9,461 research outputs found
Performance analysis of next generation web access via satellite
Acknowledgements This work was partially funded by the European Union's Horizon 2020 research and innovation programme under grant agreement No. 644334 (NEAT). The views expressed are solely those of the author(s).Peer reviewedPostprin
Delivering Live Multimedia Streams to Mobile Hosts in a Wireless Internet with Multiple Content Aggregators
We consider the distribution of channels of live multimedia content (e.g., radio or TV broadcasts) via multiple content aggregators. In our work, an aggregator receives channels from content sources and redistributes them to a potentially large number of mobile hosts. Each aggregator can offer a channel in various configurations to cater for different wireless links, mobile hosts, and user preferences. As a result, a mobile host can generally choose from different configurations of the same channel offered by multiple alternative aggregators, which may be available through different interfaces (e.g., in a hotspot). A mobile host may need to handoff to another aggregator once it receives a channel. To prevent service disruption, a mobile host may for instance need to handoff to another aggregator when it leaves the subnets that make up its current aggregator�s service area (e.g., a hotspot or a cellular network).\ud
In this paper, we present the design of a system that enables (multi-homed) mobile hosts to seamlessly handoff from one aggregator to another so that they can continue to receive a channel wherever they go. We concentrate on handoffs between aggregators as a result of a mobile host crossing a subnet boundary. As part of the system, we discuss a lightweight application-level protocol that enables mobile hosts to select the aggregator that provides the �best� configuration of a channel. The protocol comes into play when a mobile host begins to receive a channel and when it crosses a subnet boundary while receiving the channel. We show how our protocol can be implemented using the standard IETF session control and description protocols SIP and SDP. The implementation combines SIP and SDP�s offer-answer model in a novel way
InviCloak: An End-to-End Approach to Privacy and Performance in Web Content Distribution
In today's web ecosystem, a website that uses a Content Delivery Network
(CDN) shares its Transport Layer Security (TLS) private key or session key with
the CDN. In this paper, we present the design and implementation of InviCloak,
a system that protects the confidentiality and integrity of a user and a
website's private communications without changing TLS or upgrading a CDN.
InviCloak builds a lightweight but secure and practical key distribution
mechanism using the existing DNS infrastructure to distribute a new public key
associated with a website's domain name. A web client and a website can use the
new key pair to build an encryption channel inside TLS. InviCloak accommodates
the current web ecosystem. A website can deploy InviCloak unilaterally without
a client's involvement to prevent a passive attacker inside a CDN from
eavesdropping on their communications. If a client also installs InviCloak's
browser extension, the client and the website can achieve end-to-end
confidential and untampered communications in the presence of an active
attacker inside a CDN. Our evaluation shows that InviCloak increases the median
page load times (PLTs) of realistic web pages from 2.0s to 2.1s, which is
smaller than the median PLTs (2.8s) of a state-of-the-art TEE-based solution
- …