28,443 research outputs found

    User-space Multipath UDP in Mosh

    Get PDF
    In many network topologies, hosts have multiple IP addresses, and may choose among multiple network paths by selecting the source and destination addresses of the packets that they send. This can happen with multihomed hosts (hosts connected to multiple networks), or in multihomed networks using source-specific routing. A number of efforts have been made to dynamically choose between multiple addresses in order to improve the reliability or the performance of network applications, at the network layer, as in Shim6, or at the transport layer, as in MPTCP. In this paper, we describe our experience of implementing dynamic address selection at the application layer within the Mobile Shell. While our work is specific to Mosh, we hope that it is generic enough to serve as a basis for designing UDP-based multipath applications or even more general APIs

    Are You Still There? - A Lightweight Algorithm to Monitor Node Presence in Self-Configuring Networks

    Get PDF
    This paper is concerned with the analysis and redesign of a distributed algorithm to monitor the availability of nodes in self-configuring networks. The simple scheme to regularly probe a node ¿ "are you still there?" ¿ may easily lead to over- or underloading. The essence of the algorithm is therefore to automatically adapt the probing frequency. We show that a self-adaptive scheme to control the probe load, originally proposed as an extension to the UPnPTM (Universal Plug and Play) standard, leads to an unfair treatment of nodes: some nodes probe fast while others almost starve. An alternative distributed algorithm is proposed that overcomes this problem and that tolerates highly dynamic network topology changes. The algorithm is very simple and can be implemented on large networks of small computing devices such as mobile phones, PDAs, and so on

    Locating a robber with multiple probes

    Get PDF
    We consider a game in which a cop searches for a moving robber on a connected graph using distance probes, which is a slight variation on one introduced by Seager. Carragher, Choi, Delcourt, Erickson and West showed that for any nn-vertex graph GG there is a winning strategy for the cop on the graph G1/mG^{1/m} obtained by replacing each edge of GG by a path of length mm, if mnm\geq n. The present authors showed that, for all but a few small values of nn, this bound may be improved to mn/2m\geq n/2, which is best possible. In this paper we consider the natural extension in which the cop probes a set of kk vertices, rather than a single vertex, at each turn. We consider the relationship between the value of kk required to ensure victory on the original graph and the length of subdivisions required to ensure victory with k=1k=1. We give an asymptotically best-possible linear bound in one direction, but show that in the other direction no subexponential bound holds. We also give a bound on the value of kk for which the cop has a winning strategy on any (possibly infinite) connected graph of maximum degree Δ\Delta, which is best possible up to a factor of (1o(1))(1-o(1)).Comment: 16 pages, 2 figures. Updated to show that Theorem 2 also applies to infinite graphs. Accepted for publication in Discrete Mathematic

    A Comparative Case Study of HTTP Adaptive Streaming Algorithms in Mobile Networks

    Full text link
    HTTP Adaptive Streaming (HAS) techniques are now the dominant solution for video delivery in mobile networks. Over the past few years, several HAS algorithms have been introduced in order to improve user quality-of-experience (QoE) by bit-rate adaptation. Their difference is mainly the required input information, ranging from network characteristics to application-layer parameters such as the playback buffer. Interestingly, despite the recent outburst in scientific papers on the topic, a comprehensive comparative study of the main algorithm classes is still missing. In this paper we provide such comparison by evaluating the performance of the state-of-the-art HAS algorithms per class, based on data from field measurements. We provide a systematic study of the main QoE factors and the impact of the target buffer level. We conclude that this target buffer level is a critical classifier for the studied HAS algorithms. While buffer-based algorithms show superior QoE in most of the cases, their performance may differ at the low target buffer levels of live streaming services. Overall, we believe that our findings provide valuable insight for the design and choice of HAS algorithms according to networks conditions and service requirements.Comment: 6 page

    ‘Probing with the prototype’:using a prototype e-participation platform as a digital cultural probe to investigate youth engagement with the environment

    Get PDF
    This study describes how we used a prototype e-participation plat-form as a digital cultural probe to investigate youth motivation and engagement strategies. This is a novel way of considering digital cultural probes which can contribute to the better creation of e-participation platforms. This probe has been conducted as part of the research project STEP which aims at creating an e-participation platform to engage young European Citizens in environmental decision making. Our probe technique has given an insight into the environ-mental issues concerning young people across Europe as well as possible strat-egies for encouraging participation. How the e-participation platform can be utilised to support youth engagement through opportunities for social interac-tion and leadership is discussed. This study leads to a better understanding of how young people can co-operate with each other to provide collective intelli-gence and how this knowledge could contribute to effective e-participation of young people

    Hybrid Epidemics - A Case Study on Computer Worm Conficker

    Full text link
    Conficker is a computer worm that erupted on the Internet in 2008. It is unique in combining three different spreading strategies: local probing, neighbourhood probing, and global probing. We propose a mathematical model that combines three modes of spreading, local, neighbourhood and global to capture the worm's spreading behaviour. The parameters of the model are inferred directly from network data obtained during the first day of the Conifcker epidemic. The model is then used to explore the trade-off between spreading modes in determining the worm's effectiveness. Our results show that the Conficker epidemic is an example of a critically hybrid epidemic, in which the different modes of spreading in isolation do not lead to successful epidemics. Such hybrid spreading strategies may be used beneficially to provide the most effective strategies for promulgating information across a large population. When used maliciously, however, they can present a dangerous challenge to current internet security protocols

    Talk More Listen Less: Energy-Efficient Neighbor Discovery in Wireless Sensor Networks

    Full text link
    Neighbor discovery is a fundamental service for initialization and managing network dynamics in wireless sensor networks and mobile sensing applications. In this paper, we present a novel design principle named Talk More Listen Less (TMLL) to reduce idle-listening in neighbor discovery protocols by learning the fact that more beacons lead to fewer wakeups. We propose an extended neighbor discovery model for analyzing wakeup schedules in which beacons are not necessarily placed in the wakeup slots. Furthermore, we are the first to consider channel occupancy rate in discovery protocols by introducing a new metric to trade off among duty-cycle, latency and channel occupancy rate. Guided by the TMLL principle, we have designed Nihao, a family of energy-efficient asynchronous neighbor discovery protocols for symmetric and asymmetric cases. We compared Nihao with existing state of the art protocols via analysis and real-world testbed experiments. The result shows that Nihao significantly outperforms the others both in theory and practice.Comment: 9 pages, 14 figures, published in IEEE INFOCOM 201
    corecore