<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Publications on bramp.net</title>
    <link>https://blog.bramp.net/</link>
    <description>Recent content in Publications on bramp.net</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-GB</language>
    <lastBuildDate>Tue, 09 Feb 2010 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://blog.bramp.net/categories/publications/" rel="self" type="application/rss+xml" />
    
    <item>
      <title>Facilitating Network Auto Configuration In Next Generation Internet Protocols</title>
      <link>https://blog.bramp.net/publication/facilitating-network-auto-configuration-in-next-generation-internet-protocols/</link>
      <pubDate>Tue, 09 Feb 2010 00:00:00 +0000</pubDate>
      
      <guid>https://blog.bramp.net/publication/facilitating-network-auto-configuration-in-next-generation-internet-protocols/</guid>
      <description><p>Matthew Jakeman, Andrew Brampton, Stephen Pink</p>
<p>In proceedings FutureNet II – Second international workshop on the network of the future in conjunction with IEEE Globecom</p>
<blockquote>
<p><strong>Abstract</strong></p>
<p>The infrastructure of the modern Internet has become a complex mesh of varying network types. A single network<br>
protocol cannot optimally support every underlying technology and the diverse nature of these networks places increasing strain on the concept of running IP over everything and everything over IP. The introduction of new protocols and services also forces network administrators to employ techniques such as tunneling to ensure end-to-end IP connectivity. Unfortunately these techniques inherently require some form of efficiency trade-off and are not<br>
an ideal long term solution.</p>
<p>To address these issues, this paper proposes a new network layer protocol, NP++, which uses a level of indirection between the logical and physical specifications of the protocol. NP++ also enables the protocol to automatically configure which physical mapping is used over a link with no direct input from the user.<br>
This allows the protocol to change its transmission characteristics depending on the type of underlying network while presenting a unified view to the upper layers. This ensures a higher level of flexibility along with the potential to increase efficiency. The implementation of the NP++ prototype is also demonstrated with a view to encouraging its use when researching next generation Internet technologies.</p>
</blockquote>
<p><a href="https://github.com/bramp/publication/raw/master/network-auto-config/GLOBECOM09/facilitating_network_auto_configuration_in_next_generation_internet_protocols.pdf">PDF Download</a></p>
</description>
    </item>
    
    <item>
      <title>Final Version of my Thesis Online</title>
      <link>https://blog.bramp.net/post/2009/07/10/final-version-of-my-thesis-online/</link>
      <pubDate>Fri, 10 Jul 2009 00:00:00 +0000</pubDate>
      
      <guid>https://blog.bramp.net/post/2009/07/10/final-version-of-my-thesis-online/</guid>
      <description><p>I finished my corrections a while ago now but I just hadn’t gotten around to putting my final thesis on-line.</p>
<p>So here it is <a href="https://github.com/bramp/phd-thesis/blob/master/thesis.pdf?raw=true">pdf</a> and <a href="https://github.com/bramp/phd-thesis/">tex sources</a>.</p>
<h3 id="the-impact-of-highly-interactive-workloads-on-video-on-demand-systems">The Impact of Highly Interactive Workloads on Video-on-Demand Systems</h3>
<blockquote>
<p><strong>Abstract</strong></p>
<p>The traditional start-to-finish playback model is not suitable for all modern interactive video streams. Users expect support for higher levels of interactivity such as fast forward and rewind or the ability to arbitrary seek within their media quickly and efficiently. By conducting user studies we have observed start-to-finish is not applicable to many genres of video, and that different playback models fit better. We discuss how existing delivery techniques are impacted by these new observations.</p>
<p>Novel interactive controls such as bookmarks have also highly impacted user behaviour. This has lead to the segments within the media being accessed in a uneven fashion, causing hotspots of interest to form; areas with orders of magnitudes more viewers than others. These hotspots typically began at the beginning of a bookmark, however not always, which lead us to design a dynamic bookmark positioning algorithm. As well as their position, determining the hotspot’s length can be beneficial. This aids in autonomic techniques such as replication and pre-fetching as well as allowing the users to find what they want quicker.</p>
<p>Under high level of interactivity, delivery techniques are less efficient due to the unpredictability of the users. We however developed techniques which restore some of this predictability, allowing clients or servers to predict future actions based on past user actions. These technique proves exceeding useful for pre-fetching which reduces seek latencies for client and can reduce load on servers. However knowledge of past user activities need to be gathered from network, thus we develop techniques to do this in a distributed manner.</p>
</blockquote>
</description>
    </item>
    
