Skip to main content

Showing 1–3 of 3 results for author: Walid, A I

.
  1. arXiv:1012.5997  [pdf, ps, other

    cs.IT cs.CR cs.NI

    Protection Over Asymmetric Channels, S-MATE: Secure Multipath Adaptive Traffic Engineering

    Authors: Salah A. Aly, Nirwan Ansari, H. Vincent Poor, Anwar I. Walid

    Abstract: Several approaches have been proposed to the problem of provisioning traffic engineering between core network nodes in Internet Service Provider (ISP) networks. Such approaches aim to minimize network delay, increase capacity, and enhance security services between two core (relay) network nodes, an ingress node and an egress node. MATE (Multipath Adaptive Traffic Engineering) has been proposed for… ▽ More

    Submitted 29 December, 2010; originally announced December 2010.

    Comments: 4 figures, 9 pages, journal paper of S-MATE

  2. arXiv:1010.4858  [pdf, ps, other

    cs.NI cs.CR cs.IT

    S-MATE: Secure Coding-based Multipath Adaptive Traffic Engineering

    Authors: Salah A. Aly, Nirwan Ansari, Anwar I. Walid, H. Vincent Poor

    Abstract: There have been several approaches to provisioning traffic between core network nodes in Internet Service Provider (ISP) networks. Such approaches aim to minimize network delay, increase network capacity, and enhance network security services. MATE (Multipath Adaptive Traffic Engineering) protocol has been proposed for multipath adaptive traffic engineering between an ingress node (source) and an… ▽ More

    Submitted 23 October, 2010; originally announced October 2010.

  3. arXiv:1008.4264  [pdf, ps, other

    cs.IT cs.NI

    Network Protection Design Using Network Coding

    Authors: Salah A. Aly, Ahmed E. Kamal, Anwar I. Walid

    Abstract: Link and node failures are two common fundamental problems that affect operational networks. Protection of communication networks against such failures is essential for maintaining network reliability and performance. Network protection codes (NPC) are proposed to protect operational networks against link and node failures. Furthermore, encoding and decoding operations of such codes are well devel… ▽ More

    Submitted 25 August, 2010; originally announced August 2010.

    Comments: ITW2010