-
QUIC Throughput and Fairness over Dual Connectivity
Authors:
David Hasselquist,
Christoffer Lindström,
Nikita Korzhitskii,
Niklas Carlsson,
Andrei Gurtov
Abstract:
Dual Connectivity (DC) is an important lower-layer feature accelerating the transition from 4G to 5G that also is expected to play an important role in standalone 5G radio networks. However, even though the packet reordering introduced by DC can significantly impact the performance of upper-layer protocols, no prior work has studied the impact of DC on QUIC. In this paper, we present the first suc…
▽ More
Dual Connectivity (DC) is an important lower-layer feature accelerating the transition from 4G to 5G that also is expected to play an important role in standalone 5G radio networks. However, even though the packet reordering introduced by DC can significantly impact the performance of upper-layer protocols, no prior work has studied the impact of DC on QUIC. In this paper, we present the first such performance study. Using a series of throughput and fairness experiments, we show how QUIC is affected by different DC parameters, network conditions, and whether the DC implementation aims to improve throughput or reliability. Results for two QUIC implementations (aioquic, ngtcp2) and two congestion control algorithms (NewReno, CUBIC) are presented under both static and highly time-varying network conditions. Our findings provide network operators with insights and understanding into the impacts of splitting QUIC traffic in a DC environment. With reasonably selected DC parameters and increased UDP receive buffers, QUIC over DC performs similarly to TCP over DC and achieves optimal fairness under symmetric link conditions when DC is not used for packet duplication. The insights can help network operators provide modern users with better end-to-end service when deploying DC.
△ Less
Submitted 20 December, 2022; v1 submitted 28 December, 2021;
originally announced December 2021.
-
6G White paper: Research challenges for Trust, Security and Privacy
Authors:
Mika Ylianttila,
Raimo Kantola,
Andrei Gurtov,
Lozenzo Mucchi,
Ian Oppermann,
Zheng Yan,
Tri Hong Nguyen,
Fei Liu,
Tharaka Hewa,
Madhusanka Liyanage,
Ahmad Ijaz,
Juha Partala,
Robert Abbas,
Artur Hecker,
Sara Jayousi,
Alessio Martinelli,
Stefano Caputo,
Jonathan Bechtold,
Ivan Morales,
Andrei Stoica,
Giuseppe Abreu,
Shahriar Shahabuddin,
Erdal Panayirci,
Harald Haas,
Tanesh Kumar
, et al. (2 additional authors not shown)
Abstract:
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas. Trust: Under the current "open internet" regulation, the…
▽ More
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas. Trust: Under the current "open internet" regulation, the telco cloud can be used for trust services only equally for all users. 6G network must support embedded trust for increased level of information security in 6G. Trust modeling, trust policies and trust mechanisms need to be defined. 6G interlinks physical and digital worlds making safety dependent on information security. Therefore, we need trustworthy 6G. Security: In 6G era, the dependence of the economy and societies on IT and the networks will deepen. The role of IT and the networks in national security keeps rising - a continuation of what we see in 5G. The development towards cloud and edge native infrastructures is expected to continue in 6G networks, and we need holistic 6G network security architecture planning. Security automation opens new questions: machine learning can be used to make safer systems, but also more dangerous attacks. Physical layer security techniques can also represent efficient solutions for securing less investigated network segments as first line of defense. Privacy: There is currently no way to unambiguously determine when linked, deidentified datasets cross the threshold to become personally identifiable. Courts in different parts of the world are making decisions about whether privacy is being infringed, while companies are seeking new ways to exploit private data to create new business revenues. As solution alternatives, we may consider blockchain, distributed ledger technologies and differential privacy approaches.
△ Less
Submitted 30 April, 2020; v1 submitted 24 April, 2020;
originally announced April 2020.
-
Enabling End-to-End Secure Connectivity for Low-Power IoT Devices with UAVs
Authors:
Archana Rajakaruna,
Ahsan Manzoor,
Pawani Porambage,
Madhusanka Liyanage,
Mika Ylianttila,
Andrei Gurtov
Abstract:
The proliferation of the Internet of Things (IoT) technologies have strengthen the self-monitoring and autonomous characteristics of the sensor networks deployed in numerous application areas. The recent developments of the edge computing paradigms have also enabled on-site processing and managing capabilities of sensor networks. In this paper, we introduce a system model that enables end-to-end s…
▽ More
The proliferation of the Internet of Things (IoT) technologies have strengthen the self-monitoring and autonomous characteristics of the sensor networks deployed in numerous application areas. The recent developments of the edge computing paradigms have also enabled on-site processing and managing capabilities of sensor networks. In this paper, we introduce a system model that enables end-to-end secure connectivity between low-power IoT devices and UAVs, that helps to manage data processing tasks of a heterogeneous wireless sensor networks. The performance of proposed solution is analyzed by using simulation results. Moreover, in order to demonstrate the practical usability of the proposed solution, the prototype implementation is presented using commercial off-the-shelf devices.
