Home UC3M
Home IT
Home / Personnel / Assistant / Carlos Jesús Bernardos Cano / Advanced Internet Architectures

Advanced Internet Architectures (Telematics Engineering Master)

Course 2007-2008

  • Course: 2
  • ECTS Credits: 5
  • Semester: 1
  • Course Director: Carlos J. Bernardos
  • Lecture Time/Place: Tuesday/Thursday - from 16 to 18h (check room below)
  • Instructors:

 Course Summary

The Internet is evolving to a new multi-service integrated network. In this course, we will cover different current trends in advanced network technologies enabling the convergence of the Internet towards a real integrated multi-service network.

During the course, students will analyse and think of the problems posed by the different proposed solutions, aiming at exploiting the analytical and critical capabilities of the students. We will also try to identify the more relevant topics within this research area and those that are attracting more scientific interest nowadays.

 Course program
Detailed Course Program (subject to change, please check regularly)
Week Date Room (local UC3M) Instructor/Presenter Topic (approx.)
1 Tue 2007-10-02 Salón de Grados Padre Soler cjbc Course Introduction
2 Tue 2007-10-09 Salón de Grados Padre Soler C. Dovorolis Invited talk
3 Tue 2007-10-16 3.S.D01 cjbc IPv6 (I)
3 Thu 2007-10-18 3.S.D01 cjbc IPv6 (II)
6 Tue 2007-11-06 3.S.D01 alberto Dissemination of research results
6 Thu 2007-11-08 3.S.D01 alberto Basic principles of the Internet Architecture
7 Tue 2007-11-13 1.1.J12 alberto BGP (I)
7 Thu 2007-11-15 1.1.J12 alberto BGP (II)
8 Tue 2007-11-20 3.S.D01 alberto Multihoming
8 Thu 2007-11-22 3.S.D01 alberto BGP, multihoming
9 Tue 2007-11-27 3.S.D01 marcelo SHIM6 (I)
9 Thu 2007-11-29 1.1.J12 marcelo SHIM6 (II)
11 Tue 2007-12-11 3.S.D01 carmen Peer to Peer (I)
11 Thu 2007-12-13 3.S.D01 carmen Peer to Peer (II)
12 Tue 2007-12-18 3.S.D01 carmen Peer to Peer (III)
12 Tue 2007-12-20 3.S.D01 G. Camarillo Invited talk
15 Thu 2008-01-10 3.S.D01 Paper presentations (I)
Vanessa Tejada Muñoz (UC3M) "Security models for BGP-like interdomain routing" (paper, slides)
Rubén Hidalgo (UC3M) "New Interdomain routing protocols" (paper, slides)
Rafael Sánchez (UC3M) "Comparative analysis of client-server vs P2P approaches for high-quality video streaming" (paper, slides)
Paola Garfias (UPC) "DNSSEC analysis" (paper, slides)
Mauricio Tamayo (UC3M) "Definition of the SeND MIB" (paper, slides)
16 Thu 2008-01-31 Moved to 2008-01-31
16 Thu 2008-01-17 3.S.D01 Paper presentations (III)
Jose Moreira Sánchez (UPC) "Better than Nothing Security proposal" (paper, slides)
Javier Polo (UPC) "Description of more common unstructured p2p overlay network" (paper, slides)
Coslet Gheorghe (UC3M) "ITU-T NGN Networks and the Internet" (paper, slides)
Alexandru Bikfalvi (UC3M) "Hierarchical Kademlia in PeerFactSim" (paper, slides)
Iljitsch van Beijnum (UC3M) "Peer-to-peer related congestion issues" (paper, slides)
17 Tue 2008-01-22 3.S.D01 Paper presentations (IV)
Juan Felipe Botero (UPC) "SEND: Secure Neighbour Discovery" (paper, slides)
Jose Javier Garcia (UPC) "Study of mobility support aspects over 6LoWPAN wireless sensor networks and 6LoWPAN - IPv4 interoperability" (paper, slides)
Javier Diez (UC3M) "End-host mobility and multihoming with HIP" (paper, slides)
Elena Pereira (UC3M) "CGAs: what are they and what do they provide?" (paper, slides)
Paul Patras (UC3M) "Analysis of the requirements for routing in mesh networks" (paper, slides)
17 Thu 2008-01-24 3.S.D01 Test
18 Tue 2008-01-29 3.S.D01 Paper presentations (V)
Francisco Cano (UPC) "SHIM6 Multihoming in ad-hoc networks" (paper, slides)
Ruben Gonzalvez (UPC) "Inter-domain routing over GMPLS" (paper, slides)
Alicia Moreno (UC3M) "Understanding the impact of network mobility solutions on the global routing system" (paper, slides)
Rosa Delgado (UC3M) "Architected NAT approaches" (paper, slides)
Pedro Antonio Cruz (UC3M) "Advanced aspects of the Inter-domain routing" (paper, slides)
18 Thu 2008-01-31 3.S.D01 Paper presentations (II)
Marc Jáimez (UPC) "Comparative analysis of client-server vs p2p video streaming approaches"
Alberto José González Cela (UPC) "Structured vs Unstructured p2p applications" (paper, slides)
Eliseo Catalán (UPC) "How ISP do traffic engineering of p2p applications" (paper, slides)
Miguel Catalan (UPC) "P2PSIP Standardization" (paper, slides)
Michel Reznik Milstein (UPC) "P2P video streaming" (paper, slides)

