@article{magytav1999,
author = {K. Kiss and G. R\'etv\'ari},
title = {Multicast \'{u}tvonalv\'{a}laszt\'{a}s {ATM} feletti {IP} h\'{a}l\'{o}zatokban (hungarian)},
journal = {Magyar T\'avk{\"{o}}zl\'es},
month = {May},
year = 1999
}
@inproceedings{eunice1999,
author = {K. Kiss and G. R\'etv\'ari},
title = {Verification of a new scalable {IP/ATM} multicast routing protocol},
booktitle = {Proceedings of {EUNICE '99}},
address = {Barcelona, Spain},
pages = {89-94},
month = {September},
year = {1999},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/eunice_1999.pdf},
abstract = {This paper summarizes the work for defining and starting to
verify a new protocol. The goal was to create a multicast
routing protocol, which works in an IP over ATM network
and, unlike the existing ones, is truly scalable. After
studying the literature, we realized that no existing
protocol is fully suitable for these requirements, so
modifying an existing one we created a new routing
protocol, and started to verify it using a formal
description tool. In the first chapter we discuss the
necessity of developing such a protocol. Next we provide
the goals for the new protocol and the results of the
studies of the existing proposals moreover some words are
told about the essentials of our new protocol. In the third
chapter we summarize the pros and the contras of the most
scalable proposal: SEAM. In the fourth part of this
documentation we show, how to manage the multicast tree in
order to reach the best efficiency of network resource
utilization. In the fifth chapter we provide a brief
summary of the formal description of the new
protocol. Finally in the sixth chapter we summarize the
results of our verification studies.}
}
@inproceedings{eunice1999-2,
author = {G. R\'etv\'ari and R. Szab\'o},
title = {{QoS}-based routing and {IP} multicasting: a framework},
booktitle = {Proceedings of {EUNICE '99}},
address = {Barcelona, Spain},
pages = {51-56},
month = {September},
year = {1999},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/eunice_1999-2.pdf}
}
@inproceedings{vtc1999,
author = {K. Kiss and G. R\'etv\'ari},
title = {{SEAM} and {MNS}: a new scalable multicast routing protocol in {IP} over {ATM} networks},
booktitle = {Proceedings of Vehicular Technology Conference, 1999. VTC 1999 - Fall. IEEE VTS 50th},
volume = {2},
pages = {1268-1272},
year = {1999}
}
@inproceedings{eunice2000,
author = {G. R\'etv\'ari},
title = {Issues on {QoS} based routing in the {Integrated Services Internet}},
booktitle = {Proceedings of {EUNICE '00}},
address = {Enschede, Netherlands},
pages = {69-76},
month = {September},
year = {2000},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/eunice_2000.pdf},
abstract = {Given today's need for transmitting multimedia data over the
Internet, large efforts have been made to specify and
implement various service classes (Integrated Services:
IntServ) over the well-known Internet Protocol (IP)
infrastructure. Distinguishing service classes introduces
the necessity of providing privileged treatment (QoS:
Quality of Service) to a subset of data packets. Network
resources dedicated to particular IP flows must be
allocated at the initial phase of a QoS communication at
each network node along the forwarding path. Calculation of
this forwarding path is the responsibility of a separate
routing module. While current routing protocols are not
capable of considering QoS requirements when selecting
paths, QoS enabled routing protocols increase the
likelihood of accommodating a particular IP flow in the
network according to its resource demands. Although the
components of an IntServ platform are given, attempting to
establish a functional testbed fails due to numerous design
and implementation reasons. A brief investigation of the
issues affecting the co-existence of resource reservation
and QoS routing is provided in this paper. As currently
IntServ can not take advantage of QoS routing, it is
restricted to utilize traditional best-effort routing
functionality. Several solutions are covered in this paper
to avoid this limitation. A series of fundamental
measurements are presented as well to demonstrate the
efficiency of the QoS-routing enabled IntServ platform.}
}
@inproceedings{hsn2001,
author = {J. Levendovszky and A. Fancsali and Cs. V\'egs\H{o} and G. R\'etv\'ari},
title = {Quadratic Optimization Algorithms for {QoS} Routing with Incomplete Information},
booktitle = {Proceedings of High Speed Networking 2001 Spring Workshop},
address = {Balatonf{\"{u}}red, Hungary},
pages = {113-119},
month = {May},
year = {2001}
}
@inproceedings{pch2001,
author = {G. R\'etv\'ari and R. Szab\'o and \'A. Marquetant},
title = {A novel approach to traffic engineering - core state limited load sharing},
booktitle = {Proceedings of PCH 2001 - 2001 Polish-Czech-Hungarian
Workshop on Circuit Theory, Signal Processing, and
Telecommunication Networks},
address = {Budapest, Hungary},
pages = {114-122},
year = {2001}
}
@inproceedings{ifip2001,
author = {J. Levendovszky and T. D\'avid and A. Fancsali and G. R\'etv\'ari and Cs. V\'egs\H{o}},
title = {{QoS} routing in packet switched networks -- novel algorithms for routing with incomplete information},
booktitle = {Proceedings of 9th IFIP Conference on Performance Modelling and Evaluation of ATM \& IP Networks},
address = {Budapest, Hungary},
pages = {249-260},
month = {June},
year = {2001},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/ifip_2001.pdf},
abstract = {This paper investigates QoS routing in IP networks. The major
concern is to select paths to fulfill end-to-end delay and
minimum bandwidth requirements. Novel algorithms are
developed to tackle routing with incomplete information,
when link measures are subject to random fluctuations
described by some given p.d.f.-s. The new algorithms are
based on either assuming Gaussian link delay distribution
or using large deviation theory to find the most likely
path. The proposed methods are capable of QoS routing in
polynomial time.}
}
@inproceedings{qofis2001,
author = {J. Levendovszky and A. Fancsali and G. R\'etv\'ari and Cs. V\'egs\H{o}},
title = {{QoS} routing with incomplete information by analog computing algorithms},
booktitle = {Proceedings of 2nd International Workshop on Quality of future Internet Services},
address = {Coimbra, Portugal},
volume = 56,
pages = {127-137},
month = {September},
year = {2001},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/qofis_2001.pdf},
doi = {10.1007/3-540-45412-8_10},
abstract = {The paper proposes novel algorithms for Quality of Service
(QoS) routing in IP networks. The new algorithms can handle
incomplete information, when link measures (e.g. link
delays, bandwidths... etc.) are assumed to be random
variables. Incomplete information can arise due to
aggregated information in PNNI and OSPF routing protocols,
which make link measures characterized by their
corresponding p.d.f. It will be demonstrated that the task
of QoS routing can be viewed as quadratic
optimization. Therefore, neural based optimization
algorithms implemented on an analog computer (CNN) can
provide fast routing algorithms even in the case of
incomplete information. As a result, real-time routing can
be carried out to meet end-to-end QoS (such as end-to-end
delay) requirements.}
}
@article{hirad2001,
author = {J. Levendovszky and G. R\'etv\'ari and Cs. V\'egs\H{o}},
title = {Statisztikus {egyenl\H{o}tlens\'egek} elm\'elet\'en alapul\'o {QoS} \'utvonalkeres\'es hi\'anyos linkinform\'aci\'o eset\'en (hungarian)},
journal = {H\'irad\'astechnika},
volume = 56,
issue = 11,
pages = {3-13},
month = {November},
year = {2001},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/hiradastech_2001.pdf}
}
@article{hirad2002,
author = {T. Sz\'en\'asi and G. R\'etv\'ari},
title = {Design and Implementation of a Traffic management Functionality for {RSVP}},
journal = {H\'irad\'astechnika (Communications)},
volume = 57,
issue = 12,
month = {December},
year = {2002},
pages = {21-27}
}
@inproceedings{hsn2002,
author = {J. Levendovszky and R. Szab\'o and G. R\'etv\'ari and \'A. Marquetant and Cs. V\'egs\H{o}},
title = {Novel Approach to Traffic Engineering in Packet Switched Networks -- An Analytic Approach},
booktitle = {Proceedings of High Speed Networking 2002 Spring Workshop},
address = {Budapest, Hungary},
pages = {27-28},
month = {May},
year = {2002}
}
@inproceedings{mmns2003,
author = {G. R\'etv\'ari},
title = {Minimum Interference Routing: The Precomputation Perspective},
booktitle = {Proc., 6th IFIP/IEEE International Conference on Management of Multimedia Networks and Services (MMNS)},
series = {Lecture Notes in Computer Science},
pages = {246-258},
month = {September},
year = {2003},
address = {Belfast, UK},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/mmns_2003.pdf},
doi = {10.1007/978-3-540-39404-4_19},
abstract = {This paper focuses on the selection of bandwidth-guaranteed
channels for communication sessions that require it. The
basic idea comes from Minimum Interference Routing: select
a feasible path that puts the least possible restriction on
the transmission capacity offered by the network for other
communicating parties. This is achieved by circumventing
certain critical bottleneck links. The main contribution of
the paper is a method to assess the degree of link
criticality facilitating efficient route precomputation
even in the case, when up to date resource availability
information is not immediately available.}
}
@inproceedings{networking2004,
author = {G. R\'etv\'ari and R. Szab\'o and J. J. B\'ir\'o},
title = {On the Representability of Arbitrary Path Sets as Shortest Paths: Theory, Algorithms, and Complexity},
booktitle = {Lecture Notes in Computer Science: Proceedings of the Third International IFIP-TC6 Networking Conference},
address = {Athens, Greece},
pages = {1180-1191},
month = {May},
year = {2004},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/networking_2004.pdf},
doi = {10.1007/978-3-540-24693-0_97},
abstract = {The question, whether an optional set of routes can be
represented as shortest paths, and if yes, then how, has
been a rather scarcely investigated problem up until
now. In turn, an algorithm that, given an arbitrary set of
trafic engineered paths, can efficiently compute OSPF link
weights as to map the given paths to shortest paths may be
of huge importance in today's IP networks, which still rely
on legacy shortest-path-first routing protocols. This
article establishes the fundamental theory and algorithms
of shortest path representability, and concludes that in
