References of "Bonaventure, Olivier"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailRevealing Middlebox Interference with Tracebox
Detal, Grégory; Hesmans, Benjamin; Bonaventure, Olivier et al

in ACM/USENIX Internet Measurement Conference (2013, October)

Middleboxes such as firewalls, NAT, proxies, or Deep Packet Inspection play an increasingly important role in various types of IP networks, including enterprise and cellular networks. Recent studies have ... [more ▼]

Middleboxes such as firewalls, NAT, proxies, or Deep Packet Inspection play an increasingly important role in various types of IP networks, including enterprise and cellular networks. Recent studies have shed the light on their impact on real traffic and the complexity of managing them. Network operators and researchers have few tools to understand the impact of those boxes on any path. In this paper, we propose tracebox, an extension to the widely used traceroute tool, that is capable of detecting various types of middlebox interference over almost any path. tracebox sends IP packets containing TCP segments with different TTL values and analyses the packet encapsulated in the returned ICMP message. Further, as recent routers quote, in the ICMP message, the entire IP packet that they received, \tracebox is able to detect any modification performed by upstream middleboxes. In addition, tracebox can often pinpoint the network hop where the middlebox interference occurs. We evaluate tracebox with measurements performed on PlanetLab nodes. Our analysis reveals various types of middleboxes that were not expected on such an experimental testbed supposed to be connected to the Internet without any restriction. [less ▲]

Detailed reference viewed: 98 (13 ULg)
Full Text
Peer Reviewed
See detailOn the Impact of Layer-2 on Node Degree Distribution
Mérindol, Pascal; Donnet, Benoît ULg; Bonaventure, Olivier et al

in 10th annual conference on Internet measurement (2010, November)

The Internet topology data collected through traceroute exploration has been extensively studied in the past. In particular, a remarkable property of the Internet, the power-law shape of node degree ... [more ▼]

The Internet topology data collected through traceroute exploration has been extensively studied in the past. In particular, a remarkable property of the Internet, the power-law shape of node degree distribution, drew the attention of the research community. Several studies have since questioned this property. In this paper, based on a large dataset collected using mrinfo, we show that the node degree distribution is strongly impacted by the presence of layer-2 (L2) networks, such as switches. L2 devices interconnect a large number of routers, themselves being also involved in multiple L2 interconnec- tions. Such a situation induces nodes with very high degree when analyzing the layer-3 (L3) graph with traceroute probing. Considering the physical design of a network, our analysis provides a lower bound on the bias generated by using only an L3 view. We also provide a model that can be a first step towards L2 aware topology generation. [less ▲]

Detailed reference viewed: 40 (1 ULg)
Full Text
Peer Reviewed
See detailExtracting Intra-Domain Topology from mrinfo Probing
Pansiot, Jean-Jacques; Mérindol, Pascal; Donnet, Benoît ULg et al

in 11th international Conference on Passive and active Measurement (2010, April)

Activeandpassivemeasurementsfortopologydiscoveryhave known an impressive growth during the last decade. If a lot of work has been done regarding inter-domain topology discovery and modeling, only a few ... [more ▼]

Activeandpassivemeasurementsfortopologydiscoveryhave known an impressive growth during the last decade. If a lot of work has been done regarding inter-domain topology discovery and modeling, only a few papers raise the question of how to extract intra-domain topologies from measurements results. In this paper, based on a large dataset collected with mrinfo, a multicast tool that silently discovers all interfaces of a router, we provide a mechanism for retrieving intra-domain topologies. The main challenge is to assign an AS number to a border router whose IP addresses are not mapped to the same AS. Our algorithm is based on probabilistic and empirical IP allocation rules. The goal of our pool of rules is to converge to a consistent router to AS mapping. We show that our router-to-AS algorithm results in a mapping in more than 99% of the cases. Furthermore, with mrinfo, point-to-point links between routers can be distinguished from multiple links attached to a switch, providing an accurate view of the collected topologies. Finally, we provide a set of large intra-domain topologies in various formats. [less ▲]

