Change search
Refine search result
345678 251 - 300 of 371
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 251.
    Lindskog, Stefan
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Faigl, Zoltán
    Tóth, Katalin
    Providing Tunable Security Services: An IEEE 802.11i Example2006Conference paper (Refereed)
    Abstract [en]

    The basic idea of QoS is to provide mechanisms that can offer different service levels, which are expressed through well-defined parameters that are specified at run-time on the basis of need. Bit rate, throughput, delay, jitter, and packet loss rate are all examples of common QoS parameters suggested for packet networks. These parameters are all aimed to express (and guarantee) a certain service level with respect to reliability and/or performance. In this paper, we investigate how security can be treated as yet another QoS parameter through the use of tunable security services. The main idea with this work is to let users specify a trade-off between security and performance through the choice of available security configuration(s). The performance metric used is latency. The concept is illustrated using the IEEE 802.11i wireless local area networking standard

  • 252.
    Lindskog, Stefan
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Jonsson, Erland
    Dynamic Data Protection Services for Network Transfers: Concepts and Taxonomy2004Conference paper (Refereed)
    Abstract [en]

    Security should be thought of as a tunable system attribute that allows users to request a specific protection level as a service from the system. This approach will be suitable in future networking environments with heterogeneous devices that have varying computing resources. The approach is also appropriate for multimedia applications that require tuning of the protection level to maintain performance at levels that are acceptable to users. In this paper, we investigate data protection services for network transfers that are designed to offer variable protection levels and propose a taxonomy for such services. The taxonomy provides a unified terminology for dynamic data protection services and a framework in which they can systematically be inspected, evaluated, and compared. The taxonomy is also intended to provide a basis for the development and identification of current and future user and/or application needs. It comprises four dimensions: type of protection service, protection level, protection level specification, and adaptiveness. On the basis of the taxonomy, a survey and categorization of existing dynamic data protection services for network transfers are made

  • 253.
    Lindskog, Stefan
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Jonsson, Erland
    Survey and Classification of Dynamic Data Protection Services for Network Applications2005In: Proceedings of the Fifth Conference for the Promotion of Research in IT at New Universities and University Colleges in Sweden (Promote IT 2005) / [ed] Janis Bubenko jr, Owen Eriksson, Hans Fernlund, and Mikael Lind, Lund, Sweden: Studentlitteratur , 2005Chapter in book (Refereed)
    Abstract [en]

    Security should be thought of as a tunable system attribute that allows users to request a specific protection level as a service from the system. This approach will be suitable in future networking environments with heterogeneous devices that have varying computing resources. The approach is also appropriate for multimedia applications that require tuning the protection level to maintain performance at levels that are acceptable to users. In this paper, we survey a number of existing data protection services for network transfers that are designed to offer variable protection levels. The services are classified according to a taxonomy proposed in the paper

  • 254.
    Lindskog, Stefan
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Faigl, Zoltán
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    A Conceptual Model for Analysis and Design of Tunable Security Services2008In: Journal of NetworksArticle in journal (Refereed)
    Abstract [en]

    Security is an increasingly important issue for networked services. However, since networked

    environments may exhibit varying networking behavior and contain heterogeneous devices with

    varying resources tunable security services are needed. A tunable security service is a service that

    provides different security configurations that are selected, and possibly altered, at run-time. In this

    paper, we propose a conceptual model for analysis and design of tunable security services. The

    proposed model can be used to describe and compare existing tunable security services and to

    identify missing requirements. Five previously proposed services are analyzed in detail in the paper.

    The analysis illustrates the powerfulness of the model, and highlights some key aspects in the

    design of tunable security services. Based on the conceptual model, we also present a high-level

    design methodology that can be used to identify the most appropriate security configurations for a

    particular scenario

  • 255.
    Lindskog, Stefan
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Brunstrom, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Data Protection based on Physical Separation: Concepts and Application Scenarios2005In: Computational Science and Its Applications: ICCSA 2005. Part IV / [ed] Gervasi, O.; Gavrilova, M.L.; Kumar, V.; Laganà, A.; Lee, H.P.; Mun, Y.; Taniar, D.; Tan, C.J.K., Berlin: Springer , 2005, p. 1331-1340Conference paper (Refereed)
    Abstract [en]

    Data protection is an increasingly important issue in today's communication networks. Traditional solutions for protecting data when transferred over a network are almost exclusively based on cryptography. As a complement, we propose the use of multiple physically separate paths to accomplish data protection. A general concept for providing physical separation of data streams together with a threat model is presented. The main target is delay-sensitive applications such as telephony signaling, live TV, and radio broadcasts that require only lightweight security. The threat considered is malicious interception of network transfers through so-called eavesdropping attacks. Application scenarios and techniques to provide physically separate paths are discussed

  • 256.
    Lindskog, Stefan
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Brunstrom, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Physical Separation for Data Protection based on SCTP Multihoming2004In: Proceedings of the Second Swedish National Computer Networking Workshop: SNCNW2004, Karlstad, 2004Conference paper (Refereed)
    Abstract [en]

    Network security is an increasingly important issue. Traditional solutions for protecting data when transferred over the network are almost exclusively based on cryptography. As a complement, we propose the use of SCTP and its support for physically separate paths to accomplish protection against eavesdropping attacks near the end points.

  • 257.
    Lindskog, Stefan
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Lundin, Reine
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Brunstrom, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Middleware Support for Tunable Encryption2006In: Wireless Information Systems: Proceedings of the 5th International Workshop on Wireless Information Systems / [ed] Qusay H. Mahmoud, Hans Weghorn, Setubal , Portugal: INSTICC Press , 2006, p. 36-46Conference paper (Refereed)
    Abstract [en]

    To achieve an appropriate tradeoff between security and performance for wireless applications, a tunable and differential treatment of security is required.

    In this paper, we present a tunable encryption service designed as a middleware that is based on a selective encryption paradigm. The core component of the middleware provides block-based selective encryption. Although the selection of which data to encrypt is made by the sending application and is typically content-dependent, the representation used by the core component is application and content-independent. This frees the selective decryption module at the receiver from the need for application or content-specific knowledge. The sending application specifies the data to encrypt either directly or through a set of highlevel application interfaces. A prototype implementation of the middleware isdescribed along with an initial performance evaluation. The experimental results demonstrate that the generic middleware service offers a high degree of security adaptiveness at a low cost.