general it is much more dificult task to compute shortest
path representable paths than to actually calculate link
weights for such paths.}
}
@inproceedings{iscc2004,
author = { G. R\'etv\'ari and J. J. B\'ir\'o and T. Cinkler},
title = {A Novel {Lagrangian-relaxation} to the Minimum Cost Multicommodity
Flow Problem and its Application to {OSPF} Traffic
Engineering},
booktitle = {Proceedings of the The Ninth IEEE Symposium on Computers and Communications (ISCC'2004)},
address = {Alexandria, Egypt},
pages = {957-962},
volume = {2},
month = {June},
year = {2004},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/iscc_2004.pdf},
doi = {10.1109/ISCC.2004.1358664},
abstract = {The Minimum Cost Multicommodity Flow problem plays a central
role in today's operations research theory with
applications ranging from transportation and logistics to
telecommunications network routing. In this paper, we
introduce a novel Lagrangian-relaxation technique, which,
given an initial feasible solution, can solve the minimum
cost multicommodity flow problem as a sequence of
single-commodity flow problems. Our methodology is best
suited for OSPF traffic engineering, because it can rapidly
improve a given path set towards approximate optimality
while simultaneously provides the link weights, which
implement the paths as shortest paths.}
}
@article{commlet2004,
author = {G. R\'etv\'ari and T. Cinkler},
title = {Practical {OSPF} Traffic Engineering},
journal = {IEEE Commununications Letters},
volume = 8,
issue = 11,
month = {November},
year = {2004},
pages = {689-691},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/pote_commlet_2004.pdf},
doi = {10.1109/LCOMM.2004.837629},
abstract = {Open Shortest Path First (OSPF) traffic engineering (TE) is
intended to bring long-awaited traffic management
capabilities into IP networks, which still rely on today's
prevailing routing protocols: OSPF or IS-IS. In OSPF,
traffic is forwarded along, and split equally between,
equal cost shortest paths. In this letter, we formulate the
basic requirements placed on a practical TE architecture
built on top of OSPF and present a theoretical framework
meeting these requirements of practicality. The main
contribution of our work comes from the recognition that
coupled with an instance of the maximum throughput problem
there exists a related inverse shortest-path problem
yielding optimal OSPF link weights.}
}
@article{hirad2004,
author = {J. Szigeti and J. Tapolcai and G. R\'etv\'ari and L. L\'aposi and T. Cinkler},
title = {{\'U}tvonalkijel\"{o}l\'es \'es forgalomelvezet\'es t\"{o}bb tartom\'any\'u kapcsolt optikai h\'al\'ozatokban
(hungarian)},
journal = {H\'irad\'astechnika},
pages = {42-49},
volume = 59,
issue = 2,
month = {February},
year = {2004}
}
@inproceedings{hsn2004,
author = {G. R\'etv\'ari and J. J. B\'ir\'o and T. Cinkler},
title = {Minimum Interference Routing: The Precomputation Perspective},
booktitle = {Proceedings of High Speed Networking 2004 Spring Workshop},
address = {Budapest, Hungary},
pages = {106-109},
month = {May},
year = {2004},
abstract = {This paper focuses on the selection of bandwidth-guaranteed
channels for communication sessions that require it. The
basic idea comes from Minimum Interference Routing: select
a feasible path that puts the least possible restriction on
the transmission capacity offered by the network for other
communicating parties. This is achieved by circumventing
certain critical bottleneck links. The main contribution of
the paper is a method to assess the degree of link
criticality facilitating efficient route precomputation
even in the case, when up to date resource availability
information is not immediately available.}
}
@inproceedings{infocom2005,
author = {G. R\'etv\'ari and J. J. B\'ir\'o and T. Cinkler and T. Henk},
title = {A Precomputation Scheme for Minimum Interference Routing: the {Least-Critical-Path-First} Algorithm},
booktitle = {IEEE INFOCOM 2005},
address = {Miami, Florida, USA},
month = {March},
year = {2005},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/infocom_2005.pdf},
doi = {10.1109/INFCOM.2005.1497897},
abstract = {This paper focuses on the selection of bandwidth-guaranteed
channels for communication sessions that require it. The
basic idea comes from Minimum Interference Routing: select
a feasible path that puts the least possible restriction on
the available transmission capacity of other communicating
parties. This is achieved by circumventing some critical
bottleneck links. The main contribution of the paper is a
novel characterization of link criticality, the criticality
threshold, which can be readily precomputed for routing
dozens of subsequent calls. Based on this finding we define
a generic precomputation framework for minimum interference
routing, the Least-Critical-Path-First rout- ing
algorithm. We show by means of extensive simulations that
efficient route precomputation is possible even in the
case, when accurate resource availability information is
not immediately available.}
}
@article{ton2005,
author = {G. R\'etv\'ari and J. J. B\'ir\'o and T. Cinkler},
title = {On Shortest Path Representation},
journal = {IEEE/ACM Transactions on Networking},
year = {2007},
month = {December},
volume = {15},
number = {6},
pages = {1293-1306},
issn = {1063-6692},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/ton_2005.pdf},
doi = {10.1109/TNET.2007.900708},
abstract = {Lately, it has been proposed to use shortest path first routing
to implement Traffic Engineering in IP networks. The idea
is to set the link weights so that the shortest paths, and
the traffic thereof, follow the paths designated by the
operator. Clearly, only certain shortest path representable
path sets can be used in this setting, that is, paths which
become shortest paths over some appropriately chosen
positive, integer-valued link weights. Our main objective
in this paper is to distill and unify the theory of
shortest path representability under the umbrella of a
novel flow-theoretic framework. In the first part of the
paper, we introduce our framework and state a descriptive
necessary and sufficient condition to characterize shortest
path representable paths. Unfortunately, traditional
methods to calculate the corresponding link weights usually
produce a bunch of superfluous shortest paths, often
leading to congestion along the unconsidered paths. Thus,
the second part of the paper is devoted to reducing the
number of paths in a representation to the bare minimum. To
the best of our knowledge, this is the first time that an
algorithm is proposed, which is not only able to find a
minimal representation in polynomial time, but also assures
link weight integrality. Moreover, we give a necessary and
sufficient condition to the existence of a one-to-one
mapping between a path set and its shortest path
representation. However, as revealed by our simulation
studies, this condition seems overly restrictive and
instead, minimal representations prove much more
beneficial.}
}
@inproceedings{eurongi2005,
author = {J. Tapolcai and P. Fodor and G. R\'etv\'ari and M. Maliosz and T. Cinkler},
title = {Class-based Minimum Interference Routing for Traffic Engineering in Optical Networks},
booktitle = {Proc., 1st EuroNGI Conference on Next Generation Internet Networks Traffic Engineering},
year = {2005},
month = {April},
address = {Rome, Italy}
}
@inproceedings{networking2006,
author = {G. R\'etv\'ari and J. J. B\'ir\'o and T. Cinkler},
title = {On Improving the Accuracy of {OSPF Traffic Engineering}},
booktitle = {Lecture Notes in Computer Science: Proceedings of the Fifth International IFIP-TC6 Networking Conference},
address = {Coimbra, Portugal},
year = {2006},
pages = {51-62},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/mspr_networing_2006.pdf},
doi = {10.1007/11753810_5},
abstract = {The conventional forwarding rule used by IP networks is to
always choose the path with the shortest length -- in terms
of administrative link weights assigned to the links -- to
forward traffic. Lately, it has been proposed to use
shortest-path-first routing to implement Traffic
Engineering in IP networks, promising with a big boost in
the profitability of the legacy network infrastructure. The
idea is to set the link weights so that the shortest paths,
and the traffic thereof, follow the paths designated by the
operator. Unfortunately, traditional methods to calculate
the link weights usually produce a bunch of superfluous
shortest paths, often leading to congestion along the
unconsidered paths. In this paper, we introduce and
develop novel methods to increase the accuracy of this
process and, by means of extensive simulations, we show
that our proposed solution produces remarkably high quality
link weights.}
}
@inproceedings{wtc2006,
title = {Novel Methods For Traffic Engineering In Legacy {IP} Networks},
author = {G. R\'etv\'ari and J. J. B\'ir\'o and T. Cinkler},
booktitle = {Proc., World Telecommunications Congress (WTC)},
year = {2006},
month = {May},
address = {Budapest, Hungary},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/wtc_2006.pdf},
abstract = {Abstract - A short introduction, a comprehensive survey of the
current state-of-the-art and an overview of some recent
progress in the field of OSPF Traffic Engineering (TE) is
given. Particularly, we study a multi-stage approach, where
the original problem is divided into three subsequent and
independent phases. This approach promises with breaking
down the intractability of OSPF TE and also to provide
interesting further insights. Finally, a simple heuristic
is proposed, whose viability is demonstrated by simulation
studies.}
}
@inproceedings{hsn2007,
author = {G. R\'etv\'ari},
title = {The geometry of networking, part {I}},
booktitle = {Proceedings of High Speed Networking 2007 Spring Workshop},
address = {Balatonkenese, Hungary},
month = {May},
year = {2007}
}
@inproceedings{infocom2007,
author = {G. R\'etv\'ari and J. J. B\'ir\'o and T. Cinkler},
title = {Fairness in Capacitated Networks: a Polyhedral Approach},
booktitle = {IEEE INFOCOM 2007},
year = {2007},
month = {May},
address = {Anchorage, Alaska, USA},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/infocom_2007.pdf},
slides = {http://lendulet.tmit.bme.hu/~retvari/publications/infocom_2007.slides.pdf},
doi = {10.1109/INFCOM.2007.188},
abstract = {Abstract - The problem of fair and feasible allocation of user
throughputs in capacitated networks is investigated. The
main contribution of the paper is a novel geometric
approach, which facilitates to generalize several
