The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
MEC or Multi-Access Edge Computing is a network service delivery architecture that enables cloud computing capabilities at the edge of the access network. Realisation of the MEC vision is challenging with current network technologies: service discovery and routing, secure network slicing and distributed mobility management require complex capabilities in the network. This demo features an OMEC use...
Volunteer computing is currently successfully used to make hundreds of thousands of CPUs available free-of-charge to projects of general interest. However the effort and cost involved in participating in and launching such projects may explain why only a few high-profile projects use it and why only 0.1% of Internet users participate in them. We present Pando, a system designed to be easy to deploy...
Hybrid broadcast-broadband TV (HbbTV) is a global initiative that brings new solutions to world of digital television (DTV) in terms of entertainment. In comparison to previous initiatives, different services are additionally provided in HbbTV. This paper describes an application for displaying of hybrid Electronic Program Guide (EPG) for a digital TV receiver. The application works with and without...
The content delivery network (CDN) intensively uses cache to push the content close to end users. Over both traditional Internet architecture and emerging cloud-based framework, cache allocation has been the core problem that any CDN operator needs to address. As the first step for cache deployment, CDN operators need to discover or estimate the distribution of user requests in different geographic...
Wikipedia is one of the most popular information platforms on the Internet. The user access pattern to Wikipedia pages depends on their relevance in the current worldwide social discourse. We use publically available statistics about the top-1000 most popular pages on each day to estimate the efficiency of caches for support of the platform. While the data volumes are moderate, the main goal of Wikipedia...
We analyze the design space for implementing the Constrained Application Protocol (CoAP) within Content-Centric Networks (CCN), identifying several CoAP specific scenarios and seeing how they map to CCNs. We present an evaluation, recommendations for implementations and extensions, and directions for future work. Our key result is that while several protocol features and flows map naturally, some...
An increasing number and variety of devices are connected to the Internet. Thus, it is expected that peer-to-peer (P2P) networks, which have no central servers, will solve the server overload issue in the client-server communication model. Among P2P information search schemes, we focus on Skip Graphs, because they exhibit strong churn resilience and have a range search function, which is desirable...
The centralized zone data service (CZDS) was initiated by the Internet Corporation for Assigned Names and Numbers (ICANN), a global Internet overseer, to facilitate sharing and access to zone data as hundreds of new generic Top-Level Domains (gTLDs) are added to the Internet. The goal of CZDS is to improve the security and transparency of the naming system. In this study, we explore CZDS's transparency...
Domain Name System (DNS) leakage occurs when queries for names within a private namespace are propagated in the public DNS infrastructure, which has various privacy implications. To reduce this leakage and improve Tor's privacy, Appelbaum and Muffet suggested in RFC 7686 the special-use of .onion domain name. They recommended how stub, recursive, and authority name servers should behave when encountering...
Nowadays security is a major concern. Address resolution Protocol (ARP) is a most popular communication protocol in the LAN. ARP is mapping from IP address (32 bits) into MAC address (48 bits). ARP has some limitations like lack of states and authentication. So attacker can exploit these vulnerabilities and gain unauthorized access to one's sensitive data. There are some attacks against ARP like MAC...
Software Defined Networks (SDN) is a new technology providing a programmable network by separating control and data planes of computer networks. SDN technology can provide an increase in the performance of Internet applications by implementing routing approaches specific to such applications. In this paper, we propose a server and end-to-end path selection approach for a content distribution network...
Currently, most of the existing web cache replacement strategies are based on temporal locality, frequency distribution and size distribution while spatial locality gets less attention. This paper proposed a reference model to evaluate the spatial locality of web object accessing, and used the reference model as the basis of a new cache replacement strategy -- GDSR, Greedy-Dual-Size Reference. GDSR...
The growth in information technology has led to a higher level of education process. Web-based system provides indisputable advantages to educational resource relevantly and convincingly. Supervision for final year project students seems to have major infirmity in two-ways communication between supervisor and supervisee, which affected the outcomes of their findings. Thus, e-Supervision system is...
This paper presents the development of an online-based continuous-assessment repository system designed to cater the needs for both lecturers and students. Conventional methods of notifying continuous assessment marks, e.g. test or assignment marks to students include displaying the students' marks on the bulletin boards or merely by returning the marked tests or assignments to students. While these...
The level of trust accorded to certification authorities has been decreasing over the last few years as several cases of misbehavior and compromise have been observed. Log-based approaches, such as Certificate Transparency, ensure that fraudulent TLS certificates become publicly visible. However, a key element that log-based approaches still lack is a way for clients to verify that the log behaves...
To combat with botnet, early detection of the botnet communication and fast identification of the bot-infected PCs is very important for network administrators. However, in DNS protocol, which appears to have been used for botnet communication recently, it is difficult to differentiate the ordinary domain name resolution and suspicious communication. Our key idea is that the most of domain name resolutions...
Byte caching (also known as redundancy elimination) is a commonly used technique in practice to compress data streams in data networks. The congestion of a bottleneck link can be significantly reduced when byte caching is implemented in both ends of the link. We propose four techniques to improve the original byte caching method. Two of these techniques offer better fingerprint sampling for caching...
In recent years, the number of appliances connected to the Interned has steadily increased thanks to the wide popularity of WÌFÌ/3G enabled mobile devices. This has led to an increase of multimedia resource consumption, causing traffic overload problems for classic resource providers. Different solutions have been studied to shift this traffic overhead from the server(s) towards the client(s) through...
Modern Wi-Fi network has been a convinced way to connect to internet and widely accepted by people. Base on the Wi-Fi infra-structure, we can provide location-based services which could help to increase customers' experience and engagement in the services or activities provided by area owners. In this paper, we present a Wi-Fi hot zone based Location-Aware services which can dynamically cognize user's...
At present, countries around the world attach great importance to college students' employment. The employment of university graduates has also been a focus of social attention. Playing the advantages of university students hunting for a job on the Internet, on constructing and developing online self-employment service and employment information service and improving the employment information degree...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.