Yannick Carlinet

Learn More
The Internet heavily relies on Content Distribution Networks and transparent caches to cope with the ever-increasing traffic demand of users. Content, however, is essentially versatile: once published at a given time, its popularity vanishes over time. All requests for a given document are then concentrated between the publishing time and an effective(More)
Active network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, inhomogeneous processing can be applied to network traffic. To use such technology safely and efficiently, individual nodes must provide mechanisms to enforce resource limits. This implies that each node must(More)
Active Network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, nonhomogeneous processing can be applied to network traffic associated with services, flows, or even individual packets. To use such a technology safely and efficiently, individual nodes must provide mechanisms(More)
Caching P2P content could be an effective way of alleviating network usage, thereby reducing operation costs for operators. However, cache performances are affected by a lot of factors related to the cache itself, but also to the properties of the P2P overlay, the P2P contents, and the cache deployment location. In order to evaluate the potential usefulness(More)
The growth of User-Generated Content (UGC) traffic makes the understanding of its nature a priority for network operators, content providers and equipment suppliers. In this paper, we study a four-month dataset that logs all video requests to DailyMotion made by a fixed subset of users. We were able to infer user sessions from raw data, to propose a(More)
Epidemiology, the science that studies the cause and propagation of diseases, provides us with the concepts and methods to analyze the potential risk factors to which ADSL customers' PCs are exposed, with respect to their usage of network applications. This paper details the analysis of the traffic of a large set of real ADSL customers in the corenet work.(More)
High-profile web servers often become the victim of web server overload Distributed Denial-of-Service (DDoS) attacks. Motivations of such attacks range from technical challenge (e.g. script kiddies) to financial profit (e.g. blackmailing the web server’s owner). This paper presents the DIADEM Firewall architecture that allows an ISP to protect its customers(More)
Active Network technology envisions deployment of virtual execution environments within network elements, so that nonhomogeneous processing can be applied to network traffic. For management purposes, each node must have a meaningful understanding of resource requirements in terms of bandwidth, memory, and processing. To express the processing requirements(More)
Peer-To-Peer (P2P) traffic represents a significant proportion of the traffic today. However, currently widespread P2P systems take no account of the underlying network infrastructure. But by doing so, they would be able to perform a much more efficient peer selection. The P4P approach aims at allowing ISPs to cooperate with peers in order to improve their(More)