The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Longest Prefix Match (LPM) is a basic and important function for current network devices. Hash-based approaches appear to be excellent candidate solutions for LPM with the capability of fast lookup speed and low latency. The number of hash table probes, i.e. the search path of a hash-based LPM algorithm, directly determines the lookup performance. In this paper, we propose Ω-LPM to improve the lookup...
The built-in caching capability of future Named Data Networking (NDN) promises to enable effective content distribution at a global scale without requiring special infrastructure. The aim of this work is to design efficient caching schemes in NDN to achieve better performance at both the network layer and application layer. With the specific objective of minimizing the inter-ISP (Internet Service...
From the space and time dimension, the FPGA circuit is devised some levels with “computing unit + memory/register” via analyzing the characteristics of the FPGA circuit. Combined with the location importance, the connection degree among the nodes and their own soft error probability, an importance analysis model is proposed. And then the testing points are optimized based on the importance of each...
Network virtualization allows multiple virtual routers to coexist in the same physical router but offer independent routing services. Each virtual router needs to perform millions of lookups and thousands of updates per second to meet the requirements of high-speed Internet. The coexistence of these virtual routers intensifies scalability challenges to the routing lookup scheme: Can it scale well...
The Named Data Networking (NDN) is proposed recently as a promising paradigm for the future Internet due to its built-in caching and name-based routing for ef??cient content distribution. For the time being, the research on NDN caching is still a preliminary topic, especially for the scenario of an ISP with multiple gateways. For more in-depth excavation, we have studied the effective intra-ISP caching...
VANET (Vehicular Ad Hoc Network) is a special case about MANET(Mobile Ad Hoc Network), has also received extensive attention as a part of ITS (Intelligent Transportation System). Although it is a promising technology, due to different kinds of factors (such as high speed, particularity of road, traffic system, etc), the routing technology becomes the important challenging problem in Vehicle Ad Hoc...
In recent years, VPN (Virtual Private Network) technology has become one of the most important services in multinational companies around the world because of its security, convenience, real-time and low construction cost. However in traditional VPN technology including overlay VPN (ATM, Frame-Relay) and Peer-to-Peer VPN (IP-routing), more and more disadvantages have emerged such as complex management...
Software testing is an important guarantee means to the software quality. The test case is the core of the software testing. Because the design of the test case directly affects the quality of the test result, the test case has played a vital role in the software testing process. This article uses the black-box testing method of the equivalence partitioning and designs an effective test case to test...
Resource discovery is one of the key issues in mobile P2P studies. Nonetheless, in existing schemes thereare still some deficiencies, such as the lake of flexibility, proportionality and adaptability. In this paper, we present a resource discovery model Mobile-Tapestry (M-Tapestry) for mobile P2P networks based on the P2P Tapestry strategy. The philosophy of this model is to make the network architecture...
It is important to gather sensed information with an energy efficient method in sensor networks. Although data collection may save energy and improve information accuracy, it must get this at the cost of decreasing other performances, such as the delay increment. This paper proposes a Chain-based Fast Data Aggregation Algorithm Based on Suppositional Cells (CFDASC) to solve this problem. In this algorithm,...
We detect & study packet traffic anomalies similar to DDoS attacks using information entropy. We perform network-wide monitoring of information entropy of packet traffic at a small number of selected routers. Our method is based on the fact that DDoS attacks change the ??natural?? order and randomness of packet traffic passing through monitored routers when an attack is taking place in the network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.