The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A system to control the data flow between detector sensors input streams for the data connected with a single event is elaborated. Obtained results show that a High Performance Computing cluster data exchange can be efficient AND fault-tolerant.
Multipath TCP(MPTCP) is an experimental protocol under standardization in the IETF. It enables hosts to send data over several interfaces or paths and has use cases on smartphones, datacenters or dual-stack hosts. It has proven to increase bandwidth in these cases while remaining compatible with the existing network infrastructure and applications. However, with the popularity of Online Data-Intensive...
Larger share of total energy consumed by mobile network operators (MNOs) is wasted to ensure seamless coverage. Three to six MNOs covering the same geographical area results in even more energy waste. Division of scarce resource, i.e., spectrum into small chunks also deteriorates the overall performance. With exponential growth of the traffic and insignificant marginal revenue, it is time for the...
Software-Defined Networking (SDN) provides the potential for highly configurable, automated networks by separating the control and forwarding functions of network devices. While SDN appears to have many potential benefits for coalition tactical networking, including rapid reconfigurability and improved network situational awareness, there are significant obstacles to overcome. In particular, the low...
Proofs of Retrievability (POR) is a scheme to build a verifiable storage on a remote server that a client can access the data randomly, and periodically execute an efficient Audit protocol to ensure that the data is intact. In dynamic POR, the difficulties are to maintain the latest version of the data while achieving efficient Update and Audit. In this paper, we propose PDPOR that achieves the best...
The TCP/IP model is a widely used protocol at present time due to unparalleled popularity of the Internet. Although it is efficient and reliable it does not include the user into its architecture and thus leaves the user without any control over the underlying layers. While the default layering mechanism is set up in such a way that it would give efficient service to most of its clients, it does not...
Currently, Advanced Driver Assistance Systems (ADAS) require high bandwidth of in-vehicle application. Ethernet has attracted attention for using in-vehicle networks because it provides 100Mbit/s bandwidth. However the legacy Ethernet cannot guarantee Quality of Service (QoS) for in-vehicle networks because priority is not provide. IEEE802.1Q (802.1Q) and IEEE802.1AVB (AVB) of the IEEE802 Ethernet...
The existing in-vehicle networks are not capable of accommodating increased data in vehicle and the demand of bandwidth. Next generation networks require higher bandwidth and shorter latency. Therefore, inexpensive and high bandwidth ethernet have be studied. IEEE802.1 Audio Video Bridging (AVB) is the standard used to transmit Audio and Video streaming data with guaranteed Quality of Service (QoS)...
Software-Defined Networking (SDN) has recently gained significant momentum. However, before any large scale deployments, it is important to understand security issues arising from this new technology. This paper discusses two types of Denial-of-Service (DoS) attacks specific to OpenFlow SDN networks. We emulate them on Mininet and provide an analysis on the effect of these attacks. We find that the...
WiFi is currently the most widely used communication standard over wireless LAN . Facing the trend that broad band and networking quality are emphasized, the IETF SIGTRAN working group and IEEE 802.11standards working groups proposed a new-generation communication protocol, stream control transmission protocol (SCTP) and wireless LAN communication standard, IEEE 802.11ac/VHT for transport layer and...
This paper considers a network in which a primary user (PU) may cooperate with a cognitive radio (CR) user for transmission of its data packets. The PU is assumed to be a buffered terminal operating in a time-slotted fashion. We develop an energy-efficient protocol that involves cooperation and coordination between primary and secondary users. To satisfy certain quality-of-service requirements, users...
Bandwidth is the most monumental topic both for the terrestrial and underwater communications. For proper network operation the estimation of number of signal sources (N) is very important. Most of the protocol based techniques are failed to give the desired results of node estimation due to underwater properties (long propagation delay, high absorptions and dispersion). Node estimation technique...
Peer-to-Peer systems was developed to compensate limitations of the internet and to reduce traffic among the nodes. In this way data transmission will be quicker and data distribution will be faster. One of the famous P2P distribution systems is BitTorrent. BitTorrent has gained reputation by its remarkable performance in distributing large files over the internet. Since BitTorrent and other P2P systems...
The congestion control of TCP Vegas is more stable and brilliant than other TCP versions such as Westwood Plus because of the congestion control before collision in Ad Hoc networks with frequent topology changes. Nevertheless, Vegas has less competitive ability when its data flow coexists with other protocols'. In addition, it cannot make full advantage of available bandwidth to transmit packets....
Companies increasingly rely on Internet for effective and efficient business communication. As Information Technology (IT) provides the infrastructure backbone for business activities, a corporate network connects the company to Internet and enables it to perform its activities globally. The corporate carries data packets generated by the users' while performing their business tasks. Traditionally,...
UDP based Data Transfer Protocol (UDT) is the next generation emerging protocol, popularly used for transferring bulk data in high speed, optical and distributed networks. In order to get widely adopted, UDT should be used as an underlying protocol for various existing applications like FTP, TELNET etc., which are currently based on standard TCP. Therefore, it is important to carryout detailed analysis...
ICN deployment will be based on the grounds of saving CAPEX/OPEX and/or enabling new services. This paper makes a case for the latter leveraging, emerging technologies such as network function virtualization (NFV) and software defined networking (SDN). We propose a framework to enable ICN based service platform as virtualized network functions to enable several edge-cloud services such as enterprise...
When there is the necessity to send an email message to a big list of email destinations and following the valid standard Simple Mail Transfer Protocol (SMTP), it takes too much time to be delivered, because this message is sent one by one to each of the email destinations. If we talk also of an important message that all the recipients are in need to receive it in a timeless way, converting this...
Network steganography is an emerging research field, which exploits packet protocol headers, protocol mechanism, packet payload, etc. to establish secret communication between two parties over a computer network. The detection of such hidden communication has not been part of intrusion detection systems that are primarily used to detect malicious activities such as viruses and malwares. In this paper,...
Distributed systems have rapidly changed the face of Internet Technology. Web syndication is a competitive collaborative content delivery system over the cloud, which refers to making web feeds/ material available from a site to other people with a summary of the website's content including the recent updates. The relevance of web syndication has been remarkable in the fields of e-Governance, e-Commerce...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.