Searched for: author%3A%22Kuipers%2C+F.A.%22
(1 - 20 of 156)

Pages

document
Bhattacharjee, A.K. (author), Cecconello, S. (author), Kuipers, F.A. (author), Smaragdakis, G. (author)
To avoid exploitation of known vulnerabilities, it is standard security practice to not disclose any model information regarding the antennas used in cellular infrastructure. However, in this work, we show that end-user devices receive enough information to infer, with high accuracy, the model-family of antennas. We demonstrate how low-cost...
conference paper 2024
document
Fiebig, T. (author), Gürses, F.S. (author), Hernandez Ganan, C. (author), Kotkamp, E. (author), Kuipers, F.A. (author), Lindorfer, Martina (author), Prisse, M.M.G.C. (author), Sari, P.T. (author)
With the emergence of remote education and work in universi- ties due to COVID-19, the ‘zoomification’ of higher education, i.e., the migration of universities to the clouds, reached the public dis- course. Ongoing discussions reason about how this shift will take control over students’ data away from universities, and may ulti- mately harm the...
book chapter 2023
document
Zapletal, A. (author), Kuipers, F.A. (author)
The conventional definition of fairness in congestion control is flow rate fairness. However, Internet users typically care about flow completion times (FCTs) and flow rate fairness does not lead to equitable FCTs for different users. Therefore, we reconsider what it means for congestion control to be fair and posit a novel stance on fairness:...
conference paper 2023
document
Ji, C. (author), Kuipers, F.A. (author)
To cater to constantly changing network needs, enabling stateful reconfiguration of Network Functions (NFs) is crucial. Recently, there has been growing interest in offloading NFs to programmable network devices. Unfortunately, it is currently not possible to maintain the full state of NFs during a switch reconfiguration without consuming...
conference paper 2023
document
Hou, Biao (author), Yang, Song (author), Kuipers, F.A. (author), Jiao, Lei (author), Fu, Xiaoming (author)
Recent years have witnessed video streaming grad- ually evolve into one of the most popular Internet applications. With the rapidly growing personalized demand for real-time video streaming services, maximizing their Quality of Experience (QoE) is a long-standing challenge. The emergence of the server- less computing paradigm has potential to...
conference paper 2023
document
Kuipers, F.A. (author), Orda, Ariel (author)
contribution to periodical 2022
document
Oostenbrink, J. (author), Kuipers, F.A. (author)
In this paper, we study the risk of earthquakes to global Internet infrastructure, namely Internet eXchange Point (IXP) facilities. Leveraging the CAIDA IXPs dataset and publicly available earthquake models and hazard computation tools, we find that more than 50% of the facilities have at least a 2% probability of experiencing potentially...
conference paper 2022
document
Polachan, Kurian (author), Pal, Joydeep (author), Singh, Chandramani (author), Prabhakar, T. V. (author), Kuipers, F.A. (author)
Tactile Internet based Cyber-Physical Systems (TCPS) are highly sensitive to component and communication la- tencies and packet drops. Building a high performing TCPS, thus, necessitates experimenting with different hardware, algorithms, access technologies, and communication protocols. To facilitate such experiments, we have developed TCPSbed,...
journal article 2022
document
Vass, Balazs (author), Tapolcai, János (author), Heszberger, Zalan (author), Biro, Jozsef (author), Hay, David (author), Kuipers, F.A. (author), Oostenbrink, J. (author), Valentini, Alessandro (author), Ronyai, Lajos (author)
To evaluate the expected availability of a backbone network service, the administrator should consider all possible failure scenarios under the specific service availability model stipulated in the corresponding service-level agreement. Given the increase in natural disasters and malicious attacks with geographically extensive impact,...
journal article 2021
document
Liu, Qingzhi (author), Cheng, Long (author), Alves, R.C.A. (author), Alves, Renan (author), Ozcelebi, Tanir (author), Kuipers, F.A. (author), Xu, Guixian (author), Lukkien, Johan (author), Chen, Shanzhi (author)
Software-defined networking (SDN) is a cornerstone of next-generation networks and has already led to numerous advantages for data-center networks and wide-area networks. However, SDN is not widely adopted in constrained networks, such as Wireless Sensor Networks (WSN), due to excessive control overhead, lossy medium, and in-band control...
journal article 2021
document
Turkovic, B. (author), Nijhuis, S.H. (author), Kuipers, F.A. (author)