 Invited talks

Multihoming and Intelligent Route Control

  • Date: October, 9th 16:00
  • Place: Salón de Grados Edifidio Padre Soler
  • Title: Multihoming and Intelligent Route Control
  • Abstract:

    Recently, there is significant interest in Intelligent Route Control (IRC) systems. IRC systems come in two main flavors: Routing Overlays and Intelligent Multihoming. Routing Overlays require a distributed infrastructure of ``overlay routers''. Packets can be forwarded from the source to the destination through one or more intermediate overlay routers, bypassing congested Internet links or networks with poor reliability. In Intelligent Multihoming, a stub network can dynamically choose among a number of upstream Internet providers. A multihomed network can receive its ingress traffic among different providers, and it can steer its egress traffic to the provider with the best performance or least cost.

    IRC systems may revolutionize the Internet routing and traffic engineering landscape for three primary reasons:

    1. IRC systems perform load-sensitive routing, allowing dynamic path changes based on the measured performance of the candidate paths.
    2. With IRC systems it becomes possible to route different classes of traffic to the same destination through different paths.
    3. IRC systems give edge networks the flexibility to choose their path to common destinations.

    This talk will focus on the following three research issues:

    1. the performance and stability of IRC systems,
    2. the interactions between IRC and TCP congestion control, and
    3. the economics behind IRC systems and how to exploit them to design a profitable ISP that does not own a network!

  • Speaker short bio:

    Dr. Constantine Dovrolis is an Associate Professor at the College of Computing of the Georgia Institute of Technology. He received the Computer Engineering degree from the Technical University of Crete (Greece) in 1995, the M.S. degree from the University of Rochester in 1996, and the Ph.D. degree from the University of Wisconsin-Madison in 2000.

    His research interests include Internet protocols and technologies, network measurements and their applications, intelligent route control, router buffer sizing, service provisioning and traffic engineering, and biology-inspired network architectures.

    He received the NSF CAREER award in 2003.

Peer to Peer SIP

  • Date: December, 20th from 16:00 to 20:00
  • Place: 3.S.D01
  • Title: Peer to Peer SIP
  • Abstract:

    This presentation will start with an introduction to SIP (Session Initiation Protocol). This introduction will include the functionality SIP provides, the entities SIP defines, how SIP addressing works, how SIP transactions and dialogs are handled, the relation between SIP and SDP (Session Description Protocol), the offer/answer model, and the most important SIP extensions. After this introduction, the presentation will focus on P2P (Peer-to-peer) SIP. This part of the presentation will include how the SIP registration and routing functions can be distributed using DHTs (Distributed Hash Tables), DHT basics, and how DHTs can be maintained by the P2PSIP peers.

