Searched for: author%3A%22Kuipers%2C+F.A.%22
(1 - 20 of 146)

Pages

document
Polachan, Kurian (author), Pal, Joydeep (author), Singh, Chandramani (author), Prabhakar, T. V. (author), Kuipers, F.A. (author)
Tactile Internet based Cyber-Physical Systems (TCPS) are highly sensitive to component and communication la- tencies and packet drops. Building a high performing TCPS, thus, necessitates experimenting with different hardware, algorithms, access technologies, and communication protocols. To facilitate such experiments, we have developed TCPSbed,...
journal article 2022
document
Vass, Balazs (author), Tapolcai, János (author), Heszberger, Zalan (author), Biro, Jozsef (author), Hay, David (author), Kuipers, F.A. (author), Oostenbrink, J. (author), Valentini, Alessandro (author), Ronyai, Lajos (author)
To evaluate the expected availability of a backbone network service, the administrator should consider all possible failure scenarios under the specific service availability model stipulated in the corresponding service-level agreement. Given the increase in natural disasters and malicious attacks with geographically extensive impact,...
journal article 2021
document
Oostenbrink, J. (author), Kuipers, F.A. (author)
Network outages have significant economic and societal costs. While network operators have become adept at managing smaller failures, this is not the case for larger, regional failures such as natural disasters. Although it is not possible, and certainly not economic, to prevent all potential disaster damage and impact, we can reduce their...
conference paper 2021
document
Liu, Qingzhi (author), Cheng, Long (author), Alves, R.C.A. (author), Alves, Renan (author), Ozcelebi, Tanir (author), Kuipers, F.A. (author), Xu, Guixian (author), Lukkien, Johan (author), Chen, Shanzhi (author)
Software-defined networking (SDN) is a cornerstone of next-generation networks and has already led to numerous advantages for data-center networks and wide-area networks. However, SDN is not widely adopted in constrained networks, such as Wireless Sensor Networks (WSN), due to excessive control overhead, lossy medium, and in-band control...
journal article 2021
document
Turkovic, B. (author), Biswal, S. (author), Vijay, A. (author), Hüfner, A.E. (author), Kuipers, F.A. (author)
Networks often need to concurrently process mil- lions of flows with varying Quality-of-Service (QoS) require- ments. Doing so by deploying flow-specific rules at network nodes would require significant memory and overhead.<br/>In this paper, we take a fundamentally different approach, called P4QoS, by embedding QoS requirements in the packets...
conference paper 2021
document
Turkovic, B. (author), Nijhuis, S.H. (author), Kuipers, F.A. (author)
The concept of network slicing enables operators to provision multiple virtual networks on top of a single (shared) physical infrastructure. Adding elasticity to slicing, i.e., the ability to on-demand provision/release dedicated network resources, improves resource utilization. However, efficiently allocating and scaling slice resources,...
conference paper 2021
document
He, Nan (author), Yang, S. (author), Li, Fan (author), Trajanovski, S. (author), Kuipers, F.A. (author), Fu, Xiaoming (author)
The efficacy of Network Function Virtualization (NFV) depends critically on (1) where the virtual network functions (VNFs) are placed and (2) how the traffic is routed. Unfortunately, these aspects are not easily optimized, especially under time-varying network states with different quality of service (QoS) requirements. Given the importance of...
conference paper 2021
document
Shiferaw, Yonatan (author), Arora, Apoorva (author), Kuipers, F.A. (author)
LoRaWAN has emerged as a popular IoT commu- nications technology. It comes with three classes of operation: A, B, and C. Although many IoT use-cases, like Firmware-over- the-Air updates, require multicast, Class A cannot be used for that purpose. Class C can, but consumes a lot of energy. This leaves Class B. In this paper, we investigate Class...
conference paper 2020
document
Vass, Balazs (author), Tapolcai, János (author), Hay, David (author), Oostenbrink, J. (author), Kuipers, F.A. (author)
Several works shed light on the vulnerability of networks against regional failures, which are failures of multiple pieces of equipment in a geographical region as a result of a natural or human-made disaster. This chapter overviews how this in- formation can be added to existing network protocols through defining Shared Risk Link Groups (SRLGs)...
book chapter 2020
document
Turkovic, B. (author), Oostenbrink, J. (author), Kuipers, F.A. (author), Keslassy, Isaac (author), Orda, Ariel (author)
F1ows that have exceeded a given percentage of the last sliding window of N packets, denoted as heavy-hitter flows, require special handling, since they may disrupt the service of other flows or may be indicative of malicious traffic. However, even when equipped with a programmable switch, it is unclear how to detect heavy hitters on a per...
