Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jessie Hui Wang is active.

Publication


Featured researches published by Jessie Hui Wang.


acm special interest group on data communication | 2011

CNGI-CERNET2: an IPv6 deployment in China

Jianping Wu; Jessie Hui Wang; Jiahai Yang

Research and promotion of next generation Internet have drawn attention of researchers in many countries. In USA, FIND initiative takes a clean-slate approach. In EU, EIFFEL think tank concludes that both clean slate and evolutionary approach are needed. While in China, researchers and the country are enthusiastic on the promotion and immediate deployment of IPv6 due to the imminent problem of IPv4 address exhaustion. Since 2003, China launched a strategic programme called China Next Generation Internet (CNGI). China is expecting that Chinese industry is better positioned on future Internet technologies and services than it was for the first generation. Under the support of CNGI grant, China Education and Research Network (CERNET) started to build an IPv6-only network, i.e. CNGI-CERNET2. Currently it provides IPv6 access service for students and staff in many Chinese universities. In this article, we will introduce the CNGI programme, the architecture of CNGI-CERNET2, and some aspects of CNGI-CERNET2s deployment and operation, such as transition, security, charging and roaming service etc.


IEEE Transactions on Network and Service Management | 2007

Inter-AS Inbound Traffic Engineering via ASPP

Jessie Hui Wang; Dah Ming Chiu; John C. S. Lui; Rocky K. C. Chang

AS Path Prepending (ASPP) is a popular method for the inter-AS inbound traffic engineering, which is known to be more difficult than the outbound traffic engineering. Although the ASPP approach has been extensively practised by many ASes, it is surprising that there still lacks a systematic study of this approach and the basic understanding of its effectiveness. In this paper, we introduce the concept, applicability and potential instability problem of the ASPP approach. Some guidelines are given as the first step to study the method to avoid instability problem. Finally, we study the dynamic prepending behavior of ISPs and show a real-world pathologic case of prepending instability based on our measurement study of RouteViews data.


Peer-to-peer Networking and Applications | 2011

A study on key strategies in P2P file sharing systems and ISPs’ P2P traffic management

Jessie Hui Wang; Chungang Wang; Jiahai Yang; Changqing An

The flourish of P2P systems draws a lot of attention of networking researchers. Some research efforts focus on P2P systems, trying to understand the mechanism of various implementations and the behavior pattern of P2P users, and then improve the systems’ performance. Others look at the issue from the angle of ISPs, trying to help ISPs solve various issues brought by P2P applications. In this article, we conduct a review study on recent research efforts in these two areas. The first part of this article focuses on several key strategies that have significant influence on the performance of P2P systems. In the second part, we review some important techniques for ISPs to manage P2P traffic, i.e., blocking, caching and localization, and compare their advantages and disadvantages.


Computer Communications | 2015

Solving multicast problem in cloud networks using overlay routing

Jessie Hui Wang; Jeffrey Cai; Kevin Yin; Jiahai Yang

Abstract Currently, multicast in cloud networks without the support of underlay IP multicast relies on one-to-all replications, which wastes networking resources and may induce bottlenecks. In this paper, we point out this issue should be solved as an overlay routing problem and the special architecture of cloud networks should be fully exploited. Then we propose a solution which includes a SDN framework and an algorithm to construct a degree-constrained overlay multicast routing tree. Our simulations show that its performance is better than current solution. Moreover, it can deal with various multicast groups and it scales well with both group size and cloud size.


international conference on communications | 2012

Separating identifier from locator with extended DNS

Jessie Hui Wang; Yang Wang; Mingwei Xu; Jiahai Yang

Although most researchers have agreed that the locator/identifier separation is beneficial for the Internet, there is no consensus on how to define the “identifier”. In this paper, we propose a scheme in which identifiers are distributed by authorities to endpoints, and the authorities are responsible for maintaining real-time locators of endpoints with identifiers they distributed. This scheme can be helpful to accounting, security and other network management tasks. We also present in details how to implement this scheme with extended DNS and a new infrastructure, i.e., ID Mapping System (IDMS).


international conference on information networking | 2016

Analyzing intercontinental circuitousness to improve the interconnection and routing for ISPs

Pengcheng Du; Jessie Hui Wang; Jiahai Yang; Jianfeng Wang; Youjian Zhao

Routing detours raise concerns both on network security of nations and efficiency of resource consumption. Geo-optimal routing can be viewed as a long term goal of Internet routing, and a careful designed Internet together with geo-optimal routing can produce the best performance for the Internet. In this paper, we focus on some representative intercontinental circuitous paths summarized from our measurement data set. With the help of PeerDB and CAIDA, we try to find possible reasons for the detour routing and propose some suggestions to improve interconnection and routing for ISPs.


Computer Networks | 2018

A study on geographic properties of internet routing

Jessie Hui Wang; Changqing An

Abstract In order to make a better control over the routing of Internet traffic, more and more researchers and governments want to understand how international reachability depends on individual countries. It has been necessary and valuable for us to study the geographic properties of Internet routing. In this paper, we conduct a measurement study on the dataset from 2011 to 2015 to understand two geographic properties of Internet routing: geographically routing circuitousness of paths and geographically routing centrality of countries and continents. Our analysis shows that the routing circuitousness of our Internet is deteriorating in these years. We also find that United States, Great British, France and Germany have most control over the data transfer in the Internet, but their farness centrality indexes are not smallest. Furthermore, our temporal analysis on the routing dependence among countries and continents finds out the importance of Europe was decreasing comparing with its competitor North America in the past years.


Networking Conference, 2014 IFIP | 2014

A cascading framework for uncovering spammers in social networks

Zejia Chen; Jiahai Yang; Jessie Hui Wang

With tremendous popularity, OSNs have become the most important platform for marketing and advertising during the past years. Meanwhile, spamming has already become a very serious problem in OSNs, drawing the attention of both academic and industry communities. In this paper, we investigate the problem of spammer detection from the perspective of user behaviors, including relation creation, user activeness, user interaction and tweet content. We quantitatively explore their correlations with spammer detection and find that tweet content is the most important factor for spammer detection, followed by relation creation. Based on these behavior factors, we propose a novel cascading framework CWB-SPAM for spammer detection in OSNs. Experiments on dataset crawled from Sina Microblog show that the proposed algorithm outperforms over all classical algorithms we investigated in terms of F-score1. Experiments also demonstrate that as a probabilistic classification model, the proposed CWB-SPAM has a good ranking quality. It enables the OSN operators to make tradeoff between precision and recall easily so that the proposed algorithm can be used in different scenarios. Besides, we also note that the proposed framework can be used in other probabilistic binary classification models and thus applied in more scenarios.


Computer Networks | 2008

A game-theoretic analysis of the implications of overlay network traffic on ISP peering

Jessie Hui Wang; Dah Ming Chiu; John C. S. Lui


international workshop on quality of service | 2006

Modeling the Peering and Routing Tussle between ISPs and P2P Applications

Jessie Hui Wang; Dah Ming Chiu; John C. S. Lui

Collaboration


Dive into the Jessie Hui Wang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dah Ming Chiu

The Chinese University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

John C. S. Lui

The Chinese University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yang Yang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge