scinapse is loading now...
Lan Wang
University of Memphis
81Publications
28H-index
3,758Citations
Publications 81
Newest
Published on Oct 1, 2018
Tianxiang Li (University of California, Los Angeles), Wentao Shang7
Estimated H-index: 7
(University of California, Los Angeles)
+ 2 AuthorsLixia Zhang77
Estimated H-index: 77
(University of California, Los Angeles)
Previous literatures articulated that the NDN architecture may possess unique advantages in supporting battlefield communications [1], and that NDN can provide superior performance over TCP/IP under various scenarios, in particular in supporting multiparty distributed applications [2] by using a novel dataset synchronization protocol. In this paper we first describe the designs of dataset synchronization protocols (Sync in short), in particular ChronoSync and PSync, that run over NDN to support ...
Source Cite
Published on Oct 1, 2018
Alexander Afanasyev16
Estimated H-index: 16
(Florida International University),
Jeff Burke26
Estimated H-index: 26
(University of California, Los Angeles)
+ 3 AuthorsLixia Zhang77
Estimated H-index: 77
(University of California, Los Angeles)
As a proposed Internet architecture, Named Data Networking (NDN) is designed to network the world of computing devices by naming data instead of naming data containers as IP does today. With this change, NDN brings a number of benefits to network communication, including built-in multicast, in-network caching, multipath forwarding, and securing data directly. NDN also enables resilient communication in intermittently connected and mobile ad hoc environments, which is difficult to achieve by toda...
3 Citations Source Cite
Published on Sep 21, 2018
Arthi Padmanabhan (University of California, Los Angeles), Lan Wang28
Estimated H-index: 28
(University of Memphis),
Lixia Zhang77
Estimated H-index: 77
(University of California, Los Angeles)
Named Data Networking (NDN) proposes a fundamental architectural change to the Internet, moving from point-to-point communication to a data-centric model. NDN-enabled nodes can communicate over any substrate that can deliver datagrams, such as layer-2 links (WiFi, BLE, Ethernet, etc.) and IP/UDP/TCP tunnels over IP connectivity. However in the latter case, NDN-enabled nodes must be able to discover the presence of each other and the data each serves in an automated way. This poster describes the...
Source Cite
Published on Sep 21, 2018
Damian Coomes (University of Memphis), Ashlesh Gawande2
Estimated H-index: 2
(University of Memphis)
+ 1 AuthorsLan Wang28
Estimated H-index: 28
(University of Memphis)
Named Data Networking (NDN) thrives in use cases that require mobile peer-to-peer data sharing. To amplify interests in NDN research, we developed an NDN multimedia sharing application for mobile devices that mirrors the popular Snapchat app. Our research focuses on (1) creating a completely decentralized application, (2) exploring new trust models; and (3) using a new synchronization protocol that allows for synchronization of subsets of data. Our demo will show the basic Flow of the applicatio...
Source Cite
Published on Jun 4, 2018
Dan Jen6
Estimated H-index: 6
(Center for Naval Analyses),
Michael Meisel5
Estimated H-index: 5
(ThousandEyes)
+ 3 AuthorsLixia Zhang77
Estimated H-index: 77
(University of California, Los Angeles)
The routing table has seen a rapid increase in size and dynamics in recent years, mostly driven by the growth of edge networks. This growth reflects two major limitations in the current architecture: (a) the conflict between provider-based addressing and edge networks’ need for multihoming, and (b) flat routing’s inability to provide isolation from edge dynamics. To address these limitations, we propose A Practical Tunneling Architecture (APT), a new routing architecture that enables the Interne...
30 Citations Source Cite
Published on Apr 1, 2018
Lei Pi (University of Memphis), Lan Wang28
Estimated H-index: 28
(University of Memphis)
Ensuring homeowners' privacy and security is of vital importance in smart home systems. We adopt a data-centric approach to develop a smart home system over Named Data Networking. We address two specific problems: (a) establishing a trust relationship between a new device and the system, and (b) ensuring only authorized users can access data in the system. Our implementation allows a homeowner to use a smartphone to add new devices and control access at a fine granularity.
Source Cite
Published on Jan 1, 2018in IEEE Access 3.56
Lan Wang28
Estimated H-index: 28
(University of Memphis),
Vince Lehman4
Estimated H-index: 4
+ 3 AuthorsLixia Zhang77
Estimated H-index: 77
(University of California, Los Angeles)
The Named-data Link State Routing protocol (NLSR) is a protocol for intra-domain routing in Named Data Networking (NDN). It is an application level protocol similar to many IP routing protocols, but NLSR uses NDN’s interest/data packets to disseminate routing updates, directly benefiting from NDN’s built-in data authenticity. The NLSR design, which was first developed in 2013 and deployed on the NDN test bed in August 2014, has undergone significant changes. Following an application-driven desig...
11 Citations Source Cite
Published on Nov 20, 2017
Yu Zhang4
Estimated H-index: 4
(Harbin Institute of Technology),
Lan Wang28
Estimated H-index: 28
(University of Memphis)
+ 1 AuthorsLixia Zhang77
Estimated H-index: 77
(University of California, Los Angeles)
This paper summarizes our comparative study on the design choices of two classic link-state routing protocols: IS-IS and OSPF. Although both protocols are based on the same algorithmic foundations for computing best paths across large networks, they made different choices at various aspects in the protocol designs. We selected ten major design differences between the two to understand the reasoning behind their choices. We hope that this comparative study helps shed new light on the design space...
Source Cite
Published on Sep 26, 2017
Muktadir Chowdhury2
Estimated H-index: 2
(University of Memphis),
Ashlesh Gawande2
Estimated H-index: 2
(University of Memphis),
Lan Wang28
Estimated H-index: 28
(University of Memphis)
Secure deployment of a vehicular network depends on the network's trust establishment and privacy-preserving capability. In this paper, we propose a scheme for anonymous pseudonym-renewal and pseudonymous authentication for vehicular ad-hoc networks over a data-centric Internet architecture called Named Data networking (NDN). We incorporated our design in a traffic information sharing demo application and deployed it on Raspberry Pi-based miniature cars for evaluation.
2 Citations Source Cite
Published on Sep 26, 2017
Klaus M. Schneider4
Estimated H-index: 4
(University of Arizona),
Beichuan Zhang31
Estimated H-index: 31
(University of Arizona)
+ 1 AuthorsLixia Zhang77
Estimated H-index: 77
(University of California, Los Angeles)
When splitting traffic for one destination among multiple paths, the employed paths should be loop-free , lest they waste network resources, and the involved routers should be given a high path choice , that is, a high number of potential nexthops. In IP networks this requires the use of a loop-free routing protocol, which limits the achievable path choice. Here we show that, in NDN, we can increase the path choice by combining a Near Loop-free Routing protocol (NLR) with on-demand loop removal ...
Source Cite
12345678