Anna Brunstrom
Karlstad University, Mathematic and computer science, Faculty Member
Recently, Wireless Mesh Networks (WMNs) have attracted attention as a way to provide alternative Internet connectivity to rural areas or communities. In WMNs, wireless access points communicate with each other wirelessly, forming a true... more
Recently, Wireless Mesh Networks (WMNs) have attracted attention as a way to provide alternative Internet connectivity to rural areas or communities. In WMNs, wireless access points communicate with each other wirelessly, forming a true wireless mesh based ...
Research Interests:
Research Interests:
Research Interests:
The lack of consideration for application delay requirements in standard loss-based congestion control algorithms (CCAs) has motivated the proposal of several alternative CCAs. As such, Copa is one of the most recent and promising CCAs,... more
The lack of consideration for application delay requirements in standard loss-based congestion control algorithms (CCAs) has motivated the proposal of several alternative CCAs. As such, Copa is one of the most recent and promising CCAs, and it has attracted attention from both academia and industry. The delay performance of Copa is governed by a mostly static latency-throughput tradeoff parameter, δ. However, a static δ parameter makes it difficult for Copa to achieve consistent delay and throughput over a range of bottleneck bandwidths. In particular, the coexistence of 4G and 5G networks and the wide range of bandwidths experienced in NG-RANs can result in inconsistent CCA performance. To this end, we propose a modification to Copa, Copa-D, that dynamically tunes δ to achieve a consistent delay performance. We evaluate the modification over emulated fixed, 4G, and 5G bottlenecks. The results show that Copa-D achieves consistent delay with minimal impact on throughput in fixed capacity bottlenecks. Copa-D also allows a more intuitive way of specifying the latency-throughput tradeoff and achieves more accurate and predictable delay in variable cellular bottlenecks.
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
This paper studies the impact of tunable parametersin the NB-IoT stack on the energy consumption of a user equipment(UE), e.g., a wireless sensor. NB-IoT is designed to enablemassive machine-type c ...
Research Interests:
Interactive applications such as web browsing, audio/video conferencing, multi-player online gaming and financial trading applications do not benefit (much) from more bandwidth. Instead, they depend on low latency. Latency is a key... more
Interactive applications such as web browsing, audio/video conferencing, multi-player online gaming and financial trading applications do not benefit (much) from more bandwidth. Instead, they depend on low latency. Latency is a key determinant of user experience. An increasing concern for reducing latency is therefore currently being observed among the networking research community and industry.In this thesis, we quantify the proportion of potentially latency-sensitive traffic and its development over time. Next, we show that the flow start-up mechanism in the Internet is a major source of latency for a growing proportion of traffic, as network links get faster.The loss recovery mechanism in the transport protocol is another major source of latency. To improve the performance of latency-sensitive applications, we propose and evaluate several modifications in TCP. We also investigate the possibility of prioritization at the transport layer to improve the loss recovery. The idea is to...
Research Interests:
Software-Defined Networking (SDN) has led to a paradigm shift in the way how networks are managed and operated. In SDN environments the data plane forwarding rules are managed by logically centralized controllers operating on global view... more
Software-Defined Networking (SDN) has led to a paradigm shift in the way how networks are managed and operated. In SDN environments the data plane forwarding rules are managed by logically centralized controllers operating on global view of the network. Today, SDN controllers typically posses little insight about the requirements of the applications executed on the end-hosts. Consequently, they rely on heuristics to implement traffic engineering or QoS support. In this work, we propose a framework for application-awareness in SDN environments where the end-hosts provide a generic interface for the SDN controllers to interact with. As a result, SDN controllers may enhance the end-host's view of the attached network and deploy policies into the edge of the network. Further, controllers may obtain information about the specific requirements of the deployed applications. Our demonstration extends the OpenDaylight SDN controller to enable it to interact with end-hosts running a novel...
Research Interests:
To mitigate delay spikes during transmission ofbursty signaling traffic, concurrent multipath transmission(CMT) over several paths in parallel could be an option. Still,unordered delivery is a well ...
Research Interests:
Research Interests:
One of the ambitions when designing the Stream Control Transmission Protocol was to offer a robust transfer of traffic between hosts. For this reason SCTP was designed to support multihoming, which ...
Research Interests:
Interactive applications such as web browsing, audio/video conferencing, multi-player online gaming and financial trading applications do not benefit (much) from more bandwidth. Instead, they depend on low latency. Latency is a key... more
Interactive applications such as web browsing, audio/video conferencing, multi-player online gaming and financial trading applications do not benefit (much) from more bandwidth. Instead, they depend on low latency. Latency is a key determinant of user experience. An increasing concern for reducing latency is therefore currently being observed among the networking research community and industry.In this thesis, we quantify the proportion of potentially latency-sensitive traffic and its development over time. Next, we show that the flow start-up mechanism in the Internet is a major source of latency for a growing proportion of traffic, as network links get faster.The loss recovery mechanism in the transport protocol is another major source of latency. To improve the performance of latency-sensitive applications, we propose and evaluate several modifications in TCP. We also investigate the possibility of prioritization at the transport layer to improve the loss recovery. The idea is to...
Research Interests:
Information-centric networking (ICN) has been introduced as a potential future networking architecture. ICN promises an architecture that makes information independent from lo- cation, application, ...
Research Interests:
Virtualization abstracts computing resources that can be shared by multiple virtual machines. It is central to cloud computing which enables demand based sharing of computing resources over the Internet. To mitigate operational costs and... more
Virtualization abstracts computing resources that can be shared by multiple virtual machines. It is central to cloud computing which enables demand based sharing of computing resources over the Internet. To mitigate operational costs and cope with increasing traffic demands, telecom operators have started to adopt cloud computing. But telecom services and applications are characterized by real-time responsiveness, strict end-to-end latency, and high reliability; the performance of which can be degraded due to the inherent overhead introduced by virtualization. Comprehensive performance measurements and analysis are important to improve the performance of emerging telecom applications and services in a virtualized environment. To this purpose, we conducted controlled experiments, to understand the impact of virtualization on end-to-end latency, study the performance of transport protocols in a virtualized environment, and provide a packet delay breakdown in the hypervisor stack. The ...
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests: Engineering, Computer Science, Services, Mobile Communication, Cloud Computing, and 10 moreThe Internet, TCP IP, Autonomous Control, TCP congestion control algorithms in high speed networks, Cubic, Service Monitoring, Control Management, Transport Layer Protocols, Computer Sciences, and Springer Ebooks
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
This deliverable provides a final report on the work on transport protocol enhancements done inWork Package 3. First, we report on the extensions made to the SCTP protocol that turn it into a viabl ...
