The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper raised a new method based on the BitTorrent protocol to share resources on the Internet. The goal is to implement a P2P application to replace the HTTP/FTP method for resource sharing. We introduced a project named DistrBit to show how to achieve this aim. In the end, some experiments were done to validate the results.
JXTA is a P2P network using RDV (rendezvous) and DHT (Distributed Hash Table) technology. According to the student's study schedule, E-learning Resource Management & Distribution System (ERMDS) using the JXTA P2P network adopts subscription model to auto-distribute e-learning resources among the student's P2P nodes individually.
As e-commerce new business, new products, new services areas and new management models are constantly emerging, the Internet payment services grow rapidly, and the Internet payment protocols have become increasingly prominent security issues. Payments of the current Internet protocol mostly use the MD5 or SHA algorithm for message signing. The traditional hash algorithms MD5 and SHA have increasingly...
This thesis introduces the architectures and characteristics of wireless sensor networks. According to their features and the application scope of each method, it puts forward a new whole design scheme, which adopts software structure based on .net micro framework to accelerate wireless sensor networks development and simplify system complexity. Concepts verification and prototypes system design are...
In this paper we focus on the 0/1 fairness problem of the DCF protocol in multi-hop ad hoc network. We find that the DCF protocol can not avoid the carrier interference produced by the interference transmitter to the receiver, when the interference transmitter locates in the collision interference range of the receiver and out of the carrier sensing range of the transmitter. This is the primary cause...
This paper has designed and implemented a method that automatically generates XML abstract test cases from E-LOTOS language. Through analyzing the E-LOTOS text which describes the protocols, this paper has obtained adjacency finite state machine and drew the graph with the JAVA language to show the protocol running mechanism. By using the Dijkstra algorithm and a heuristic algorithm for UIO sequence...
Recently, Kwon et al. found that LKY scheme is vulnerable to off-line dictionary attack. They showed that LKY is not a complete PAKA scheme since it is possible for the involved two parties to not share a common session key as a result of executing LKY. In our paper, we will discuss the reasons for the above attack and propose two improved scheme to solve this problem.
Network security plays an important part in LAN system. The 802.1X protocol provides a port-based network access control to the LAN. In this paper, three cases of user name attacks against the 802.1X are given firstly. Then, the design flaws of 802.1X system are analyzed. At last, an improved authentication process is presented and how to prevent the user name attacks is discussed.
A P2P-SIP architecture relying on open-source SIP stacks and JXTA platform is proposed, where the centralized SIP registration and location are implemented via P2P publishing and service location, respectively. A novel P2P-SIP protocol-JXP is presented and a prototype is designed and developed based on LINUX. The prototype system has been developed for transporting typical VoIP call controls and real-time...
Considering lack of comparative studies on Ping-pong movement, comprehensive evaluations were carried out to estimate the impact of layer-3 handoff latency on End-to-End TCP for mobile IPv6 and its extensions. Results show that FHMIPv6, which has 273ms overall handoff delay, 93.867 Kbytes/s average goodput and 9.125% packet loss rate, performs better than HMIPv6 and FMIPv6 frameworks under Ping-pong...
Analysis on the basis of the protocol Gnutella0.6, the use P4P technologies for sensing conveniently network topology information, proposes a P4P-based Gnutella routing algorithm, in which nodes join algorithm to consider the network topology and as far as possible to join super-nodes that close to itself. When routing algorithm forwards query packet, it give priority to select the physical proximity...
The core of the hardware structure of the node of wireless communication network is microprocessor, while choosing microprocessor must consider the compatibility to communication protocols. In design, the new protocol widely used recently is SimpliciTI, and the microprocessor compatible to the protocol selected is MSP430F5438, which features low power consumption and low cost. The hardware composition...
This paper presents a novel group key management for group security. It uses an elliptic curve based mechanism to distribute group key to the receivers. Its correctness is proved by security analyze. In the group key management process, our scheme requires fewer transmissions during re-key process than currently used LKH scheme, while still enjoys storage efficiency and computation efficiency.
A CPN model for the LDP protocol under the specific configuration mode (using downstream on demand label distribution, LSP ordered control, conservative label retention and non VC-merge mode) has been designed and implemented .Then using the CPN tools has simulated and analyzed the LDP protocol based on its CPN model and then obtained the protocol analysis report. Finally, using a CTL like branching...
In the next generation network, the parlay gateway is the core entity, which is prone to overload. After analyzing the relation between service quantity and CPU utilization ratio in parlay gateway, an adaptive overload control algorithm based on ticket bank (AOCATB) implemented in parlay gateway is proposed. AOCATB is made up of a main algorithm and an assign algorithm. The overload control algorithm...
Traditional IDSs have take network factors and distributed environment into account, but the conception of real Distributed-IDS is not so strong. This paper introduces a modified federated peer to peer architecture that can be implement easily. With the help of multicast reflector and modified shaker protocol embedded inside, the suggested scheme can perform better intrusion detection by sharing information...
This system is a wireless environmental temperature monitoring device within 10m, which includes a monitoring terminal and a maximum of 255 nodes. Monitoring terminal and each node communicate by the ways of the UART asynchronous communication. In the transmitter, the control information and data packaged by the two top-down protocols is send to the transmitter modulation input in the form of a standard...
In this paper, An uneven clustering routing based on ARMA model(UCR-A) was proposed for the "hot spot", and the main ideal is that the entire region is divided into unequal radial level with the base station at the center. Cluster head is chosen based on the residual energy and the relative position. Multi-hop data routing was formed in inter-cluster, and apply ARMA prediction model to the...
The satellite communications are used more and more widely. But these kind of communications have a lot of different characteristics, such as long link delay and high bit error rate. Our research aims to find out the efficient protocol between TCP and SCPS-TP transport protocol through simulation topology method.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.