The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Welcome to the 21st edition of the International Conference on Network Protocols (ICNP) in Göttingen, Germany. We are pleased you can join us in the historic building of the Mathematical Institute at the Georg-August-University, a place that was the home to pioneers such as David Hilbert, Felix Klein, Emmy Noether and Carl-Friedrich Gauss. At this renowned university where the first telegraph was...
We were able to put together an excellent technical program for ICNP 2013, thanks to the joint efforts by our authors, TPC members, and technical area leads. We received 251 submissions to the main conference this year, the highest number in ICNP's 21-year history. Each paper received at least three reviews, and the 66 technical program committee members produced 765 paper reviews. The 11 area chairs...
As HTTP-based streaming video applications have grown to become a major source of Internet traffic, and as the new ISO standard Dynamic Adaptive Streaming over HTTP (DASH) gains industry acceptance, researchers need the ability to both study real-world viewing data and simulate realistic DASH streams. The first effort is complicated by the fact that network researchers are often restricted to anonymized,...
Packet losses significantly degrade TCP performance in high latency networks. To improve TCP performance in such networks, we proposed two methods to suppress the return of duplicate ACKs and to control minimum redundancy because FEC technology cannot work effectively when simply applied to TCP operation. Simulation evaluations show that the proposed methods enable higher throughput than the conventional...
Decentralized Social Network (DSN) has attracted a lot of research and development interest in recent years. It is believed to be the solution to many problems of centralized services. Due to the data limitation imposed by common decentralized architectures, centralized algorithms that support social networking functions need to be re-designed. In this work, we tackle the problem of community detection...
In this work, we demonstrate the design and implementation of a novel system called Async, which enables a mobile network operator (MNO) to efficiently manage the growth of mobile data. For this, we enable an opportunistic delivery model for the MNOs by leveraging the delay-elastic nature of certain applications such as video downloads, and the price-sensitive nature of certain users. Specifically,...
Understanding and characterizing the properties of vehicular networks has become hugely important because of their wide applications and fast development. Due to the unique property of vehicular networks that nodes change their locations at high speed in anytime, their connectivity is an important and unique property. In this poster, based on realistic vehicular mobility traces, we reveal the opportunistic...
Content-Centric Networking (CCN) provides a complete communication framework for data retrieval and dissemination. It leverages innovative naming, security schemes and novel routing strategies, augmented with caching at intermediate nodes. Content requests are forwarded towards the source(s) by direct use of content names (instead of IP addresses), matching the layout of the Wireless Sensor Network...
This paper investigates the impact of large flows in Content Centric Networks (CCN). In CCN, routers have caches, and store all the data after forwarding. If large flows temporarily occupy a content cache, they may evict popular chunks from the cache, and it results in low cache hit ratio. We mathematically analyzed the amount of occupancy of a large flow in a cache, and realized that a few large...
This paper presents an economic perspective on traffic attraction and countermeasures. The results demonstrate that tier-1, tier-2, and tier-3 networks have significant financial incentives to attract traffic. In comparison to ASes from the lower tiers, the tier-1 networks are in a stronger position to benefit from traffic attraction with respect to: (a) the degree of the attainable gain, (b) impact...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.