Research Interests:
This document describes the design and implementation of the 5GENESIS Monitoring & Analytics (M&A) framework (Release A), developed within Task T3.3 of the Project work plan.Fifth Generation End-to-End Network,... more
This document describes the design and implementation of the 5GENESIS Monitoring & Analytics (M&A) framework (Release A), developed within Task T3.3 of the Project work plan.Fifth Generation End-to-End Network, Experimentation, System Integration, and Showcasin
Research Interests:
Cellular Internet of Things (CIoT) is a Low-Power Wide-Area Network (LPWAN) technology. It aims for cheap, lowcomplexity IoT devices that enable large-scale deployments and wide-area coverage. Moreover, to make large-scale deployments of... more
Cellular Internet of Things (CIoT) is a Low-Power Wide-Area Network (LPWAN) technology. It aims for cheap, lowcomplexity IoT devices that enable large-scale deployments and wide-area coverage. Moreover, to make large-scale deployments of CIoT devices in remote and hard-to-access locations possible, a long device battery life is one of the main objectives of these devices. To this end, 3GPP has defined several energysaving mechanisms for CIoT technologies, not least for the Narrow-Band Internet of Things (NB-IoT) technology, one of the major CIoT technologies. Examples of mechanisms defined include CONNECTED-mode DRX (cDRX), Release Assistance Indicator (RAI), and Power Saving Mode (PSM). This paper considers the impact of the essential energy-saving mechanisms on minimizing the energy consumption of NB-IoT devices, especially the cDRX and RAI mechanisms. The paper uses a purpose-built NB-IoT simulator that has been tested in terms of its built-in energy-saving mechanisms and validated with realworld NB-IoT measurements. The simulated results show that it is possible to save 70%-90% in energy consumption by enabling the cDRX and RAI. In fact, the results suggest that a battery life of 10 years is only achievable provided the cDRX, RAI, and PSM energy-saving mechanisms are correctly configured and used.
Research Interests:
Research Interests:
Research Interests:
Research Interests:
There is a growing concern that the Internet transport layer has become ossified in the face of emerging novel applications, and that further evolution has become very difficult. This paper identifies requirements for a new transport... more
There is a growing concern that the Internet transport layer has become ossified in the face of emerging novel applications, and that further evolution has become very difficult. This paper identifies requirements for a new transport layer and then proposes a conceptual architecture, the NEAT system, that we believe is both flexible and evolvable. Applications interface the NEAT system through an enhanced user API that decouples them from the operation of the transport protocols and the network features being used. In particular, applications provide the NEAT system with information about their traffic requirements, pre-specified policies, and measured network conditions. On the basis of this information, the NEAT system establishes and configures appropriate connections.
Research Interests:
Research Interests:
Cellular networks are continuously evolving to allow improved throughput and low latency performance for applications. However, it has been shown that, due to buffer over-provisioning, TCP’s standard loss-based congestion control... more
Cellular networks are continuously evolving to allow improved throughput and low latency performance for applications. However, it has been shown that, due to buffer over-provisioning, TCP’s standard loss-based congestion control algorithms (CCAs) can cause long delays in cellular networks. The QUIC transport protocol and the Bottleneck Bandwidth and Round-trip propagation time (BBR) congestion control are both proposed in response to shortcomings observed in TCP and loss-based CCAs. Despite its notable advantages, BBR can experience suboptimal delay performance in cellular networks due to one of its underlying design choices: the maximum bandwidth filter at the sender. In this work, we leverage QUIC’s extensibility to enhance BBR. Instead of using the ACK rate observed at the sender side, we apply a more fitting delivery rate calculated at the receiver. Our 5G-trace-based emulation experiments in CloudLab suggest that our modified QUIC could significantly improve latency without any notable effect on the throughput: In particular, in some of our experiments, we observe up to 39% reduction of the round-trip time (RTT) with a worstcase throughput reduction of 2.7%.
Research Interests:
Research Interests:
Information-centric networking (ICN) with its design around named-based forwarding and in-network caching holds great promises to become a key architecture for the future Internet. Many proposed ICN hop-by-hop congestion control schemes... more
Information-centric networking (ICN) with its design around named-based forwarding and in-network caching holds great promises to become a key architecture for the future Internet. Many proposed ICN hop-by-hop congestion control schemes assume a fixed and known link capacity, which rarely — if ever — holds true for wireless links. Firstly, we demonstrate that although these congestion control schemes are able to fairly well utilise the available wireless link capacity, they greatly fail to keep the delay low. In fact, they essentially offer the same delay as in the case with no hop-by-hop, only end-to-end, congestion control. Secondly, we show that by complementing these schemes with an easy-to-implement, packet-train capacity estimator, we reduce the delay to a level significantly lower than what is obtained with only end-to-end congestion control, while still being able to keep the link utilisation at a high level.
Research Interests:
This document presents the core transport system in NEAT, as used for development of thereference implementation of the NEAT System. The document describes the componentsnecessary to realise the ba ...
Research Interests:
Ossification of the Internet transport-layer architecture is a significant barrier to innovation of the Internet. Such innovation is desirable for many reasons. Current applications often need to i ...
Research Interests:
Ideally, network applications should be able to select an appropriate transport solution from among available transport solutions. However, at present, there is no agreed-upon way to do this. In fact, there is not even an agreed-upon way... more
Ideally, network applications should be able to select an appropriate transport solution from among available transport solutions. However, at present, there is no agreed-upon way to do this. In fact, there is not even an agreed-upon way for a source end host to determine if there is support for a particular transport along a network path. This draft addresses these issues, by proposing a Happy Eyeballs framework. The proposed Happy Eyeballs framework enables the selection of a transport solution that according to application requirements, pre-set policies, and estimated network conditions is the most appropriate one. Additionally, the proposed framework makes it possible for an application to find out whether a particular transport is supported along a network connection towards a specific destination or not.
Research Interests:
Research Interests:
This deliverable summarises and concludes our work in Work Package 3 (WP3) to extend the transport services provided by the NEAT System developed in Work Package 2, and to enable non-NEAT applicati ...
Research Interests:
SCTP is a transport protocol targeted for telephony signaling traffic. Although SCTP from its inception supported multihoming, it has until now not supported concurrent mul- tipath transfer. Howeve ...
Research Interests:
This document presents the first version of the low-level Core Transport System in NEAT, to be used for development of a reference implementation of the NEAT System. The design of this core transpo ...
Research Interests:
Mobile wireless networks constitute an indispensable part of the global Internet, and with TCP being the dominating transport protocol on the Internet, it is vital that TCP works equally well over these networks as over wired ones. This... more
Mobile wireless networks constitute an indispensable part of the global Internet, and with TCP being the dominating transport protocol on the Internet, it is vital that TCP works equally well over these networks as over wired ones. This paper evaluates the performance of TCP NewReno and TCP CUBIC with respect to responsiveness to bandwidth variations related to different user movements. The evaluation complements previous studies on 4G mobile networks in two important ways: It primarily focuses on the behavior of the TCP congestion control in medium- to high-velocity mobility scenarios, and it not only considers the current 4G mobile networks, but also low latency configurations that move toward the potential delays in 5G networks. The results show that while the two TCP versions give similar goodput in scenarios where the radio channel quality continuously decreases, CUBIC gives a significantly higher goodput in scenarios where the quality continuously increases. This is due to CUB...
Research Interests:
This document presents the core transport system in NEAT, as used for development of the reference implementation of the NEAT System. The document describes the components necessary to realise the ...
Research Interests:
We present the latency-aware multipath scheduler ZQTRTT that takes advantage of the multipath opportunities in information-centric networking. The goal of the scheduler is to use the (single) lowes ...
