Traditional software and security patch update delivery mechanisms rely on a client/server approach where clients pull updates from servers regularly. This approach, however, suffers a high window of vulnerability (WOV) for clients and... more
Both Mobile Ad Hoc Networks (MANETs) and Peer-to-Peer (P2P) Overlay Networks are decentralized and self-organizing networks with dynamic topology and responsible for routing queries in a distributed environment. Nevertheless, MANETs are... more
We describe a new scalable application-layer multicast protocol, specifically designed for low-bandwidth, data streaming applications with large receiver sets. Our scheme is based upon a hierarchical clustering of the application-layer... more
Researchers are directing enormous efforts to achieve the aim of global mobility by enhancing the standard mobile IP with various routing schemes focusing on best routes and least cost while ignoring the facts of the organizations usual... more
to come to Stanford, and also encouraged me to choose Hector as an advisor. Qi Sun took some of my research in interesting directions that I did not anticipate, and I always enjoyed having philosophical chats with him. Mayank Bawa, Brian
Despite its popularity, relatively little is known about the traffic characteristics of the Skype VoIP system and how they differ from other P2P systems. We describe an experimental study of Skype VoIP traffic conducted over a five month... more
They appeared in our life some years ago with the awakening of the PC and now the are everywhere : computers have become ubiquitous and, almost, irreplaceable. Classical ways of creating, managing and exchanging information have been... more
Adequately supporting applications with Quality-of-service (QoS) requirements is a challenging task, particularly in the Internet. In great part, this is due to the fact that the provisioning of end-toend QoS to traffic that traverses... more
In this work, we have considered a new hierarchical non-DHT based architecture for Peer-to-Peer (P2P) networks in which at each level of the hierarchy existing networks are all structured and each such network has the diameter of 1... more
The present paper proposes an architecture for a pure peer-to-peer communication system that is free from centralized coordination and knowledge. To meet this decentralization requirement the current paper focuses on a novel Overlay... more
A Constraint Resource Planning Algorithm for Deadline Based Packet Forwarding for Overlay Networking
This paper presents a fast near linear run-time algorithm for deadline-satisfying packet forwarding and route lookup. This algorithm has been designed after a Constraint Resource Planning (CRP) methodology of approximation algorithm... more
Although Peer-to-Peer live video streaming over wireless mesh networks (WMNs) is considered a promising technology, some important challenges such as interference, mobility and limited available resources in gadgets (e.g. Smartphones and... more
In recent years, Random Network Coding (RNC) has emerged as a promising solution for efficient Peer-to-Peer (P2P) video multicasting over the Internet. This probably refers to this fact that RNC noticeably increases the error resiliency... more
The scarcity of the radio channel is the main bottleneck toward maintaining the quality of service (QoS) in a mobile cellular network. As channel allocation schemes become more complex and computationally demanding, alternative... more
Computation in the mobile grid nodes under the cellular network environment requires an efficient management of wireless channels along with the user mobility. Due to random movement of the mobile devices, the load over the cells in terms... more
The existing peer-to-peer networks have several problems such as fake content distribution, free riding, white-washing and poor search scalability, lack of a robust trust model and absence of user privacy protection mechanism. Although,... more
One major benefit of named-data networking (NDN) is its potential to control network load by leveraging in-network caching and request aggregation. Both the network operator and consumers benefit from these features, as operating costs... more
creates new opportunities to save costs by converging data and telephone services. The primary question of our study is whether emerging metropolitan networks can meet the QoS requirements necessary to connect GSM and UMTS base stations.... more
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of complete probing can be as high as ¢ ¤£ ¦¥ ¨ § © , which is prohibitive in large- scale overlay networks. Recently we proposed a method... more
This paper describes Service Clouds, a distributed infrastructure designed to facilitate rapid prototyping and deployment of services that enhance communication performance, robustness, and security. The infrastructure combines adaptive... more
In pervasive computing environments, conditions are highly variable and resources are limited. In order to meet the needs of applications, systems must adapt dynamically to changing situations. Since adaptation at one system layer may be... more
