Learn More
Layer encoded video is an elegant way to allow adaptive transmissions in the face of varying network conditions as well as it supports heterogeneity in networks and clients. As a drawback quality degradation can occur, caused by variations in the amount of transmitted layers. Recent work on reducing these variations makes assumptions about the perceived(More)
Network calculus has proven as a valuable and versatile methodology for worst-case analysis of communication networks. One issue in which it is still lacking is the treatment of aggregate multiplexing, in particular if the FIFO property cannot be assumed when flows are merged. In this paper, we address the problem of bounding the delay of individual traffic(More)
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP's memory resources and result in denied association service, thus enabling more sophisticated impersonation attacks accomplished by rogue APs. This work introduces the concept of(More)
— This paper presents a study of dynamic replication for peer-to-peer networks. We take an availability-centric view on quality of service (QoS) and focus on the issues of satisfying availability requirements for distributed multimedia services running on large Peer-to-Peer (P2P) systems. We especially tackle the replica placement problem where our focus is(More)
In this work, we take on the role of a wireless adversary and investigate one of its most powerful tools---radio frequency jamming. Although different jammer designs are discussed in the literature, reactive jamming, i.e., targeting only packets that are already on the air, is generally recognized as a stepping stone in implementing optimal jamming(More)
Today's wireless sensor networks (WSN) focus on energy-efficiency as the main metric to optimize. However, an increasing number of scenarios where sensor networks are considered for time-critical purposes in application scenarios like intrusion detection, industrial monitoring, or health care systems demands for an explicit support of performance guarantees(More)
Node deployment is a fundamental issue to be solved in Wireless Sensor Networks (WSNs). A proper node deployment scheme can reduce the complexity of problems in WSNs as, for example, routing, data fusion, communication, etc. Furthermore, it can extend the lifetime of WSNs by minimizing energy consumption. In this paper, we investigate random and(More)
In this paper, we describe implementation aspects and performance results of an innovative and publicly available RSVP implementation. Much debate exists about the applicability of RSVP as a signalling protocol in the Internet, particularly for a large number of unicast flows. While there has been a significant amount of work published on the theoretical(More)
The overall network traffic patterns generated by today's smartphones result from the typically large and diverse set of installed applications. In addition to the traffic generated by the user, most applications generate characteristic traffic from their background activities, such as periodic update requests or server synchronisation. Although the(More)