Research Interests:
Research Interests:
Research Interests:
To mitigate delay during transmission of bursty signaling traffic, concurrent multipath transmission (CMT) over several paths in parallel could be an option. Still, unordered delivery is a well known problem when concurrently transmitting... more
To mitigate delay during transmission of bursty signaling traffic, concurrent multipath transmission (CMT) over several paths in parallel could be an option. Still, unordered delivery is a well known problem when concurrently transmitting data over asymmetric network paths, leading to extra delay due to Head-of-Line Blocking (HoLB). The Stream Control Transmission Protocol (SCTP), designed as a carrier for signaling traffic over IP, is currently being extended with support for CMT (CMT-SCTP). To reduce the impact of HoLB, SCTP has support for transmission of separate data flows, called SCTP streams. In this paper, we address sender scheduling to optimize latency for signaling traffic using CMT-SCTP. We present dynamic stream-aware (DS) scheduling, which utilizes the SCTP stream concept, and continuously considers the current network status as well as the data load to make scheduling decisions. We implement a DS scheduler and compare it against some existing schedulers. Our investigation suggests that DS scheduling could significantly reduce latency compared to dynamic path scheduling that does not consider streams. Moreover, we show that naive round-robin scheduling may provide low latency over symmetric network paths, but may transmit data on non-beneficial asymmetric network paths leading to increased latency. Finally, our results show that a static stream based approach, found beneficial for bulk traffic, is not appropriate for bursty signaling traffic.
Research Interests:
Research Interests: Computer Science, Distributed Computing, Architecture, Telecommunications, Computer Networks, and 14 moreFuture Internet Architecture, Context-Aware Applications, Networking, The Internet, API Design, Computer Network, TCP IP, IEEE, Internet Architecture, Evolvability, Transport Layer, Ossification, Application Layer, and Telekommunikation
Research Interests:
This position paper gives a status report on work we have recently started to survey techniques for reducing the delays in communications. The immediate aim is to organise all the techniques into a meaningful categorisation scheme, then... more
This position paper gives a status report on work we have recently started to survey techniques for reducing the delays in communications. The immediate aim is to organise all the techniques into a meaningful categorisation scheme, then to quantify the benefit of each approach and produce visualisations that highlight those approaches that are likely to be most fruitful
Research Interests:
The NEAT System offers an enhanced API for applications that disentangles them from the actual transport protocol being used. The system also enables applications to communicate their service requi ...
Research Interests:
Understanding radio propagation characteristics and developing channel models is fundamental to building and operating wireless communication systems. Among others uses, channel characterization and modeling can be used for coverage and... more
Understanding radio propagation characteristics and developing channel models is fundamental to building and operating wireless communication systems. Among others uses, channel characterization and modeling can be used for coverage and performance analysis and prediction. Within this context, this paper describes a comprehensive dataset of channel measurements performed to analyze outdoor-to-indoor propagation characteristics in the mid-band spectrum identified for the operation of 5th Generation (5G) cellular systems. Previous efforts to analyze outdoor-to-indoor propagation characteristics in this band were made by using measurements collected on dedicated, mostly single-link setups. Hence, measurements performed on deployed and operational 5G networks still lack in the literature. To fill this gap, this paper presents a dataset of measurements performed over commercial 5G networks. In particular, the dataset includes measurements of channel power delay profiles from two 5G netwo...
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Cooperative intelligent transport systems (C-ITS) enable information to be shared wirelessly between vehicles and infrastructure in order to improve transport safety and efficiency. Delivering C-ITS services using existing cellular... more
Cooperative intelligent transport systems (C-ITS) enable information to be shared wirelessly between vehicles and infrastructure in order to improve transport safety and efficiency. Delivering C-ITS services using existing cellular networks offers both financial and technological advantages, not least since these networks already offer many of the features needed by C-ITS, and since many vehicles on our roads are already connected to cellular networks. Still, C-ITS pose stringent requirements in terms of availability and latency on the underlying communication system; requirements that will be hard to meet for currently deployed 3G, LTE, and early-generation 5G systems. Through a series of experiments in the MONROE testbed (a cross-national, mobile broadband testbed), the present study demonstrates how cellular multi-access selection algorithms can provide close to 100 percent availability, and significantly reduce C-ITS transaction times. The study also proposes and evaluates a number of low-complexity, low-overhead single-access selection algorithms, and shows that it is possible to design such solutions so that they offer transaction times and availability levels that rival those of multi-access solutions.
Research Interests:
Research Interests: Engineering, Computer Science, Technology, Telecommunications, Computer Networks, and 15 moreCongestion Control, Survey, Computer Network, TCP IP, Mobile, Wireless, Cellular Network, TCP variants, TCP congestion control algorithms in high speed networks, Tcp, Bottleneck, G, network congestion, QUIC, and Telekommunikation
The strict low-latency requirements of applications such as virtual reality, online gaming, etc., can not be satisfied by the current Internet. This is due to the characteristics of classic TCP such as Reno and TCP Cubic which induce high... more
The strict low-latency requirements of applications such as virtual reality, online gaming, etc., can not be satisfied by the current Internet. This is due to the characteristics of classic TCP such as Reno and TCP Cubic which induce high queuing delays when used for capacity-seeking traffic, which in turn results in unpredictable latency. The Low Latency, Low Loss, Scalable throughput (L4S) architecture addresses this problem by combining scalable congestion controls such as DCTCP and TCP Prague with early congestion signaling from the network. It defines a Dual Queue Coupled (DQC) AQM that isolates low-latency traffic from the queuing delay of classic traffic while ensuring the safe co-existence of scalable and classic flows on the global Internet. In this paper, we benchmark the DualPI2 scheduler, a reference implementation of DQC AQM, to validate some of the experimental result(s) reported in the previous works that demonstrate the co-existence of scalable and classic congestion...
Research Interests: Computer Science, Distributed Computing, Architecture, Linux Kernel, Congestion Control, and 11 moreQueueing theory, Computer Network, Computer Software, Scalability, Reproducibility, Low Latency, computer Communication, Active Queue Management, ECN, Explicit Congestion Notification, and network congestion
During the first phase of NEWCOM the focus areas of Department 6 were identified and refined. A number of relevant knowledge gaps were identified for the areas transport protocols, architectures and cross-layer aspects, and modelling. In... more
During the first phase of NEWCOM the focus areas of Department 6 were identified and refined. A number of relevant knowledge gaps were identified for the areas transport protocols, architectures and cross-layer aspects, and modelling. In this deliverable we describe a first set of frameworks/models to support research integration within the Department. The integration approach and the defined models/frameworks are described for each one of the selected knowledge gaps. The deliverable also includes a report on tools, software libraries and traces that can be shared between the partners
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
ABSTRACT Experiences in the use of the Internet as a delivery medium for multimedia-based applications have revealed serious deficiencies in its ability to provide the QoS of Multimedia Applications. We propose an extension to TCP that... more
ABSTRACT Experiences in the use of the Internet as a delivery medium for multimedia-based applications have revealed serious deficiencies in its ability to provide the QoS of Multimedia Applications. We propose an extension to TCP that addresses the QoS requirements of applications with soft real-time constraints. Although, TCP has been found unsuitable for real-time applications, it can with minor modifications be adjusted to better comply with the QoS needs of applications with soft real-time requirements. Enhancing TCP with support for this group of applications is important since the congestion control mechanism of TCP assures stability of the Internet. In contrast, specialized multimedia protocols that lack appropriate congestion control can never be deployed on a large scale basis. Two factors of great importance for applications with soft real time constraints are jitter and throughput. By relaxing the reliability offered by TCP, the extension gives better jitter characteristics and an improved throughput. The extension only needs to be implemented at the receiving side. The reliability provided is controlled by the receiving application, thereby allowing a flexible tradeoff between different QoS parameters. In this paper, our TCP extension is presented and analyzed. The analysis investigates how the different application-controlled parameters influence performance. Our analysis is supported by a simulation study that investigates the tradeoff between interarrival jitter, throughput, and reliability. The simulation results also confirm that the extended version of TCP still behaves in a TCP-friendly manner.