    <item>
      <title>Evaluating the Performance of Network Protocol Processing on Multi-core Systems</title>
      <link>https://blog.bramp.net/publication/evaluating-the-performance-of-network-protocol-processing-on-multi-core-systems/</link>
      <pubDate>Tue, 26 May 2009 00:00:00 +0000</pubDate>
      
      <guid>https://blog.bramp.net/publication/evaluating-the-performance-of-network-protocol-processing-on-multi-core-systems/</guid>
      <description><p>Matthew Faulkner and Andrew Brampton and Stephen Pink</p>
<p>In proceedings of the International Conference on Advanced Information Networking and Applications (AINA)</p>
<p><strong>This paper won the IEEE Best Paper award</strong></p>
<blockquote>
<p><strong>Abstract</strong></p>
<p>Improvements at the physical network layer have enabled technologies such as 10 Gigabit Ethernet. Single core end-systems are unable to fully utilise these networks, due to limited clock cycles. Using a Multi-core architecture is one method which increases the number of available cycles, and thus allow networks to be fully utilised. However, using these systems creates a new set of challenges for network protocol processing, for example, deciding how best to utilise many cores for high network performance. This paper examines different ways the cores of a multi-core system can be utilised, and, by experimentation, we show that in an eight core system deciding which cores to use is important. In one test, there was a 40% discrepancy in CPU utilisation depending on which cores were used. This discrepancy results from the resources each core shares, an example being the multi-hierarchy CPU caches, and to which bus the processors are connected.</p>
</blockquote>
<p><a href="https://github.com/bramp/publication/raw/master/multi-core-networking/AINA-09/aina-09.pdf">PDF Download</a></p>
</description>
    </item>
    
    <item>
      <title>The Impact of Highly Interactive Workloads on Video-on-Demand Systems</title>
      <link>https://blog.bramp.net/publication/the-impact-of-highly-interactive-workloads-on-video-on-demand-systems/</link>
      <pubDate>Wed, 01 Oct 2008 00:00:00 +0000</pubDate>
      
      <guid>https://blog.bramp.net/publication/the-impact-of-highly-interactive-workloads-on-video-on-demand-systems/</guid>
      <description><p>Andrew Brampton.</p>
<p>Thesis submitted for the degree of Doctor of Philosophy</p>
<blockquote>
<p><strong>Abstract</strong></p>
<p>The traditional start-to-finish playback model is not suitable for all modern interactive video streams. Users expect support for higher levels of interactivity such as fast forward and rewind or the ability to arbitrary seek within their media quickly and efficiently. By conducting user studies we have observed start-to-finish is not applicable to many genres of video, and that different playback models fit better. We discuss how existing delivery techniques are impacted by these new observations.</p>
<p>Novel interactive controls such as bookmarks have also highly impacted user behaviour. This has lead to the segments within the media being accessed in a uneven fashion, causing hotspots of interest to form; areas with orders of magnitudes more viewers than others. These hotspots typically began at the beginning of a bookmark, however not always, which lead us to design a dynamic bookmark positioning algorithm. As well as their position, determining the hotspot’s length can be beneficial. This aids in autonomic techniques such as replication and pre-fetching as well as allowing the users to find what they want quicker.</p>
<p>Under high level of interactivity, delivery techniques are less efficient due to the unpredictability of the users. We however developed techniques which restore some of this predictability, allowing clients or servers to predict future actions based on past user actions. These technique proves exceeding useful for pre-fetching which reduces seek latencies for client and can reduce load on servers. However knowledge of past user activities need to be gathered from network, thus we develop techniques to do this in a distributed manner.</p>
</blockquote>
<p><a href="https://github.com/bramp/phd-thesis/blob/master/thesis.pdf">PDF Download</a> | <a href="https://github.com/bramp/phd-thesis">LaTeX Source</a>.</p>
</description>
    </item>
    
