User-perceived quality-of-experience (QoE) is critical in Internet video applications as it impacts revenues for content providers and delivery systems. Given that there is little support in the ...network for optimizing such measures, bottlenecks could occur anywhere in the delivery system. Consequently, a robust bitrate adaptation algorithm in client-side players is critical to ensure good user experience. Previous studies have shown key limitations of state-of-art commercial solutions and proposed a range of heuristic fixes. Despite the emergence of several proposals, there is still a distinct lack of consensus on: (1) How best to design this client-side bitrate adaptation logic (e.g., use rate estimates vs. buffer occupancy); (2) How well specific classes of approaches will perform under diverse operating regimes (e.g., high throughput variability); or (3) How do they actually balance different QoE objectives (e.g., startup delay vs. rebuffering). To this end, this paper makes three key technical contributions. First, to bring some rigor to this space, we develop a principled control-theoretic model to reason about a broad spectrum of strategies. Second, we propose a novel model predictive control algorithm that can optimally combine throughput and buffer occupancy information to outperform traditional approaches. Third, we present a practical implementation in a reference video player to validate our approach using realistic trace-driven emulations.
The QUIC Transport Protocol Langley, Adam; Riddoch, Alistair; Wilk, Alyssa ...
Proceedings of the Conference of the ACM Special Interest Group on Data Communication,
08/2017
Conference Proceeding
Odprti dostop
We present our experience with QUIC, an encrypted, multiplexed, and low-latency transport protocol designed from the ground up to improve transport performance for HTTPS traffic and to enable rapid ...deployment and continued evolution of transport mechanisms. QUIC has been globally deployed at Google on thousands of servers and is used to serve traffic to a range of clients including a widely-used web browser (Chrome) and a popular mobile video streaming app (YouTube). We estimate that 7% of Internet traffic is now QUIC. We describe our motivations for developing a new transport, the principles that guided our design, the Internet-scale process that we used to perform iterative experiments on QUIC, performance improvements seen by our various services, and our experience deploying QUIC globally. We also share lessons about transport design and the Internet ecosystem that we learned from our deployment.
Due to the ability to simultaneously interrogate multiple tags with a far operating distance, radio frequency identification (RFID) has been widely used in modern farms to improve management ...efficiency. In smart farm applications, how to quickly locate and search some specified items (e.g., animals) is a critical problem, for which tag searching can be used to solve the problem. While there are some works on tag searching, they are designed for static objects and cannot meet the time efficiency requirements where the searched animals’ movement brings challenges. In this paper, we propose SHIR, an efficient tag-searching protocol based on historical information reasoning, which can be applied in scenarios containing mobile tags that cannot be well handles in existing tag search protocols. By continuously counting the difference between the predicted reply signal and the actual signal received from tags for multiple rounds, SHIR avoids the waste of time slots and achieves high time efficiency. Furthermore, it can infer unverified tag status through historical information to speed up the search process. We further propose the Enhanced SHIR (ESHIR) protocol by filtering out the interference tags in the query area to avoid wasting time verifying interference tags. Compared with previous probabilistic approaches, SHIR gets accurate search results with no false positives. Extensive experimental results show that our best protocol can improve the time efficiency by up to 42% compared with the the-state-of-art solution.
Legacy congestion controls including TCP and its variants are known to perform poorly over cellular networks due to highly variable capacities over short time scales, self-inflicted packet delays, ...and packet losses unrelated to congestion. To cope with these challenges, we present Verus, an end-to-end congestion control protocol that uses delay measurements to react quickly to the capacity changes in cellular networks without explicitly attempting to predict the cellular channel dynamics. The key idea of Verus is to continuously learn a delay profile that captures the relationship between end-to-end packet delay and outstanding window size over short epochs and uses this relationship to increment or decrement the window size based on the observed short-term packet delay variations. While the delay-based control is primarily for congestion avoidance, Verus uses standard TCP features including multiplicative decrease upon packet loss and slow start. Through a combination of simulations, empirical evaluations using cellular network traces, and real-world evaluations against standard TCP flavors and state of the art protocols like Sprout, we show that Verus outperforms these protocols in cellular channels. In comparison to TCP Cubic, Verus achieves an order of magnitude (> 10x) reduction in delay over 3G and LTE networks while achieving comparable throughput (sometimes marginally higher). In comparison to Sprout, Verus achieves up to 30% higher throughput in rapidly changing cellular networks.