Research Interests:
PRTP is proposed to address the need of a transport service that is more suitable forapplications with soft real-time requirements, e.g., video broadcasting. It is an extensionfor partial reliabili ...
Research Interests:
To enable interoperability between the public switched telephone network and IP, the IETF SIGTRAN working group has developed an architecture for the transportation of SS7 signaling traffic over IP ...
Research Interests:
There is currently work going on at IETF to standardize concurrent multipath transfer, i.e., simultaneous transfer of data over several network paths, for SCTP. This paper studies whether or not SC ...
Research Interests:
kau.se. ...
Research Interests:
There are some large economic, operational, and, to some extent, technical incentives to replace the traditional te lecom network with IP. However, such a large transition will not happen overnight - maybe never. Meanwhile, IP-based and... more
There are some large economic, operational, and, to some extent, technical incentives to replace the traditional te lecom network with IP. However, such a large transition will not happen overnight - maybe never. Meanwhile, IP-based and traditional TDM-based telephony will have to co-exist. To address this situation, the IETF SIGTRAN working group has developed an architecture for transportation of Signal ing System No. 7 (SS7) traffic over IP. Still, it remains to be shown that the introduction of the SIGTRAN architecture will not significantly deteriorate the performance of SS7. To this end, this paper evaluates the failover performance in SIGTRAN networks. Specifically, the paper evaluates the performance of SCTP-controlled failovers in M3UA-based SIGTRAN networks. The paper suggests that in order to obtain a failover performance with SCTP comparable to that obtained in traditional TDM-based SS7 systems, SCTP has to abandon many of the configuration recommendations of RFC 2960 an...
Research Interests:
This document is the last deliverable of WPR.11 and presents an overview of the final activities carried out within the NEWCOM++ Workpackage WPR.11 during the last 18 months. We provide a descripti ...
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
The Datagram Congestion Control Protocol (DCCP) is a transport-layer protocol that provides upper layers with the ability to use non- reliable congestion-controlled flows. DCCP is not widely deployed in the Internet, and the reason for... more
The Datagram Congestion Control Protocol (DCCP) is a transport-layer protocol that provides upper layers with the ability to use non- reliable congestion-controlled flows. DCCP is not widely deployed in the Internet, and the reason for that can be defined as a typical example of a chicken-egg problem. Even if an application developer decided to use DCCP, the middle-boxes like firewalls and NATs would prevent DCCP end-to-end since they lack support for DCCP. Moreover, as long as the protocol penetration of DCCP does not increase, the middle-boxes will not handle DCCP properly. To overcome this challenge, NAT/NATP traversal and UDP encapsulation for DCCP is already defined. However, the former requires special middle-box support and the latter introduces overhead. The recent proposal of a multipath extension for DCCP further underlines the challenge of efficient middle-box passing as its main goal is to be applied over the Internet, traversing numerous uncontrolled middle-boxes. This ...
Research Interests:
Mobile networks have become ubiquitous and the primary means to access the Internet, and the traffic they generate has rapidly increased over the last years. The technology and service diversity in mobile networks call for extensive and... more
Mobile networks have become ubiquitous and the primary means to access the Internet, and the traffic they generate has rapidly increased over the last years. The technology and service diversity in mobile networks call for extensive and accurate measurements to ensure the proper functioning of the networks and rapidly spot impairments. However, the measurement of mobile networks is complicated by their scale, and, thus, expensive, especially due to the diversity of deployments, technologies, and web services. In this paper, we present and provide access to the largest open international mobile network dataset collected using the MONROE platform spanning six countries, 27 mobile network operators, and 120 measurement nodes. We use them to run measurements targeting several web services from January 2018 to December 2019, collecting millions of TCP and UDP flows using these commercial mobile networks. We illustrate the data collection platforms and describe some of the main experiment...
Research Interests:
This deliverable provides a final report on the work on transport protocol enhancements done in Work Package 3. First, we report on the extensions made to the SCTP protocol that turn it into a viable alternative to TCP and allow to... more
This deliverable provides a final report on the work on transport protocol enhancements done in Work Package 3. First, we report on the extensions made to the SCTP protocol that turn it into a viable alternative to TCP and allow to deliver a lower-latency transport service. Next, we describe our work to develop a framework for providing a deadline-aware, less-than-best-effort transport service, targeting background traffic and thus addressing requirements on NEAT from the EMC use case. We also present our efforts to design and implement a latency-aware scheduler for MPTCP, which enables NEAT to offer a transport service that meets the needs of latency-sensitive applications, and that efficiently utilises available network resources. Lastly, this document informs on our work on coupled congestion control for TCP, a mechanism that treats a bundle of parallel TCP flows between the same pair of hosts as a single unit. By efficiently multiplexing concurrent TCP flows, our coupled congest...
More and more of today's devices are multi-homing capable, in particular 3GPP user equipment like smartphones. In the current standardization of the next upcoming mobile network generation 5G Rel.16, this is especially targeted in the... more
More and more of today's devices are multi-homing capable, in particular 3GPP user equipment like smartphones. In the current standardization of the next upcoming mobile network generation 5G Rel.16, this is especially targeted in the study group Access Traffic Steering Switching Splitting [TR23.793]. ATSSS describes the flexible selection or combination of 3GPP untrusted access like Wi-Fi and cellular access, overcoming the single-access limitation of today's devices and services. Another multi-connectivity scenario is the Hybrid Access [I-D.lhwxz-hybrid-access-network-architecture][I-D. muley-network-based-bonding-hybrid-access], providing multiple access for CPEs, which extends the traditional way of single access connectivity at home to dual-connectivity over 3GPP and fixed access. A missing piece in the ATSSS and Hybrid Access is the access and path measurement, which is required for efficient and beneficial traffic steering decisions. This becomes particularly importan...
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Contemporary mobile devices such as smartphones and tablets are increasingly equipped with multiple network interfaces that enable automatic vertical handover between heterogeneous wireless networks including WiFi and cellular 3G and 4G... more
Contemporary mobile devices such as smartphones and tablets are increasingly equipped with multiple network interfaces that enable automatic vertical handover between heterogeneous wireless networks including WiFi and cellular 3G and 4G networks. However, the employed vertical handover schemes are mostly quite simple, and incur non-negligible service disruptions to ongoing sessions, e.g., video streaming and live conferencing sessions. A number of improved mobility management frameworks for these lightweight mobile devices have been proposed in the past recent years. Although these may result in negligible service disruptions, the vast majority of them are network- or integrated network- and link-layer based, and require support in the infrastructure to be successfully deployed. This paper demonstrates the feasibility of using an infrastructure-independent, transport-level vertical handover scheme on a smartphone for an application as demanding as video streaming. In our study, we used a previously developed Android-based mobility framework. The study shows that a standardized mobility solution based on the Stream Control Transmission Protocol (SCTP) and its extension for Dynamic Address Reconfiguration (DAR), incurs a service disruption on par with comparable proposed network- and link-layer solutions.
