Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Reports show that DDoS attacks are ubiquitous on the Internet and may jeopardize networks’ stable operation. In order to understand the nature of this threat and further to enable effective control and management, a whole picture of the Internet-wide attacks is a necessity. Traditional methods use darknets to this end. However, with the IPv4 address space exhaustion, darknets become hard to acquire...
In order to solve the ever-growing lack of parking space available, this paper designs and implements a smart parking management system based on the RFID (radio frequency identification) and internet. The system induces parking cars, each of which has the only RFID card, to park in right spaces of parking lots, and manages the information of parking cars there. Based on this, it can also help users...
Internet flows characteristics are important reference for network behaviors research. However, there are few latest related studies and comparative analysis on different networks is especially rare. Based on traffic traces from CAIDA and CERNET, this paper presents a detailed and comprehensive comparison on Internet flows characteristics, including the fine-grained distributions of lifetime, size,...
Network topology inference uses network measurement methods to find out the elements of internet in the target field and their connection relationship. In traditional network topology inference, traceroute-like methods which bases on the feedback information of routers are used, but anonymous routers seriously affect the performance. So tomography relying on end-to-end measurements has become a hot...
this paper focus on analyzing traffic characterization of a large-scale access network based on active IP address count and link utilization. We find out that the behavior of internal and external hosts is asymmetric, the utilization of internal IP addresses per day is about 18.64% and the maximum link utilization is about 53%. Based on these, we proposed a scheme for detecting traffic anomalies which...
Nowadays, in most of the unauthorized internet access monitoring systems, there is no satisfactory method on access control with USB storage device. The common way is to take off the USB port from the computer to prohibit the use of USB storage devices. This method directly leads to lose the convenience by using USB storage devices, and also no longer be able to use other equipment based on the USB...
This paper proposes an IP trace analysis system based on code moving (IP_TASCM) for sharing Internet measurement, tools and dataset. However, two characteristics differentiate it from other prior similar systems. One of them is that besides the common catalog service, IP_TASCM also stores tools, datasets and measurement results together for researchespsila download and analysis. The other one is that...
Aggregate flow is the base methodology of network measurement and the orientation of next generation network management. For the same data, different flow specifications lead to different results, and the costs also vary significantly. To analyze the correlations among specifications, we select seven wide used specifications and calculate their single disparity degree and comprehensive similarity...
This paper is concerned with characteristics of human behaviors in Internet-based teleoperation system under communication delay. Especially frequency character and velocity character of human behaviors affected with random delay of the Internet are analyzed. We are researching in human adaptive network mechatronics which can not only evaluate operational behaviors of human, but also help the operator's...
For Internet based real-time teleoperation systems, unknown and variable time delay can cause instability in the closed loop control system and hence hinder task accomplishment. According to requirement of Internet-based teleoperation, exact prediction of RTT can improve greatly performance of the teleoperation system. In this paper, statistical properties of the Round Trip Timedelay (RTT) are investigated...
This paper discusses the double-indexing mechanism of search engine based on campus net. At first of the paper, we introduce the search engine and its types. Then, we refer to the search engine of campus net that is not general full-text search engine and the necessary of designing CNSE. Furthermore, the structure of the index is described. In addition, we discuss the word-filtering mechanism, performance...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.