throughput allocation strategies, most importantly max-min
fairness, from the traditional "fixed-path" model to a more
versatile, routing-independent model. We show that the set
of throughput configurations realizable in a capacitated
network makes up a polyhedron, which gives rise to a
max-min fair allocation completely analogous to the
conventional one. An algorithm to compute this polyhedron
is also presented, whose viability is demonstrated by
comprehensive evaluation studies.}
}
@inproceedings{icc2007,
title = {Routing-independent Fairness in Capacitated Networks},
author = {G. R\'etv\'ari and J. J. B\'ir\'o and T. Cinkler},
booktitle = {Proc., IEEE International Conference on Communications (ICC 2007)},
year = {2007},
month = {June},
address = {Glasgow, Scotland},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/icc_2007.pdf},
doi = {10.1109/ICC.2007.1050},
abstract = {The problem of fair and feasible allocation of user
throughputs in capacitated networks is investigated. The
main contribution of the paper is an extension of network
fairness, and in particular, max-min fairness from the
traditional fixed- path model to a more versatile,
routing-independent model. We show that the set of
throughput configurations realizable in a capacitated
network makes up a polyhedron, which gives rise to a
max-min fair allocation completely analogous to the
conventional one.}
}
@inproceedings{eunice_2007,
title = {A Novel Loop-free {IP Fast Reroute} Algorithm},
author = {G. Enyedi and G. R\'etv\'ari and T. Cinkler},
booktitle = {Proc., 13th EUNICE Open European Summer School},
year = {2007},
month = {July},
doi = {10.1007/978-3-540-73530-4_14},
abstract = {Although providing reliable network services is getting more
and more important, currently used methods in IP networks
are typically reactive and error correcting can take a long
time. One of the most interesting solutions is interface
based fast rerouting, where not only the destination
address but also the incoming interface is taken into
account during the forwarding. Unfortunately, current
methods can not handle all the possible situations as they
are prone to form loops and make parts of the network with
no failure unavailable. In this paper we propose a new
interface based routing method, which always avoids loops
for the price of a bit longer paths. We also present
extensive simulation results to compare current and
proposed algorithms.}
}
@article{network2007,
author = {A. Cs\'asz\'ar and G. Enyedi and M. Hidell and G. R\'etv\'ari and P. Sj\"odin},
title = {Converging the Evolution of Router Architectures and {IP} Networks},
journal = {IEEE Network Magazine, Special Issue on Advances in Network Systems Architecture},
year = {2007},
month = {July},
volume = {21},
number = {4},
pages = {8-14},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/network_2007.pdf},
doi = {10.1109/MNET.2007.386464},
abstract = {Although IP is widely recognized as the platform for
next-generation converged networks, it is, unfortunately,
heavily burdened by its heritage of almost 30
years. Nowadays, network operators must devote significant
resources to carry out tasks so essential like traffic
engineering, policy enforcement and security. In this
paper, we argue that one of the principal reasons for this
lies in the way control and forwarding planes are
interspersed in today's IP networks. We review the
architectural developments that led to the present
situation and we reason that centralization of network
control functionality can constitute a solution to the
pressing problems of contemporary Internet.}
}
@inproceedings{ngi_2008,
author = {Enyedi, G. and R\'etv\'ari, G.},
title = {A Loop-Free Interface-Based Fast Reroute Technique},
booktitle = {Next Generation Internet Networks, 2008. NGI 2008},
year = {2008},
month = {April},
pages = {39-44},
doi = {10.1109/NGI.2008.12}
}
@inproceedings{networks2008,
author = {P. Fodor and G. Enyedi and G. R\'etv\'ari and T. Cinkler},
title = {An Efficient and Practical Layer-preference Policy for Routing in {GMPLS} Networks},
booktitle = {the 13th International Telecommunications Network Strategy
and Planning Symposium, (Networks 2008)},
year = {2008},
month = {September},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/networks_2008.pdf},
doi = {10.1109/NETWKS.2008.4763706},
abstract = {We address the problem of routing Label Switched Paths
(LSPs) in multi-layer networks based on the Generalized
MultiProtocol Label Switching (GMPLS) paradigm. In
particular, we pursue strategies for choosing the
appropriate layer to host a new LSP request, since choosing
this policy has enormous impact on the eventual performance
of the network. Therefore, we developed a mixed strategy,
the Min-phys-hop routing and wavelength assignment
algorithm, as a policy to govern the selection of the best
layer of a multi-layer network in which to host new LSP
requests. In this paper, we discuss the practical issues
concerning the deployment of this algorithm in modern GMPLS
networks. Firstly, we discuss the applicability of the
algorithm with respect to the state-of-the-art GMPLS
standards, above all, the GMPLS routing extensions to
OSPF-TE. We also sketch two possible reference deployment
scenarios. Secondly, we present simulation studies to
demonstrate that (1) there does not exist a universally
optimal static layer-preference policy and (2) the
Min-phys-hop algorithm realizes an adequate heuristics even
considering the realistic limitations of contemporary
network devices. We found that the Min-phys-hop algorithm
produces close-to-optimal blocking and resource consumption
under almost all possible selections of input parameters,
and this is regardless of the wavelength and
Optical-Electrical-Optical (OEO) conversion capability
present in the network.}
}
@inproceedings{hsn2009,
author = {G. R\'etv\'ari},
title = {The geometry of networking, part {II}},
booktitle = {Proceedings of High Speed Networking 2009 Spring Workshop},
address = {Balatonkenese, Hungary},
month = {May},
year = {2009}
}
@article{phot_net_2009,
author = {P. Fodor and G. Enyedi and G. R\'{e}tv\'{a}ri and T. Cinkler},
title = {Layer-preference policies in multi-layer {GMPLS} networks},
journal = {Photonic Network Communications},
volume = {18},
issue = {3},
pages = {300-313},
year = {2009},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/photonic_net_com_2009.pdf},
doi = {10.1007/s11107-009-0193-y},
abstract = {We address the problem of routing Label Switched Paths (LSPs)
in multi-layer networks based on the Generalized
MultiProtocol Label Switching (GMPLS) paradigm. In
particular, we pursue policies for choosing the appropriate
layer to host a new LSP request, as we find that such
layer-preference policies have significant impact on
network performance. We discuss several simple
layer-preference policies and we reveal why these simple
policies ruin network performance in the long run.
Consequently, we develop an efficient heuristics, the
Min-phys-hop routing and wavelength assignment algorithm,
to govern the selection of the best layer of a multi-layer
network in which to host new LSP requests. We discuss the
applicability of this algorithm with respect to the
state-of-the-art GMPLS standards, above all, the GMPLS
routing extensions to OSPF-TE. By extensive simulations, we
justify that the Min-phys-hop algorithm produces
close-to-optimal blocking and resource consumption under
almost all possible selections of input parameters, and
this is regardless of the wavelength and
Optical-Electrical-Optical (OEO) conversion capability
present in the network.}
}
@article{hirad2009,
author = {G. Enyedi and G. R\'etv\'ari},
title = {Gyors hibajav\'it\'as {IP} h\'al\'ozatokban (in hungarian)},
journal = {H\'irad\'astechnika},
volume = 64,
issue = {3-4},
pages = {20-24},
year = {2009},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/hiradastech_2009.pdf}
}
@inproceedings{efipsans_09,
author = {F. N\'emeth and G. R\'etv\'ari and Z. Heszberber and A. Guly\'as},
title = {Demystifying Self-awareness of Autonomic Systems},
booktitle = {Proc., ICT Mobile and Wireless Communications Summit (MobileSummit)},
year = {2009},
month = {June},
address = {Santander, Spain},
abstract = {Self-awareness is a much discussed property of autonomic and
self-managed networks. Attempting to demystify this
property we show that it can be captured by a Self
Awareness Function (SAF) that stems from the assessment of
process correctness of autonomic and cognitive
networks. Based on multiple position papers that were
written in isolation we are able to identify various SAFs
(for trust, security, dynamics control, service
deployment), as well as associated research issues
(information modelling, higher contextualisation,
convergence, etc.). We show that multiple issues of self
-management that create a tangled hierarchy of control
loops can be systematically addressed with SAF in mind.}
}
@inproceedings{networking2009,
author = {G. Enyedi and P. Szil\'agyi and G. R\'etv\'ari and A Cs\'asz\'ar},
title = {{IP} Fast ReRoute: {Lightweight Not-Via}},
booktitle = {Lecture Notes in Computer Science: Proceedings of the IFIP Networking'09},
address = {Aachen, Germany},
year = {2009},
pages = {157-168},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/notvia_networking_2009.pdf},
doi = {10.1007/978-3-642-01399-7_13},
abstract = {In order for IP to become a full-fledged carrier-grade
transport technology, a native IP failure-recovery scheme
is necessary that can correct failures in the order of
milliseconds. IP Fast ReRoute (IPFRR) intends to fill this
gap, providing fast, local and proactive handling of
failures right in the IP layer. Building on experiences and
extensive measurement results collected with a prototype
implementation of the prevailing IPFRR technique, Not-via,
in this paper we identify high address management burden
and computational complexity as the major causes of why
commercial IPFRR deployment still lags behind, and we
present a lightweight Not-via scheme, which, according to
our measurements, improves these issues.}
}
@inproceedings{notvia_infocommini2009,
author = {G. Enyedi and P. Szil\'agyi and G. R\'etv\'ari and A Cs\'asz\'ar},
title = {{IP} Fast ReRoute: {Lightweight Not-Via} without Additional Addresses},
booktitle = {IEEE INFOCOM'09 Mini-Conference},
address = {Rio de Janeiro, Brasil},
year = {2009},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/notvia_infocommini_2009.pdf},
pages = {2771-2775},
doi = {10.1109/INFCOM.2009.5062229},
abstract = {In order for IP to become a full-fledged carrier-grade
