The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a unified declarative platform for specifying, implementing, and analyzing secure networked information systems. Our work builds upon techniques from logic-based trust management systems, declarative networking, and data analysis via provenance. We make the following contributions. First, we propose the secure network datalog (SeNDlog) language that unifies Binder, a logic-based language...
The state of network routing today is the result of theoretical progress, technological advances and operational experiences. It is also impacted by economic and policy issues. The packet information search at router is really complicated task and hence, packet classification is often a performance bottleneck in network infrastructure; therefore, it has received much attention in the research community...
The update of many stats and timers maintained in PIM-SM protocol relies on the current forwarding results of multicast packets on FE. There is a new challenge to the realization of the protocol in ForCES architecture router because the main body of PIM-SM is running on CE under ForCES architecture. In this paper, we analyze key technologies of PIM-SM in the ForCES architecture router, and present...
The traditional cluster routing method is a typical method for enhancing an energy efficiency, which selects cluster head in order to send the aggregated data arriving from the nodes in cluster to a base station. However the major challenges are the equal distribution of each cluster over the whole sensor network and the energy dissipation caused by the frequent information exchange between selected...
Recent works on modeling the Internet topology have highlighted how the complexity of relationships between Autonomous Systems (ASes) can not be oversimplified without sacrificing accuracy in capturing route selection. Such a shortcoming can mislead the understanding, hence the prediction, of the BGP (Border Gateway Protocol) behavior. In particular, models that assume an AS to be an atomic entity...
We present an evaluation methodology for comparison of existing and proposed new algorithms for Border Gateway Protocol (BGP) anomaly detection and robustness. A variety of algorithms and alert tools have been proposed and/or prototyped recently. They differ in the anomaly situations which they attempt to alert or mitigate, and also in the type(s) of data they use. Some are based on registry data...
In this paper we propose adaptive data dissemination algorithms for intelligently routing search queries in a peer-to-peer network. In our mechanism nodes build content synopses of their data and adaptively disseminate them to the most appropriate nodes. Based on the content synopses, a routing mechanism is being built to forward the queries to those nodes that have a high probability of providing...
A PKI in support of secure Internet routing was first proposed in [1] and refined in later papers, e.g., [2]. In this ldquoResourcerdquo PKI (RPKI) the resources managed are IP address allocations and Autonomous System number (AS #) assignments. The RPKI presents a very different implementation challenge from a typical PKI,in that in the RPKI every relying party needs to validate every certificate...
TinyTorrents integrates Wireless Sensor Networks with the BitTorrent Peer-to-Peer protocol and is designed to respect the resource constrained environment which characterises many WSN's. This paper describes the architecture and design which underpins the TinyTorrents system and explores many of the technical challenges that arise in the fusion of such distinct data dissemination networks. The key...
With the increasing quantity and varying nature of traffic crossing the Internet, coupled with techniques such as fluctuating port numbers and transport layer encryption, the identification of individual packet flows is becoming more difficult. We introduce and investigate a new method for the detection of P2P flows based on the activity of the hosts (IP addresses) involved in the connection. Heuristics...
The Border Gateway Protocol governs the overall routing in the Internet. With the time, it has been overloaded with functions which is was not initially designed for. The main example is Traffic Engineering. Internet Service Providers need to adjust the traffic on their peerings and in absence of a better alternative, use Trial and Error techniques based on manipulating the Autonomous System Path...
As sensor networks mature, there will be an increasing need for re-usable, dynamically taskable software systems that support multiple concurrent applications. In this paper, we consider the problem of energy management in such systems, taking Tenet as a case study. Our work considers energy management under three new constraints: dynamic multi-hop routing and tasking, multiple concurrent applications,...
Routers configure their paths based on the Link State Database (LSDB) in order to meet service requirements and Quality of Service (QoS) guarantee. Internet routing can be categorized into intra domain routing and inter domain routing, and QoS should be guaranteed both at the intra and inter domains for end-to-end QoS guarantee. The LSDB can be easily managed and updated at the inter domain routing...
Wireless sensor network (WSN) is an active area of research today. A WSN consists of a number of sensor nods each with limited energy, bandwidth, storage, and processing capability. Clustering is one of the basic approaches for designing energy-efficient, robust and highly scalable distributed sensor networks. One of the approaches to enhance the lifetime of WSN is to allow only some nodes in a cluster...
VoIP (Voice over Internet Protocol) is a technology that enables the routing of voice conversations over any IP-based network such as the public Internet. Separate and distinct client, gateway and call control functions that ability to support Peer-to-Peer, PC-to-telephone, telephone-to-PC and telephone-to-telephone scenarios. During transmission, the traffic loading and other factors in the IP (Internet...
Mobile Ad Hoc networks (MANET) are created temporarily for the purpose of either communication, sharing services and resources or running applications such as multi-player game. As sharing assumes discovery and routing, we propose a new service that integrates these two services in a cost-effective manner. The limited life time of MANET requires effectiveness in terms of how resources such as battery...
ForCES (forwarding and control element separation) architecture brought forward by IETF shows great advantages for network devices such as routers, wireless base stations and etc to be flexible, programmable, and cost-effective. This paper researches on the transaction mechanism in ForCES router, based on the analysis of transaction requirement of ForCES, two phase commit algorithm is introduced and...
The research community has recently witnessed the emergence of densely deployed wireless sensor networks (WSNs) consisting of a large number of battery-operated sensor nodes. As a candidate for monitoring remote faulty regions, WSNs may suffer from hardware and software faults which may cause misbehavior of a portion of network. Geographic routing algorithms aims at traversing data packets in such...
In this paper, the hybrid bootstrap mechanism for multicast routing in PIM-SM is presented and its performance is evaluated. Since the hybrid bootstrap mechanism consists of distributed and centralized processes, it is called hybrid one. The key for the hybrid method is that the role of a rendezvous point (for short, RP) selection is played in a bootstrap router (BSR), not that a designated router...
The goal of this work is to design a new adaptive routing technique for ad hoc wireless networks. This paper proposed the basic deign of the algorithm that works based on the principle of ant colony optimization (ACO). This is a probabilistic adaptive technique that changes its routes with the change of network topology over the period of time by learning its environment. It identifies appropriate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.