Detailed reference viewed: 9 (1 ULg)
Full Text
Peer Reviewed
See detailQuantifying ASes Multiconnectivity Using Multicast Information
Mérindol, Pascal; Van den Schriek, Virginie; Donnet, Benoît ULg et al

in 9th ACM SIGCOMM Conference on Internet Measurement (2009, November)

Redundant connectivity (or multiconnectivity) between adjacent autonomous systems (ASes) is important for inter-domain traffic engineering and fast recovery in case of failures. However, the redundancy of ... [more ▼]

Redundant connectivity (or multiconnectivity) between adjacent autonomous systems (ASes) is important for inter-domain traffic engineering and fast recovery in case of failures. However, the redundancy of ASes business relationship links has not been quantitatively studied, mainly due to the difficulty of obtaining relevant data. In this paper, we show that the mrinfo multicast monitoring tool can provide useful data about the Internet topology and such redundant links in particular. Our analysis relies on more than four years of daily queries to about ten thousand routers mapped into more than two hundred ASes. We demonstrate that peering links between ASes are frequently redundant. In particular, our analysis shows that more than half of the studied ASes pairs are connected through multiple physical links. We then refine our analysis by considering the different types of ASes and their business relationships. A particular result of our analysis is that at least 75% of the peer-to-peer relationships between adjacent Tier-1 ASes are redundant, i.e., the con- nections between these ASes involve several physical links. Our analysis is conservative, providing so a lower bound, as some links might not be seen by mrinfo due to ISPs filtering policies. [less ▲]

Detailed reference viewed: 14 (4 ULg)
Full Text
Peer Reviewed
See detailOn the Impact of Clustering on Measurement Reduction
Saucez, Damien; Donnet, Benoît ULg; Bonaventure, Olivier

in 8th International IFIP-TC 6 Networking Conference (2009, May)

Measuring a path performance according to one or several metrics, such as delay or bandwidth, is becoming more and more pop- ular for applications. However, constantly probing the network is not suitable ... [more ▼]

Measuring a path performance according to one or several metrics, such as delay or bandwidth, is becoming more and more pop- ular for applications. However, constantly probing the network is not suitable. To make measurements more scalable, the notion of clustering has emerged. In this paper, we demonstrate that clustering can limit the measurement overhead in such a context without loosing too much accuracy. We first explain that measurement reduction can be observed when vantage points collaborate and use clustering to estimate path performance. We then show, with real traces, how effective is the overhead reduction and what is the impact in term of measurement accuracy. [less ▲]

Detailed reference viewed: 9 (1 ULg)
Full Text
Peer Reviewed
See detailInterdomain Traffic Engineering in a Locator/Identifier Separation Context
Saucez, Damien; Donnet, Benoît ULg; Iannone, Luigi et al

in IEEE Internet Network Management Workshop (2008, October)

The Routing Research Group (RRG) of the Internet Research Task Force (IRTF) is currently discussing several architectural solutions to build an interdomain routing architecture that scales better than the ... [more ▼]

The Routing Research Group (RRG) of the Internet Research Task Force (IRTF) is currently discussing several architectural solutions to build an interdomain routing architecture that scales better than the existing one. The solutions family currently being discussed concerns the addresses separation into locators and identifiers, LISP being one of them. Such a separation provides opportunities in terms of traffic engineering. In this paper, we propose an open and flexible solution that allows an ISP using identifier/locator separation to engineer its interdomain traffic. Our solution relies on the utilization of a service that transparently ranks paths using cost functions. We implement a prototype server and demonstrate its benefits in a LISP testbed. [less ▲]

