
Rudra DuttaNorth Carolina State University | NCSU · Department of Computer Science
Rudra Dutta
Ph.D., Computer Science, North Carolina State University, 2001
About
179
Publications
20,862
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,798
Citations
Publications
Publications (179)
Peer-to-peer (P2P) botnets use decentralized command and control networks that make them resilient to disruptions. The P2P botnet overlay networks manifest structures in mutual-contact graphs, also called communication graphs, formed using network traffic information. It has been shown that these structures can be detected using community detection...
National radio dynamic zone (NRDZs) are intended to be geographically bounded areas within which controlled experiments can be carried out while protecting the nearby licensed users of the spectrum. An NRDZ will facilitate research and development of new spectrum technologies, waveforms, and protocols, in typical outdoor operational environments of...
The Aerial Experimentation and Research Platform for Advanced Wireless (AERPAW) has been recently funded by the National Science Foundation (NSF)’s Platforms for Advanced Wireless Research (PAWR) program. The AERPAW platform will enable experiments with programmable radios and programmable unmanned aerial vehicles (UAVs), conducted in a safe and re...
The 5G mobile communications systems merge traditionally separate communications and networking systems and services to effectively support a myriad of heterogeneous applications. Researchers and industry working groups are investigating the integration of aerial nodes, shared spectrum techniques, and new network architectures, which are gradually...
Interconnection between our existing optical packet and circuit integrated network (OPCInet) and an ecosystem for network service provisioning named ChoiceNet enables network service providers to provide diverse services and realize control driven by the providers. In this paper, we design and implement control interfaces for the interconnection, w...
Network administration and management tasks play an integral role in Information Technology (IT) operations; which are utilized across a diverse set of organizations. The reliability of networks is therefore of crucial importance for ensuring effective business processes. All IT networks are administered and managed by human administrators. As the...
Network service orchestration across heterogeneous networks needs an open marketplace where the services advertised by the providers in different domains can be purchased for short-term or long-term time scales. The authors present two design paradigms and evaluate two corresponding prototypes which provide a framework for network services to be pu...
In various resource sharing networks, opportunistic resources with dynamic quality are often present for the users to exploit. As many user tasks are delay-tolerant, this favorably allows the network users to wait for and access the opportunistic resource at the time of its best quality. For such delay-tolerant and opportunistic resource sharing ne...
Communication networks and services play a vital role in our modern lives. This importance is expected to continue to grow in future decades. More and more business, healthcare or government organizations will become increasingly dependent on the communication between their offices and people. Not only does modern society depend on these services i...
Zero-determinant (ZD) strategies that allow a player to unilaterally control the linear combinations of its own and other players' expected rewards in iterated games have recently found wide applications. However, existing ZD strategies mainly focus on some specific scenarios with restrictions on the number of players or actions a player can take....
Software obfuscation is a commonly used technique to protect software, especially against reverse-engineering attacks. It is a form of security through obscurity and is commonly used for intellectual property and Digital Rights Management protection. However, this increase of security may come at the expense of increased vulnerabilities in another...
Software obfuscation is a commonly used technique to protect software, especially against reverse-engineering attacks. It is a form of security through obscurity and is commonly used for intellectual property and Digital Rights Management protection. However, this increase of security may come at the expense of increased vulnerabilities in another...
Computer and communication networks form part of the critical infrastructure of planetary society, and much work has gone into making the technology for such networks reliable. However, such networks have to be administered and managed by human administrators. The process of such administration, as it becomes increasingly complex, itself poses a ch...
Optical networks continue to provide the highperformance, high-bandwidth substrate of the planetary communication networks. The rapidly increasing and changing variety of demands placed on such networks requires that optical networks be increasingly agile and responsive to end-consumer traffic needs. Because of multiple levels of aggregation, the o...
The problem of providing an agile, energy-aware, flexible optical network architecture is one of the challenges in optical networking in the coming decade. A key element in this challenge is the balancing of the benefits to customer and provider, and creating an agile system capable of reflecting both provider and customer interests on an ongoing b...
Motivated by information-theoretic security, link signature (LS)-based security mechanisms exploit the ample channel characteristics between wireless devices for security establishment. Nevertheless, LS is originated from wireless environments and hence may exhibit potential vulnerabilities that can be exploited by adversary in the vicinity. As to...
Wireless multihop networks have a wide variety of applications, due to their rapid deployment times and minimal configuration requirements. Transmissions in wireless networks may require performance guarantees, which can be achieved by using advanced routing strategies. We examine one such performance metric, namely reliability, or packet delivery...
