Jean Lorchat

Learn More
— In this paper we introduce a new model for energy consumption evaluation based on experimental results obtained from various wireless network interfaces. Using this model, we can obtain an upper bound for the power consumption of the wireless network interfaces according to the duration of the communications and the amount of data transfered to and from(More)
In this paper, we investigate the interaction between a network mobility protocol: the network mobility (NEMO) basic support-and a proactive mobile ad hoc network (MANET) routing protocol: the optimized link state routing (OLSR) protocol. We define a proof of concept architecture and build it using actual nodes. We are then able to show how delay can be(More)
In this paper, we show how Mobile IPv6 support for dual stack Hosts and Routers (DSMIPv6) can be used as a very efficient, automatic and autonomous way of network planning as well as a multipurpose mobility solution. Along with the details of the Linux-based implementation, we show the results of measurements made against a test scenario that heavily relies(More)
It is important for both network researchers and operators to know the behavior of mobile nodes (mobile hosts and mobile routers), and to find anomalies in their behavior. This paper describes an ongoing effort within the Nautilus Project to provide a set of free tools to build a statistics repository, called SONAR, containing detailed information of mobile(More)
In this paper, we show a performance evaluation of the frame aggregation mechanism. This mechanism is introduced as a replacement for the power save polling (PSP) mode integrated in the IEEE 802.11 standard (1999). Since it uses bigger frame to achieve lower traffic and overhead, we investigate the consequences of packet loss on power consumption. Using(More)
In this paper we present Tamias, a new distributed storage system. Tamias has identity and privacy at its core and builds upon it to bring fine-grained sharing features, delegation and revocation. It is can be used upon any low-level distributed storage that has full encryption outside the client. An identity is defined by a public-key that is circulated by(More)
In this paper, we attempt to show how to build a collaborative repository for cybersecurity data and threat information by building on top of a privacy-aware storage system: Tamias. We set the following goals: allow data sharing with a very high level of control over the sharing scope, enhance collaboration of entities that may not know each other but deal(More)