The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A Named Data Networking (NDN) router can maintain a record in its PIT for every Interest packet and leverage PIT table to achieve the goal of stateful forwarding. In this paper, a more general application scene that presents new challenges for stateful forwarding is considered. The network element needs to keep states of previously forwarded packets to determine the forwarding behavior of subsequent...
This letter investigates the performance of an analog network coding based underlay cognitive two-way energy harvesting relay network. The amplify-and-forward relay harvests energy using the power-splitting relaying (PSR) protocol. Using approximate expressions for the terminal outages, throughput, and ergodic sum-rate, we derive insights into performance. Specifically, we derive closed-form expressions...
The Trafïîc Flow Description (TFD) option is an experimental option of the IP protocol, designed by the Authors, able to assure signaling for QoS purposes. The option is used as a carrier of knowledge about forthcoming traffic. If planning horizons are short enough, this knowledge can be used for dynamic bandwidth allocation. In the paper an analysis of QoS assurance using the TFD option is presented...
With the rapid development of Internet communications, there is a growing demand to support devices being connected to multiple Internet service providers simultaneously. For example, every modern smartphone already provides at least mobile broadband(UMTS, LTE) as well as Wi-Fi interfaces. This multi-homing property can be used for resilience, but there is also an increasing interest in making use...
A tighter coupling [1] between LTE and Wi-Fi interfaces can be achieved by integrating them at the radio protocol stack. LTE Wi-Fi radio level integration with IPsec tunnel (LWIP) is one such architecture introduced in Rel.13 of 3GPP. We have developed a variant of LWIP prototype and made commercial UE to readily work with the LWIP. The developed LWIP testbed uses OpenAirInterface (OAI) for LTE network...
IPv6 has become popular now-a-days among the ISPs, organization and end users because of its magnificent features and due to the limitation of IPv4. The migration from IPv4 to IPv6 is mandatory due to the address scarcity and security vulnerabilities of IPv4. But the deployment of IPv6 is far beyond satisfactory level in Bangladesh. So, a smooth as well as effective transition mechanism is needed...
Software defined networks (SDN) is perceived to have specific capabilities for utilization by network infrastructures automatically. The success of OpenFlow protocol is to decouple control plane from data plane completely. However, current SDN still regards the network as a group of devices rather than a holistic resource, and traffic monitoring and control only relies on network states but not including...
IPv6 is the next-generation Internet Protocol (IP) which designed to replace the current IPv4.The designed protocol is to manage the problem of insufficient IP address for online users. IPv6 is new technology, thus it is not matured and does it suits to the real online applications in any applied network. This paper evaluates the performance of End-to-End (E2E) IPv6 over wired and Wi-Fi broadband...
The MPT network layer multipath communication library-which was proposed to be a possible new basis for the future cognitive info-communication-is capable to use multiple communication channels to create an UDP tunnel which uses GRE tunnel protocol. On the other hand, Multipath TCP uses a special kernel module which creates multiple TCP sub-flows to aggregate network throughput. In this paper we used...
IP address mutation is a proactive defense method that is used to reduce the risk of network attacks, especially to deal with the worm propagation attacks. However, previous work did not give much consideration to the negative effects that IP address mutation could bring to network performance. To be specific, there is a trade-off between network performance and security, which implies that when a...
Theoretical values of throughput and latency parameters of 3G as well as 4G mobile networks are generally known from the standards. However, in praxis they depend on various aspects like radio signal coverage, number of connected users or moving speed of the terminal equipment. In this paper we present results of measurements conducted in Vienna, Austria. They were conducted for activities of AEROCEPTOR...
Cognitive radio networks can facilitate seamless mobility to users considering their effective use of the dynamic spectrum access. This is performed by proactive/reactive adaptation of transmission operations in response to the wireless environment changes. One of these operations includes handoff between various wireless domains. The handoff here is not just a registration with a new base station,...
This paper investigates the characteristics of Tahoe, Reno, New Reno, Vegas, and Sack, and calculated their throughputs in simulated environment using NS-2 simulator by varying various performances parameters such as bandwidth, simulation time and number of traffic sources in order to figure out which one of them is the best for which scenario. Simulation was performed to study the performance of...
By improvements of ICT (Information and Communications Technologies), a lot of advanced high speed communication standards such as 3G (3rd generation mobile telecommunications), LTE (Long Term Evolution) and High speed WLAN (Wireless Local Area Network) have been developed. Recently, most devices destined for consumer use, equip more than one communication interface based on the above high speed communication...
This paper addresses one serious SDN-specific attack, i.e., data-to-control plane saturation attack, which overloads the infrastructure of SDN networks. In this attack, an attacker can produce a large amount of table-miss packet_in messages to consume resources in both control plane and data plane. To mitigate this security threat, we introduce an efficient, lightweight and protocol-independent defense...
This paper analyzes the impact of transceiver impairments on outage probability (OP) and throughput of decode-and-forward two-way cognitive relay (TWCR) networks, where the relay is self-powered by harvesting energy from the transmitted signals. We consider two bidirectional relaying protocols namely, multiple access broadcast (MABC) protocol and time division broadcast (TDBC) protocol, as well as,...
Software Defined Network (SDN) has the ability to separate data plane from the control plane in a network. Visual Network Description (VND) is a GUI tool which helps to develop this network manually while simulation. With this tool, one can manually setup the required components in SDN and can define the properties of different links, switches and controllers attached with it for simulating this network...
The exponential growth of the Routing Information Base (RIB) of the Internet's Default-Free Zone (DFZ) routers has raised concerns about non-scalability of the current Internet's routing architecture. The main reason is that Internet addresses currently carry information about both the identity and location (physical connection point) of devices connected to the Internet. The Locator/ID Separation...
Improving availability and throughput is a significant challenge for data center networks. Recent studies have attempted to use a variety of routing and multipathing techniques. However, no method has yet managed to combine availability and throughput improvement with actual deployability, usually because of dedicated hardware requirements. In this study, we focus on commodity-based layer-3 data center...
Network Virtualization Overlays (NVO3) provides multi-tenancy services in cloud data centers with existing networking equipment. IP tunneling is an essential technology to logically separate each virtual traffic, in particular, Stateless Transport Tunneling (STT) is considered to achieve better performance using TCP Segmentation Offload (TSO) feature. Currently, there is no openly available implementation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.