  • Speaker short bio:

    Gonzalo Camarillo leads the Advanced Signalling Research Laboratory of Ericsson in Helsinki, Finland. He is an active participant in the IETF, where he has authored and co-authored several specifications used in the IMS. In particular, he is a co-author of the main SIP specification, RFC 3261. In addition, he co-chairs the IEFT SIPPING working group, which handles the requirements from 3GPP and 3GPP2 related to SIP, and the IETF HIP (Host Identity Protocol) working group, which deals with lower-layer mobility and security. He is the Ericsson representative in the SIP Forum and is a regular speaker at different industry conferences. During his stay as a visitor researcher at Columbia University in New York, USA, he published a book entitled "SIP Demystified". Gonzalo received an M.Sc. degree in Electrical Engineering from Universidad Politecnica de Madrid, Spain, and another M.Sc. degree (also in Electrical Engineering) from th Royal Institute of Technology in Stockholm, Sweden. He is currently continuing his studies as a Ph.D. candidate at Helsinki University of Technology.

 Work proposals

  • Title: SEND: Secure Neighbour Discovery
  • Student: Juan Felipe Botero
  • Supervisor: Carlos J. Bernardos
  • Summary: IPv6 nodes use the Neighbor Discovery Protocol (NDP) to discover other nodes on the link, to determine their link-layer addresses to find routers, and to maintain reachability information about the paths to active neighbors. If not secured, NDP is vulnerable to various attacks. SEND is a secure mechanism for NDP that do not make use of IPsec. You should perform a threat analysis of the original NDP and describe and analyse how SEND provides additional security.
  • Basic bibliography (starting point):

  • Title: Analysis of the requirements for routing in mesh networks
  • Student: Paul Patras
  • Supervisor: Carlos J. Bernardos
  • Summary: Identify and analyse the different requirements posed by backbone wireless mesh networks, from the viewpoint of routing.

  • Title: ITU-T NGN Networks and the Internet
  • Student: Coslet Gheorghe
  • Supervisor: Alberto García-Martínez
  • Summary: In this assignment you are requested to study in depth the NGN (Next Generation Networks) proposal issued by ITU-T. ITU-T started at 2002 a project to develop a set of standards for the Next Generation Networks that will replace current voice (and other) infrastructure. For this assignment, we ask you to compare critically this approach to the Internet (IETF) one, in terms of requirements, focus, technology, etc. It is important that you could answers to questions such as "what is the equivalent function/solution in the Internet world?"
  • References:
    • Articles on IEEE Communications Magazine, Volume: 43 Issue: 10. Date: Oct. 2005
      • Realization of the next-generation network. Chae-Sub Lee; Knight, D. Page(s): 34- 41.
      • Introduction to the ITU-T NGN focus group release 1: target environment, services, and capabilities. Carugi, M.; Hirschman, B.; Narita, A. Page(s): 42- 48.
      • NGN architecture: generic principles, functional architecture, and implementation. Knightson, K.; Morita, N.; Towle, T. Page(s): 49- 56
    • Standards available from the Library
      • ITU-T Rec. Y.2001, "General Overview of NGN"
      • ITU-T Rec. Y.2011, "General Principles and General Reference Model for Next Generation Network"

