{"title":"Architecture and Incentive Design of Integrated Cellular and Disruption Tolerant Networks","authors":"B. Chen, M. Chan","doi":"10.1109/INFCOMW.2009.5072114","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072114","url":null,"abstract":"The most common and seamless way of getting Internet access today for vehicles is through the use of cellular network, for example, GPRS, 3G or HSDPA. Even though performance of cellular network has improved significantly over the years, in particular with deployment of HSDPA, the data rate is still limited, due to the requirement of providing ubiquitous coverage to a large number of users. Meanwhile, many cities around the world have witnessed large scale deployment of open IEEE 802.11 or WiFi hot spots. While the WiFi link provides higher bandwidth at cheaper price, it is only usable when the vehicle is in range, and the contact is both fleeting and intermittent. In comparison, while the speed of cellular link is lower than WiFi, it has higher availability. In this paper, the architecture and incentive design of integrated cellular and disruption tolerant networks are discussed.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126577148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power Control of High Speed Network Interconnects in Data Centers","authors":"K. Kant","doi":"10.1109/INFCOMW.2009.5072177","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072177","url":null,"abstract":"With continuing speed increases of communication links found both inside and outside the servers in a data center, link power management is becoming an important issue. In this paper we examine width control of such links and show that it provides substantial benefits over other methods for latency sensitive applications. The paper also presents the design of a specific width control algorithm called DWCA (dynamic width control algorithm) that is effective and easily implemented in hardware at high data rates.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134620059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring Graph-Based Network Traffic Monitoring","authors":"Marios Iliofotou","doi":"10.1109/INFCOMW.2009.5072143","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072143","url":null,"abstract":"Monitoring network traffic and classifying applications are essential functions for network administrators. These tasks are becoming increasingly challenging since (a) many applications obfuscate their traffic using nonstandard ports, and (b) new applications constantly appear. This suggests the need for a behavioral-based approach, where the detector looks for fundamental behaviors of the application that are both intrinsic to the application and distinct from normal traffic. Identifying intrinsic behaviors makes it difficult for application writers to disguise such behaviors without defeating the very purpose of the application. In this paper, we propose a graph-based representation of network traffic which captures the network-wide interactions of applications. In these graphs, nodes are individual IP address and edges between nodes represent particular communications. For example, an edge might represent the exchange of a single packet, or the exchange of at least ten packets of any type. We call such graphs \"Traffic Dispersion Graphs\" or TDGs [3]. As a proof of concept we show that our proposed graph-based classifier out-perfoms BLINC [4] in detecting P2P traffic on backbone links. Our results are very promising, showing that TDGs can provide the basis for the next generation of network monitoring tools.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117336330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing the DVB-SH FEC Scheme for Efficient Erasure Recovery","authors":"M. A. Ismail, T. Turletti, W. Dabbous","doi":"10.1109/INFCOMW.2009.5072174","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072174","url":null,"abstract":"DVB-SH is a new broadcasting standard offering a mobile TV service for handheld devices using hybrid satellite/terrestrial-repeaters solution. A new link layer protection algorithm called Multi-Burst Sliding Encoding (MBSE) has been recently adopted to cope with the long fading time introduced by the direct satellite link. This paper presents a method to optimize the MBSE parameters and an analysis of the performance gain. Various sets of parameters are studied and optimized with respect to the link performance. Furthemore, an algorithm was provided to compute the optimum values of the MBSE parameters according to some constraints. we have implemented MBSE in two UDcast DVB-SH equipements and we have validated our optimization method using intensive experiments with typical usage scenarios under a hardware-emulated wireless link.