The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Border Gateway Protocol (BGP) has been the de facto inter-domain routing protocol since it was introduced. Its destination-based routing nature, which is not able to choose a specific end-to-end AS-level route, might overload some popular peering (or inter-AS) links, while making some others underused. This could result in congestion and cause service disruption. To cope with the issue of destination-based...
Information-Centric Networking (ICN) introduces a paradigm shift from a host centric communication model for Future Internet architectures. It supports the retrieval of a particular content regardless of the physical location of the content. Emergency network in a disaster scenario or disruptive network presents a significant challenge to the ICN deployment. In this paper, we present a Content dIstribution...
Despite years of research, the Internet still lacks a routing protocol with guaranteed termination. As is well-known, decentralization of routing decisions among the Autonomous Systems (ASes) that comprise the Internet may result in permanent oscillations of the state of its routing protocol — the Border Gateway Protocol (BGP). Some permanent oscillations are made from routing loops — the propagation...
The provision of Internet connectivity for a vehicle anywhere anytime is an essential element to realize the vision of Connected Car. However, we observe that the current vehicular network technologies mainly focus on single-hop communications having limited coverage for the Internet connectivity. Accordingly, in order to support the always Internet connectivity, multi-hop routing that can cover wider...
Routing in Delay-/Disruption-Tolerant Networking (DTN) requires specific solutions as link impairments prevent the use of ordinary Internet algorithms, based on a timely dissemination of network topology information. Among DTN routing algorithms there is a dichotomy between opportunistic and deterministic (scheduled) solutions. The former are numerous and apply to terrestrial environments; CGR is...
Internet of Things (IoT) is widely recognized as a key enabling driver in environmental monitoring systems, thanks to its inherent capabilities to provide sensing and actuation functionalities on a distributed basis. At the same time, the majority of IoT applications are Information Centric by design: they target specific actions that are not related to any network node but can be provided by multiple...
The growing of the internet use is proportional with the growing of IP address needs, but the increasing of the IP use is not equal with the number of available IPv4. Then, IPv6 was developed as a solution to overcome the limited amount of IPv4 address. Readiness of various aspects ranging from infrastructure to a service provider is required to implement IPv6. In order to improve the quality of IPv6...
The current Border Gateway Protocol (BGP) operation in the Internet has a serious problem with regard to Mis-Origination, which is the hijacking or misconfiguration of network prefixes. We already have several Origin Validation (OV) techniques to mitigate the impact of Mis-Origination. an Internet Routing Registry (IRR) has been deployed only for a small number of users. More recently, RPKI (Resource...
We introduce a simple solution for the support of host mobility in the Internet called DIME (Dynamic Internet Mobility for End- Systems). DIME is based on dynamic address translation between the transport and network layers of end hosts, combined with a new out-of-band protocol that updates host-address bindings between communicating hosts opportunistically. It does not require modifications to the...
Named Data Networking (NDN) is one of the future Internet architectures and has recently attracted a great deal of attention. NDN adopts named routing and caches all content on routers en-route. It helps to accelerate content distribution and reduces content retrieval latency. However, it also brings a large number of redundant data in the network. In this paper, we propose an in-network caching strategy...
Internet eXchange Points (IXPs) serve as landmarks where many network service providers meet to obtain reciprocal connectivity. Some of them, especially the largest, offer route servers as a convenient technology to simplify the setup of a high number of bi-lateral peerings. Due to their potential to support a quick and easy interconnection among the networks of multiple providers, IXPs are becoming...
The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently standardized for routing in the constrained Internet of Things networks. Unfortunately, the RPL storing mode has been found restricted by storage limitations in the routers along the downward path. In fact, unreachable destinations problem may be easily encountered when a router fails, due to lack of memory, to store...
As the most successful cryptocurrency to date, Bitcoin constitutes a target of choice for attackers. While many attack vectors have already been uncovered, one important vector has been left out though: attacking the currency via the Internet routing infrastructure itself. Indeed, by manipulating routing advertisements (BGP hijacks) or by naturally intercepting traffic, Autonomous Systems (ASes) can...
The fast topology changes in vehicular ad hoc networks (VANETs) may be caused by fading of the wireless link as well as mobility of nodes. Link stability is often measured using mobility parameters (e.g, location, velocity, direction), and disregarding multipath fading of the signal. This may cause network performances degradation. In this paper, we have improved the relay selection scheme by integrating...
The Named Data Networking (NDN) and Content-Centric Networking (CCNx) architectures use a forwarding plane that requires large Forwarding Information Bases (FIB) listing the next hops to name prefixes and Pending Interest Tables (PIT) that maintain per-Interest forwarding state. We introduce CCN-RAMP (Routing to Anchors Matching Prefixes), a new approach to content-centric networking that substitutes...
The article presents an analysis of the problem of correct network interaction, based on BGP routing protocol. It analyzes the main attacks on information systems, due to the use of this protocol. Scenario of typical attack is presented. Basic measures to prevent information security threats when using the BGP protocol are offered.
Delay-tolerant Network (DTN) is a computer network architecture that operates effectively over an extreme distance and communicates with heterogeneous networks that may affect the continuous network connectivity. DTN is particularly useful for the areas in which there are no direct connection (either physical or wireless) between source and destination over a long distance, as it can overcome the...
Named Data Networking (NDN) ambitions the rank of Future Internet Architecture in uniquely addressing content items by their name. In NDN, routers forward Interests for content after finding Longest-Prefix Matches (LPM) of content names in their Forwarding Information Base (FIB). However, the scalability of this structure is challenged by the huge global Internet namespace. In this paper, we propose...
The way in which addressing and forwarding are implemented in the Internet constitutes one of its biggest privacy and security challenges. The fact that source addresses in Internet datagrams cannot be trusted makes the IP Internet inherently vulnerable to DoS and DDoS attacks. The Internet forwarding plane is open to attacks to the privacy of datagram sources, because source addresses in Internet...
In this paper, we propose an improved MANET gateway selection scheme suitable for disaster recovery applications. Having an infrastructure less and decentralize features, MANET is well suited to bring the network back that has been collapse after a disaster. In this paper, we focus on improving throughput performance of MANET by designing a better gateway selection scheme. The key idea is to eliminate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.