The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ad-Hoc and Delay-Tolerant Networks (AHDTNs) can be very useful in environments where more traditional networking technologies fail. Determining the practical effectiveness of AHDTNs can however be challenging. We review design considerations and practical experience with a novel mechanism for monitoring and analyzing the performance of AHDTNs. This new mechanism, AllNet Trace, somewhat resembles a...
Multipath TCP is a recent TCP extension that enables the utilization of different paths for a single connection. This provides various benefits including bandwidth aggregation and fast handovers on mobiles. A Multipath TCP connection starts with a single TCP connection called subflow and other subflows are added later to increase bandwidth or support failover. One drawback of Multipath TCP is that...
Network function virtualization (NFV) is a concept aiming to achieve telecom grade cloud ecosystem for new generation networks focusing on Capital and Operational expenditure (CAPEX and OPEX) savings. Keeping at least the same performances is one of the main requirements of the applications when being virtualized. This work presents a performance impact of Open Virtual Switch (OVS) user-space forwarding...
In this work, we have proposed a novel filtering approach based on empirical mode decomposition (EMD) and tunable-Q wavelet transform (TQWT) for the detection of epileptic seizure electroencephalogram (EEG) signals, which is termed as EMD-TQWT method. In this EMD-TQWT method, the intrinsic mode functions (IMFs) obtained from EEG signals using EMD method are considered as a set of amplitude modulated...
Network firewall rules are usually written by administrators or automated intrusion detection systems and often contain inconsistencies. Therefore, it is fundamental to ensure that only an absolutely correct configuration is active. In this paper, we design an open source conflict resolution framework (C application and Linux firewall kernel module on top of netfilter) that can be used as a constant...
A network of namespaces (NoN) is a way to connect network namespaces defined on different hosts so that they appear to be interconnected on a (virtual) Local Area Network. A NoN protects the communications from malicious or accidental interception or intrusion originated by processes running in other NoN-s. A NoN could be defined using VLANs, veth, kernel bridge definitions, etc. It would be a daunting...
Existing traffic replay methods are mainly aim to generate a large number of network traffic per unit time, which neglect the time's authenticity of replay traffic. In order to generate the network traffic which is exactly the same as the real traffic in the target network, including packet's numbers, payloads, interactive orders and time series, this paper proposes a traffic replay method based on...
The high compression efficiency that is provided by the high efficiency video coding (HEVC) standard comes at the cost of a significant increase of the computational load at the decoder. Such an increased burden is a limiting factor to accomplish real-time decoding, specially for high definition video sequences (e.g., Ultra HD 4K). In this scenario, a highly parallel HEVC decoder for the state-of-the-art...
The original Internet architecture lacked the concept of a flow, and considered each traffic as a set of packets. In this short paper, we rethink this concept inside middlebox-based platform and handle each traffic as a whole block instead of packets. We design a whole system where each input packet matching some criteria is placed in a specific structure which is shared between all processing modules...
Container technology has become popular in HPC applications because it offers easy customization and quick execution. However, container technology does not allow kernel-level optimization. It does not allow changing a kernel as well as loading/unloading a kernel module, thus it prevents the extraction of full performance on a target machine. In addition, container technology is designed for multi-tenancy...
Recently, the indoor positioning system (IPS) based on received signal strength (RSS) has received great attention in both industry and academic fields due to the ubiquity of wireless local area networks (WLAN). In general, Wi-Fi signal is suffering from two major limitations: first, the signal suffers from variation overtime. Secondly, the signal distribution recording on some devices can be more...
Internet addiction is a serious social problem nowadays. People with internet addiction usually spend much time on line, which there is no effectively technical way to evaluate. We propose a time-online evaluating method based on net log. The method gathers adjacent timestamps of every account's network log into a cluster, which can be seen as a time period. The sum of all periods is the account's...
In modern networks, there exist different applications which generate various different types of network traffic. In order to improve the performance of network management, it is important to identify and classify the internet traffic. The machine learning (ML) technique based on per-flow statistics has been widely used in traffic classification. Different from traditional classification methods,...
We present an innovative method for detecting interest points (IPs) in grayscale and color images. It is based on the use of angular signatures (ASs), produced by spinning, at each pixel in the image, an "x-tapered, y-derivative, half-Gaussian kernel" in discrete angular steps. By exploiting the AS(s) produced at each pixel, it automatically "classifies" the pixel as being an IP...
This paper presents an application of Internet Protocol Options for enhancing self-authenticated feature to the Internet Protocol. The options consist of Keyed-Hash Message Authentication Code and timestamp. In the network access control system, local network devices needing to access protected networks have to attach the options to packet header before sending to destination through a network access...
Tools for C/C++ based-hardware development have grown in popularity in recent years. However, the impact of these tools has been limited by their lack of support for integration with vendor IP, external memories, and communication peripherals. In this paper we introduce Tinker, an open-source Board Support Package generator for Altera's OpenCL Compiler. Board Support Packages define memory, communication,...
In recent years, the Internet Protocol (IP) has become a common basis for communication in several automation domains. For smart grids, it is even more beneficial because it brings a unification aspect into a field characterized by a variety of heterogeneous communication protocols which are in use today for various functions and services inside a smart grid. Besides, IP offers a convenient approach...
Networking has become an essential factor in daily life and activities where the major problem in network security is the safety of the transfer information. The infrastructure for the networking is the TCP/IP suite, and the address resolution protocol is the core part of the standard which maps the logical address into a physical address. Address resolution protocol is defined as a stateless protocol...
This work shows that behavioral IPs (BIPs) are often over-designed when used in heterogenous Multi-Procesosr SoCs (MPSoCs) mainly because they are designed and optimized separately. When instantiated in an MPSoC, these IPs often haven to wait for data from the master and also wait to gain access to the bus to return the results. Behavioral IPs have the advantage over traditional RTL-based IPs that...
The next generation, 5G wireless access, is going to support a wide range of new applications and use cases, with the capabilities including very high achievable data rate, very low latency, ultra-high reliability and the possibility to handle extreme device densities. To avoid the costly deployment, operation and maintenance of future mobile network, Radio Access Network (RAN) virtualization or Cloud...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.