The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a novel scheme for monitoring and analyzing the performance of Internet applications based on statistical analysis. In our study, an Internet application is considered as a ldquoblack boxrdquo as the internal architecture and the operation/data flow of most of the applications is often unknown to enterprises or internet service providers. Our scheme discovers the underlying relationship...
Cognitive wireless local area network (WLAN) over fiber (CWLANoF), which employs remote antenna units (RAUs) connected to a central cognitive access point, can provide a cost-effective and efficient architecture for devices to equally share the industrial, scientific, and medical band by taking advantage of cognitive radio capabilities. Based on the CWLANoF architecture, we propose two methods to...
This paper proposes a compromise solution to the net neutrality problem, which is one of the key issues in the development process of new Internet applications and services. The solution is to use a QoS architecture, one that would provide service differentiation to support current and future demands, but one that would not require or even allow any user input. This way, ISPs (Internet service providers)...
Security of information transmitted through the Internet, against passive or active attacks is an international concern. The use of a chaos-based pseudo-random bit sequence to make it unrecognizable by an intruder, is a field of research in full expansion. This mask of useful information by modulation or encryption is a fundamental part of the TLS Internet exchange protocol. In this paper, a new method...
Offering new multicast services supporting quality of service becomes essential for an Internet service provider at the worldwide level. The "IP multicast" technology is stable, but scalability of "quality of service multicast" is further from being solved, since scalability problems appear with the increasing number of concurrently active multicast groups. In this paper, we propose...
Measurement studies of the Internet topology have revealed that the degree distribution exhibits a power-law attribute. That is, the probability P(k) that a node has k outgoing links follows P(k) ~ k-gamma. However, it is known that the power-law degree distribution alone does not determine traffic-level behaviors in Internet topologies. In this paper, we investigate packet-level delay behavior of...
The present article provides a literature review in the field of open access networks and points out additional strengths of infrastructure sharing in the advent a new wave wireless advances. The first part of the article summarizes different initiatives carried out both by researchers and practitioners around the globe. The focus is on finding commonalities in what have been, until now, disperse...
The paper describes a flexible image-based authentication system developed at the University of Portsmouth and proposes two possible additions to the existing system - an additional knowledge-based (KB) authentication stage and an intrusion detection (ID) feature. The knowledge-based part of the authentication procedure will include a real-time question and answer session before the users are allowed...
The analysis of QoE and QoS of adaptive real-time applications provides a challenging task in the current Internet. Here, we study major characteristics of Skype user satisfaction. For this purpose we estimate the loss and delivery time variation by inter-arrival times (IAT) between packets and packet lengths (PL) of an individual unidirectional flow. Extremes of the IAT and PLs impact on the QoS...
The Internet has grown out of its original scope and scale while its importance for the society has increased. This has raised considerable uncertainties and concerns about the future evolution. We apply Schoemakerpsilas scenario planning method to identify and analyze the key trends and uncertainties and to create four alternative evolution scenarios for the Internet. The scenarios reveal that the...
Error coding techniques are proposed to enhance the efficiency and reliability, and to minimize the delay of the future Internet. The need of such enhancement is established. Internally, a method is proposed for the replacement of all the Internet transmission protocol Checksums. An optimal coding algorithm is presented for all protocol applications beyond the Internet. Externally, a systematic method...
One of the difficulties of optical packet switched (OPS) networks is buffering optical packets in the network. The traditional rule-of-thumb buffering approach needs huge buffers due to ultra high speed of optical networks. However, optical RAM is still under research and it is not expected to have large capacity, soon. The burstiness of Internet traffic causes high packet drop rate and low utilization...
There is widespread interest in the research community for new IP traffic classification techniques, which are fundamental components for network management and surveillance. Nowadays, the most commonly used techniques are either based on the well-known TCP or UDP port numbers, or on the inspection of the packet payloads. Since an increasing number of applications adopt random port numbers or employ...
With the imminent roll-out of the 3GPP IP Multimedia Subsystem (IMS), IMS-specific security threats and corresponding counter-mechanisms are gaining increasing attention. One of the most promising recent intrusion detection approaches dealing with unforeseen anomalies caused by flooding attacks is based on a specific metric for the distance between two empirical probability distributions, the so-called...
Traffic measurements from communication networks have shown that network traffic is exhibiting self similar as well as long range dependence properties. In telecommunication networks, congestion events tend to persist, producing large delays and packet loss resulting in performance degradation. In order to guarantee quality of service to diverse Internet services, congestion prediction became a fundamental...
In this paper, we propose a mechanism to provide quality of service (QoS) consistency over hybrid optical and wireless access networks. The proposed scheme utilizes QoS allocations by considering heterogeneous wireless service flows in the passive optical network (PON) system to guarantee the QoS consistency.
The paper presents two examples of network and technology integrations useful for the Public Administrations for deploying and offering services to the citizens. In the first example, the access to the neutral network is the service provided and the solutions conceived for the Public Administrations. in order to offer WiFi connectivity to their citizens are presented. In the second example, the service...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.