- Network Traffic and Congestion Control
- Caching and Content Delivery
- Software-Defined Networks and 5G
- Peer-to-Peer Network Technologies
- Advanced Wireless Network Optimization
- Wireless Networks and Protocols
- Internet Traffic Analysis and Secure E-voting
- Opportunistic and Delay-Tolerant Networks
- Network Security and Intrusion Detection
- Advanced Queuing Theory Analysis
- Mobile Ad Hoc Networks
- Advanced Optical Network Technologies
- Image and Video Quality Assessment
- Cooperative Communication and Network Coding
- Software System Performance and Reliability
- IPv6, Mobility, Handover, Networks, Security
- Multimedia Communication and Technology
- Interconnection Networks and Systems
- Wireless Communication Networks Research
- Telecommunications and Broadcasting Technologies
- Vehicular Ad Hoc Networks (VANETs)
- Distributed and Parallel Computing Systems
- Age of Information Optimization
- Green IT and Sustainability
- Network Packet Processing and Optimization
Institut national de recherche en informatique et en automatique
2014-2024
Université Côte d'Azur
2018-2024
Observatoire de la Côte d’Azur
2023
Institut de Biologie Valrose
2022
Institut de Chimie de Nice
2020
Institute of Electrical and Electronics Engineers
2014
Frontier Hospital
2014
Fondation Sophia Antipolis
2004-2009
Research Centre Inria Sophia Antipolis - Méditerranée
2008
Sprint (United States)
2002
Video streaming represents a large fraction of Internet traffic. Surprisingly, little is known about the network characteristics this In paper, we study two most popular video services, Netflix and YouTube. We show that strategies vary with type application (Web browser or native mobile application), container (Silverlight, Flash, HTML5) used for streaming. particular, identify three different produce traffic patterns from non-ack clocked ON-OFF cycles to bulk TCP transfer. then present an...
Delay Tolerant Networks are wireless networks where disconnections may occur frequently due to propagation phenomena, node mobility, and power outages. Propagation delays also be long the operational environment (e.g. deep space, underwater). In order achieve data delivery in such challenging networking environments, researchers have proposed use of store-carry-and-forward protocols: there, a store message its buffer carry it along for periods time, until an appropriate forwarding...
Transmission media carrying Internet traffic present a wide range of characteristics, some which, such as transmission errors, long end-to-end delay, and bandwidth asymmetry, may cause degradation the TCP performance. Many works have studied performance over these media, most which focus on particular network type. In this work we study independent type by considering different possible characteristics connection path. We problems proposed solutions. This permits us to understand limitations...
We present a technique for identifying repetitive information transfers and use it to analyze the redundancy of network traffic. Our insight is that dynamic content, streaming media other traffic not caught by today's Web caches nonetheless likely derive from similar information. have therefore adapted similarity detection techniques problem designing system eliminate redundant transfers. identify repeated byte ranges between packets avoid retransmitting data.
Software-defined networking (SDN) abstracts low-level network functionalities to simplify management and reduce costs. The OpenFlow protocol implements the SDN concept by abstracting communications as flows be processed elements. In OpenFlow, high-level policies are translated into primitives called rules that distributed over network. While abstraction offered allows potentially implement any policy, it raises new question of how define where place them in while respecting all technical...
Abstract Intelligent transportation systems, or ITS for short, includes a variety of services and applications such as road traffic management, traveler information public transit system autonomous vehicles, to name few. are expected be an integral part urban planning future smart cities, contributing improved safety, efficiency, well increased energy efficiency reduced environmental pollution. On the other hand, pose challenges due its scalability diverse quality‐of‐service needs, massive...
In this paper, we present a model for TCP/IP congestion control mechanism. The rate at which data is transmitted increases linearly in time until packet loss detected. At point, the transmission divided by constant factor. Losses are generated some exogenous random process assumed to be stationary ergodic. This allows us account any correlation and distribution of inter-loss times. We obtain an explicit expression throughput TCP connection bounds on when there limit window size. addition,...
Our goal is to design a traffic model for noncongested Internet backbone links, which simple enough be used in network operation, while being as general possible. The proposed solution the at flow level by Poisson shot-noise process. In our model, generic notion that must able capture characteristics of any kind data stream. We analyze accuracy with real traces collected on Sprint protocol (IP) network. Despite its simplicity, provides good approximation observed and variation. Finally, we...