Detailed reference viewed: 8 (1 ULg)
Full Text
See detailOn BGP Communities
Donnet, Benoît ULg; Bonaventure, Olivier

in Computer Communication Review (2008), 38(2),

This paper focuses on BGP communities, a particular BGP attribute that has not yet been extensively studied by the research community. It allows an operator to group destinations in a single entity to ... [more ▼]

This paper focuses on BGP communities, a particular BGP attribute that has not yet been extensively studied by the research community. It allows an operator to group destinations in a single entity to which the same routing decisions might be applied. In this paper, we show that the usage of this attribute has increased and that it also contributes to routing table growth. In addition, we propose a taxonomy of BGP community attributes to allow operators to better document their communities. We further manually collect information on BGP communities and tag it according to our taxonomy. We show that a large propor- tion of the BGP communities are used for traffic engineering purposes. [less ▲]

Detailed reference viewed: 9 (0 ULg)
Full Text
See detailIDIPS: ISP-Driven Informed Path Selection
Saucez, Damien; Donnet, Benoît ULg; Bonaventure, Olivier

Report (2008)

This draft describes a simple network-based protocol to facilitate Path Selection and to improve traffic engineering capabilities in multihomed corporate networks. With this protocol, any network device ... [more ▼]

This draft describes a simple network-based protocol to facilitate Path Selection and to improve traffic engineering capabilities in multihomed corporate networks. With this protocol, any network device that requires to select a path among a list of different paths asks a Traffic Engineering service called IDIPS (ISP-Driven Informed Path Selection) to obtain an ordered list of the possible paths. The ordering is constructed according to policies and performance requirements of both the host and network provider [less ▲]

Detailed reference viewed: 10 (1 ULg)
Full Text
See detailThe Case for an Informed Path Selection Service
Bonaventure, Olivier; Saucez, Damien,; Donnet, Benoît ULg

Report (2008)

With today's peer-to-peer applications, more and more content is available from multiple sources. In tomorrow's Internet hosts will have multiple paths to reach one destination host with the deployment of ... [more ▼]

With today's peer-to-peer applications, more and more content is available from multiple sources. In tomorrow's Internet hosts will have multiple paths to reach one destination host with the deployment of dual-stack IPv4/IPv6 hosts, but also with new techniques such as shim6 or other locator/identifier mechanisms being discussed within the IRTF RRG. All these hosts will need to rank paths in order to select the best paths to reach a given destination/content. In this draft, we propose an informed path selection service that would be queried by hosts and would rank paths based on policies and performance metrics defined by the network operator to meet his traffic engineering objectives. A companion document describes a protocol that implements this service. [less ▲]

Detailed reference viewed: 7 (2 ULg)
Full Text
Peer Reviewed
See detailImplementation and Preliminary Evaluation of an ISP-Driven Informed Path Selection
Saucez, Damien; Donnet, Benoît ULg; Bonaventure, Olivier

in ACM CoNEXT conference (2007, December)

Detailed reference viewed: 7 (1 ULg)
Full Text
Peer Reviewed
See detailPreliminary Analysis of the TCP Behavior in 802.16 Networks
Perez, Jesus Arturo,; Donnet, Benoît ULg; Bonaventure, Olivier

in 1st WEIRD Workshop on WiMAX, Wireless and Mobility (2007, May)

Currently, broadband wireless access is gaining a great deal of interest from the networking research community. Particularly, the recently standardized WiMAX presents interesting perspectives, notably ... [more ▼]

Currently, broadband wireless access is gaining a great deal of interest from the networking research community. Particularly, the recently standardized WiMAX presents interesting perspectives, notably due to its capacity to offer consistent bandwidth and therefore consistent QoS. However, the behavior of network protocols, such as TCP, has not been studied in detail in a WiMAX environment. This is a problem that could slow down the widespread deployment of WiMAX. In this paper, we present preliminary results of the performance of TCP in a pre-WiMAX network. We are interested in the RTT and the relationship between the delay and packet loss rate. We find that TCP presents an acceptable cyclic behavior but with a high percentage of packet loss, 6.2%. We further notice some burst packet losses that vary in size and duration. Some of these bursts correspond to a packet loss rate of 100% during periods of up to one second. [less ▲]