     

  • 258.
    Lundin, Reine
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Brunstrom, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    A Model-based Analysis of Tunability in Privacy Services2008In: The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6/ 11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society, Karlstad University, Sweden, August 4-10, 2007, Springer-Verlag New York, 2008, p. 343-356Chapter in book (Refereed)
    Abstract [en]

    In this paper, we investigate the tunable privacy features provided by Internet Explorer version 6 (IE6), Mix Net and Crowds, by using a conceptual model for tunable security services. A tunable security service is defined as a service that has been explicitly designed to offer various security configurations that can be selected at run-time. Normally, Mix Net and Crowds are considered to be static anonymity services, since they were not explicitly designed to provide tunability. However, as discussed in this paper, they both contain dynamic elements that can be used to utilize the trade-off between anonymity and performance. IE6, on the other hand, was indeed designed to allow end users to tune the level of privacy when browsing the Internet

  • 259.
    Lundin, Reine
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Brunstrom, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Analysis of Anonymity Services from a Tunable Perspective2007In: The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6/ 11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society, Karlstad University, Sweden / [ed] Simone Fischer-Huebner, Penny Duquenoy, Albin Zuccato, Leonardo Martucci, Boston: IFIP , 2007Conference paper (Refereed)
    Abstract [en]

    In this paper, we investigate the tunable features provided by Mix-Nets and Crowds using a conceptual model for tunable secu- rity services. A tunable security service is deflned as a service that has been explicitly designed to ofier various security levels that can be se- lected at run-time. Normally, Mix-Nets and Crowds are considered to be static anonymity services, since they were not explicitly designed to provide tunability. However, as discussed in this paper, they both con- tain dynamic elements that can be used to achieve a tradeofi between anonymity and performance

  • 260.
    Lundin, Reine
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Brunstrom, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Fischer-Hubner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages2006In: Quality of Protection: Security Measurements and Metrics / [ed] Dieter Gollmann, Fabio Massacci and Artsiom Yautsiukhin, Boston: Springer, 2006, p. 173-184Chapter in book (Refereed)
    Abstract [en]

    n this paper, we start to investigate the security implications of selective encryption. We do this by using the measure guesswork, which gives us the expected number of guesses that an attacker must perform in an optimal brute force attack to reveal an encrypted message. The characteristics of the proposed measure are investigated for zero-order languages. We also introduce the concept of reduction chains to describe how the message (or rather search) space changes for an attacker with different levels of encryption.

  • 261.
    Lundin, Reine
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Brunstrom, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Measuring Confidentiality of Selectively Encrypted Messages Using Guesswork2005In: Proceeding of the Third Swedish National Computer Networking Workshop (SNCNW 2005), Halmstad: Högskolan i Halmstad , 2005, p. 99-102Conference paper (Refereed)
    Abstract [en]

    In this paper, we start to investigate the security implications of selective encryption. We do this by using the measure guesswork, which gives us the expected number of guesses that an attacker performs in an optimal brute force attack to reveal an encrypted message. The characteristics of the proposed measure are only investigated for zero-order languages, and we give some basic initial results. The work is in progress and later papers will examine higher order of languages.

  • 262.
    Lutu, A.
    et al.
    Research, Telefonica Research and Development, ESP.
    Trevisan, M.
    DAUIN, Politecnico di Torino, ITA.
    Safari Khatouni, A.
    Western University, GBR.
    Mandalari, A. M.
    Universidad Carlos III de Madrid, ESP.
    Custura, A.
    University of Aberdeen, GBR.
    Mellia, M.
    Politecnico di Torino, ITA.
    Alay, O.
    University of Oslo, NOR.
    Bagnulo, M.
    Risultati di ricerca Risultati web Departamento de Ingenieria Telemetica, ESP.
    Bajpai, V.
    Technische Universitat Munchen, DEU.
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Ott, J.
    Technische Universitat Munchen, DEU.
    Fairhurst, G.
    University of Aberdeen, GBR.
    Measuring Roaming in Europe: Infrastructure and Implications on Users QoE2021In: IEEE Transactions on Mobile Computing, ISSN 1536-1233, E-ISSN 1558-0660, Vol. 21, no 10, p. 3687-3699Article in journal (Refereed)
    Abstract [en]

    "Roam like Home" is the initiative of the European Commission to end the levy of extra charges when roaming within the European region. As a result, people can use data services more freely across Europe. However, the implications of roaming solutions on network performance have not been carefully examined yet. This paper provides an in-depth characterization of the implications of international data roaming within Europe. We build a unique roaming measurement platform using 16 different mobile networks deployed in 6 countries across Europe. Using this platform, we measure different aspects of international roaming in 4G networks in Europe, including mobile network configuration, performance characteristics, and quality of experience. We find that operators adopt a common approach to implement roaming called Home-routed roaming. This results in additional latency penalties of 60 ms or more, depending on geographical distance. This leads to worse browsing performance, with an increase in the metrics related to Quality of Experience (QoE) of users (Page Load time and Speed Index) in the order of 15-20%. We further analyze the impact of latency on QoE metrics in isolation and find that the penalty imposed by Home Routing leads to degradation on QoE metrics up to 150% in case of intercontinental roaming. We make our dataset public to allow reproducing the results.

  • 263.
    Magnusson, Jonathan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Müller, Moritz
    SIDN Labs, NLD.
    Brunstrom, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Pulls, Tobias
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    A Second Look at DNS QNAME Minimization2023In: Passive and Active Measurement: 24th International Conference, PAM 2023, Virtual Event, March 21–23, 2023, Proceedings / [ed] Anna Brunström; Marcel Flores; Marco Fiore, Springer, 2023, p. 496-521Conference paper (Refereed)
    Abstract [en]

    The Domain Name System (DNS) is a critical Internet infrastructure that translates human-readable domain names to IP addresses. It was originally designed over 35 years ago and multiple enhancements have since then been made, in particular to make DNS lookups more secure and privacy preserving. Query name minimization (qmin) was initially introduced in 2016 to limit the exposure of queries sent across DNS and thereby enhance privacy. In this paper, we take a look at the adoption of qmin, building upon and extending measurements made by De Vries et al. in 2018. We analyze qmin adoption on the Internet using active measurements both on resolvers used by RIPE Atlas probes and on open resolvers. Aside from adding more vantage points when measuring qmin adoption on open resolvers, we also increase the number of repetitions, which reveals conflicting resolvers – resolvers that support qmin for some queries but not for others. For the passive measurements at root and Top-Level Domain (TLD) name servers, we extend the analysis over a longer period of time, introduce additional sources, and filter out non-valid queries. Furthermore, our controlled experiments measure performance and result quality of newer versions of the qmin -enabled open source resolvers used in the previous study, with the addition of PowerDNS. Our results, using extended methods from previous work, show that the adoption of qmin has significantly increased since 2018. New controlled experiments also show a trend of higher number of packets used by resolvers and lower error rates in the DNS queries. Since qmin is a balance between performance and privacy, we further discuss the depth limit of minimizing labels and propose the use of a public suffix list for setting this limit.