The concept of network slicing enables operators to provision multiple virtual networks on top of a single (shared) physical infrastructure. Adding elasticity to slicing, i.e., the ability to on-demand provision/release dedicated network resources, improves resource utilization. However, efficiently allocating and scaling slice resources,...
conference paper 2021
document
Turkovic, B. (author), Biswal, S. (author), Vijay, A. (author), Hüfner, A.E. (author), Kuipers, F.A. (author)
Networks often need to concurrently process mil- lions of flows with varying Quality-of-Service (QoS) require- ments. Doing so by deploying flow-specific rules at network nodes would require significant memory and overhead.<br/>In this paper, we take a fundamentally different approach, called P4QoS, by embedding QoS requirements in the packets...
conference paper 2021
document
Oostenbrink, J. (author), Kuipers, F.A. (author)
Network outages have significant economic and societal costs. While network operators have become adept at managing smaller failures, this is not the case for larger, regional failures such as natural disasters. Although it is not possible, and certainly not economic, to prevent all potential disaster damage and impact, we can reduce their...
conference paper 2021
document
He, Nan (author), Yang, S. (author), Li, Fan (author), Trajanovski, S. (author), Kuipers, F.A. (author), Fu, Xiaoming (author)
The efficacy of Network Function Virtualization (NFV) depends critically on (1) where the virtual network functions (VNFs) are placed and (2) how the traffic is routed. Unfortunately, these aspects are not easily optimized, especially under time-varying network states with different quality of service (QoS) requirements. Given the importance of...
conference paper 2021
document
Vass, Balazs (author), Tapolcai, János (author), Hay, David (author), Oostenbrink, J. (author), Kuipers, F.A. (author)
Several works shed light on the vulnerability of networks against regional failures, which are failures of multiple pieces of equipment in a geographical region as a result of a natural or human-made disaster. This chapter overviews how this in- formation can be added to existing network protocols through defining Shared Risk Link Groups (SRLGs)...
book chapter 2020
document
Kozlowski, W. (author), Kuipers, F.A. (author), Wehner, S.D.C. (author)
The quantum technology revolution brings with it the promise of a quantum internet. A new --- quantum --- network stack will be needed to account for the fundamentally new properties of quantum entanglement. The first realisations of quantum networks are imminent and research interest in quantum network protocols has started growing. In the non...
conference paper 2020
document
Polachan, Kurian (author), Turkovic, B. (author), Prabhakar, T. V. (author), Singh, Chandramani (author), Kuipers, F.A. (author)
“Tactile internet” refers to a network that can support real-time interactions between human operators and remote cyber-physical systems as if they were near to each other. For this, the network should support ultra-low latency communication, often referred to as the 1ms challenge. However, we observe that network requirements, such as latency...
conference paper 2020
document
Oostenbrink, J. (author), Kuipers, F.A. (author)
By targeting communication and power networks, malicious actors can significantly disrupt our society. As networks are more vulnerable after a natural disaster, this moment of weakness may be exploited to disrupt the network even further. However, the potential impact and mitigation of such a follow-up attack has yet to be studied.<br/><br/>In...
journal article 2020
document
Turkovic, B. (author), Oostenbrink, J. (author), Kuipers, F.A. (author), Keslassy, Isaac (author), Orda, Ariel (author)
F1ows that have exceeded a given percentage of the last sliding window of N packets, denoted as heavy-hitter flows, require special handling, since they may disrupt the service of other flows or may be indicative of malicious traffic. However, even when equipped with a programmable switch, it is unclear how to detect heavy hitters on a per...
conference paper 2020
document
Shiferaw, Yonatan (author), Arora, Apoorva (author), Kuipers, F.A. (author)
LoRaWAN has emerged as a popular IoT commu- nications technology. It comes with three classes of operation: A, B, and C. Although many IoT use-cases, like Firmware-over- the-Air updates, require multicast, Class A cannot be used for that purpose. Class C can, but consumes a lot of energy. This leaves Class B. In this paper, we investigate Class...
conference paper 2020
Searched for: author%3A%22Kuipers%2C+F.A.%22
(1 - 20 of 156)

Pages