Skip to main content

Showing 1–11 of 11 results for author: Donnet, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.04036  [pdf, other

    cs.OS cs.NI

    uTNT: Unikernels for Efficient and Flexible Internet Probing

    Authors: Maxime Letemple, Gaulthier Gain, Sami Ben Mariem, Laurent Mathy, Benoit Donnet

    Abstract: The last twenty years have seen the development and popularity of network measurement infrastructures. Internet measurement platforms have become common and have demonstrated their relevance in Internet understanding and security observation. However, despite their popularity, those platforms lack of flexibility and reactivity, as they are usually used for longitudinal measurements. As a consequen… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 10 pages, 11 figures, IFIP extended-abstract

  2. arXiv:2404.13665  [pdf, other

    cs.NI

    MSTG: A Flexible and Scalable Microservices Infrastructure Generator

    Authors: Emilien Wansart, Maxime Goffart, Justin Iurman, Benoit Donnet

    Abstract: The last few years in the software engineering field has seen a paradigm shift from monolithic application towards architectures in which the application is split in various smaller entities (i.e., microservices) fueled by the improved availability and ease of use of containers technologies such as Docker and Kubernetes. Those microservices communicate between each other using networking technolog… ▽ More

    Submitted 21 April, 2024; originally announced April 2024.

  3. arXiv:2309.09562  [pdf, other

    cs.CY

    Training Students' Abstraction Skills Around a CAFÉ 2.0

    Authors: Géraldine Brieven, Lev Malcev, Benoit Donnet

    Abstract: Shaping first year students' mind to help them master abstraction skills is as crucial as it is challenging. Although abstraction is a key competence in problem-solving (in particular in STEM disciplines), students are often found to rush that process because they find it hard and do not get any direct outcome out of it. They prefer to invest their efforts directly in a concrete ground, rather tha… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

    Comments: 12 pages, 14 figures

    ACM Class: K.3.1; K.3.2

  4. All that Glitters is not Bitcoin -- Unveiling the Centralized Nature of the BTC (IP) Network

    Authors: Sami Ben Mariem, Pedro Casas, Matteo Romiti, Benoit Donnet, Rainer Stütz, Bernhard Haslhofer

    Abstract: Blockchains are typically managed by peer-to-peer (P2P) networks providing the support and substrate to the so-called distributed ledger (DLT), a replicated, shared, and synchronized data structure, geographically spread across multiple nodes. The Bitcoin (BTC) blockchain is by far the most well known DLT, used to record transactions among peers, based on the BTC digital currency. In this paper, w… ▽ More

    Submitted 19 February, 2020; v1 submitted 24 January, 2020; originally announced January 2020.

    Comments: IEEE/IFIP Network Operations and Management Symposium 2020

    Journal ref: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium

  5. arXiv:1908.07240  [pdf, other

    cs.NI

    Implementation of IOAM for IPv6 in the Linux Kernel

    Authors: Justin Iurman, Benoit Donnet, Frank Brockners

    Abstract: In-situ Operations, Administration, and Maintenance (IOAM) is currently under standardization at the IETF. It allows for collecting telemetry and operational information along a path, within the data packet, as part of an existing (possibly additional) header. This paper discusses the very first implementation of IOAM for the Linux kernel with IPv6 as encapsulation protocol. We also propose a firs… ▽ More

    Submitted 20 August, 2019; originally announced August 2019.

  6. arXiv:1904.11277  [pdf, other

    cs.NI

    mmb: Flexible High-Speed Userspace Middleboxes

    Authors: Korian Edeline, Justin Iurman, Cyril Soldani, Benoit Donnet

    Abstract: Nowadays, Internet actors have to deal with a strong increase in Internet traffic at many levels. One of their main challenge is building high-speed and efficient networking solutions. In such a context, kernel-bypass I/O frameworks have become their preferred answer to the increasing bandwidth demands. Many works have been achieved, so far, all of them claiming to have succeeded in reaching line-… ▽ More

    Submitted 25 April, 2019; originally announced April 2019.

