The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network Address Translation has often been described as an aberration in the evolution of the Internet, and one that will be removed with the completion of the transition of IPv6. This is an opinion in support of NATs, arguing that they are an important step in the evolution of the Internet and may well play a lasting role in this environment.
This paper proposes a technique to split a traffic in a software-defined network using a meter table. In general case, a different differentiated services code point (DSCP) number in a packet header is used to classify network traffic and provide quality of service (QoS). The traffic splitting technique uses a DSCP number as a split parameter. Once a packet exceeds a predefined traffic rate, the DSCP...
This paper evaluates switch-over time of a failure protection in a software-defined network (SDN). In the area of network protection, it is very necessary to overcome the link failure. This failure may cause the traffic interrupted and the packets are lost in the network. In this case the time of recovery of the failure should be as short as possible. In case of open shortest path first (OSPF) network,...
While the threats in Internet are still increasing and evolving (like intra multi-tenant data center attacks), protection and detection mechanisms are not fully accurate. Therefore, forensics is vital for recovering from an attack but also to identify the responsible entities. Therefore, this paper focuses on tracing back to the sources of an anomaly in the network. In this paper, we propose a method...
Handling link failures is the fundamental task of routing schemes. Routing protocols based on link state (e.g., OSPF) require a global state advertisement and re-computation when link failure happens, and will cause inevitable delivery failures. To improve the routing resilience without introducing significant extra overhead, we propose a new routing approach, Keep Forwarding (KF) to achieve k-link...
Network-on-chip (NoC) is emerging as an effective architecture which address the shortcomings of traditional bus-based System-on-chip (SoC). Since its better properties, such as the lower power consumption, smaller size and higher scalability, mesh is often regarded as an effective topology for NoC design. In this paper, we propose a double-layer sparse honeycomb topology as a terrific design option...
In System on Chip, buses and point to point links are used as a communication infrastructure between one IP to another, but these cannot provide efficient interconnect from performance point of view. So NoC architecture was proposed to provide communication in multiprocessor SoC and overcome the limitations. This paper has implemented a 5-port 32-bit and 64-bit router architecture using wormhole routing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.