The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents Griffin, a scheme of geometric routing on flat names to conduct massive content distribution and retrieval. A tree-based metric space T is proposed according to the concept of hierarchical division of symbol space. In Griffin, the network topology is embedded into the T-space, and content names are mapped to the T-space. Content publication and retrieval are supported by geometric...
Content Centric Networking (CCN) is a new architecture for a future Internet. CCN relies on in-network caching capabilities of nodes and the efficiency of this architecture depends drastically on performances of caching strategies. Thus, there have been a lot of studies proposing new caching strategies to improve the performances of CCN. However, among all these strategies, it is still unclear which...
In this paper we propose, implement and evaluate a bandwidth aggregation service for residential users that enhances the throughput of their Internet broadband connection through the aggregation of available capacity at neighboring broadband links. Network resources are aggregated by the residential access gateway using the 802.11 radio interface to simultaneously serve home users and to share the...
In recent years, the rapid development of the Internet has provided people with more and more convenience. However, meanwhile a tremendous energy consumption problem and a low energy efficiency problem in the networks still exist. With the continuous expansion of the network scale, these problems are increasingly more severe. In order to achieve the "green" goal in the paper, first a networking...
SQL injection attack poses a serious security threats among the Internet community nowadays and it's continue to increase exploiting flaws found in the Web applications. In SQL injection attack, the attackers can take advantage of poorly coded web application software to introduce malicious code into the system and/or could retrieve important information. Web applications are under siege from cyber...
Test beds such as GENI provide an ideal environment for experimenting with future internet architectures such as Choice Net. Unlike the narrow waist of the current Internet (IP), Choice Net encourages alternatives and competition at the network layer via an economic plane that allows users to choose and purchase precisely the services they need. In this paper we describe our experiences implementing...
The demand for high Internet availability has increased. As routing methods to recover fast from a single network component (link or node) failure, methods using multiple routing tables have been proposed. In the methods, when a component failure occurs, packets which are supposed to pass through the component in the failure-free state are rerouted using a routing table (backup table) which does not...
Virus is a traditional and serious threat of the Internet. The spread of a virus and the containment of the spread can be generalized in an abstraction of a two-side problem in which one side tries to spread the infection as much as possible while the other side tries to detect and limit the spread. Two parameters play an important role: (1) the probability of a successful infection, (2) the probability...
It is well known that well learning the computer network topology and its development trend is keenly important in the research of next generation network It is necessary in a correct understanding of the current computer network development status and network system structure based on the meaning and expansion to meet the next generation network development needs of a new generation of network structure...
Estimating network topology is a non-trivial task. Different from the state-of-art methods such as traceroute-like active probing, network tomography and network protocols analysis based passive measurement, this work proposes a novel method to estimate the network hidden topology using time to live (TTL) values extracted from IP packets. TTL contains the information about hops of the forward paths...
In developing countries, disaster areas, and other places where communication infrastructure is unstable, people need a system that allows them to easily install a network in any location. In this paper, we propose the mesh network named Adaptive Multi-Gateway Mesh Network (AMGMN). AMGMN supports wired and wireless LANs. The combination of wired and wireless LANs prevents radio interference and ensures...
Internet is a huge artificial life system. Because it's topology perplexing and large scale and high complexity in the macro level decide study how to understanding and control internet in macroscopic topological level have important significance. As an important topological features, k-core have attracted the most people's attention, this article based on the k-core as the main line, analysis the...
Unlike the current Internet where applications have little control over the path that their data travels, emerging network architectures enable applications to control the path their packets/flows take. Although an application can select its paths, providing an application with the up-to-date information needed to make an informed decision is a difficult problem. In particular, monitoring (i.e., collecting...
In recent years, one of the hottest research topics is router buffer sizing. It is very important to size the buffer for routers with very small buffers in future Internet, in particular, in emerging optical networks as optical buffers are needed but very expensive. In 2004, the Stanford research group presented that the core router buffer needs only dozens of packets to meet acceptable link utilization...
Network engineers and designers need additional tools to generate network traffic in order to test and evaluate, for instance, application performances or network provisioning. In such a context, traffic characteristics are the most important part of the work. Indeed, it is quite easy to generate traffic, but it is more difficult to produce traffic which can exhibit real characteristics such as the...
In recent years, the router buffer sizing has become one of the hot research topics and researchers have been debating the size of buffers required at core Internet routers. It is very important to size the buffer for routers with very small buffers in future Internet, in particular, in emerging optical networks as optical buffers are needed but very expensive. In the year of 2004, the Stanford research...
Contention is the main source of information loss in buffer-less network architectures where deflection routing is a viable contention resolution scheme. In recent years, various reinforcement learning-based deflection routing algorithms have been proposed. However, performance of these algorithms has not been evaluated in larger networks that resemble the autonomous system-level topology of the Internet...
The Low Extra Delay Background Transport (LEDBAT) protocol is a recently standardized protocol that aims to offer a scavenger service (i.e. the goal is to exploit the remaining and unused capacity of a link). LEDBAT is a delay-based protocol mainly defined by two parameters: a target queuing delay and a gain. The RFC 6817 provides guidelines to configure both parameters that strongly impact on the...
Multipath TCP is an experimental transport protocol with remarkable recent past and non-negligible future potential. It has been standardized recently, however the evaluation studies focus only on a limited set of isolated use-cases and a comprehensive analysis or a feasible path of Internet-wide adoption is still missing. This is mostly because in the current networking practice it is unusual to...
To study Internet's routing behavior on the granularity of Autonomous Systems (ASes), one needs to understand inter-domain routing policy. Routing policy changes over time, and may cause route oscillation, network congestion, and other problems. However, there are few works on routing policy changes and their impact on BGP's routing behaviors. In this paper, we model inter-domain routing policy as...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.