  • 264.
    Mancuso, Vincenzo
    et al.
    IMDEA Networks Institute, Spain.
    Peón Quirós, Miguel
    IMDEA Networks Institute, Spain; Ecole Polytech Fed Lausanne, Switzerland.
    Midoglu, Cise
    Simula Res Lab, Norway.
    Moulay, Mohamed
    IMDEA Networks Inst, Spain; University Carlos III of Madrid, Spain.
    Comite, Vincenzo
    IMDEA Networks Inst, Spain; University La Sapienza, Italy.
    Lutu, Andra
    Simula Res Lab, Norway.
    Alay, Ozgu
    Simula Res Lab, Norway.
    Alfredsson, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Rajiullah, Mohammad
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Mellia, Marco
    Politecnico di Torino, Italy.
    Khatouni, Ali Safari
    Politecnico di Torino, Italy.
    Hirsch, Thomas
    Celerway, Norway.
    Results from running an experiment as a service platform for mobile broadband networks in Europe2019In: Computer Communications, ISSN 0140-3664, E-ISSN 1873-703X, Vol. 33, p. 89-101Article in journal (Refereed)
    Abstract [en]

    In this article we present a selection from a vast range of experiments run with MONROE, our open experiment as a service (EaaS) platform for measurements and experimentation in Mobile Broadband Networks. We show that the platform can be used to benchmark network performance in a repeatable and controlled manner thanks to the collection of a rich set of geotagged metadata and the execution of discretionary user experiments. Indeed, with the sheer amount of data collected from 12 commercial mobile operators across Europe, MONROE offers an unprecedented opportunity to monitor, analyze and ultimately improve the status of current and future mobile broadband networks. Besides, we show how flexibly the platform allows combining metadata and experimental data series during the experiments or by means of post-processing, and show results produced by our own experiments as well as comment on results obtained by external research groups and developers that have been granted access to our platform.

  • 265.
    Mandalari, Anna Maria
    et al.
    University Carlos III of Madrid, Spain.
    Lutu, Andra
    Telefonica Research, Spain.
    Custura, Ana
    University of Aberdeen, Scotland.
    Khatouni, Ali Safari
    Politecnico di Torino, Italy.
    Alay, Özgü
    Simula Metropolitan, Norway.
    Bajpai,, Vaibhav
    Technische Universität München, Germany.
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Ott, Jörg
    Technische Universität München, Germany.
    Mellia, Marco
    Politecnico di Torino, Italy.
    Fairhust, Gorry
    University of Aberdeen, Scotland.
    Experience: Implications of Roaming in Europe2018In: MobiCom '18. Proceedings of the 24th Annual International Conference on Mobile Computing and Networking / [ed] Rajeev Shorey, Rohan Murty, New York, USA: ACM Publications, 2018, p. 179-189Conference paper (Refereed)
    Abstract [en]

    "Roam like Home" is the initiative of the European Commission (EC) to end the levy of extra charges when roaming within the European region. As a result, people are able to use data services more freely across Europe. However, the implications roaming solutions have on performance have not been carefully examined. This paper provides an in-depth characterization of the implications of international data roaming within Europe. We build a unique roaming measurement platform using 16 different mobile networks deployed in six countries across Europe. Using this platform, we measure different aspects of international roaming in 3G and 4G networks, including mobile network configuration, performance characteristics, and content discrimination. We find that operators adopt common approaches to implementing roaming, resulting in additional latency penalties of ∼60 ms or more, depending on geographical distance. Considering content accessibility, roaming poses additional constraints that leads to only minimal deviations when accessing content in the original country. However, geographical restrictions in the visited country make the picture more complicated and less intuitive.

  • 266.
    Mohideen, Althaff C.
    et al.
    University of Aberdeen, UK.
    Rajiullah, Mohammad
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Secchi, Raffaello
    University of Aberdeen, UK.
    Fairhurst, Gorry
    University of Aberdeen, UK.
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Weinrank, Felix
    Münster University of Applied Sciences, Germany.
    Evaluating the impact of transport mechanisms on web performance for effective web access2019In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 137, p. 25-34Article in journal (Refereed)
    Abstract [en]

    This paper explores the design trade-offs required for an Internet transport protocol to effectively support web access. It identifies a set of distinct transport mechanisms and explores their use with a focus on multistreaming. The mechanisms are studied using a practical methodology that utilise the range of transport features provided by TCP and SCTP. The results demonstrate the relative benefit of key transport mechanisms and analyse how these impact web access performance. Our conclusions help identify the root causes of performance impairments and suggest appropriate choices guiding the design of a web transport protocol. Performing this analysis at the level of component transport mechanisms enables the results to be utilised in the design of new transport protocols, such as IETF QUIC.

  • 267.
    Moreno, N. R.
    et al.
    Deutsche Telekom, Darmstadt, Germany.
    Amend, M.
    Deutsche Telekom, Darmstadt, Germany.
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Kassler, Andreas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Rakocevic, V.
    University of London, London, United Kingdom.
    CCID5: An implementation of the BBR congestion control algorithm for DCCP and its impact over multi-path scenarios2021In: ANRW 2021 - Proceedings of the 2021 Applied Networking Research Workshop, Association for Computing Machinery (ACM), 2021, p. 52-58Conference paper (Refereed)
    Abstract [en]

    Providing multi-connectivity services is an important goal for next generation wireless networks, where multiple access networks are available and need to be integrated into a coherent solution that efficiently supports both reliable and non reliable traffic. Based on virtual network interfaces and per path congestion controlled tunnels, the MP-DCCP based multiaccess aggregation framework presents a novel solution that flexibly supports different path schedulers and congestion control algorithms as well as reordering modules. The framework has been implemented within the Linux kernel space and has been tested over different prototypes. Experimental results have shown that the overall performance strongly depends upon the congestion control algorithm used on the individual DCCP tunnels, denoted as CCID. In this paper, we present an implementation of the BBR (Bottleneck Bandwidth Round Trip propagation time) congestion control algorithm for DCCP in the Linux kernel. We show how BBR is integrated into the MP-DCCP multi-access framework and evaluate its performance over both single and multi-path environments. Our evaluation results show that BBR improves the performance compared to CCID2 (TCPlike Congestion Control) for multi-path scenarios due to the faster response to changes in the available bandwidth, which reduces latency and increases performance, especially for unreliable traffic. The MP-DCCP framework code, including the new CCID5 is available as OpenSource1.

