The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Using the inexpensive Raspberry Pi to automate the tasks at home such as switching appliances on & off over Wi-Fi (Wireless Fidelity) or LAN(Local Area Network) using a personal computer or a mobile or a tablet through the browser. This can also be done by using the dedicated Android application. The conventional switch boards will be added with a touch screen or replaced with a touch screen to...
Direct (or D2D) communications allow two UEs to communicate without passing through the eNodeB. However, the two UEs may still need to relay their communication through the eNB from time to time, hence should be able to switch from the direct to the re-layed mode seamlessly, without this affecting the QoS. In this paper we show that in conventional systems a mode switching may cause relevant losses,...
Man-in-the-Middle (MITM) attack enables an attacker to monitor the communication exchange between two parties by directing the traffic between them to pass through the attacker's machine. Most existing schemes for discovering MITM attack focus on detecting the mechanism used to direct the traffic through the attacker machine. This paper presents a new detection scheme that is based on matching the...
The communications infrastructure of the electric grid has been evolving rapidly in the last decades due to the need for transporting ever more sophisticated information, both data and control. More recently Ethernet based networks have been added into the picture, as modern relays need to communicate with control and dispatch centers and centralized management systems over local and wide area networks...
We have been proposing a new IP mobility technology, called “Network Traversal with Mobility” (NTMobile), that solves the NAT traversal problem and provides flexible mobility in IPv4 and IPv6 networks at the same time. In this paper, we have implemented the NTMobile functions in an Android smartphone and performance evaluated in the IPv4 and IPv6 networks. It was confirmed that the NTMobile-compatible...
The goal is to distribute UTC(CH) in a remote location via TCP/IP. The MC (Master Clock) is locked to UTC(CH) via a combination of IRIG-B and 1-PPS signals. The SC (Slave Clock) is controlled by a PI control loop that tracks the MC. The SC-MC clock offset and the transmission delay are estimated simultaneously by means of a TW (Two-Way) comparison process similar to NTP but based on TCP/IP.
The addressing and forwarding architecture based on the destination of packets in current Internet typically does not check the authenticity of source address of packets; therefore, it causes a considerable challenge to prevent the attackers from launching attacks by forging source addresses and to trace the real sources which sent the malicious traffic. In this paper, we present a new protocol/architecture...
NAT (Network Address Translation) is well-known as one of the short-term solutions of IPv4 address exhaustion. NAT is a technique that shares a single IP address in several PCs, and is widely used for alleviating the IPv4 address exhaustion and as a security solution. However, when a backbone network has access control function for PCs based on their IP addresses, it cannot identify the PCs under...
The access loop identification is very important to improve the network security. The methods to implement access loop- identification and traceability are very important to the broadband network. Some methods of access loop identification need to get user information. This paper introduces access loop identification methods in broadband network.some methods.
Video-streaming can now be offered on third-generation (3G) mobile networks. Most research efforts have focused on video download. This paper presents a detailed study of challenges faced for successfully deploying applications requiring life video upload. Both subjective and objective qualities as well as the effects of mobility are analyzed on real 3G networks. Consequently, video profiles are identified...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.