Wireless multihop networks such as ad hoc and mesh networks are susceptible to both random uncertainty of radio links and malicious jamming. Traditional unipath routing techniques reduce the overall packet delivery ratio in presence of network failures. Being able to predict the reliability of a transmission a priori can be useful in designing reli...
Software Defined Networking (SDN) offers traffic characterization and resource allocation policies to change dynamically, while avoiding the obsolescence of specialized forwarding equipment. Open Flow, a SDN standard, is currently the only standard that explicitly focuses on multi-vendor openness. Unfortunately, it only provides for traffic enginee...
The Internet has been a key enabling technology for many new distributed applications and services. However, the deployment of new protocols and services in the Internet infrastructure itself has been sluggish, especially where economic incentives for network providers are unclear. In our work, we seek to develop an "economy plane" for the Internet...
In this study, we present a control theoretic technique to model routing in wireless
multihop networks. We model ad hoc wireless networks as stochastic dynamical systems
where, as a base case, a centralized controller pre-computes optimal paths to the
destination. The usefulness of this approach lies in the fact that it can help obtain bounds on...
In this paper, we make an initial attempt to employ Grounded Theory approach to gather the corpus of common human errors in the current process of network administration and management over a large variety of organizations and working environments; categorize such errors regarding their potential impact on the security of future script-based manage...
In this work, we demonstrate the real world results of a verification service that verifies the performance of a set of network providers by measuring the user flows, using GENI experimental facility. We first give an overview of the architectural components and their interactions to enable such a verification capability. We then give the experimen...
We articulate how the area of traffic grooming may be combined with the ChoiceNet Future Internet architecture, to create an agile system capable of reflecting both provider and customer interests on an ongoing basis as network conditions change.
While the mesh network paradigm does not constrain the physical and medium layer realizations, some technologies emerge over time as clearly being better suited. This becomes especially true when considering service continuity issues, and therefore robustness of enabling technologies. In recent times, Multiple Input Multiple Output (MIMO) technolog...
Internet Protocol (IP) telephony is an alternative to the traditional Public Switched Telephone Networks (PSTN), and the Session Initiation Protocol (SIP) is quickly becoming a popular signaling protocol for VoIP-based applications. SIP is a peer-to-peer multimedia signaling protocol standardized by the Internet Engineering Task Force (IETF), and i...
At the beginning of our research, we identified that there are very limited research is being done on SIP proxy server performance and VoIP in general. In a very fast phase, due to the growth of Internet based technologies, IP telephony quickly became a direct replacement for PSTN. Lack of any SIP proxy server performance study is mainly because of...
With our detailed comparative study of M ∕ M ∕ 1 model with the experimental results with the open source SIP proxy server software (IPTEL 2002) and also with our proposed analytical M ∕ D ∕ 1 model, we continued our study more on the internal details of SPS software components, processes and complete software implementations. During the course of...
This book focused on studying the performance characteristics and scalability aspects of SIP proxy server, which plays a vital role in the SIP architecture based network. Since it is not realistically possible to simulate or emulate the real world SIP network and study the performance characteristics of the SIP proxy server, significant effort was...
Both academia and telecommunication industries did several studies and published many literatures on the performance and reliability of PSTN based SS7 signaling. Authors in Wang (1991) studied the performance analysis of link sets on the CCS7 network based on SS7 signaling with complete derivation on the analytical queuing and delay models. Several...
During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using an Intelligent Network (IN) called Signaling System Number 7 (SS7). SS7 was considered one of the most reliable and capable signaling protocols. IN is defined as an architectural concept for the operation and provision of services as recommend...
Security to SIP network is of foremost important, since SIP is deployed in a large scale in various industries, universities, Department of Defense, banks, Wall Street and other areas where they use Internet telephony. Very little research has been focused so far in evaluating the SPS when different non-secure and secure transport protocols are use...
Statistical definitions and formulae references from Matthews (2002) and Yan and Su (2009). ANOVA stands for Analysis Of Variance. In general, this statistical procedure compares the variance of scores in each of the groups of an experiment. With the two sample t-tests, we can have experiments with only two groups. With ANOVA, we can have as many g...
During the course of this research, we realized that the performance of the proxy server, which is fundamentally a software entity, depends heavily on the software architecture of the system (that is, how the functionality is factored, and apportioned between various threads of execution, and various ways to communicate between functional modules)....
