scispace - formally typeset
J

Jia Wang

Researcher at AT&T Labs

Publications -  144
Citations -  10291

Jia Wang is an academic researcher from AT&T Labs. The author has contributed to research in topics: Network packet & The Internet. The author has an hindex of 49, co-authored 135 publications receiving 9891 citations. Previous affiliations of Jia Wang include Hebei University & AT&T.

Papers
More filters
Proceedings ArticleDOI

Understanding end-to-end performance: testbed and primary results

TL;DR: A generic testbed is proposed using a combination of simulation and emulation techniques to evaluate the end-to-end performance of user applications in different network environments and the effect of network QoS metrics on the perceptual quality of various user applications is studied.
Patent

System and method for real-time diagnosis of routing problems

TL;DR: In this article, a system and method for detecting and diagnosing routing problems in a network in real-time by recording TCP flow information from one server to at least one prefix, and observing retransmission packets communicated from the at least 1 server to one prefix is presented.

The Implication of Network Performance on Service Quality

TL;DR: A new testbed is proposed by using a combination of si mulation and emulation technics and it is shown that the packet delay variance is the dominant network characteristics which aff ect the perceptual quality in the study of Internet telephony.

A Dirty-Slate Approach to Routing Scalability

TL;DR: The key insight here is to use divide-and-conquer so that default-free zone routers don’t need to maintain the entire routing table and an ISP can modify its internal routing such that individual routers in its network only maintain a part of the routing table.

LOCK: Locating Countermeasure-Capable Prefix Hijackers

TL;DR: A robust scheme named LOCK, LOcating Countermeasure-capable hijacKers, for locating the prefix hijacking ASes based on distributed data-plane Internet measurements, which is robust against various countermeasures that the hijackers may employ.