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115163131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Streaming Multimedia Contents to Nomadic Users in Ubiquitous Computing Environments","authors":"R. Bolla, S. Mangialardi, R. Rapuzzi, M. Repetto","doi":"10.1109/INFCOMW.2009.5072193","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072193","url":null,"abstract":"Streaming of multimedia data is a common application in today's Internet. The trend towards ubiquitous computing raises expectations from the users about enjoying multimedia contents everywhere and with any device. However, current protocols for streaming data (e.g., RTSP) have not been designed for this purpose, thus they fail in providing the user with a transparent and seamless media experience in nomadic life. \u0000 \u0000In this paper we propose a framework for multimedia delivery and adaptation in mobile environments.We introduce the concept of Personal Address (PA), which is a network address associated to the user instead of a network interface; the proposed framework works at the network layer; it moves the PA among networks and devices to deliver media in a seamless and transparent way.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115501581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaofei Wang, Wei Lin, Yi Tang, Ashwin Lall, B. Liu, Xiaojun Wang
{"title":"A Scalable Bloom Filter Based Prefilter and Hardware-Oriented Predispatcher","authors":"Xiaofei Wang, Wei Lin, Yi Tang, Ashwin Lall, B. Liu, Xiaojun Wang","doi":"10.1109/INFCOMW.2009.5072103","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072103","url":null,"abstract":"Presented in this paper a scalable bloom filter based prefilter and a hardware-oriented predispatcher pattern matching mechanism for content filtering applications, which are scalable in terms of speed, the number of patterns and the pattern length. Prefilter algorithm is based on a memory efficient multi-hashing data structure called bloom filter. According to the statistics of simulations, the filter ratio can reach up to 60% if the whole engine has been trained well. It has been showed that this engine could enhance the capabilities of general-purpose IDS solutions.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124862710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Joint Approach to Routing Metrics and Rate Adaptation in Wireless Mesh Networks","authors":"D. Passos, C. Albuquerque","doi":"10.1109/INFCOMW.2009.5072097","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072097","url":null,"abstract":"This work proposes MARA, a joint method for automatic rate selection and route quality evaluation in Wireless Mesh Networks. This method targets at avoiding the problem of inaccurate link quality estimates, common to main existing proposals of multi-hop wireless routing metrics. In this proposal, the statistics collected by the routing protocol are used by the rate adaptation algorithm to compute the best rate for each wireless link. This coordinated decision aims at providing better routing and rate choices. Simulation results indicate that MARA leads to an overall improvement in network performance.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123413704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High-Speed Memory-Efficient Network Intrusion Detection System","authors":"Wei Lin, Xiaofei Wang, Yaxuan Qi, D. Pao, B. Liu","doi":"10.1109/INFCOMW.2009.5072152","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072152","url":null,"abstract":"In this paper, two-stage NIDS architecture is proposed, which aims to both increase the throughput and reduce memory cost. The contributions of this work are listed below.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122744240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a Robust Pollution Control Mechanism for P2P File Sharing Systems","authors":"Flavio Santos, L. Gaspary, M. Barcellos","doi":"10.1109/INFCOMW.2009.5072198","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072198","url":null,"abstract":"BitTorrent seems to be the most popular peer-to-peer (P2P) protocol in file sharing communities. Such communities are exposed to content pollution attacks (i.e., dissemination of corrupted files, viruses or other malware), which require a moderation effort from their administrators. The complexity of such a cumbersome task increases as the publishing rate of the disseminated content grows. A recent work showed that anti-P2P companies have aggressively attempted to perform a variety of these attacks against file sharing communities [2]. We investigate a novel strategy to fight pollution and how to apply it to BitTorrent.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123993147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sunghoon Seo, Joo-Seok Song, Haitao Wu, Yongguang Zhang
{"title":"Throughput-Based MAC Layer Handoff in WLAN","authors":"Sunghoon Seo, Joo-Seok Song, Haitao Wu, Yongguang Zhang","doi":"10.1109/INFCOMW.2009.5072197","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072197","url":null,"abstract":"We propose a MAC layer handoff mechanism for IEEE 802.11 WLAN to give benefit to bandwidth-greedy applications at STAs. In order to find an optimal AP, we investigate a new measurement method called TFC (Transient Frame Capture) to estimate the achievable throughput from APs. Since TFC is employed under promiscuous mode, it avoids service degradation through the current associated AP. In addition, the mechanism is a client-only solution which does not require any modification on APs. We develop an analytic model for the throughput estimation and demonstrate it through experimental studies.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125273307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}