The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many challenges have been investigated in the past few years to make network communications more secured, more reliable, scalable, standardized, and higher performance. Implementations of these researches vary, taking into consideration several features of embedded system design, such as cost, flexibility, performance, and size. Embedded system cores for network communication are becoming much important...
Broadband satellites enable Internet access for remote communities and niche markets such as ships and airplanes. However, their inherent characteristics, such as long delays and limited resources, significantly degrades the user quality-of-experience. In this paper, we propose a novel HTTP Performance Enhancing Proxy (PEP) that accelerates web-browsing and improves the utilization of satellite resources...
A low-cost collaboration architecture for web content distribution, that aims to improve all stakeholder's interests, is presented. A peer-to-peer (P2P) contribution among the end users layer is suggested, in order to increase download rates and reduce server traffic and resource usage. In addition, the Internet Service Providers (ISPs) concerns are also considered, with an ISP-aware connection strategy...
Many techniques are commonly used to increase server availability or for distributing the load among a group of servers. We propose a technique for splitting a single HTTP request that allows a TCP connection to be dynamically split between two Web servers without using a central control. For example, one server can handle connection establishment and closing, while another handles the data transfer...
DDoS attacks are one of the top security problems affecting networks and disrupting services to legitimate users. The first vital step in dealing with this problem is the network's ability to detect such attacks. To that end, it is important that an intrusion detection mechanism be able to differentiate between real DDoS traffic and Flash Crowds traffic, the latter of which constitutes sudden bursts...
In the present IT age, we are in need of fully automated industrial system. An embedded web based interface used for an industry application is designed in this paper. Here two parameters are being measured. One is sensed voltage of each line in the form of analog and then converts it into Digital signal and the second one is to amplification for the driven current, which is monitored and controlled...
To support user mobility across different devices, communication session continuity should be enabled at session initiation and during a session. The session continuity can be managed by either a user or dedicated network nodes such as back-to-back user agent (B2BUA) in IP Multimedia Subsystem (IMS) architecture. When network manages the session continuity, user experience is enriched because users...
The Internet has recently been evolving from homogeneous congestion control to heterogeneous congestion control. Five years ago, Internet traffic was mainly controlled by the standard TCP AIMD algorithm, whereas Internet traffic is now controlled by many different TCP congestion control algorithms, such as AIMD, CUBIC, CTCP, and FAST. However, there is very little work on the performance and stability...
With the growing diversity of malware, researchers must be able to quickly collect many representative samples for study. This is commonly achieved by harvesting the malware from honeypots: Insecure systems presenting a wide attack surface to the public Internet, aiming to attract attackers. However, software-based honeypots have both performance issues in light of 10+ Gb/s networks, as well as difficulties...
The security of feedback control systems is an important problem to the Internet because feedback controllers have been widely used in popular Internet applications (e.g. web server) and fundamental protocols (e.g. TCP). The vulnerability comes from the fact that an attacker can easily manipulate the input and control variables of those controllers. In our previous works, we analyzed threats of some...
Recently there has been increasing interest in building networks with Ambient Intelligence (AmI), which incorporates the user-centricity and context awareness. However, both the Internet TCP/IP protocol stack and the seven-layer OSI reference model are not suitable for AmI networks, because they do not specifically take the end-user requirements into consideration in their architecture design. Under...
This paper proposes a small, power saving embedded Web server for home appliances. The proposed device operates with a real-time operating system on a 32 bit RISC microprocessor. A TCP/IP protocol stack, HTTP, FTP, SNTP server and client applications were developed. The prototype server requires one fortieth the power of a general server using a PC. The software resources are about 1.8 MB. Demonstrations...
This paper explains the whole process of a system design for the remote control of a stepper motor via web server. For this purpose a hardware structure is fully designed and implemented. Two types of communications were used to operate with the stepper motor. The first is realized by serial RS-232 protocol and the second one uses TCP/IP protocol for remote control. The TCP/IP protocol provides communication...
The web is a crucial source of information nowadays. At the same time, web applications become more and more complex. Therefore, a spontaneous increase in the number of visitors, e.g., based on news reports or events, easily brings a web server in an overload situation. In contrast to the classical model of distributed denial of service (DDoS) attacks, such a so-called flash effect situation is not...
A novel concept for using a low power web server integrated in a data acquisition platform for transferring data using “http” (hypertext transport protocol) has been developed by SAIV. The data is directly transferred from a field station to the end user without any intermediate links via the Global System for Mobile Communications (GSM).
A number of different approaches exist to deliver multimedia content to the end-user through the Web. Within classic client-server architectures, three main media delivery methods exist: HTTP download, real-time streaming, and HTTP streaming. The latter combines the advantages of both the HTTP download and the traditional streaming approach. In this paper, we provide an overview and analysis of two...
Web QoS is an important research field on today's Internet application. The current Web server basically adopts the agreement of HTTP/1.1 version, so the network connection is a model of time maintenance, not the typical cached mode. According to the operational features of this Web server, combined with a forward neural network to predict the response delay, a kind of initiative TCP connection management...
HTTP does not secure its requests and responses. Using Man-in-the-Middle attack, it is possible to alter the HTTP communication, while it still would look authentic. This can be a problem, if you download data such as PGP key, TOR client, access banking services on-line, or when there is an interest to filter what you can read on the Internet. It should be noted that under particular circumstances,...
TCP/IP, the most commonly used network protocol, consumes a significant portion of time in Internet servers. While a wide spectrum of studies has been done to reduce its processing overhead such as TOE and Direct Cache Access, most of them did studies solely from the per-packet perspective and concentrated on the packet memory access overhead. They ignored per-session data TCP Control Block (TCB),...
Protocol architecture for a web-sensor gateway interconnecting internet and wireless sensor network is investigated. The web-sensor gateway is to deliver data between TCP/IP and Zigbee/IEEE802.15.4 protocols, transparently. Since the gateway provides a means to remotely control and aggregate sensor data over the internet, it needs to be designed in the view point of users and in their convenience...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.