Spectrum Sharing Papadias, Constantinos B; Ratnarajah, Tharmalingam; Slock, Dirk T. M
2020, 2020-03-26, 2020-04-06
eBook
Combines the latest trends in spectrum sharing, both from a research and a standards/regulation/experimental standpoint Written by noted professionals from academia, industry, and research labs, this ...unique book provides a comprehensive treatment of the principles and architectures for spectrum sharing in order to help with the existing and future spectrum crunch issues. It presents readers with the most current standardization trends, including CEPT / CEE, eLSA, CBRS, MulteFire, LTE-Unlicensed (LTE-U), LTE WLAN integration with Internet Protocol security tunnel (LWIP), and LTE/Wi-Fi aggregation (LWA), and offers substantial trials and experimental results, as well as system-level performance evaluation results. The book also includes a chapter focusing on spectrum policy reinforcement and another on the economics of spectrum sharing. Beginning with the historic form of cognitive radio, Spectrum Sharing: The Next Frontier in Wireless Networks continues with current standardized forms of spectrum sharing, and reviews all of the technical ingredients that may arise in spectrum sharing approaches. It also looks at policy and implementation aspects and ponders the future of the field. White spaces and data base-assisted spectrum sharing are discussed, as well as the licensed shared access approach and cooperative communication techniques. The book also covers reciprocity-based beam forming techniques for spectrum sharing in MIMO networks; resource allocation for shared spectrum networks; large scale wireless spectrum monitoring; and much more. Contains all the latest standardization trends, such as CEPT / ECC, eLSA, CBRS, MulteFire, LTE-Unlicensed (LTE-U), LTE WLAN integration with Internet Protocol security tunnel (LWIP) and LTE/Wi-Fi aggregation (LWA) Presents a number of emerging technologies for future spectrum sharing (collaborative sensing, cooperative communication, reciprocity-based beamforming, etc.), as well as novel spectrum sharing paradigms (e.g. in full duplex and radar systems) Includes substantial trials and experimental results, as well as system-level performance evaluation results Contains a dedicated chapter on spectrum policy reinforcement and one on the economics of spectrum sharing Edited by experts in the field, and featuring contributions by respected professionals in the field world wide Spectrum Sharing: The Next Frontier in Wireless Networks is highly recommended for graduate students and researchers working in the areas of wireless communications and signal processing engineering. It would also benefit radio communications engineers and practitioners.
Scalability is one of the main roadblocks to business adoption of blockchain systems. Despite recent intensive research on using sharding techniques to enhance the scalability of blockchain systems, ...existing solutions do not efficiently address cross-shard transactions. In this paper, we introduce SharPer, a scalable permissioned blockchain system. In SharPer, nodes are clustered and each data shard is replicated on the nodes of a cluster. SharPer supports networks consisting of either crash-only or Byzantine nodes. In SharPer, the blockchain ledger is formed as a directed acyclic graph and each cluster maintains only a view of the ledger. SharPer incorporates decentralized flattened protocols to establish cross-shard consensus. The decentralized nature of the cross-shard consensus in SharPer enables parallel processing of transactions with nonoverlapping clusters. Furthermore, SharPer provides deterministic safety guarantees. The experimental results reveal the efficiency of SharPer in terms of performance and scalability especially in workloads with a low percentage of cross-shard transactions.