△ Less
Submitted 14 March, 2019; v1 submitted 10 November, 2018;
originally announced November 2018.
-
CIDOR: Content Distribution and Retrieval in Disaster Networks for Public Protection
Authors:
Hasan M A Islam,
Dmitrij Lagutin,
Andrey Lukyanenko,
Andrei Gurtov,
Antti Ylä-Jääski
Abstract:
Information-Centric Networking (ICN) introduces a paradigm shift from a host centric communication model for Future Internet architectures. It supports the retrieval of a particular content regardless of the physical location of the content. Emergency network in a disaster scenario or disruptive network presents a significant challenge to the ICN deployment. In this paper, we present a Content dIs…
▽ More
Information-Centric Networking (ICN) introduces a paradigm shift from a host centric communication model for Future Internet architectures. It supports the retrieval of a particular content regardless of the physical location of the content. Emergency network in a disaster scenario or disruptive network presents a significant challenge to the ICN deployment. In this paper, we present a Content dIstribution and retrieval framework in disaster netwOrks for public pRotection (CIDOR) which exploits the design principle of the native CCN architecture in the native Delay Tolerant Networking (DTN) architecture. We prove the feasibility and investigate the performance of our proposed solution using extensive simulation with different classes of the DTN routing strategies in different mobility scenarios. The simulation result shows that CIDOR can reduce the content retrieval time up to 50% while the response ratio is close to 100%.
△ Less
Submitted 1 March, 2018;
originally announced March 2018.
-
Exploring the Limits of Static Failover Routing
Authors:
Marco Chiesa,
Andrei Gurtov,
Aleksander Mądry,
Slobodan Mitrović,
Ilya Nikolaevkiy,
Aurojit Panda,
Michael Schapira,
Scott Shenker
Abstract:
We present and study the Static-Routing-Resiliency problem, motivated by routing on the Internet: Given a graph $G$, a unique destination vertex $d$, and an integer constant $c>0$, does there exist a static and destination-based routing scheme such that the correct delivery of packets from any source $s$ to the destination $d$ is guaranteed so long as (1) no more than $c$ edges fail and (2) there…
▽ More
We present and study the Static-Routing-Resiliency problem, motivated by routing on the Internet: Given a graph $G$, a unique destination vertex $d$, and an integer constant $c>0$, does there exist a static and destination-based routing scheme such that the correct delivery of packets from any source $s$ to the destination $d$ is guaranteed so long as (1) no more than $c$ edges fail and (2) there exists a physical path from $s$ to $d$? We embark upon a systematic exploration of this fundamental question in a variety of models (deterministic routing, randomized routing, with packet-duplication, with packet-header-rewriting) and present both positive and negative results that relate the edge-connectivity of a graph, i.e., the minimum number of edges whose deletion partitions $G$, to its resiliency.
△ Less
Submitted 27 July, 2016; v1 submitted 29 August, 2014;
originally announced September 2014.
-
How Penalty Leads to Improvement: a Measurement Study of Wireless Backoff
Authors:
Dmitriy Kuptsov,
Boris Nechaev,
Andrey Lukyanenko,
Andrei Gurtov
Abstract:
Despite much theoretical work, different modifications of backoff protocols in 802.11 networks lack empirical evidence demonstrating their real-life performance. To fill the gap we have set out to experiment with performance of exponential backoff by varying its backoff factor. Despite the satisfactory results for throughput, we have witnessed poor fairness manifesting in severe capture effect. Th…
▽ More
Despite much theoretical work, different modifications of backoff protocols in 802.11 networks lack empirical evidence demonstrating their real-life performance. To fill the gap we have set out to experiment with performance of exponential backoff by varying its backoff factor. Despite the satisfactory results for throughput, we have witnessed poor fairness manifesting in severe capture effect. The design of standard backoff protocol allows already successful nodes to remain successful, giving little chance to those nodes that failed to capture the channel in the beginning. With this at hand, we ask a conceptual question: Can one improve the performance of wireless backoff by introducing a mechanism of self-penalty, when overly successful nodes are penalized with big contention windows? Our real-life measurements using commodity hardware demonstrate that in many settings such mechanism not only allows to achieve better throughput, but also assures nearly perfect fairness. We further corroborate these results with simulations and an analytical model. Finally, we present a backoff factor selection protocol which can be implemented in access points to enable deployment of the penalty backoff protocol to consumer devices.
△ Less
Submitted 12 December, 2013; v1 submitted 30 August, 2012;
originally announced August 2012.