, by analysing the basic HIP
protocol and the proposed extensions.
- Basic bibliography (starting point):
|
- Title: CGAs: what are they and what do they provide?
- Student: Elena Pereira
- Supervisor: Carlos J. Bernardos
- Summary:
Cryptographically Generated Addresses (CGA) are IPv6 addresses for which
the interface identifier is generated by computing a cryptographic
one-way hash function from a public key and auxiliary parameters. You
should analyse how CGAs are created and the different advantages that
they provide, as well as identify, describe and analyse different
scenarios and problems where CGAs prove to be useful.
- Basic bibliography (starting point):
|
- Title: SEND: Secure Neighbour Discovery
- Student: Juan Felipe Botero
- Supervisor: Carlos J. Bernardos
- Summary:
IPv6 nodes use the Neighbor Discovery Protocol (NDP) to discover other
nodes on the link, to determine their link-layer addresses to find
routers, and to maintain reachability information about the paths to
active neighbors. If not secured, NDP is vulnerable to various attacks.
SEND is a secure mechanism for NDP that do not make use of IPsec. You
should perform a threat analysis of the original NDP and describe and
analyse how SEND provides additional security.
- Basic bibliography (starting point):
|
- Title: Analysis of the requirements for routing in mesh networks
- Student: Paul Patras
- Supervisor: Carlos J. Bernardos
- Summary:
Identify and analyse the different requirements posed by backbone
wireless mesh networks, from the viewpoint of routing.
|
- Title: ITU-T NGN Networks and the Internet
- Student: Coslet Gheorghe
- Supervisor: Alberto García-Martínez
- Summary:
In this assignment you are requested to study in depth the NGN
(Next Generation Networks) proposal issued by ITU-T. ITU-T started at
2002 a project to develop a set of standards for the Next Generation
Networks that will replace current voice (and other) infrastructure. For
this assignment, we ask you to compare critically this approach to the
Internet (IETF) one, in terms of requirements, focus, technology, etc.
It is important that you could answers to questions such as "what is the
equivalent function/solution in the Internet world?"
- References:
-
Articles on IEEE Communications Magazine, Volume: 43 Issue: 10.
Date: Oct. 2005
- Realization of the next-generation network. Chae-Sub Lee;
Knight, D. Page(s): 34- 41.
- Introduction to the ITU-T NGN focus group release 1: target
environment, services, and capabilities. Carugi, M.; Hirschman, B.;
Narita, A. Page(s): 42- 48.
- NGN architecture: generic principles, functional architecture,
and implementation. Knightson, K.; Morita, N.; Towle, T. Page(s):
49- 56
-
Standards available from the Library
- ITU-T Rec. Y.2001, "General Overview of NGN"
- ITU-T Rec. Y.2011, "General Principles and General Reference
Model for Next Generation Network"
|
- Title: Better than Nothing Security proposal
- Student: Jose Moreira Sánchez
- Supervisor: Alberto García-Martínez
- Summary:
The btns working group charter promotes on-going work on providing
anonymous (unauthenticated) keying for IPsec to create security
associations (SAs) with peers who do not possess authentication
credentials that can be validated. Examples of such credentials can be
self-signed certificates or "bare" public keys. This mode would protect
against passive attacks but would be vulnerable to active attacks.
The working group is committed to specify extensions to the IPsec
architecture, and possibly extensions or profiles of IKE, so that IPsec
will support creation of unauthenticated SAs.
We ask you to analyse from a critical point of view the approach
developed in this IETF working group. Knowledge on IPsec/IKE is required.
- References:
The references for this assignment are available at the btns working
group (http://www.ietf.org/html.charters/btns-charter.html"):
- Problem and Applicability Statement for Better Than Nothing
Security (BTNS)
- Better-Than-Nothing-Security: An Unauthenticated Mode of
IPsec
- IPsec Channels: Connection Latching
- IPsec Application Programming Interfaces
- An interface between applications and keying systems
|
- Title: DNSSEC analysis
- Student: Paola Garfias
- Supervisor: Alberto García-Martínez
- Summary:
A well-known weakness of the Internet architecture lies in the link
between a name (FQDN, Fully Qualified Domain Name) and its associated
information (IP addresses, other names, etc.). In order to solve this
problem, a modification to DNS has been proposed, namely DNSSEC. Please
study current DNSSEC proposals.
A critical comment about uncovered areas and deployment difficulties is
welcome.
- References:
|
- Title: Security models for BGP-like interdomain
routing
- Student: Vanessa Tejada Muñoz
- Supervisor: Alberto García-Martínez
- Summary:
There are a number of possible security attacks that can be exercised
against the current BGP interdomain routing system. Additionally, BGP is
not even protected against simple type of misconfigurations. In this
assignment we ask you to analyse the security requirements for BGP
interdomain routing:
Then, analyse two security solutions for BGP,
S-BGP and
SoBGP.
Another interesting reference is Modeling Adoptability of Secure BGP
Protocols (SIGCOMM conference 2006).
Identify strengths and weaknesses of both solutions.
|
- Title: New Interdomain routing protocols
- Student: Rubén Hidalgo
- Supervisor: Alberto García-Martínez
- Summary:
Your task for this assignment is to discuss some proposals issued to
provide scalability to the interdomain routing system. You can select
two of the following:
Highlight the innovative aspects, and compare critically with
state-of-the-art solutions.
|
- Title: Overlay routing and policy distribution
- Supervisor: Alberto García-Martínez
- Summary:
In this assignment you must analyse some proposals for routing on
overlay networks
- References:
|
- Title: Inter-domain routing over GMPLS
- Student: Ruben Gonzalvez
- Supervisor: Alberto García-Martínez
|
- Title: Advanced aspects of the Inter-domain routing
- Student: Pedro Antonio Cruz
- Supervisor: Alberto García-Martínez
- References:
- "In search for an appropriate granularity to model routing,
policy", W. Muehlbauer (TU Berlin), S. Uhlig, B. Fu (TU Delft),
M. Meulle (France Telecom R&D), O. Maennel (University of Adelaide),
SIGCOMM 2007.
- "Resolving Inter-Domain Policy Disputes", C. T. Ee (UCB),
V. Ramachandran (Stevens I. of Tech.), B.-G. Chun (UCB),
K. Lakshminarayanan (IIT Madras), S. Shenker (UCB/ICSI),
SIGCOMM 2007.
- "Reliability as an Interdomain Service", Hao Wang,
Y Richard Yang, Paul H. Liu (Yale), Jia Wang, Alex Gerber (AT&T),
Albert Greenberg (Microsoft), SIGCOMM 2007.
- "Achieving Convergence-Free Routing using Failure-Carrying
Packets", K. Lakshminarayanan, M. Caesar, M. Rangan (UCB),
T. Anderson (Univ. of Washington), S. Shenker (UCB/ICSI),
I. Stoica (UCB), SIGCOMM 2007.
|
- Title: Study of mobility support aspects over 6LoWPAN wireless sensor networks and 6LoWPAN - IPv4 interoperability
- Student: Jose Javier Garcia
- Supervisor: Carlos J. Bernardos
- Summary:
Low-power WPAN technology is still in its early stage of development, but
the range of conceivable usage scenarios is tremendous. The numerous
possible applications of sensor networks make it obvious that mesh
topologies will be prevalent in LoWPAN environments and mobility support
will be a necessity. The IEEE 802.15.4 standard targets low power
personal area networks, defining an open standard forshort range, low bit
rate, low power and low cost wireless networks.
If we could combine IEEE 802.15.4 standard with other standards like IP,
this can provide some benefits. For example, the pervasive nature of IP
networks allows the use of existing infrastructure and IP-based
technologies that already exist, are well known and are proven to be
working. "IPv6 over IEEE 802.15.4" version of the IPv6 protocol
(defined by 6LowPAN) defines the basic functionalities required to carry
IPv6 packets over IEEE 802.15.4 networks (including an adaptation layer,
header compression, etc).
The IEEE 802.15.4 standard support mesh network topologies, however mesh
topologies imply multi-hop routing to a desired destination. Mesh
networks are likely to consist of nodes with a certain degree of
mobility. Due to the low performance characteristics of LoWPAN devices,
mobility support should be provided without high signaling involvement
in end devices (e.g., RFD). Fast mobility detection will be also a huge
challenge due to nodes might even change their location while being in
state of hibernation.
As we mentioned before, the fact of supporting IP packets transmission
over WPAN networks would report many benefits. Although the original
version of the IPv6 standard was modified to support mobility, this can
not be directly mapped or used on WPAN networks, so that these aspects
are still an open research area.
In consequence in this paper we propose the study in a first step of
possible scenarios and suggested solutions on how to provide mobility
support in 6LoWPAN networks. Despite the support of IPv6 packet
transmission is quite important, and will be necessary in few years, the
IPv6 standard is not widely deployed nowadays. So that, the second topic
to be presented in our paper will be the study from a network layer point
of view of mid term solutions where it would be possible the support of
IPv4 standard, or even the interaction between IPv4, IPv6 and WPAN
networks.
- References:
-
Internet-Draft - Dynamic MANET On-demand for 6LoWPAN (DYMO-low)
Routing
-
Internet-Draft - Mobility Support in 6LoWPAN
-
RFC 3775 - Mobility Support in IPv6
-
Kushalnagar N. and Montenegro G. 6LoWPAN: Overview, Assumptions,
Problem Statement and Goals, IETF draft, 2006.
-
Montenegro G. and Kushalnagar N. Transmission of IPv6 Packets over
IEEE 802.15.4 Networks, IETF draft, 2005.
