Marcus BrunnerSwisscom · Strategy and Innovation
Marcus Brunner
PhD
About
132
Publications
19,298
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,480
Citations
Introduction
Additional affiliations
February 2000 - May 2012
Publications
Publications (132)
Computer networks fundamentally changed the way we communicate and interact with each other. In fact, they now form the backbone of our modern societies. While early networks were merely a mechanism for exchanging data between end-hosts, current computer and telecommunication networks are way more than that. Compared to the early days of the networ...
For allowing an efficient consumption of resources of a physical substrate network a method for operating at least one virtual network on a substrate network is claimed, especially within a framework of a self-organizing model for optimizing resource consumption of the substrate network, wherein the virtual networks are including a plurality of vir...
The IEEE/IFIP Network Operations and Management Symposium (NOMS 2008), the premier
conference in the field of network and services management, was held 7-11 April 2008 in the exciting
and lively city of Salvador da Bahia, Brazil. This was the 20th anniversary of this highly successful
and well-known international conference, and we believe that NOM...
Most of the current platforms for cloud infrastructure management are designed to deal mainly with computing and storage resources. However, when deploying highly distributed applications with strict network requirements, such as low delay or bandwidth guarantees, the support for specification and configuration of such requirements still lacks. Mor...
Welcome to Paris and the 1st IEEE International Conference on Cloud Networking (IEEE CloudNet 2012)!
Software Defined Networking (SDN in short) is reshaping the future of computer networks. By decoupling control and data planes, SDN technologies allow a more flexible management of network infrastructures, whose resources may be operated by means of a well defined programming interface. Several approaches have been recently proposed to implement th...
Ubiquitous network access allows people to access an ever increasing range of services from a variety of mobile termi-nals, including laptops, tablets and smartphones. A flexible and economically efficient way of provisioning such services is through Cloud Computing. Assuming that several cloud-enabled datacenters are made available at the edges of...
Energy efficiency is a significant requirement for the design and management of mobile networks and has recently gained substantial
attention from both network operators and the research community. The general concept of energy saving management aims to
match the capacity offered by operators to the actual demand at given times and geographic areas...
Current cloud management platforms have been designed to deal mainly with computing and storage resources. Networking, on the other hand, is often focused only on ensuring basic connectivity between virtual machines. That means, advanced requirements, such as delay and bandwidth guarantees or handing of network control to the customer, are not supp...
Capacity sharing - the fair usage of the available capacity amongst a set of users - is relying solely on the end user/end hosts in today's Internet. This in principle allows malicious end users to consume disproportional amounts of capacity without obvious ways of stopping or charging them. Re-ECN is a resource sharing framework that enables such...
Technical Activities is the foundation for many of the Communication Society (ComSoc)??s products and services, while also providing ??community?? and ??networking?? opportunities for its participants. In particular, it is important for ComSoc to explore new technical areas through the activities of technical committees, emerging technical subcommi...
This paper proposes relay specific self-organized functions to optimize the Donor eNB (DeNB) selection upon alternating load and mobility conditions or when specific donors are out of operation due to failure. Initially, we identify the main parameters that influence such donor selection process introducing the inter-DeNB handover and the re-config...
Congestion-based policing is a promising network resource control paradigm, for accounting user traffic based on resource congestion rather than resource usage. Congestion Exposure (Conex) is such an approach, where a user is expected to declare its congestion contributions back to the network. Since congestion is changing with offered load, the en...
In-network management (INM) is a paradigm for distributed and embedded management for future networks. One of its main design goals is to be used in conjunction with Network-as-a-Service (NaaS)-enabled networks, which need to be managed efficiently, in a way that requires only little manual interaction, and across administrative network domains. In...
The looming depletion of the public IPv4 address space has recently inspired a number of proposals intended to work around the inevitable address shortage. Broadly, all of these can be classified as address sharing, tunneling and translation mechanisms. While IPv6 is the proper solution to the problem as it simply makes more addresses available, th...