  • 268.
    Nguyen, Van-Giang
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    5G Mobile Networks – Requirements, Enabling Technologies, and Research Activities2017In: Comprehensive Guide to 5G Security / [ed] Madhusanka Liyanage, Andrei Gurtov, Mika Yliantilla, Ijaz Ahmed & Ahmed Bux Abro, John Wiley & Sons, 2017Chapter in book (Refereed)
  • 269.
    Nguyen, Van-Giang
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    SDN helps velocity in Big Data2018In: Big Data and Software Defined Networks / [ed] Javid Taheri, London: IET Digital Library, 2018, 1, p. 207-228Chapter in book (Refereed)
    Abstract [en]

    Currently, improving the performance of Big Data in general and velocity in particular is challenging due to the inefficiency of current network management, and the lack of coordination between the application layer and the network layer to achieve better scheduling decisions, which can improve the Big Data velocity performance. In this chapter, we discuss the role of recently emerged software defined networking (SDN) technology in helping the velocity dimension of Big Data. We start the chapter by providing a brief introduction of Big Data velocity and its characteristics and different modes of Big Data processing, followed by a brief explanation of how SDN can overcome the challenges of Big Data velocity. In the second part of the chapter, we describe in detail some proposed solutions which have applied SDN to improve Big Data performance in term of shortened processing time in different Big Data processing frameworks ranging from batch-oriented, MapReduce-based frameworks to real-time and stream-processing frameworks such as Spark and Storm. Finally, we conclude the chapter with a discussion of some open issues.

  • 270.
    Nguyen, Van-Giang
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT (discontinued), Centre for HumanIT. Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). The University of Sydney, Australia.
    SDN/NFV-Based Mobile Packet Core Network Architectures: A Survey2017In: IEEE Communications Surveys and Tutorials, E-ISSN 1553-877X, Vol. 19, no 3, p. 1567-1602Article in journal (Refereed)
    Abstract [en]

    The emergence of two new technologies, namely Software Defined Networking (SDN) and Network Function Virtualization (NFV) have radically changed the development of network functions and the evolution of network architectures. These two technologies bring to mobile operators the promises of reducing costs, enhancing network flexibility and scalability, and shortening the time-to-market of new applications and services. With the advent of SDN and NFV and their offered benefits, the mobile operators are gradually changing the way how they architect their mobile networks to cope with ever-increasing growth of data traffic, massive number of new devices and network accesses, and to pave the way towards the upcoming fifth generation (5G) networking. This paper aims at providing a comprehensive survey of state-of-the-art research work, which leverages SDN and NFV into the most recent mobile packet core network architecture, Evolved Packet Core (EPC). The research work is categorized into smaller groups according to a proposed four-dimensional taxonomy reflecting the (1) architectural ap- proach, (2) technology adoption, (3) functional implementation, and (4) deployment strategy. Thereafter, the research work is exhaustively compared based on the proposed taxonomy and some added attributes and criteria. Finally, the paper identifies and discusses some major challenges and open issues such as scalability and reliability, optimal resource scheduling and allocation, management and orchestration, network sharing and slicing that raise from the taxonomy and comparison tables that need to be further investigated and explored. 

    Download full text (pdf)
    fulltext
  • 271.
    Nguyen, Van-Giang
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Carlsson, Adrian
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Cheng, Jun
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    On the Use of 5G for Inter-substation GOOSE Transmission in Smart Grid2019In: Proceedings of the Fifteenth Swedish National Computer Workshop (SNCNW), Luleå, Sweden. June 2019, 2019Conference paper (Refereed)
    Abstract [en]

    Protection and automation in a smart grid environmentoften have stringent real-time communication requirementsbetween devices within a substation as well as between distantlylocated substations. The Generic Object Oriented SubstationEvent (GOOSE) messaging service has been proposed to achievethis goal as it allows to transfer time-critical information within afew milliseconds. However, the transmission of GOOSE messagesare often limited to a small Local Area Network (LAN).In this paper, we propose the use of the fifth generation ofmobile networks (5G) as a means to transport GOOSE messagesin a large scale smart grid environment. The end-to-end delay ismeasured between GOOSE devices over an 5G network with thefocus on the core network using the Open5GCore platform in alab environment. Although there is a lack of a real radio accessnetwork, the experimental results confirm that the delay withinthe rest of the 5G network is small enough for it to be feasiblefor inter-substation GOOSE transmissions.

  • 272.
    Nguyen, Van-Giang
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Cheng, Jun
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    On the Use of a Virtualized 5G Core for Time Critical Communication in Smart Grid2020In: 2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), Oxford, UK, August 3-6, IEEE, 2020, p. 1-8Conference paper (Refereed)
    Abstract [en]

    Protection and automation in a smart grid environment often have stringent real-time communication requirements between devices within a substation, as well as between distantly located substations. The Generic Object Oriented Substation Event (GOOSE) protocol has been proposed to achieve this goal as it allows to transfer time-critical information within a few milliseconds. However, the transmission of GOOSE messages is often limited to a small Local Area Network (LAN). An earlier work has proposed to use the fifth generation of mobile networks (5G) as a means to transport IP-based GOOSE messages in a large-scale smart grid environment. On the basis of this work, this paper designs and implements an alternative solution for Ethernet-based GOOSE communication over a virtualized 5G core network that does not require any modification of the existing network protocol stack and thus is much easier to deploy. Our experimental results show that the delay introduced by the core network is in the order of sub milliseconds, while the oneway delay without a real radio access network, and without background traffic, is less than 1 ms. Moreover, these delays can be significantly reduced with a container-based deployment rather than a virtual machine-based one. Assuming a 1-ms delay budget for a 5G radio access network, our evaluation confirms that it is indeed feasible to use 5G for GOOSE transmission in IEC 61850 substation automation systems.

  • 273.
    Nguyen, Van-Giang
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    A Deployable Containerized 5G Core Solution for Time Critical Communication in Smart Grid2020In: 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops, ICIN 2020, IEEE, 2020, p. 153-155, article id 9059397Conference paper (Refereed)
    Abstract [en]

    Communication within substatation automation systems in a smart grid environment is often time-critical. The time required for exchanging information between intelligent devices should be within a few milliseconds. The International Electrotechnical Commission (IEC) 61850 standard has proposed the Generic Object Oriented Substation Event (GOOSE) protocol to achieve this goal. However, the transmission of GOOSE messages is often limited to a small Local Area Network (LAN). In this demo, we demonstrate the feasibility of using 5G for GOOSEbased time critical communication in a large-scale smart-grid environment, and present a deployable 5G core solution using container-based virtualization technology. The radio part of the demo is emulated. The demo also shows that the delay introduced by the core network is in the order of sub milliseconds, while the one-way delay without a real radio access network is less than 1 ms, which is well below the total delay budget for GOOSE.

    Download full text (pdf)
    fulltext
  • 274.
    Nguyen, Van-Giang
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Adaptive and Latency-aware Load Balancing for Control Plane Traffic in the 4G/5G Core2021In: 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), IEEE Communications Society, 2021Conference paper (Refereed)
    Abstract [en]

    For many years, the continuous proliferation of mobile devices and their applications generate a surge of signaling traffic in the control plane of the mobile packet core network. As a consequence, the control plane will potentially become a bottleneck if not properly managed. We focus on the load balancing of a virtualized and distributed Mobility Management Entity (vMME), which is the key control plane element in the 4G and 5G non-standalone cores. Most of existing works use the simple and static load balancing approaches such as roundrobin and consistent hashing, which do not work well in a heterogeneous environment. In this paper, we developed three adaptive algorithms in which the balancing decision takes into account the dynamics of the system such as the vMME load, the completion time of a request served by a vMME, and the number of pending requests queued at a vMME. The evaluation of our three proposed load-balancing algorithms in an Open5GCore testbed suggests that the latency-aware scheme helps shorten the completion time of the signaling requests by up to five times the static and dynamic schemes in those cases the link delay between the load balancer and the vMMEs differ significantly.

