The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the emergence of Radio Frequency Identification (RFID) technology and Electronic Product Code (EPC) standard, physical objects attached with the RFID tags can be uniquely identified and traced on the global trading network. Under the new paradigm of the Internet of Things (IoT), RFID becomes an importantly enabling technology. However, there is a limitation in object tracking in the Internet:...
Although the Internet achieved tremendous success in the recent decades, several limitations have emerged from recent technical advancement and challenging requirements of diverse applications. For overcoming these limitations, the future Internet can be redesigned in the “clean slate” basis. This paper proposes a novel architecture that considers both horizontal and vertical separations called, Domain-Insulated...
Community networks are an emerging and successful model for the Future Internet across Europe and far beyond. The CONFINE project complements existing FIRE (Future Internet Research and Experimentation) infrastructures by establishing Community-Lab, a new facility for experimentally-driven research built on the federation of existing community IP networks constituted by more than 20,000 nodes and...
We propose an all-optical networking solution for an Internet core network based on the notion of multipoint-to-multipoint lightpaths that, for short, we call multipaths. The multipath MAC protocol concentrates the traffic of a cluster of source nodes on a wavelength channel and multicasts this traffic to a cluster of destination nodes. The proposed network can be built using existing components and...
Smart City concept and applications domains are taking a prominent position in nowadays innovation trends. Future Internet and ICT in general are considering the Smart City as the key concept for the future technological developments. In particular, Wireless Sensor Networks (WSN) and Machine to Machine (M2M) communications are some of the basic enablers for fulfilling the Smart City concept requirements...
Route-vector protocols, such as the Border Gateway Protocol (BGP), have nodes elect and exchange routes in order to discover paths over which to send traffic. We ask the following: What is the minimum number of links whose failure prevents a route-vector protocol from finding such paths? The answer is not obvious because routing policies prohibit some paths from carrying traffic and because, on top...
The availability of end devices of peer-to-peer storage and backup systems has been shown critical for usability and for system reliability in practice. This has led to the adoption of hybrid architectures composed of both peers and servers. Such architectures mask the instability of peers thus approaching the performances of client-server systems while providing scalability at a low cost. In this...
6LoWPAN opens a great opportunity for wireless sensor networks (WSNs) to be operated from the Internet. However, 6LoWPAN requires a gateway in order to make the use of IPv6 feasible inside the WSN. In this paper, a gateway is designed and constructed to interconnect 6LoWPAN wireless sensor networks with IPv6 clients, enabling them to receive sensor nodes readings or send commands to the 6LoWPAN WSN...
To support mobility, multihoming, routing scalability, and security, there are a lot of proposals based on ID/Locator split approach not only for the current Internet but also for the future Internet. However, none of them meet the requirements for practical operation such as (1) support of heterogeneity of network layer protocols, (2) scalability of ID/Locator mapping system, (3) independence of...
Most ISPs rely on their upstream providers in achieving global reachability, thus they tend to make backup upstream links for the purpose of improving their own resilience. Yet, the Internet AS topology does not entail as much redundancy as it is widely thought, e.g., in our observation, 23.6% of all ASes only have single provider. Moreover, even though an AS has multiple upstream links, if all its...
This paper explores the performance benefits of an information-centric network which capitalizes on overlapping multiaccess for content distribution. We present our architecture which uses an enhanced BitTorrent protocol, supports multiple network accesses simultaneously, and localizes information retrieval. We employ simulation to show the gains, on one hand, in individual node performance and, and...
This paper proposes a home gateway architecture which integrates P2P file sharing and UPnP AV services on the OSGi framework. This design allows UPnP devices to access P2P media content from the Internet. Prototype demonstration presents several friendly UPnP-style scenarios for P2P AV entertainment in a home network environment.
With the explosion of broadband penetration and residential gateways, users' interest in offering user generated content and services from their own home has become more and more pronounced. Home Area Networks (HANs) with rich user content are therefore emerging at the “edge” of the telecom and Internet service providers' networks. Home consumer devices such as Home Gateways (HGs) and femto base stations...
With the advancement of Internet technologies and the widespread use of mobile devices, the number of users in conferencing services is increasing quickly. A P2PSIP conferencing system and an IP Multimedia Subsystem (IMS) conferencing system have been designed to provide conferencing services. The IMS conferencing system was developed to adapt to a server-based centralized system, while the P2P network,...
In recent years, along with the increasing popularity of multi-hop wireless networks, there has been a growing demand in the coupling of these networks to external ones such as the Internet. As traffic destined for external networks increases, special attention is required not only in gateway selection, but also in optimized routing and scheduling in order to maximize the network performance. In this...
In this paper, we propose a new intersection-based geographical routing protocol, called delay tolerant routing protocol (DTRP) that adapts to the changes in the local topology within city environments. DTRP is based on an effective selection of road intersections through which a packet must pass to reach the gateway to the Internet. The selection, in such delay tolerant VANETs, is made in a way that...
The rapid development of wireless and the advent of fixed mobile convergence have brought deployment of small wireless environment such as femtocell, which can connect Internet or network easily at home and office. Users must be authenticated from the Authentication, Authorization and Accounting (AAA) server to use the Internet or network at home and office. As diameter-based AAA uses TCP/SCTP at...
Reliable and secure content distribution in a disruptive environment is a critical challenge due to high mobile and lossy channels. Traditional IP networking and wireless protocols tend to perform poorly. In this paper, we propose Content Centric Networking (CCN) for emergency wireless ad hoc environments. CCN is a novel communication architecture capable to access and retrieve content by name. This...
Multiagent plays an important role in various applications. As the Internet becomes prerequisite of human life, large scale Multiagent systems on the Internet become more and more important. However, large scale multiagent systems encounter many big issues such as scalability and inter-operability. This paper presents a different approach of large scale multiagent system based on semantic P2P Network-Virtual...
The IETF's Next Steps in Signaling (NSIS) framework provides an up-to-date signaling protocol suite that can be used to dynamically install, maintain, and manipulate state in network nodes. In its two-layered architecture, the General Internet Signaling Transport (GIST) protocol is responsible for the transport and routing of signaling messages. The strong presence of Network Address Translation (NAT)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.