Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tanguy Pérennou is active.

Publication


Featured researches published by Tanguy Pérennou.


IEEE Transactions on Computers | 1998

A metaobject architecture for fault-tolerant distributed systems: the FRIENDS approach

Jean-Charles Fabre; Tanguy Pérennou

The FRIENDS system developed at LAAS-CNRS is a metalevel architecture providing libraries of metaobjects for fault tolerance, secure communication, and group-based distributed applications. The use of metaobjects provides a nice separation of concerns between mechanisms and applications. Metaobjects can be used transparently by applications and can be composed according to the needs of a given application, a given architecture, and its underlying properties. In FRIENDS, metaobjects are used recursively to add new properties to applications. They are designed using an object oriented design method and implemented on top of basic system services. This paper describes the FRIENDS software-based architecture, the object-oriented development of metaobjects, the experiments that we have done, and summarizes the advantages and drawbacks of a metaobject approach for building fault-tolerant systems.


ieee international symposium on fault tolerant computing | 1995

Implementing fault tolerant applications using reflective object-oriented programming

Jean-Charles Fabre; Vincent Nicomette; Tanguy Pérennou; Robert J. Stroud; Zhixue Wu

Shows how reflection and object-oriented programming can be used to ease the implementation of classical fault tolerance mechanisms in distributed applications. When the underlying runtime system does not provide fault tolerance transparently, classical approaches to implementing fault tolerance mechanisms often imply mixing functional programming with non-functional programming (e.g. error processing mechanisms). The use of reflection improves the transparency of fault tolerance mechanisms to the programmer and more generally provides a clearer separation between functional and non-functional programming. The implementations of some classical replication techniques using a reflective approach are presented in detail and illustrated by several examples, which have been prototyped on a network of Unix workstations. Lessons learnt from our experiments are drawn and future work is discussed.<<ETX>>


Proceedings of the 1st international workshop on System evaluation for mobile platforms | 2007

KauNet: improving reproducibility for wireless and mobile research

Johan Garcia; Emmanuel Conchon; Tanguy Pérennou; Anna Brunstrom

This paper presents the KauNet emulation system that provides pattern-based emulation. KauNet enables bit precise placement of bit-errors, exact and repeatable packet losses, delays and bandwidth variations. The design and performance of KauNet is discussed. An example is also provided of how it can be integrated in a specific emulation framework to enhance emulation for mobile and wireless systems.


Broadband Satellite Comunication Systems | 2004

Two-Stage Wireless Network Emulation

Tanguy Pérennou; Emmanuel Conchon; Laurent Dairaine; Michel Diaz

Testing and deploying mobile wireless networks and applications are very challenging tasks, due to the network size and administration as well as node mobility management. Well known simulation tools provide a more flexible environment but they do not run in real time and they rely on models of the developed system rather than on the system itself. Emulation is a hybrid approach allowing real application and traffic to be run over a simulated network, at the expense of accuracy when the number of nodes is too important. In this paper, emulation is split in two stages: first, the simulation of network conditions is precomputed so that it does not undergo real-time constraints that decrease its accuracy; second, real applications and traffic are run on an emulation platform where the precomputed events are scheduled in soft real-time. This allows the use of accurate models for node mobility, radio signal propagation and communication stacks. An example shows that a simple situation can be simply tested with real applications and traffic while relying on accurate models. The consistency between the simulation results and the emulated conditions is also illustrated.


european dependable computing conference | 1996

Friends - A Flexible Architecture for Implementing Fault Tolerant and Secure Distributed Applications

Jean-Charles Fabre; Tanguy Pérennou

FRIENDS is a software-based architecture for implementing fault-tolerant and, to some extent, secure applications. This architecture is composed of sub-systems and libraries of metaobjects. Transparency and separation of concerns is provided not only to the application programmer but also to the programmers implementing metaobjects for fault tolerance, secure communication and distribution. Common services required for implementing metaobjects are provided by the sub-systems. Metaobjects are implemented using object-oriented techniques and can be reused and customised according to the application needs, the operational environment and its related fault assumptions. Flexibility is increased by a recursive use of metaobjects. Examples and experiments are also described.


