The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since the early days of Quality of Experience (QoE) research, relationships to Quality of Service (QoS) and corresponding QoE-QoS models have been of great interest to the research community. However, the manifold quality transformations throughout the communication stack, together with accessibility issues of QoS parameters inside networks, hamper availability, applicability and generality of such...
With the rapid development of Internet, IPv4 will transform into Ipv6 step by step. Some network applications on the basis of IPv4 need to be transformed so that they can be executed under the IPv6 environment. To solve the problem of such transition, the socket interface and realization of IPv4 and Ipv6 are analyzed firstly in this paper. Based on the analysis, a feasible method is presented to realize...
In this paper, we show that Web protocols and technologies are good candidates to design the Internet of things. This approach allows anyone to access embedded devices through a Web application, via a standard Web browser. This Web of things requires to embed Web servers in hardware-constrained devices. We first analyze the traffics embedded Web servers have to handle. Starting from this analysis,...
Tor has become one of the most popular overlay networks for anonymizing TCP traffic. A novel and effective flow multiplication attack against Tor is proposed in this paper, which exploits the fundamental vulnerability of anonymous Web browsing by using a man-in-the-middle attack on client's HTTP flow. In the flow multiplication attack, whenever a malicious exit onion router detects a Web request to...
TLS (Transport Layer Security) is one of the most popular protocols to provide a secure channel between the client and Web server; however, the high overhead of which degrades the server performance considerably. Existing load-balancing schemes for TLS Web system can improve the performance of the system, but the balance of loads is very difficult for the features of TLS, which results in degrading...
This paper analyzes the shortages of traditional Web/CORBA based network management architecture firstly, and then puts forward a new Web/CORBA based architecture for network management with TCP connection, which applies information push technology and notification service to traditional model. It changes the passive state of server and implements network management in an active state. It can push...
Transient overload is a short term event characterized by a sudden and unexpected rise of the arrival rate in a Web server. Transient overload events in Web servers have been observed more frequently as the number of Internet users grows and the Web services become more popular. This paper deals with the non-trivial problem of generating overload for Web server testing. In this paper we present a...
Web database is a combined production with database technology and Web technology, it stores and manages a great deal of data, if they are embezzled or juggled, which maybe bring enormous political and economic losses to the society. So it is imperative to properly establish security for Web database against illegitimate intrusion. The host identity protocol (HIP) is designed by the Internet Engineering...
This work presents SAPOTI (Dependable TCP/IP application servers - in portuguese: servidores de aPlicacoes cOnfiaveis Tcp/Ip), a distributed tool that guarantees the availability of TCP/IP application servers, in particular of Web servers. The tool is based on the SNMP framework and is executed on a group of Web servers running on a set of hosts that are monitored by a dependable distributed network...
Applications over HTTP are expected to play its persistently important role in the future heterogeneous networks. The purpose of this study is to analyze emerging characteristics of HTTP traffic which has dramatically changed both in payload and transfer method in the past few years. Beginning with a discussion of well-known models in literature, we emphasize on their applicability in the future networks...
The development trend of embedded technology need the web/server technology applies into embedded fields and provides a flexible remote device monitoring and management function based on Internet browser. But, due to the limitation of hardware resource and the low-efficiency of general purpose TCP/IP protocol stacks and protocol models, it is quite difficult to implement full TCP/IP protocol into...
Because the traditional network management model based on Web and CORBA which adopts pull technology can not obtain info actively and in time, this paper put forward a new Web services model based on CORBA and push technology in network management system, which combines information push technology with CORBA notification service. This model changes the passive status of server and implements network...
In this paper, we have developed an additional enhancement to the HTTP protocol. This modification eliminates the need for the client to wait for the delivery of the HTML file before being able to request the embedded objects. In our solution, the server delivers the embedded objects of a Web page to the client without being explicitly requested. In essence, the requests for the embedded objects are...
Web Service is providing large amounts of information via Internet everyday and wins great success. In the development of HTTP protocol, TCP connection multiplexing technique, called dasiakeep-alivepsila or dasiapersistent connectionpsila, plays significant roles in its evolution. Many years passed, keep-alive mechanism has been implemented widely to support all kinds of web service. However, dramatic...
With the rapid growth of the Internet, the interest for connecting small devices such as sensors or embedded system appliances into an existing network infrastructure has increased. Web browser is used by remote operator to control and monitor the devices via Internet and these applications are widely utilized in tele-operation, space exploration and tele-training systems. Such devices often have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.