The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For overcoming performance decline caused by current long fat networks, many high performance TCPs have been proposed, such as Compound TCP and CUBIC TCP. These proposals have raised a new issue, which is fairness among these modern TCPs. For this issue, several fairness evaluations and some proposals for improving fairness were published. In our past work, we focused on Controlling Queue Delay (CoDel)...
Video conferences over the Internet with multiple participants have to be wirelessly connected to improve the communication efficiency. However, video conferences are often held in places suffering from crowded wireless medium, such as offices and schools. This leads to many challenges on providing high video conferencing experience. In this paper, we study the problem of video streaming over crowded...
Monitoring ports, harbors and oceanic territories is gaining huge interest especially to combat military crisis, smuggling and terrorist activities. Underwater Wireless Sensor Network can be a viable solution for tracking objects like trespassing ships approaching a harbor and monitoring the activities on the ocean surfaces. In this paper we have proposed a new paradigm for underwater tracking mechanism.
The problem of providing optimal assignment for backend storage is a central problem in the design of cloud systems. It has taken a further central role as a result of growing heterogeneity from emerging Software Defined Storage systems. In this paper, we propose a solution to optimal IO Workload assignment using statistical modelling to estimate measures of performance such as Throughput, IOPS, et...
Software Defined Networking (SDN) is in the process of revolutionizing the way of managing networks by providing a new way to support current and future services. However, by relocating the control functionality in a remote entity, the measurements' accuracy of the resources' utilization becomes more difficult, which complicates the decision making. Although there are previous works focusing on the...
Today's datacenter is shared among various applications with different QoS requirements, which poses a great challenge to deliver low delay transport with high throughput. Most of works address this challenge by reducing the in-network delay, but assumes a negligible local delay. However, we show that this assumption does not hold for a multi-tenant datacenter that a physical machine is shared by...
The patient monitoring through implant medical devices under medical implant communication service (MICS) band has significantly increased due to growing healthcare expenses, an aging population, and successful deployment of wearable home-based medical monitoring in telemedicine. Recent literature lacks the performance evaluation mechanisms and discussion of MICS band in terms of quality of service...
Electroencephalography nowadays is used for diagnosing and monitoring patients, suffering from variety of mental disorders, deceases and other conditions. This challenges technology to provide fast connection with minimum data losses. This paper examines the required network parameters for ensuring all measured brain waves to arrive to the doctors' computer in real-time.
In this work we report the final results of the field demonstration of the European FP7 mPlane project concerning the evaluation of the network performance with particular details regarding the access Quality of Service and traffic monitoring. We show how the proposed and experimented architecture of this measurement plane is fundamental for many future internet evolutions concerning user perception,...
The Controller Area Network (CAN) is a shared medium, priority-based communication protocol, widely used in the automotive industry for interconnecting electrical components. Although allowing messages to take priority over others in accessing the shared medium is naturally desirable for vehicular applications, it also provides a vulnerability for Denial-of-Service (DoS) attacks. This paper studies...
In this paper, we propose Access Point Channel Capacity (ACC) as a Key Performance Indicator (KPI) for Radio Resource Management (RRM) algorithms in 802.11 Wireless Local Area Networks (WLANs). Introducing such a KPI is important especially for performance evaluation of 802.11 WLAN Self Organizing Networks (SON). ACC is a low complexity KPI that provides accurate per-AP estimate of the MAC layer potential...
The periodic sensing requirements in cognitive radios cause interruptions for secondary user (SU) communication. As a result, the throughput of the secondary system during sensing can be very low. In this paper, we propose a monitoring scheme for Orthogonal Frequency Division Multiplexing (OFDM) based cognitive radio which can monitor the spectrum during ongoing communication and detect the emergence...
The collection and aggregation of monitoring data from distributed applications are an extremely important topic. The scale of these applications, such as those designed for Big Data, makes the performance of the services responsible for parsing and aggregating logs a key issue. Logstash is a well-known open source framework for centralizing and parsing both structured and unstructured monitoring...
In this paper, we propose a disaster-aware smart routing scheme for highly-available information storage systems. Our proposed scheme is based on the concept of Symbiotic Computing to recognize disaster status in Real Space, and provides appropriate routes form Digital Space dynamically. This realizes effective data transmission considering disaster situation and its time variation. We have designed...
Causal-based alert correlation is one of the mainstream techniques to detect multi-step threat behaviors. However, because large-scale network generates high-speed alerts and alert type distribution in dataflow changes over time, it is challenging to increase generality, scalability and reduce overhead for causal alert correlation method. In this paper, we propose a novel general, scalable and low-overhead...
By large tsunami damage due to the Great East Japan Earthquake, many existing network system stopped functioning in various factors. Even under such circumstances, some of the information communication method that including satellite communications, it was able to recover the Network Connectivity, actually quickly and effectively. Although there are some valid information communicating method in disaster,...
In this paper, we propose OmniFlow, a novel transport protocol which combines load balancing and flow control at the transport layer to optimize datacenter transfers. OmniFlow outweighs previous solutions in two aspects. Firstly, it can simultaneously and precisely measure the queueing latencies on multiple paths between two hosts. Secondly, OmniFlow adaptively integrates the load balancing and flow...
The widespread deployment of wireless sensor networks (WSNs) in diverse types of applications motivated the development of strong security measures to protect these networks. The main challenge against deploying strong security algorithms is that WSNs suffer from major constraints in terms of power and computing resources. WSNs impose a primary condition on the design stage that requires any protocol...
Mechanisms to detect and analyze malicious software are essential to improve security systems. Current security mechanisms have limited success in detecting sophisticated malicious software. More than to evade analysis system, many malwares require specific conditions to activate their actions in the target system. The flexibility of Software-Defined Networking (SDN) provides an opportunity to develop...
Non-lossy compression can save time and energy during communication if the cost to compress and send input is less than the cost of sending it uncompressed. Unfortunately, compression can also degrade performance, no single method is always beneficial, and outcomes depend on many factors. As a result, compression choices in real systems are coarsely grained and manually controlled, resulting in suboptimal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.