Energy saving management aims to match the capacity offered by operators to the actual traffic demand at off-peak times when the network load under-utilizes the maximum capacity dimension. Such a process is relatively complex in cellular infrastructures since mobility and user activity patterns may create load fluctuations. This paper introduces en...
Currently we have an Internet, which has been described as "no longer fit for purpose" and "obtuse". One new area of requirements and challenges where that shows up, is the smart functionality needed to meet changing, additional or increasing demands on Internet infrastructure. The Internet infrastructure capability limits will be stressed further...
Base stations (BSs) are the main energy expenditure elements of cellular networks, considering the high coverage requirements and the fact that the total provisioned capacity is intended to match peak hour traffic demand. In this paper, we introduce energy saving algorithms based on coordination between network elements. We introduce the notion of...
Mechanisms for the management and control (M&C) of largescale ICT systems, both established and innovative ones, generally
follow a distinct approach on the dimensions from centralized to distributed and flat to hierarchical architectures. In this
paper, we examine representative M&C frameworks and technologies and show that such a restrictive arch...
Method for searching services, resources and/or functionalities in a network wherein the network comprises a multitude of nodes to which routable network addresses are assigned, and wherein the services, resources and/or functionalities which are to be searched, are specified by a source node (Q) that is characterized in that a corresponding direct...
The Internet Protocol (IP) has been proven very flexible, being able to accommodate all kinds of link technologies and supporting a broad range of applications. The basic principles of the original Internet architecture include end-to-end addressing, global routeability and a single namespace of IP addresses that unintentionally serves both as loca...
In this paper, we describe several approaches to address the challenges
of the network of the future. Our main hypothesis is that the Future
Internet must be designed for the environment of applications and
transport media of the 21st century, vastly different from the initial
Internet's life space. One major requirement is the inherent support for...
Next Generation Networks (NGNs) transport a variety of services across a converged IP-based network infrastructure. To assure the Quality of Experience (QoE) for the users, an end-to-end Quality of Service (QoS) management is required. While solutions for QoS management and admission control in access and core networks exist, the inclusion of the h...
Network virtualization is an emerging trend claimed to reduce the costs of future networks. The key strategy in network virtualization is of slicing physical resources (links, routers, servers, etc.) to create virtual networks composed of subsets of these slices. One important challenge on network virtualization is the resource management of the ph...
Future Internet (FI) research and development threads have recently been gaining momentum all over the world and as such the international race to create a new generation Internet is in full swing: GENI, Asia Future Internet, Future Internet Forum Korea, European Union Future Internet Assembly (FIA). This is a position paper identifying the researc...
In the progressive development of IPTV technology, special attention is being paid at the assurance of an appropriate service quality to the end user. Several research and standardization activities are studying how to provide QoS for IPTV streams along the delivery path from the Head End office/video server to the end user. The customer's premise...
Network management has been traditionally considered in the last stages of the design and development cycles of network technology. The typical modus operandi relies mostly on networkers that manually configure active elements, troubleshoot problems as they arise and reconfigure equipment accordingly. In fact, we note that several initiatives in th...
The usage of testbeds is considered a key tool for exploring the development of new protocols and network architectures in the area of network research. Testbeds, together with simulations, are the basic tool set of network researchers to drive research, but often it is impossible to get feedback from real deployments and their respective data traf...
This work proposes a probabilistic management paradigm for solving some major challenges of decentralized network management. Specifically, we show how to cope with 1) the overhead of redundant information gathering and processing, 2) the decentralized management in dynamic and unpredictable environments, and 3) the considerable effort required for...
Event handling is a management mechanism that provides means for the network to react on changes in the network conditions or performance. In the construction of a clean-slate management architecture, we consider this as a main building block. This paper proposes a fully distributed event distribution in a fully distributed environment: differently...