Research Interests:
The stability and performance,of the Internet to date have in a large part been due to the congestion control mechanism employed by TCP. However, while the TCP conges- tion control is appropriate for traditional applications such as bulk... more
The stability and performance,of the Internet to date have in a large part been due to the congestion control mechanism employed by TCP. However, while the TCP conges- tion control is appropriate for traditional applications such as bulk data transfer, it has been found less than ideal for multimedia applications. In particular, audio and video
Research Interests:
... Available from Karl-Johan Grinnemo's profile on Mendeley ... 2 readers Save reference to library · Related research. Mobile SCTP with Bicasting for Vertical Handover. Soon-Hong Kwon, Seok-Joo Koh, Tai-Won Um, Won Ryu in Third... more
... Available from Karl-Johan Grinnemo's profile on Mendeley ... 2 readers Save reference to library · Related research. Mobile SCTP with Bicasting for Vertical Handover. Soon-Hong Kwon, Seok-Joo Koh, Tai-Won Um, Won Ryu in Third International Conference on Convergence and ...
Research Interests:
Research Interests: Computer Science, Distributed Computing, Apiculture, The Internet, Tutorials, and 13 moreIEEE, Endochondral Ossification, Api, Electronic mail, Ta, Users Satisfaction in Urban Public Spaces, Transport Protocols, Electrical And Electronic Engineering, Sockets, Transport Layer Protocols, Protocol Stack, Middle-Boxes, and Networking Stacks
Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the... more
Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.
Research Interests:
DCCP communication is currently restricted to a single path per connection, yet multiple paths often exist between peers. The simultaneous use of these multiple paths for a DCCP session could improve resource usage within the network and,... more
DCCP communication is currently restricted to a single path per connection, yet multiple paths often exist between peers. The simultaneous use of these multiple paths for a DCCP session could improve resource usage within the network and, thus, improve user experience through higher throughput and improved resilience to network failure. Multipath DCCP provides the ability to simultaneously use multiple paths between peers. This document presents a set of extensions to traditional DCCP to support multipath operation. The protocol offers the same type of service to applications as DCCP and it provides the components necessary to establish and use multiple DCCP flows across potentially disjoint paths.
Research Interests:
Research Interests:
Research Interests:
The high heterogeneity of 5G use cases requires the extension of the traditional per-component testing procedures provided by certification organizations, in order to devise and incorporate methodologies that cover the testing... more
The high heterogeneity of 5G use cases requires the extension of the traditional per-component testing procedures provided by certification organizations, in order to devise and incorporate methodologies that cover the testing requirements from vertical applications and services. In this paper, we introduce an experimentation methodology that is defined in the context of the 5GENESIS project, which aims at enabling both the testing of network components and validation of E2E KPIs. The most important contributions of this methodology are its modularity and flexibility, as well as the open-source software that was developed for its application, which enable lightweight adoption of the methodology in any 5G testbed. We also demonstrate how the methodology can be used, by executing and analyzing different experiments in a 5G Non-Standalone (NSA) deployment at the University of Malaga. The key findings of the paper are an initial 5G performance assessment and KPI analysis and the detecti...
Research Interests:
Research Interests:
ABSTRACT Network security is an increasingly impor-tant issue. Traditional solutions for protecting data when transferred over the network are almost exclusively based on cryptography. As a complement, we propose the use of SCTP and its... more
ABSTRACT Network security is an increasingly impor-tant issue. Traditional solutions for protecting data when transferred over the network are almost exclusively based on cryptography. As a complement, we propose the use of SCTP and its support for physically separate paths to accomplish protection against eavesdropping attacks near the end points.
Research Interests:
ABSTRACT This paper analyzes three existing tunable security services based on a conceptual model. The aim of the study is to examine the tunable features provided by the different services in a structured and consistent way. This implies... more
ABSTRACT This paper analyzes three existing tunable security services based on a conceptual model. The aim of the study is to examine the tunable features provided by the different services in a structured and consistent way. This implies that for each service user preferences as well as environment and application characteristics that influence the choice of a certain security configuration are identified and discussed.
Research Interests:
Research Interests:
... Annika Wennstrom, Anna Brunstrom, Johan Garcia Dept. ... The use of soft GSM software on a laptop makes it possible to ac-cess this interface, which is physically available on a RS-232 cable between the laptop and the GSM phone. ...
Research Interests:
lib.kth.se. ...
Research Interests:
Research Interests:
Research Interests:
Research Interests:
ABSTRACT A packet switched wireless cellular system with wide area coverage and high throughput is proposed. The system is designed to be cost effective and to provide high spectral efficiency. It makes use of a combination of tools and... more
ABSTRACT A packet switched wireless cellular system with wide area coverage and high throughput is proposed. The system is designed to be cost effective and to provide high spectral efficiency. It makes use of a combination of tools and concepts: - Smart antennas both at base stations and mobiles, provide antenna gain and improve the signal to interference ratio. - The fast fading is predicted in both time and frequency and - a slotted OFDM radio interface is used, in which time-frequency slots are allocated adaptively to different mobile users, based on their predicted channel quality. This enables efficient scheduling among sectors and users as well as fast adaptive modulation and power control. We here outline the uplink of the radio interface. Calculations based on simplifying assumptions illustrate how the channel capacity grows with the number of simultaneous users and the number of antenna elements. A high capacity can be attained already for moderate numbers of users and base station/terminal antennas. For additional information and references, please see http://www.signal.uu.se/Research/PCCwirelessIP.html
Research Interests:
ABSTRACT This paper presents a technique to improve the performance of TCP and the utilization of wireless networks. Wireless links exhibit high rates of bit errors, compared to communication over wireline or fiber. Since TCP cannot... more
ABSTRACT This paper presents a technique to improve the performance of TCP and the utilization of wireless networks. Wireless links exhibit high rates of bit errors, compared to communication over wireline or fiber. Since TCP cannot separate packet losses due to bit errors versus congestion, all losses are treated as signs of congestion and congestion avoidance is initiated. This paper explores the possibility of accepting TCP packets with an erroneous checksum, to improve network performance for those applications that can tolerate bit errors. Since errors may be in the TCP header as well as the payload, the possibility of recovering the header is discussed. An algorithm for this recovery is also presented. Experiments with an implementation have been performed, which show that large improvements in throughput can be achieved, depending on link and error characteristics.
Research Interests:
Research Interests:
ABSTRACT Internet-based applications that require low latency are becoming more common. Such applications typically generate traffic consisting of short, or bursty, TCP flows. As TCP, instead, is designed to optimize the throughput of... more
ABSTRACT Internet-based applications that require low latency are becoming more common. Such applications typically generate traffic consisting of short, or bursty, TCP flows. As TCP, instead, is designed to optimize the throughput of long bulk flows there is an apparent mismatch. To overcome this, a lot of research has recently focused on optimizing TCP for short flows as well. In this paper, we identify a performance problem for short flows caused by the metric caching conducted by the TCP control block interdependence mechanisms. Using this metric caching, a single packet loss can potentially ruin the performance for all future flows to the same destination by making them start in congestion avoidance instead of slow-start. To solve this, we propose an enhanced selective caching mechanism for short flows. To illustrate the usefulness of our approach, we implement it in both Linux and FreeBSD and experimentally evaluate it in a real test-bed. The experiments show that the selective caching approach is able to reduce the average transmission time of short flows by up to 40%.
Research Interests:
ABSTRACT
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Page 1. A 4G IP-based Wireless System Proposal Tony Ottosson1, Anders Ahlén2, Anna Brunstrom3, Mikael Sternad2 and Arne Svensson1 1Dept. ... However, since the channel will in general not be constant over the whole bandwidth-slot region,... more
Page 1. A 4G IP-based Wireless System Proposal Tony Ottosson1, Anders Ahlén2, Anna Brunstrom3, Mikael Sternad2 and Arne Svensson1 1Dept. ... However, since the channel will in general not be constant over the whole bandwidth-slot region, see Fig. ...