  • Title: Better than Nothing Security proposal
  • Student: Jose Moreira Sánchez
  • Supervisor: Alberto García-Martínez
  • Summary: The btns working group charter promotes on-going work on providing anonymous (unauthenticated) keying for IPsec to create security associations (SAs) with peers who do not possess authentication credentials that can be validated. Examples of such credentials can be self-signed certificates or "bare" public keys. This mode would protect against passive attacks but would be vulnerable to active attacks. The working group is committed to specify extensions to the IPsec architecture, and possibly extensions or profiles of IKE, so that IPsec will support creation of unauthenticated SAs. We ask you to analyse from a critical point of view the approach developed in this IETF working group. Knowledge on IPsec/IKE is required.
  • References: The references for this assignment are available at the btns working group (http://www.ietf.org/html.charters/btns-charter.html"):
    • Problem and Applicability Statement for Better Than Nothing Security (BTNS)
    • Better-Than-Nothing-Security: An Unauthenticated Mode of IPsec
    • IPsec Channels: Connection Latching
    • IPsec Application Programming Interfaces
    • An interface between applications and keying systems

  • Title: Security models for BGP-like interdomain routing
  • Student: Vanessa Tejada Muñoz
  • Supervisor: Alberto García-Martínez
  • Summary: There are a number of possible security attacks that can be exercised against the current BGP interdomain routing system. Additionally, BGP is not even protected against simple type of misconfigurations. In this assignment we ask you to analyse the security requirements for BGP interdomain routing: Then, analyse two security solutions for BGP, S-BGP and SoBGP. Another interesting reference is Modeling Adoptability of Secure BGP Protocols (SIGCOMM conference 2006). Identify strengths and weaknesses of both solutions.

  • Title: New Interdomain routing protocols
  • Student: Rubén Hidalgo
  • Supervisor: Alberto García-Martínez
  • Summary: Your task for this assignment is to discuss some proposals issued to provide scalability to the interdomain routing system. You can select two of the following: Highlight the innovative aspects, and compare critically with state-of-the-art solutions.

  • Title: Inter-domain routing over GMPLS
  • Student: Ruben Gonzalvez
  • Supervisor: Alberto García-Martínez

  • Title: Advanced aspects of the Inter-domain routing
  • Student: Pedro Antonio Cruz
  • Supervisor: Alberto García-Martínez
  • References:
    • "In search for an appropriate granularity to model routing, policy", W. Muehlbauer (TU Berlin), S. Uhlig, B. Fu (TU Delft), M. Meulle (France Telecom R&D), O. Maennel (University of Adelaide), SIGCOMM 2007.
    • "Resolving Inter-Domain Policy Disputes", C. T. Ee (UCB), V. Ramachandran (Stevens I. of Tech.), B.-G. Chun (UCB), K. Lakshminarayanan (IIT Madras), S. Shenker (UCB/ICSI), SIGCOMM 2007.
    • "Reliability as an Interdomain Service", Hao Wang, Y Richard Yang, Paul H. Liu (Yale), Jia Wang, Alex Gerber (AT&T), Albert Greenberg (Microsoft), SIGCOMM 2007.
    • "Achieving Convergence-Free Routing using Failure-Carrying Packets", K. Lakshminarayanan, M. Caesar, M. Rangan (UCB), T. Anderson (Univ. of Washington), S. Shenker (UCB/ICSI), I. Stoica (UCB), SIGCOMM 2007.