We present ways for user-assisted coverage configuration and interference optimization. The femtocell coverage is measured in a user-assisted site survey, followed by an automatized evaluation and femtocell configuration adjustment. To achieve this, the user only needs his mobile phone for interaction. Existing, commercial technology only offers me...
Network visualization is an emerging technology for cost-effective sharing of network resources. The key strategy in network virtualization is of slicing physical resources (links, CPU, memory, and storage) to create virtual networks that are assigned to different operators. One important challenge on network virtualization is the efficient use of...
Nowadays IPTV offers a very wide range of multime- dia content. On one side the increasing number of channels improves the chances of each viewer finding relevant content; on the other side it poses serious challenges in the navigation through the program grid. Typically, once a program has been selected, the only way to know what is being broadcas...
Recent endeavors in addressing the challenges of the current and future Internet pursue a clean slate design methodology. Simultaneously, it is argued that the Internet is unlikely to be changed in one fell swoop and that its next generation requires an evolutionary design approach. Recognizing both positions, we claim that cleanness and evolution...
In-network management (INM) is a new paradigm for the management of the future Internet that is based on the principles of decentralization and self-organization. Its goal is to overcome the limitations of traditional network management and to achieve scalable and robust management systems with low complexity for large-scale, dynamic network enviro...
With the deployment of IPTV reliability for multicast is becoming an important research topic again. Even though it has been intensively investigated before, there is now an understanding of the deployment scenario and the application requirements that allows solutions to be evaluated in detail. We describe how to design a fast retransmission cache...
The upcoming peer-to-peer (P2P) and other decentralized, co-operative storage mechanisms allow for decentralized storage of data as well as decentralized search, depending on the specific system. In this work, we assume these kinds of systems to store management information into it. We discuss some of the opportunities, requirements, and challenges...
The IEEE/IFIP Network Operations and Management Symposium (NOMS 2008), the premier conference in the field of network and services management, was held 7-11 April 2008 in the exciting and lively city of Salvador da Bahia, Brazil. This was the 20th anniversary of this highly successful and well-known international conference, and we believe that NOM...
Monitoring is essential in modern network management. However, current monitoring systems are unable to recover their internal
faulty entities forcing the network administrator to manually fix the occasionally broken monitoring solution. In this paper
we address this issue by introducing a self-healing monitoring solution. This solution is describe...
There is a large conceptual gap between end-to-end infrastructure requirements and detailed component configuration implementing those requirements. Today, this gap is manually bridged so large numbers of configuration errors are made. Their adverse ...
There is a large conceptual gap between end-to-end infrastructure requirements and detailed component configuration implementing those requirements. Today, this gap is manually bridged so large numbers of configuration errors are made. Their adverse ...
Copyright and Reprint Permission
Abstracting is permitted with credit to the source. For copying, reprint, or reproduction permission, write to IEEE Copyrights Manager, IEEE Operations Center, 445 Hoes Lane, P.O. Box 1331, Piscataway, NJ 08855- 1331. Copyright © 2008 by The Institute of Electrical and Electronics Engineers, Inc.
All rights reserved...
TurfNet is an internetworking architecture that enables communication among autonomous and heterogeneous network domains. The architecture uses a global identity namespace and does not require global addressing or a common internetworking protocol. It integrates the new concept of dynamic network composition with other recent architectural concepts...
The necessity to split the endpoint identity and locator has been understood since sometime both from routing and security perspective. Today endpoints are identified by IP address that is location dependent and attributed by ISPs, whereas the identity neither depends on location nor on ISP. So splitting the routing and identification space is expe...
In this article, we apply autonomic and distributed management principles to wireless access networks. Most interesting is the application of autonomic properties and behaviors including adaptive, aware, and automatic operation in a decentralized setting. In particular, we present a generic and autonomic management architecture for decentralized ma...