  7. arXiv:1901.10156  [pdf, other

    cs.NI

    TNT, Watch me Explode: A Light in the Dark for Revealing MPLS Tunnels

    Authors: Yves Vanaubel, Jean-Romain Luttringer, Pascal Mérindol, Jean-Jacques Pansiot, Benoit Donnet

    Abstract: Internet topology discovery has been a recurrent research topic for nearly 20 years now. Usually, it works by sending hop-limited probes (i.e., traceroute) towards a set of destinations to collect topological data in order to infer the Internet topology at a given scale (e.g., at the router or the AS level). However, traceroute comes with multiple limitations, in particular with layer-2 clouds suc… ▽ More

    Submitted 22 February, 2019; v1 submitted 29 January, 2019; originally announced January 2019.

    Comments: TNT code, GNS3 scripts, data processing and analysis scripts, raw data collected are available here: http://www.montefiore.ulg.ac.be/~bdonnet/mpls

    Journal ref: Published in Network Traffic Measurement and Analysis (TMA) Conference 2019

  8. arXiv:1612.07816  [pdf, other

    cs.NI

    Using UDP for Internet Transport Evolution

    Authors: Korian Edeline, Mirja Kühlewind, Brian Trammell, Emile Aben, Benoit Donnet

    Abstract: The increasing use of middleboxes (e.g., NATs, firewalls) in the Internet has made it harder and harder to deploy new transport or higher layer protocols, or even extensions to existing ones. Current work to address this Internet transport ossification has led to renewed interest in UDP as an encapsulation for making novel transport protocols deployable in the Internet. Examples include Google's Q… ▽ More

    Submitted 22 December, 2016; originally announced December 2016.

    Report number: ETH TIK Technical Report 366

  9. arXiv:cs/0607038  [pdf, ps, other

    cs.NI

    Retouched Bloom Filters: Allowing Networked Applications to Flexibly Trade Off False Positives Against False Negatives

    Authors: Benoit Donnet, Bruno Baynat, Timur Friedman

    Abstract: Where distributed agents must share voluminous set membership information, Bloom filters provide a compact, though lossy, way for them to do so. Numerous recent networking papers have examined the trade-offs between the bandwidth consumed by the transmission of Bloom filters, and the error rate, which takes the form of false positives, and which rises the more the filters are compressed. In this… ▽ More

    Submitted 1 December, 2006; v1 submitted 9 July, 2006; originally announced July 2006.

    Comments: This is a new version of the technical reports with improved algorithms and theorical analysis of algorithms

  10. arXiv:cs/0603062  [pdf, ps, other

    cs.NI

    Implementation and Deployment of a Distributed Network Topology Discovery Algorithm

    Authors: Benoit Donnet, Bradley Huffaker, Timur Friedman, kc claffy

    Abstract: In the past few years, the network measurement community has been interested in the problem of internet topology discovery using a large number (hundreds or thousands) of measurement monitors. The standard way to obtain information about the internet topology is to use the traceroute tool from a small number of monitors. Recent papers have made the case that increasing the number of monitors wil… ▽ More

    Submitted 21 March, 2006; v1 submitted 16 March, 2006; originally announced March 2006.

  11. arXiv:cs/0411013  [pdf, ps, other

    cs.NI

    Efficient Algorithms for Large-Scale Topology Discovery

    Authors: Benoit Donnet, Philippe Raoult, Timur Friedman, Mark Crovella

    Abstract: There is a growing interest in discovery of internet topology at the interface level. A new generation of highly distributed measurement systems is currently being deployed. Unfortunately, the research community has not examined the problem of how to perform such measurements efficiently and in a network-friendly manner. In this paper we make two contributions toward that end. First, we show tha… ▽ More

    Submitted 7 November, 2004; originally announced November 2004.

    Comments: 23 pages