On Ends-to-Ends Encryption Cohn-Gordon, Katriel; Cremers, Cas; Garratt, Luke ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
10/2018
Conference Proceeding
Odprti dostop
In the past few years secure messaging has become mainstream, with over a billion active users of end-to-end encryption protocols such as Signal. The Signal Protocol provides a strong property called ...post-compromise security to its users. However, it turns out that many of its implementations provide, without notification, a weaker property for group messaging: an adversary who compromises a single group member can read and inject messages indefinitely. We show for the first time that post-compromise security can be achieved in realistic, asynchronous group messaging systems. We present a design called Asynchronous Ratcheting Trees (ART), which uses tree-based Diffie-Hellman key exchange to allow a group of users to derive a shared symmetric key even if no two are ever online at the same time. ART scales to groups containing thousands of members, while still providing provable security guarantees. It has seen significant interest from industry, and forms the basis for two draft IETF RFCs and a chartered working group. Our results show that strong security guarantees for group messaging are practically achievable in a modern setting.
Trading structure for randomness in wireless opportunistic routing Chachulski, Szymon; Jennings, Michael; Katti, Sachin ...
Applications, Technologies, Architectures, and Protocols for Computer Communication: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications : Kyoto, Japan; 27-31 Aug. 2007,
08/2007
Conference Proceeding
Odprti dostop
Opportunistic routing is a recent technique that achieves high throughput in the face of lossy wireless links. The current opportunistic routing protocol, ExOR, ties the MAC with routing, imposing a ...strict schedule on routers' access to the medium. Although the scheduler delivers opportunistic gains, it misses some of the inherent features of the 802.11 MAC. For example, it prevents spatial reuse and thus may underutilize the wireless medium. It also eliminates the layering abstraction, making the protocol less amenable to extensions to alternate traffic types such as multicast.
This paper presents MORE, a MAC-independent opportunistic routing protocol. MORE randomly mixes packets before forwarding them. This randomness ensures that routers that hear the same transmission do not forward the same packets. Thus, MORE needs no special scheduler to coordinate routers and can run directly on top of 802.11. Experimental results from a 20-node wireless testbed show that MORE's median unicast throughput is 22% higher than ExOR, and the gains rise to 45% over ExOR when there is a chance of spatial reuse. For multicast, MORE's gains increase with the number of destinations, and are 35-200% greater than ExOR.
In delay tolerant network (DTN), an end-to-end path is not guaranteed and packets are delivered from a source node to a destination node via store-carry-forward based routing. In DTN, a source node ...or an intermediate node stores packets in buffer and carries them while it moves around. These packets are forwarded to other nodes based on predefined criteria and finally are delivered to a destination node via multiple hops. In this paper, we improve the dissemination speed of PRoPHET (probability routing protocol using history of encounters and transitivity) protocol by employing epidemic protocol for disseminating message m , if forwarding counter and hop counter values are smaller than or equal to the threshold values. The performance of the proposed protocol was analyzed from the aspect of delivery probability, average delay, and overhead ratio. Numerical results show that the proposed protocol can improve the delivery probability, average delay, and overhead ratio of PRoPHET protocol by appropriately selecting the threshold forwarding counter and threshold hop counter values.
Vehicular Ad Hoc Networks (VANET) constitute a promising technology for Intelligent Transport Systems (ITS). VANET are highly dynamic in their nature because of the movements of vehicles, which are ...acting as nodes. The routing protocol must be designed for dealing with multiple limiting conditions, like link failures, handoffs, and long congestion periods, which is very challenging. The survey of different routing protocols in VANET provides a significant information for building smart ITS. Accordingly, the present survey is devoted to the existing distinct multipath routing protocols. This review article provides a detailed account on 50 research papers, presenting the different kinds of multipath routing protocols, namely proactive routing protocols, ad-hoc-based routing protocols, Greedy Perimeter Stateless Routing (GPSR), hybrid routing protocols, as well as geographic routing protocols. Besides the classification and cursory description, the present study addresses also several of the important parameters, like evaluation metrics, implementation tool, publication year, datasets utilized, Peak Signal to Noise Ratio (PSNR), and packet end-to-end delay with respect to various techniques considered. Eventually, the research gaps and issues of various multipath routing protocols are presented with the intention of pointing out directions for future research. Keywords: multipath routing protocols, Peak Signal to Noise Ratio, geographic routing protocols, Vehicular Ad Hoc Networks, proactive routing protocol.