Learn More
Designing a routing protocol for large low-power and lossy networks (LLNs), consisting of thousands of constrained nodes and unreliable links, presents new challenges. The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL), have been developed by the IETF ROLL Working Group as a preferred routing protocol to provide IPv6 routing functionality in(More)
DASH is new ISO/IEC MPEG and 3GPP standard for HTTP multimedia streaming that begins to be widely accepted in the industry. DASH is design to be flexible and support various multimedia formats. DASH unify the proprietary adaptive streaming solutions and suggests differing between them by using different behavioral approaches, each one best suited for the(More)
Monitoring and analyzing wireless networks for network structure and behavior is a complex task. Such monitoring often requires creating extra traffic, dedicated hardware and a prior knowledge of the network components and structure. In this paper we present a novel approach for monitoring large and complex wireless networks, fast deployed which operate(More)
A Mobile Ad Hoc Network (MANET) is a network architecture that can be rapidly deployed without relying on pre-existing fixed network infrastructure. Group communication is a common application where a single source sends identical information concurrently to multiple destinations. Trees of special properties are required to provide efficient network(More)
Wireless Ad hoc sensor networks are characterized by several constraints, such as bandwidth, delay, power, etc. These networks are examined by constructing a tree network. A core node usually chosen to be the median or center of the multicast tree network with a tend to minimize a performance metric, such as delay or bandwidth. In this paper, we present new(More)
The increasing popularity of HTTP adaptive video streaming services has dramatically increased bandwidth requirements on operator networks, which attempt to shape their traffic through Deep Packet Inspection (DPI). However, Google and certain content providers have started to encrypt their video services. As a result, operators often encounter difficulties(More)
This paper focuses on the centdian problem in a cactus network where a cactus network is a connected undirected graph, and any two simple cycles in the graph have at most one node in common. The cactus network has important applications for wireless sensor networks when a tree topology might not be applicable and for extensions to the ring architecture. The(More)
Previous research has shown that information can be extracted from encrypted multimedia streams. This includes video titles classification of non HTTP adaptive streams (nonHAS). This paper presents an algorithm for encrypted HTTP adaptive video streaming title classification. We evaluated our algorithm on a new YouTube popular videos dataset that was(More)