-
Building Flexible, Low-Cost Wireless Access Networks With Magma
Authors:
Shaddi Hasan,
Amar Padmanabhan,
Bruce Davie,
Jennifer Rexford,
Ulas Kozat,
Hunter Gatewood,
Shruti Sanadhya,
Nick Yurchenko,
Tariq Al-Khasib,
Oriol Batalla,
Marie Bremner,
Andrei Lee,
Evgeniy Makeev,
Scott Moeller,
Alex Rodriguez,
Pravin Shelar,
Karthik Subraveti,
Sudarshan Kandi,
Alejandro Xoconostle,
Praveen Kumar Ramakrishnan,
Xiaochen Tian,
Anoop Tomar
Abstract:
Billions of people remain without Internet access due to availability or affordability of service. In this paper, we present Magma, an open and flexible system for building low-cost wireless access networks. Magma aims to connect users where operator economics are difficult due to issues such as low population density or income levels, while preserving features expected in cellular networks such a…
▽ More
Billions of people remain without Internet access due to availability or affordability of service. In this paper, we present Magma, an open and flexible system for building low-cost wireless access networks. Magma aims to connect users where operator economics are difficult due to issues such as low population density or income levels, while preserving features expected in cellular networks such as authentication and billing policies. To achieve this, and in contrast to traditional cellular networks, Magma adopts an approach that extensively leverages Internet design patterns, terminating access network-specific protocols at the edge and abstracting the access network from the core architecture. This decision allows Magma to refactor the wireless core using SDN (software-defined networking) principles and leverage other techniques from modern distributed systems. In doing so, Magma lowers cost and operational complexity for network operators while achieving resilience, scalability, and rich policy support.
△ Less
Submitted 20 September, 2022;
originally announced September 2022.
-
Handcrafted vs Deep Learning Classification for Scalable Video QoE Modeling
Authors:
Dasari Mallesham,
Christina Vlachou,
Shruti Sanadhya,
Pranjal Sahu,
Yang Qiu,
Kyu-Han Kim,
Samir R. Das
Abstract:
Mobile video traffic is dominant in cellular and enterprise wireless networks. With the advent of diverse applications, network administrators face the challenge to provide high QoE in the face of diverse wireless conditions and application contents. Yet, state-of-the-art networks lack analytics for QoE, as this requires support from the application or user feedback. While there are existing techn…
▽ More
Mobile video traffic is dominant in cellular and enterprise wireless networks. With the advent of diverse applications, network administrators face the challenge to provide high QoE in the face of diverse wireless conditions and application contents. Yet, state-of-the-art networks lack analytics for QoE, as this requires support from the application or user feedback. While there are existing techniques to map QoS to QoE by training machine learning models without requiring user feedback, these techniques are limited to only few applications, due to insufficient QoE ground-truth annotation for ML. To address these limitations, we focus on video telephony applications and model key artefacts of spatial and temporal video QoE. Our key contribution is designing content- and device-independent metrics and training across diverse WiFi conditions. We show that our metrics achieve a median 90% accuracy by comparing with mean-opinion-score from more than 200 users and 800 video samples over three popular video telephony applications -- Skype, FaceTime and Google Hangouts. We further extend our metrics by using deep neural networks, more specifically we use a combined CNN and LSTM model. We achieve a median accuracy of 95% by combining our QoE metrics with the deep learning model, which is a 38% improvement over the state-of-the-art well known techniques.
△ Less
Submitted 10 January, 2019;
originally announced January 2019.
-
Colliding Message Pairs for 23 and 24-step SHA-512
Authors:
Somitra Kumar Sanadhya,
Palash Sarkar
Abstract:
Recently, Indesteege et al. [1] had described attacks against 23 and 24-step SHA-512 at SAC '08. Their attacks are based on the differential path by Nikolic and Biryukov [2]. The reported complexities are $2^{44.9}$ and $2^{53}$ calls to the respective step reduced SHA-512 hash function. They provided colliding message pairs for 23-step SHA-512 but did not provide a colliding message pair for 24…
▽ More
Recently, Indesteege et al. [1] had described attacks against 23 and 24-step SHA-512 at SAC '08. Their attacks are based on the differential path by Nikolic and Biryukov [2]. The reported complexities are $2^{44.9}$ and $2^{53}$ calls to the respective step reduced SHA-512 hash function. They provided colliding message pairs for 23-step SHA-512 but did not provide a colliding message pair for 24-step SHA-512. In this note we provide a colliding message pair for 23-step SHA-512 and the first colliding message pair for 24-step SHA-512. Our attacks use the differential path first described by Sanadhya and Sarkar at ACISP '08 [3]. The complexities of our attacks are $2^{16.5}$ and $2^{34.5}$ calls to the respective step reduced SHA-512 hash function. Complete details of the attacks will be provided in an extended version of this note.
△ Less
Submitted 1 September, 2008;
originally announced September 2008.
-
22-Step Collisions for SHA-2
Authors:
Somitra Kumar Sanadhya,
Palash Sarkar
Abstract:
In this note, we provide the first 22-step collisions for SHA-256 and SHA-512. Detailed technique of generating these collisions will be provided in the next revision of this note.
In this note, we provide the first 22-step collisions for SHA-256 and SHA-512. Detailed technique of generating these collisions will be provided in the next revision of this note.
△ Less
Submitted 8 March, 2008;
originally announced March 2008.