Massimo Rimondini

Learn More
Network emulators are software environments that closely reproduce the functionalities and the behavior of real world networks. In this paper we describe Netkit, a freely available lightweight network emulator based on User-Mode Linux. Netkit allows users to experiment with a large number of network technologies and provides tools for a straightforward(More)
An emulator is a software or hardware environment that is capable of closely reproducing the functionalities of a real world system. Emulators, especially if implemented in software, are very useful for performing experiments that might compromise the operation of the target system or simply when the real system itself is not available. This is true in(More)
Border Gateway Protocol (BGP) allows providers to express complex routing policies preserving high degrees of autonomy. However, unrestricted routing policies can adversely impact routing stability. A key concept to understand the interplay between autonomy and expressiveness on one side, and stability on the other side, is safety under filtering, i.e.,(More)
We propose new methodologies for the authentication of RFID tags along supply chains, exploiting tags equipped with a Physical Unclonable Function (PUF) device. Unlike state-of-the-art approaches that require sharing a large database of challenge-response pairs (CRPs), we achieve a constant amount of shared secret data, oblivious of the number of CRPs and(More)
For an Internet Service Provider (ISP), the knowledge of which interdomain paths could be traversed by its BGP announcements – and thus traffic flows – is essential to predict the impact of network faults, to develop effective traffic engineering and peering strategies, and to assess the quality of upstream providers. However, current methodologies do not(More)
For an Internet Service provider (ISP), the knowledge of which interdomain paths are traversed by its BGP announcements – and thus traffic flows – is essential to predict the impact of network faults, to perform effective traffic engineering, to develop peering strategies, and to assess the quality of connectivity provided by the ISP’s upstreams. We present(More)
Most routing protocols guarantee convergence to a stable routing state. That is, in the absence of topology or configuration changes, each router will eventually find a stable route to any destination. However, this is not the case for policy-based routing protocols, for example, the BGP protocol used as a <i>de facto</i> standard for interdomain routing. (More)
We describe an on-line service, and its underlying methodology, designed to extract BGP peerings from the Internet Routing Registry. Both the method and the service are based on: a consistency manager for integrating information across different registries, an RPSL analyzer that extracts peering specifications from RPSL objects, and a peering classifier(More)
Internet Service Providers can enforce a fine-grained control of Interdomain Routing by cleverly configuring the Border Gateway Protocol. However, the price to pay for the flexibility of BGP is the lack of convergence guarantees. The literature on network protocol design introduced several sufficient conditions that routing policies should satisfy to(More)