  • 275.
    Nguyen, Van-Giang
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Experimental Evaluation of a Virtualized 5G Core for Smart Grid Applications2020In: 16th Swedish National Computer Networking Workshop SNCNW 2020, Kristianstad, May 26-27, 2020, 2020, p. 1-4Conference paper (Refereed)
    Abstract [en]

    5G with its great capabilities is believed to play a crucial role in different vertical sectors such as automotive, healthcare, and energy, etc. In this paper, we present a study on the adoption of 5G into a smart grid environment, in particular, a power grid substation automation system. In such a system, the communication between electrical devices is often within a few milliseconds. To verify the proposed solution, we conducted a set of experiments using the Generic Object Oriented Substation Event (GOOSE) protocol, a standard protocol used in power grid substation automation systems, over a virtualized 5G network. Our experimental results show that the delay introduced by the core network is in the order of sub milliseconds, while the one-way delay without a real radio access network, and without background traffic, is less than 1 ms. Moreover, these delays can be significantly reduced with a container-based deployment rather than a virtual machine-based one.

    Download full text (pdf)
    fulltext
  • 276.
    Nguyen, Van-Giang
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    On Load Balancing for a Virtual and Distributed MME in the 5G Core2018In: 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), IEEE, 2018Conference paper (Refereed)
    Abstract [en]

    In this paper, we aim at tackling the scalability problem of the Mobility Management Entity (MME), which plays a crucial role of handling control plane traffic in the current 4G Evolved Packet Core as well as the next generation mobile core, 5G. One of the solutions to this problem is to virtualize the MME by applying Network Function Virtualization principles and then deploy it as a cluster of multiple virtual MME instances (vMMEs) with a front-end load balancer. Although several designs have been proposed, most of them assume the use of simple algorithms such as random and round-robin to balance the incoming traffic without any performance assessment. To this end, we implemented a weighted round robin algorithm which takes into account the heterogeneity of resources such as the capacity of vMMEs. We compare this algorithm with a random and a round-robin algorithm under two different system settings. Experimental results suggest that carefully selected load balancing algorithms can significantly reduce the control plane latency as compared to simple random or round-robin schemes.

  • 277.
    Nguyen, Van-Giang
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). TietoEVRY Prod Dev Serv, Karlstad, Sweden; Le Quy Don Technical University, Vietnam.
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Forsman, Johan
    TietoEVRY Prod Dev Serv, Karlstad, Sweden..
    Duc, Thang Le
    TietoEVRY Prod Dev Serv, Karlstad, Sweden.
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    On Auto-scaling and Load Balancing for User-plane Gateways in a Softwarized 5G Network2021In: Proceedings of the 2021 17th International Conference on Network and Service Management: Smart Management for Future Networks and Services, CNSM 2021 / [ed] Chemouil, P Ulema, M Clayman, S Sayit, M Cetinkaya, C Secci, S, IEEE , 2021, p. 132-138Conference paper (Refereed)
    Abstract [en]

    In the fifth generation (SG) mobile networks, the number of user-plane gateways has increased, and, in contrast to previous generations they can be deployed in a decentralized way and auto-scaled independently from their control-plane functions. Moreover, the performance of the user-plane gateways can be boosted with the adoption of advanced acceleration techniques such as Vector Packet Processing (VPP). However, the increased number of user-plane gateways has also made load balancing a necessity, something we find has so far received little attention. Moreover, the introduction of VPP poses a challenge to the design of the auto-scaling of user- plane gateways. In this paper, we address these two challenges by proposing a novel performance indicator for making better auto-scaling decisions, and by proposing three new dynamic load- balancing algorithms for the user plane of a VPP-based, softwarized SG network. The novel performance indicator is estimated based on the VPP vector rate and is used as a threshold for the auto-scaling process. The dynamic load-balancing algorithms take into account the number of bearers allocated for each user-plane gateway and their VPP vector rate. We validate and evaluate our proposed solution in a SG testbed. Our experiment results show that the scaling helps to reduce the packet latency for the user-plane traffic, and that our proposed load-balancing algorithms can give a better distribution of traffic load as compared to traditional static algorithms.

  • 278.
    Nguyen, Van-Giang
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Forsman, Johan
    Tieto Product Development Services, Umea, Sweden.
    Le Duc, Thang
    Tieto Product Development Services, Umea, Sweden.
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    On Auto-scaling and Load Balancing for User-plane Functions in a Softwarized 5G Core2021In: Proceedings of the 2021 17th International Conference on Network and Service Management: Smart Management for Future Networks and Services, CNSM 2021, IEEE, 2021, p. 132-138Conference paper (Refereed)
    Abstract [en]

    In the fifth generation (5G) mobile networks, the number of user plane functions has increased, and, in contrast to previous generations. They can be deployed in a decentralized way and auto-scaled independently from their control plane functions. Moreover, the performance of the user plane functions can be boosted with the adoption of advanced acceleration techniques such as Vector Packet Processing (VPP). However, the increased number of user plane functions has also made load balancing a necessity, something we find has so far received little attention. Moreover, the introduction of VPP poses a challenge to the design of the auto-scaling of user-plane functions. In this paper, we address these two challenges by proposing a novel performance indicator for making better auto-scaling decisions, and by proposing three new dynamic load-balancing algorithms for the user plane of a VPP-based, softwarized 5G network. The novel performance indicator is estimated based on the VPP vector rate, and is used as a threshold for the auto-scaling process. The dynamic load-balancing algorithms take into account the number of bearers allocated for each user plane function and their VPP vector rate. We validated and evaluated our proposed solution in a 5G testbed. Our experiment results show that the scaling helps to reduce the packet latency for the user plane traffic, and our proposed load-balancing algorithms seem to give a better distribution of traffic load as compared to traditional static algorithms.

