The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Public IPv4 sharing with port restriction in IPv6 environment alleviates IPv4 address depletion problem and encourage IPv6 deployment. This paper elaborated some key technical points of the solution, as well as a reference implementation on Linux box. The final mock-up and test results indicate that the solution is inexpensive to implement, compatible with popular applications, and can provide ideal...
The following articles are dealt with: Network-based context-aware input method editor; Task scheduling in wireless sensor networks; FINLAN packet delivery proposal in a next generation Internet; Distributing service against BGP path inflation; UPnP extensions for public IPv4 sharing in IPv6 environment; No break of virtual network during live migration; Distributed simulation environment for the...
Public IPv4 sharing solutions with port restriction alleviate IPv4 address depletion problem and encourage IPv6 deployment. This paper proposes extensions to the Internet Gateway Device control standardized in the UPnP Forum to efficiently solve the port reservation failure problem in an IPv6 access network environment that adopts a public IPv4 sharing mechanism, i.e., a public IPv4 address is shared...
In order to guarantee continuous delivery of video streaming over best-effort (BE) forwarding network, some quality-of-service (QoS) strategies such as RSVP and DiffServ must be used to improve the transmission performance. However, these methods are too difficult to be employed in practical applications since their technical complexity. In this paper, we design and implement an efficient local bandwidth...
In this paper we present our real-world DYMO implementation, called EK-DYMOv6. EK-DYMOv6 is the first DYMO implementation trial with two features: (a) conforming to recent DYMO (DYMO-05) and PacketBB (PacketBB-01) drafts, and (b) running on the Linux in IPv6 environment. EK-DYMOv6 was implemented with two parts: (a) a kernel module with Net- filter hooks and (b) a user-space routing daemon. We introduce...
Today's Internet hosts are threatened by large-scale distributed denial-of-service (DDoS) attacks. The path identification (Pi) DDoS defense scheme has recently been proposed as a deterministic packet marking scheme that allows a DDoS victim to filter out attack packets on a per packet basis with high accuracy after only a few attack packets are received (Yaar , 2003). In this paper, we propose the...
More and more intrusion detection systems were developed, but most of these systems have very poor accuracy. To overcome this problem, a self-adaptive anomaly detection system was developed using fuzzy detection anomaly algorithm with negative selection of biology. The algorithm improves the accuracy of the detection method and produces a novel method to measure the deviation from the normal that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.