Research Interests:
Research Interests: Computer Science, Technology, Biomedical Engineering, Adaptive Control, Scheduling, and 12 morePacket scheduling, Time-Frequency Analysis, Channel Estimation, TDMA (Time division multiple access), Link Adaptation, Wireless Broadband, High performance, Next Generation Wireless Systems, Spectral Efficiency, Electrical And Electronic Engineering, Cyclic Prefix, and Multiple Antennas
... Balan et al [3] describe TCP HACK, a similar scheme except that it uses a TCP option containing a checksum for Page 2. the TCP header. ... Figure 5 shows the 200 ms case and also includes measurement for unmodified FreeBSD 5.1 as well... more
... Balan et al [3] describe TCP HACK, a similar scheme except that it uses a TCP option containing a checksum for Page 2. the TCP header. ... Figure 5 shows the 200 ms case and also includes measurement for unmodified FreeBSD 5.1 as well as Red Hat 9 Linux. ...
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
ABSTRACT
Research Interests:
Research Interests:
Research Interests:
Page 1. 20 Analytical Analysis of the Performance Overheads of IPsec in MIPv6 Scenarios Zoltán Faigl, Péter Fazekas, Stefan Lindskog, and Anna Brunstrom 20.1 Introduction The next generation network (NGN) connects different ...
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
kau.se. ...
Research Interests:
Research Interests:
Research Interests:
ABSTRACT The data traffic volumes are constantly increasing in cellular networks. Furthermore, a larger part of the traffic is generated by applications that require high data rates. Techniques including Coordinated Multipoint... more
ABSTRACT The data traffic volumes are constantly increasing in cellular networks. Furthermore, a larger part of the traffic is generated by applications that require high data rates. Techniques including Coordinated Multipoint transmission (CoMP) can increase the data rates, but at the cost of a high overhead. The overhead can be reduced if only a subset of the users is served with CoMP. In this paper, we propose a user selection approach, including pre-selection of CoMP users and short term scheduling, that takes user requirements into account. Users that require a high data rate to reach an acceptable level of service satisfaction are selected to use coherent joint processing CoMP in some of their downlink transmission bandwidth. Simulation results show that both the number of satisfied users and fairness are improved with the proposed user selection as compared to user selection that does not consider individual user requirements. For additional information and references, please see http://www.signal.uu.se/Research/4G5Gwireless.html
Research Interests:
ABSTRACT Routing packets over multiple disjoint paths towards a destination can increase network utilization by load-balancing the traffic over the network. The drawback of load-balancing is that different paths might have different delay... more
ABSTRACT Routing packets over multiple disjoint paths towards a destination can increase network utilization by load-balancing the traffic over the network. The drawback of load-balancing is that different paths might have different delay properties, causing packets to be reordered. This can reduce TCP performance significantly, as reordering is interpreted as a sign of congestion. Packet reordering can be avoided by letting the network layer route strictly on flow-level. This will, however, also limit the ability to achieve optimal network throughput. There are also several proposals that try to mitigate the effects of reordering at the transport layer. In this paper, we perform an initial evaluation of such TCP reordering mitigations in multi-radio multi-channel wireless mesh networks when using multi-path routing. We evaluate two TCP reordering mitigation techniques implemented in the Linux kernel. The transport layer mitigations are compared using different multi-path routing strategies. Our findings show that, in general, flow-level routing gives the best TCP performance and that transport layer reordering mitigations only marginally can improve performance.
Research Interests:
Research Interests:
Research Interests:
This paper presents an experiment in which the impact of SCTP-controlled failovers was studied. In particular, the experiment studied the impact these failovers have on the Message Signal Unit (MSU) transfer times, i.e., the signaling... more
This paper presents an experiment in which the impact of SCTP-controlled failovers was studied. In particular, the experiment studied the impact these failovers have on the Message Signal Unit (MSU) transfer times, i.e., the signaling message transfer times, for an M3UA user in a dedicated SIGTRAN network. In addition, the experiment studied to what extent an increased link delay has a significant deteriorating effect on the MSU transfer times during an SCTP-controlled failover
Research Interests:
Research Interests:
Research Interests:
Research Interests:
In this paper, we start to investigate the security implications of selective encryption. We do this by using the measure guesswork, which gives us the expected number of guesses that an attacker must perform in an optimal brute force... more
In this paper, we start to investigate the security implications of selective encryption. We do this by using the measure guesswork, which gives us the expected number of guesses that an attacker must perform in an optimal brute force attack to reveal an encrypted message. ...
Research Interests:
Research Interests:
We examine load balancing in a simple pipeline computation, in which a large number of data sets is pipelined through a series of tasks and load balancing is performed by distributing several available processors among the tasks. We... more
We examine load balancing in a simple pipeline computation, in which a large number of data sets is pipelined through a series of tasks and load balancing is performed by distributing several available processors among the tasks. We compare the ...
Research Interests:
ABSTRACT In this paper we focus on wireless multimedia communication and investigate how soft information from the physical layer can be used at the application layer. The soft information yields reliability measures for the received bits... more
ABSTRACT In this paper we focus on wireless multimedia communication and investigate how soft information from the physical layer can be used at the application layer. The soft information yields reliability measures for the received bits and is incorporated into two ...
Research Interests:
Research Interests:
Research Interests:
Research Interests:
ABSTRACT Wireless mesh networks (WMNs) based on the IEEE 802.11 standard are becoming increasingly popular as a viable alternative to wired networks. WMNs can cover large or difficult to reach areas with low deployment and management... more
ABSTRACT Wireless mesh networks (WMNs) based on the IEEE 802.11 standard are becoming increasingly popular as a viable alternative to wired networks. WMNs can cover large or difficult to reach areas with low deployment and management costs. Several multi-path routing algorithms have been proposed for such kind of networks with the objective of load balancing the traffic across the network and providing robustness against node or link failures. Packet aggregation has also been proposed to reduce the overhead associated with the transmission of frames, which is not negligible in IEEE 802.11 networks. Unfortunately, multi-path routing and packet aggregation do not work well together, as they pursue different objectives. Indeed, while multi-path routing tends to spread packets among several next-hops, packet aggregation works more efficiently when several packets (destined to the same next-hop) are aggregated and sent together in a single MAC frame. In this paper, we propose a technique, called aggregation aware forwarding, that can be applied to existing multi-path routing algorithms to allow them to effectively exploit packet aggregation so as to significantly increase their network performance. In particular, the proposed technique does not modify the path computation phase, but it just influences the forwarding decisions by taking the state of the sending queues into account. We demonstrated our proposed technique by applying it to Layer-2.5, a multi-path routing and forwarding paradigm for WMNs that has been previously proposed. We conducted a thorough performance evaluation by means of the ns-3 network simulator, which showed that our technique allows to increase the performance both in terms of network throughput and end-to-end delay.
Research Interests:
ABSTRACT
Research Interests:
A packet switched wireless cellular system with wide area coverage and high throughput is proposed. The system is designed to be cost effective and to provide high spectral efficiency. It makes use of a combination of tools and concepts:... more
A packet switched wireless cellular system with wide area coverage and high throughput is proposed. The system is designed to be cost effective and to provide high spectral efficiency. It makes use of a combination of tools and concepts: - Smart antennas both at base stations and mobiles, provide antenna gain and improve the signal to interference ratio. - The fast fading is predicted in both time and frequency and - a slotted OFDM radio interface is used, in which time-frequency slots are allocated adaptively to different mobile users, based on their predicted channel quality. This enables efficient scheduling among sectors and users as well as fast adaptive modulation and power control. We here estimate the spectral efficiency of the uplink and downlink. Calculations based on simplifying assumptions illustrate how the channel capacity grows with the number of simultaneous users and the number of antenna elements. A high efficiency is attained already for moderate numbers of users ...