  • Title: Study of mobility support aspects over 6LoWPAN wireless sensor networks and 6LoWPAN - IPv4 interoperability
  • Student: Jose Javier Garcia
  • Supervisor: Carlos J. Bernardos
  • Summary: Low-power WPAN technology is still in its early stage of development, but the range of conceivable usage scenarios is tremendous. The numerous possible applications of sensor networks make it obvious that mesh topologies will be prevalent in LoWPAN environments and mobility support will be a necessity. The IEEE 802.15.4 standard targets low power personal area networks, defining an open standard forshort range, low bit rate, low power and low cost wireless networks. If we could combine IEEE 802.15.4 standard with other standards like IP, this can provide some benefits. For example, the pervasive nature of IP networks allows the use of existing infrastructure and IP-based technologies that already exist, are well known and are proven to be working. "IPv6 over IEEE 802.15.4" version of the IPv6 protocol (defined by 6LowPAN) defines the basic functionalities required to carry IPv6 packets over IEEE 802.15.4 networks (including an adaptation layer, header compression, etc). The IEEE 802.15.4 standard support mesh network topologies, however mesh topologies imply multi-hop routing to a desired destination. Mesh networks are likely to consist of nodes with a certain degree of mobility. Due to the low performance characteristics of LoWPAN devices, mobility support should be provided without high signaling involvement in end devices (e.g., RFD). Fast mobility detection will be also a huge challenge due to nodes might even change their location while being in state of hibernation. As we mentioned before, the fact of supporting IP packets transmission over WPAN networks would report many benefits. Although the original version of the IPv6 standard was modified to support mobility, this can not be directly mapped or used on WPAN networks, so that these aspects are still an open research area. In consequence in this paper we propose the study in a first step of possible scenarios and suggested solutions on how to provide mobility support in 6LoWPAN networks. Despite the support of IPv6 packet transmission is quite important, and will be necessary in few years, the IPv6 standard is not widely deployed nowadays. So that, the second topic to be presented in our paper will be the study from a network layer point of view of mid term solutions where it would be possible the support of IPv4 standard, or even the interaction between IPv4, IPv6 and WPAN networks.
  • References:
    • Internet-Draft - Dynamic MANET On-demand for 6LoWPAN (DYMO-low) Routing
    • Internet-Draft - Mobility Support in 6LoWPAN
    • RFC 3775 - Mobility Support in IPv6
    • Kushalnagar N. and Montenegro G. 6LoWPAN: Overview, Assumptions, Problem Statement and Goals, IETF draft, 2006.
    • Montenegro G. and Kushalnagar N. Transmission of IPv6 Packets over IEEE 802.15.4 Networks, IETF draft, 2005.
    • Chang-Yeol Yum, YongSung Beun, Sunmoo Kang ,YoungRo Lee and JooSeok Song. Methods to use 6LoWPAN in IPv4 network. Feb. 12-14, 2007 ICACT2007
    • Hongwei Huo, Hongke Zhang, Yanchao Niu, Shuai Gao, Zhaohua Li and Sidong Zhang. MSRLab6: An IPv6 Wireless Sensor Networks Testbed ICSP2006 Proceedings

  • Title: Understanding PA addressing aggregation model and its applicability to the current internet topology
  • Supervisor: Marcelo Bagnulo
  • Summary: The requested task is to present the proof presented in Appendix A of Dmitri Krioukov, Kevin Fall and Xiaowei Yang, "Compact Routing on Internet-like Graphs".

  • Title: Definition of the SeND MIB
  • Supervisor: Marcelo Bagnulo
  • Summary: The requested task is to define the Managment Information Base (MIB) for the Secure Neighbour Discovery Protocol (SeND) as defined in RFC 3971.

  • Title: Understanding the impact of network mobility solutions on the global routing system
  • Student: Alicia Moreno
  • Supervisor: Marcelo Bagnulo
  • Summary: The task is to understand three different approaches to Network Mobility support and identify their impact on the global routing table. The proposed approaches are:
    • Conexion by Boeing as defined in A. Dul, "Global IP Network Mobility using Border Gateway Protocol (BGP)" (available upon request to marcelo@it.uc3m.es)
    • NEMO basic support as defined in RFC 3963
    • P. Thubert, R. Wakikawa, V. Devarapalli, "Global HA to HA protocol"

  • Title: Architected NAT approaches
  • Student: Rosa Delgado
  • Supervisor: Marcelo Bagnulo

  • Title: Comparative analysis of client-server vs p2p video streaming approaches
  • Student: Marc Jáimez
  • Supervisor: Carmen Guerrero
  • Summary/Objective: There are many research initiatives that try to develop a kind of "p2p youtube". Study some examples of p2p video streaming proposal and identify the key architectural design in comparation with a client-server approach. Some examples: Joost, Bittorrent DNA, Tribler, VidTorrent, Peercast, ....
  • Recommended Reading:
    • "I Tube, You Tube, Everybody Tubes: Analyzing he World's Largest User Generated Content Video System". Meeyoung Cha, Haewoon Kwak, Pablo Rodriguez, Yon-Yeol Ahn, Sue Moon. ACM SIGCOMM/USENIX IMC'07 San Diego, Oct 2007.
    • "Peer-Assisted VoD: Making Internet Video Distribution Cheap" Cheng Huang, Jin Li, Keith W. Ross. IPTPS 2007
    • Joost site: www.joost.com
    • Bittorrent DNA site: http://www.bittorrent.com/dna