-
Chang-Yeol Yum, YongSung Beun, Sunmoo Kang ,YoungRo Lee and JooSeok
Song. Methods to use 6LoWPAN in IPv4 network. Feb. 12-14, 2007
ICACT2007
-
Hongwei Huo, Hongke Zhang, Yanchao Niu, Shuai Gao, Zhaohua Li and
Sidong Zhang. MSRLab6: An IPv6 Wireless Sensor Networks Testbed
ICSP2006 Proceedings
|
- Title: Understanding PA addressing aggregation model
and its applicability to the current internet topology
- Supervisor: Marcelo Bagnulo
- Summary:
The requested task is to present the proof presented in Appendix A of
Dmitri Krioukov, Kevin Fall and Xiaowei Yang,
"Compact Routing on Internet-like Graphs".
|
- Title: Definition of the SeND MIB
- Supervisor: Marcelo Bagnulo
- Summary:
The requested task is to define the Managment Information Base (MIB)
for the Secure Neighbour Discovery Protocol (SeND) as defined in
RFC 3971.
|
- Title: Understanding the impact of network mobility
solutions on the global routing system
- Student: Alicia Moreno
- Supervisor: Marcelo Bagnulo
- Summary:
The task is to understand three different approaches to Network
Mobility support and identify their impact on the global routing table.
The proposed approaches are:
- Conexion by Boeing as defined in A. Dul, "Global IP Network
Mobility using Border Gateway Protocol (BGP)" (available upon request
to marcelo@it.uc3m.es)
- NEMO basic support as defined in
RFC 3963
- P. Thubert, R. Wakikawa, V. Devarapalli, "Global HA to HA protocol"
|
- Title: Architected NAT approaches
- Student: Rosa Delgado
- Supervisor: Marcelo Bagnulo
|
- Title: Comparative analysis of client-server vs p2p video streaming approaches
- Student: Marc Jáimez
- Supervisor: Carmen Guerrero
- Summary/Objective:
There are many research initiatives that try to develop a kind
of "p2p youtube". Study some examples of p2p video streaming proposal and
identify the key architectural design in comparation with a client-server
approach. Some examples: Joost, Bittorrent DNA, Tribler, VidTorrent,
Peercast, ....
- Recommended Reading:
- "I Tube, You Tube, Everybody Tubes: Analyzing he World's Largest
User Generated Content Video System". Meeyoung Cha, Haewoon Kwak,
Pablo Rodriguez, Yon-Yeol Ahn, Sue Moon. ACM SIGCOMM/USENIX IMC'07
San Diego, Oct 2007.
- "Peer-Assisted VoD: Making Internet Video Distribution Cheap"
Cheng Huang, Jin Li, Keith W. Ross. IPTPS 2007
- Joost site: www.joost.com
- Bittorrent DNA site: http://www.bittorrent.com/dna
|
- Title: Structured vs Unstructured p2p applications
- Student: Alberto José González Cela
- Supervisor: Carmen Guerrero
- Summary/Objective:
Study why nowadays unstructured p2p applications are more
popular that structure ones that are based on DHT. Study what application
scenarios are more suitable for both approaches. Choose two relevant
applications of unstructured and DHT-based solutions and describe and
compare them. (for example: Bittorrent, Azureus, KAD....)
- Recommended Reading:
- "Profiling a Million User DHT", Jarret Falkner, Michael Piatek,
John P. John, Arvind Krishnamurthy and Thomas Anderson. ACM
SIGCOMM/USENIX IMC'07 San Diego, Oct 2007.
- "A Global View of KAD", Moritz Steiner, Taoufik En-Najjary,
Ernst W. Biersack. ACM SIGCOMM/USENIX IMC'07 San Diego, Oct 2007.
- "The Delicate Tradeoff of BitTorrent-like File Sharing Protocol
Design", B Fan, DM chiu and JCS Lui. IEEE ICNP 2006
|
- Title: How ISP do traffic engineering of p2p applications
- Student: Eliseo Catalán
- Supervisor: Carmen Guerrero
- Summary/Objective:
Analyce how ISP are dealing with p2p traffic. How an ISP can
manage p2p traffic in a profitable way.
- Recommended Reading:
- "Can ISPs and P2P Users Cooperate for Improved Performance?",
Vinay Aggarwal, Anja Feldmann, and Christian Scheideler. ACM
SIGCOMM CCR Volume 37, Issue 3 July 2007.
- "Locality-Aware P2P Query Search with ISP Collaboration",
Vinay Aggarwal, Anja Feldmann. Networks and Heterogeneous Media,
2007.
- "HPTP: Relieving the Tension between ISPs and P2P", Guobin Shen,
Ye Wang, Yongqiang Xiong, Ben Y. Zhao, Zhi-Li Zhang. IPTPS 2007
- "Modeling the Peering and Routing Tussle between ISPs and P2P
Applications", JH Wang, DM Chiu and JCS Lui. IEEE IWQoS, 2006
(Yale)
- "Should internet service providers fear peer-assisted content
distribution?", T Karagiannis, P Rodriguez, K Papagiannaki
Internet Measurement Conference 2005.
(Yale)
|
- Title: P2PSIP Standardization
- Student: Miguel Catalan
- Supervisor: Carmen Guerrero
- Summary/Objective:
Describe the on-going work on the IETF WG P2PSIP that are
working on the standardization of a "DHT-based Skype-like" protocol.
- Recommended Reading:
|
- Title: P2P video streaming
- Student: Michel Reznik Milstein
- Supervisor: Carmen Guerrero
|
- Title: Description of more common unstructured p2p
overlay network
- Student: Javier Polo
- Supervisor: Carmen Guerrero
|