The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Comparing to TCP traffic, the composition of UDP traffic is still unclear. Although it is observed that a large fraction of UDP traffic appears to be P2P applications, application level classification of UDP traffic is still very hard since most of these applications are private protocols based. In this paper, a novel method is proposed to classify UDP traffic. Based on the assumption that traffic...
This system mainly aims at the design of communication system for autonomous mobile robot intelligent system, mobile robots can complete the function that is sensory of the outside world such as the situations and changes of surrounding environment based on multi-sensor information fusion, can identify obstacles through ultrasound and infrared sensors. Multiple control various information accessed...
IPv4 addresses are already depleted in IANA and will be soon exhausted in RIR while more clients are pouring into the Internet. IPv6, as the only available next generation Internet protocol, is still not commercially successful because a scheme that could solve the migration of IPv4 resources to IPv6 network, as well as mutual communication between the two incompatible protocols, has not been fully...
As the close-loop beam forming needs to occupy extra system resource, the proposed paper presents two scenarios for open-loop beam forming, according to the 802.16e protocol. With utilizing pilots in uplink data zone and fast-feedback zone, it estimates the channel information, and then achieves open-loop beam forming. Especially, the shape of uplink data zone is designed as sounding zone. After analyzing...
IPv6 transition problem has become one of the key factors which are holding up the development of the next generation Internet. Aiming to solve IPv6 transition problem, several translation and tunneling techniques have been proposed, satisfying the demand of IPv4-IPv6 interconnection and traversing respectively. However, translation techniques can't convert the semantic between IPv4 and IPv6 protocol...
It is crucial to detect zero-day polymorphic worms and to generate signatures at network gateways or honeynets so that we can prevent worms from propagating at their early phase. However, most existing network-based signatures are specific to exploit and can be easily evaded. In this paper, we propose generating vulnerability-driven signatures at network level without any host-level analysis of worm...
IP multicast originally works in any source multicast (ASM) that comes with great burden and dynamics on the backbone routers and weakness in inter-domain scalability. It also brought serious security and management problems. In contrast, source-specific multicast (SSM) has been recognized as a simple, scalable and secure method, especially in inter-domain multicast. However, its applicability to...
Broadcatching is a promising mechanism to improve the experience of BitTorrent users by automatically downloading files advertised through RSS feeds. However, though widely used, the mechanism itself has not been well studied. In this paper, we conducted extensive experiments on PlanetLab to evaluate the performance of Broadcatching under different typical scenarios. The results demonstrated the effectiveness...
NAS and SAN have their own advantages respectively and they are two primary network storage systems nowadays. But they also have their own limitations and can't meet the demand of the high-speedly increasing network application. This paper presents a new network storage architecture made by integrating NAS and SAN in IP: the high performance storage network (HPSN). Firstly, with the help of the Global...
IPv4 addresses will be soon exhausted while more and more users are pouring into the Internet. It is commonly understood that IPv6 is definitely necessary for connecting new users, but lack of resources in current IPv6 world discourages providers from developing their IPv6 market. Address and packet translations are considered necessary for Internet content resources migrating from IPv4 world to IPv6,...
Congestions in many-to-many videoconferencing are usually caused by multiple senders, the congestion information feedback, bottleneck link judge and sending rate adjust are much different from one-to-many multicasting. In this paper, we propose one multicast congestion control scheme based on end-to-end tomography (ET-MCC) for many-to-many videoconferencing. The end-to-end packet loss rates are measured...
This paper focuses on subchannel and power allocation problem in OFDMA-based decode-and-forward (DF) cooperative relay networks. The objective of this problem is to maximize the total data rate under the constraints of joint total transmission power and subchannels occupation, while maintaining the maximum fairness among multiple relay nodes. We transform this mixed integer programming problem to...
Denial-of-Service (DoS) attacks play a significant role among all the network security issues today. In this paper, we present a mechanism (called Swing) to limit the effectiveness of DoS attacks. Inspired by the address-switch conception of the newly proposed shim6 protocol, Swing tries to protect servers from attacks by using a new strategy. In the mechanism, when a DoS attack is detected, the server...
IPv6 transition is becoming an important research topic recently. In traditional architecture, transition mechanisms are closely connected with application, protocol stack, and network equipments. This makes the transition process very complicated, and increases the difficulty of network management. In this paper, we present a new network architecture called Univer6. It uses IPv6 as a unified middle...
Identification of P2P traffic is very useful for many network management tasks such as application-specific traffic engineering, network planning and monitoring. However, this is a challenging issue because many P2P applications use dynamic port numbers, and deriving signatures that can be used for reliable detection manually is time consuming and difficult. In this paper, we propose a novel approach...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.