The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The proliferation and integration of communication networks in social life has increased the need for trusted systems of advanced and intelligent capabilities. Future networks are calling for new ways to efficient management, operation and service provisioning. Autonomicity becomes an enabler for self-manageability of future networks and therefore autonomic networking provides the necessary new paradigm...
The following topics are dealt with: communication technologies; Internet; network management; network measurement; wireless communication; optical networks; telecommunication security; multimedia system; cloud computing; service computing; peer to peer networking; social networking; and sensor networks.
This paper surveys our ongoing work on the use of software-defined networking to simplify two acute policy problems in campus and enterprise network operations: access control and information flow control. We describe how the current coupling of high-level policy with low-level configuration makes these problems challenging today. We describe the specific policy problems faced by campus and enterprise...
The following topics are dealt with: wireless networking; network optimization; service management; visualization and P2P; cloud management; information modeling; performance and fault management; resource allocation & control; IMS/SIP; IT management; traffic flows, sampling, and classification; routing; intrusion detection and fault management; resource management; WLAN and ad hoc networks; policy-based...
Currently Mobile Network Operators (MNO) rely on an authentication, authorization and profile management architecture which has proved, by its generalized use and acceptance, as being appropriate. The use of a secure component, the SIM-Card, provides a set of capabilities not seen in other access architectures and an advantage for MNOs. Nevertheless upcoming requirements in terms of open interfaces,...
With the major wireless service providers planning to start deployment of 4G wireless networks by mid 2010, research and industry communities are racing against time to find solutions for some of the prominent still open issues in 4G networks. The growing interest in 4G networks is driven by the set of new services will be made available for the first time such as accessing the Internet anytime from...
Internet is becoming an indispensible infrastructure of essential media, which makes a great burden for ISP's security and traffic management. Especially the situation will be much more serious in NGI (the Next-Generation Internet) because of its innumerable users, mobile device, information appliances (IA) and networked sensors etc with 128-bit IPv6 address. For the reason of lacking scalability,...
Internet traffic classification is of prime importance to the areas of network management and security monitoring, network planning, and QoS provision. But the Traditional Classifications depend on certain header fields (take port numbers for instance). These port-based and payload-based approaches will be out of action when a lot of applications like P2P use dynamic port numbers. Masquerading techniques...
Wireless metropolitan area sharing networks (WMSNs) are wide-area wireless networks with nodes owned and managed by independent wireless Internet service providers (WISPs). To support seamless roaming in emerging WMSNs, in this paper, we propose a localized and distributed authentication and billing architecture that aims at enabling efficient and privacy-preserving mutual authentication between mobile...
The following topics are dealt with: broadband access; Internet; telecommunication security; radio networks; telecommunication network management; telecommunication traffic; and telecommunication services.
The active beacon based network monitoring tries to estimate the transfer delay of a link e by the difference of round-trip times from a beacon host to the two endpoints of e. For efficiency, we consider the problem of placing a minimum set of beacons to monitor all links of a given TCP/IP network e.g., the Internet. We propose an idea called L-beacon, i.e., a beacon can monitor only links within...
To address the evolution of security incidents in current communication networks it is important to react quickly and efficiently to an attack. The RED (Reaction after Detection) project is defining and designing solutions to enhance the detection/reaction process, improving the overall resilience of IP networks to attacks and help telecommunication and service providers to maintain sufficient quality...
In order to effectively manage network resources and to serve different traffic needs, several works have been done in the QoS area. Basically, ldquomulti-field (MF) packet classifiersrdquo classify a packet by looking for multiple fields of the IP/TCP headers, recognize which flow the packet belongs to, and according to this information, provide service differentiation in IP networks. However, for...
Multicasting has not been widely adopted until now, due to lack of receiver or end user (EU) access control. We have developed the Internet group management protocol with access control (IGMP-AC), an extended version of IGMPv3, which provides EU access control by incorporating the AAA framework into the existing multicast service model. Furthermore, IGMP-AC works as an extensible authentication protocol...
Identifying anomaly detection such as failure and attacks rapidly and accurately over the Internet holds interest of both network operators and researchers. Network behavior analysis (NBA) system is usually disposed over an intranet, passively collects SNMP data or flow data, and uses signature and anomaly mechanisms to identify and analyze interesting network activities, including traffic anomaly...
As contrasted to the management plane of today's and emerging networks architectures, the control plane will not be as easy to secure. The control plane is an emerging concept that is part of most large scale, high-speed next generation networks. This may also include the architectures that are being researched to go beyond Internet2. Today the control plane originally defined for generalized multi-protocol...
High-speed switching, QoS provisioning, security, and mobility are main challenges faced with existing networks and to be confronted by NGN researchers and developers. This paper promotes a BSF-OES strategy (Backbone Substrate First, Outwards Expansion Second) towards NGN with a redefined out-of-band concept. In other words, we shall first focus on the backbone subnetwork with an emphasis on building...
NGN has been on the implementation phase, primarily focused on the replacement of PSTN. NGN carriers try to differentiate NGN from the current Internet for the service quality and reliability. Users of the current Internet, however, expect the early integration of NGN and the Internet, as Internet services have already been deployed into the society and daily life. In this paper, we address the interoperability,...
In recent years, network security has emerged as one of the most important challenge for many organizations. The enormous proliferation of the Internet and emergence of unified data, voice and multimedia services are responsible for emerging communication models that are essential for successful business activity of any organization. However, the increasing numbers of sophisticated security threats...
Virtual private networks (VPNs) are a popular and cost-effective means to build wide-area corporate networks, since they provide bandwidth, privacy and security for a fraction of the cost of private networks. However, establishing VPNs across different domains (inter-domain VPNs) is still a cumbersome task, requiring human- based negotiation between involved carriers, manual configuration of network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.