2010 2nd International Conference on Evolving Internet最新文献

筛选
英文 中文
A Probabilistic Marking Scheme for Fast Traceback 一种快速追溯的概率标记方案
2010 2nd International Conference on Evolving Internet Pub Date : 2010-09-20 DOI: 10.1109/INTERNET.2010.32
Hongcheng Tian, J. Bi, Xiaoke Jiang, Wei Zhang
{"title":"A Probabilistic Marking Scheme for Fast Traceback","authors":"Hongcheng Tian, J. Bi, Xiaoke Jiang, Wei Zhang","doi":"10.1109/INTERNET.2010.32","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.32","url":null,"abstract":"For existing probabilistic marking technologies for IP traceback, such as Probabilistic Packet Marking (PPM), TTL-based Packet Marking (TPM) and Dynamic Probabilistic Packet Marking (DPPM), it is difficult to reconstruct attack path(s) fast and defend against spoofed marks. In this paper, we present Adaptive Probabilistic Marking scheme (APM), where the TTL value of each packet is set to a uniform number at the first-hop router, and each router deduces the distance that each packet has already traveled, and then adaptively marks the packet with the probability inversely proportional to the distance. We theoretically prove that, in APM, the victim requires the fewest packets for a successful traceback, the effect of spoofed marks can be eliminated. NS2 experiments show, in APM, the time for the victim to collect all the obligatory marks for the path reconstruction is reduced by more than 20% compared with existing schemes, and spoofed marks cannot reach the victim.","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115877010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Impact of Packet Loss on the Perceived Video Quality 丢包对感知视频质量的影响
2010 2nd International Conference on Evolving Internet Pub Date : 2010-09-20 DOI: 10.1109/INTERNET.2010.51
Qin-yun Dai, R. Lehnert
{"title":"Impact of Packet Loss on the Perceived Video Quality","authors":"Qin-yun Dai, R. Lehnert","doi":"10.1109/INTERNET.2010.51","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.51","url":null,"abstract":"Recently, there is an increasing popularity of video streaming services over IP networks, e.g., IPTV, whose successes strongly depend on the video quality experienced by the end users. However, the QoE/QoSE (Quality of Experience/Quality of Service Experienced) of these services can be strongly degraded due to the packet losses during the video delivery. On the other side, to understand how packet loss impacts the video quality is essentially for the ISPs to optimize their network design and engineering. In this paper we present our experimental results for evaluating the MPEG-4 video quality in the presence of packet losses. Our results show that a single packet loss in an I-frame can already result in a video impairment and significantly degrade the video quality. We evaluate the impact of single packet loss with different frequencies as well as loss distances within a short period. We found that more than two times single-losses in a short period will lead the video quality to be unacceptable. We proposed a logistic function which can be used to well predict the degradation of the video perceptual quality with increased packet losses in I-frame. Furthermore, we also found that the loss distance can strongly influence the video perceived quality.","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126605219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Randomness Quality of CI Chaotic Generators: Applications to Internet Security CI混沌发生器的随机质量:在互联网安全中的应用
2010 2nd International Conference on Evolving Internet Pub Date : 2010-09-20 DOI: 10.1109/INTERNET.2010.30
J. Bahi, Xiaole Fang, C. Guyeux, Qianxue Wang
{"title":"Randomness Quality of CI Chaotic Generators: Applications to Internet Security","authors":"J. Bahi, Xiaole Fang, C. Guyeux, Qianxue Wang","doi":"10.1109/INTERNET.2010.30","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.30","url":null,"abstract":"Due to the rapid development of the Internet in recent years, the need to find new tools to reinforce trust and security through the Internet has became a major concern. The discovery of new pseudo-random number generators with a strong level of security is thus becoming a hot topic, because numerous cryptosystems and data hiding schemes are directly dependent on the quality of these generators. At the conference Internet`09, we have described a generator based on chaotic iterations, which behaves chaotically as defined by Devaney. In this paper, the proposal is to improve the speed and the security of this generator, to make its use more relevant in the Internet security context. To do so, a comparative study between various generators is carried out and statistical results are given. Finally, an application in the information hiding framework is presented, to give an illustrative example of the use of such a generator in the Internet security field.","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"22 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124086377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
On the Impact of Operative Systems Choice in End-User Bandwidth Evaluation: Testing and Analysis in a Metro-Access Network 终端用户带宽评估中操作系统选择的影响:城域接入网的测试与分析
