The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A new Communication protocol design in the Data Link Layer of the industry Ethernet ring network is presented in this paper. The HDL files used in the design are packaged into IP Core. The simulation shows that the MAC protocol design for the Industry Ethernet Ring Network can send and receive not only the special frames of the Industry Ethernet ring network but the frames of the traditional Ethernet...
A mobile node who wants to communicate to the nodes in the Internet must firstly be configured a global IP address. The existing schemes have different drawbacks. A novel IP address auto-configuration scheme for MANET with multiple gateways is presented in this paper. It can provide the mobile node with MANET-local address and global IP addresses and guarantee that these addresses configured by this...
With IPv4 addresses quickly dwindling, the Internet is forcing an evolution of itself. During the long term transition from IPv4 to IPv6, what's going on in IPv6 world becomes unknown for network operators and researchers. In this paper, we propose a heuristic algorithm to identify p2p traffic accurately and implement traffic classification based on Netflow v9 exports to illustrate what applications...
The fine-grained flow level measurement is getting increasing demand in recent years. Though it fails to be a generic solution for its biased sampling, NetFlow is promising for its compatibility with major routers and its convenience to perform direct flow level measurement of both IPv4 and IPv6 traffic. Traditional flow level measurement systems based on NetFlow are mostly centralized and each of...
As the development of the Internet and the increment of the bandwidth, large-scale video transmission on the IP network is getting further development and application. Especially, the application of the broadcasting system based on single sender but multiple receivers are applied widely. Therefore, the multimedia data transmission is becoming one of the most important aspects in the broadcasting system...
Flow monitoring is used for a wide range of network management applications. Many such applications require that the monitoring infrastructure provide high flow coverage and support fine-grained network-wide objectives. Coordinated Sampling (cSamp) is a recent proposal that improves the monitoring capabilities of ISPs to address these demands. In this paper, we address a key deployment impediment...
In order to improve the survivability of IP networks, this paper presents a fast self-healing mechanism for distance vector routing protocol called FS-DVP.(Fast Self-healing distance vector protocol). The mechanism can dealing with network failures effectively through the precomputed multiple feasible next hops per destination. This local rerouting scheme guarantee the forwarding continuity in the...
Network forensics supports capabilities such as attacker identification and attack reconstruction, which complement traditional intrusion detection and perimeter defense techniques in building a robust security mechanism. Attacker identification pinpoints attack origin to deter future attackers and attack reconstruction can reveal attack causality and network vulnerabilities. In this paper, we study...
A mobile ad hoc network (MANET) is a collection of mobile nodes that forms a provisional network dynamically without the aid of any predetermined infrastructure. In particular, the route security is more important. In order to solve the problem several route discovery protocols have been proposed such as ARAN and SRP ect. But those protocols suffer from two problems: (1) difficult in operation, (2)...
Driven by scientific research mission, research team in university, whose ultimate goal is pursuing innovation, creating new knowledge and technology, and cultivating creative talents, is a typical knowledge team. Knowledge can exist in the form of scientific research's outputs and creative talents, which are the objectives of team building. So, successful team management always equals effective knowledge...
Route redistribution (RR) has become an integral part of IP network design as the result of a growing need for disseminating certain routes across routing protocol boundaries. While RR is widely used and resembles BGP in several nontrivial aspects, surprisingly, the safety of RR has not been systematically studied by the networking community. This paper presents the first analytical model for understanding...
Real-time IP flow estimation has many potential applications in network management, monitoring, security, and traffic engineering. Existing techniques typically rely on flow definitions being constrained as subsets of the fields in packet headers. This makes flow-membership tests relatively inexpensive. In this paper, we consider a more general flow estimation problem that needs complex packet-payload...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.