The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Large online video sharing systems are becoming increasingly prevalent among the general public recently. A better understanding of their service usages is crucial for allocating the network resources and adjusting the service design. In this paper, we focus on a leading online video sharing system in China, namely Youku. We collected over 12 billion traffic traces from the network operator, and crawled...
Inter-domain link congestion can be caused by either under-provision or peer disputes. TSLP and M-Lab are two representative network-tomographic methods to detect congestion on inter-domain links. In this work, we propose a performancecost framework to evaluate and compare the two methods via a simulator built atop NS-3. Via detailed simulations, we obtained some insights on the two approaches and...
Multipath (MP) communication is widely used to improve the reliability of communication networks in different domains. With this regard, we have also proposed MP communication to improve communication reliability for cyber-physical systems (CPSs) when using the Internet [1]. More specifically, we proposed using different end-to-end (e2e) paths that use different pairs of Internet service providers...
Recently, as the development of content-centric networking and Telco-CDNs, inter-domain cache sharing has attracted increased attention. With inter-domain cache sharing, ISPs can further reduce transit cost and improve the quality-of-service (QoS) by accessing their neighbors' caching devices. Currently, cache sharing is limited to free-peering ISPs. Enabling eyeball ISPs to share caches with their...
It has become increasingly important for content providers (CPs) to reach consumers with low latency. Peering links that connect CPs directly to access Internet service providers (access ISPs) have been used for this purpose thus providing one-hop AS paths from CPs to users. While providing improved latency, these peering links still do not give CPs control over the entire end-to-end path to their...
the widespread availability of high-speed broadband Internet access brings online-enabled revenue model to gaming industry. However, Today’s Internet does not guarantee a quality level beyond best effort for the majority of applications used by home users. As a consequence, data flows transferred over the Internet can experience bandwidth constraints. At homes, this bandwidth constraint becomes more...
Due to the widespread use of broadband communication media, it is often the case that the conventional TCP cannot fully utilize such broad bandwidth; hence, many improvements on TCP itself and a lot of accelerating methods which use multiple TCP flows have been proposed. In addition, video hosting services on the Internet as a new medium have become popular, and progressive downloading methods, which...
We tackle the problem of a network switch enforcing fair bandwidth sharing of the same link among many TCP-like senders. Most of the mechanisms to solve this problem are based on complex scheduling algorithms, whose feasibility becomes very expensive with today's line rate requirements, i.e. 10–100 Gbit/s per port. We propose a new scheme called FDPA in which we do not modify the scheduler, but instead...
We study engineering and business relationships between Content Providers and broadband access ISPs in various organizational and policy environments. We focus on pricing and capacity decisions for bandwidth and caches for delivery of the CP's content over the “last mile” of the ISP's infrastructure. We model the CP-ISP interaction by the Stackelberg “leader-follower” game and the Integrated Operations...
Crowdsourced signal monitoring systems are gaining attention for capturing the wireless spectrum at large geographical scale. Yet, most of the current systems are still limited to simple power spectrum measurements reported by each sensor. Our objective is to enhance such systems with signal decoding capabilities performed in the backend while retaining the original vision of a low-cost and crowdsourced...
The growing demand for video streaming is straining the Internet, and mandating a fundamental change in future networking paradigms. Current advancements in Information-centric Networks (ICN) promise a novel approach to intrinsically handling content dissemination, caching and retrieval. While streaming technologies are converging towards Dynamic Adaptive Streaming (DAS), in-network caching in ICN...
The task to switch on 100 lights together seems rather easy, but it gets rather difficult when using established TCP/IP transport through bandwidth-restricted controls-RF connections: A convenient “time-to-light” after pushing a button should stay below 0.2 seconds. Without any optimization, the control may easily take more than 10 seconds before the action is completed. This paper addresses the timing...
In this paper we propose the Slot Reservation Announcement (SRA) access scheme to minimize the occurrence of channel-access collisions in infrastructure IEEE 802.11 networks under emergency and crowded scenarios. SRA is based on slot reservation in lieu of a randomized backoff approach to increase the channel-access success ratio. The proposed scheme rids IEEE 802.11-like access networks of throughput...
The Internet of Things leads to the inter-connectivity of a wide range of devices. This heterogeneity of hardware and software poses significant challenges to security. Constrained IoT devices often do not have enough resources to carry the overhead of an intrusion protection system or complex security protocols. A typical initial step in network security is a network scan in order to find vulnerable...
Cloud radio access networks (C-RAN) has been regarded as a promising solution to the next generation communication system, but the massive fronthaul bandwidth required to aggregate baseband samples from remote radio head (RRH) to the baseband unit (BBU) pool has a significant impact on the performance of C-RAN. Existing baseband compression algorithms can hardly solve this problem. So, in this paper...
Among the mobile applications contributing to the surging Internet traffic, video applications are some of the biggest contributors. Most of these video applications use HTTP/HTTPS tunneling making it difficult to apply port based or packet data based identification of flows. This makes it challenging for network operators to enforce bandwidth regulation policies for app based service differentiation...
The scheduling of bulk transfers such as database distribution, resources replication and security backups, and other non-time-critical tasks has a direct effect on both the performance and cost of a network. We propose to face this problem by studying the valley times—i.e., the minimum use during off-peak periods of a network—as suitable moments to carry out such tasks. To do so, we characterize...
User-perceived quality-of-experience (QoE) is critical in Internet video delivery systems. Many previous efforts have studied the design of client-side bitrate adaptation algorithms to maximize single-player QoE. However, multiplayer QoE fairness becomes critical as the growth of video traffic makes it more likely that multiple players share a bottleneck in the network. Despite several recent proposals,...
Network virtualization enables the decoupling of network services from the underlying hardware infrastructure to allow the same Substrate/physical Network (SN) shared by multiple Virtual Network (VN) requests. The process of mapping virtual nodes and links onto a shared SN while satisfying the computing and bandwidth constraints is referred to Virtual Network Embedding (VNE) as an NP-hard problem...
This paper proposes a new QoS-aware forwarding strategy for Named Data Networking. Borrowing techniques from the ant colony optimization, the proposed strategy, which is called Ant colony based QoS-aware forwarding strategy (AC-QoS-FS), makes full use of both forward and backward ants to rank interfaces. Forward and backward ants (Interest and Data packets) probe realtime network QoS parameters to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.