2010 2nd International Conference on Evolving Internet Pub Date : 2010-09-20 DOI: 10.1109/INTERNET.2010.38
A. D. Grosso, L. Rea, P. Bolletta, A. Valenti, Angelo Maria Luisi
{"title":"On the Impact of Operative Systems Choice in End-User Bandwidth Evaluation: Testing and Analysis in a Metro-Access Network","authors":"A. D. Grosso, L. Rea, P. Bolletta, A. Valenti, Angelo Maria Luisi","doi":"10.1109/INTERNET.2010.38","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.38","url":null,"abstract":"In this work, we apply an accredited standard technique for end-user bandwidth evaluation in an ADSL access scenario and show that the choice of operating system has a critical impact on performances. In particular, our end-to-end File Transfer Protocol (FTP)-based bandwidth measurements point out the strong impact of TCP (Transmission Control Protocol) implementation. As a consequence, a testing scenario needs to be described not only according to the physical parameters, but also paying attention to software implementation factors that could affect the testing results.","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133923927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Providing an User Centric Always Best Connection 提供以用户为中心的最佳连接
2010 2nd International Conference on Evolving Internet Pub Date : 2010-09-20 DOI: 10.1109/INTERNET.2010.23
J. Schumacher, Martin Dobler, Eileen Dillon, G. Power, M. Fiedler, D. Erman, Karel De Vogeleer, Manuel Oritz Ramos, J. Argente
{"title":"Providing an User Centric Always Best Connection","authors":"J. Schumacher, Martin Dobler, Eileen Dillon, G. Power, M. Fiedler, D. Erman, Karel De Vogeleer, Manuel Oritz Ramos, J. Argente","doi":"10.1109/INTERNET.2010.23","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.23","url":null,"abstract":"Although Quality of Experience (QoE) is perceived as a subjective measure of a user’s experience, it is the only measure that actually counts to a user of a service. It is essential to identify, quantify and ultimately improve the perception of QoE for a user. The PERIMETER project improves the user’s experience by identifying a more user-centric network selection, based on QoE calculations and user preferences. PERIMETER defines a generic QoE model which forms the basis for QoE signalling and QoE based content adaptation support. This paper provides an insight into how user centric seamless mobility is being achieved by PERIMETER, beginning with an explanation of QoE and the need for preferences. Next, more details of the complete system, including QoE management, user feedback and the final delivery, are provided. Finally, an outlook is given on PERIMETER’s future plans and its contributions to research in the Future Internet.","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129532586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Multicast TV Channels over Wireless Neutral Access Networks 无线中立接入网上的多播电视频道
2010 2nd International Conference on Evolving Internet Pub Date : 2010-09-20 DOI: 10.1109/INTERNET.2010.34
Andrea Seraghiti, L. Klopfenstein, S. Bonino, A. Tarasconi, A. Bogliolo
{"title":"Multicast TV Channels over Wireless Neutral Access Networks","authors":"Andrea Seraghiti, L. Klopfenstein, S. Bonino, A. Tarasconi, A. Bogliolo","doi":"10.1109/INTERNET.2010.34","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.34","url":null,"abstract":"IP Television (IPTV) is commonly considered to be the killer application for next-generation networks (NGNs). There is, however, a chicken and egg situation between the deployment of broadband access networks and the diffusion of high quality multimedia services, such as high definition television, which actually impairs the development of NGNs. As a matter of fact, most existing access infrastructures are still under-provisioned and they provide no suitable support to the widespread diffusion of global Internet TV channels, while wireless access networks are sprouting worldwide to provide nomadic connectivity and to bridge digital divide in sparsely populated regions. In this scenario, IPTV services are delivered only within the walled gardens of biggest wireline operators and they are far away from reaching the critical mass required to attract investments in NGNs. This paper proposes technological and architectural solutions which enable the widespread diffusion of Internet TV channels over existing wireless access networks, thus overcoming the deadlock between services and infrastructures and paving the way to NGNs. In particular, the paper addresses both technological and market issues and presents the results of a real-world experiment conducted within the wireless campus of the University of Urbino.","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121140982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reducing Power Consumption of Subscriber Stations in WiMAX Networks 降低WiMAX网络中用户站的功耗
2010 2nd International Conference on Evolving Internet Pub Date : 2010-09-20 DOI: 10.1109/INTERNET.2010.50
Umut Akyol