Detailed reference viewed: 156 (0 ULg)
Full Text
Peer Reviewed
See detailA Reputation-Based Approach for Securing Vivaldi Embedding System
Saucez, Damien; Donnet, Benoît ULg; Bonaventure, Olivier

in 13th Conference on Dependable and Adaptable Networks and Services (2007)

Many large-scale Internet applications optimize their overlay network to reduce latencies. Embedding coordinate systems like Vivaldi are valuable tools for this new range of applications since they ... [more ▼]

Many large-scale Internet applications optimize their overlay network to reduce latencies. Embedding coordinate systems like Vivaldi are valuable tools for this new range of applications since they propose light-weight algorithms that permit to estimate the latency between any pair of nodes without having to contact them first. It has been recently demonstrated that coordinate systems in general and Vivaldi in particular are sensible to attacks. Typically, nodes can lie about their coordinate and distort the coordinate space. In this paper, we propose a formal reputation model to detect misbehaving nodes and propose a reputation adaptation of Vivaldi called RVivaldi. We evaluate the performance of RVivaldi using the King dataset and show that RVivaldi is less sensitive to malicious nodes than Vivaldi. [less ▲]

Detailed reference viewed: 2 (0 ULg)
See detailModule de garantie de transmission
Reinbold, Pierre; Martin, Sylvain ULg; Bonaventure, Olivier et al

in ARTHUR - Manuel d'informatisation des urgences (2003)

Detailed reference viewed: 24 (5 ULg)
Full Text
Peer Reviewed
See detailA RED discard strategy for ATM networks and its performance evaluation with TCP/IP Traffic
Rosolen, Vincent; Bonaventure, Olivier; Leduc, Guy ULg

in Computer Communication Review (1999), 29(3), 23-43

In ATM UBR networks supporting TCP traffic, optimal efficiency can only be envisaged if switches adopt a discard mechanism that operates at the packet level rather than the cell level. In this paper, we ... [more ▼]

In ATM UBR networks supporting TCP traffic, optimal efficiency can only be envisaged if switches adopt a discard mechanism that operates at the packet level rather than the cell level. In this paper, we define a variant of the RED discard strategy suitable for ATM switches. An interesting feature of this ATM-RED is that it has a similar per-VC implementation complexity as the Early Packet Discard (EPD) algorithm. To study the efficiency of the ATM-RED discard strategy, we compare its performance with plain the UBR, EPD and Fair Buffer Acceptance (FBA) discard strategies by means of simulation with TCP/IP traffic. We give comparative results with respect to different performance criteria such as goodput and fairness in various environments, such as end-to-end ATM networks and IP-based networks with an ATM backbone, in both single-bottlenecked and GFC topologies. [less ▲]

Detailed reference viewed: 23 (7 ULg)
Full Text
Peer Reviewed
See detailModel-based verification of a security protocol for conditional access to services
Leduc, Guy ULg; Bonaventure, Olivier; Koerner, Eckhart et al

in Formal Methods In System Design (1999), 14(2), 171-191

We use the formal language LOTOS to specify and verify the robustness of the Equicrypt protocol under design in the European OKAPI project for conditional access to multimedia services. We state some ... [more ▼]

We use the formal language LOTOS to specify and verify the robustness of the Equicrypt protocol under design in the European OKAPI project for conditional access to multimedia services. We state some desired security properties and formalize them. We describe a generic intruder process and its modelling, and show that some properties are falsified in the presence of this intruder. The diagnostic sequences can be used almost directly to exhibit the scenarios of possible attacks on the protocol. Finally, we propose an improvement of the protocol which satisfies our properties. [less ▲]