Annales Des Télécommunications | 2012

When should I use network emulation

Emmanuel Lochin; Tanguy Pérennou; Laurent Dairaine

The design and development of a complex system requires an adequate methodology and efficient instrumental support in order to early detect and correct anomalies in the functional and non-functional properties of the tested protocols. Among the various tools used to provide experimental support for such developments, network emulation relies on real-time production of impairments on real traffic according to a communication model, either realistically or not. This paper aims at simply presenting to newcomers in network emulation (students, engineers, etc.) basic principles and practices illustrated with a few commonly used tools. The motivation behind is to fill a gap in terms of introductory and pragmatic papers in this domain. The study particularly considers centralized approaches, allowing cheap and easy implementation in the context of research labs or industrial developments. In addition, an architectural model for emulation systems is proposed, defining three complementary levels, namely hardware, impairment, and model levels. With the help of this architectural framework, various existing tools are situated and described. Various approaches for modeling the emulation actions are studied, such as impairment-based scenarios and virtual architectures, real-time discrete simulation, and trace-based systems. Those modeling approaches are described and compared in terms of services, and we study their ability to respond to various designer needs to assess when emulation is needed.


wireless communications and networking conference | 2007

A DCCP Congestion Control Mechanism for Wired-cum-Wireless Environments

Ijaz Haider Naqvi; Tanguy Pérennou

Existing transport protocols, be it TCP, SCTP or DCCP, do not provide an efficient congestion control mechanism for heterogeneous wired-cum-wireless networks. Solutions involving implicit loss discrimination schemes have been proposed but were never implemented. Appropriate mechanisms can dramatically improve bandwidth usage over the Internet, especially for multimedia transport based on partial reliability. In this paper we have implemented and evaluated a congestion control mechanism that implicitly discriminates congestion and wireless losses in the datagram congestion control protocol (DCCP) congestion control identification (CCID) framework. The new CCID was implemented as a NS-2 module. Comparisons were made with the TCP-like CCID and showed that the bandwidth utilization was improved by more than 30% and up to 50% in significant setups.


wireless communications and networking conference | 2007

Improved IP-Level Emulation for Mobile and Wireless Systems

Emmanuel Conchon; Johan Garcia; Tanguy Pérennou; Michel Diaz

More and more applications and protocols are now running on wireless networks. Testing such applications and protocols is a real challenge as the position of the mobile terminals and environmental effects strongly affect the overall performance. Network emulation is often perceived as a good trade-off between experiments on operational wireless networks and discrete-event simulations on Opnet or ns-2. However, ensuring repeatability and realism in network emulation while taking into account mobility in a wireless environment is very difficult. This paper proposes a network emulation architecture based on off-line computations preceding online pattern-based traffic shaping. The underlying concepts of repeatability, dynamicity and accuracy are defined in the emulation context. Three different simple case studies illustrate the validity of our approach with respect to these concepts.


ieee international symposium on intelligent signal processing, | 2009

Opportunistic localization scheme based on Linear Matrix Inequality

Francesco Zorzi; GuoDong Kang; Tanguy Pérennou; Andrea Zanella

Enabling self-localization of mobile nodes is an important problem that has been widely studied in the literature. The general conclusions is that an accurate localization requires either sophisticated hardware (GPS, UWB, ultrasounds transceiver) or a dedicated infrastructure (GSM, WLAN). In this paper we tackle the problem from a different and rather new perspective: we investigate how localization performance can be improved by means of a cooperative and opportunistic data exchange among the nodes. We consider a target node, completely unaware of its own position, and a number of mobile nodes with some self-localization capabilities. When the opportunity occurs, the target node can exchange data with in-range mobile nodes. This opportunistic data exchange is then used by the target node to refine its position estimate by using a technique based on Linear Matrix Inequalities and barycentric algorithm. To investigate the performance of such an opportunistic localization algorithm, we define a simple mathematical model that describes the opportunistic interactions and, then, we run several computer simulations for analyzing the effect of the nodes duty-cycle and of the native self-localization error modeling considered. The results show that the opportunistic interactions can actually improve the self-localization accuracy of a strayed node in many different scenarios.


cross strait quad regional radio science and wireless technology conference | 2011

Mobility model based on social community detection scheme

GuoDong Kang; Michel Diaz; Tanguy Pérennou; Patrick Sénac; Jiadong Xu

In many networks, mobility is used to be a network transport mechanism for distributing data. However, many mobility models are set up based on individual movement case which ignores the fact that peer nodes often carried by people and thus move in community pattern according to some kind of social relation. In this paper, we propose two mobility models based on social community detection scheme which simulate two real movement cases in daily life. This paper also gives the character analysis of these two new mobility models by observing the curves of inter-contact time and contact time.

Collaboration


Dive into the Tanguy Pérennou's collaboration.

Top Co-Authors

Avatar

GuoDong Kang

Northwestern Polytechnical University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Michel Diaz

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Michel Diaz

Centre national de la recherche scientifique

View shared research outputs
Researchain Logo
Decentralizing Knowledge