  • 279.
    Nordby, Eivind J
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Blom, Martin
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    A Case Study of an Industry Project1999Report (Other academic)
  • 280.
    Nordby, Eivind J
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Blom, Martin
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Error Management with Design Contracts2001Conference paper (Refereed)
  • 281.
    Nordby, Eivind J
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Blom, Martin
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    On the Relation between Design Contracts and Errors; A Software Development Strategy2002Conference paper (Refereed)
    Abstract [en]

    When designing a software module or system, a systems engineer must consider and differentiate between how the system responds to external and internal errors. External errors cannot be eliminated and must be tolerated by the system, while the number of internal errors should be minimized and the faults they result in should be detected and removed. This paper presents a development strategy based on design contracts and a case study of an industrial project in which the strategy was successfully applied. The goal of the strategy is to minimize the number of internal errors during the development of a software system while accommodating external errors. A distinction is made between weak and strong contracts. These two types of contracts are applicable to external and internal errors respectively. According to the strategy, strong contracts should be applied initially to promote the correctness of the system. Before release, the contracts governing external interfaces should be weakened and error management of external errors enabled. This transformation of a strong contract to a weak one is harmless to client modules

  • 282.
    Nordby, Eivind J
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Blom, Martin
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Underhåll av programvara2000In: Del av kapitel 5 i "Industriell Programvaruteknik. Forskningsresultat i kortform”, NUTEK Förlag Nr: B 2000:01 (www.nutek.se) , 2000Chapter in book (Other academic)
  • 283. Norlund, K.
    et al.
    Ottosson, T.
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Fairness Measures for Best Effort Traffic in Wireless Networks2004Conference paper (Refereed)
    Abstract [en]

    This paper proposes that fairness in wireless

    networks should be measured using one of the following

    new measures: the deterministic unfairness bound called the wireless absolute fairness bound (WAFB) or the statistical unfairness bound called the 99-percentile wireless absolute fairness bound (WAFB99). Compared with previous fairness de_nitions, the new fairness measures are better suited for measuring fairness of scheduling disciplines that exploit multiuser diversity.

    A new scheduling discipline called opportunistic proportional fair scheduling is de_ned. Numerical results show that the new scheduling discipline has slightly higher throughput and slightly better fairness than proportional fair scheduling.

  • 284. Norlund, K.
    et al.
    Ottosson, T.
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    TCP fairness measures for scheduling algorithms in wireless networks2005Conference paper (Refereed)
  • 285.
    Oljira, Dejene Boru
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Analysis of Network Latency in Virtualized Environments2016In: Global Communications Conference (GLOBECOM), 2016 IEEE, IEEE, 2016Conference paper (Refereed)
    Abstract [en]

    Virtualization is central to cloud computing systems. It abstracts computing resources to be shared among multiple virtual machines (VMs) that can be easily managed to run multiple applications and services. To benefit from the advantages of cloud computing, and to cope with increasing traffic demands, telecom operators have adopted cloud computing. Telecom services and applications are, however, characterized by real-time responsiveness, strict end-to-end latency, and high reliability. Due to the inherent overhead of virtualization, the network performance of applications and services can be degraded. To improve the performance of emerging applications and services that demand stringent end-to-end latency, and to understand the network performance bottleneck of virtualization, a comprehensive performance measurement and analysis is required. To this end, we conducted controlled and detailed experiments to understand the impact of virtualization on end-to-end latency and the performance of transport protocols in a virtualized environment. We also provide a packet delay breakdown in the virtualization layer which helps in the optimization of hypervisor components. Our experimental results indicate that the end-to-end latency and packet delay in the virtualization layer are increased with co-located VMs.

  • 286.
    Oljira, Dejene Boru
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Measurement and Analysis of Network Performance in Virtualized Environments2016In: Proceedings of the 12th Swedish National Computer Networking Workshop (SNCNW), June 2016, Sundsvall, Sweden, 2016Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 287.
    Oljira, Dejene Boru
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Validating the Sharing Behavior and Latency Characteristics of the L4S Architecture2019Conference paper (Refereed)
    Abstract [en]

    Internet services such as virtual reality, interactive cloud applications, and online gaming, have a strict quality of service requirements (e.g., low-latency). However, the current Internet is not able to satisfy the low-latency requirements of these applications. This as the standard TCP induces high queuing delays when used by capacity-seeking traffic, which in turn results in unpredictable latency. The Low Latency Low Loss Scalable throughput (L4S) architecture aims to address this problem by combining scalable congestion controls (e.g., DCTCP) with early congestion signaling from the network. For incremental deployment, the L4S architecture defines a Dual Queue Coupled AQM that enables the safe coexistence of scalable and classic (e.g., Reno, Cubic, etc.) flows on the global Internet. The DualPI2 AQM is a Linux kernel implementation of a Dual Queue Coupled AQM. In this paper, we benchmark the DualPI2 AQM to validate experimental result(s) reported in previous works that demonstrate the coexistence of scalable and classic congestion controls, and its low-latency service. Our results validate the coexistence of scalable and classic flows using DualPI2 single queue AQM while the result with dual queue shows neither rate nor window fairness between the flows.

  • 288.
    Oljira, Dejene Boru
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Validating the Sharing Behavior and Latency Characteristics of the L4S Architecture2020In: Computer communication review, ISSN 0146-4833, E-ISSN 1943-5819, Vol. 50, no 2, p. 37-44Article in journal (Refereed)
    Abstract [en]

    The strict low-latency requirements of applications such as virtual reality, online gaming, etc., can not be satisfied by the current internet. This is due to the characteristics of classic TCP such as Reno and TCP Cubic which induce high queuing delays when used for capacity-seeking traffic, which in turn results in unpredictable latency. The Low Latency, Low Loss, Scalable throughput (L4S) architecture addresses this problem by combining scalable congestion controls such as DCTCP and TCP Prague with early congestion signaling from the network. It defines a Dual Queue Coupled (DQC) AQM that isolates low-latency traffic from the queuing delay of classic traffic while ensuring the safe co-existence of scalable and classic flows on the global Internet. In this paper, we benchmarktheDualPI2 scheduler, a reference implementation of DQC AQM, to validate some of the experimental result(s) reported in the previous works that demonstrate the co-existence of scalable and classic congestion controls and its low-latency service. Our results validate the co-existence of scalable and classic flows using DualPI2 Singlequeue (SingleQ) AQM, and queue latency isolation of scalable flows using DualPI2 Dual queue (DualQ) AQM. However, the rate or win-dow fairness between DCTCP without fair-queuing (FQ) pacing and TCP Cubic using DualPI2 DualQ AQM deviates from the original results. We attribute the difference in our results and the original results to the sensitivity of the L4S architecture to traffic bursts and the burst sending pattern of the Linux kernel.

