June 05, 2015

Forwarding Tables Verification through Representative Headers

  • Laurent Viennnot
  • Leonardo Linguaglossa
  • Mathieu F.
  • Perino D.
  • Yacine Boufkhad

Forwarding table verification consists in checking the correctness of the forwarding tables of the routers of a given network. For example, one may want to verify the absence of loops or black-holes. In this paper, we propose a two-step approach to address tables verification: computing a representative set of packet headers; testing the desired properties only for these headers. The tricky part is to guaranty that this set of headers represents all possible headers in the sense that any header will behave exactly as one of the headers in the set. In a general model of forwarding rules inspired from Software Defined Networking (SDN), we show that a natural condition on the table rules inspired from the work of Boutier and Chroboczek about source-sensitive routing allows to compute a representative set whose size is linear in the number of rules in the tables. This has to be compared to the overall number of possible headers which is exponential in the number of bits in the headers.

Recent Publications

August 09, 2017

A Cloud Native Approach to 5G Network Slicing

  • Francini A.
  • Miller R.
  • Sharma S.

5G networks will have to support a set of very diverse and often extreme requirements. Network slicing offers an effective way to unlock the full potential of 5G networks and meet those requirements on a shared network infrastructure. This paper presents a cloud native approach to network slicing. The cloud ...

August 01, 2017

Modeling and simulation of RSOA with a dual-electrode configuration

  • De Valicourt G.
  • Liu Z.
  • Violas M.
  • Wang H.
  • Wu Q.

Based on the physical model of a bulk reflective semiconductor optical amplifier (RSOA) used as a modulator in radio over fiber (RoF) links, the distributions of carrier density, signal photon density, and amplified spontaneous emission photon density are demonstrated. One of limits in the use of RSOA is the lower ...

July 12, 2017

PrivApprox: Privacy-Preserving Stream Analytics

  • Chen R.
  • Christof Fetzer
  • Le D.
  • Martin Beck
  • Pramod Bhatotia
  • Thorsten Strufe

How to preserve users' privacy while supporting high-utility analytics for low-latency stream processing? To answer this question: we describe the design, implementation and evaluation of PRIVAPPROX, a data analytics system for privacy-preserving stream processing. PRIVAPPROX provides three properties: (i) Privacy: zero-knowledge privacy (ezk) guarantees for users, a privacy bound tighter ...