transport technology, a native IP failure-recovery scheme
is necessary that can correct failures in the order of
milliseconds. IP fast reroute (IPFRR) intends to fill this
gap, providing fast, local and proactive handling of
failures right in the IP layer. Building on experiences and
extensive measurement results collected with a prototype
implementation of the prevailing IPFRR technique, Not-via,
in this paper we identify high address management burden
and computational complexity as the major causes of why
commercial IPFRR deployment still lags behind, and we
present a lightweight not-via scheme, which, according to
our measurements, improves these issues.}
}
@inproceedings{redtrees_iscc2009,
author = {G. Enyedi and G. R\'etv\'ari and A Cs\'asz\'ar},
title = {On Finding Maximally Redundant Trees in Strictly Linear Time},
booktitle = {IEEE Symposium on Computers and Communications (ISCC 2009) },
address = {Tunesia},
year = {2009},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/redtrees_iscc_2009.pdf},
doi = {10.1109/ISCC.2009.5202302},
pages = {206-211},
abstract = {Redundant trees are commonly used for protection and
restoration in communications networks. Zhang et
al. presented a linear time algorithm to compute
node-redundant trees in 2-node-connected networks, which
has become widely cited in the literature. In this paper,
we show that it is difficult to implement this algorithm
providing both correctness and linear complexity at the
same time. Therefore, we present a revised algorithm with
strict linear time complexity. Moreover, we generalize the
concept of node-redundant trees from 2-node-connected
networks to arbitrary topologies, a crucial development
since real networks can not always satisfy 2-connectedness,
especially after a failure.}
}
@inproceedings{ospf_mace09,
author = {G. R\'etv\'ari and F. N\'emeth and C. Ranganai and R. Szab\'o},
month = {October},
title = {{OSPF} for Implementing Self-adaptive Routing in Autonomic Networks: A Case Study},
booktitle = {MACE'09, the 4th International Workshop on Modelling Autonomic Communications Environments},
year = {2009},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/ospf_mace_2009.pdf},
doi = {10.1007/978-3-642-05006-0_6},
abstract = {Autonomicity, realized through control-loop structures
operating within network devices and the network as a
whole, is an enabler for advanced and enriched
self-manageability of network devices and networks. In this
paper, we argue that the degree of self-management and
self-adaptation embedded by design into existing protocols
needs to be well understood before one can enhance or
integrate such protocols into self-managing network
architectures that exhibit more advanced autonomic
behaviors. We justify this claim through an illustrative
case study: we show that the well-known and extensively
used intra-domain IP routing protocol, OSPF, is itself a
quite capable self-managing entity, complete with all the
basic components of an autonomic networking element like
embedded control-loops, decision-making modules,
distributed knowledge repositories, etc. We describe these
components in detail, concentrating on the numerous
control-loops inherent to OSPF, and discuss how some of the
control-loops can be enriched with external decision making
logics to implement a truly self-adapting routing
functionality.}
}
@inproceedings{hybrid_obl_infocom2010,
author = {G. R\'etv\'ari and G. N\'emeth},
month = {March},
title = {Demand-Oblivious Routing: Distributed vs. Centralized Approaches},
booktitle = {IEEE INFOCOM 2010},
year = {2010},
location = {San Diego, CA, USA},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/infocom_2010.pdf},
slides = {http://lendulet.tmit.bme.hu/~retvari/publications/infocom_2010.slides.pdf},
doi = {10.1109/INFCOM.2010.5461925},
abstract = {Until recent years, it was more or less undisputed
common-sense that an accurate view on traffic demands is
indispensable for optimizing the flow of traffic through a
network. Lately, this premise has been questioned sharply:
it was shown that setting just a single routing, the so
called demand-oblivious routing, is sufficient to
accommodate any admissible traffic matrix in the network
with moderate link overload, so no prior information on
demands is absolutely necessary for efficient traffic
engineering. Demand-oblivious routing lends itself to
distributed implementations, so it scales well. In this
paper, we generalize demand-oblivious routing in a new way:
we show that, in contrast to the distributed case,
centralized demand-oblivious routing can eliminate link
overload completely. What is more, our centralized scheme
allows for optimizing the routes with respect to arbitrary
linear or quadratic objective function. We realize,
however, that a centralized scheme can become prohibitively
complex, therefore, we propose a hybrid
distributed-centralized algorithm, which, according to our
simulations, strikes a good balance between efficiency,
scalability and complexity.}
}
@inproceedings{optimal_control_iscc2010,
author = {G. R{\'{e}}tv{\'{a}}ri and G. N{\'{e}}meth},
month = {June},
title = {On Optimal Multipath Rate-adaptive Routing},
booktitle = {15th IEEE Symposium on Computers and Communications (ISCC 2010)},
year = {2010},
address = {Riccione, Italy},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/iscc_2010.pdf},
doi = {10.1109/ISCC.2010.5546757},
abstract = {A centralized rate-adaptive routing algorithm is presented
that, in contrast to the distributed ones available in the
literature, achieves provable stability, optimalilty with
respect to optional linear or quadratic objective
functions, and feasibility in that it can accommodate any
admissible traffic matrix in the network without violating
link capacities. We recast the routing problem in the
framework of constrained optimal control theory to obtain
optimal state feedback routing controllers, and we present
simulations confirming that our routing controllers are
viable in small- and middle-sized networks.}
}
@inproceedings{broadnets2010,
author = {G. N\'emeth and G. R\'etv\'ari},
title = {Hybrid Demand Oblivious Routing: Hyper-cubic Partitions and Theoretical Upper Bounds},
booktitle = {7th International ICST Conference on Broadband Communications, Networks, and Systems (BROADNETS 2010)},
year = {2010},
pages = {25-27},
location = {Athens, Greece},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/broadnets_2010.pdf},
doi = {10.1007/978-3-642-30376-0_7}
}
@inproceedings{globecom2010,
author = {M. Csernai and A. Guly{\'a}s and G. R{\'e}tv{\'a}ri and Z. Heszberger and
A. Cs{\'a}sz{\'a}r},
title = {The Skeleton of the Internet},
booktitle = {IEEE GLOBECOM},
year = {2010},
month = {November},
pages = {1-5},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/globecom_2010.pdf},
doi = {10.1109/GLOCOM.2010.5684319},
abstract = {Research works concerning AS (Autonomous Systems) level
Internet topology measurements typically aim at obtaining
near-complete maps of the AS structure. In this paper, we
take a fundamentally different approach by inspecting
several concurrently visible local views of the AS graph
stored at individual BGP route servers. We find that each
of these views exhibits the characteristic properties of
complex graphs having power-law degree distribution, large
clustering coefficient and the small world property. As a
main contribution, the intersection of these views is
investigated to identify the skeleton of the Internet
consisting of edges seen by most of the ASes. Our
measurements support the surprising claim that this
skeleton is a scale-free complex network, having a giant
connected component with a dense part in its heart forming
the critical AS level core. We identify the edges in the
skeleton as critical infrastructure, any changes of which
induces an Internet-wide effect with BGP updates
propagating to all ASes. Finally, we reinterpret the path
inflation metric using the local view approach and show
that local path inflation can be very diverse in different
ASes.}
}
@article{pp_2010,
author = {G. Enyedi and G. R\'etv\'ari},
title = {Finding Multiple Maximally Redundant Trees in Linear Time},
journal = {Periodica Polytechnica},
volume = 54,
issue = {1-2},
pages = {29-40},
year = {2010},
doi = {10.3311/pp.ee.2010-1-2.04},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/periodica_poly_2010.pdf},
abstract = {Redundant trees are directed spanning trees, which provide
disjoint paths towards their roots. Therefore, this concept
is widely applied in the literature both for providing
protection and load sharing. The fastest algorithm can find
multiple redundant trees, a pair of them rooted at each
vertex, in linear time. Unfortunately, edge- or
vertex-redundant trees can only be found in 2-edge- or
2-vertex-connected graphs respectively. Therefore, the
concept of maximally redundant trees was introduced, which
can overcome this problem, and provides maximally disjoint
paths towards the common root. In this paper, we propose
the first linear time algorithm, which can compute a pair
of maximally redundant trees rooted at not only one, but at
each vertex.}
}
@incollection{igi_2011,
author = {G. R\'etv\'ari and F. N\'emeth and I. Hokelek and M. Fecko and A. Prakash and R. Chaparadza and M. Wodzak and B. Vidalenc},
title = {A guideline for realizing the vision on {Autonomic Networking}: Implementing self-adaptive routing on top of {OSPF}},
booktitle = {Formal and Practical Aspects of Autonomic Computing and Networking: Specification, Development, and Verification},
editor = {Cong-vinh, Phan},
year = {2011},
isbn = {1609608453, 9781609608453},
edition = {1st},
publisher = {Information Science Reference - Imprint of: IGI Publishing},
address = {Hershey, PA}
}
@inproceedings{infocom_2011,
author = {G. R\'etv\'ari and J. Tapolcai and G. Enyedi and A. Cs\'asz\'ar},
title = {{IP Fast ReRoute: Loop Free Alternates} Revisited},
booktitle = {IEEE INFOCOM 2011},
year = {2011},
pages = {2948-2956},
location = {Shanghai, China},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/infocom_2011.pdf},
slides = {http://lendulet.tmit.bme.hu/~retvari/publications/infocom_2011.slides.pdf},
doi = {10.1109/INFCOM.2011.5935135},
abstract = {IP Fast ReRoute (IPFRR) is the IETF standard for providing
fast failure protection in IP and MPLS/LDP networks and
Loop Free Alternates (LFA) is a basic specification for
implementing it. Even though LFA is simple and
unobtrusive, it has a significant drawback: it does not
guarantee protection for all possible failure cases.
Consequently, many IPFRR proposals have appeared lately,
promising full failure coverage at the price of added
complexity and non-trivial modifications to IP hardware and
software. Meanwhile, LFA remains the only commercially
available, and therefore, the only deployable IPFRR
solution. Deployment, however, crucially depends on the
extent to which LFA can protect failures in operational
networks. In this paper, therefore, we revisit LFA in
order to give theoretical insights and practical hints to
LFA failure coverage analysis. First, we identify the
topological properties a network must possess to profit
from good failure coverage. Then, we study how coverage
varies as new links are added to a network, we show how to
do this optimally and, through extensive simulations, we
arrive to the conclusion that cleverly adding just a couple
of new links can improve the quality of LFA protection
drastically.}
}
@inproceedings{podc_2011,
author = {G. R\'{e}tv\'{a}ri and A. Guly\'{a}s and Z. Heszberger and M. Csernai and J.J. B\'{i}r\'{o}},
title = {Compact policy routing},
booktitle = {ACM PODC 2011},
year = {2011},
isbn = {978-1-4503-0719-2},
location = {San Jose, California, USA},
pages = {149-158},
numpages = {10},
doi = {http://doi.acm.org/10.1145/1993806.1993828},
acmid = {1993828},
publisher = {ACM},
address = {New York, NY, USA},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/podc_2011.pdf},
slides = {http://lendulet.tmit.bme.hu/~retvari/publications/podc_2011.slides.pdf},
abstract = {This paper takes a first step towards generalizing compact
routing to arbitrary routing policies that favor a broader
set of path attributes beyond path length. Using the
formalism of routing algebras we identify the algebraic
requirements for a routing policy to be realizable with
sublinear size routing tables and we show that a wealth of
practical policies can be classified by our results. By
generalizing the notion of stretch, we also discover the
algebraic validity of compact routing schemes considered so
far and we show that there are routing policies for which
one cannot expect sublinear scaling even if permitting
arbitrary constant stretch.}
}
@inproceedings{drcn_2011,
author = {G. R\'etv\'ari and L. Csikor and J. Tapolcai and G. Enyedi and A. Cs\'asz\'ar},
title = {Optimizing {IGP} link costs for improving {IP-level} resilience (Best Paper Award)},
booktitle = {Design of Reliable Communication Networks (DRCN), 2011 8th International Workshop on the},
year = {2011},
month = {October},
pages = {62-69},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/drcn_2011.pdf},
slides = {http://lendulet.tmit.bme.hu/~retvari/publications/drcn_2011.slides.pdf},
doi = {10.1109/DRCN.2011.6076886},
abstract = {Recently, major vendors have introduced new router platforms
to the market that support fast IP-level failure protection
out of the box. The implementations are based on the IP
Fast ReRoute-Loop Free Alternates (LFA) standard. LFA is
simple, unobtrusive, and easily deployable. This
simplicity, however, comes at a severe price, in that LFA
usually cannot protect all possible failure scenarios. In
this paper, we give new graph theoretical tools for
analyzing LFA failure case coverage and we seek ways for
improvement. In particular, we investigate how to optimize
IGP link costs to maximize the number of protected failure
scenarios, we show that this problem is NP-complete even in
a very restricted formulation, and we give exact and
approximate algorithms to solve it. Our simulation studies
show that a deliberate selection of IGP costs can bring
many networks close to complete LFA-based protection.}
}
@inproceedings{globecom_2011,
author = {Cs. Simon and F. N\'emeth and F. Uzs\'ak and G. R\'etv\'ari and F. Ficsor and R. Vida},
booktitle = {GLOBECOM Workshops, 2011 IEEE},
title = {Autonomic {DHCPv6} Architecture},
year = {2011},
month = {December},
volume = {},
number = {},
pages = {620-624},
doi = {10.1109/GLOCOMW.2011.6162526}
}
@inproceedings{rndm_2011,
author = {M. Nagy and G. R\'etv\'ari},
title = {An evaluation of approximate network optimization methods for
improving {IP}-level fast protection with {Loop-free
Alternates}},
booktitle = {Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2011 3rd International Congress on},
year = {2011},
month = {October},
pages = {1-7},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/rndm_2011.pdf},
issn = {2157-0221}
}
@inproceedings{rndm_2012,
author = {L. Csikor and G. R\'etv\'ari},
title = {{IP Fast Reroute} with {Remote Loop-Free Alternates}: The Unit Link Cost Case},
booktitle = {Proceedings of RNDM 2012, the 4th International Workshop on
Reliable Networks Design and Modeling},
year = {2012},
month = {October},
pages = {16-22},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/rndm_2012.pdf}
}
@article{dist_comp_2012,
author = {G. R\'{e}tv\'{a}ri and A. Guly\'{a}s and Z. Heszberger and M. Csernai and J.J. B\'{i}r\'{o}},
title = {Compact policy routing},
journal = {Distributed Computing},
year = {2013},
volume = {26},
number = {5},
pages = {309-320},
issn = {1432-0452},
doi = {10.1007/s00446-012-0181-9},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/dist_comp_2012.pdf},
publisher = {Springer-Verlag},
abstract = {The main concern in this paper is to generalize compact
routing to arbitrary routing policies that favor a broader
set of path attributes beyond path length. Using the
formalism of routing algebras we identify the algebraic
requirements for a routing policy to be realizable with
sublinear size routing tables, and we show that a wealth of
practical policies can be classified by our results. By
generalizing the notion of stretch, we also discover the
algebraic validity of compact routing schemes considered so
far and we show that there are routing policies for which
one cannot expect sublinear scaling even if permitting
arbitrary constant stretch. Finally, we apply our
methodology to the routing policies used in Internet
inter-domain routing, and we show that our algebraic
approach readily generalizes to this setting as well.}
}
@inproceedings{hotnets_2012,
author = {G. R{\'{e}}tv{\'{a}}ri and Z. Csern{\'{a}}tony and
A. K\H{o}r\"{o}si and J. Tapolcai and
A. Cs{\'{a}}sz{\'{a}}r and G. Enyedi and G. Pongr{\'{a}}cz},
title = {Compressing {IP} Forwarding Tables for Fun and Profit},
booktitle = {ACM HotNets-XI},
year = {2012},
month = {October},
location = {Redmond, WA},
organization = {ACM},
slides = {http://lendulet.tmit.bme.hu/~retvari/publications/hotnets_2012.slides.pdf},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/hotnets_2012.pdf},
abstract = {About what is the smallest size we can compress an IP Forwarding
Information Base (FIB) down to, while still guaranteeing
fast lookup? Is there some notion of FIB entropy that could
serve as a compressibility metric? As an initial step in
answering these questions, we present a FIB data structure,
called Multibit Burrows-Wheeler transform (MBW), that is
fundamentally pointerless, can be built in linear time,
guarantees theoretically optimal longest prefix match, and
compresses to higher-order entropy. Measurements on a Linux
prototype provide a first glimpse of the applicability of
MBW.}
}
@inproceedings{networks_2012,
author = {K. N\'emeth and G. R\'etv\'ari},
title = {Traffic Splitting Algorithms in Multipath Networks: Is the Present Practice Good Enough?},
booktitle = {the 15th International Telecommunications Network Strategy
and Planning Symposium, (Networks 2012)},
year = {2012},
month = {October}
}
@article{sigmetrics_2012,
author = {G. N{\'e}meth and G. R{\'e}tv\'{a}ri},
title = {Towards a statistical characterization of the competitiveness of oblivious routing (short paper)},
journal = {SIGMETRICS Perform. Eval. Rev.},
issue_date = {June 2012},
volume = {40},
number = {1},
month = {June},
year = {2012},
issn = {0163-5999},
pages = {387-388},
numpages = {2},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/sigmetrics_2012.pdf},
doi = {10.1145/2318857.2254806},
acmid = {2254806},
publisher = {ACM},
address = {New York, NY, USA}
}
@article{telsys_2012,
author = {M. Nagy and J. Tapolcai and G. R\'etv\'ari},
title = {Optimization Methods for Improving {IP}-level Fast Protection for
Local {Shared Risk Groups} with {Loop-Free Alternates}},
journal = {Telecommunication Systems},
year = {2012},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/tel_sys_2012.pdf}
}
@article{comp_comm_2012,
author = {L. Csikor and J. Tapolcai and G. R\'etv\'ari},
title = {Optimizing {IGP} link costs for improving {IP}-level resilience with {Loop-Free Alternates}},
journal = {Computer Communications},
volume = {},
number = {},
pages = {},
year = {2012},
issn = {0140-3664},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/comp_comm_2012.pdf},
doi = {10.1016/j.comcom.2012.09.004},
abstract = {The IP Fast ReRoute-Loop-Free Alternates (LFA) standard is a
simple and easily deployable technique to provide fast
failure protection right in the IP layer. To our days, most
major IP device vendors have products on the market that
support LFA out of the box. Unfortunately, LFA usually
cannot protect all possible failure scenarios in a general
network topology. Therefore, it is crucial to develop
LFA-based network optimization tools in order to assist
operators in deciding whether deploying LFA in their
network will supply sufficient resiliency. In this paper,
we give a new graph theoretical framework for analyzing LFA
failure case coverage, and then we investigate how to
optimize the Interior Gateway Protocol (IGP) link costs in
order to maximize the number of protected failure
scenarios. We show that this problem is NP-complete even in
a very restricted formulation, and we give an exact
algorithm as well as a complete family of heuristics to
solve it. Our simulation studies indicate that a deliberate
tuning of the approximation strategy can significantly
improve the quality of the IGP link costs, and we conclude
that LFA cost optimization has the potential for boosting
LFA-based resilience in most operational networks
significantly.}
}
@incollection{fia_chapter_2013,
author = {L. Csikor and G. R\'etv\'ari and J. Tapolcai},
title = {High Availability in the {Future Internet}},
booktitle = {The Future Internet},
volume = {7858},
series = {Lecture Notes in Computer Science},
editor = {Galis, Alex and Gavras, Anastasius},
doi = {10.1007/978-3-642-38082-2_6},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/fia_chapter_2013.pdf},
publisher = {Springer Berlin Heidelberg},
pages = {64-76},
year = {2013},
isbn = {978-3-642-38081-5}
}
@inproceedings{networking_2013,
author = {K. N{\'{e}}meth and A. K{\"{o}}r{\"{o}}si and G. R{\'{e}}tv{\'{a}}ri},
title = {Optimal {OSPF} traffic engineering using legacy {Equal Cost Multipath}
load balancing},
booktitle = {{IFIP} Networking Conference 2013},
pages = {1-9},
year = 2013
}
@inproceedings{sigcomm_2013,
author = {G. R{\'e}tv\'{a}ri and J. Tapolcai and A. K\H{o}r\"{o}si and A. Majd\'{a}n and Z. Heszberger},
title = {Compressing {IP} forwarding tables: Towards entropy bounds and beyond},
booktitle = {ACM SIGCOMM},
year = {2013},
pages = {111-122},
numpages = {12},
doi = {10.1145/2486001.2486009},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/sigcomm_2013_tech_rep.pdf},
slides = {http://lendulet.tmit.bme.hu/~retvari/publications/sigcomm_2013.slides.pdf}
}
@inproceedings{infocom_2013,
author = {J. Tapolcai and G. R\'etv\'ari},
booktitle = {IEEE INFOCOM},
title = {Router virtualization for improving {IP}-level resilience},
year = {2013},
volume = {},
number = {},
pages = {935-943},
doi = {10.1109/INFCOM.2013.6566882},
location = {Turin, Italy},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/infocom_2013.pdf},
slides = {http://lendulet.tmit.bme.hu/~retvari/publications/infocom_2013.slides.pdf},
month = {April}
}
@inproceedings{hotnets_2014,
author = {G. R{\'e}tv\'{a}ri and D. Szab\'{o} and A. Guly\'{a}s and A. K\H{o}r\"{o}si and J. Tapolcai},
title = {An Information-Theoretic Approach to Routing Scalability},
booktitle = {ACM HotNets-XIII},
year = {2014},
location = {Los Angeles, CA, USA},
pages = {1-7},
articleno = {2},
numpages = {7},
doi = {10.1145/2670518.2673863},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/hotnets_2014.pdf},
slides = {http://lendulet.tmit.bme.hu/~retvari/publications/hotnets_2014.slides.pdf}
}
@article{ton_2014,
author = {Guly\'{a}s, Andr\'{a}s and R{\'e}tv\'{a}ri, G\'{a}bor and Heszberger, Zal\'{a}n and Agarwal, Rachit},
title = {On the Scalability of Routing with Policies},
journal = {IEEE/ACM Transactions on Networking},
issue_date = {October 2015},
volume = {23},
number = {5},
month = oct,
year = {2015},
issn = {1063-6692},
pages = {1610-1618},
numpages = {9},
doi = {10.1109/TNET.2014.2345839},
acmid = {2872510},
abstract = {Today's ever-growing networks call for routing schemes with sound
theoretical scalability guarantees. In this context, a
routing scheme is scalable if the amount of memory needed
to implement it grows significantly slower than the network
size. Unfortunately, theoretical scalability
characterizations only exist for shortest path routing, but
for general policy routing that current and future networks
increasingly rely on, very little understanding is
available. In this paper, we attempt to fill this gap. We
define a general framework for policy routing, and we study
the theoretical scaling properties of three fundamental
policy models within this framework. Our most important
contributions are the finding that, contrary to shortest
path routing, there exist policies that inherently scale
well, and a separation between the class of policies that
admit compact routing tables and those that do
not. Finally, we ask to what extent memory size can be
decreased by allowing paths to contain a certain bounded
number of policy violations and, surprisingly, we conclude
that most unscalable policies remain unscalable under the
relaxed model as well.},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/ton_2014.pdf}
}
@inproceedings{icnp_2014,
author = {A.~K\H{o}r\"osi and J.~Tapolcai and B.~Mih\'alka and G.~M\'esz\'aros and G. R\'etv\'ari},
title = {Compressing {IP} Forwarding Tables: Realizing Information-theoretical
Space Bounds and Fast Lookups Simultaneously},
booktitle = {Proc. IEEE ICNP},
year = {2014},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/icnp_2014.pdf}
}
@inproceedings{eunice_2014,
author = {A. Majd\'an and G. R\'etv\'ari and J. Tapolcai and A. K\H{o}r\"osi},
title = {Development and Performance Evaluation of Fast Combinatorial Unranking
Implementations},
booktitle = {IFIP EUNICE},
year = {2014},
address = {Rennes, France}
}
@incollection{eunice_2014_2,
author = {Bence Mih{\'{a}}lka and
Attila K\H{o}r\"osi and
G{\'{a}}bor R{\'{e}}tv{\'{a}}ri},
title = {Compressing Virtual Forwarding Information Bases Using the Trie-folding Algorithm},
booktitle = {Advances in Communication Networking},
volume = {8846},
series = {Lecture Notes in Computer Science},
editor = {Kermarrec, Yvon},
doi = {10.1007/978-3-319-13488-8_12},
publisher = {Springer International Publishing},
pages = {121-133},
year = {2014}
}
@inproceedings{eunice_2014_3,
author = {M{\'{a}}rton Zubor and
Attila Kor{\"{o}}si and
Andr{\'{a}}s Guly{\'{a}}s and
G{\'{a}}bor R{\'{e}}tv{\'{a}}ri},
title = {On the Computational Complexity of Policy Routing},
booktitle = {Advances in Communication Networking},
volume = {8846},
series = {Lecture Notes in Computer Science},
editor = {Kermarrec, Yvon},
publisher = {Springer International Publishing},
pages = {202-214},
year = {2014},
doi = {10.1007/978-3-319-13488-8\_19},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/eunice_2014_3.pdf}
}
@article{ton_2014_2,
author = {R\'etv\'ari, G. and Tapolcai, J. and K\H{o}r\"{o}si, A. and Majd\'an, A. and Heszberger, Z.},
journal = {IEEE/ACM Transactions on Networking},
title = {Compressing {IP} Forwarding Tables: Towards Entropy Bounds and Beyond},
year = {2016},
volume = {24},
number = {1},
pages = {149-162},
abstract = {Lately, there has been an upsurge of interest in compressed data structures, aiming to pack ever larger quantities of information into constrained memory without sacrificing the efficiency of standard operations, like random access, search, or update. The main goal of this paper is to demonstrate how data compression can benefit the networking community by showing how to squeeze the IP Forwarding Information Base (FIB), the giant table consulted by IP routers to make forwarding decisions, into information-theoretical entropy bounds, with essentially zero cost on longest prefix match and FIB update. First, we adopt the state of the art in compressed data structures, yielding a static entropy-compressed FIB representation with asymptotically optimal lookup. Then, we redesign the venerable prefix tree, used commonly for IP lookup for at least 20 years in IP routers, to also admit entropy bounds and support lookup in optimal time and update in nearly optimal time. Evaluations on a Linux kernel prototype indicate that our compressors encode an FIB comprising more than 440 K prefixes to just about 100-400 kB of memory, with a threefold increase in lookup throughput and no penalty on FIB updates.},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/ton_2014_2.pdf},
doi = {10.1109/TNET.2014.2357051}
}
@article{networks_2015,
author = {N{\'e}meth, G. and R{\'e}tv\'{a}ri, G.},
title = {Rate-adaptive multipath routing: Distributed, centralized, and hybrid architectures},
journal = {Networks},
doi = {10.1002/net.21617},
pages = {1-12},
year = {2015},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/networks_2015.pdf}
}
@article{tel_sys_2015,
author = {Csikor, L. and R\'etv\'ari, G.},
title = {On Providing Fast Protection with Remote Loop-Free Alternates -- Analyzing and Optimizing Unit Cost Networks},
journal = {Telecommunication Systems Journal},
publisher = {Springer US},
doi = {10.1007/s11235-015-0006-9},
issn = {1572-9451},
year = {2015},
month = {March},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/tel_sys_2015.pdf}
}
@article{nat_comm_2015,
author = {Guly\'as, A. and B\'ir\'o, J. J. and K\H{o}r\"osi, A. and
R\'etv\'ari, G. and Krioukov, D.},
title = {Navigable networks as {Nash} equilibria of navigation games},
journal = {Nature Communications},
volume = {6},
number = {7651},
doi = {10.1038/ncomms8651},
year = {2015},
month = {July},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/nat_comm_2015.pdf}
}
@inproceedings{icnp_2015,
author = {Tapolcai, J. and R\'etv\'ari, G. and Babarczi, P. and B\'erczi-Kov\'acs, E. and Krist\'of, P. and Enyedi, G.},
title = {Scalable and Efficient Multipath Routing: Complexity and Algorithms},
booktitle = {23rd IEEE International Conference on Network Protocols (ICNP)},
year = {2015},
pages = {1-10},
address = {San Francisco, CA, USA},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/icnp_2015.pdf}
}
@inproceedings{conext_2016,
author = {M. Chiesa and G. R{\'e}tv{\'a}ri and M. Schapira},
title = {Lying Your Way to Better Traffic Engineering},
booktitle = {ACM CoNEXT},
pages = {391-398},
numpages = {8},
doi = {10.1145/2999572.2999585},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/conext_2016.pdf},
year = {2016}
}
@inproceedings{sigcomm_2016,
author = {L. Moln{\'a}r and G. Pongr{\'a}cz and G. Enyedi and Z. L. Kis and
L. Csikor and F. Juh{\'a}sz and A. K\H{o}r\"{o}si and
G. R{\'e}tv\'{a}ri},
title = {Dataplane Specialization for High Performance {OpenFlow} Software Switching},
booktitle = {ACM SIGCOMM},
year = {2016},
pages = {539-552},
numpages = {14},
acmid = {2934887},
doi = {10.1145/2934872.2934887},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/sigcomm_2016.pdf},
slides = {http://lendulet.tmit.bme.hu/~retvari/publications/sigcomm_2016.slides.pdf}
}
@inproceedings{gi_2016,
author = {S. Nikolenko and K. Kogan and G. R{\'e}tv{\'a}ri and E. B{\'e}rczi-Kov{\'a}cs and A. Shalimov},
title = {How to Represent {IPv6} Forwarding Tables on {IPv4} or {MPLS} Dataplanes},
booktitle = {Proc. 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): GI 2016: 19th IEEE Global Internet Symposium},
year = {2016},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/gi_2016.pdf}
}
@article{comnets_2017,
author = {K. N{\'{e}}meth and A. K{\"{o}}r{\"{o}}si and G. R{\'{e}}tv{\'{a}}ri},