  • 289.
    Oljira, Dejene Boru
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Kassler, Andreas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    MDTCP: Practical Latency-Aware Multipath Con- gestion Control for Datacenter NetworksManuscript (preprint) (Other academic)
    Abstract [en]

    Datacenter applications generate a mix of short and long flows, which have often contrasting network performance requirements. While short flows are typically sensitive to their completion time, long flows are more or less deadline agnostic but demand high throughput. Despite the availability of multiple, parallel high-capacity paths inside a datacenter network, the achievable transport-layer performance for both latency-sensitive and capacity-demanding applications is far from optimal. The reason is partly due to the inefficiency of transport protocols deployed inside datacenters. Existing transport protocols are either not capable of utilizing multiple paths offered by datacenter topologies, e.g., Datacenter TCP (DCTCP) or unsuitable for latency-sensitive applications, e.g., Multipath TCP (MPTCP), due to the employed congestion detection schemes. To address this problem, we have designed a coupled multipath congestion control algorithm called Multipath Datacenter TCP (MDTCP). MDTCP builds upon MPTCP and uses Explicit Congestion Notification (ECN) signals to detect and react to congestion before queues overflow as in DCTCP, offering both reduced latency and higher network utilization. The MDTCP congestion control has been implemented in the Linux kernel and in a packet- level network simulator. We evaluate MDTCP’s performance extensively both in a programmable datacenter network testbed andin large-scale simulations. The obtained results show that MDTCP outperforms DCTCP by reducing the average Flow Completion Time (FCT) by more than 1.6× at high load, and achieves similar performance as DCTCP at moderate network load. Moreover, it outperforms MPTCP by always achieving a lower average FCT. MDTCP also improves network utilization by 7% and 12% compared to MPTCP and DCTCP, respectively.

  • 290.
    Oljira, Dejene Boru
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Tilmans, Olivier
    Nokia Bell Labs.
    Koen, De Schepper
    Nokia Bell Labs.
    Multipath Congestion Control for the L4S ArchitectureManuscript (preprint) (Other academic)
    Abstract [en]

    Queuing latency is one of the limiting factors to achieve the latency targets of emerging latency-sensitive Internet applications (e.g., interactive web, real-time online gaming). It occurs when large capacity-seeking traffic bloats router buffers configured to allow full link utilization of standard TCP congestion controllers (e.g., TCP Reno, Cubic). The Low Latency, Low Loss and Scalable Throughput (L4S) architecture proposes to overcome the problem by combining scalable congestion controllers (e.g., DCTCP, TCP Prague) and early congestion signaling from the network. L4S defines Dual Queue Coupled (DQC) AQM as transition mechanism enabling scalable senders to coexist with standard congestion control. This paper extends the L4S Internet service to the multipath domain by using MDTCP—a scalable multipath congestion control for Multipath TCP (MPTCP). We evaluate the performance of MDTCP in a controlled network environment mimicking the L4S Internet service architecture. Our results indicate that MDTCP and TCP Prague achieve similar flow completion time for short flows, and outperform both the non-scalable, single-path, and multipath congestion controls. MDTCP also improves multipath capacity utilization compared to the existing MPTCP congestion controllers and outperforms both TCP Prague and TCP Cubic. Although MDTCP achieves a lower FCT for medium flows than TCP Prague, it does not show improved performance than the classic CCs due to its exit from the slow-start phase. With regard to bottleneck capacity sharing, MDTCP never caused starvation when sharing a bottleneck with a single-path TCP Prague, and is not severely affected by the competing TCP Prague flows.

  • 291.
    Oljira, Dejene Boru
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    A Model for QoS-Aware VNF Placement and Provisioning2017In: Network Function Virtualization and Software Defined Networks (NFV-SDN), 2017 IEEE Conference on / [ed] IEEE, IEEE, 2017Conference paper (Refereed)
    Abstract [en]

    Network Function Virtualization (NFV) is a promising solution for telecom operators and service providers to improve business agility, by enabling a fast deployment of new services, and by making it possible for them to cope with the increasing traffic volume and service demand. NFV enables virtualization of network functions that can be deployed as virtual machines on general purpose server hardware in cloud environments, effectively reducing deployment and operational costs. To benefit from the advantages of NFV, virtual network functions (VNFs) need to be provisioned with sufficient resources and perform without impacting network quality of service (QoS). To this end, this paper proposes a model for VNFs placement and provisioning optimization while guaranteeing the latency requirements of the service chains. Our goal is to optimize resource utilization in order to reduce cost satisfying the QoS such as end- to-end latency. We extend a related VNFs placement optimization with a fine-grained latency model including virtualization overhead. The model is evaluated with a simulated network and it provides placement solutions ensuring the required QoS guarantees. 

  • 292.
    Oljira, Dejene Boru
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    MDTCP: Towards a Practical Multipath Transport Protocol for Telco Cloud Datacenters2018In: 9th International Conference on the Network of the Future (NOF), IEEE, 2018, p. 9-16Conference paper (Refereed)
  • 293. Ottosson, T.
    et al.
    Ahlén, A.
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Sternad, M.
    Svensson, A.
    Toward 4G IP-based Wireless Systems: A Proposal for the Uplink2002Conference paper (Refereed)
  • 294. Ottosson, T.
    et al.
    Ahlén, A.
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Sternad, M.
    Svensson, A.
    Towards 4G IP-based Wireless Systems2001Conference paper (Refereed)
    Abstract [en]

    A packet switched wireless cellular system with wide area coverage and high throughput is proposed. It is designed to be cost effective and to provide high spectral efficiency.

    The high performance is achieved by the use of long term channel predictions, in both time and frequency, scheduling among users, and smart antennas combined with adaptive modulation and power control. Calculations of the spectral efficiency of the downlink, based on reasonable simplifying assumptions, indicate that a tremendous capacity can be attained for moderate numbers of users and terminal antennas.

    We also briefly discuss other means for performance improvements such as alternatives to standard TCP, interlayer interaction/communication, and the use of positioning information.

  • 295. Ottosson, T.
    et al.
    Sternad, M.
    Ahlén, A.
    Svensson, A.
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Towards a 4G IP-based Wireless Systems Proposal2002Conference paper (Refereed)
    Abstract [en]

    A packet switched wireless cellular system with wide area coverage, high throughput and high spectral efficiency is proposed. Smart antennas at both base stations and mobiles improve the antenna gain and improve the signal to interference ratio. The small-scale fading is predicted in both time and frequency and a slotted OFDM radio interface is used, in which time-frequency bins are allocated adaptively to different mobile users, based on their predicted channel quality. This enables efficient scheduling among sectors and users as well as fast adaptive modulation and power control.

    We here estimate the spectral efficiency of the suggested downlink. The resulting channel capacity grows with the number of simultaneous users and with the number of antenna elements in terminals. A high efficiency, around 4 bits/s/Hz, is attained already for moderate numbers of users and terminal antennas. An outline is given of research pursued within the PCC Wireless IP Project to improve and investigate this type of system.

