Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Dynamic Stochastic Relay Selection Algorithm In Peer-To-Peer Networks, Chengwei Zhang, Wenqing Cheng, Hei Xiaojun Jul 2020

Dynamic Stochastic Relay Selection Algorithm In Peer-To-Peer Networks, Chengwei Zhang, Wenqing Cheng, Hei Xiaojun

Journal of System Simulation

Abstract: A stochastic routing algorithm for selecting appropriate relay nodes in peer-to-peer networks was proposed. This algorithm was constructed using a stochastic programming framework by leveraging the actual delay of local links and the statistical delay distributions of non-local overlay links. In order to approximate the statistical delay distribution of non-local overlay links, the historical delay values of each link were utilized to approximate the link delay distribution. This algorithm was fully distributed and the stochastic link measurement data could be updated between neighboring nodes at a longer time granularity to reduce routing overhead. This algorithm and …


Facest: Feedback-Assisted Estimation Of End-To-End Capacity In Ip-Basedcommunication Networks, Fati̇h Abut Jan 2020

Facest: Feedback-Assisted Estimation Of End-To-End Capacity In Ip-Basedcommunication Networks, Fati̇h Abut

Turkish Journal of Electrical Engineering and Computer Sciences

The end-to-end capacity, defined as the maximal transmission rate of the weakest link on the entire path between two end hosts, plays an important role in efficient network design and management. Although various capacity estimation tools have been proposed in the literature, there is still uncertainty in their accuracy and reliability when they are used in today's IP-based communication networks. The main reason for this is that all current capacity estimation tools only yield a potential candidate for an acceptable estimate, without being aware of its reliability level. In this study, we propose a new feedback-assisted end-to-end capacity estimation (FACEST) …


Toward Accurate Network Delay Measurement On Android Phones, Weichao Li, Daoyuan Wu, Rocky K. C. Chang, Ricky K. P. Mok Aug 2017

Toward Accurate Network Delay Measurement On Android Phones, Weichao Li, Daoyuan Wu, Rocky K. C. Chang, Ricky K. P. Mok

Research Collection School Of Computing and Information Systems

Measuring and understanding the performance of mobile networks is becoming very important for end users and operators. Despite the availability of many measurement apps, their measurement accuracy has not received sufficient scrutiny. In this paper, we appraise the accuracy of smartphone-based network performance measurement using the Android platform and the network round-trip time (RTT) as the metric. We show that two of the most popular measurement apps-Ookla Speedtest and MobiPerf-have their RTT measurements inflated. We build three test apps that cover three common measurement methods and evaluate them in a testbed. We overcome the main challenge of obtaining a complete …


Robust And Agile System Against Fault And Anomaly Traffic In Software Defined Networks, Mihui Kim, Younghee Park, Rohit Kotalwar Jan 2017

Robust And Agile System Against Fault And Anomaly Traffic In Software Defined Networks, Mihui Kim, Younghee Park, Rohit Kotalwar

Faculty Publications

The main advantage of software defined networking (SDN) is that it allows intelligent control and management of networking though programmability in real time. It enables efficient utilization of network resources through traffic engineering, and offers potential attack defense methods when abnormalities arise. However, previous studies have only identified individual solutions for respective problems, instead of finding a more global solution in real time that is capable of addressing multiple situations in network status. To cover diverse network conditions, this paper presents a comprehensive reactive system for simultaneously monitoring failures, anomalies, and attacks for high availability and reliability. We design three …