In applications, it is often important to forecast the value of a random variable Y (which can be difficult or impossible to measure directly) using the observations of another random variable X (which can be more accessible for direct measurements). An important result of the probability theory is that when the two random variables are normal the...
The core idea for this part of research is to investigate the multi proxy environment, so that the SIP calls can pass through multiple proxy servers and latency is considered. We investigated the impact of Call Hold Time (CHT) in SPS performance with the help of a separate empirical study in the lab. For this study, we considered a multi-hop proxy...
In this paper, we propose a service architecture for verification, a necessary component of a choice-based economy architecture of the future Internet. Such a verification architecture motivates and addresses the task of enabling users to verify, or obtain third-party verification of, whether the service components offered by various network servic...
The problem of providing an agile, energy-aware, flexible optical network architecture is one of the challenges in optical networking in the coming decade. A key element in this challenge is the balancing of the benefits to customer and provider, and creating an agile system capable of reflecting both provider and customer interests on an ongoing b...
Network virtualization refers to a broad set of technologies. Commercial solutions have been offered by the industry for years, while more recently the academic community has emphasized virtualization as an enabler for network architecture research, deployment, and experimentation. We review the entire spectrum of relevant approaches with the goal...
Computer networks, in particular the Internet, represent essential infrastructure for business, government, military, and personal communication. Several recent trends in technology and network use have pushed the capabilities required of the Internet beyond what can be provided by the currently deployed infrastructure. To address these limitations...
The general concept of fault tolerance can be quantified in various different metrics, reflecting different needs, concerns and perceived risks. We start with a short primer on the general concept of survivability, and introduce some of these metrics. We argue that availability and performability are useful metrics to reflect the goal of service co...
Having described individual problems of design in mesh networks in an earlier chapter, we now describe design problems that more recent literature has focused on, which address the problem of jointly designing more than one functional or operational aspect of the network, such as joint routing and power control. As before, we survey solution approa...
We continue our discussion of traditional design problems in mesh networks, preparatory to the discussion of joint design in a following chapter. In this chapter, we focus on network-wide issues in mesh design, or issues that in some sense emerge at the network level. In particular, we focus on routing, deployment planning, performance modeling, ra...
To enable the discussion of joint design in a following chapter, we introduce and discuss the more traditional design problems in this chapter. We focus on organizing our discussion by the fundamental problems and operations in the network. In particular, in this chapter, we focus on issues closer to the physical medium, such as the modeling of int...
The recently emerged paradigm of Wireless Mesh Networks (WMN) is finding applicability in last few miles and last hop connectivity, and the study of WMNs is useful in understanding multihop wireless networks for more specific application domains as well as mesh networks themselves. We briefly introduce the mesh paradigm, and remark on the very gene...
There has been a great interest in defining a new network architecture that can meet the needs of a future Internet. One of the main challenges in this context is how to realize the many different technical solutions that have developed in recent years in a single coherent architecture. In addition, it is necessary to consider how to ensure economi...
With recent advances in Software-defined Radios (SDRs), it has indeed became feasible to dynamically adapt the channel widths at smaller time scales. Even though the advantages of varying channel width (e.g. higher link throughput with higher width) have been explored before, as with most of the physical layer settings (rate, transmission power etc...
The back-pressure based scheduling policy originally proposed by Tassiulas et al. in [1] has shown the potential of solving many fairness and network utilization related problems of wireless multi-hop networks. Recently, the scheduling policy has been adapted in random medium access protocols such as CSMA/CA using prioritization of MAC layer transm...
Optical networks are widely used in communication systems. Finding optimal converter placement for broadcast on optical networks has been an important area of research. In this problem, the free wavelengths on different links of a optical network are used to support network-wide broadcast, which is useful as a control channel or other OAM tasks. Pr...
Ad hoc wireless networks are characterized by frequent node mobility, limited power reserves and interfering transmissions. On-demand routing proves to be more successful in such networks, as it reduces the traffic overhead of sending periodic updates, but they may be susceptible to both random uncertainty in radio links, and malicious jamming. We...
Wireless networks are susceptible to localized dis-ruptions, due to the shared nature of the medium. Radio jamming, the most common type of localized disruption causes wireless link failures. Jamming mitigation has been traditionally addressed in the physical and MAC layers. Such approaches come with added complexity and often require specialized h...
In recent years, Internet Protocol (IP) telephony has been a real alternative to the traditional Public Switched Telephone Networks (PSTN). IP telephony offers more flexibility in the implementation of new features and services. The Session Initiation Protocol (SIP) is becoming a popular signalling protocol for Voice over IP (VoIP) based applicatio...