The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The lack of technical equipment is one of the hurdles in facing challenges in engineering education and basic research for universities in developing countries. In this paper we present a low-cost laboratory mostly based on commercial off-the-shelf wifi routers. A basic workbench is made out of three second hand wireless routers. Our local market provided plenty of used D-Link DIR-300. Total cost...
Network Intrusion Detection Systems (NIDSs) play a crucial role in detecting malicious activities within the networks. Basically, an NIDS monitors network flows and compares it with the pre-defined suspicious patterns. To be effective, different intrusion detection algorithms and packet capturing methods have been implemented. With rapidly increasing network speeds, NIDSs face a challenging problem...
More than 64% of schools in Apurimac Peru are located in rural area; unlike the schools in urban area, they present problem of lack of Internet connection, hence, without access to virtual learning and they can't use Educational Resources. This paper describes the design, development and testing of the Mini Learning Management System for schools without internet connection to improve de availability...
The document contains a comparative analysis of the key technologies to ensure collaboration of telecommunication networks that were built with using different versions of IP protocol: dual stack; tunneling and encapsulation; translation of the protocols. Two groups of factors are proposed: factors that will influence the choice of the technical migration way to the IPv6 stack and the factors that...
This work targets to the technologies of the Internet of Things (IoT), regarding to security and trusted devices. It provides to the readers a comprehensive understanding of both security and privacy aspects. Modern systems and networks are quoted, in order to cover any questions arising from the theoretical approach. Hardware integration devices are also presented, for flexible implementations for...
The balance of searching time and storage space is a problem in routing lookup. The algorithm has solved it to some extent. It is based on IPv6 prefix distribution and adopts different approaches to divide and compress different prefixes. The prefixes that can be divided exactly are concentrated compression. Other prefixes that can't be divided exactly are handled with multi-branch tree method. According...
Linking the growing IPv6 deployment to existing IPv4 addresses is an interesting field of research, be it for network forensics, structural analysis, or reconnaissance. In this work, we focus on classifying pairs of server IPv6 and IPv4 addresses as siblings, i.e., running on the same machine. Our methodology leverages active measurements of TCP timestamps and other network characteristics, which...
This article aims to address a doctoral research carried out in the senior universities of the district of Castelo Branco in the academic year 2013/2014, whose main objective was to identify the sociocultural factors that influence and condition the option to learn ICT and to know the impacts of this learning on well-being (mental and social) throughout the aging process. Data were collected at 5...
ISPs face difficulties in optimizing interdomain routing due to the single path routing constraint of BGP. A single best path makes it difficult to optimize routing and is unable to satisfy various application requirements of customers. In this paper, we present a new routing architecture for ISP edge network which breaks this constraint and allows the operator to flexibly assign interdomain paths...
RIPE Atlas consists of ∼9.1K probes (as of Jan 2017) connected in core, access and home networks. RIPE Atlas has recently (Jul 2014) introduced a tagging mechanism for fine-grained vantage point selection of probes. These tags are subdivided into user and system tags. User tags are based on a manual process which is largely dependent on proactive participation of probe hosts. We show that only ∼2...
Internet evolution is driven by a continuous stream of new applications and users driving the demand for services. To keep up with this, a never-stopping research has been transforming the Internet ecosystem over the time. Technological changes on both protocols (the uptake of IPv6) and network architectures (the adoption of Software Defined Networking) introduced new challenges for ASIC designers...
This project describes the design of a measurement system for agricultural precision applications and environmental parameters. It will offer the real-time state of these variables, compile data autonomously, and these data will be received and analyzed in a workstation. The main project is based on a Wireless Sensor and Actuator Network for the environmental data acquisition.
Most networking performance enhancements occur through specific static solutions, where the structure of the protocol stack remains unchanged. Instead, we focus on a flexible software and hardware co-design for the entire protocol stack. In this paper, we present EmbedNet, a System-on-Chip implementation of a flexible network architecture for the Future Internet, where parts of the protocol stack...
While the use of reconfigurable computing for tasks such as packet header processing or deep packet-inspection in high-speed networks has been widely studied, efforts to extend the technology to application-level processing have only recently been made. One issue that has prevented wider use of reconfigurable platforms in that context is the unfamiliar programming environment: Such systems commonly...
We require a very good technical knowledge to create automated tests to exploit the browser vulnerabilities. It is usually a combination of technical abilities and set of specific tools. Security concerns is of prime importance when it comes to web browsers. Attacks during surfing, executing any downloaded file and while transmission are very frequent these days and hence all browsers need to be hardened...
Monitoring Systems are necessary to track and understand the changes that take place in environments. Remote monitoring and data collection systems are useful and effective tools to collect information from fuel storage tanks. The fuel management system is a monitoring device built on the Raspberry-Pi computer, it takes information about tank's fuel level in real time through its sensor and live streaming...
Internet security is a branch of computer sciences often involving browser security, network security, applications and operating systems to keep the internet as a secure channel to exchange information by reducing the risk and attacks. There are a number of studies that have been conducted in this field resulting in the development of various security models to achieve internet security. However,...
The exponential growth of devices connected to the Internet flogged need to improve methods of network management and recently has become one of the most difficult tasks. As a result of the rapid increase in devices connected to the Internet will increase a huge amount of traffic of today's networks. The ideology of software-defined networking will significantly automate and facilitate network management...
This work consists in a wireless sensor network implementation(in the future WSN), wireless data networks and mobile phone service in order to follow people whose situation in the daily life is alone, isolated or with a particular impaired, making possible the alarms signal sending to the customized recipients in the application in use. This system is designed to detect or prevent different domestic...
This paper presents a design of a state-of-the-art platform for an intelligent classroom. The main emphasis will be set on mobile devices of students and lecturers. The second part of the platform will cover the server-side applications and manage access rights. The main aim of this research is to provide a platform that will be able to handle actual information about the lectures, about the upcoming...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.