Mesh Based Multicast Routing in MANET Stable Link Based Approach

The group-oriented services are one of the primary application classes that are addressed by mobile ad hoc networks (MANETs) in recent years.
Continue Reading

Host-to-Host Congestion Control for TCP

The Transmission Control Protocol (TCP) carries most Internet traffic, so performance of the Internet depends to a great extent on how well TCP works.
Continue Reading

Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks

Multicast traffic over the Internet is growing steadily with increasing number of demanding applications including Internet broadcasting, video conferences, data stream applications and web-content distributions.
Continue Reading

PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems.

A declarative SQL-like language and a middleware infrastructure are presented for collecting data from different nodes of a pervasive system.
Continue Reading

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks

A distributed adaptive opportunistic routing scheme for multihop wireless ad-hoc networks is proposed. The proposed scheme utilizes a reinforcement learning framework to opportunistically route the packets even in the absence of reliable knowledge about channel statistics and network model.
Continue Reading

Cut Detection in Wireless Sensor Networks

A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a cut. We consider the problem of detecting cuts by the remaining nodes of a wireless sensor network.
Continue Reading

Always Acyclic Distributed Path Computation.

Distributed routing algorithms may give rise to transient loops during path recomputation, which can pose significant stability problems in high-speed networks. Distributed Path Computation with Intermediate Variables (DIV)
Continue Reading

Distributed Explicit Rate Schemes in Multi-Input-Multi-Output Network

With the ever-increasing wireless/wired data applications recently, considerable efforts have focused on the design of distributed explicit rate flow control schemes for multi-input-multi-output service.
Continue Reading

Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems.

Reservation-based (as opposed to contention-based) channel access in WLANs provides predictable and deterministic transmission and is therefore able to provide timeliness guarantees for wireless and embedded real-time applications.
Continue Reading

Channel Allocation in Wireless Data Center Networks.

Unbalanced traffic demands of different data center applications are an important issue in designing Data center network (DCNs).
Continue Reading

Buffer sizing for 802.11 Based Networks.

We consider the sizing of network buffers in IEEE 802.11-based networks. Wireless networks face a number of fundamental issues that do not arise in wired networks.
Continue Reading

Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks.

We analyze the delay performance of a multi-hop wireless network in which the routes between source-destination pairs are fixed.
Continue Reading

ProgME: Towards Programmable Network Measurement.

Traffic measurement provide critical input for a wide range of network management applications, including traffic engineering, accounting, and security analysis. Requirements and/or traffic conditions.
Continue Reading

SPAF: Stateless FSA-based Packet Filters.

Stateless packet filtering technique based on finite-state automata (FSA). FSAs provide a comprehensive framework with well-defined compostion operations that enable the generation of stateless filters from high-level specifications.
Continue Reading

Selfish Overlay Network Creation and Maintenance.

A foundational issue underlying many overlay network applications ranging from routing to peer-to-peer file sharing is that of the network formation, i.e., folding new arrivals into an existing overlay, and rewiring to cope with changing network conditions.
Continue Reading

Security Architecture for Cloud Networking

Cloud computing offers reduced capital expenditure, operational risks, complexity and maintenance, and increased scalability while providing services at different abstraction levels, namely Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS).
Continue Reading

Packet Loss Control Using Tokens at the Network Edge

A series of protocols have been introduced to supplement the insufficient TCP mechanism controlling the network congestion.
Continue Reading

An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System

Peer-to-peer overlay networks are widely used in distributed systems. P2P networks can be divided into two categories: structured peer-to-peer networks in which peers are connected by a regular topology, and unstructured peer-to-peer networks in which the topology is arbitrary.

Continue Reading

Game-Theoretic Pricing for Video Streaming in Mobile Networks

Mobile phones are among the most popular consumer devices, and the recent developments of 3G networks and smart phones enable users to watch video programs by subscribing data plans from service providers.
Continue Reading

Optimizing Cloud Resources for Delivering IPTV Services through Virtualization

Virtualized cloud-based services can take advantage of statistical multiplexing across applications to yield significant cost savings.
Continue Reading

Privacy- and Integrity-Preserving Range Queries in Sensor Networks

The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries.
Continue Reading