The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Reflector attacks are a variant of denial-of-service attacks that use unwitting, legitimate servers to flood a target. The attacker spoofs the target's address in legitimate service requests, such as TCP SYN packets. The servers, called "reflectors,'' reply to these requests, flooding the target. RAD is a novel defense against reflector attacks. It has two variants -- locally-deployed (L-RAD)...
Similar to conventional NAT technology, NAT-PT gateways break traditional TCP/IP's end-to-end argument property which result in IPSec can not be applied in NAT-PT environment, and would fall flat when the pool of IPv4 addresses is exhausted. A solution by adding IP transform message, modifying the address mapping tables and session tables, using port transform strategy with inner host computer character...
The policy and charging control function is defined as PCC (policy and charging control) by 3GPP and SBBC (service based bearer control) by 3GPP2. It is valuable to establish an experimental testbed for PCC and SBBC to improve and verify the related performance. At present, we can make use of open source IMS (OSIMS) and UCT PCF to simulate 3GPP PCC, but there is no testbed for the policy control function...
Switch Technology is a data transmission method with the development of switch device. It is include L2 switch, L3 switch and L4 switch. L2 switch is an oldest technology. This paper introduces the VLAN technology in L3 switch. The L3 and multiple layer switch is introduced. VLAN technology is discussed with classification and the character. This paper also expatiates on Super VLAN and proxy arp,...
Internet is becoming an indispensible infrastructure of essential media, which makes a great burden for ISP's security and traffic management. Especially the situation will be much more serious in NGI (the Next-Generation Internet) because of its innumerable users, mobile device, information appliances (IA) and networked sensors etc with 128-bit IPv6 address. For the reason of lacking scalability,...
The 3GPP standard body has defined the online charging system (OCS) as the central point in the charging architecture and Diameter Ro as the standard interface for enabling online charging in today's converged IP networks. It results in more and more heterogeneous telecom services charged by the online charging system. On top of that, operators want to deliver a consistent rating policy and aggregated...
The Home NodeB has been the hotspot in the mobile communication field. Comparing with Macro NodeB, Home NodeB has several features which bring the challenges for management. The paper proposes two alternative management architectures for the Home NodeB access network based on the different management requirements, and discusses the management elements in detail. These two kinds of architectures can...
Carrier networks are gradually adopting a network model that consists of MPLS capable routers and OXCs interconnected by high bandwidth WDM links for transporting IP and Ethernet traffic. Globalization drives the quest for end-to-end QoS guarantees over different carrier networks. Recovery mechanisms are crucial to reach the high availability requirements of critical services. In this paper we investigate...
The selection of IP cores for integration in hardware systems requires the evaluation, comparison and ranking of all eligible core candidates. In this context, the development of suitable benchmarking techniques to balance the different performance, dependability, area and energy consumption measures is an essential, but also a challenging task. This paper specifies a benchmarking approach that exploits...
Cellular IP is one of well-known micromobility protocols. In this paper, its signaling cost for mobility management, including both route-update and paging-update packets, is numerically analyzed. An analytical method is presented and the numerical results is extensively compared and discussed over some important system parameters.
Softswitching is a significant technology of the Next-Generation Network, but it can't be widely used if there isn't a provisioning system supporting it. The workflow-based Softswitching provisioning system in this paper helps engineers working together even they are not in the same location, and provides an easier way to configure the devices quickly and correctly. It not only improves efficiency...
During the teaching process of network course, most students can't understand such as: protocols and architectures because of their abstraction, especially the data behind protocols, and that can directly affect students to use network application software in the future. In this paper, we proposed the "instantiated teaching" method. In this method, some analysis software of network principles...
For IPv6 and IPv4 network seamless interconnection question, it is very essential to study IPv4/IPv6 intercommunication technology to ensure smooth transition of IPv4 to IPv6. To solve the seamless interconnection question, this article mainly researches IPv4 to IPv6 development's intercommunication question of three stages, including IPv6 based-IPv4 network interconnection, IPv4/IPv6 transparent...
The extended use of DMX512 protocol has been applied in many areas such as stage and theatre. While it has two inherent flaws in landscape lighting control: the quantitative limitation of control slots and slow bandwidth utilization ratio. This paper proposed the evolution of a management and control system for landscape lighting. By using the upper Internet management network, several lower DMX512...
Data rates in 3 GPP LTE supports 100 Mbps in the downlink and 50 Mbps in the uplink. Currently, almost all manufactured MTs uses HDLC_PPP to make connections between TE and MT. However HDLC_PPP uses byte stuffing for HDLC framing. As the communication speed is increased dramatically between TE and MT, byte stuffing seriously limits communication speed. As the connection methods between TE and MT and...
The IP multimedia subsystem (IMS), as a platform enables PLMN operator to offer their subscribers many new multimedia services based on single infrastructure. However IMS solutions can succeed only when charging for these new services is supported in a flexible and efficient manner. In this paper a new method for multiple charging data records (CDR) processing in IMS network is proposed. After the...
This paper describes the integration of the presence management service into existing IP Multimedia Subsystem (IMS) laboratory infrastructures. Both laboratories - NGNlab in Bratislava and the laboratory in Leipzig - use the Fraunhofer OpenIMS as core components for their testing IMS environment (i.e. Call Session Control Functions (CSCF), Home Subscriber Server (HSS)). The virtualization of these...
The Internet is rapidly evolving into a commercial infrastructure, resulting in an increasing demand for QoS guarantee from the network. The IPv6 FL (flow label) is a function that, as it was designed, can be a big help in alleviating QoS problem in the next generation Internet. However, the related research work is still far from enough to make it practical. In this paper, we firstly investigate...
The ID/locator split concept has recently been introduced into the ITU-T Study Group 13's standardization activities for future networks. To contribute to ITU-T's this effort, we first propose a naming system, called host name and identifier system (HNIS). We show how host names and host identifiers (IDs) are generated and mapped to each other. We then present a new network architecture based on the...
In all-IP wireless networks, groups of cells are served by IP access gateways. When users move between regions served by different gateways, IP and application layer mobility signaling is triggered. The key performance indicator to assess a given mobility protocol is the mean number of gateway handoffs. In this paper, we propose a new fundamental approach, which majorly extends past work in cellular...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.