The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
DoS(Denial of Service) or DDoS(Distributed DoS) attack is a major threaten and the most difficult problem to solve among many attacks. Moreover, it is very difficult to find a real origin of attackers because DoS/DDoS attacker uses spoofed IP addresses. To solve this problem, we propose a probabilistic route selection algorithm to trace the attacker's real origin. This algorithm uses three types of...
The overall performance of hybrid ad hoc networks, which is the integration of ad hoc networks and fixed IP networks like the Internet is affected heavily by the discovery and selection of Internet gateways. Each of existing proposals is suited only for a limited range of network conditions and its performance can vary dramatically as the network conditions change. The obvious unidirectional links...
An autonomous decentralized system and a series of methods for reducing the detection time of path failures in the system are developed. Computing devices in the proposed system are organized into at least three groups based on their connectivity of system's graph model. Each computing device is assigned three identification values associated with their group memberships. The identification values...
6LoWPAN is for IPv6 packets to be sent to and received from over IEEE 802.15.4 based networks for applications which require wireless internet connectivity at lower data rates for devices. However it is well known that the management of addresses for devices that communicate across the two dissimilar domains of IPv6 and IEEE802.15.4 is complicated. Routing itself is another problem especially between...
The 3rd Generation Partnership Project is specifying solutions for IP flow mobility, which enable IP data flows being routed between a mobile terminal and the infrastructure via a 3GPP and non-3GPP access systems, e.g. over LTE and WLAN. Connectivity via the different access systems is provided based on the concept of a shared single Packet Data Network connection. In order to enable IP flow mobility,...
Wireless mesh networks (WMNs) are comprised of nodes with multiple radio interfaces and provide broadband residential internet access or connectivity to temporal events. Our goal is to simplify the network deployment of such a mesh network, and towards that we are presenting procedures for automatic configuration and optimisation of the network. We first present an architecture framework that supports...
This paper proposes a novel method to characterize unwanted email traffic. Research object is a significant, diverse, and representative set of Internet email traffic, The email session we choose is based on an extended deterministic finite automata (EFSA) model, then choose some parameters to capture email traffic characterization. The method is applied to two different volumes of email traffic data...
Dedicated service gateways provide Network services which direct traffic flows. Currently many researchers focus on gateway selection on the Shortest Route, Closest Gateway and not much on the congestion and network traffic in this route. In this paper, we have proposed a novel approach called Optimal Closest Gateway Mechanism with load balancing technique for traffic engineering. Instead of only...
The more complex route experiment can be accomplished under the ordinary laboratory condition, which base on Routing and Remote Access Service, the computer with two or more Network Interface Cards and using the Sniffer Pro to analyze experimental results. How to prepare, operate, consummate and develop the experiment are discussed.
As IP telephony becomes a critical part of the enterprise network infrastructure, there is an increasing need for tools to help manage VoIP systems. In this paper, we introduce DA VINCI, a tool to manage VoIP call routing - the core of VoIP configurations that determines how calls are routed inside the enterprise or between the enterprise and external networks. We first establish the complexity involved...
Dynamic topologies and constrained recourses are two main characters of satellite networks. These characters require a specialized and efficient routing algorithm. In this paper, a QoS routing algorithm based on PEC multi objective optimization method is proposed to find paths that satisfy all user QoS requirements efficiently. A new routing scheme is also developed to reduce the computing load in...
In the Internet, nodes are identified using IP addresses that depend on their topological location. IPv4/IPv6 translation technology involves address mapping between IPv6 and IPv4 nodes and the methods used to translate protocols, where nodes are in their respective IP version of network. A detailed study is made on the IPv6 addressing architecture, various IPv6 configuring mechanisms and obtaining...
The cognitive radio (CR) technology was proposed as a solution for the lack of wireless resources in an environment with a rapidly growing number of users. The CR advances the dynamic utilization of the licensed users' unused spectrum channels by secondary users. The paper looks into large CR networks by proposing two improved variants of IPSAG (IP Spectrum Aware Geographic routing algorithm). The...
The emergency call service is to forward the emergency call originated from subscribers in an emergency situation to the nearest PSAP (Public Safety Answering Point) based on their location. However, it is relatively difficult to measure an accurate location of subscribers of the internet telephone based on the IP address. Therefore, the paper introduces methods and implemented examples in the KT...
Parallel transmission is one of the popular techniques to realize huge bandwidth between two network nodes. However, in parallel transmission, many packet order inversions will be occurred when the delay difference among the routes is large, and TCP throughput will be drastically decreased under such a circumstance. In this paper, a TCP over SCTP (Stream Control Transmission Protocol) parallel transmission...
A new algorithm named minimum blocking probability and cost (MBPC) is proposed to select a telephony gateway to complete a given ongoing call in order to achieve minimum blocking probability for packet routing from Internet Protocol to PSTN networks. This algorithm is simpler than any other existing one. The model is validated through simulation. In fact, this work can be applied to getting end-to-end...
It is difficult to promote the use of existing methods of DDoS attack source trace-back. Source IP address forgery is an important technology that DDoS attackers commonly use. Combined with the characteristics of the datagram and the traditional virtual circuit, orientable complete path (OCP) is put forward. OCP can be used to solve the problem of source IP address forgery, to track attack source,...
As Internet applications demand high flexibility and reliability, giving an end-user control over routing while not breaking the Internet has been attractive to both end-users and Internet Services Providers (ISPs). In this paper, we present RouteLite, a lightweight routing scheme that achieves "controlled flexibility", i.e., provide users with flexibility in selecting routes while only...
The communication between wireless ad-hoc networks and infrastructure-based networks is essential to extend Internet beyond its traditional scope, to remote inaccessible areas, making Web services in ad-hoc networks available anytime, anywhere. The mobile nodes in a wireless ad-hoc network must be able to detect available gateways and select one of them if they want to have Internet access. In this...
The NEMO basic support protocol is a home agent based technique (derived from mobile IPv6) that permits the mobility of a network of IPv6 devices to be supported through the use of a dedicated mobile router. This NEMO mobile router accepts connections from IPv6 nodes and transparently manages any IP mobility on their behalf, which means that as well as individual hosts, a NEMO mobile router can also...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.