The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Distributed Denial-of-Service (DDoS) attacks are one of the major threats the Internet is facing today. The problem of tracing the attackers is particularly difficult since attackers spoof the source addresses. Researchers all over the world have proposed several packet marking based techniques for DDoS attack mitigation using IP Traceback, however even after a decade of active research no commercial...
In mobile ad hoc networks (MANETs), service composition faces severe challenges such as the lack of central server, node mobility and wireless network failure, which are usually not considered in web service composition on Internet. This paper designs and implements an on-demand service composition protocol for MANETs with consideration of quality of service (QoS). Based on the well-known Dynamic...
The separation between edge and core addresses has been proposed to address the scalability problem of the Internet routing system. One main challenge is to design an efficient mapping mechanism for the two address spaces. The layer structure is attractive because of its scalability and simple index mechanism, while existing layered mapping system lacks a clear structure study and faces serious deployment...
As the value of reputation systems is widely recognized, the incentive to manipulate such systems is rapidly growing. We propose TAUCA, a scheme that identifies malicious users and recovers reputation scores from a novel angle: combination of temporal analysis and user correlation analysis. Benefiting from the rich information in the time-domain, TAUCA identifies the products under attack, the time...
While Transmission Control Protocol (TCP) variants with delay-based congestion control (e.g., TCP Vegas) provide low queueing delay and low packet loss, the key problem with their deployment on the Internet is their relative performance when competing with traditional TCP variants with loss-based congestion control (e.g., TCP NewReno). In particular, the more aggressive loss-based flows tend to dominate...
Jitter is recognized as an important phenomenon that degrades the communication performance. Particularly, in real time services such as voice and video over the Internet, there is evidence that jitter departs from already proposed Laplacian models and that it has a heavy tail behavior. In this paper, we show that an Alpha-Stable jitter model is adequate, and that in some cases the Cauchy distribution...
Recently, the Tree-Mesh based Application Layer Multicast (TM-ALM) has emerged as a promising solution for media streaming over the Internet. In TM-ALM, all peers first organize an auxiliary mesh overlay, and then some 'good' peers are identified to explicitly or implicitly construct a tree(s)-based backbone. The great advantage of TM-ALM is that it has more resilient to end-hosts dynamics than tree-based...
Voice over IP is fast emerging as a strong contender to the traditional circuit-switched PSTN networks. Unlike the PSTN network, which requires dedicated lines, VoIP can share the network that is laid out to carry data traffic as well as other traffic categories. Securing VoIP and other real-time traffic is necessary considering the easy ways of hacking communication over internet. Most of the existing...
Peer-to-Peer technology for content distribution on Internet including file sharing, live streaming, video on demand (VoD) has recently attracted significant attentions from academies and industries. Most of P2P applications only support single P2P service without data sharing between different services, such as popular P2P file downloading applications, which usually adopt single-service content...
Providing Video-on-Demand (VoD) service over the Internet remains to be challenging due to the diversity of client requests and the requirement of high bandwidth. Based on the requirements of high-quality video application, in this paper, we present an unstructured Peer-to-Peer (P2P) VoD system with asynchronous data transfer among peers and centralized directory service. Some new algorithms for choosing...
The analysis of QoE and QoS of adaptive real-time applications provides a challenging task in the current Internet. Here, we study major characteristics of Skype user satisfaction. For this purpose we estimate the loss and delivery time variation by inter-arrival times (IAT) between packets and packet lengths (PL) of an individual unidirectional flow. Extremes of the IAT and PLs impact on the QoS...
With the rapid dependency on the Internet for business, and the fast spread of powerful destructive DoS/DDoS attack tools, the detection and thwarting of these attacks is primordial for ISP, enterprises, hosting centers, etc. In this paper, we present the implementation of a new framework, for efficient detection and identification of flooding attacks over high speed links. To accomplish that, we...
Interactive Internet applications that rely on sequential streams for lossless data exchange often use retransmission protocols (e.g. TCP) for reliability and the guarantee of sequential data ordering. More so than for bulk file transfer or media delivery, lossless sequential streaming poses an even greater challenge for the common problem cases of retransmission protocols, such as lossy links or...
Selecting partner candidates for data transferring plays an important role in the P2P (peer-to-peer) media streaming system. Most traditional P2P media streaming systems do not consider the physical network among the peers, while selecting partner candidates according to physical network can reduce the latency of the data transferring and improve the quality of service. Aiming at objectives of P2P...
This paper shows a practical design example of the remote control system of a motorized pan/tilt head we made, and illustrates some experimental results to validate the remote control technique of the previous work. The control technique utilizes an appropriate quantization of feedback signals, transmitted over network communication links, in order to guarantee both stability of the whole system and...
To MIPv6 networks, Identify authentication is an important part of the network security. In this paper, we proposed a secure identify authentication scheme. Which considers inters domain trust relationship between mobile node home domain and the access domain in the pre-handoff procedure and realizes effective mutual authentication between mobile node(MN) and the access domain. Based on the combined...
With the best-effort TCP transporting foreground traffic, below-best-effort transport protocols are developed to transport background traffic. However, we argue in this paper that: 1) two fixed levels of priority are not enough, and 2) the background and foreground transfers are subjective concepts which can only be decided by users but not arbitrarily determined by the network according to the application...
Peer-to-peer (P2P) has recently been employed to deliver large scale video multicast services on the Internet. Considerable efforts have been made by both academia and industry on P2P streaming design. While academia mostly focus on exploring design space to approach the theoretical performance bounds, our recent measurement study on several commercial P2P streaming systems indicates that they are...
In this paper, we propose an adaptive pacing scheme at the link layer for IEEE 802.11 based multihop wireless networks. Our objective is to improve the performance of higher layer protocols without any modifications to them. Our adaptive pacing scheme estimates the four-hop transmission delay in the network path without incurring any additional overheads, and accordingly paces the packets to reduce...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.