The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Peer-to-peer file sharing applications are increasingly popular and they enable users to share various files with high scalability. However, in intermittently connected mobile network environment, existing file sharing systems are hindered by the lack of node stable connectivity and constant network topology change. We propose a social network based file sharing system in mobile P2P networks. It takes...
As part of a project to develop a user-centered network measurement platform that limits impediments to participation, this work focuses on using the execution of a signed Java applet for home network measurement. We have developed a Java applet tool to understand the capabilities of such a tool for measuring characteristics of a user's network environment from the browser. This paper reports on the...
We propose a novel tag selection algorithm to improve the efficiency of tag arbitration in RFID systems. Based on the probability that a given tag is located in the sensing range of the reader, our algorithm involves two steps. First, tags with higher probabilities are selected and directly arbitrated by their IDs, in order to eliminate the collisions caused by multiple tag replies and reduce the...
Computation offloading can extend the battery lifetime of a portable device by migrating computation to grid- powered servers. The server may charge the portable device for the computation performed, thus providing offloading as a service. The portable device has to trust that the server has indeed performed the computation as claimed. We propose a protocol to establish trust for computation offloading...
In this paper, we report our experience in working with network address translators (NATs). Traditionally, there were only 4 types of NATs. For each type, the (im)possibility of traversal is well-known. Recently, the NAT community has provided a deeper dissection of NAT behaviors resulting into at least 27 types and documented the (im)possibility of traversal for some types. There are, however, two...
The use of network-based streaming applications such as YouTube and BBC iPlayer is rapidly increasing. These applications consume data at very high rates and so quality- of-service (QoS) support is necessary to ensure that they do not stall. Since the access pattern of streaming applications is highly sequential, prefetching can be employed to improve overall performance. For network access, clustering...
We analyze two commercial peer-to-peer (P2P) video streaming systems via active measurements: a tree-based overlay multicast and a mesh-based overlay. Our controlled IP test-bed allows us to reproduce near-identical network conditions for both the systems and to test them under varying network conditions and peer behavior. We report on the bandwidth efficiency of these P2P video streaming systems...
In this paper we consider the construction of a large-scale, highly available and secure overlay network to enable mission-critical communication between emergency personnel at a disaster area and their coordinating agencies across the Internet. This network is designed to be secure against network-based failures and external attacks including denial of service (DoS) attacks. We design several protocols...
In this paper, we introduce a novel lightweight anonymization technique called Shalon. It is based on onion routing, aims to reduce complexity, and delivers high bandwidth. We have, compared to the widely known approach Tor, slightly reduced the level of security in favor for greatly increased performance. The most significant advantage compared to other approaches is that Shalon is fully based on...
Digital signatures are mainly used to make the receiver believe that the message was actually sent by the claimed sender. However, since generating digital signatures requires intensive computations, researchers proposed batch signing systems to sign multiple messages at once while having almost the same cost of signing one message. In this paper, we focus on how the batch formation strategies and...
We address the issue of asserting the accuracy of coordinates advertised by nodes of Internet coordinate systems during distance estimations. Indeed, some nodes may lie deliberately about their coordinates to mount various attacks against applications and overlays. Our proposed method consists in two steps: 1) establish the correctness of a node's claimed coordinate (which leverages our previous work...
Internet-based vehicular ad hoc network (IVANET) is an emerging technique that combines a wired Internet and a vehicular ad hoc network (VANET) for providing universal information and service accessibility. A key design optimization technique in IVANETs is to cache the frequently accessed data items in a local storage of vehicles. Since vehicles are not critically limited by the storage/memory space...
Layered streaming is an effective solution to address receiver heterogeneity in a peer-to-peer (P2P) network. This paper addresses the problem of rate allocation for layered video stream in p2p mesh networks. We present a distributed rate allocation algorithm that achieves close to optimal layer allocation among peers receiving the same video. We use load balancing technique that evenly distributes...
"Botnet" is a network of computers that are compromised and controlled by an attacker. Botnets are one of the most serious threats to today's Internet. Most current botnets have centralized command and control (C&C) architecture. However, peer-to-peer (P2P) structured botnets have gradually emerged as a new advanced form of botnets. Without central C&C servers, P2P botnets are more...
In Internet multimedia streaming, a raw quality base layer is adaptively enriched with one or more enhancement layers to fully use the available bandwidth. In this work, using a control theoretic approach, we design and implement an innovative scheduling strategy for properly distributing the network available bandwidth among base and enhancement layers, in order to avoid playout interruptions due...
In this paper, we propose a P2P-based IPTV system using a multiple chain architecture. The proposed system robustly accommodates peer churn. As opposed to the Internet, the IPTV network managed by a single ISP has fewer bandwidth constraints and guarantees stability. Therefore, we emphasize preferentially the robustness of a P2P network in an IPTV environment. A single chain structure, which was proposed...
Wireless mesh networks (WMNs) have emerged recently to extend Internet access and other networking services. WMNs routers provide network access to the clients and other networking functions such as routing, and packet forwarding. Bandwidth scarcity is the main challenge that limits the performance of WMNs. Although considerable research has been conducted on spectrum allocation, spectrum management...
Popular Internet applications deploy a multi-tier architecture, with each tier provisioning a certain functionality to its preceding tier. The session-based admission control approach (SBAC) designed for a single Web server is not effective for a multi-tier architecture. This is due to the fact that the bottleneck in a multi-tier Website dynamically shifts among tiers as client access patterns change...
In a distributed Video-on-Demand system, customers are in charge of storing the video catalog, and they actively participate in serving video requests generated by other customers. The design of such systems is driven by key constraints like customer upload and storage capacities, video popularity distribution, and so on. In this paper, we analyze by simulations the impact of: i) the video allocation...
Ubiquitous Internet connectivity is very important in present environment. A lot of research has been done to extend Internet connectivity to vehicular ad hoc networks (VANETs). The biggest challenge to achieve this goal is the requirement of pervasive fully networked roadside infrastructure. This requirement is difficult to achieve especially during the initial deployment phase of vehicular networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.