    <item>
      <title>A Case for Hybrid Content Distribution for Interactive Video-on-Demand</title>
      <link>https://blog.bramp.net/publication/a-case-for-hybrid-content-distribution-for-interactive-video-on-demand/</link>
      <pubDate>Tue, 16 Sep 2008 00:00:00 +0000</pubDate>
      
      <guid>https://blog.bramp.net/publication/a-case-for-hybrid-content-distribution-for-interactive-video-on-demand/</guid>
      <description><p>Andrew MacQuire, Andrew Brampton, Nicholas J. P. Race, Laurent Mathy, Michael Fry</p>
<p>In proceedings of Next Generation Mobile Applications, Services and Technologies (NGMAST'08)</p>
<blockquote>
<p><strong>Abstract</strong></p>
<p>With the advent of numerous video distribution services, Content Distribution Networks (CDNs) are under increasing demand. Given the associated expenses, many organisations have made use of Peer-to-Peer (P2P) approaches to offset bandwidth costs. Unfortunately, using clients as part of the delivery process can vastly increase load on service providers’ networks. Furthermore, many approaches thus far lack the ability for interactive, on-demand viewing. For these reasons, this paper considers how ‘hybrid’ methods could alleviate these issues, through simulations of delivery methodologies in a CDN context. As it is unlikely that any one method will suffice for all content, network and audience types, a successful system should adapt in response to changes, as outlined in this paper.</p>
</blockquote>
<p><a href="https://github.com/bramp/publication/raw/master/ivod/NGMAST08/paper.pdf">PDF Download</a> | <a href="https://github.com/bramp/publication/raw/master/ivod/NGMAST08/slides.pdf">Slides</a></p>
</description>
    </item>
    
    <item>
      <title>Characterising and Exploiting Workloads of Highly Interactive Video-on-Demand</title>
      <link>https://blog.bramp.net/publication/characterising-and-exploiting-workloads-of-highly-interactive-video-on-demand/</link>
      <pubDate>Tue, 20 May 2008 00:00:00 +0000</pubDate>
      
      <guid>https://blog.bramp.net/publication/characterising-and-exploiting-workloads-of-highly-interactive-video-on-demand/</guid>
      <description><p>Andrew Brampton, Andrew MacQuire, Michael Fry, Idris A. Rai, Nicholas J. P. Race, Laurent Mathy.</p>
<p>In journal of Multimedia Systems (2008 Volume 15, Issue 1)</p>
<blockquote>
<p><strong>Abstract</strong></p>
<p>This paper presents a detailed characterisation of user behaviour for a series of interactive video experiments over a 12 month period, in which we served popular sporting and musical content. In addition to generic VCR-like features, our custom-built video-on-demand application provides advanced interactivity features such as bookmarking. The dramatic impact of such functionality on how users consume content is studied and analysed. We discuss in detail how this user behaviour can be exploited by content distributors to improve user experience. Specifically, we study how simple dynamic bookmark placement and interactivity-aware content pre-fetching and replication can reduce the impact of highly interactive media on CDN performance.</p>
</blockquote>
<p><a href="https://github.com/bramp/publication/raw/master/ivod/MMSJ/iVOD_MMSJ.pdf">PDF Download</a> | <a href="https://github.com/bramp/publication/tree/master/ivod/MMSJ">LaTeX Source</a></p>
<p><a href="https://github.com/bramp/publication/raw/master/ivod/poster/Poster.pdf">Poster</a> | <a href="https://github.com/bramp/publication/tree/master/ivod/poster">Poster Source</a></p>
</description>
    </item>
    