title = {Optimal resource pooling over legacy equal-split load balancing schemes},
journal = {Computer Networks},
volume = {127},
number = {},
pages = {243-265},
year = {2017},
doi = {https://doi.org/10.1016/j.comnet.2017.08.017},
abstract = {Abstract Splitting traffic flows to different data paths is crucial in current and future networks. Traffic division serves as the basis for load balancing between application servers, optimal Traffic Engineering, using multiple paths in data centers, and several other places of an end-to-end connection. Unfortunately, by allowing only equal division amongst the parallel resources, existing technologies often cannot realize the optimal traffic splitting, which can have serious negative consequences on the network performance. In this paper we present a flexible and effective traffic splitting method that is incrementally deployable and fully compatible with practically all existing protocols and data planes. Our proposal, called Virtual Resource Allocation (VRA), is based on setting up virtual resources alongside existing ones, thereby tricking the legacy equal traffic splitting technology into realizing the required non-equal traffic division over the physical media. We propose several \{VRA\} schemes, give theoretical bounds on their performance, and also show that the full-fledged \{VRA\} problem is NP-complete in general. Accordingly, we provide solution algorithms, including an optimal, but necessarily slow method and several quick heuristics. Our simulations show that \{VRA\} has huge practical potential as it allows approaching an ideal traffic split using only a very limited set of virtual resources. Based on the results, we also give detailed suggestions on which algorithm to apply in different scenarios.},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/comnets_2017.pdf}
}
@inproceedings{netpl_2017,
author = {G. R{\'e}tv\'{a}ri and L. Moln{\'a}r and G. Pongr{\'a}cz and G. Enyedi},
title = {Dynamic Compilation and Optimization of Packet Processing Programs},
booktitle = {ACM SIGCOMM 2017 The Third Workshop on Networking and Programming Languages (NetPL)},
year = {2017},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/netpl_2017.pdf},
slides = {http://lendulet.tmit.bme.hu/~retvari/publications/netpl_2017.slides.pdf}
}
@article{scientific_reports_2017,
title = {Routes Obey Hierarchy in Complex Networks},
author = {A. Csoma and A. K{\H{o}}r{\"o}si and G. R{\'e}tv{\'a}ri and Z. Heszberger and J. J. B{\'\i}r{\'o} and M. Sl{\'\i}z and A. Avena-Koenigsberger and A. Griffa and P. Hagmann and A. Guly{\'a}s},
journal = {Nature Scientific Reports},
volume = {7},
year = {2017},
comment = {impact factor 4.26},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/scientific_reports_2017.pdf}
}
@article{sdata_2018,
title = {A dataset on human navigation strategies in foreign networked systems},
author = {K{\H{o}}r{\"o}si, Attila and Csoma, Attila and R{\'e}tv{\'a}ri, G{\'a}bor and Heszberger, Zal{\'a}n and B{\'\i}r{\'o}, J{\'o}zsef and Tapolcai, J{\'a}nos and Pelle, Istv{\'a}n and Klajb{\'a}r, D{\'a}vid and Nov{\'a}k, M{\'a}rton and Halasi, Valentina and others},
journal = {Scientific data},
volume = {5},
pages = {180037},
year = {2018},
publisher = {Nature Publishing Group},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/sdata_2018.pdf}
}
@article{ton_2018_1,
author = {Nagy, M{\'a}t{\'e} and T{\'a}polcai, J{\'a}nos and R{\'e}tv{\'a}ri, G{\'a}bor},
title = {Node Virtualization for {IP} Level Resilience},
journal = {IEEE/ACM Transactions of Networking},
issue_date = {June 2018},
volume = {26},
number = {3},
month = jun,
year = {2018},
issn = {1063-6692},
pages = {1250-1263},
numpages = {14},
doi = {10.1109/TNET.2018.2829399},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/ton_2018_1.pdf},
acmid = {3281053},
publisher = {IEEE Press},
address = {Piscataway, NJ, USA}
}
@article{ton_2018_2,
author = {Chiesa, Marco and Retvari, Gabor and Schapira, Michael},
title = {Oblivious Routing in {IP} Networks},
journal = {IEEE/ACM Transactions on Networking},
issue_date = {June 2018},
volume = {26},
number = {3},
month = jun,
year = {2018},
issn = {1063-6692},
pages = {1292-1305},
numpages = {14},
doi = {10.1109/TNET.2018.2832020},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/ton_2018_2.pdf},
acmid = {3281066},
publisher = {IEEE Press},
address = {Piscataway, NJ, USA}
}
@article{jsac_2018,
author = {T. L{\'e}vai and G. Pongr{\'a}cz and P. Megyesi and P. V{\"o}r{\"o}s and S. Laki and F. N{\'e}meth and G. R{\'e}tv{\'a}ri},
journal = {IEEE Journal on Selected Areas in Communications},
title = {The Price for Programmability in the Software Data Plane: The Vendor Perspective},
year = {2018},
volume = {36},
number = {12},
pages = {2621-2630},
doi = {10.1109/JSAC.2018.2871307},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/jsac_2018.pdf},
issn = {0733-8716},
month = dec
}
@inproceedings{networking_2018,
title = {HARMLESS: Cost-effective transitioning to {SDN} for small enterprises},
author = {Csikor, Levente and Toka, L{\'a}szl{\'o} and Szalay, M{\'a}rk and Pongr{\'a}cz, Gergely and Pezaros, Dimitrios P and R{\'e}tv{\'a}ri, G{\'a}bor},
booktitle = {Proc. IFIP Netw.},
pages = {1-9},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/networking_2018.pdf},
year = {2018}
}
@inproceedings{hpsr_2018,
author = {Bifulco, Roberto and R{\'e}tv{\'a}ri, G{\'a}bor},
title = {A survey on the programmable data plane: Abstractions architectures and open problems},
booktitle = {Proc. IEEE HPSR},
year = {2018},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/hpsr_2018.pdf}
}
@inproceedings{secson_2018,
author = {K. Thimmaraju and G. R{\'e}tv{\'a}ri and S. Schmid},
title = {Virtual Network Isolation: Are We There Yet?},
booktitle = {Proc. ACM SIGCOMM 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges (SecSon)},
year = {2018}
}
@inproceedings{atc_2019,
author = {Kashyap Thimmaraju and Saad Hermak and G{\'a}bor R{\'e}tv{\'a}ri and Stefan Schmid},
title = {{MTS}: Bringing Multi-Tenancy to Virtual Networking},
booktitle = {2019 {USENIX} Annual Technical Conference ({USENIX} {ATC} 19)},
year = 2019,
isbn = {978-1-939133-03-8},
address = {Renton, WA},
pages = {521-536},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/atc_2019.pdf},
slides = {http://lendulet.tmit.bme.hu/~retvari/publications/atc_2019.slides.pdf},
publisher = {{USENIX} Association},
month = jul
}
@article{jsac_2019,
author = {J. {Tapolcai} and G. R{\'e}tv{\'a}ri and P. {Babarczi} and E. R. B{\'e}rczi-Kov{\'a}cs},
journal = {IEEE Journal on Selected Areas in Communications},
title = {Scalable and Efficient Multipath Routing via Redundant Trees},
year = {2019},
volume = {37},
number = {5},
pages = {982-996},
doi = {10.1109/JSAC.2019.2906742},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/jsac_2019.pdf},
month = {May}
}
@article{procieee_2019,
author = {L. {Linguaglossa} and S. {Lange} and S. {Pontarelli} and G. {R{\'e}tv{\'a}ri} and D. {Rossi} and T. {Zinner} and R. {Bifulco} and M. {Jarschel} and G. {Bianchi}},
journal = {Proceedings of the IEEE},
title = {Survey of Performance Acceleration Techniques for {Network Function Virtualization}},
year = {2019},
volume = {107},
number = {4},
pages = {746-764},
doi = {10.1109/JPROC.2019.2896848},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/procieee_2019.pdf}
}
@inproceedings{conext_2019_1,
author = {L. Csikor and D.M. Divakaran and M.S. Kang and A. K\H{o}r\"{o}si and B. Sonkoly and D. Haja and D. Pezaros and S. Schmid and G. R{\'e}tv\'{a}ri},
title = {Tuple Space Explosion: A Denial-of-service Attack Against a Software Packet Classifier},
booktitle = {ACM CoNEXT},
year = {2019},
pages = {292-304},
numpages = {13},
doi = {10.1145/3359989.3365431},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/conext_2019_2.pdf}
}
@inproceedings{conext_2019_2,
author = {F. N{\'e}meth and M. Chiesa and G. R{\'e}tv\'{a}ri},
title = {Normal Forms for Match-action Programs},
booktitle = {ACM CoNEXT},
year = {2019},
pages = {44-50},
numpages = {7},
doi = {10.1145/3359989.3365417},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/conext_2019_1.pdf}
}
@article{bolyai_2019_1,
author = {J. B{\'\i}r{\'o} and A. Guly{\'a}s and G. R{\'e}tv{\'a}ri and A. K{\H{o}}r{\"o}si and Z. Heszberger and A. Majd\'{a}n},
title = {Navig\'{a}ci\'{o} h\'{a}l\'{o}zatokban {Bolyai J\'{a}nos} geometri\'{a}ja seg\'{i}ts\'{e}g\'{e}vel},
journal-iso = {ALK MAT LAP},
journal = {ALKALMAZOTT MATEMATIKAI LAPOK},
volume = {36},
num = {1},
year = {2019}
}
@article{bolyai_2019_2,
author = {A. K{\H{o}}r{\"o}si and G. R{\'e}tv{\'a}ri},
title = {A csomagtov\'abb\'{i}t\'{a}s sk\'{a}l\'{a}zhat\'{o}s\'{a}ga: korl\'{a}tok \'{e}s optimumok},
journal-iso = {ALK MAT LAP},
journal = {ALKALMAZOTT MATEMATIKAI LAPOK},
volume = {36},
num = {2},
year = {2019},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/bolyai_2019_2.pdf}
}
@inproceedings{netai_2019,
author = {Zerwas, Johannes and Kalmbach, Patrick and Henkel, Laurenz and R\'{e}tv\'{a}ri, G\'{a}bor and Kellerer, Wolfgang and Blenk, Andreas and Schmid, Stefan},
title = {NetBOA: Self-Driving Network Benchmarking},
year = {2019},
doi = {10.1145/3341216.3342207},
booktitle = {Proceedings of the 2019 Workshop on Network Meets AI \& ML},
pages = {8–14},
numpages = {7}
}
@article{infocom_journal_2019,
author = {M. Nagy and J. Tapolcai and G. R{\'e}tv{\'a}ri},
title = {{R3D3}: A doubly opportunistic data structure for compressing and indexing massive data},
year = {2019},
month = jan,
day = {1},
language = {English},
volume = {11},
pages = {58-66},
journal = {Infocommunications Journal},
issn = {2061-2079},
publisher = {Scientific Association for Infocommunications},
number = {2},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/infocom_journal_2019.pdf}
}
@article{ton_2020_1,
author = {A. K{\H{o}}r{\"o}si and A. Guly{\'a}s and Z. Heszberger and J. B{\'\i}r{\'o} and G. R{\'e}tv{\'a}ri},
journal = {IEEE/ACM Transactions on Networking},
title = {On the Memory Requirement of Hop-by-Hop Routing: Tight Bounds and Optimal Address Spaces},
year = {2020},
volume = {},
number = {},
