The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a novel scheme for monitoring and analyzing the performance of Internet applications based on statistical analysis. In our study, an Internet application is considered as a ldquoblack boxrdquo as the internal architecture and the operation/data flow of most of the applications is often unknown to enterprises or internet service providers. Our scheme discovers the underlying relationship...
The analysis of QoE and QoS of adaptive real-time applications provides a challenging task in the current Internet. Here, we study major characteristics of Skype user satisfaction. For this purpose we estimate the loss and delivery time variation by inter-arrival times (IAT) between packets and packet lengths (PL) of an individual unidirectional flow. Extremes of the IAT and PLs impact on the QoS...
In this document, we introduce Cap Start TCP, an adaptive Slow Start scheme that consistently achieves fast TCP file transfer times regardless of high speed network scenario. Once the TCP session is established, we estimate TCP session path capacity scenario, and tune the transport protocol to deliver fast transfer times. We demonstrate significant transaction performance improvements, of as much...
The analysis of Internet traffic behavior under the pressure of long range dependence congestion factors has a great importance for performance management, anomaly detection and QoS control. The choice of methods using for analysis depends on the goal of description, accuracy requirements, measurement tools and assumptions concerning stochastic feature of network processes. Analysis without robust...
This paper introduces a novel solution to face the IPv4 public address exhaustion. The paper presents a new architecture using port extended IP address and describes how it can be used to overcome the IPv4 address shortage. It also provides a mock-up implementation together with the results of the tests that assess the applicability of the proposed concept to various applications.
Knowledge Management (KM) is one of the hottest Internet challenges influencing the design and the architecture of the infrastructures that will be accessed by the future generation. In this paper, we bridge KM to philosophical theories to quest a theoretical foundation for the discussion, today utterly exciting, about Web's semantics. The man has always tried to organise the knowledge he gained,...
The resource reservation capabilities offered by modern wide area networks, such as ESnet and Internet2, create a new network utilization model that coexists but drastically differs from the standard best-effort network paradigm. These capabilities enable the dedication of network resources to specific users/applications that may suffer from interruptions and other adverse effects because of the default...
Multi-homing has been widely adopted in todaypsilas Internet. Several solutions have been proposed to support multi-homing, and Shim6 became most promising for IPv6-based next generation Internet. This paper proposes a Shim6-based dynamic path-selection mechanism, which selects path adaptively to earn higher bandwidth utilities and better performance. The experiment result shows that the new mechanism...
The Internet has grown out of its original scope and scale while its importance for the society has increased. This has raised considerable uncertainties and concerns about the future evolution. We apply Schoemakerpsilas scenario planning method to identify and analyze the key trends and uncertainties and to create four alternative evolution scenarios for the Internet. The scenarios reveal that the...
There is widespread interest in the research community for new IP traffic classification techniques, which are fundamental components for network management and surveillance. Nowadays, the most commonly used techniques are either based on the well-known TCP or UDP port numbers, or on the inspection of the packet payloads. Since an increasing number of applications adopt random port numbers or employ...
With the imminent roll-out of the 3GPP IP Multimedia Subsystem (IMS), IMS-specific security threats and corresponding counter-mechanisms are gaining increasing attention. One of the most promising recent intrusion detection approaches dealing with unforeseen anomalies caused by flooding attacks is based on a specific metric for the distance between two empirical probability distributions, the so-called...
Security of information transmitted through the Internet, against passive or active attacks is an international concern. The use of a chaos-based pseudo-random bit sequence to make it unrecognizable by an intruder, is a field of research in full expansion. This mask of useful information by modulation or encryption is a fundamental part of the TLS Internet exchange protocol. In this paper, a new method...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.