The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Scanning tools are commonly used by intruders for identifying vulnerable hosts and applications in a network. So from security perspective, to identify the attack in its initial stage and to minimize the impact of attack, it is important to detect scanning activities in a network. We have mainly considered TCP flow because most of the Internet application uses it as a transport protocol. Traditionally,...
In distributed file systems, a need may arise for relocation of the file system to a different server. This is one of the fundamental mechanisms for ensuring file service availability for the geographically distributed clients. However, migration or replication in many such systems requires that the client or client side daemons take active measures for accessing the alternate servers, thus compromising...
Network link capacity (lc) and available bandwidth (av-bw) are recently considered as importance for various network domains. Consequently, several lc and av-bw measurement techniques and tools have been proposed, where empirical experience, performance comparison and foundational understanding of lc/av-bw measurement have been focused. Many heuristic or non-probabilistic statistical algorithms have...
Communication in VANETS needs consideration of high mobility, congestion, collision and reliability factors. The successful delivery of important messages needs high reliability in case of TCP traffic during high congestion. Reliability and performance of priority based traffic is better than for same priority traffic and produces different results. In this paper we have analyzed the performance of...
Success of emerging satellite-based services depends on the performance of communication protocols like TCP, which degrades in wireless environments. TCP with delayed fast recovery and adaptive flow control (TCP-AFC) has been evaluated through simulation experiments showing significant performance enhancement in wireless environments in general and satellite networks in particular. TCP-AFC enhances...
Deployment of VoIP service brings in security challenges that necessitate additional protection measures for corporate networks. Logging of VoIP sessions between a corporate LAN and the Internet becomes an essential requirement, to prevent misuse, to enforce security policies and to respond to security incidents. Identifying valid VoIP sessions and call tracking from the signaling to media session...
This paper introduces a novel approach to transport messages between a backbone network and a device network (SAN) in a seamless way, even when these networks use incompatible protocols or technologies. The paper shows how to leverage a general purpose distributed object oriented middleware to encapsulate and send messages as object invocations. Devices and routers are modeled as standard distributed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.