pages = {1-11},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/ton_2020_1.pdf},
doi = {10.1109/TNET.2020.2984761}
}
@inproceedings{nsdi_2020,
author = {T. L{\'e}vai and F. N{\'e}meth and B. Raghavan and G. R{\'e}tv{\'a}ri},
title = {Batchy: Batch-scheduling Data Flow Graphs with Service-level Objectives},
booktitle = {17th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 20)},
year = {2020},
address = {Santa Clara, CA},
pages = {633-649},
url = {https://www.usenix.org/conference/nsdi20/presentation/levai},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/nsdi_2020.pdf},
publisher = {{USENIX} Association}
}
@inproceedings{sosr_2020,
author = {G. Antichi and G. R\'{e}tv\'{a}ri},
title = {Full-Stack {SDN}: The Next Big Challenge?},
year = {2020},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
booktitle = {Proceedings of the Symposium on SDN Research},
pages = {48–54},
numpages = {7},
location = {San Jose, CA, USA},
series = {SOSR ’20},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/sosr_2020.pdf},
slides = {http://lendulet.tmit.bme.hu/~retvari/publications/sosr_2020.slides.pdf},
url = {https://doi.org/10.1145/3373360.3380834},
doi = {10.1145/3373360.3380834}
}
@inproceedings{europ4_2020,
author = {Vass, Bal\'{a}zs and B\'{e}rczi-Kov\'{a}cs, Erika and Raiciu, Costin and R\'{e}tv\'{a}ri, G\'{a}bor},
title = {Compiling Packet Programs to Reconfigurable Switches: Theory and Algorithms},
year = {2020},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3426744.3431332},
doi = {10.1145/3426744.3431332},
booktitle = {Proceedings of the 3rd P4 Workshop in Europe},
pages = {28-35},
numpages = {8},
location = {Barcelona, Spain},
series = {EuroP4'20},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/europ4_2020.pdf},
slides = {http://lendulet.tmit.bme.hu/~retvari/publications/europ4_2020.slides.pdf}
}
@article{scientific_reports_2020,
title = {The role of detours in individual human navigation patterns of complex networks},
author = {Guly{\'a}s, Andr{\'a}s and B{\'\i}r{\'o}, J{\'o}zsef and R{\'e}tv{\'a}ri, G{\'a}bor and Nov{\'a}k, M{\'a}rton and K{\H{o}}r{\"o}si, Attila and Sl{\'\i}z, Mariann and Heszberger, Zal{\'a}n},
journal = {Scientific reports},
volume = {10},
number = {1},
pages = {1-10},
year = {2020},
publisher = {Nature Publishing Group},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/scientific_reports_2020.pdf}
}
@article{ton_2020_2,
title = {Transition to {SDN} is {HARMLESS}: Hybrid Architecture for Migrating Legacy Ethernet Switches to {SDN}},
author = {Csikor, Levente and Szalay, M{\'a}rk and R{\'e}tv{\'a}ri, G{\'a}bor and Pongr{\'a}cz, Gergely and Pezaros, Dimitrios P and Toka, L{\'a}szl{\'o}},
journal = {IEEE/ACM Transactions on Networking},
volume = {28},
number = {1},
pages = {275-288},
year = {2020},
publisher = {IEEE},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/ton_2020_2.pdf}
}
@misc{servicemeshcon_2020,
author = {G{\'a}bor R{\'e}tv{\'a}ri},
title = {{L7mp}: A Multiprotocol Service Mesh for Legacy Applications},
year = {2020},
howpublished = {ServiceMeshCon NA 2020, colocated with KubeCon + CloudNativeCon North America},
url = {https://sched.co/fJEm},
slides = {http://lendulet.tmit.bme.hu/~retvari/publications/servicemeshcon_2020.slides.pdf},
note = {video available at https://www.youtube.com/watch?v=4oTP91yfF3g}
}
@inproceedings{cloudnet_2020,
author = {Rottenstreich, Ori and Kulik, Ariel and Joshi, Ananya and Rexford, Jennifer and R\'{e}tv\'{a}ri, G\'{a}bor and Menasch\'{e}, Daniel S.},
booktitle = {2020 IEEE 9th International Conference on Cloud Networking (CloudNet)},
title = {Cooperative Rule Caching for {SDN} Switches},
year = {2020},
volume = {},
number = {},
pages = {1-7},
doi = {10.1109/CloudNet51028.2020.9335795},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/cloudnet_2020.pdf}
}
@article{csur_2021,
author = {Michel, Oliver and Bifulco, Roberto and R\'{e}tv\'{a}ri, G\'{a}bor and Schmid, Stefan},
title = {The Programmable Data Plane: Abstractions, Architectures, Algorithms, and Applications},
year = {2021},
issue_date = {April 2021},
publisher = {Association for Computing Machinery},
volume = {54},
number = {4},
doi = {10.1145/3447868},
journal = {ACM Comput. Surv.},
month = may,
articleno = {82},
numpages = {36},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/csur_2021.pdf}
}
@article{tnsm_2021,
author = {Rottenstreich, Ori and Kulik, Ariel and Joshi, Ananya and Rexford, Jennifer and R\'{e}tv\'{a}ri, G\'{a}bor and Menasch\'{e}, Daniel},
journal = {IEEE Transactions on Network and Service Management},
title = {Data Plane Cooperative Caching with Dependencies},
year = {2021},
volume = {},
number = {},
pages = {1-1},
doi = {10.1109/TNSM.2021.3132275},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/tnsm_2021.pdf}
}
@article{comst_2021,
author = {Chiesa, Marco and Kamisiński, Andrzej and Rak, Jacek and R\'{e}tv\'{a}ri, G\'{a}bor and Schmid, Stefan},
journal = {IEEE Communications Surveys Tutorials},
title = {A Survey of Fast-Recovery Mechanisms in Packet-Switched Networks},
year = {2021},
volume = {23},
number = {2},
pages = {1253-1301},
doi = {10.1109/COMST.2021.3063980},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/comst_2021.pdf}
}
@inproceedings{asplos_2022,
author = {Miano, Sebastiano and Sanaee, Alireza and Risso, Fulvio and R\'{e}tv\'{a}ri, G\'{a}bor and Antichi, Gianni},
title = {Domain Specific Run Time Optimization for Software Data Planes},
year = {2022},
publisher = {Association for Computing Machinery},
doi = {10.1145/3503222.3507769},
booktitle = {Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems},
pages = {1148-1164},
numpages = {17},
series = {ASPLOS 2022},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/asplos_2022.pdf}
}
@article{infocom_journal_2022,
title = {Batch-scheduling Data Flow Graphs with Service-level Objectives on Multicore Systems},
author = {L{\'e}vai, Tam{\'a}s and R{\'e}tv{\'a}ri, G{\'a}bor},
journal = {Infocommunications Journal},
volume = {14},
number = {1},
pages = {43-50},
year = {2022},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/infocom_journal_2022.pdf}
}
@inproceedings{infocom_ws_2022,
title = {Programmable Packet Scheduling With {SP-PIFO}: {Theory}, Algorithms and Evaluation},
author = {Vass, Bal{\'a}zs and Sarkadi, Csaba and R{\'e}tv{\'a}ri, G{\'a}bor},
booktitle = {IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)},
pages = {1-6},
year = {2022},
organization = {IEEE},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/infocom_ws_2022.pdf}
}
@inproceedings{networking_2022,
title = {Routing on the Shortest Pairs of Disjoint Paths},
author = {Babarczi, P{\'e}ter and R{\'e}tv{\'a}ri, G{\'a}bor and R{\'o}nyai, Lajos and Tapolcai, J{\'a}nos},
booktitle = {IFIP Networking Conference},
pages = {1-9},
year = {2022},
organization = {IFIP},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/networking_2022.pdf}
}
@inproceedings{europ4_2022,
author = {Vass, Bal\'{a}zs and Frakn\'{o}i, \'{A}d\'{a}m and B\'{e}rczi-Kov\'{a}cs, Erika and R\'{e}tv\'{a}ri, G\'{a}bor},
title = {Compiling packet programs to dRMT switches: theory and algorithms},
year = {2022},
publisher = {Association for Computing Machinery},
url = {https://doi.org/10.1145/3565475.3569080},
doi = {10.1145/3565475.3569080},
booktitle = {Proceedings of the 5th International Workshop on P4 in Europe},
pages = {26--32},
numpages = {7},
series = {EuroP4 '22},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/europ4_2022.pdf}
}
@inproceedings{infocom_2023,
title = {Self-adjusting partially ordered lists},
author = {Addanki, Vamsi and Pacut, Maciej and Pourdamghani, Arash and R{\'e}tv{\'a}ri, Gabor and Schmid, Stefan and Vanerio, Juan},
booktitle = {IEEE INFOCOM 2023-IEEE Conference on Computer Communications},
pages = {1-10},
year = {2023},
organization = {IEEE},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/infocom_2023.pdf}
}
@inproceedings{ebpf_2023,
author = {L\'{e}vai, Tam\'{a}s and Kreith, Bal\'{a}zs and R\'{e}tv\'{a}ri, G\'{a}bor},
title = {Supercharge {WebRTC:} {Accelerate TURN} Services with {eBPF/XDP}},
year = {2023},
url = {https://doi.org/10.1145/3609021.3609296},
doi = {10.1145/3609021.3609296},
booktitle = {Proceedings of the 1st Workshop on EBPF and Kernel Extensions},
pages = {70-76},
numpages = {7},
series = {eBPF'23},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/ebpf_2023.pdf}
}
@article{ton_2023,
title = {Morpheus: A Run Time Compiler and Optimizer for Software Data Planes},
author = {Miano, Sebastiano and Sanaee, Alireza and Risso, Fulvio and R\'{e}tv\'{a}ri, G\'{a}bor and Antichi, Gianni},
journal = {IEEE/ACM Transactions on Networking},
number = {1},
pages = {1-16},
year = {2023},
publisher = {IEEE Computer Society},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/ton_2023.pdf}
}
@article{ton_2024,
author = {B. Vass and E. B{\'e}rczi-Kov{\'a}cs and {\'A} Fraknói and C. Raiciu and G. R{\'e}tv{\'a}ri},
journal = {IEEE/ACM Transactions on Networking},
title = {Charting the Complexity Landscape of Compiling Packet Programs to Reconfigurable Switches},
year = {2024},
volume = {32},
number = {5},
pages = {4519-4534},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/ton_2024.pdf},
doi = {10.1109/TNET.2024.3424337}
}
@inproceedings{networking_2024,
author = {T. L{\'e}vai and B. Vass and G. R{\'e}tv{\'a}ri},
title = {Programmable Real-Time Scheduling of Disaggregated Network Functions},
booktitle = {2024 IFIP Networking Conference (IFIP Networking)},
year = {2024},
pages = {1-7},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/networking_2024.pdf},
doi = {10.23919/IFIPNetworking62109.2024.10619906}
}
@inproceedings{nsdi_2025,
author = {A. Alcoz and B. Vass and P. Namyar and B. Arzani and G. R{\'e}tv{\'a}ri and L. Vanbever},
title = {Everything Matters in Programmable Packet Scheduling},
booktitle = {22nd USENIX Symposium on Networked Systems Design and Implementation ({NSDI} '25)},
year = {2025},
address = {Philadelphia, PA},
pages = {1-1},
paper = {http://lendulet.tmit.bme.hu/~retvari/publications/nsdi_2025.pdf},
publisher = {{USENIX} Association}
}
This file was generated by bibtex2html 1.99.
last modified: Fri May 16 04:37:13 PM CEST 2025