Event Category: In-house Presentation

FakeDetector: A measurement-based tool to get rid out of fake content in your BitTorrent Downloads

Fake content represents an important portion of those files shared in BitTorrent. In this paper we conduct a large scale measurement study in order to analyse the fake content publishing phenomenon in the BitTorrent Ecosystem. Our results reveal that a few tens of users are responsible for 90% of the fake content. Furthermore, more than 99% of the analysed fake files are linked to either malware or scam websites. This creates a serious thread for the BitTorrent ecosystem. To address this issue, we present a new detection tool named FakeDetector that may prevent the download of almost 10 millions of fake files per year based on our evaluation. This could help to reduce the number of computer infections and scams suffered by BitTorrent users.

Seguir leyendo arrow_right_alt

Where are my followers? Understanding the Locality Effect in Twitter

Twitter is one of the most used applications in the current Internet with more than 200M accounts created so far. As other large-scale systems Twitter can obtain benefit by exploiting the Locality effect existing among its users. In this paper we perform the first comprehensive study of the Locality effect of Twitter. For this purpose we have collected the geographical location of around 1M Twitter users and 16M of their followers. Our results demonstrate that language and cultural characteristics determine the level of Locality expected for different countries.

Seguir leyendo arrow_right_alt

Explicitly Accommodating Origin Preference for Inter-Domain Traffic Engineering

Inter-domain traffic engineering is an important aspect of network operation both technically and economically. Traffic engineering the outbound direction is less problematic as routers under the control of the network operator are responsible for the way traffic leaves the network. The inbound direction is considerably harder as the way traffic enters a network is based on routing decisions in other networks.

Seguir leyendo arrow_right_alt

Bounds on QoS-Constrained Energy Savings in Cellular Access Networks with Sleep Modes

Sleep modes are emerging as a promising technique for energy-efficient networking: by adequately putting to sleep and waking up network resources according to traffic demands, proportionality between energy consumption and network utilization can be approached, with important reductions in energy consumption. Previous studies have investigated and evaluated sleep modes for wireless access networks, computing variable percentages of energy savings.

Seguir leyendo arrow_right_alt

Distributed Opportunistic Scheduling: A Control Theoretic Approach

Distributed Opportunistic Scheduling (DOS) techniques have been recently proposed to improve the throughput performance of wireless networks. With DOS, each station contends for the channel with a certain access probability. If a contention is successful, the station measures the channel conditions and transmits in case the channel quality is above a certain threshold.

Seguir leyendo arrow_right_alt

CIPT: Using Tuangou to Reduce IP Transit Costs

A majority of ISPs (Internet Service Providers) support connectivity to the entire Internet by transiting their traffic via other providers. Although the transit prices per Mbps decline steadily, the overall transit costs of these ISPs remain high or even increase, due to the traffic growth. The discontent of the ISPs with the high transit costs has yielded notable innovations such as peering, content distribution networks, multicast, and peer-to-peer localization.

Seguir leyendo arrow_right_alt

An Economic Side-Effect for Prefix Deaggregation

The injection of artificially fragmented prefixes through BGP is a widely used traffic engineering technique. In this paper we examine one particular economic side-effect of deaggregation, namely the impact on the transit traffic bill. We show that the use of more-specific prefixes has a traffic stabilization side-effect which translates into a decrease of the transit traffic bill. We propose an analytical model in order to quantify the impact of deaggregation on the transit costs. We validate our results by means of simulations and through the extensive analysis of real BGP routing information data.

Seguir leyendo arrow_right_alt

Rate Allocation for Layered Multicast Streaming with Inter-Layer Network Coding

Rate Allocation for Layered Multicast Streaming with Inter-Layer Network Coding Abstract Multi-layer video streaming allows to provide different video qualities to a group of multicast receivers with heterogeneous receive rates. The number of layers received determines the quality of the decoded video stream. For such layered multicast streaming, network coding provides higher capacity than multicast routing.

Seguir leyendo arrow_right_alt

Contention resolution and packet queuing on a multiple access channel

Dr. Kowalski will present recent advances on contention resolution and packet queuing on a multiple access channel. His will include description of algorithms, both already known and newly developed, accompanied by theoretical analysis of queue sizes and latency. He will conclude with showing and elaborating on selected simulation results that support theoretical formulas.

Seguir leyendo arrow_right_alt

Network-based Distributed Mobility Management Demo

The number of mobile users and their traffic demand is expected to be ever-increasing in future years, and this growth can represent a limitation for deploying current mobility management schemes that are intrinsically centralized, e.g., Mobile IPv6 and Proxy Mobile IPv6. For this reason it has been waved a need for distributed and dynamic mobility management approaches, with the objective of reducing operators' burdens, evolving to a cheaper and more efficient architecture.

Seguir leyendo arrow_right_alt

Comentarios recientes

    Archivos

    Categorías