Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Xiaoqiao Meng is active.

Publication


Featured researches published by Xiaoqiao Meng.


IEEE Journal on Selected Areas in Communications | 2006

SCAN: self-organized network-layer security in mobile ad hoc networks

Hao Yang; James Shu; Xiaoqiao Meng; Songwu Lu

Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper, we describe SCAN, a unified network-layer security solution for such networks that protects both routing and data forwarding operations through the same reactive approach. SCAN does not apply any cryptographic primitives on the routing messages. Instead, it protects the network by detecting and reacting to the malicious nodes. In SCAN, local neighboring nodes collaboratively monitor each other and sustain each other, while no single node is superior to the others. SCAN also adopts a novel credit strategy to decrease its overhead as time evolves. In essence, SCAN exploits localized collaboration and information cross-validation to protect the network in a self-organized manner. Through both analysis and simulation results, we demonstrate the effectiveness of SCAN even in a highly mobile and hostile environment.


international symposium on computers and communications | 2002

How bad TCP can perform in mobile ad hoc networks

Zhenghua Fu; Xiaoqiao Meng; Songwu Lu

Several recent studies have indicated that TCP performance degrades significantly in mobile ad hoc networks. This paper examines how badly TCP may perform in such networks and provides a quantitative characterization of this performance gap. Previous approaches typically made comparisons by ignoring the inherent dynamics such as mobility, channel error and shared-channel contention. Our work provides a realistic, achievable TCP throughput upper bound, and may serve as a benchmark for future TCP modifications in ad hoc networks. Our simulation findings indicate that node mobility, especially mobility-induced network disconnection and reconnection events, has the most significant impact on TCP performance. TCP NewReno merely achieves about 10% of a reference TCPs throughput in such cases. As mobility increases, the relative throughput drop ranges from almost 0% in the static case to 1000% in a highly mobile scenario (mobility speed is 20 m/sec). In contrast, congestion and mild channel error (say, 1%) have less visible effect on TCP (with less than 10% performance drop compared with the reference TCP).


acm/ieee international conference on mobile computing and networking | 2004

Characterizing flows in large wireless data networks

Xiaoqiao Meng; Starsky H.Y. Wong; Yuan Yuan; Songwu Lu

Several studies have recently been performed on wireless university campus networks, corporate and public networks. Yet little is known about the flow-level characterization in such networks. In this paper, we statistically characterize both static flows and roaming flows in a large campus wireless network using a recently-collected trace. For static flows, we take a two-tier approach to characterizing the flow arrivals, which results a Weibull regression model. We further discover that the static flow arrivals in spatial proximity show strong similarity. As for roaming flows, they can also be well characterized statistically.We explain the results by user behaviors and application demands, and further cross-validate the modeling results by three other traces. Finally, we use two examples to illustrate how to apply our models for performance evaluation in the wireless context.


international conference on network protocols | 2002

Design and implementation of a TCP-friendly transport protocol for ad hoc wireless networks

Zhenghua Fu; Benjamin Greenstein; Xiaoqiao Meng; Songwu Lu

Transport protocol design for mobile ad hoc networks is challenging because of unique issues, including mobility-induced disconnection, reconnection, and high out-of-order delivery ratios; channel errors; and network congestion. We describe the design and implementation of a TCP-friendly transport protocol for ad hoc networks. Our key design novelty is to perform multi-metric joint identification for packet and connection behaviors based on end-to-end measurements. Our testbed measurements and ns-2 simulations show a significant performance improvement over standard TCP in ad hoc networks.


acm special interest group on data communication | 2005

IPv4 address allocation and the BGP routing table evolution

Xiaoqiao Meng; Zhiguo Xu; Beichuan Zhang; Geoff Huston; Songwu Lu; Lixia Zhang

The IP address consumption and the global routing table size are two of the vital parameters of the Internet growth. In this paper we quantitatively characterize the IPv4 address allocations made over the past six years and the global BGP routing table size changes during the same period of time. About 63,000 address blocks have been allocated since the beginning of the Internet, of which about 18,000 address blocks were allocated during our study period, from November 1997 to August 2004. Among these 18,000 allocations, 90% of them started being announced into the BGP routing table within 75 days after the allocation, while 8% of them has not been used up to now. Among all the address blocks that have ever been used, 45% of them were split into fragments smaller than the original allocated blocks; without these fragementations, the current BGP table would have been about half of its current size. Furthermore, we found that the evolution of BGP routing table consists of both the appearance of new prefixes and the disappearance of old prefixes. While the change of the BGP routing table size only reflects the combined results of the two processes, the dynamics of either process is much higher than that of the BGP table size. Finally, we classify routing prefixes into covering and covered ones, and examine their evolution separately. For the covered prefixes, which account for almost half of the BGP table size, we infer their practical motives such as multihoming, load balancing, and traffic engineering, etc., via a classification method.


IEEE Journal on Selected Areas in Communications | 2003

A transport protocol for supporting multimedia streaming in mobile ad hoc networks

Zhenghua Fu; Xiaoqiao Meng; Songwu Lu

Transport protocol design for supporting multimedia streaming in mobile ad hoc networks is challenging because of unique issues, including mobility-induced disconnection, reconnection, and high out-of-order delivery ratios; channel errors and network congestion. In this paper, we describe the design and implementation of a transmission control protocol (TCP)-friendly transport protocol for ad hoc networks. Our key design novelty is to perform multimetric joint identification for packet and connection behaviors based on end-to-end measurements. Our NS-2 simulations show significant performance improvement over wired TCP friendly congestion control and TCP with explicit-link-failure-notification support in ad hoc networks.