    <item>
      <title>Characterising user interactivity for sports video-on-demand</title>
      <link>https://blog.bramp.net/publication/characterising-user-interactivity-for-sports-video-on-demand/</link>
      <pubDate>Sun, 01 Jul 2007 00:00:00 +0000</pubDate>
      
      <guid>https://blog.bramp.net/publication/characterising-user-interactivity-for-sports-video-on-demand/</guid>
      <description><p>Andrew Brampton, Andrew MacQuire, Idris A. Rai, Nicholas J. P. Race, Laurent Mathy, and Michael Fry.</p>
<p>In proceedings of the International workshop on Network and Operating Systems Support for Digital Audio &amp; Video (NOSSDAV’07)</p>
<blockquote>
<p><strong>Abstract</strong></p>
<p>This paper presents a detailed characterisation of user behaviour for a series of interactive sport videos from the 2006 FIFA World Cup. In addition to generic VCR-like features, our custom-built Video-on-Demand architecture enabled us to provide advanced interactivity features such as bookmarking. We illustrate how such functionality may have a dramatic impact on how users consume content. A detailed discussion is also provided on how content distributors may turn this knowledge to their advantage, and thus increase the efficiency of their delivery networks.</p>
</blockquote>
<p><a href="https://github.com/bramp/publication/raw/master/ivod/NOSSDAV07/p-brampton.pdf">PDF Download</a> | <a href="https://github.com/bramp/publication/tree/master/ivod/NOSSDAV07">LaTeX Source</a> | <a href="https://github.com/bramp/publication/raw/master/ivod/NOSSDAV07-slides/slides.pdf">Slides</a> | <a href="https://github.com/bramp/publication/tree/master/ivod/NOSSDAV07-slides">Slides Source</a></p>
</description>
    </item>
    
    <item>
      <title>Performance modelling of peer-to-peer routing</title>
      <link>https://blog.bramp.net/publication/performance-modelling-of-peer-to-peer-routing/</link>
      <pubDate>Thu, 01 Mar 2007 00:00:00 +0000</pubDate>
      
      <guid>https://blog.bramp.net/publication/performance-modelling-of-peer-to-peer-routing/</guid>
      <description><p>Idris A. Rai, Andrew Brampton, Andrew MacQuire, and Laurent Mathy.</p>
<p>In proceedings of the 4th International Workshop on Peer-to-Peer Systems (HOTP2P’07)</p>
<blockquote>
<p><strong>Abstract</strong></p>
<p>We propose several models based on discrete-time Markov chains for the analysis of Distributed Hash Tables (DHTs). Specifically, we examine the Pastry routing protocol, as well as a Stealth DHT adaptation of Pastry to compute their exact expressions for average number of lookup hops. We show that our analytical models match with the protocols&rsquo; simulation results almost perfectly, making them ideal for rapid evaluation.</p>
</blockquote>
<p><a href="https://github.com/bramp/publication/raw/master/stealth-dht/HOTP2P07/models.pdf">PDF Download</a> | <a href="https://github.com/bramp/publication/tree/master/stealth-dht/HOTP2P07">LaTeX Source</a> | <a href="https://github.com/bramp/publication/tree/master/stealth-dht/HOTP2P07-slides">Slides Source</a></p>
</description>
    </item>
    
    <item>
      <title>Stealth Distributed Hash Table: A robust and flexible super-peered DHT</title>
      <link>https://blog.bramp.net/publication/stealth-distributed-hash-table-a-robust-and-flexible-super-peered-dht/</link>
      <pubDate>Fri, 01 Dec 2006 00:00:00 +0000</pubDate>
      
      <guid>https://blog.bramp.net/publication/stealth-distributed-hash-table-a-robust-and-flexible-super-peered-dht/</guid>
      <description><p>Andrew Brampton, Andrew MacQuire, Idris A. Rai, Nicholas J. P. Race, and Laurent Mathy.</p>
<p>In proceedings of the 2nd Conference on Future Networking Technologies (CoNEXT’06)</p>
<blockquote>
<p><strong>Abstract</strong></p>
<p>Most Distributed Hash Tables (DHTs) simply consider interconnecting homogeneous nodes on the same overlay. However, realistically nodes on a network are heterogeneous in terms of their capabilities. Because of this, traditional DHTs have been shown to exhibit poor performance in a real-world environment. Additionally, we believe that it is this approach that contributes to a limited exploitation of peer-to-peer technologies. Previous work on super-peers in DHTs was proposed to address these performance issues, however the strategy used is often based on locally clustering peers around individual super-peers. This method of superpeering, however, compromises fundamental features such as load-balancing, resilience and routing efficiency, which traditional DHTs originally promised to offer. We propose a Stealth DHT which addresses the deficiencies of previous super-peer approaches by using the DHT algorithm itself to select the most appropriate super-peer for each message sent by peers. Through simulations and measurements, we show the fitness for purpose of our proposal.</p>
</blockquote>
<p><a href="https://github.com/bramp/publication/raw/master/stealth-dht/CoNEXT-2006/conext.pdf">PDF Download</a> | <a href="https://github.com/bramp/publication/tree/master/stealth-dht/CoNEXT-2006">LaTeX Source</a> | <a href="https://github.com/bramp/publication/blob/master/stealth-dht/CoNEXT-2006-slides/slides.ppt">Slides</a> | <a href="https://github.com/bramp/publication/tree/master/stealth-dht/CoNEXT-2006-slides">Slides Source</a></p>
</description>
    </item>
    
    <item>
      <title>Authentication in Stealth Distributed Hash Tables</title>
      <link>https://blog.bramp.net/publication/authentication-in-stealth-distributed-hash-tables/</link>
      <pubDate>Sat, 01 Jul 2006 00:00:00 +0000</pubDate>
      
      <guid>https://blog.bramp.net/publication/authentication-in-stealth-distributed-hash-tables/</guid>
      <description><p>Andrew MacQuire, Andrew Brampton, Idris A. Rai, and Laurent Mathy.</p>
<p>In Proceedings of the 32nd Euromicro Conference on Software Engineering and Advanced Applications</p>
<blockquote>
<p><strong>Abstract</strong></p>
<p>Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of nodes can actually have a detrimental effect upon performance. In this paper, we acknowledge that nodes on the same overlay may also differ in terms of their trustworthiness. However, implementing and enforcing security policies in a network where all nodes are treated equally is a non-trivial task. We therefore extend our previous work on Stealth DHTs to consider the differentiation of nodes based on their trustworthiness rather than their capabilities alone.</p>
</blockquote>
<p><a href="https://github.com/bramp/publication/raw/master/stealth-dht/Euromicro2006/Camera%20Ready/MacQuireA-Authentication.pdf">PDF Download</a> | <a href="https://github.com/bramp/publication/tree/master/stealth-dht/Euromicro2006">LaTeX Source</a> | <a href="https://github.com/bramp/publication/raw/master/stealth-dht/Euromicro2006-slides/authslides.pdf">Slides</a> | <a href="https://github.com/bramp/publication/tree/master/stealth-dht/Euromicro2006-slides">Slides Source</a></p>
<p><a href="https://github.com/bramp/publication/raw/master/stealth-dht/Euromicro2006/Journal%20Version/JSA-S-07-00036-1.pdf">Journal PDF</a> | <a href="https://github.com/bramp/publication/tree/master/stealth-dht/Euromicro2006/Journal%20Version">Journal LaTeX Source</a></p>
</description>
    </item>
    
    <item>
      <title>Performance analysis of Stealth DHT with mobile nodes.</title>
      <link>https://blog.bramp.net/publication/performance-analysis-of-stealth-dht-with-mobile-nodes./</link>
      <pubDate>Wed, 01 Mar 2006 00:00:00 +0000</pubDate>
      
      <guid>https://blog.bramp.net/publication/performance-analysis-of-stealth-dht-with-mobile-nodes./</guid>
      <description><p>Andrew MacQuire, Andrew Brampton, Idris A. Rai, and Laurent Mathy.</p>
<p>In proceedings of the 3rd International Workshop on Mobile Peer-to-Peer Computing (MP2P’06)</p>
<blockquote>
<p><strong>Abstract</strong></p>
<p>The advances in wireless networking and the consequent emergence of new applications that wireless networks increasingly support inevitably leads to low capability mobile nodes connecting to peer-to-peer networks. However, the characteristics of mobile nodes and limitations of access point coverage often cause mobile nodes to lose connectivity, which can cause many mobile nodes to simultaneously rejoin the network. Continuous departures and joins due to the mobility of nodes leads to mobility churn, which can often degrade the performance of the underlying peer-to-peer network significantly. In this paper, we use simulations to demonstrate that the Stealth Distributed Hash Table (Stealth DHT) algorithm is ideally suited for networks with mobile nodes. By avoiding storing state in unreliable nodes, a Stealth DHT prevents mobile nodes from being used by other nodes to provide services. Consequently, Stealth DHTs eliminate the mobility churn effect and significantly reduce the amount of overhead as compared to a generic DHT. This paper demonstrates this using simulation results that compare the performance of Stealth DHTs to a generic DHT, Pastry.</p>
</blockquote>
<p><a href="https://github.com/bramp/publication/raw/master/stealth-dht/MP2P06/Camera%20Ready/MP2P_MacQuire_A.pdf">PDF Download</a> | <a href="https://github.com/bramp/publication/tree/master/stealth-dht/MP2P06">LaTeX Source</a> | <a href="https://github.com/bramp/publication/raw/master/stealth-dht/MP2P06-slides/mp2pslides.pdf">Slides</a> | <a href="https://github.com/bramp/publication/tree/master/stealth-dht/MP2P06-slides">Slides Source</a></p>
</description>
    </item>
    
    <item>
      <title>Stealth Distributed Hash Table: Unleashing the Real Potential of Peer-to-Peer</title>
      <link>https://blog.bramp.net/publication/stealth-distributed-hash-table-unleashing-the-real-potential-of-peer-to-peer/</link>
      <pubDate>Sat, 01 Oct 2005 00:00:00 +0000</pubDate>
      
      <guid>https://blog.bramp.net/publication/stealth-distributed-hash-table-unleashing-the-real-potential-of-peer-to-peer/</guid>
      <description><p>Andrew Brampton, Andrew MacQuire, Idris A. Rai, Nicholas J. P. Race, and Laurent Mathy.</p>
<p>In Proceedings of the ACM Conference on Emerging Network Experiments and Technology (CoNEXT) (Student Workshop Session), Toulouse, France, October 2005.</p>
<p><a href="https://github.com/bramp/publication/raw/master/stealth-dht/CoNEXT-2005/sw13-brampton.pdf">PDF Download</a> | <a href="https://github.com/bramp/publication/tree/master/stealth-dht/CoNEXT-2005">LaTeX Source</a> | <a href="https://github.com/bramp/publication/raw/master/stealth-dht/CoNEXT-2005-poster/CoNEXT%20Poster.pdf">Poster</a> | <a href="https://github.com/bramp/publication/tree/master/stealth-dht/CoNEXT-2005-poster">Poster Source</a></p>
</description>
    </item>
    
  </channel>
</rss>
