2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) 2017
DOI: 10.23919/inm.2017.7987324
|View full text |Cite
|
Sign up to set email alerts
|

MoViDiff: Enabling service differentiation for mobile video apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Table 1 summarizes the simulation environment for the HCCA MAC protocol for PCD and IoT users. The packet size (L p ) for the PCD and IoT users are 400 bytes and 10 bytes according to the video streaming and smart sensing applications, respectively [35]. The slot time [20], ACK time, sets of packets, and data rate are listed in Table 1 for the HCCA MAC protocol.…”
Section: Performance Analysismentioning
confidence: 99%
“…Table 1 summarizes the simulation environment for the HCCA MAC protocol for PCD and IoT users. The packet size (L p ) for the PCD and IoT users are 400 bytes and 10 bytes according to the video streaming and smart sensing applications, respectively [35]. The slot time [20], ACK time, sets of packets, and data rate are listed in Table 1 for the HCCA MAC protocol.…”
Section: Performance Analysismentioning
confidence: 99%
“…Conversational Voice has a packet frequency of about 50 packets/s [22]. Conversational video sends a bitrate of about 1500 kbps [23] and has a packet size of about 1500 bytes [24] which translates to a packet frequency of about 125 packets per second. Finally, Live Gaming has a typical packet interarrival time of 40 ms which translates to 25 packets/s [25].…”
Section: A Packet Level Dynamics and Local Optimalitymentioning
confidence: 99%
“…For the monitoring of wireless communication attacks, existing technical methods include obtaining mobile communication traffic data in a specific region through a mobile network operator and performing analysis, such as obtaining downlink network traffic, port number, and resource allocation information in a specific region on the base station side, and detecting abnormal steganographic transmission behaviour through a traffic identification model. Typical schemes include port number-based analysis, which completes traffic type [4], protocol analysis [5] anomaly detection [6] based on port rules developed by the Internet Corporation for Assigned Names and Numbers , which is low in computational complexity but gradually loses its effectiveness with the popularity of port obfuscation and forwarding techniques [7]. Subsequently, researchers used Deep Packet Inspection (DPI) method to analyse and match the traffic datagrams to distinguish different flows [8], the algorithm has high accuracy but high computational complexity, and with the update of encryption protocols, the administrators are gradually ISSN 2616-5775 Vol.…”
Section: Introductionmentioning
confidence: 99%