Eyal Felstaine

Learn More
One of the key issues in deployment of QoS is determining the set of applications or users, which are allowed to have a preferential access to network resources. The administrative criteria for regulating access to resources constitute the QoS policies. A policy could determine which of the reservation requests in the network be honored during the(More)
When an ATM node discovers that it cannot continue the setup of a virtual channel under the requested Quality of Service (QoS), it initiates a backtracking procedure called “crankback.” We propose a novel scheme, referred to as crankback prediction, that decreases the crankback overhead. Under the proposed scheme, nodes check during the connection admission(More)
ATM PNNI (Private Network-to-Network Interface) is a hierarchical and dynamic link-state routing protocol, designed to scale to the largest possible ATM networks, encompassing thousands of nodes. The paper investigates the route computation load imposed by the PNNI routing scheme, and shows that this load is unevenly distributed among the network nodes.(More)
Many anonymous peer-to-peer (P2P) file sharing systems have been proposed in recent years. One problem that remains open is how to protect the anonymity of <i>all</i> participating users, namely, reader, server and publisher. In this work we propose a novel solution for a P2P file sharing system. Our solution provides overall anonymity to all participating(More)
The flourishing of Peer-to-Peer (P2P) applications has encouraged extensive research on end-to-end anonymity. In particular, interactive services such as VoIP and instant messaging are becoming extremely popular and require low latency. Preserving the anonymity of users in such services is becoming a major challenge. While existing schemes provide anonymity(More)
Peer to peer file sharing is ’booming’, but meanwhile censorship of these networks and prosecution of users that share censored content are growing just as quickly. In this paper, we propose a novel notion of deniability as an easy and efficient method for users to avoid censorship and prosecution. The fundamental concept is that a given data element, which(More)
Recently, there has been a growing interest in performing flow inspection within devices in the core network. Frequently, a session passing through the core network is routed through several paths either due to network architecture or due to malicious intent. This paper present a re-routing layer that enables, for the first time, multi-path-flow(More)