Detailed reference viewed: 10 (0 ULg)
Full Text
Peer Reviewed
See detailImpact of cell discard strategies on TCP/IP in ATM UBR networks
Rosolen, Vincent; Bonaventure, Olivier; Leduc, Guy ULg

in Performance Modelling and Evaluation of ATM Networks (1998, July)

In ATM UBR networks supporting TCP traffic, optimal efficiency can only be envisaged if switches adopt a discard mechanism that operates at the packet level rather than the cell level. In this paper, we ... [more ▼]

In ATM UBR networks supporting TCP traffic, optimal efficiency can only be envisaged if switches adopt a discard mechanism that operates at the packet level rather than the cell level. In this paper, we investigate the performance of the EPD, RED and FBA strategies by means of simulation, and give comparative results with respect to different environments and performance criteria. We show that implementing such a strategy in a LAN brings little added value, while the benefit is more obvious in a WAN access network with asymmetrical bandwidths. Specifically, the improvement not only concerns goodput but also fairness among competing TCP connections, and depends upon the Maximum Segment Size used by the sources. [less ▲]

Detailed reference viewed: 18 (2 ULg)
Full Text
Peer Reviewed
See detailSpecification and verification of a TTP protocol for the conditional access to services
Leduc, Guy ULg; Bonaventure, Olivier; Koerner, Eckhart et al

in Formal Methods and their Applications: Telecommunications, VLSI and Real-Time Computerized Control Systems (1996, October)

We use the formal language LOTOS to specify the Equicrypt protocol and verify its robustness to attacks by an intruder. We use the model-based CADP verification tools from the Eucalyptus toolbox to ... [more ▼]

We use the formal language LOTOS to specify the Equicrypt protocol and verify its robustness to attacks by an intruder. We use the model-based CADP verification tools from the Eucalyptus toolbox to discover some successful attacks against this protocol. [less ▲]

Detailed reference viewed: 63 (3 ULg)
Full Text
See detailTowards an Integrated Solution for Multimedia Communications
Mathy, Laurent ULg; Leduc, Guy ULg; Danthine, André ULg et al

in Bulletin Scientifique de l'Association des Ingénieurs Electriciens sortis de l'Institut Electrotechnique Montefiore (1996)

During the last few years, we have been witnessing tremendous changes in the communication environment. Those changes are not only due to the availability of higher data rates in the communication ... [more ▼]

During the last few years, we have been witnessing tremendous changes in the communication environment. Those changes are not only due to the availability of higher data rates in the communication networks but also to the appearance of new application types such as multimedia applications. After a brief introduction to multimedia communications, we will present the research activities in multimedia we have undertaken during the last few years. They focus on two aspects of multimedia communications: a new semantics for expressing Quality of Service (QoS), and a support for group communications. [less ▲]

Detailed reference viewed: 27 (7 ULg)
Full Text
Peer Reviewed
See detailA Group Communication Framework
Mathy, Laurent ULg; Leduc, Guy ULg; Bonaventure, Olivier et al

in Bauerfeld, Wulf; Spaniol, Otto; Williams, F. (Eds.) Broadband Islands '94: Connecting with the End-User (1994, June)

This paper presents a general architectural model for group communications which are communications that may involve more than two parties. The concept of group is presented and the concept of group ... [more ▼]

This paper presents a general architectural model for group communications which are communications that may involve more than two parties. The concept of group is presented and the concept of group association, which is an instance of group communication, is analysed. Those group associations are modeled as a set of basic components called multicast conversations. At the service boundery, new architectural concepts are introduced to identify a group association as well as its multicast conversations. Then, facilities to handle the group associations and the multicast conversations are defined and the properties of data transfer on a group association are examined. Finally, the paper deals with aspects of group management. [less ▲]

Detailed reference viewed: 53 (6 ULg)
See detailA Group Communication Framework
Mathy, Laurent ULg; Leduc, Guy ULg; Bonaventure, Olivier et al

Report (1994)

Detailed reference viewed: 30 (6 ULg)