Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Most wireless networks are specified as layer 2 (L2), or data link protocol. Recently, IoT and big data processing have promoted the use of wireless sensor networks to connect and send data to data center applications using the Internet. To do so, the implementation of an IP stack on the wireless node, or the gateway of the IP and wireless L2 network, has been proposed. Both approaches are developed...
DNS provides a global-scale distributed lookup service to retrieve data of all types for a given name, be it IP addresses, service records, or cryptographic keys. This service has proven essential in today's operational Internet. Our experience with the design and development of Named Data Networking (NDN) suggests the need for a similar always-on lookup service. To fulfill this need we have designed...
In this paper, we propose a mechanism for autoconfiguration of name-bound virtual networks (NBVNs) for Internet of Things (IoT). Some IoT standardization groups have defined APIs for IoT device communications, in which they indicate the correspondent nodes and resources by names. However, current technologies for the construction of Virtual Networks (VNs) rely on VLANs, IP routing, and OpenFlow control,...
Domain Name System (DNS) is one of the most important services of the Internet since most communications normally begin with domain name resolutions provided by DNS. However, DNS has vulnerability against some kind of attacks such as DNS spoofing, DNS cache poisoning, and so on. DNSSEC is an security extension of DNS to provide secure name resolution services by using digital signature based on public...
In recent years, there is a rapid growth in the internet services which has increased incoming traffic in the network and also plays a vital role in increasing the size of the cluster server. The load balancing is a key technology to manage the traffic efficiently. In this paper, we propose an alternative load balancing architecture using OpenFlow switches which are connected to the controller. This...
In the view of converged fast-wired and fast-wireless networks (5G) with a transparent multi homed point of access to the Internet, new scenarios must be considered in the near future. In particular, this paper focuses on an Internet access leveraging simultaneously on different technologies such as ADSL, cable, WiFi, 3G/4G, satellite links, to offer a combined connectivity service. Some solutions...
Building Automation Systems (BAS) are distributed networks of hardware and software that monitor and control heating, ventilation, and air-conditioning (HVAC), as well as lighting and security of smart buildings. BACnet is a standard data communication protocol designed to operate across many types of BAS field panels and controllers. This paper studies BACnet traffic in a real-world BAS from various...
This paper presents an open-source orchestration framework that deploys end-to-end services across OpenStackmanaged data centers and SDN networks controlled either by ONOS or OpenDaylight. The proposed framework improves existing software in two directions. First, it exploits SDN domains not only to implement traffic steering, but also to execute selected network functions (e.g., NAT). Second, it...
The increased number of cyber attacks makes the availability of services a major security concern. One common type of cyber threat is distributed denial of service (DDoS). A DDoS attack is aimed at disrupting the legitimate users from accessing the services. It is easier for an insider having legitimate access to the system to deceive any security controls resulting in insider attack. This paper proposes...
In this paper, we describe some scenarios and technologies that have been proposed to cope with the requirements of current and next generation data centre infrastructure. In particular, we discuss the extensions that have been implemented at both orchestration and control levels to efficiently manage the data centres resources. We put the focus on the integration between the Orchestrator and the...
Due to the variability of network topologies and services that can be deployed in the transport network, traffic engineering decisions within a software defined networking (SDN) controller need to be influenced by the current network topology, available resources, and end user experience. In this work a holistically approached traffic engineering quality of experience (QoE) feedback application is...
Cybersecurity is a critical concern in society today. One common avenue of attack for malicious hackers is exploiting vulnerable websites. It is estimated that there are over one million websites that are attacked daily. Two emerging targets of such attacks are Supervisory Control and Data Acquisition (SCADA) devices and scientific instruments. Vulnerability assessment tools can help provide owners...
Federated networks have primarily emerged to support cloud computing services, in order to reduce costs for providers, as well as to increase their incomes. Up to now, the research activity has been mostly focused on architectures and cost models, setting aside technological aspects. In this paper, we propose SDNS, an SDN-system that opens the application fields of federated networks to federated...
Vehicular ad-hoc network (VANET) is a new emerging area of research; it consists of many challenging issues for implementing intelligent transportation system in real world scenario. Nowadays academic and industry is concerned about supporting vehicular network with seamless communication so that vehicles in an interconnected form transmit information to avoid traffic jams, accidents etc. and act...
Network Function Virtualization promises to reduce the overall operational and capital expenses experienced by the network operators. Running multiple network functions on top of a standard x86 server instead of dedicated appliances can increase the utilization of the underlying hardware and reduce the maintenance and management costs. However, total cost of ownership calculations are typically a...
Uptime is very important with any computer system, because a solution which is not available cannot be relied upon to provide accurate information in a timely and routine manner — usually resulting in the loss of time, revenue, or data. Highly-available systems and websites rely on eliminating single points of failure, and on reacting quickly to any network, hardware or software issues which may occur...
The Internet of Things (IoT) ecosystem, is constantly growing and attracting interest for next generation information and communication infrastructures. In this paper we focus on the exploitation of IoT platforms for remote healthcare status monitoring within the context of the so called connected health applications. In this context users and most importantly healthcare service providers and first...
Systems-on-Chips (SoCs) are one of the key enabling technologies for the Internet-of-Things (IoT). Given the continuous distribution of IoT devices, data confidentiality and user privacy are of utmost importance. However, with the growing complexity of SoCs, the risk of malware infections and trojans introduced at design time increases significantly. A vital threat to system security are so-called...
A distributed attack initiated by a malicious party whose final purpose is to disrupt the services offered by a system to legitimate users is called DDoS. In recent years, many such attacks have been reported, some of them being able to cause major loses for companies or government institutions. In this paper, we analyze the impact of HOIP and Slowloris based DDoS attacks on both Windows and Linux...
Middleboxes are pervasive in today's Internet as they are deployed for an increasing number of reasons. An example is the network address translation (NAT), one of the first task to be performed to cope with the lack of IPv4 addresses. Recently the landscape for NATs has become even more crowded, especially in mobile networks, mainly due to the impossibility of IPv6 to be a large-scale solution to...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.