The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, 360-degree video has become an important component of virtual reality (VR) technology. Unfortunately, this state-of-the-art content type requires a huge bandwidth from a server to a client. In order to solve the bandwidth problem in streaming VR videos over HTTP/2, a dynamic adaptation method is crucial. In this paper, we propose a novel adaptive streaming method based on tiled streaming...
Distributed Denial of Service (DDoS) is a widely employed attacking scheme over network that interrupts services by creating network congestion, draining server resources, or disabling normal functions of network components. An attacker launches the DDoS attack from a large number of compromised while geographically distributed devices by sending low rate seemly legitimate traffic that disturbs server's...
The rapid growth of data transmission over digital networks, especially of delay sensitive traffic, has meant that research into improved network control and management has increased. Network domain boundaries are key points in the network where service provisioning, flow control, and management occur between organizations. This paper presents a flexible automated approach that utilizes Software Defined...
Many Internet of Things (IoT) applications benefit greatly from low-power long-range connectivity. A promising technology to achieve the low-power and long-range requirements is seen in LoRaWAN, a media access control (MAC) protocol maintained by the LoRa Alliance and leveraging Semtech's patented LoRa radio modulation technology. LoRaWAN provides three different device classes (A, B and C), which...
In the set disjointess problem, we have k players, each with a private input X^i ⊆ [n], and the goal is for the players to determine whether or not their sets have a global intersection. The players communicate over a shared blackboard, and we charge them for each bit that they write on the board.We study the trade-off between the number of interaction rounds we allow the players, and the...
There is a strong focus on the use of Web Real-Time Communication (WebRTC) for many-to-many video conferencing, while the IETF working group has left the signalling issue on the application layer. The main aim of this paper is to create a novel scalable WebRTC signalling mechanism called WebNSM for many-to-many (bi-directional) video conferencing. WebNSM was designed for unlimited users over the mesh...
Network performance is one of the most important entities in today’s long-distance networks. TCP congestion control mechanisms play an important role in these networks. Most of the current TCP congestion control mechanisms which are also known as TCP variants, detect congestion and slow down the packets transmission to avoid further congestion in the network. In this paper, three classes...
The nature of Internet traffic has changed dramatically within the last few years, where a large volume of traffic is originated from mobile applications (known as apps), web based multimedia streaming, computation offloading like cloud computing and Internet of Things (IoT) etc. These types applications generate multiple parallel short lived end-to-end connections. However, the three major requirements...
Due to improvements in defensive systems, network threats are becoming increasingly sophisticated and complex as cybercriminals are using various methods to cloak their actions. This, among others, includes the application of network steganography e.g. to hide the communication between an infected host and a malicious control server by embedding commands into innocent-looking traffic. Currently, a...
To cope with the varying delay and bandwidth requirements of today’s mobile applications, mobile wireless networks can profit from classifying and predicting mobile application traffic. State-of-the-art traffic classification approaches have various disadvantages: port-based classification methods can be circumvented by choosing non-standard ports, protocol fingerprinting can be confused...
Internet-of-Things (IoT) is emerging as one of the popular technologies influencing every aspect of human life. The IoT devices equipped with sensors are changing every domain of the world to become smarter. In particular, the majorly benifited service sectors are agriculture, industries, healthcare, control & automation, retail & logistics, and power & energy. The data generated...
EtherCAT is one of the real-time Ethernet protocols widely employed in industrial controls. However, its wireless extension is not straightforward due to the unique on-the-fly bus access method based on summation-frame. This paper explores the possibilities of interconnecting EtherCAT with wireless standards such as IEEE 802.11 and 802.15.4. The gateway design is presented and event-driven interconnection...
Quality of Service (QoS) in networking is a way of managing the network resources effectively. QoS has been widely used in traditional network and can also be implemented in Software Defined Network (SDN). Software Defined Network is a new network paradigm that decouples the control plane from the data plane in the network and thus create a network that is scalable, dynamic and easily manageable....
Future tactical communications involves high data rate best effort traffic working alongside real-time traffic for time-critical applications with hard deadlines. Unavailable bandwidth and/or untimely responses may lead to undesired or even catastrophic outcomes. Ethernet-based communication systems are one of the major tactical network standards due to the higher bandwidth, better utilization, and...
This paper describes the Web Real-Time Communication (WebRTC) technology and the implementation of its clients and server. The main aim is to design and implement WebRTC video conferencing between browsers in real implementation using Chrome and (Wired & WiFi) of LAN & WAN networks. Also, an evaluation of CPU performance, bandwidth consumption and Quality of Experience (QoE) was achieved....
Three-dimensional (3D)-stacking technology, which enables the integration of DRAM and logic dies, offers high bandwidth and low energy consumption. This technology also empowers new memory designs for executing tasks not traditionally associated with memories. A practical 3D-stacked memory is Hybrid Memory Cube (HMC), which provides significant access bandwidth and low power consumption in a small...
Big Data concerns processing of large volumes of digital data with high velocity and variety. Big Data technologies allow the analysis of data in real time, which is critical for various eScience applications. In order to meet the growing demand of Big Data applications, the infrastructures must be flexible enough to adapt to the characteristics of the applications. Most of the solutions presented...
The LPWAN (Low Power Wide Area Network) networks are the evolution of wireless sensor networks directed to the IoT (Internet of Things) concept, which entails sensor connectivity to the Internet. This paper presents a performance evaluation of the LoRa wireless networks. LoRa technology represents a possible solution to the problems of the IoT (Internet of Things) concept. The used frequency bands...
SDN technology has been applied to a range of different networks, ranging from Ethernet services to large cloud environments. More recently, interest has turned towards extending programmability of Optical Transport Networks (OTN). In the SDN architecture, SBIs are used to communicate between the SDN controller and the switches or routers in the network. In this paper, we deploy OpenFlow and NETCONF...
Software Defined Networking (SDN) is rapidly gaining acceptance and use in terrestrial networks but little research has been done to apply it to aerial networks. This paper describes an investigation into five open-source controllers using a specific set of criteria based on the characteristics of these networks. A preliminary qualitative investigation compares the controllers based on their state...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.