conference paper 2020
document
Kozlowski, W. (author), Kuipers, F.A. (author), Wehner, S.D.C. (author)
The quantum technology revolution brings with it the promise of a quantum internet. A new --- quantum --- network stack will be needed to account for the fundamentally new properties of quantum entanglement. The first realisations of quantum networks are imminent and research interest in quantum network protocols has started growing. In the non...
conference paper 2020
document
Turkovic, B. (author), Kuipers, F.A. (author)
Congestion control algorithms are usually developed in isolation without thoroughly investigating their co-existence and interactions with other protocols and/or congestion control algorithms. As a result, flows using different algorithms and/or having different Round-Trip Times may overpower each other, resulting in unfair resource distribution...
conference paper 2020
document
Oostenbrink, J. (author), Kuipers, F.A. (author)
By targeting communication and power networks, malicious actors can significantly disrupt our society. As networks are more vulnerable after a natural disaster, this moment of weakness may be exploited to disrupt the network even further. However, the potential impact and mitigation of such a follow-up attack has yet to be studied.<br/><br/>In...
journal article 2020
document
Polachan, Kurian (author), Turkovic, B. (author), Prabhakar, T. V. (author), Singh, Chandramani (author), Kuipers, F.A. (author)
“Tactile internet” refers to a network that can support real-time interactions between human operators and remote cyber-physical systems as if they were near to each other. For this, the network should support ultra-low latency communication, often referred to as the 1ms challenge. However, we observe that network requirements, such as latency...
conference paper 2020
document
Alves, R.C.A. (author), Borges Margi, Cintia (author), Kuipers, F.A. (author)
Low-power wireless networks are an integral part of the Internet of Things, composed of resource-constrained devices harvesting ambient information.<br/>The appearance of unidirectional links is characteristic of low power wireless networking due to physical effects, device heterogeneity and manufacturing imperfections.<br/>Despite the...
journal article 2020
document
Hesselman, Cristian (author), Grosso, Paola (author), Holz, Ralph (author), Kuipers, F.A. (author), Hui Xue, Janet (author), Jonker, Mattijs (author), de Ruiter, Joeri (author), Sperotto, Anna (author), van Rijswijk‑Deij, Roland (author), Moreira Moura, G.C. (author), Pras, Aiko (author), de Laat, Cees (author)
Policy makers in regions such as Europe are increasingly concerned about the trustworthiness and sovereignty of the foundations of their digital economy, because it often depends on systems operated or manufactured elsewhere. To help curb this problem, we propose the novel notion of a responsible Internet, which provides higher degrees of...
journal article 2020
document
Polachan, K.P. (author), Prabhakar, T. V. (author), Singh, Chandramani (author), Kuipers, F.A. (author)
In this paper, we consider Tactile Cyber Physical Systems (TCPS), which differ from typical CPS in that haptic sensory feedback is included. In particular, we design and implement a TCPS testbed, called TCPSbed, using well-defined components and interfaces glued together using APIs. In addition to real connections, our testbed supports the...
conference paper 2019
document
Çetinay Iyicil, H. (author), Koc, Y. (author), Kuipers, F.A. (author), Van Mieghem, P.F.A. (author)
Direct connections between nodes usually result in efficient transmission in networks. Such electric power transmission is governed by physical laws, and an assessment purely based on direct connections between nodes and shortest paths may not capture the operation of power grids. Motivated by these facts, in this chapter, we investigate the...
book chapter 2019
document
Valentini, Alessandro (author), Vass, Balazs (author), Oostenbrink, J. (author), Csak, Levente (author), Kuipers, F.A. (author), Pace, Bruno (author), Hay, David (author), Tapolcai, Janos (author)
Guaranteeing a high availability of network services is a crucial part of network management. In this study, we show how to compute the availability of network services under earthquakes, by using empirical data. We take a multi-disciplinary approach and create an earthquake model based on seismological research and historical data. We then show...
conference paper 2019
document
Oostenbrink, J. (author), Kuipers, F.A. (author), Helvik, Bjarne E. (author), Heegaard, Poul E. (author)
It is of vital importance to maintain at least some network functionality after a disaster, for example by temporarily replacing damaged nodes by emergency nodes. We propose a framework to evaluate dierent node replacement strategies, based on a large set of representative disasters. We prove that computing the optimal choice of nodes to...
journal article 2019
Searched for: author%3A%22Kuipers%2C+F.A.%22
(1 - 20 of 146)

Pages