The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In today's Internet age, web-based applications are an extremely logical way to disseminate, update, and visualize information. Our modern wired infrastructure and high-speed wireless access points make it possible to access high-bandwidth demanding applications from nearly everywhere. However, in places where infrastructure does not exist, and where information needs to be disseminated over areas...
It is necessary to monitor and control remotely the devices in scattered unattended machine rooms. The remote monitoring and controlling system are designed based on SNMP and TCP/IP, which uses mainly existing intranet. Following the introductions of SNMP and TCP/IP, overview design and software design of the system are presented. The system may achieve the management of unattended machine rooms and...
Covert channels are malicious conversation in a legitimate secured network communication that violates the security policies laid down. Covert channels are hidden, intended design in the legitimate communication whose motto is to leak information. Trapdoors are unintended design with a communication system that exists in network covert channels as a part of rudimentary protocols. Subliminal channel,...
The availability of multimedia contents to be played back while driving constitutes an added value to both drivers and passengers, improving the travel experience. These contents can be already on-board, diffused through broadcast networks or delivered on demand by servers as data streams. Vehicular ad-hoc networks allow envisaging a new way to access multimedia contents based on epidemic data dissemination,...
A novel SQL Tunnelling system to allow communication with an SQL database is developed by utilising the standard Internet protocol HTTP. The communication with the database is allowed by a client interacting with a Web Service running on a standard off-the-shelf HTTP Server. With this tunnelling system, access to a database can be provided without providing access to the database native communication...
Ubiquitous patient care monitoring system can be defined as the combination of communication technology and body sensor nodes. Ubiquitous patient care monitoring is the part of telemedicine monitoring, an application communication protocol which is HTTP (Hypertext Transfer protocol), used to access information from handheld devices such as PCs, PDA (personal digital assistant) etc. which have the...
Network traffic classification can be employed for providing enhanced Quality of Service (QoS), network security, traffic management, etc. Classifying network traffic with statistical characteristics of traffic flows has the advantages of fast processing speed, fairly high accuracy, ability of handling encrypted traffic, etc. However, Nagle's algorithm coalesces small TCP packets, and sometimes there...
This article discusses the development of monitoring system about the security situation in coal production and coal mining. In order to solve the problem of coal mine monitoring systems and self-management of coal enterprises, Adopt the Socket communication mechanism based on TCP protocol, design the Real-time monitoring and development of a WEB-based remote coal mine gas monitoring system. The test...
In this paper, we introduce a secure communication protocol for tag authentication and data access authorization in EPCglobal Class 1 Generation 2 (EPC GEN-2) RFID systems. The proposed protocol adopts a process-oriented design to exploit the memory space at tag and backend server ends more efficiently. Based on the formal logic proof and protocol analysis, our scheme not only provides data confidentiality...
This paper presents STAMP: a tool to analyse SMTP servers overlay topology. STAMP builds a weighted and oriented graph from an email database, an email log or just a simple email header allowing a post-analysis of the SMTP overlay structure and the identification of the paths used by an email. The objective of this tool is twofold. STAMP allows to automatically perform an analysis of the SMTP topology...
In order to solve the serious problem of high energy consumption in large public buildings and government office buildings, this paper develops the monitoring system of building energy consumption (MSBEC), which could monitor not only energy consumption data, but also energy quality. Firstly, this paper designs the hardware subsystem with three-layer structure. At the information center layer, four...
This study revealed an applicable architecture in which a data-driven mechanism was designed to bridge a wireless sensor network (WSN) and the Internet. The system was divided into two independent parts. The first part is the data communication between the sensor network and the database. The other part is the data communication between the database and the user interface (UI). These two parts are...
The locator/identifier separation protocol (LISP) is being considered in the Internet community as an evolutionary path towards future Internet. Routing scalability and enhanced traffic engineering capabilities beyond BGP are major highlights of the proposal. An implementation from Cisco systems is being tested in a global infrastructure named LISP+ALT, while an open source implementation, namely...
Traditional network monitoring tools such as Sniffer, Netview, not only provide the flow of network, but also analyze all kinds of protocols in TCP/IP protocol family, but they can't provide the analysis on TDS protocol which used in the Microsoft SQL Sever 2000 in detail. According to the result of testing and researching TDS 7.1 protocol, sums up the communication rule and packet structure of TDS...
SIP flow management should respect the specific characteristics of SIP protocol applied in multimedia or telecom services for meeting stringent quality of service (QoS) requirement. The specific characteristics include explicit session structure for correlating a series of SIP messages, stringent response time required by real-time applications, extra overhead imposed by SIP message retransmission,...
This article presents a metadata catalog, intended for use in grids. The catalog provides high availability, by replication across several hosts. The replicas are kept consistent using a replication protocol based on the Paxos algorithm. A majority of the replicas must be available in order for the system to function. The data model used in the catalog is RDF, which allows users to create their own...
This paper introduces Java 2 Platform Micro Edition (J2ME) technology and database procedure, which implemented a bus route selection system based on B/S structure and HTTP protocol. The server can simultaneously handle the request from the browser, the terminal which the end user uses can get the information he wants to get in anywhere and the bus information he wants to change, only if it supports...
Advanced Telecom services typically go beyond traditional two parties telephone calls. In particular, SIP-based service creation in the Telephone-IP convergence scenario has become an important research issue. Telecom services are typically asynchronous, require low latency, high throughput and high availability: those peculiarities ask for a specific event-oriented framework. Developers can today...
Web database is a combined production with database technology and Web technology, it stores and manages a great deal of data, if they are embezzled or juggled, which maybe bring enormous political and economic losses to the society. So it is imperative to properly establish security for Web database against illegitimate intrusion. The host identity protocol (HIP) is designed by the Internet Engineering...
The unique features of voice over Internet protocol (VoIP) systems introduce various security challenges which entail novel detection approaches. Signature-based detection approaches have been lacking the necessary flexibility to model attacks semantically and to thwart obfuscation. In this paper, we demonstrate the design and implementation of a signature database that complements a specification-based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.