The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Border Gateway Protocol (BGP) is an Internet routing protocol responsible for exchanging network reachability information between Autonomous Systems (ASes). Monitoring and mining BGP traffic are important aspects to understand and improve the stability of the Internet. However, identifying the characteristics of BGP traffic is much harder than it seems at a first glance where BGP traffic has been...
Border Gateway Protocol (BGP) has been the de facto inter-domain routing protocol since it was introduced. Its destination-based routing nature, which is not able to choose a specific end-to-end AS-level route, might overload some popular peering (or inter-AS) links, while making some others underused. This could result in congestion and cause service disruption. To cope with the issue of destination-based...
Information-Centric Networking (ICN) introduces a paradigm shift from a host centric communication model for Future Internet architectures. It supports the retrieval of a particular content regardless of the physical location of the content. Emergency network in a disaster scenario or disruptive network presents a significant challenge to the ICN deployment. In this paper, we present a Content dIstribution...
Smart Grid uses the TCP/IP protocol stack for wide area communications. To ensure low latency end to end communications, the FREEDM project chooses UDP datagram as the preferred technique. However, when many devices are using the same network resources, congestion can happen on intermediate routers. Unlike TCP, which uses ECN as an approach for congestion control, UDP does not have a similar implementation...
Despite years of research, the Internet still lacks a routing protocol with guaranteed termination. As is well-known, decentralization of routing decisions among the Autonomous Systems (ASes) that comprise the Internet may result in permanent oscillations of the state of its routing protocol — the Border Gateway Protocol (BGP). Some permanent oscillations are made from routing loops — the propagation...
The provision of Internet connectivity for a vehicle anywhere anytime is an essential element to realize the vision of Connected Car. However, we observe that the current vehicular network technologies mainly focus on single-hop communications having limited coverage for the Internet connectivity. Accordingly, in order to support the always Internet connectivity, multi-hop routing that can cover wider...
Routing in Delay-/Disruption-Tolerant Networking (DTN) requires specific solutions as link impairments prevent the use of ordinary Internet algorithms, based on a timely dissemination of network topology information. Among DTN routing algorithms there is a dichotomy between opportunistic and deterministic (scheduled) solutions. The former are numerous and apply to terrestrial environments; CGR is...
Internet of Things (IoT) is widely recognized as a key enabling driver in environmental monitoring systems, thanks to its inherent capabilities to provide sensing and actuation functionalities on a distributed basis. At the same time, the majority of IoT applications are Information Centric by design: they target specific actions that are not related to any network node but can be provided by multiple...
The growing of the internet use is proportional with the growing of IP address needs, but the increasing of the IP use is not equal with the number of available IPv4. Then, IPv6 was developed as a solution to overcome the limited amount of IPv4 address. Readiness of various aspects ranging from infrastructure to a service provider is required to implement IPv6. In order to improve the quality of IPv6...
The current Border Gateway Protocol (BGP) operation in the Internet has a serious problem with regard to Mis-Origination, which is the hijacking or misconfiguration of network prefixes. We already have several Origin Validation (OV) techniques to mitigate the impact of Mis-Origination. an Internet Routing Registry (IRR) has been deployed only for a small number of users. More recently, RPKI (Resource...
We introduce a simple solution for the support of host mobility in the Internet called DIME (Dynamic Internet Mobility for End- Systems). DIME is based on dynamic address translation between the transport and network layers of end hosts, combined with a new out-of-band protocol that updates host-address bindings between communicating hosts opportunistically. It does not require modifications to the...
Named Data Networking (NDN) is one of the future Internet architectures and has recently attracted a great deal of attention. NDN adopts named routing and caches all content on routers en-route. It helps to accelerate content distribution and reduces content retrieval latency. However, it also brings a large number of redundant data in the network. In this paper, we propose an in-network caching strategy...
Information-Centric Networking (ICN) is a recent paradigm that claims to mitigate some limitations of the current IP-based Internet architecture. The centerpiece of ICN is named and addressable content, rather than hosts or interfaces. Content-Centric Networking (CCN) is a prominent ICN instance that shares the fundamental architectural design with its equally popular academic sibling Named- Data...
In the recent years it has become increasingly evident that the current end-to-end host-centric communication paradigm will not be capable of meeting the ongoing demand for massive data rates and ultra-low latency. With the advent of fifth generation of cellular architecture (5G) to support these requirements on the wireless edge of the network, the need for core network solutions to play a complementary...
In this paper, we propose an OpenFlow enabled Internet infrastructure, using virtual path slicing in an end-to-end path, so that any user connected to an OpenFlow network is dynamically allocated a corresponding right of way. This approach allows an interference-free path, from other traffic, between any two endpoints, on multiple autonomous systems, for a given application flow (e.g., WebHD Video...
Internet eXchange Points (IXPs) serve as landmarks where many network service providers meet to obtain reciprocal connectivity. Some of them, especially the largest, offer route servers as a convenient technology to simplify the setup of a high number of bi-lateral peerings. Due to their potential to support a quick and easy interconnection among the networks of multiple providers, IXPs are becoming...
The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently standardized for routing in the constrained Internet of Things networks. Unfortunately, the RPL storing mode has been found restricted by storage limitations in the routers along the downward path. In fact, unreachable destinations problem may be easily encountered when a router fails, due to lack of memory, to store...
Over the past several years, Software Defined Networking (SDN) has emerged as a new and promising paradigm for the management of computer networks. While we have seen many use-cases and deployments of SDN in data center networks, wide-area networks still heavily rely on legacy routing and traffic engineering technologies. Rapidly increasing traffic demands (mainly due to increasing usage of video...
As the most successful cryptocurrency to date, Bitcoin constitutes a target of choice for attackers. While many attack vectors have already been uncovered, one important vector has been left out though: attacking the currency via the Internet routing infrastructure itself. Indeed, by manipulating routing advertisements (BGP hijacks) or by naturally intercepting traffic, Autonomous Systems (ASes) can...
The fast topology changes in vehicular ad hoc networks (VANETs) may be caused by fading of the wireless link as well as mobility of nodes. Link stability is often measured using mobility parameters (e.g, location, velocity, direction), and disregarding multipath fading of the signal. This may cause network performances degradation. In this paper, we have improved the relay selection scheme by integrating...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.