Research Interests:
A packet switched wireless cellular system with wide area coverage, high throughput and high spectral efficiency is proposed. Smart antennas at both base stations and mobiles improve the antenna gain and improve the signal to interference... more
A packet switched wireless cellular system with wide area coverage, high throughput and high spectral efficiency is proposed. Smart antennas at both base stations and mobiles improve the antenna gain and improve the signal to interference ratio. The small-scale fading is predicted in both time and frequency and a slotted OFDM radio interface is used, in which time-frequency bins are allocated adaptively to different mobile users, based on their predicted channel quality. This enables efficient scheduling among sectors and users as well as fast adaptive modulation and power control. We here estimate the spectral efficiency of the suggested downlink. The resulting channel capacity grows with the number of simultaneous users and with the number of antenna elements in terminals. A high efficiency, around 4 bits/s/Hz, is attained already for moderate numbers of users and terminal antennas. An outline is given of research pursued within the PCC Wireless IP Project to improve and investiga...
Research Interests:
A packet switched wireless cellular system with wide area coverage and high throughput is proposed. It is designed to be cost effective and to provide high spectral efficiency. The high performance is achieved by the use of long term... more
A packet switched wireless cellular system with wide area coverage and high throughput is proposed. It is designed to be cost effective and to provide high spectral efficiency. The high performance is achieved by the use of long term channel predictions, in both time and frequency, scheduling among users, and smart antennas combined with adaptive modulation and power control. Calculations based on reasonable simplifying assumptions indicate that a tremendous capacity can be attained for moderate numbers of users and terminal antennas. We also briefly discuss other means for performance improvements such as alternatives to standard TCP, interlayer interaction /communication, and the use of positioning information. For additional information and references, please see http://www.signal.uu.se/Research/PCCwirelessIP.html
Research Interests:
A packet switched wireless cellular system with wide area coverage and high throughput is proposed. The system is designed to be cost effective and to provide high spectral efficiency. It makes use of a combination of tools and concepts:... more
A packet switched wireless cellular system with wide area coverage and high throughput is proposed. The system is designed to be cost effective and to provide high spectral efficiency. It makes use of a combination of tools and concepts: - Smart antennas both at base stations and mobiles, provide antenna gain and improve the signal to interference ratio. - The fast fading is predicted in both time and frequency and - a slotted OFDM radio interface is used, in which time-frequency slots are allocated adaptively to different mobile users, based on their predicted channel quality. This enables efficient scheduling among sectors and users as well as fast adaptive modulation and power control. We here outline the uplink of the radio interface. Calculations based on simplifying assumptions illustrate how the channel capacity grows with the number of simultaneous users and the number of antenna elements. A high capacity can be attained already for moderate numbers of users and base station...
This paper analyzes three existing tunable security services based on a conceptual model. The aim of the study is to examine the tunable features provided by the different services in a structured and consistent way. This implies that for... more
This paper analyzes three existing tunable security services based on a conceptual model. The aim of the study is to examine the tunable features provided by the different services in a structured and consistent way. This implies that for each service user preferences as well as environment and application characteristics that influence the choice of a certain security configuration are identified and discussed.
Research Interests:
The underlying physical link is transparent in most IP-based networks. Contrary to this commonly accepted design rule, we propose that the applications should be made aware of the channel conditions. This is especially fruitful for... more
The underlying physical link is transparent in most IP-based networks. Contrary to this commonly accepted design rule, we propose that the applications should be made aware of the channel conditions. This is especially fruitful for wireless links where the performance is many orders of magnitudes lower than in fixed networks. Instead of wasting resources to make the wireless link behave as a fixed link, the application could take care of the adaptation to the channel condition. The presented solution assumes that soft information consisting of a reliability measure of the received bits is produced in the physical layer. This soft information is then propagated to the application. The application may use this infor-mation to distinguish between errors caused by fading and network congestion. Another possible use for soft information is to make the applications adapt the source and channel codes to the current channel condition and thus maximize performance.
To achieve the best possible QoS tradeoff between security and performance for networked applications, a tunable and differential treatment of security is required. In this paper, we present the design and implementation of a tunable... more
To achieve the best possible QoS tradeoff between security and performance for networked applications, a tunable and differential treatment of security is required. In this paper, we present the design and implementation of a tunable encryption service. The proposed service is based on a selective encryption paradigm in which the applications can request a desired encryption level. Encryption levels are selected by the applications at the inception of sessions, but can be changed at any time during their lifetime. A prototype implementation is described along with an initial performance evaluation. The experimental results demonstrate that the proposed service offers a high degree of security adaptiveness at a low cost.
In this paper, we investigate the tunable features provided by Mix-Nets and Crowds using a conceptual model for tunable secu- rity services. A tunable security service is deflned as a service that has been explicitly designed to ofier... more
In this paper, we investigate the tunable features provided by Mix-Nets and Crowds using a conceptual model for tunable secu- rity services. A tunable security service is deflned as a service that has been explicitly designed to ofier various security levels that can be se- lected at run-time. Normally, Mix-Nets and Crowds are considered to be static anonymity services, since they were not explicitly designed to provide tunability. However, as discussed in this paper, they both con- tain dynamic elements that can be used to achieve a tradeofi between anonymity and performance.
This paper presents a technique to improve the performance of TCP and the utilization of wireless networks. Wireless links exhibit high rates of bit errors, compared to communication over wireline or fiber. Since TCP cannot separate... more
This paper presents a technique to improve the performance of TCP and the utilization of wireless networks. Wireless links exhibit high rates of bit errors, compared to communication over wireline or fiber. Since TCP cannot separate packet losses due to bit errors versus congestion, all losses are treated as signs of congestion and congestion avoidance is initiated. This paper explores the possibility of accepting TCP packets with an erroneous checksum, to improve network performance for those applications that can tolerate bit errors. Since errors may be in the TCP header as well as the payload, the possibility of recovering the header is discussed. An algorithm for this recovery is also presented. Experiments with an implementation have been performed, which show that large improvements in throughput can be achieved, depending on link and error characteristics.
This paper argues for the usefulness of enhancing current network emulation practices to also include more control over loss and bit-errors. By using an extended Dummynet emulator we illustrate the beneficial effects of being able control... more
This paper argues for the usefulness of enhancing current network emulation practices to also include more control over loss and bit-errors. By using an extended Dummynet emulator we illustrate the beneficial effects of being able control the placement of losses. Both the possibility to get additional knowledge about protocol behavior, as well as statistical benefits such as paired experiments are discussed. By extending the control to also include bit-error generation a finer level of abstraction is provided which allows the possibility to also examine bit-error sensitive protocol behavior. Time-driven bit-error insertion can be used to emulate the time-varying bit-error characteristics of a wireless link in a repeatable manner, and data-driven bit-errors can be useful when examining protocol details.
