No abstract available.
Proceeding Downloads
Constructing Multiple Steiner Trees for Software-Defined Networking Multicast
A heuristic algorithm is proposed in this paper to construct a set of Steiner trees for multicast with multiple sources under the software-defined networking (SDN) architecture, where each source is associated with a group of receivers. It is based on ...
Detecting Network Topology and Packet Trajectory with SDN-enabled FPGA Platform
Software-defined networking brings extra complexity to debugging while enhancing network manageability. The competition between applications and subtle bugs in controllers or switches may cause inconformity between control plane logic and data plane ...
An Easy Defense Mechanism Against Botnet-based DDoS Flooding Attack Originated in SDN Environment Using sFlow
As today's networks become larger and more complex, the Distributed Denial of Service (DDoS) flooding attack threats may not only come from the outside of networks but also from inside, such as cloud computing network where exists multiple tenants ...
Performance Evaluation of TCP Congestion Control Algorithms in Data Center Networks
TCP congestion control has been known for its crucial role in stabilizing the Internet and preventing congestion collapses. However, with the rapid advancement in networking technologies, resulting in the emergence of challenging network environments ...
Energy-Efficient Localization and Tracking on Smartphones: Design Principle and Solutions
In recent years, various location based services (LBS) have witnessed great development and are being prevalently used in our life. However, as the foundation of various LBS applications, localization consumes large energy of resource-constraint mobile ...
RBAS: A Real-Time User Behavior Analysis System for Internet TV in Cloud Computing
The characteristic of Internet TV user behavior is quite essential for designers to optimize resource schedule and improve user experience. With the rapid development of Internet, both Internet TV users and STB (set top boxes) models are booming. This ...
Optimized Root Selection Algorithm for Many-to-Many Communications in ICN
Information-centric networking (ICN) is a promising framework providing data through their names. It is expected that ICN will provide many-to-many communications enabling the efficient content sharing. To provide such many-to-many communications, ...
Spray and Hop Distance Routing Protocol in Multiple-island DTN Scenarios
Especially in rural areas, a high-speed but high-cost data communication infrastructure is not always available. In such conditions, a store-carry-and-forward-based message relaying over existing vehicle networks is a promising approach to delivery of ...
Directed-Propagation Link-State Routing Protocol for Information-Centric Networks
This paper presents the design of Directed-Propagation Link-State Routing Protocol (DPLSR), which tries to address the issue of prefix flooding storm in NDN Link-state Routing Protocol. Since the number of data object is several order of magnitude of ...
Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key
In order to enable intrinsic security without the Public Key Infrastructure (PKI) deployment, flat self-certifying addresses have been involved into the future Internet architecture (FIA) designs. In contrast to deriving a self-certifying address from ...
Verification of a Multi-Domain Authentication and Authorization Infrastructure Yamata-no-Orochi
Yamata-no-Orochi is an authentication and authorization infrastructure across multiple service domains and provides Internet services with unified authentication and authorization mechanisms. In this paper, Yamata-no-Orochi is incorporated into a video ...
Detecting Compromised Email Accounts from the Perspective of Graph Topology
While email plays a growingly important role on the Internet, we are faced with more severe challenges brought by compromised email accounts, especially for the administrators of institutional email service providers. Inspired by the previous experience ...
Protecting DNS services from IP spoofing: SDN collaborative authentication approach
As DNS packet are mostly UDP-based, make it as a perfect tool for hackers to launch a well-known type of distributed denial of service (DDoS). The purpose of this attack is to saturate the DNS server availability and resources. This type of attack ...
Flo-v: Low Overhead Network Monitoring Framework in Virtualized Software Defined Networks
Network virtualization involves creating multiple virtual networks within a physical network, based on the flexible network environment of software-defined networking (SDN). In a virtualized SDN (vSDN), a network hypervisor plays a key role in ...
Implementing a Dynamically Reconfigurable Wireless Mesh Network Testbed for Multi-Faceted QoS Support
Various mobile applications require different QoS requirements, thus there is a need to resolve the application requirement into the underlying mesh network to support them. Existing approach to coordinate the application traffic requirement to ...
Efficient Matching Algorithm for Content-based Publish/Subscribe Systems with Compound Predicates
Publish/Subscribe paradigm has been widely used in large-scale distributed systems, as well as in information-centric networks (ICNs) due to its properties of asynchronous, loosely-coupled and many-to-many communications. This paper focuses on matching ...
Enabling Fast Recovery from Unanticipated Data Access Failure in Named Data Networking
We show that an aggregated Interest in Named Data Networking (NDN) may fail to retrieve desired data as the Interest sent upstream in advance is recognized as a duplicate one due to its multipath forwarding and dropped by an upstream node. Furthermore, ...
Quantifying the Flattening of Internet Topology
As the Internet grows, the Internet service providers (ISPs) and content providers tend to be more densely connected to the Internet to improve performance and redundancy, which leads to a flattening of the Internet topology at the autonomous system (AS)...
Deployment and Evaluation of Software-Defined Inter-Connections for Multi-domain Federated SDN-Cloud
In this paper, we describe an on-going experimental effort to inter-connect and federate distributed SDN-cloud resources that are spread over separate administrative domains. The proposed Software-Defined Inter-Connections utilizes the mixture of tunnel-...