The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose an efficient scheme for generating fake network traffic to disguise the real event notification in the presence of a global eavesdropper, which is especially relevant for the quality of service in delay-intolerant applications monitoring rare and spatially sparse events, and deployed as large wireless sensor networks with single data collector. The efficiency of the scheme that provides...
We study the problem of reliably provisioning traffic in high-capacity backbone mesh networks supporting virtual concatenation (VCAT). Traditional approaches handled reliability requirements using full protection, which offers high assurance but can be costly. We take a less expensive approach by offering an expected bandwidth, rather than an absolute amount, but at lower costs than full-protection...
In this paper we present the approach we have taken in the INSPIRE (INcreasing Security and Protection through Infrastructure REsilience) project to increase the protection of Critical Infrastructures (CIs). The core idea of the INSPIRE project is to protect Critical Infrastructures by making the underlying communication network more secure and resilient. In order to do so, we devised a routing mechanism...
The following topics are dealt with: wireless communications; wireless networks; networks convergence; social mobility; mobile technology; wireless technology; protocols; mobile network deployment; cognitive vehicular networks; cooperative networks; security; spectrum allocation; radio interfaces; traffic and congestion control; QoS; and resource management.
There have been several approaches to provisioning traffic between core network nodes in Internet Service Provider networks. Such approaches aim to minimize network delay, increase capacity, and enhance security services. MATE (Multipath Adaptive Traffic Engineering) has been proposed for multipath adaptive traffic engineering between an ingress node (source) and an egress node (destination). Its...
Monitoring is crucial both to the correct operation of a network and to the services that run on it. Operators perform monitoring for various purposes, including traffic engineering, quality of service, security and detection of faults and mis-configurations. However, the relentless growth of IP traffic volume renders real-time monitoring and analysis of data a very challenging problem. In this paper...
An MPLS VPN network structure was proposed to be used in the highway monitoring network to solve the bottleneck drawbacks of the existing network,to improve the network security,and to meet the needs of the highway monitoring network. The labeling process of the network edge MPLS is similar to the classification process of the Diff-Serv model,on the basis of which the model was introduced into the...
”1+1 protection” represents one of the latest methods in MPLS networks. Such method is available for premium customers and consists in traffic duplication by two different paths, in order to prevent informational link from failure. In this article, is presented the influence of this mechanism on the quality of service (QoS). The metrics which we refer are the average and standard deviation of transfer...
With the fast-growing technology in the last few years, companies need an increase in their data speed, an easier way of network management, adaptation to different data types and data paths and extra security yields. These solutions are presented together with MPLS (Multiprotocol Label Switching) network topologies which have developed in the last few years and fiber lines with high-capacity and...
Malicious data packet flooding attacks interfere with services of a victim node such as laptop computer, cellular phone, etc. in wireless ad hoc networks. The victim node is hard to distinguish traffics performing data packet flooding attacks from normal burst traffics. Hence, this paper proposes a period-based scheme so as to prevent from malicious data packet flooding attacks with enhancing the...
The emerging next generation optical transport WDM networks, with reconfigurable optical switches, offer a promising solution to the ever-increasing demand for high bandwidth and flexible connectivity. In order to meet the needs of such a demand, the trend in current backbone and access network development is moving toward a unified solution that will support different classes of service such as voice,...
Internet is becoming an indispensible infrastructure of essential media, which makes a great burden for ISP's security and traffic management. Especially the situation will be much more serious in NGI (the Next-Generation Internet) because of its innumerable users, mobile device, information appliances (IA) and networked sensors etc with 128-bit IPv6 address. For the reason of lacking scalability,...
Internet traffic classification is of prime importance to the areas of network management and security monitoring, network planning, and QoS provision. But the Traditional Classifications depend on certain header fields (take port numbers for instance). These port-based and payload-based approaches will be out of action when a lot of applications like P2P use dynamic port numbers. Masquerading techniques...
In recent years, traffic monitoring and especially anomaly estimation have constituted an open problem in the network community. This paper proposes to design an observer-based sliding mode control for time delay systems representing TCP fluid flow model. The main advantage of the sliding observer lies in estimating, in a finite time, system states while exhibiting fundamental robustness against perturbation...
In the context of a collaborating surveillance system for active TCP sessions handled by a networking device, we consider two problems. The first is the problem of protecting a flow table from overflow and the second is developing an efficient algorithm for estimating the number of active flows coupled with the identification of "heavy-hitter" TCP sessions. Our proposed techniques are sensitive...
This paper proposes an adaptive sampling strategy to address the accuracy and scalability issues of anomaly detection at high-speed backbone side of next generation mobile network (NGMN). The proposed sampling strategy is formulated based on the network traffic condition. It is constituted by two important functions namely the traffic identification and the sampling decision. While the former utilizes...
With the growing demands for computer network communication, it becomes increasingly important to secure the data flow path. The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the performance of networks to meet quality of service (QoS) constrains for various applications. The security...
A media-independent access control function is proposed to arbitrate access of two types of traffic running on a terminal with concurrent accessibility to two different networks. Specifically, voice and data traffic, and UMTS and WLAN networks are to be considered. To improve its QoS, voice traffic is given preferential access to the Cellular network, while data is assumed to have preferential access...
As a prosperous technology for ending-phase Internet access, Worldwide interoperability for Microwave Access (WiMAX) appeals concentration throughout the world since there are some places where wired infrastructures are not available. However, Call Admission Control (CAC) is critical to control different traffic loads and prevent the network from being blocked in WiMAX environment. In our paper, a...
Recent years have witnessed a huge increase in the number and variety of Internet applications, as well as on the number and diversity of security attacks to network users and systems. Consequently, the need for an accurate mapping of traffic to its corresponding applications has also raised in order to allow ISPs to provide better Quality-of-Service (QoS) standards, implement traffic engineering...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.