In order to achieve data delivery in Delay Tolerant Networks (DTN), researchers have proposed the use of store-carry-and-forward protocols: a node there may store message its buffer and carry it along for long periods time, until an appropriate forwarding opportunity arises. This way, messages can traverse disconnected parts network. Multiple replicas are often propagated further increase probability. combination long-term storage replication imposes high bandwidth overhead. Thus, efficient...
The emerging widespread use of real-time multimedia applications over wireless networks makes the support quality service (QoS) a key problem. In this paper, we focus on QoS mechanisms for IEEE 802.11 ad-hoc networks. First, review limitations upcoming 802.11e enhanced DCF (EDCF) and other MAC schemes that have been proposed to Then, describe new scheme called adaptive fair EDCF extends EDCF, by increasing contention window during deferring periods when channel is busy, using an fast backoff...
The IEEE 802.11 medium access control (MAC) protocol provides a contention-based distributed channel mechanism for mobile stations to share the wireless medium, which may introduce lot of collisions in case overloaded active stations. Slow contention window (CW) decrease scheme is simple and efficient solution this problem. In paper, we use an analytical model compare slow CW MAC protocol. Several parameters are investigated such as number stations, initial size, factor value, maximum...
Delay tolerant networks (DTN) are wireless where disconnections may occur frequently. In order to achieve data delivery in DTNs, researchers have proposed the use of store-carry-and-forward protocols: there, a node store message its buffer and carry it along for long periods time, until an appropriate forwarding opportunity arises. Multiple replicas often propagated increase probability. This combination long-term storage replication imposes high bandwidth overhead. Thus, efficient...
Video streaming represents a large fraction of Internet traffic. Surprisingly, little is known about the network characteristics this In paper, we study two most popular video services, Netflix and YouTube. We show that strategies vary with type application (Web browser or native mobile application), container (Silverlight, Flash, HTML5) used for streaming. particular, identify three different produce traffic patterns from non-ack clocked ON-OFF cycles to bulk TCP transfer. then present an...
The Software-Defined Networking approach permits to realize new policies. In OpenFlow in particular, a controller decides on behalf of the switches which forwarding rules must be installed and where. However with this flexibility comes challenge computation rule allocation matrix meeting both high-level policies network constraints such as memory or link capacity limitations. Nevertheless, many situations (e.g., data-center networks), exact path followed by packets does not severely impact...
In this article, we introduce a novel dynamic controller assignment algorithm targeting connected vehicle services and applications, also known as Internet of Vehicles (IoV). The proposed approach considers hierarchically distributed control plane, decoupled from the data uses location traffic load to perform dynamically. We model problem multi-agent Markov game solve it with cooperative deep reinforcement learning. Simulation results using real-world mobility traces show that outperforms...
Our goal is to design a traffic model for uncongested IP backbone links that simple enough be used in network operation, and protocol application agnostic order as general possible. The proposed solution the at flow level by Poisson shot-noise process. In our model, generic notion must able capture characteristics of any kind data stream. We analyze accuracy with real traces collected on Sprint network. Despite its simplicity, provides good approximation observed variation. Finally, we...
Network coding is a new transmission paradigm that proved its strength in optimizing the usage of network resources. In this paper, we evaluate gain from using for file sharing applications running on top wireless mesh networks. With extensive simulations carried out simulator developed specifically study, confirm can improve performance application, but not as wired The main reason nodes over cannot listen to different neighbors simultaneously. Nevertheless, one get more if information made...
Confronted with the generalization of monitoring in operational networks, researchers have proposed placement algorithms that can help ISPs deploy their infrastructure a cost effective way, while maximizing benefits infrastructure. However, static monitors cannot be optimal given short-term and long-term variations traffic due to re-routing events, anomalies normal network evolution. In addition, most already router embedded functionalities. Despite some limitations (inherent being part...
We present a technique for identifying repetitive information transfers and use it to analyze the redundancy of network traffic. Our insight is that dynamic content, streaming media other traffic not caught by today's Web caches nonetheless likely derive from similar information. have therefore adapted similarity detection techniques problem designing system eliminate redundant transfers. identify repeated byte ranges between packets avoid retransmitting data.
This paper addresses the issue of security Internet Coordinate Systems,by proposing a general method for malicious behavior detection during coordinate computations. We first show that dynamics node, in system without abnormal or behavior, can be modeled by Linear State Space model and tracked Kalman filter. Then we show, obtained generalized sense parameters filtercalibrated at node used effectively to predict dynamic another as long two nodes are not too far apart network. leads proposal...