The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the main privacy problems in network communication is lack of anonymity. Much work has been done on this problem in recent years. However, it is a challenge to improve anti-attack ability and degree of anonymity. A new anonymous multiplexing communication protocol, based on IPv6, is proposed in this paper. It utilizes the secret sharing technique to establish multiplexing communication, solves...
This paper discusses the implementation of IPv6 address generation/assignment mechanism proposed in Dibbler DHCPv6. In the mechanism, each user is assigned with random address which uniquely allocated for his/her exclusive use. It is shown that it can be incorporated into existing Dibbler software and tested under various network topologies. The proposed mechanism will enhance user privacy by dynamic...
Teredo is a service that enables nodes located behind one or more IPv4 Network Address Translations (NATs) to obtain IPv6 connectivity by tunneling packets over IPv4 UDP. Although Teredo is a useful protocol, it also has some weaknesses. It can not work with symmetric NAT, and it raises some security concerns, such as bypassing security controls, reducing defense in depth, and allowing unsolicited...
Tor is the second generation onion router, supporting the anonymous transport of TCP streams over the Internet. Tor has become the most successful public anonymity communication service in the Internet, and has more than one thousand relay nodes and thousands of users. In this paper, we investigate Tor current exit policies, and found some insufficiencies. Based on the investigation we propose anti-misbehavior...
The rapid growth of mobile connected devices has facilitated the explosion of the Mobile Internet, that is IP-based communications involving hosts that frequently change their point of attachment to the Internet. Currently, the Host Identity Protocol (HIP) struggles to maintain the communication in case of 2-party move. This paper describes a HIP extension, based on the enhanced use of Rendezvous...
Providing rich data collaboration services in conferencing system is vital to the success of SIP-based communication system. It not only presents design and implementation challenges, but also gives an opportunity to develop rich and innovative collaboration services conveniently to provide users with novel communication experience. In this paper we present an extended data collaboration mechanism...
The Message Session Relay Protocol (MSRP) is defined by IETF as a session-oriented for instant message, file transfer,remote desktop sharing, whiteboard for telephone conferences and so on. Itpsilas also adopted by IP multimedia subsystem in 3G networks and becoming as important as RTP. So how to make MSRP work well through NATs have been addressed from various aspects. In this paper we propose the...
The incremental adoption of IPv6, middle boxes (e.g., NATs, Firewalls) as well as completely new network types and protocols paint a picture of a future Internet that consists of extremely heterogeneous edge networks (e.g. IPv4, IPv6, industrial Ethernet, sensor networks) that are not supposed or able to communicate directly. This increasing heterogeneity imposes severe challenges for overlay networks,...
In this paper we present a uniform negotiation and delivery framework for TCP-based data collaboration applications over IP network. With this framework rich innovative collaboration services can be developed conveniently and provide users with novel communication experience. The framework adopts the offer/answer model with extended Session Description Protocol as session description and negotiation...
This paper discusses the design of a centralized control and monitoring system for railway traffic that can be implemented on top of the existing control logic (interlocking system) of Sri Lanka railways. The overall solution comprises of a central server system and databases with redundancy, relay house hardware unit (with embedded Ethernet and a custom communication protocol for microcontrollers)...
We describe an approach to improving network performance in networks with heterogeneous links - for example, a communications network constructed from satellite links, airborne relays, and line-of-site radios - using disruption tolerant networking. DTN defines an overlay network that uses storage at each hop to make end-to-end communications resilient to delay, loss, network disruption, temporary...
This paper addresses basic communications network technology and explains the differences between Ethernet, TCP/IP, T1 and SONET with respect to relaying applications. It also makes an attempt to clarify how the access method and application protocols influence (or not) the transport method. LAN, VLAN, VPN and WAN/Internet are also explained. Cyber security issues are discussed for the different networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.