  • Title: Structured vs Unstructured p2p applications
  • Student: Alberto José González Cela
  • Supervisor: Carmen Guerrero
  • Summary/Objective: Study why nowadays unstructured p2p applications are more popular that structure ones that are based on DHT. Study what application scenarios are more suitable for both approaches. Choose two relevant applications of unstructured and DHT-based solutions and describe and compare them. (for example: Bittorrent, Azureus, KAD....)
  • Recommended Reading:
    • "Profiling a Million User DHT", Jarret Falkner, Michael Piatek, John P. John, Arvind Krishnamurthy and Thomas Anderson. ACM SIGCOMM/USENIX IMC'07 San Diego, Oct 2007.
    • "A Global View of KAD", Moritz Steiner, Taoufik En-Najjary, Ernst W. Biersack. ACM SIGCOMM/USENIX IMC'07 San Diego, Oct 2007.
    • "The Delicate Tradeoff of BitTorrent-like File Sharing Protocol Design", B Fan, DM chiu and JCS Lui. IEEE ICNP 2006

  • Title: How ISP do traffic engineering of p2p applications
  • Student: Eliseo Catalán
  • Supervisor: Carmen Guerrero
  • Summary/Objective: Analyce how ISP are dealing with p2p traffic. How an ISP can manage p2p traffic in a profitable way.
  • Recommended Reading:
    • "Can ISPs and P2P Users Cooperate for Improved Performance?", Vinay Aggarwal, Anja Feldmann, and Christian Scheideler. ACM SIGCOMM CCR Volume 37, Issue 3 July 2007.
    • "Locality-Aware P2P Query Search with ISP Collaboration", Vinay Aggarwal, Anja Feldmann. Networks and Heterogeneous Media, 2007.
    • "HPTP: Relieving the Tension between ISPs and P2P", Guobin Shen, Ye Wang, Yongqiang Xiong, Ben Y. Zhao, Zhi-Li Zhang. IPTPS 2007
    • "Modeling the Peering and Routing Tussle between ISPs and P2P Applications", JH Wang, DM Chiu and JCS Lui. IEEE IWQoS, 2006 (Yale)
    • "Should internet service providers fear peer-assisted content distribution?", T Karagiannis, P Rodriguez, K Papagiannaki Internet Measurement Conference 2005.
    • (Yale)

  • Title: P2P video streaming
  • Student: Michel Reznik Milstein
  • Supervisor: Carmen Guerrero

  • Title: Description of more common unstructured p2p overlay network
  • Student: Javier Polo
  • Supervisor: Carmen Guerrero

 Student Evaluation

The final evaluation will be based on:

  • A written test on the topics covered during the course.
  • An individual written paper. This paper should follow IEEE format and should not exceed 8 pages long. Deadline: the written paper should be delivered at least 3 days before the day of its presentation.
  • An oral presentation and defence of the written paper. The duration of the presentation should not exceed 20 minutes. It is not mandatory, but recommended, to perform the presentation in English.
  • The student participation during the course and paper presentations.

 Additional resources
The Internet Engineering Task Force: IETF
Interesting transcription about research: You and Your Research, Richard Hamming, Transcription of the Bell Communications Research Colloquium Seminar 7 March 1986 (thanks to Marcelo and Ignacio for providing me with the link).
What is the Thesis? (thanks to Ignacio for providing me with the link).

Location | Personnel | Teaching | Research | News | Intranet
inicio | mapa del web | contacta