{"title":"Reducing Power Consumption of Subscriber Stations in WiMAX Networks","authors":"Umut Akyol","doi":"10.1109/INTERNET.2010.50","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.50","url":null,"abstract":"WiMAX (IEEE 802.16e) is a broadband wireless technology for fixed and mobile wireless connectivity and has potential applications in public safety networks. In this paper, we study such a network in which speed-violation cameras use WiMAX technology to upload images of the violators. The speed-violation cameras are solar powered but use batteries for supplemental power. Extending the battery life of such devices by minimizing power consumption is often an important requirement. The WiMAX standard offers two approaches that can be employed to reduce power consumption: the use of power saving features and the use of relay stations (IEEE 802.16j). In this paper, we evaluate and compare the two approaches for reducing subscriber station power consumption in mobile WiMAX networks using the modeling and simulation environment in OPNET Modeler® Wireless Suite. Power consumed due to packet transmission and device operation can be independently impacted while using different WiMAX features. This paper compares results across different design configurations exhibiting different levels of power consumption while using power saving mode, relay stations, and combination of both.","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131942252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Improved Watermarking Scheme for Internet Applications 一种改进的互联网应用水印方案
2010 2nd International Conference on Evolving Internet Pub Date : 2010-09-20 DOI: 10.1109/INTERNET.2010.29
C. Guyeux, J. Bahi
{"title":"An Improved Watermarking Scheme for Internet Applications","authors":"C. Guyeux, J. Bahi","doi":"10.1109/INTERNET.2010.29","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.29","url":null,"abstract":"In this paper, a data hiding scheme ready for Internet applications is proposed. An existing scheme based on chaotic iterations is improved, to respond to some major Internet security concerns, such as digital rights management, communication over hidden channels, and social search engines. By using Reed Solomon error correcting codes and wavelets domain, we show that this data hiding scheme can be improved to solve issues and requirements raised by these Internet fields.","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"12 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120918944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Studying MANET through a Petri Net-Based Model 基于Petri网模型的MANET研究
2010 2nd International Conference on Evolving Internet Pub Date : 2010-09-20 DOI: 10.1109/INTERNET.2010.44
A. Bianchi, S. Pizzutilo
{"title":"Studying MANET through a Petri Net-Based Model","authors":"A. Bianchi, S. Pizzutilo","doi":"10.1109/INTERNET.2010.44","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.44","url":null,"abstract":"Several problems related to communication among Mobile Ad-hoc NETworks (MANETs) devices can be faced making use of formal models. Among these, Petri Nets are particularly suitable for modeling dynamic and transitional systems. The tool DEMONE models the behavior of each host in a MANET through a Petri Nets extension, so that it allows the analysis of some interesting computational activities and the study of performance of the modeled MANET.","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121378862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Improving Virtual Machine Migration in Federated Cloud Environments 改进联邦云环境中的虚拟机迁移
2010 2nd International Conference on Evolving Internet Pub Date : 2010-09-20 DOI: 10.1109/INTERNET.2010.20
A. Celesti, F. Tusa, M. Villari, A. Puliafito
{"title":"Improving Virtual Machine Migration in Federated Cloud Environments","authors":"A. Celesti, F. Tusa, M. Villari, A. Puliafito","doi":"10.1109/INTERNET.2010.20","DOIUrl":"https://doi.org/10.1109/INTERNET.2010.20","url":null,"abstract":"Cloud federation is the future of the cloud computing. In such new emerging scenarios, the \"hot\" and \"cold\" migration imply the movement of a virtual machine disk-image from a server placed in a cloud provider to a server placed in another one, with a consequent consumption of bandwidth and cloud resources. This paper aims to reduce such costs proposing a Composed Image Cloning (CIC) methodology. Our approach does not consider the disk-image of a VM as a single monolithic block, but as a combination between \"composable\" and \"user data\" blocks. Since the former may be cloned locally in the destination clouds, the amount of data which have to be transferred may be reduced. In order to test our strategy we implemented a real test bed extending the OpenQRM platform. Experiments show the validity of the proposed approach in large-scale federated cloud environments, where the amount of data transferred significantly reduces when the number of live migrations increases.","PeriodicalId":155572,"journal":{"name":"2010 2nd International Conference on Evolving Internet","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128011040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信