Ambient networks (ANs) introduce a new dynamic and flexible architecture for fixed and mobile networks. The environment is dynamic since they consist of various mobile nodes and flexible since ANs can compose and decompose dynamically and automatically with other ANs. The AN architecture must be sophisticatedly designed to support such high level o...
Extensibility is one of the key architectural considerations in developing a modern communications system. Today's networks allow for extensions only within the context of strong assumptions about underlying invariants such as business models, protocol boundaries and application scenarios. The Ambient Networks project is developing an architecture...
Traditional centralized management approaches are not suitable for Ambient Networks (ANs), since centralized management systems neither scales well nor adapts fast enough to changing topologies and network compositions. To meet the requirements for AN management systems, we propose the use of distributed approaches. Specifically, we demonstrate the...
SPam over Internet Telephony (SPIT) is expected to become a very serious issue in the next years. The threat is going to spin out from the well known email spam problem by bot nets being re-programmed to initiate not just spam emails but also Voice over IP (VoIP) calls. Preventing SPIT is a new problem, because many well-established methods for blo...
Most Internet telephony applications currently use either TCP or UDP to carry their voice-over-IP (VoIP) traffic. This choice can be problematic, because TCP is not well suited for interactive traffic and UDP is unresponsive to congestion. The IETF has recently standardized the new Datagram Congestion Control Protocol (DCCP). DCCP has been designed...
Self-configuration is regarded a key instrument to increase the efficiency of many management tasks. This work proposes and investigates the application of self-configuring mechanisms to decentralized network management in wireless networks. In particular, the load balancing function has been recently investigated and in this work we consider a dis...
Ambient networks (ANs) are dynamically changing and heterogeneous as they consist of potentially large numbers of independent, heterogeneous mobile nodes, with spontaneous topologies that can logically interact with each other to share a common control space, known as the ambient control space. ANs are also flexible i.e. they can compose and decomp...
The Session Initiation Protocol (SIP) traditionally establishes and manages its sessions with centralized servers, which have been challenged by issues with TCP/IP networks right from its beginning, for instance, issues with NAT traversal or network congestions. On the other hand, there are peer-to-peer and overlay techniques that potentially can m...
SPam over Internet telephony (SPIT) is expected to become a threat inhibiting the delivery of voice services over the Internet in the near future both because of its technical and economical characteristics. Experiences with email SPAM and its analogies with SPIT suggest that SPIT will be difficult to detect with a single detection method. Moreover...
Self-configuration is a promising approach in network management. A self-configuring node is able to change some of its parameters autonomously according to changes of the environment (change of network conditions or information delivered from neighbour nodes). A network of self-configuring nodes promises increased scalability, low installation cos...
This paper proposes an extension of the functionality of a SIP proxy server for providing QoS to SIP-signalled voice over IP calls in a scalable and efficient way. The basic concept lies in aggregating SIP calls into bandwidth-provisioned trunks and on admitting calls on trunks only within the limit of their bandwidth. The SIP proxy server derives...
A Service-specific Overlay Network (SSON) is a virtualization concept proposed for customized media delivery in the Ambient
Networks architecture [1]. The service specific media delivery network has to be constructed dynamically without prior knowledge
of the underlying physical network. This process must consider unique properties, such as routin...
Ambient Networks (AN) are under development and they are based on novel networking concepts and systems that will enable a wide range of user and business communication scenarios beyond today's fixed, rd generation mobile and IP standards. Central to this project is the concept of Ambient Control Space (ACS) and the Domain Manager control function,...
Today, users have more and more mobile and fixed devices with communication capabilities including phones, PDAs, Laptops,
PCs, TV sets, HiFi equipment, etc. As the various devices have different capabilities, users want to be able to switch to
the most suitable device depending on the current environment and context. In order to support service con...
This paper presents a decentralized approach for the autonomic man- agement of a group of collaborating base stations to provide efficient and effective wireless network access in highly dynamic environments. It provides a manage- ment platform that supports many different management functions based on com- mon mechanisms for information exchange,...
