A Ternary Unification Framework for Optimizing TCAM-Based Packet Classification Systems
Packet classification is the key mechanism for enabling many networking and security services. Ternary content addressable memory TCAM has been the industrial standard for implementing high-speed packet classification because of its constant ...
Urban-Scale Human Mobility Modeling With Multi-Source Urban Network Data
Expanding our knowledge about human mobility is essential for building efficient wireless protocols and mobile applications. Previous mobility studies have typically been built upon empirical single-source data e.g., cellphone or transit data, which ...
Session-Based Cooperation in Cognitive Radio Networks: A Network-Level Approach
- Haichuan Ding,
- Chi Zhang,
- Xuanheng Li,
- Jianqing Liu,
- Miao Pan,
- Yuguang Fang,
- Shigang Chen,
- Yuguang Fang,
- Chi Zhang,
- Miao Pan,
- Xuanheng Li,
- Jianqing Liu,
- Haichuan Ding,
- Shigang Chen
Currently, the cooperation-based spectrum access in cognitive radio networks CRNs is implemented via cooperative communications based on link-level frame-based cooperative LLC approach, where individual secondary users SUs independently serve as relays ...
Online Scaling of NFV Service Chains Across Geo-Distributed Datacenters
- Yongzheng Jia,
- Chuan Wu,
- Zongpeng Li,
- Franck Le,
- Alex Liu,
- Zongpeng Li,
- Yongzheng Jia,
- Chuan Wu,
- Franck Le,
- Alex Liu
Network Function Virtualization NFV is an emerging paradigm that turns hardware-dependent implementation of network functions i.e., middleboxes into software modules running on virtualized platforms, for significant cost reduction and ease of ...
PHY-Tree: Physical Layer Tree-Based RFID Identification
Tree-based RFID identification adopts a binary-tree structure to collect IDs of an unknown set. Tag IDs locate at the leaf nodes and the reader queries through intermediate tree nodes and converges to these IDs using feedback from tag responses. ...
Optimal Capacity Provisioning for Online Job Allocation With Hard Allocation Ratio Requirement
The problem of allocating jobs to appropriate servers in cloud computing is studied in this paper. We consider that the jobs of various types arrive in some unpredictable pattern and the system is required to allocate a certain ratio of jobs. In order ...
Adaptive Caching Networks With Optimality Guarantees
We study the optimal placement of content over a network of caches, a problem naturally arising in several networking applications. Given a demand of content request rates and paths followed, we wish to determine the content placement that maximizes the ...
Channel-Aware Rate Adaptation for Backscatter Networks
- Wei Gong,
- Haoxiang Liu,
- Jiangchuan Liu,
- Xiaoyi Fan,
- Kebin Liu,
- Qiang Ma,
- Xiaoyu Ji,
- Kebin Liu,
- Jiangchuan Liu,
- Xiaoyi Fan,
- Qiang Ma,
- Haoxiang Liu,
- Wei Gong,
- Xiaoyu Ji
Backscatter communication networks receive much attention recently due to the small size and low power of backscatter nodes. As backscatter communication is often influenced by the dynamic wireless channel quality, rate adaptation becomes necessary. ...
Off-Path TCP Exploits of the Challenge ACK Global Rate Limit
- Yue Cao,
- Zhiyun Qian,
- Zhongjie Wang,
- Tuan Dao,
- Srikanth V. Krishnamurthy,
- Lisa M. Marvel,
- Yue Cao,
- Tuan Dao,
- Lisa M. Marvel,
- Zhongjie Wang,
- Zhiyun Qian,
- Srikanth V. Krishnamurthy
In this paper, we report a subtle yet serious side channel vulnerability CVE-2016-5696 introduced in a recent transmission control protocol TCP specification. The specification is faithfully implemented in Linux kernel version 3.6 from 2012 and beyond, ...
Maximizing Broadcast Throughput Under Ultra-Low-Power Constraints
- Tingjun Chen,
- Javad Ghaderi,
- Dan Rubenstein,
- Gil Zussman,
- Dan Rubenstein,
- Tingjun Chen,
- Javad Ghaderi,
- Gil Zussman
Wireless object-tracking applications are gaining popularity and will soon utilize emerging ultra-low-power device-to-device communication. However, severe energy constraints require much more careful accounting of energy usage than what prior art ...
Accurate Recovery of Internet Traffic Data: A Sequential Tensor Completion Approach
- Kun Xie,
- Lele Wang,
- Xin Wang,
- Gaogang Xie,
- Jigang Wen,
- Guangxing Zhang,
- Jiannong Cao,
- Dafang Zhang,
- Kun Xie,
- Xin Wang,
- Dafang Zhang,
- Jiannong Cao,
- Lele Wang,
- Gaogang Xie,
- Jigang Wen,
- Guangxing Zhang
The inference of traffic volume of the whole network from partial traffic measurements becomes increasingly critical for various network engineering tasks, such as capacity planning and anomaly detection. Previous studies indicate that the matrix ...
Proactive Doppler Shift Compensation in Vehicular Cyber-Physical Systems
In vehicular cyber-physical systems CPS, safety information, including vehicular speed and location information, is shared among vehicles via wireless waves at specific frequency. This helps control vehicle to alleviate traffic congestion and road ...
6LB: Scalable and Application-Aware Load Balancing with Segment Routing
- Yoann Desmouceaux,
- Pierre Pfister,
- Jerome Tollet,
- Mark Townsley,
- Thomas Clausen,
- Jerome Tollet,
- Mark Townsley,
- Yoann Desmouceaux,
- Thomas Clausen,
- Pierre Pfister
Network load-balancers generally either do not take the application state into account, or do so at the cost of a centralized monitoring system. This paper introduces a load-balancer running exclusively within the IP forwarding plane, ı.e., in an ...
Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications
- Anat Bremler-Barr,
- Yotam Harchol,
- David Hay,
- Yacov Hel-Or,
- Yotam Harchol,
- Anat Bremler-Barr,
- David Hay,
- Yacov Hel-Or
We present range encoding with no expansion RENÉ— a novel encoding scheme for short ranges on Ternary content addressable memory TCAM, which, unlike previous solutions, does not impose row expansion, and uses bits proportionally to the maximal range ...
Congestion Avoidance and Load Balancing in Content Placement and Request Redirection for Mobile CDN
With the development of network function virtualization and software-defined network standards, the mobile network operators are interested in integrating content delivery network CDN functionalities into the mobile network to enhance their capability ...
Modeling Compound TCP Over WiFi for IoT
Compound TCP will play a central role in future home WiFi networks supporting Internet of Things IoT applications. Compound TCP was designed to be fair but can manifest throughput unfairness in infrastructure-based IEEE 802.11 networks when devices at ...
Efficient and Flexible Crowdsourcing of Specialized Tasks With Precedence Constraints
- Avhishek Chatterjee,
- Michael Borokhovich,
- Lav R. Varshney,
- Sriram Vishwanath,
- Lav R. Varshney,
- Avhishek Chatterjee,
- Sriram Vishwanath,
- Michael Borokhovich
Many companies now use crowdsourcing to leverage external as well as internal crowds to perform specialized work, and so methods of improving efficiency are critical. Tasks in crowdsourcing systems with specialized work have multiple steps and each step ...
Datum: Managing Data Purchasing and Data Placement in a Geo-Distributed Data Market
This paper studies two design tasks faced by a geo-distributed cloud data market: which data to purchase data purchasing and where to place/replicate the data for delivery data placement. We show that the joint problem of data purchasing and data ...
Greenput: A Power-Saving Algorithm That Achieves Maximum Throughput in Wireless Networks
The dynamic frame sizing algorithm is a throughput-optimal algorithm that can achieve maximum network throughput without the knowledge of arrival rates. Motivated by the need for energy-efficient communication in wireless networks, in this paper, we ...
Efficient Embedding of Scale-Free Graphs in the Hyperbolic Plane
- Thomas Blasius,
- Tobias Friedrich,
- Anton Krohmer,
- Soren Laue,
- Anton Krohmer,
- Soren Laue,
- Tobias Friedrich,
- Thomas Blasius
Hyperbolic geometry appears to be intrinsic in many large real networks. We construct and implement a new maximum likelihood estimation algorithm that embeds scale-free graphs in the hyperbolic space. All previous approaches of similar embedding ...
Enhancing Fault Tolerance and Resource Utilization in Unidirectional Quorum-Based Cycle Routing
Cycle-based optical network routing, whether using synchronous optical networking rings or p-cycles, provides sufficient reliability in the network. Light trails forming a cycle allow broadcasts within a cycle to be used for efficient multicasts. ...
Efficient Loop-Free Rerouting of Multiple SDN Flows
- Arsany Basta,
- Andreas Blenk,
- Szymon Dudycz,
- Arne Ludwig,
- Stefan Schmid,
- Stefan Schmid,
- Szymon Dudycz,
- Andreas Blenk,
- Arne Ludwig,
- Arsany Basta
Computer networks such as the Internet or datacenter networks have become a crucial infrastructure for many critical services. Accordingly, it is important that such networks preserve the correctness criteria, even during transitions from one correct ...
Adaptive Wildcard Rule Cache Management for Software-Defined Networks
Software-Defined Networking enables flexible flow control by caching rules at OpenFlow switches. Wildcard rule caching enables management of traffic aggregates, reduces flow setup queries, and simplifies policy management. However, to guarantee correct ...
TCAM-Based IP Address Lookup Using Longest Suffix Split
Ternary content addressable memory TCAM plays an important role in modern routers due to its capability of performing fast IP address lookup. However, it is expensive, space limited, and a major source of power consumption in a router. In addition, ...
Approximation Algorithms for Sweep Coverage Problem With Multiple Mobile Sensors
Sweep coverage plays an important role in many applications like data gathering, sensing coverage, and devices control. In this paper, we deal with the sweep coverage problem with multiple mobile sensors to periodically cover $n$ targets in the ...
Dynamically Updatable Ternary Segmented Aging Bloom Filter for OpenFlow-Compliant Low-Power Packet Processing
- Sheng-Chun Kao,
- Ding-Yuan Lee,
- Ting-Sheng Chen,
- An-Yeu Wu,
- Sheng-Chun Kao,
- Ding-Yuan Lee,
- An-Yeu Wu,
- Ting-Sheng Chen
OpenFlow, the main protocol for software-defined networking, requires large-sized rule tables and frequent updating. For fast packet processing, rule tables are often implemented with ternary content-addressable memory TCAM in the OpenFlow. To deal with ...
RobLoP: Towards Robust Privacy Preserving Against Location Dependent Attacks in Continuous LBS Queries
With the increasing popularity of location-based services LBS, how to preserve one’s location privacy has become a key issue to be concerned. The commonly used approach $k$ -anonymity, originally designed for protecting a user’s snapshot location ...
Corrections to “A Game Theoretic Distributed Algorithm for FeICIC Optimization in LTE-A HetNets”
- Ye Liu,
- Chung Shue Chen,
- Chi Wan Sung,
- Chandramani Singh,
- Ye Liu,
- Chi Wan Sung,
- Chung Shue Chen,
- Chandramani Singh
In [1], the Acknowledgment section was inadvertently left out of the paper. The Acknowledgment should read as follows:
Subjects
Currently Not Available