Jessie Hui Wang
Tsinghua University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jessie Hui Wang.
acm special interest group on data communication | 2011
Jianping Wu; Jessie Hui Wang; Jiahai Yang
Research and promotion of next generation Internet have drawn attention of researchers in many countries. In USA, FIND initiative takes a clean-slate approach. In EU, EIFFEL think tank concludes that both clean slate and evolutionary approach are needed. While in China, researchers and the country are enthusiastic on the promotion and immediate deployment of IPv6 due to the imminent problem of IPv4 address exhaustion. Since 2003, China launched a strategic programme called China Next Generation Internet (CNGI). China is expecting that Chinese industry is better positioned on future Internet technologies and services than it was for the first generation. Under the support of CNGI grant, China Education and Research Network (CERNET) started to build an IPv6-only network, i.e. CNGI-CERNET2. Currently it provides IPv6 access service for students and staff in many Chinese universities. In this article, we will introduce the CNGI programme, the architecture of CNGI-CERNET2, and some aspects of CNGI-CERNET2s deployment and operation, such as transition, security, charging and roaming service etc.
IEEE Transactions on Network and Service Management | 2007
Jessie Hui Wang; Dah Ming Chiu; John C. S. Lui; Rocky K. C. Chang
AS Path Prepending (ASPP) is a popular method for the inter-AS inbound traffic engineering, which is known to be more difficult than the outbound traffic engineering. Although the ASPP approach has been extensively practised by many ASes, it is surprising that there still lacks a systematic study of this approach and the basic understanding of its effectiveness. In this paper, we introduce the concept, applicability and potential instability problem of the ASPP approach. Some guidelines are given as the first step to study the method to avoid instability problem. Finally, we study the dynamic prepending behavior of ISPs and show a real-world pathologic case of prepending instability based on our measurement study of RouteViews data.
Peer-to-peer Networking and Applications | 2011
Jessie Hui Wang; Chungang Wang; Jiahai Yang; Changqing An
The flourish of P2P systems draws a lot of attention of networking researchers. Some research efforts focus on P2P systems, trying to understand the mechanism of various implementations and the behavior pattern of P2P users, and then improve the systems’ performance. Others look at the issue from the angle of ISPs, trying to help ISPs solve various issues brought by P2P applications. In this article, we conduct a review study on recent research efforts in these two areas. The first part of this article focuses on several key strategies that have significant influence on the performance of P2P systems. In the second part, we review some important techniques for ISPs to manage P2P traffic, i.e., blocking, caching and localization, and compare their advantages and disadvantages.
Computer Communications | 2015
Jessie Hui Wang; Jeffrey Cai; Kevin Yin; Jiahai Yang
Abstract Currently, multicast in cloud networks without the support of underlay IP multicast relies on one-to-all replications, which wastes networking resources and may induce bottlenecks. In this paper, we point out this issue should be solved as an overlay routing problem and the special architecture of cloud networks should be fully exploited. Then we propose a solution which includes a SDN framework and an algorithm to construct a degree-constrained overlay multicast routing tree. Our simulations show that its performance is better than current solution. Moreover, it can deal with various multicast groups and it scales well with both group size and cloud size.
international conference on communications | 2012
Jessie Hui Wang; Yang Wang; Mingwei Xu; Jiahai Yang
Although most researchers have agreed that the locator/identifier separation is beneficial for the Internet, there is no consensus on how to define the “identifier”. In this paper, we propose a scheme in which identifiers are distributed by authorities to endpoints, and the authorities are responsible for maintaining real-time locators of endpoints with identifiers they distributed. This scheme can be helpful to accounting, security and other network management tasks. We also present in details how to implement this scheme with extended DNS and a new infrastructure, i.e., ID Mapping System (IDMS).
international conference on information networking | 2016
Pengcheng Du; Jessie Hui Wang; Jiahai Yang; Jianfeng Wang; Youjian Zhao
Routing detours raise concerns both on network security of nations and efficiency of resource consumption. Geo-optimal routing can be viewed as a long term goal of Internet routing, and a careful designed Internet together with geo-optimal routing can produce the best performance for the Internet. In this paper, we focus on some representative intercontinental circuitous paths summarized from our measurement data set. With the help of PeerDB and CAIDA, we try to find possible reasons for the detour routing and propose some suggestions to improve interconnection and routing for ISPs.
Computer Networks | 2018
Jessie Hui Wang; Changqing An
Abstract In order to make a better control over the routing of Internet traffic, more and more researchers and governments want to understand how international reachability depends on individual countries. It has been necessary and valuable for us to study the geographic properties of Internet routing. In this paper, we conduct a measurement study on the dataset from 2011 to 2015 to understand two geographic properties of Internet routing: geographically routing circuitousness of paths and geographically routing centrality of countries and continents. Our analysis shows that the routing circuitousness of our Internet is deteriorating in these years. We also find that United States, Great British, France and Germany have most control over the data transfer in the Internet, but their farness centrality indexes are not smallest. Furthermore, our temporal analysis on the routing dependence among countries and continents finds out the importance of Europe was decreasing comparing with its competitor North America in the past years.
Networking Conference, 2014 IFIP | 2014
Zejia Chen; Jiahai Yang; Jessie Hui Wang
With tremendous popularity, OSNs have become the most important platform for marketing and advertising during the past years. Meanwhile, spamming has already become a very serious problem in OSNs, drawing the attention of both academic and industry communities. In this paper, we investigate the problem of spammer detection from the perspective of user behaviors, including relation creation, user activeness, user interaction and tweet content. We quantitatively explore their correlations with spammer detection and find that tweet content is the most important factor for spammer detection, followed by relation creation. Based on these behavior factors, we propose a novel cascading framework CWB-SPAM for spammer detection in OSNs. Experiments on dataset crawled from Sina Microblog show that the proposed algorithm outperforms over all classical algorithms we investigated in terms of F-score1. Experiments also demonstrate that as a probabilistic classification model, the proposed CWB-SPAM has a good ranking quality. It enables the OSN operators to make tradeoff between precision and recall easily so that the proposed algorithm can be used in different scenarios. Besides, we also note that the proposed framework can be used in other probabilistic binary classification models and thus applied in more scenarios.
Computer Networks | 2008
Jessie Hui Wang; Dah Ming Chiu; John C. S. Lui
international workshop on quality of service | 2006
Jessie Hui Wang; Dah Ming Chiu; John C. S. Lui