The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Video is one of the most popular services in Internet. How to support large scale of streaming media transfer over the Internet has been studied in both academic communities and industry fields. VQM (Video Quality Monitoring) at the end point or in the network is necessary to improve customer's Quality of Experience (QoE). This paper first analyzes the requirements of VQM over the Internet. Then,...
The difficulties encountered in sequential decision-making problems under uncertainty are often linked to the large size of the state space. Exploiting the structure of the problem, for example by employing a factored representation, is usually an efficient approach but, in the case of partially observable Markov decision processes, the fact that some state variables may be visible has not been sufficiently...
Multiprotocol Label Switching (MPLS) is an Internet Engineering Task Force (IETF) specified framework that provides for the efficient designation, routing, forwarding and switching of traffic flows through the network. MPLS is a versatile solution to address the problems faced by present-day networks like speed, scalability, quality-of-service (QoS) management, and traffic engineering. MPLS carries...
An approach to detection of phishing hyperlinks using the rule based system formed by genetic algorithm is proposed, which can be utilized as a part of an enterprise solution to anti-phishing. A legitimate webpage owner can use this approach to search the web for suspicious hyperlinks. In this approach, genetic algorithm is used to evolve rules that are used to differentiate phishing link from legitimate...
Mobile IPv6 (MIPv6) is the current standard for end host mobility management in the Internet. In order to provide location management, MIPv6 operates in two different modes while the mobile node (MN) is away from its home. In the first mode, the MN incoming packets are tunneled to the MN current location via the home network. In the second mode, the traffic is exchanged directly between the MN and...
Wireless Sensor Networks (WSNs) have attracted significant research interest in recent years because of their suitability to a wide range of real world applications. The envisioned Internet Protocol (IP) support for WSNs requires interoperability with existing management solutions, like Simple Network Management Protocol (SNMP), in order to provide remote management functionality and assure the correct...
IP-based Wireless Sensor Networks (IP-based WSNs) combine IPv6 technology with WSNs to create a global sensor network infrastructure. However, wireless radio access and Internet connectivity make end-to-end security urgently needed by security critical WSN applications. Transport Layer Security (TLS) is considered as a suitable solution to ensure such security. However, the certificate-based mechanism...
The popularity of wireless communication application is increased specially in the ISM band which provides services for free. Bluetooth is one of the technology in unlicensed band which becomes very useful now a days in many short rage application because of its advantages like low power consumption, low cost, low size, universal applicability, multiple simultaneous link. This paper is on the one...
To improve the efficiency and the topology mismatch problem of P2P overlay network, a new method of topology construction, CLSP2P, was introduced. The topology construction of CLSP2P not only consideration the physical location of nodes, but also consideration the semantic information of nodes: Nodes in CLSP2P were first organized as autonomous domain based on their physical location, then the nodes...
Radio Frequency Identification (RFID) is considered as an emerging technology for the Future Internet called the Internet of Things (IOT). It allows things and objects that embed RFID tags to be identified and to exchange information with each other. However, this new Internet is facing to some problems which are mainly related to the security of information exchange and the integration of RFID tags...
Even though Intrusion Detection Systems (IDS) are in wide-spread use, the question of how to efficiently initiate responses to detected attacks has been discussed far less often, especially in highly dynamic scenarios such as tactical MANETs. Despite being flexible and robust in their ability to self-organize, these MANETS are distinctly more susceptible to attacks than their wired counterparts. Especially...
High definition video over IP based networks (IPTV) has become a mainstay in today's consumer environment. In most applications, encoders conforming to the H.264/AVC standard are used. But even within one standard, often a wide range of coding tools are available that can deliver a vastly different visual quality. Therefore we evaluate in this contribution different coding technologies, using different...
This paper describes a new botnet that we have discovered at the beginning of December 2009. Our Net Flow-based network monitoring system reported an increasing amount of Telnet scanning probes. Tracing back to a source we have identified world wide infected DSL modems and home routers. Nowadays, various vendors use Linux in this kind of devices. A further investigation has shown that most of deployed...
Monitoring large chunks of unused IP address space yields interesting observations and useful results. However, the volume and diversity of the collected data makes the extraction of information a challenging task. Additionally, the maintenance of the monitoring infrastructure is another demanding and time-consuming effort. To overcome these problems, we present several visualization techniques that...
One of main feature of next generation of mobile networks is an integration of existing cellular systems with other wireless access technologies. In order to realize a seamless vertical handover (inter-RAT handover) among these different access technologies, a multi-interfaced mobile station is expected to communicate simultaneously on various network interfaces (i.e. to be multihomed) to achieve...
P2P SIP (peer to peer session initiation protocol) systems have emerged as a new trend in multimedia realm due to their abilities to overcome the shortcomings of conventional SIP systems. Most of P2P SIP systems were implemented using Chord, a Distributed Hash Table (DHT) based routing algorithm which can provide scalability and reliability. Previous studies on P2P SIP systems did not address node...
Received video quality is dependent on the available link rate and the packet loss rate, which are inter-related in a busy network link. Even low packet loss ratios (PLRs) can significantly reduce the video quality. In this paper, a packet level parity FEC is applied to the video stream in order to reduce the video PLR. A constant gross data rate is assumed, such that adding a FEC leads to a decrease...
In this article, we are interested in improving the handover quality of Host Identity Protocol (HIP) in the case of micro mobility by (i) proposing the Local Rendezvous Server architecture as a first attempt to minimize the handover delay in the mobility process, (ii) introducing an adaptive early update mechanism to improve the handover quality during mobility by introducing early HIP (eHIP) and...
The most common use of formal verification methods and tools so far has been in identifying whether livelock and/or deadlock situations can occur during protocol execution, process, or system operation. In this work we aim to show that an additional equally important and useful application of formal verification tools can be in protocol design and protocol selection in terms of performance related...
TCP's downlink performance during FMIPv6-enabled IEEE802.11g handoff is examined. The use of a user-initiated Handoff Notification, sent prior to handoff, is proposed. Therefore, the correspondent node is aware of the handoff-induced disruption, hence avoiding dropping the congestion window size and triggering Fast Retransmission mechanisms. During handoff, it continues to send data packets which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.