The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to meet the overwhelming demands of content retrieval for mobile end users, the community effort has been made on designing next-generation Internet from a clean slate. In this paper, we present the design and performance evaluation of Integrated Caching, in which we assume each router on the Internet can cache contents that pass by and reply to content requests with its local copy. This...
Mobility protocols are originally proposed to support ongoing Internet connectivity of hosts or networks in motion. However, the requirement of seamless connectivity in mobile environment and use of route optimization between the communicating nodes have introduced several security vulnerabilities to mobility protocols. In this paper, we explain with illustrative examples major security threats on...
In this paper, we present a naming scheme for heterogeneous networks composed of infrastructure-based and infrastructure-less networks where nodes may be subject to intermittent connectivity. The proposed scheme aims at decoupling object identification from location and is designed to operate with status-quo Internet routing. We showcase the proposed naming scheme implemented on the NS-3 network simulator...
6LoWPAN is for IPv6 packets to be sent to and received from over IEEE 802.15.4 based networks for applications which require wireless internet connectivity at lower data rates for devices. However it is well known that the management of addresses for devices that communicate across the two dissimilar domains of IPv6 and IEEE802.15.4 is complicated. Routing itself is another problem especially between...
In this paper, we propose L3 handover scheme using SIP messages to minimize handover latency and packet loss in a MN with single interface. Packet loss and handover latency arise from L2/L3 association delay and IP configuration delay when the MN transfers internet connectivity from the serving access router to the target access router using legacy terminal mobility mechanisms. Therefore, seamless...
A terminal connected to a router has a private IP address. When this terminal sends a data packet to the service system via the router, the router will change the private IP to a public IP, then tries to send the data packet to the server. The service system knows only the router's public IP as the destination address. So the response packet is delivered to the router, and the router cannot deliver...
Various information delivery schemes based on store-carry-forward routing with extensions have been studied as part of efforts to support non-real-time communications in sparse or intermittent networks. However, communication service schemes that cover large areas based solely on store-carry-forward technology have previously been considered impractical because the delay time for message delivery...
The overload of IP address is regarded as an important reason to create routing scaling issues. There have been several proposals to address this problem, such as Shim6, HIP and LISP. LISP, as one of the most representative proposal, separates IP address into Endpoint Identifier (EID) and Routing Locator (RLOC). To map identifiers onto locators, there must be a mapping system. In this paper, we propose...
Peer-to-peer (P2P) file-sharing applications are now widely used. The traffic generated by the P2P applications occupies a significant proportion of Internet traffic, and has an enormous impact on the backbone networks. Since these peers communicate by constructing virtual overlay routes, which are constructed independently from the IP networks topology, the characteristics of P2P traffic between...
Recently, femtocells, which cover a cell area of several tens of meters, have been attracting considerable attention in the field of mobile data communications. In the standard method, when a femtocell for data communication is connected through a public network such as a broadband access network or the Internet, an IPSec tunnel is established between the femtocell and the security gateway located...
The separation between edge and core addresses has been proposed to address the scalability problem of the Internet routing system. One main challenge is to design an efficient mapping mechanism for the two address spaces. The layer structure is attractive because of its scalability and simple index mechanism, while existing layered mapping system lacks a clear structure study and faces serious deployment...
This paper proposes a novel method to characterize unwanted email traffic. Research object is a significant, diverse, and representative set of Internet email traffic, The email session we choose is based on an extended deterministic finite automata (EFSA) model, then choose some parameters to capture email traffic characterization. The method is applied to two different volumes of email traffic data...
The rapid development of network technology in particular the widely use of the internet based on TCP/IP protocol, affects the way people work, learn and live greatly. Network's business value and importance increases as people get more dependent on network. Every walk of life's development and various activities of the word are inseparable from the Internet. However, as the telecommunication operation...
Several studies have found some properties of Internet such as Triangle Inequality Violations (TIVs). The studies have reported the existence of TIV in the Internet delay space. Triangle inequality violations that are important to peer-to-peer applications can be leveraged to build overlay routing to improve peer-to-peer performance. How to select relay nodes becomes a crucial factor to overlay routing...
With the explosive widespread of the Internet, many fundamental and popular Internet services such as WWW and e-mail are becoming more and more important and are indispensable for the human's social activities. As one technique to operate the systems reliably and efficiently, the way of introducing multihomed networks attracts much attention. However, conventional route selection mechanisms on multihomed...
To operate e-mail systems stably multihomed networks are well used. As an operation method on multihomed networks, we have proposed a dynamic route selection method considering status of networks. However, status of Mail Transfer Agents(MTAs) have not been considered in this method so that a heavily loaded MTA would be possibly selected. In this paper, we propose a new dynamic route selection method...
People in rural areas are less likely to obtain broadband Internet access due to a combination of economic disadvantage, technical difficulties, and lack of service providers. There is a great need to develop robust, low-cost and easy-to-maintain network management platform for Wireless Internet Service Providers (WISP) in rural areas. The goal of this project is to partner with a small local start-up...
Normal TCP/IP operation is for the routing system to select a best path that remains stable for some time, and for TCP to adjust to the properties of this path to optimize throughput. By executing TCP's congestion control algorithms on multiple paths at the same time, a multipath TCP can shift its traffic to a less congested path, thus maximizing both the throughput for the multipath TCP user and...
The wide availability of WiFi hot-spots provides mobile users with convenient access to the Internet. However, hot-spots cover only small areas and are often operated by a local authority. A user that roams between hot-spots effectively traverses different operators and access networks. Due to deployment complexity, IP mobility is usually not supported by the mobile node or the network. In this paper...
The large amount of bandwidth and other resources required to deliver streaming media limits the number of concurrent users. We propose a virtual active network (VAN) architecture for streaming media data delivery over wide area networks. In the proposed architecture, cooperating proxies support multiplexing and delivery of live streaming media. The hierarchical delivery structure is dynamically adjusted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.