Fit a compact spread estimator in small high-speed memory
The spread of a source host is the number of distinct destinations that it has sent packets to during a measurement period. A spread estimator is a software/hardware module on a router that inspects the arrival packets and estimates the spread of each ...
Throughput-competitive advance reservation with bounded path dispersion
In response to the high throughput needs of grid and cloud computing applications, several production networks have recently started to support advance reservation of dedicated circuits. An important open problem within this context is to devise advance ...
Cross-layer designs in coded wireless fading networks with multicast
A cross-layer design along with an optimal resource allocation framework is formulated for wireless fading networks, where the nodes are allowed to perform network coding. The aim is to jointly optimize end-to-end transport-layer rates, network code ...
Bilateral and multilateral exchanges for peer-assisted content distribution
Users of the BitTorrent file-sharing protocol and its variants are incentivized to contribute their upload capacity in a bilateral manner: Downloading is possible in return for uploading to the same user. An alternative is to use multilateral exchange ...
On routing and transmission-range determination of multi-bit-rate signals over mixed-line-rate WDM optical networks for carrier ethernet
Ethernet's success in local area networks (LANs) is fueling the efforts to extend its reach to cover metro and long-haul networks. This new Ethernet is refereed to as Carrier Ethernet. Among the various transport infrastructures for realizing Carrier ...
On dynamic server provisioning in multichannel P2P live streaming
To guarantee the streaming quality in live peer-to-peer (P2P) streaming channels, it is preferable to provision adequate levels of upload capacities at dedicated streaming servers, compensating for peer instability and time-varying peer upload bandwidth ...
Minimum maximum-degree publish-subscribe overlay network design
Designing an overlay network for publish/subscribe communication in a system where nodes may subscribe to many different topics of interest is of fundamental importance. For scalability and efficiency, it is important to keep the degree of the nodes in ...
Minimum data-latency-bound k-sink placement problem in wireless sensor networks
In this paper, we propose a new multiple-sink positioning problem in wireless sensor networks to best support real-time applications. We formally define this problem as the k-Sink Placement Problem (k-SPP) and prove that it is APX-complete. We show that ...
Delay and capacity tradeoff analysis for motioncast
In this paper, we define multicast for an ad hoc network through nodes' mobility as MotionCast and study the delay and capacity tradeoffs for it. Assuming nodes move according to an independently and identically distributed (i.i.d.) pattern and each ...
Efficient network-coding-based opportunistic routing through cumulative coded acknowledgments
The use of random linear network coding (NC) has significantly simplified the design of opportunistic routing (OR) protocols by removing the need of coordination among forwarding nodes for avoiding duplicate transmissions. However, NC-based OR protocols ...
A refined performance characterization of longest-queue-first policy in wireless networks
One of the major challenges in wireless networking is how to optimize the link scheduling decisions under interference constraints. Recently, a few algorithms have been introduced to address the problem. However, solving the problem to optimality for ...
A network activity classification schema and its application to scan detection
Internet traffic is neither well-behaved nor well-understood, which makes it difficult to detect malicious activities such as scanning. A large portion of scanning activity is of a slow scan type and is not currently detectable by security appliances. ...
Design and implementation of a fast dynamic packet filter
This paper presents Swift, a packet filter for high-performance packet capture on commercial off-the-shelf hardware. The key features of the Swift include: 1) extremely lowfilter update latency for dynamic packet filtering, and 2) gigabits-per-second ...
Twelve years in the evolution of the internet ecosystem
Our goal is to understand the evolution of the autonomous system (AS) ecosystem over the last 12 years. Instead of focusing on abstract topological properties, we classify ASs into a number of types depending on their function and business type. ...
Detecting communities in sparse MANETs
In sparse mobile ad hoc networks, placement of services and data is crucial to assure their availability to all nodes because sparse population of nodes can lead to (frequent) network partitions. If these dynamic networks display a fairly stable cluster ...
Defending against distance cheating in link-weighted application-layer multicast
Application-layer multicast (ALM) has recently emerged as a promising solution for diverse group-oriented applications. Unlike dedicated routers in IP multicast, the autonomous end-hosts are generally unreliable and even selfish. A strategic host might ...
Distributed delay-power control algorithms for bandwidth sharing in wireless networks
In this paper, we formulate a delay-power control (DPC) scheme for wireless networking, which efficiently balances delay against transmitter power on each wireless link. The DPC scheme is scalable, as each link autonomously updates its power based on ...
Achieving MAC-layer fairness in CSMA/CA networks
We demonstrate that CSMA/CA networks, including IEEE 802.11 networks, exhibit severe fairness problem in many scenarios, where some hosts obtain most of the channel's bandwidth while others starve. Most existing solutions require nodes to overhear ...
A simple critical-load-based CAC scheme for IEEE 802.11 DCF networks
This paper proposes a simple and practical call admission control (CAC) scheme for one-hop IEEE 802.11 distributed coordination function (DCF) networks in heterogeneous environments. The proposed scheme is the first CAC scheme derived from an asymptotic ...
A new estimation scheme for the effective number of users in internet congestion control
Many congestion control protocols have been recently proposed in order to alleviate the problems encountered by TCP in high-speed networks and wireless links. Protocols utilizing an architecture that is in the same spirit as the ABR service in ATM ...
Interference analysis for highly directional 60-GHz mesh networks: the case for rethinking medium access control
We investigate spatial interference statistics for multigigabit outdoor mesh networks operating in the unlicensed 60-GHz "millimeter (mm) wave" band. The links in such networks are highly directional: Because of the small carrier wavelength (an order of ...
Provider-customer coalitional games
Efficacy of commercial wireless networks can be substantially enhanced through large-scale cooperation among involved entities such as providers and customers. The success of such cooperation is contingent upon the design of judicious resource ...
On the feasibility and efficacy of protection routing in IP networks
With network components increasingly reliable, routing is playing an ever greater role in determining network reliability. This has spurred much activity in improving routing stability and reaction to failures and rekindled interest in centralized ...
Humans and bots in internet chat: measurement, analysis, and automated classification
The abuse of chat services by automated programs, known as chat bots, poses a serious threat to Internet users. Chat bots target popular chat networks to distribute spam and malware. In this paper, we first conduct a series of measurements on a large0 ...