The Internet architecture is based on design principles such as end-to-end addressing and global routeability. It suits relatively
static, well-managed and flat network hierarchies. Recent years have shown, however, that the Internet is evolving beyond
what the current architecture can support. The Internet architecture struggles to support increas...
Internet users are increasingly mobile. Their hosts are often only intermittently connected to the Internet, due to using multiple access networks, gaps in wireless coverage or explicit user choice. When such hosts communicate using the current Internet protocols, intermittent connectivity can significantly decrease performance and even cause conne...
Disruption Tolerant Networking (DTN) is a new area of research to improve network communication when connectivity is periodic, intermittent, and/or prone to disruptions. A seminar on DTN was held at at Schloß Dagstuhl, Germany, from 3 to 6 April 2005. Researchers from different fields discussed their approaches to dealing with delays, intermittent...
The development of future releases of third generation and fourth generation cellular network shows a clear indications that today's ATM-based radio access network (RAN) was replaced by an IP-based RAN particularly for reducing the cost compared to today's RANs. Managing an IP-based RAN with SNMP is a challenge, particularly concerning scalability....
Many complex protocols negotiate secondary flows on the application layer. Examples of such protocols include many peer-to-peer applications, SIP, H.323, etc. In general, this prevents firewalls from allowing them and through NATs public/private address space mapping from routing them. In this paper, we describe the requirements and design of an en...
The Internet is currently evolving beyond what its architecture can support. Often, the mechanisms that allow the Internet to adapt to increasingly conflicting sets of new requirements break some of its basic design principles and can thus severely interfere with end-to-end communication. This paper recognizes that increased autonomy of network reg...
Around the world, many activities exist to explore open, IP-based mobile networks. Within Europe, the European Government is sponsoring collaborative research towards end-to-end All-IP Mobile Networks. NEC's European Network Laboratories (NL-E) are participating in two major European projects. Within the Daidalos project we are working on IP based...
IntroductionTransport Service Quality in the InternetInternet TelephonyDirectory-enabled Networks (DEN)Open Services Gateway InitiativeActive NetworksConclusion
Generalized Multi-Protocol Label Switching (GMPLS) is currently under standardization at the Internet Engineering Task Force (IETF). It basically reuses the MPLS control plane (IP routing and signaling) for various technologies such as fiber switching, DWDM, SONET, and packet MPLS. In this article, we propose a management architecture, which allows...
1 TurfNet is a novel internetworking architecture that enables communication among autonomous and heterogeneous network domains. The architecture uses a global identity namespace and does not require global addressing or a shared internetworking protocol. It integrates the new concept of dynamic network composition with other recent architectural c...
This document defines a number of changes and extensions to the Policy Core Lightweight Directory Access Protocol (LDAP) Schema (RFC 3703) based on the model extensions defined by the Policy Core Information Model (PCIM) Extensions (RFC 3460). These changes and extensions consist of new LDAP object classes and attribute types. Some of the schema it...
Service specific overlays are overlay networks build and setup for a single service. Since different services need different types of overlays the setup process is pretty different. Current approaches normal allow to send in a overlay specification into the overlay provisioning system (mainly centralized). In our approach, we use pattern-based mana...
Disruption Tolerant Networking (DTN) is a new area of research to improve network communication when connectivity is periodic, intermittent, and/or prone to disruptions. A seminar on DTN was held at at Schloß Dagstuhl, Germany, from 3 to 6 April 2005. Researchers from different fields discussed their approaches to dealing with delays, intermitte...
From 03.04.05 to 06.04.05, the Dagstuhl Seminar 05142 ``Disruption Tolerant Networking'' was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the...
The session initiation protocol (SIP) is one of the major protocols used in voice over IP telephony. A major problem running SIP today are firewalls and network address translators, which block the data of voice calls, because it is carried over UDP. The SIP signaling messages are running over firewalls when properly configured (port 5060 open), bu...