Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The current Internet architecture follows a hostcentric communication model, intended for machine to machine connection and message passing. Modern Internet users are mainly interested in accessing information by name, irrespective of physical location. Information centric networking (ICN) was developed to rethink Internet foundations. Innetwork caching is one of the main features of ICN. Studying...
Many BitTorrent clients are using these networks as a video-on-demand service, taking advantage of the popularity and the enormity of the collection of media available. However, it is a common sense that transforming the swarms into an on-demand media service causes serious damage to the overall network performance, given that streamer clients modify the method of downloading determined in the protocol...
Despite years of research, the Internet still lacks a routing protocol with guaranteed termination. As is well-known, decentralization of routing decisions among the Autonomous Systems (ASes) that comprise the Internet may result in permanent oscillations of the state of its routing protocol — the Border Gateway Protocol (BGP). Some permanent oscillations are made from routing loops — the propagation...
Information Centric Networking (ICN) is future Internet architecture for distribution of the contents which are location independent and are cached in the ICN nodes, making them efficient for distribution and retrieval. ICN architecture is based on new protocols for unique naming and transferring of data objects over the network. Its focus is on delivery of data objects to the end user rather than...
Internet of Things (IoT) is widely recognized as a key enabling driver in environmental monitoring systems, thanks to its inherent capabilities to provide sensing and actuation functionalities on a distributed basis. At the same time, the majority of IoT applications are Information Centric by design: they target specific actions that are not related to any network node but can be provided by multiple...
To address the challenges raised by the Internet usage evolution over the last years, the Content-Centric Networking (CCN) has been proposed. One key feature provided by CCN to improve the efficiency of content delivery is the in-network caching, which has major impact on the system performance. In order to improve caching effectiveness in such systems, studying the functioning of CCN in-network storage...
Recently, digital content sharing over peer-to-peer (P2P) network has been attracted. We proposed some methods that divide each content item into small blocks and allocates them on hybrid P2P network, and relocate and replicate the blocks for efficient content retrieval. This paper improves the method by avoiding an excessive content dispersion and removing unattractive content items frequently to...
Internet Protocol version 6 (IPv6) over Low power Wireless Personal Area Networks (6LoWPAN) is extensively used in wireless sensor networks (WSNs) due to its ability to transmit IPv6 packet with low bandwidth and limited resources. 6LoWPAN has several operations in each layer. Most existing security challenges are focused on the network layer, which is represented by its routing protocol for low-power...
Compared with the traditional power grid, Energy Internet is motivated by the concept of intelligent energy sharing and coordination, achieving higher penetration of renewable energy and economic saving. In this paper, we propose a new framework for the time-slotted Peer-to-Peer (P2P) energy sharing and coordination in Energy Internet, which aims to achieve flexible and efficient distributed energy...
Internet mobile users concern more and more about their privacy nowadays as both researches and real world incidents show leaking of communication and location privacy can lead to serious consequence, and many researches have been done to anonymize individual user from aggregated location data. However just the communication itself between mobile user and their peers or website could leak considerable...
The Internet can be considered as the most important infrastructure for modern society and businesses. A loss of Internet connectivity has strong negative financial impacts for businesses and economies. Therefore, assessing Internet connectivity, in particular beyond their own premises and area of direct control, is of growing importance in the face of potential failures, accidents, and malicious...
Critical networked services established between service providers and customers are expected to operate respecting Service Level Agreements (SLAs). An interesting possibility to monitor such SLAs is using active measurement mechanisms. However, these mechanisms are expensive in terms of network devices resource consumption and also increase the network load because of the injected traffic. In addition,...
As the most successful cryptocurrency to date, Bitcoin constitutes a target of choice for attackers. While many attack vectors have already been uncovered, one important vector has been left out though: attacking the currency via the Internet routing infrastructure itself. Indeed, by manipulating routing advertisements (BGP hijacks) or by naturally intercepting traffic, Autonomous Systems (ASes) can...
Building the Internet of Things requires deploying a huge number of objects with full or limited connectivity to the Internet. Given that these objects are exposed to attackers and generally not secured-by-design, it is essential to be able to update them, to patch their vulnerabilities and to prevent hackers from enrolling them into botnets. Ideally, the update infrastructure should implement the...
The WTFast's Gamers Private Network (GPN®) is a client/server solution that makes online games faster. GPN® connects online video-game players with a common game service across a wide-area network. Online games are interactive competitions by individual players who compete in a virtual environment. Response time, latency and its predictability are keys to GPn® success and runs against the vast complexity...
Blockchain is attracting more and more attentions from many kinds of fields, such as finance, industry, and theory researchers. Rather than viewing blockchain as a novel technology, we should think it as an innovation for managing digital society, which provides fundamental principles to support democratically distributed applications. Based on the design and application of the Energy Internet, this...
This paper proposed a AS relationship recognition algorithm based on the forwarding degree. Firstly, the precision of AS path set which is the input of algorithm was proved by multipoint fusion method and anomaly filter method. Secondly, forwarding degree which reprent the ASs' ability of service delivery was analysed. Lastly, AS relationship was recognized based on the forwarding degree. The experimental...
Advances in computer science prompt the creation of new economic models. One of them in urban life is Sharing Economy. This new economic model receives high attentions and has been applied to a wide range of fields in recent years. We argue that sharing economy, and its applications, may be taken as a way for researchers to understand human behavior, and thus this paper targets a growing issue on...
Despite many Internet of Things (IoT) Infrastructures having been implemented in recent years, none of them is truly prepared for a global deployment, where failure tolerance and scalability are an essential requirement. This article presents an alternative concept for IoT Infrastructures, which focuses on enhancing the traditional centralized architecture, usually operated by a single entity, into...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.