Use of multiple paths between node pairs can enable an overlay network to bypass Internet link failures. Selecting high quality primary and backup paths is challenging, however. To maximize communication reliability, an overlay multipath... more
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as ¢ ¤£ ¦¥ ¨ § © , which is prohibitive in large-scale overlay networks. Several methods have been... more
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of complete probing can be as high as ¢ ¤£ ¦¥ ¨ § © , which is prohibitive in large- scale overlay networks. Recently we proposed a method... more
In pervasive computing environments, conditions are highly variable and resources are limited. In order to meet the needs of applications, systems must adapt dynamically to changing situations. Since adaptation at one system layer may be... more
Use of multiple paths between node pairs can enable an overlay network to bypass Internet link failures. Selecting high quality primary and backup paths is challenging, however. To maximize communication reliability, an overlay multipath... more
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as O(n 2 ), which is prohibitive in large-scale overlay networks. Several methods have been proposed to... more
We recently introduced Service Clouds, a distributed infrastructure designed to facilitate rapid prototyping and deployment of autonomic communication services. In this paper, we propose a model that extends Service Clouds to the wireless... more
This paper addresses the problem of mapping software services onto an overlay network, specifically, the probing to locate suitable nodes on which to instantiate or configure data processing operators. We propose a distributed algorithm,... more
This paper describes Service Clouds, a distributed infrastructure designed to facilitate rapid prototyping and deployment of adaptive communication services. The infrastructure combines adaptive middleware functionality with an overlay... more
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as O(n 2 ), which is prohibitive in large-scale overlay networks. Several methods have been proposed to... more
The metrics play increasingly fundamental role in the design, development, deployment and operation of telecommunication systems. Despite their importance, the studies of metrics are usually limited to a narrow area or a well-defined... more
Named Data Networking (NDN), a data-centric enabled-cache architecture, as one of the candidates for the future Internet, has the potential to overcome many of the current Internet difficulties (e.g., security, mobility, multicasting).... more
Big data is developing quickly, combining industrial techniques and scholarly research to address the difficulties of organising and comprehending large-scale datasets. This dissertation investigates how the AMBER software's Molecular... more
In this paper, we introduce a routing solution called "Landmark Overlays for Urban Vehicular Routing Environments" (LOUVRE), an approach that efficiently builds a landmark overlay network on top of an urban topology. We define urban... more
e introduce a routing solution called landmark overlays for urban vehicular routing environments (LOUVRE), an approach that efficiently builds a landmark overlay network on top of an urban topology. We define urban junctions as overlay... more
Multipath overlay routing technologies are seen as alternative solutions for VoIP because they inherit path diversity from peer-to-peer overlay networks. We discuss and compare the performances of two relay path selection approaches... more
The Secure Internet Indirection Infrastructure (Secure-i 3 ) is a proposal for a flexible and secure overlay network that, if universally deployed, would effectively block a number of denial-of-service problems in the Internet. The Host... more
The Secure Internet Indirection Infrastructure (Secure-i 3 ) is a proposal for a flexible and secure overlay network that, if universally deployed, would effectively block a number of denial-of-service problems in the Internet. The Host... more
»The fact that we live in a time when clouds can be calculated in all their randomness thanks to Mandelbrot's fractals and then appear on a screen as calculated, unfilmed images distinguishes the present from any previous time.« (Kittler... more
We propose a new scheme for content distribution of large files that is based on network coding. With network coding, each node of the distribution network is able to generate and transmit encoded blocks of information. The randomization... more
The main goals of fifth generation (5G) systems are to significantly increase the network capacity and to support new 5G service requirements. Ultra network densification with small cells is among the key pillars for 5G evolution. The... more
Peer to peer (P2P) networks have using commonly used for tasks such as file sharing or file distribution, and for building distributed applications in large scale network. Their performance measures are generally based on simulation... more