The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent collapses of SIP servers in the real carrier networks indicate that the built-in SIP overload control mechanism cannot mitigate overload effectively. In this paper, we investigate the root cause of SIP server crash by studying the impact of the retransmission on the queuing delay of the overloaded server. The transient overload may introduce the excessive queuing delay, thus triggering unnecessary...
Plug-in electric vehicles (PEVs) will not only have a substantial influence on the emerging smart grid system but also create numerous challenges for the utility and customer to deal with their connections and charging. Authentication and authorization processes are critical elements to enable mass deployment of charging stations and to provide authorized customers to access the charging facility...
Grids can efficiently deal with challenging computational and data processing tasks which cutting edge science is generating today. So-called e-Science grids cope with these complex task by deploying geographically distributed server infrastructure, interconnected by high speed networks. The latter benefit from optical technology, offering low latencies and high bandwidths, thus giving rise to so-called...
Denial of Service (DoS) attacks such as the SIP flooding pose great threats to normal operations of VoIP networks, and can bear various forms to elude detection. In this paper, we address the stealthy SIP flooding attack, where intelligent attackers deliberately increase the flooding rates in a slow pace. As the attack only gradually influences the traffic, it can effectively be disguised from previous...
In this paper, we propose a Progressive Differential Thresholding (PDT) framework for coordinated network anomaly detection. Under the proposed framework, nodes present on a packet's path progressively encode their opinion (malicious or benign) inside a packet. Subsequent nodes on the path use the encoded opinion as side-information to adapt their anomaly detection thresholds and in turn improve their...
Adaptive modulation and coding (AMC) has been widely used to improve the spectral efficiency. In this paper, we take a different look at it from energy saving point of view. Specifically, we analyze the queuing behavior of AMC systems jointly with sleep mode where the wake-up process incurs time and energy cost. We formulate the optimization problem by jointly considering energy-efficiency, queuing...
View-upload decoupling (VUD) has become a novel and effective strategy in balancing the supply and demand of bandwidth resources in peer-to-peer (P2P) live streaming systems. In this paper, we investigate the strategy of migrating the existing VUD design from live streaming to P2P video on-demand (VoD) systems. To address the immediate concern of the huge overhead while applying VUD to P2P VoD, we...
With the rapid advance in the technology area of data storage, storage capacities have increased substantially while the price has been dropping fast. Motivated by this trend, it has been proposed in the Cache-and-Forward architecture that storage is incorporated into each intermediate CNF router. Content can be cached at CNF routers when they flow through the network, and therefore, routers can serve...
The identification of Internet applications is important for ISPs and network administrators to protect the network from unwanted traffic and prioritize some major applications. Statistical methods are widely used since they allow to classify applications according to their statistical signatures. They combine the statistical analysis of flow parameters, such as packet size and inter-packet time,...
Because of marketing demand of user-centric video dissemination, promoting video content via interactive distribution platforms has received considerable attention recently. In addition, the preferences of clients are heterogenous and dynamic, effectively utilizing the network bandwidth to distribute user-centric content becomes a challenging problem, especially when the number of users in the systems...
We present a defense platform against text-based message SPAM on SmartPhones. We focus in particular on Short Message Service (SMS) based SPAM. Our solution relies on a social network based collaborative approach to filter this type of spam using Bloom filters and content hashing. We detail the design of the supporting framework and validate its efficiency in minimizing false positive and limiting...
Since Internet routers are not aware of the contents being forwarded, the same content file is often delivered multiple times inefficiently. Similarly, users cannot exploit a nearby copy of the content of interest unless the content file is serviced by costly content delivery networks. Prior studies on the content-aware routing for efficient content delivery suffer from the scalability problem due...
In this paper, we consider the Request Routing (RR) strategy in the CDN live streaming application. We show that to find an optimal RR strategy is correspond to a static optimization problem if the total number of clients is known in advance. However, this static approach is ineffective due to the difficulty in precisely estimating the number of clients off-line. We then develop the MPS scheduling...
We present energy consumption models of video-on-demand (VoD) services delivered through newly proposed localized hybrid peer-to-peer (P2P) and localized peer-assisted patching with multicast video delivery methods over optical access networks. In this paper, we demonstrate through simulations that the localized peer-assisted patching with multicast video delivery method consumes the lowest network...
In the past few years, we have witnessed a flourish of online social network sites (OSNs). In this kind of websites, the users are not only information consumers, but also actively upload contents of their own to the OSNs. Being sharply different from the conventional sites, OSNs have attracted many studies recently. These studies, however, mainly focus on the social behaviors within OSNs, e.g., the...
We introduce a homogeneous $r$-regular network model for a peer-to-peer (P2P) video broadcast network. Such networks are simple to construct and allow the implementation of fairness strategies. We use our model to show why the greedy and rarest first push-based strategies give the suboptimal performance often observed in the literature. We propose a novel network coding based transmission strategy...
A Key Establishment Protocol for Anonymous Wireless Roaming (KEP-AWR) allows a wireless user such as a Wi-Fi/WiMAX enabled laptop or smartphone to establish a session key with a foreign server and also roam from one foreign network to another in an anonymous way such that besides the involving foreign server and the user's home server, no one can find out who the user is. Most existing KEP-AWR protocols...
BitTorrent has been a very successful peer-to-peer (P2P) file-sharing application, and several BitTorrent-based P2P video streaming systems have been proposed in the literature. Nowadays, network address translation (NAT) has been widely used since it reduces the usage of IP addresses, but it is also considered as a factor that degrades the performance of P2P systems because NAT limits the direction...
One of the most attractive feature of IPTV is the so-called catch-up TV. It allows viewers to watch their favorite TV programs within an expanded time window. In this paper, we emphasize the challenging characteristics of catch-up TV systems that prevent known delivery systems to be used. Then, we formulate the catch-up TV as a multiple-interval graph. Based upon this modeling, we further present...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.