Network emulation has for a long time been an important tool for evaluating the performance of communication pro- tocols. By emulating network characteristics, such as re- stricted bandwidth, delay and losses, knowledge about the behavior... more
Network emulation has for a long time been an important tool for evaluating the performance of communication pro- tocols. By emulating network characteristics, such as re- stricted bandwidth, delay and losses, knowledge about the behavior and performance of actual protocol implementa- tions can be obtained. This paper focuses on the gener- ation of losses in network emulators and shows the ben- ecial effects of being able to control the generation of losses in a precise way. Both the possibility to get addi- tional knowledge about a protocol implementations behav- ior, as well as statistical benets such as paired experiments are discussed. By extending the loss generation to also in- clude bit-error generation, in addition to packet losses, a ner level of abstraction is provided. Deterministic bit- error generation allows detailed and repeatable studies of bit-error sensitive protocol behavior. TCP and a loss differ- entiating variant of TCP is used to illustrate the utility of impr...
The stream control transmission protocol (SCTP) is a fairly new transport protocol that was initially designed for carrying signaling traffic in IP networks. SCTP offers a reliable end-to-end (E2E) transport. Compared to TCP, SCTP... more
The stream control transmission protocol (SCTP) is a fairly new transport protocol that was initially designed for carrying signaling traffic in IP networks. SCTP offers a reliable end-to-end (E2E) transport. Compared to TCP, SCTP provides a much richer set of transport features such as message oriented transfer, multistreaming to handle head- of-line blocking, and multihoming for enhanced failover. These are
Research Interests:
Research Interests:
A powerpoint presentation is given. The paper discusses the experimental evaluation of the performance costs of different IKEv2 authentication methods. Internet key exchange version 2 protocol negotiates security associations for IPsec,... more
A powerpoint presentation is given. The paper discusses the experimental evaluation of the performance costs of different IKEv2 authentication methods. Internet key exchange version 2 protocol negotiates security associations for IPsec, authenticates the peer, supports the extensible authentication protocol methods and a candidate technology in future AAA frameworks which is a major issue in next generation wireless networks.
Research Interests:
... the HA and the mobile prefix discovery use encapsulating security payload (ESP) in transport mode with a non-null data origin authentication algorithm and null encryption. Home testing messages are protected with ESP in tunnel mode... more
... the HA and the mobile prefix discovery use encapsulating security payload (ESP) in transport mode with a non-null data origin authentication algorithm and null encryption. Home testing messages are protected with ESP in tunnel mode with a non-null encryption HA MSA-AAA ...
Research Interests:
ABSTRACT Tackling security and performance issues in ubiquitous computing has turned out to be a challenging task due to the heterogeneity of both the environment and the applications. Services must satisfy several constraints caused by... more
ABSTRACT Tackling security and performance issues in ubiquitous computing has turned out to be a challenging task due to the heterogeneity of both the environment and the applications. Services must satisfy several constraints caused by the security, performance, and other requirements of applications, users and providers. This paper introduces a new formalized decision model for security solution suitability analysis. It supports the design of dynamic security services and can be used by security managers making runtime decisions. Our solution improves previously proposed AHP-based decision models. The MAHP decision engine is applied using a new approach. Furthermore, we extend the MAHP algorithm to handle the non-fulfillment of requirements. This results in more accurate decisions, and better fulfillment of the design criteria. The use of the proposed decision model is illustrated through an IKEv2 authentication method selection problem.
Research Interests:
ABSTRACT This paper describes the design of secure socket SCTP (SS-SCTP). SS-SCTP is a new end-to-end security solution that uses the AUTH extension for integrity protection of messages and TLS for mutual authentication and key... more
ABSTRACT This paper describes the design of secure socket SCTP (SS-SCTP). SS-SCTP is a new end-to-end security solution that uses the AUTH extension for integrity protection of messages and TLS for mutual authentication and key negotiation. Data confidentiality is in SS-SCTP provided through encryption at the socket layer. SS-SCTP aims to offer a high degree of security differentiation based on features in the base SCTP protocol as well as in standardized extensions. The flexible message concept provided in the base protocol plays a central role in the design of SS-SCTP. In the paper, a comparison of the message complexity produced by SS-SCTP, SCTP over IPsec, and TLS over SCTP is also presented. The main conclusion that can be drawn from the comparison is that, depending on the traffic pattern, SS-SCTP produces either less or similar message overhead compared to the standardized solutions when transferring user data.
Abstract Traditionally, allocation of data in distributed database management systems has been determined by off-line anidysis and optimization. This technique works well for static database access patterns, but is often inadequate for... more
Abstract Traditionally, allocation of data in distributed database management systems has been determined by off-line anidysis and optimization. This technique works well for static database access patterns, but is often inadequate for frequently changing workloads. This ...
Research Interests:
Research Interests:
Research Interests:
Research Interests:
ABSTRACT This paper describes the design and implementation of secure socket SCTP (S2SCTP). S2SCTP is a new multi-layer, end-to-end security solution for SCTP. It uses the AUTH protocol extension of SCTP for integrity protection of both... more
ABSTRACT This paper describes the design and implementation of secure socket SCTP (S2SCTP). S2SCTP is a new multi-layer, end-to-end security solution for SCTP. It uses the AUTH protocol extension of SCTP for integrity protection of both control and user messages; TLS is the proposed solution for authentication and key agreement; Data confidentiality is provided through encryption and decryption at the socket library layer. S2SCTP is designed to offer as much security differentiation support as possible using standardized solutions and mechanisms. In the paper, S2SCTP is also compared to SCTP over IPsec and TLS over SCTP in terms of packet protection, security differentiation, and message complexity. The following main conclusions can be draw from the comparison. S2SCTP compares favorably in terms of offered security differentiation and message overhead. Confidentiality protection of SCTP control information is, however, only offered by SCTP over IPsec.
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Abstract We focus on wireless multimedia communication and investigate how cross-layer information can be used to improve performance at the application layer, using JPEG2000 as an example. The cross-layer information is in the form of... more
Abstract We focus on wireless multimedia communication and investigate how cross-layer information can be used to improve performance at the application layer, using JPEG2000 as an example. The cross-layer information is in the form of soft information from the ...
Research Interests:
Research Interests:
Page 1. Performance Analysis of IPsec in Mobile IPv6 Scenarios Zoltain Faigl, Peter Fazekas Department of Telecommunications Budapest University of Technology and Economics Budapest, Hungary {[email protected]}l{[email protected]} ...
Research Interests:
Research Interests:
Research Interests:
ABSTRACT Secure communications have a key role in future networks and applications. Information security provisions such as authorization, authentication, and encryption must be added to current communications protocols. To accomplish... more
ABSTRACT Secure communications have a key role in future networks and applications. Information security provisions such as authorization, authentication, and encryption must be added to current communications protocols. To accomplish this, each protocol must be reexamined to determine the impact on performance of adding such security services. This paper presents an experimental evaluation of the performance costs of a wide variety of authentication methods over IKEv2 in real and partly emulated scenarios of next generation wireless networks. The studied methods are pre-shared keys (PSKs), extensible authentication protocol (EAP) using MD5, SIM, TTLS-MD5, TLS, and PEAP-MSCHAPv2. For the EAP-based methods, RADIUS is used as the authentication, authorization, and accounting (AAA) server. Different lengths of certificate chains are studied in case of the TLS-based methods, i.e., TTLS-MD5, TLS, and PEAP-MSCHAPv2. The paper first presents a brief overview of the considered authentication methods. Then, a comparison of the costs for message transfers and computations associated with the authentication methods is provided. The measurement results are verified through a simple analysis, and interpreted by discussing the main contributing factors of the costs. The measurement results illustrate the practical costs involved for IKEv2 authentication, and the implications of the use of different methods are discussed. Copyright © 2009 John Wiley & Sons, Ltd.