Computer Networks | 2006

Contour maps: monitoring and diagnosis in sensor networks

Xiaoqiao Meng; Thyaga Nandagopal; Li Li; Songwu Lu

Large-scale sensor networks impose energy and communication constraints, thus it is difficult to collect data from each individual sensor node and process it at the sink. In this paper, we propose an efficient data-collection scheme that can be used for event monitoring or network-wide diagnosis. Our scheme relies on the well-known representation of data--contour maps, which trade off accuracy with the amount of samples. The scheme consists of three novel algorithms to build contour maps: distributed spatial and temporal data suppression, contour reconstruction at the sink via interpolation and smoothing, and an efficient mechanism to convey routing information over multiple hops. By reducing the number of transmissions required to convey relevant information to the sink, the proposed contour mapping scheme saves energy and improves network lifetime. In a sharp contrast to related work in this area, the scheme does not require all nodes to explicitly share information.The contour mapping scheme can be applied for tasks such as: (1) presenting a global picture of the network in both temporal and spatial domains, (2) being used as a diagnosis tool, e.g., to detect faulty sensors and to scan for residual energy, (3) working in concert with in-network aggregation schemes to further reduce the communication overhead of aggregation schemes. The proposed scheme imposes little processing and storage overhead, allowing for the sensor networking paradigm of dumb sensor, smart sink which enables economical deployment of large-scale sensor networks.Simulation results show that our scheme is resilient to both high packet loss rate and measurement noise. The design is also energy efficient, resulting in up to an-order-of-magnitude power savings when compared with the base line scheme where every sensor sends its report to the sink.


internet measurement conference | 2006

A study of the short message service of a nationwide cellular network

Petros Zerfos; Xiaoqiao Meng; Starsky H.Y. Wong; Vidyut Samanta; Songwu Lu

In recent years, cellular networks have experienced an astronomical increase in the use of Short Message Service (SMS), making it a popular communication means for inter-personal as well as content provider-to-person usage. Yet little is known about the traffic and message user behavior in real SMS systems. In this paper, we present a measurement study of SMS based on traces collected from a nationwide cellular carrier during a three-week period. We characterize message traffic at both the message level and the conversation thread level. We also examine the store-and-forward mechanism of SMS and present initial measurements on how messages are actually delivered.


ieee international conference computer and communications | 2007

Analysis of the Reliability of a Nationwide Short Message Service

Xiaoqiao Meng; Petros Zerfos; Vidyut Samanta; Starsky H.Y. Wong; Songwu Lu

SMS has been arguably the most popular wireless data service for cellular networks. Due to its ubiquitous availability and universal support by mobile handsets and cellular carriers, it is also being considered for emergency notification and other mission-critical applications. Despite its increased popularity, the reliability of SMS service in real-world operational networks has received little study so far. In this work, we investigate the reliability of SMS by analyzing traces collected from a nationwide cellular network over a period of three weeks. Although the SMS service incorporates a number of reliability mechanisms such as delivery acknowledgement and multiple retries, our study shows that its reliability is not as good as we expected. For example the message delivery failure ratio is as high as 5.1% during normal operation conditions. We also analyze the performance of the service under stressful conditions, and in particular during a flash-crowd event that occurred in New Years Eve of 2005. Two important factors that adversely affect reliability of SMS are also examined: bulk message delivery that may induce network-wide congestion, and the topological structure of the social network formed by SMS users, which may facilitate quick propagation of viruses or other malware.


Lecture Notes in Computer Science | 2003

TCP Friendly Rate Adaptation for Multimedia Streaming in Mobile ad hoc Networks

Zhenghua Fu; Xiaoqiao Meng; Songwu Lu

Transport protocol for supporting multimedia streaming in mobile ad hoc networks has to cope with the rich dynamics, such as mobility-induced disconnection and reconnection, high out-of-order delivery ratios, channel errors, and network congestion. In this work, we design and implementate ADTFRC, a TCP-friendly transport protocol for ad hoc networks. ADTFRC adapts wireline TFRC protocol to ad hoc networks with improved rate adaptation behavior, the capability of application layer framing and selective retransmission. ADTFRC detects different packet loss behaviors based on end-to-end measurements of multiple metrics. This allows ADTFRC to more accurately gauge the network behavior and achieve higher throughput. Simulations show that the performance of ADTFRC is higher than standard TFRC and TCP with explicit-link-failure-notification (ELFN) support in terms of throughput, rate adaptation behavior and application level quality while still maintaining the TCP-Friendliness property.

Collaboration


Dive into the Xiaoqiao Meng's collaboration.

Top Co-Authors

Avatar

Songwu Lu

University of California

View shared research outputs
Top Co-Authors

Avatar

Zhenghua Fu

University of California

View shared research outputs
Top Co-Authors

Avatar

Lixia Zhang

University of California

View shared research outputs
Top Co-Authors

Avatar

Zhiguo Xu

University of California

View shared research outputs
Top Co-Authors

Avatar

Vidyut Samanta

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge