Reliable transport protocols such as TCP are tuned to perform well in traditional networks where packet losses occur mostly because of congestion. However, networks with wireless and other lossy links also suffer from significant losses... more
Wireless sensor networks promise fine-grain monitoring in a wide variety of environments. Many of these environments (e.g., indoor environments or habitats) can be harsh for wireless communication. From a networking perspective, the most... more
We discuss findings from a large-scale study of Internet packet dynamics conducted by tracing 20,000 TCP bulk transfers between 35 Internet sites. Because we traced each 100 Kbyte transfer at both the sender and the receiver, the... more
This paper presents a full duplex radio design using signal inversion and adaptive cancellation. Signal inversion uses a simple design based on a balanced/unbalanced (Balun) transformer. This new design, unlike prior work, supports... more
Multicast stream authentication and signing is an im-portant and challenging problem. Applications include the continuous authentication of radio and TV Internet broad-casts, and authenticated data distribution by satellite. The main... more
This paper analyzes the causes of packet loss in a 38-node urban multi-hop 802.11b network. The patterns and causes of loss are important in the design of routing and errorcorrection protocols, as well as in network planning.
One of the main challenges of securing broadcast communication is source authentication, or enabling receivers of broadcast data to verify that the received data really originates from the claimed source and was not modified en route.... more
This article proposes a novel approach to assess the stability of linear systems with delayed and sampled-data inputs. The paper considers both asynchronous sampling and input delay based on an extension of existing results on the... more
We present Trickle, an algorithm for propagating and maintaining code updates in wireless sensor networks. Borrowing techniques from the epidemic/gossip, scalable multicast, and wireless broadcast literature, Trickle uses a "polite... more
TCP is a reliable transport protocol tuned to perform well in traditional networks where congestion is the primary cause of packet loss. However, networks with wireless links and mobile hosts incur significant losses due to biterrors and... more
In this paper, we investigate the impact of radio irregularity on the communication performance in wireless sensor networks. Radio irregularity is a common phenomenon which arises from multiple factors, such as variance in RF sending... more
We show that mutual exchange of independent information between two nodes in a wireless network can be efficiently performed by exploiting network coding and the physicallayer broadcast property offered by the wireless medium. The... more
This paper consists of a categorization of optical buffering strategies for optical packet switches, and a comparison of the performance of these strategies both with respect to packet loss/delay and bit error rate (BER) performance.... more
Wireless multimedia services are increasingly becoming popular boosting the need for better quality-of-experience (QoE) with minimal costs. The standard codecs employed by these systems remove spatio-temporal redundancies to minimize the... more
Easy to deploy, robust, and highly resilient to failures, epidemic algorithms are a potentially effective mechanism for propagating information in large peer-to-peer systems deployed on Internet or ad hoc networks. It is possible to... more
The Adhoc Multicast Routing Protocol AMRoute presents a novel approach for robust IP Multicast in mobile adhoc networks by exploiting user-multicast trees and dynamic logical cores. It creates a bidirectional, shared tree for data... more
In this paper, optimal control of linear time-invariant (LTI) systems over unreliable communication links is studied. The motivation of the problem comes from growing applications that demand remote control of objects over Internet-type... more
We present the unequal loss protection (ULP) framework in which unequal amounts of forward error correction are applied to progressive data to provide graceful degradation of image quality as packet losses increase. We develop a simple... more
We deployed 72 sensors of 10 modalities in 15 wireless and wired networked sensor systems in the environment, in objects, and on the body to create a sensor-rich environment for the machine recognition of human activities. We acquired... more
An (m; n; b; r)-erasure-resilient coding scheme consists of an encoding algorithm and a decoding algorithm with the following properties. The encoding algorithm produces a set of n packets each containing b bits from a message of m... more
In this paper, we present Chainsaw, a p2p overlay multicast system that completely eliminates trees. Peers are notified of new packets by their neighbors and must explicitly request a packet from a neighbor in order to receive it. This... more
We explore the use of end-to-end multicast traffic as measurement probes to infer network-internal characteristics. We have developed in an earlier paper [2] a Maximum Likelihood Estimator for packet loss rates on individual links based... more
In this paper, we investigate the impact of radio irregularity on wireless sensor networks. Radio irregularity is a common phenomenon which arises from multiple factors, such as variance in RF sending power and different path losses... more
We describe a new carrier-sense multiple access (CSMA) protocol for multihop wireless networks, sometimes also called ad hoc networks. The CSMA protocol divides the available bandwidth into several channels and selects an idle channel... more
In order to stem the increasing packet loss rates caused by an exponential increase in network traffic, the IETF is considering the deployment of active queue management techniques such as RED . While active queue management can... more
This paper investigates differentiated services in wireless packet networks using a fully distributed approach that supports service differentiation, radio monitoring, and admission control. While our proposal is generally applicable to... more
Wireless sensor networks involve very large numbers of small, low-power, wireless devices. Given their unattended nature, and their potential applications in harsh environments, we need a monitoring infrastructure that indicates system... more
Congestion in wireless sensor networks not only causes packet loss, but also leads to excessive energy consumption. Therefore congestion in WSNs needs to be controlled in order to prolong system lifetime. In addition, this is also... more
This paper describes current problems found with audio applications over the MBONE (Multicast Backbone), and investigates possible solutions to the most common one -packet loss. The principles of packet speech systems are discussed, and... more
This paper investigates differentiated services in wireless packet networks using a fully distributed approach that supports service differentiation, radio monitoring and admission control. Service differentiation is based on the IEEE... more
In this paper, we present a model for TCP/IP ow c o n trol mechanism. The rate at which data is transmitted increases linearly in time until a packet loss is detected. At t h a t p o i n t, the transmission rate is divided by a constant... more
Packet switching of variable-bit-rate real-time video sources is a means for efficient sharing of communication resources while maintaining uniform picture quality. Performance analysis for the statistical multiplexing of such video... more
There is a critical need for new thinking regarding overload traffic management in sensor networks. It has now become clear that experimental sensor networks (e.g., mote networks) and their applications commonly experience periods of... more
The loss behavior of wireless networks has become the focus of many recent research efforts. Although it is generally agreed that wireless communications experience higher error rates than wireline, the nature of these lossy links is not... more
We discuss here the implementation aspects of recently developed tools of computational intelligence for tackling the issue of joint trajectory generation of a class of multi-joint cooperative robotic systems. This is closely related to... more
The ability to quickly deploy new protocols, and provide flexibility to both applications and network administrators has been an oft-cited reason for active networks to be seriously examined. This paper describes an architecture and... more
Raptor codes have been standardized as application layer forward error correction (FEC) codes for Multimedia Broadcast and Multicast Services (MBMS) and Digital Video Broadcast (DVB) due to their extraordinary advanced FEC protection and... more
TCP performs poorly on paths that reorder packets significantly, where it misinterprets out-of-order delivery as packet loss. The sender responds with a fast retransmit though no actual loss has occurred. These repeated false fast... more
We describe a new carrier-sense multiple access (CSMA) protocol for multihop wireless networks, using multiple channels and a distributed channel selection scheme. The proposed protocol divides the available bandwidth into AE channels... more
In wireless sensor networks, many protocols assume that if node A is able to interfere with node B's packet reception, node B is within node A's communication range. It is also assumed that if node B is within node A's communication... more
The recently developed notion of TCP-compatibility has led to a number of proposals for alternative congestion control algorithms whose long-term throughput as a function of a steady-state loss rate is similar to that of TCP. Motivated by... more
We develop an anycast mechanism at the link layer for wireless ad hoc networks. The goal is to exploit path diversity in the link layer by choosing the best next hop to forward packets when multiple next hop choices are available. Such... more
We present a comprehensive set of measurements of a 2.4 GHz DSSS wireless LAN and analyze its behavior. We examine issues such as host and interface heterogeneity, bidirectional (TCP) traffic and error modeling, that have not been... more
Variable bit rate (VBR) compressed video is expected to become one of the major loading factors in high-speed packet networks such a s A TM-based B-ISDN. However, recent measurements based on long empirical traces (complete movies)... more
Recently, optical packet switch architectures, composed of devices such as optical switches, fiber delay lines, and passive couplers, have been proposed to overcome the electromagnetic interference (EMI), pinout and interconnection... more