The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today's cloud storage services must offer storage reliability and fast data retrieval for large amount of data without sacrificing storage cost. We present SEARS, a cloud-based storage system which integrates erasure coding and data deduplication to support efficient and reliable data storage with fast user response time. With proper association of data to storage server clusters, SEARS provides flexible...
For all Locator Identity Split protocols to work, a mapping infrastructure is required to maintain the binding between the Locators and Identifiers. However, the mapping infrastructure naturally becomes one of the main scalability concerns when there are a large number of mobile nodes to support. This paper implements and evaluates a tiered architecture in which the mapping infrastructure is divided...
In this paper, we propose CGM-PS, a partial-decentralized, un-starving, work-conservative, and preemptive coflow scheduling scheme to shorten the Coflow Completion Time (CCT) for TCP flows in data center networks (DCNs). In CGMPS, we propose both inter- and intra- coflow scheduling policies. In inter-coflow scheduling, we present P-SEBF, which adopts a connected-graph model based novel concept Partialcoflow,...
While wearable devices are equipped with small battery, the amount of data that they send and receive has already exceeded the capacity of the energy efficient link technologies (e.g., Bluetooth Low Energy). Existing higher capacity link (e.g., Bluetooth Classic, WiFi) however requires high connection setup cost. To deal with this dilemma, we propose to bundle multiple data transmission requests and...
Centralized Online Social Networks (OSNs) have become the main communication channel in both the personal and the business domain. A current trend for developing OSN services is towards the distribution of the social network infrastructure by using P2P architectures as basis for Distributed Online Social Networks (DOSNs). One of the main challenges of DOSNs comes from guaranteeing privacy and protection...
Vehicular networks are a rapidly growing technology with vehicle manufacturers already taking steps for its implementation. However, adding IP services to vehicular networks remains an issue. This is in part due to the mobile IP handover causing overhead and latencies unsuitable for the faster movement of vehicles. Frequent topological changes caused by this movement require smooth IP handovers due...
We present a new delay-based transport protocol named FLOWER, that aims at providing a Lower-than-Best-Effort (LBE) service. The objective is to propose an alternative to the Low Extra Delay Background Transport (LEDBAT) widely deployed within the official BitTorrent client. Indeed, besides its intra-fairness problem, known as latecomer unfairness, LEDBAT can be too aggressive against TCP, making...
Exploiting unique wireless channel characteristics like signal strength for secret key generation has been recently studied by researchers. These schemes are lightweight and suitable for resource constrained wearable devices. However, a major drawback of existing schemes is that the successive channel samples with small sampling interval will have high correlation in time. This reduces the entropy...
Time-dependent applications using TCP often send thin-stream traffic, characterised by small packets and high inter-transmission-times. Retransmissions after packet loss can result in very high delays for such flows as they often cannot trigger fast retransmit. Redundant Data Bundling is a mechanism that preempts the experience of loss for a flow by piggybacking unacknowledged segments with new data...
The purpose of this study is to verify our live video transmission specifications in a real environment. We implemented a high-definition video transmitter that adjusts the video encoding rate according to the physical link status using a cross-layer rate control scheme. The transmitter will be used as reference equipment to practically evaluate the many simulated algorithms, because rate-control...
Overlay networks have been widely deployed upon the Internet to provide improved network services. However, the interaction between overlay and traffic engineering (TE) as well as among co-existing overlays may occur. In this paper, we adopt game theoretic approaches to analyze this hybrid interaction. Firstly, we model a situation of the hybrid interaction as an n+1-player non-cooperative game, where...
Software-defined networking provides new tools and offers more opportunities to actively manage large-scale network setups during runtime. However, controlling such installations in a unified and adaptive manner is inherently complex due to the remarkable diversity of management tools. In this paper we propose ULLA-X, a novel middleware that unifies network monitoring and on-demand reconfiguration...
With the advent of smarter technologies in cellular networks, often the bands used for lower versions remain unoccupied. To utilize that, in this paper, a new paradigm of cognitive radio has been proposed, where the nodes of a self-organized opportunistic ad hoc network act as the secondary users (SU) to use the white spaces of the existing cellular network. Each SU can freely move around, and in...
Applications require connectivity and the network is treated as a black box providing it. Striving to improve this black box, recent research efforts attempt to make the core network more adaptive leveraging new technologies (e.g., software-defined networking). Obviously, any attempt to improve the core network misses out on the first and last hop. Hence, we require solutions that decouple the applications'...
Outsourcing data to the cloud for computation and storage has been on rise in recent years. In this paper we investigate the problem of supporting write operation on the outsourced data for clients using mobile devices. We consider the Attribute-based Encryption (ABE) scheme as it is well suited to support access control in outsourced cloud environment. Currently there is a gap in the literature on...
In this paper, we focus on an application of wireless sensor networks (WSNs) with unmanned aerial vehicle (UAV). The aim of the application is to detect the locations of endangered species in large-scale wildlife areas or monitor movement of animals without any attachment devices. We first define the mathematical model of the animal monitoring problem in terms of the value of information (VoI) and...
We propose a design to aid experimentation with SDN architectures using legacy network equipment. We implement a portion of the design on an FPGA and evaluate throughput and latency. Results indicate viability for testbed and research environments, especially with proposed additions to further reduce latency in broadcast- and multicast-heavy traffic.
Anomalous BGP events can deteriorate Internet performance and connectivity thus have always been a research topic. However, most measurement works in this realm are prone to monitor-local events, namely, the events local to only few BGP monitors. Besides, events that are widely observed can also have negligible impact, e.g., prefix-local events. In contrast, a Large-scale BGP Event (LBE) makes a large...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.