  • 296.
    Paiva, Thomas William Do Prado
    et al.
    Federal University of São Paulo, Brazil.
    Ferlin, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Red Hat AB.
    Brunstrom, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Alay, Ozgu
    University of Oslo, Norway.
    Kimura, Bruno Yuji Lino
    Federal University of São Paulo, Brazil.
    A First Look at Adaptive Video Streaming over Multipath QUIC with Shared Bottleneck Detection2023In: Proceedings of the 14th ACM Multimedia Systems Conference / [ed] Shervin Shirmohammadi, Mohamed Hefeeda , Roger Zimmermann, Carsten Griwodz, Mea Wang, Association for Computing Machinery (ACM), 2023, p. 161-172Conference paper (Refereed)
    Abstract [en]

    The promises of multipath transport is to aggregate bandwidth and improve resource utilisation and reliability. We demonstrate in this paper that the way multipath coupled congestion control is defined today RFC6359 leads to a sub-optimal resource utilisation when network paths are mainly disjoint, i.e., they do not share a bottleneck. With growing interest to standardise Multipath QUIC (MPQUIC), we implement the practical shared bottleneck detection (SBD) algorithm from RFC8382 in MPQUIC, namely MPQUIC-SBD. We evaluate MPQUIC-SBD through extensive emulation experiments in the context of video streaming. We show that MPQUIC-SBD is able to correctly detect shared bottlenecks over 90% of the time as the video segments’ size increase depending on the Adaptive Bitrate (ABR) algorithm. In non-shared bottleneck scenarios, MPQUIC-SBD results in video throughput gains of more than 13% compared to MPQUIC, which directly translates into better video quality metrics.

  • 297. Palazzo, S.
    et al.
    Scopigno, R.
    Spirito, M.
    Korpeoglu, I.
    Ulucinar, A. R.
    Moustakas, A. L.
    Galluccio,, L.
    Leonardi, A.
    Fabbri, F.
    Verdone, R.
    Chiasserini, C.F.
    Zanella, A.
    Zorzi, F.
    Ferrus, R.
    Riihijarvi, J.
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Cavalcanti de Castro, Marcel
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    DR.11.1: State of the art of research on opportunistic networks, and definition of a common framework for reference models and performance metrics2008Report (Refereed)
  • 298.
    Papastergiou, Georgios
    et al.
    Simula Research Laboratory (SRL).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Ros, David
    Simula Research Laboratory (SRL).
    Tuexen, Michael
    Fachhochschule Münster.
    Khademi, Naeem
    University of Oslo.
    Hurtig, Per
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    On the Cost of Using Happy Eyeballs for Transport Protocol Selection2016In: PROCEEDINGS OF THE ACM, IRTF & ISOC APPLIED NETWORKING RESEARCH WORKSHOP (ANRW'16), Association for Computing Machinery (ACM), 2016, p. 45-51Conference paper (Refereed)
    Abstract [en]

    Concerns have been raised in the past several years that introducing new transport protocols on the Internet has be- come increasingly difficult, not least because there is no agreed-upon way for a source end host to find out if a trans- port protocol is supported all the way to a destination peer. A solution to a similar problem—finding out support for IPv6—has been proposed and is currently being deployed: the Happy Eyeballs (HE) mechanism. HE has also been proposed as an efficient way for an application to select an appropriate transport protocol. Still, there are few, if any, performance evaluations of transport HE. This paper demonstrates that transport HE could indeed be a feasible solution to the transport support problem. The paper evaluates HE between TCP and SCTP using TLS encrypted and unencrypted traffic, and shows that although there is indeed a cost in terms of CPU load to introduce HE, the cost is rel- atively small, especially in comparison with the cost of using TLS encryption. Moreover, our results suggest that HE has a marginal impact on memory usage. Finally, by introduc- ing caching of previous connection attempts, the additional cost of transport HE could be significantly reduced. 

    Download full text (pdf)
    fulltext
  • 299.
    Papastergiou, Giorgos
    et al.
    Simula Research Laboratory, Norway.
    Fairhurst, Gorry
    University of Aberdeen, U.K.
    Ros, David
    Simula Research Laboratory, Norway.
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Distributed Systems and Communication (DISCO).
    Hurtig, Per
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Khademi, Naeem
    University of Oslo, Norway.
    Tüxen, Michael
    Münster University of Applied Sciences, Steinfurt, Germany.
    Welzl, Michael
    University of Oslo, Norway.
    Damjanovic, Dragana
    Mozilla Corporation, Mountain View, CA, USA.
    Mangiante, Simone
    EMC Corporation, Ovens, Ireland.
    De-Ossifying the Internet Transport Layer: A Survey and Future Perspectives2017In: IEEE Communications Surveys and Tutorials, E-ISSN 1553-877X, Vol. 19, no 1, p. 619-639Article in journal (Refereed)
    Abstract [en]

    It is widely recognized that the Internet transport layer has become ossified, where further evolution has become hard or even impossible. This is a direct consequence of the ubiquitous deployment of middleboxes that hamper the deployment of new transports, aggravated further by the limited flexibility of the application programming interface (API) typically presented to applications. To tackle this problem, a wide range of solutions have been proposed in the literature, each aiming to address a particular aspect. Yet, no single proposal has emerged that is able to enable evolution of the transport layer. In this paper, after an overview of the main issues and reasons for transport-layer ossification, we survey proposed solutions and discuss their potential and limitations. The survey is divided into five parts, each covering a set of point solutions for a different facet of the problem space: (1) designing middlebox-proof transports; (2) signaling for facilitating middlebox traversal; (3) enhancing the API between the applications and the transport layer; (4) discovering and exploiting end-to-end capabilities; and (5) enabling user-space protocol stacks. Based on this analysis, we then identify further development needs toward an overall solution. We argue that the development of a comprehensive transport layer framework, able to facilitate the integration and cooperation of specialized solutions in an application-independent and flexible way, is a necessary step toward making the Internet transport architecture truly evolvable. To this end, we identify the requirements for such a framework and provide insights for its development

  • 300.
    Parichehreh, Ali
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Alfredsson, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Measurement Analysis of TCP Congestion Control Algorithms in LTE Uplink2018In: 2018 Network Traffic Measurement and Analysis Conference (TMA), New York: IEEE, 2018, p. 1-8Conference paper (Refereed)
    Abstract [en]

    The unprecedented growth of user generated con- tents yielded by the proliferation of social networks applications, cellular based video surveillance and device-to-device (D2D) communication, makes the cellular uplink communication an attractive topic. In this paper we conduct a systematic evaluation and measurement analysis to characterize cellular uplink traffic and compare its interplay with different TCP congestion control algorithms (CCA), namely NewReno, Cubic, and BBR, in both stationary and mobility scenarios. The evaluation encompasses average throughput, average round trip time (RTT), fairness among simultaneous flows, and packet retransmission. The in- tended behavior of BBR has been observed in LTE uplink, but some severe issues such as lack of fairness among simultaneous flows and massive on device packet losses have been observed. It is observed that the lack of fairness among simultaneous flows can unpredictably change the throughput of multi-flow applications.

345678 251 - 300 of 371
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf