The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The near future Internet of Things (IoT) allows devices to discover and to establish cooperation autonomously in an opportunistic manner. While the incentive service is available, the front-end inter-organisational devices may help each other not only on sharing information, but they can also share their Internet connection towards saving energy. Considering that different devices may have been configured...
Nanosatellites offer a solution to provide Internet access in areas where there is no ICT infrastructure, such as rural and remote areas, keeping low construction and maintenance costs. A nanosatellite constellation is composed of a certain number of nanosatellites distributed in one or more orbital planes. In most cases, this network cannot ensure an end-to-end connection between sources and destinations,...
In this paper, we propose an improved MANET gateway selection scheme suitable for disaster recovery applications. Having an infrastructure less and decentralize features, MANET is well suited to bring the network back that has been collapse after a disaster. In this paper, we focus on improving throughput performance of MANET by designing a better gateway selection scheme. The key idea is to eliminate...
Detecting anomalous Border Gateway Protocol (BGP) traffic is significantly important in improving both security and robustness of the Internet. Existing solutions apply classic classifiers to make real-time decision based on the traffic features of present moment. However, due to the frequently happening burst and noise in dynamic Internet traffic, the decision based on short-term features is not...
Packet recording or capturing is one of the most useful tools for network forensics and surveillance. Since a storage system is of a limited size, de-duplication can be used to save disk space. In this article, we present a new scalable de-duplication engine for packet recording that can eliminate redundant contents over multiple packets. Unlike previous work, our proposed scheme is designed for packet-level...
Internet of Vehicles requires reliable Inter-Vehicular communications. Such a requirement is challenging since the wireless communication channel is very erroneous and lossy in city environments. A lot of solutions for connecting vehicles to the internet have been proposed. However, existing multi-hop gateway discovery solutions do not consider, a key issue, the unreliability of broadcast in city...
The Internet Protocol (IP) is ubiquitous in terrestrial and electromagnetic-carrier wireless networking. However, for very low-throughput underwater links (such as those using acoustic modems) the IP header introduces an unacceptable amount of data overhead for the small maximum transmission units available on underwater acoustic links. Nonetheless, it is becoming increasingly valuable to connect...
The rapid growth of Internet-of-Things (IoT) devices, such as smart-bulbs, smoke-alarms, webcams, and health-monitoring devices, is accompanied by escalating threats of attacks that can seriously compromise household and personal safety. Recent works have advocated the use of network-level solutions to detect and prevent attacks on smart-home IoT devices. In this paper we undertake a deeper exploration...
This article describes the design and implementation of an electronic prototype of high availability, that would facilitate the residential Internet user to have and evaluate using an interface graphic description highly reliable and detailed network parameters as bandwidth is proposed, delay, jitter, throughput and service downtime without using a commercial network manager. This way you could make...
The Locator/Identifier Separation Protocol (LISP) was specified a few years ago by the Internet Engineering Task Force (IETF) to enhance the Internet architecture with novel inbound control capabilities. Such capabilities are particularly needed for multihomed networks that dispose of multiple public IP routing locators for their IP networks, and that are willing to exploit them in a better way than...
The implementation of devices or sensors developed over open source electronic platforms is a very important key of the projects aiming for promoting concepts such as Internet of things and Smart Cities. Due to the heterogeneity of these projects and especially the lack of a standard to regulate the communication process between the sensors and the application server, taking into account that many...
The exposure of PRISM reminds us of network sovereignty. There are two problems about network sovereignty—network boundary partition and protection. These two problems are discussed in this paper. A method of multidimensional network boundary partition is proposed based on comprehensive analysis of existing schemes. And network boundary protection is studied based on standard rules of cyber warfare...
The article describes a unique public informational Internet resource — the portal of next generation networks multi-service platforms of domestic and foreign manufacturers, used in Russia. The above objectives and opportunities of the portal, shows the architecture of a software system and the structure of the database of the portal. The portal is applicable for a broad range of telecommunication...
Adaptive video streaming techniques were introduced to enable high quality video delivery over HTTP. These schemes propose to choose dynamically the appropriate video rate to match the operating conditions. In home networks, wireless access is the predominant Internet access. Multiple clients/players with different link qualities compete over a limited wireless bandwidth to transfer their video streams...
Internet Censorship is unceasingly increasing in many countries worldwide in order to restrict web contents within the country premises. According to latest Open Net Initiative (ONI) report, almost 50 countries are involved in web censorship, including Pakistan. This paper presents the methodology and the measurement analysis based on publicly available censored URLs in Pakistan, providing both qualitative...
In this document we describe an approach to interconnect existing industrial automation systems with cooperation networks, like the internet of things, even if the industrial automation system uses a different communication protocol. To realize this, we have developed the concept of connector which provides system-dependent interfaces for different industrial automation and a universal interface for...
Vehicular mesh networks can be used to carry Internet data traffic for mobile users. We use data from a real vehicular network that is operating in Portugal to estimate the relationship between network throughput and offered load of Internet traffic, quantity of vehicles, quantity of infrastructure and the use of Request-to-Send/Clear-to- Send (RTS/CTS) handshaking. We show that achievable throughput...
Disseminating sensory information from sensor nodes to the gateway node towards Data Center Server has to be guaranteed its fruitfulness. However, these important information commonly are transmitted over wireless connections whereas everyone including adversaries may join freely in the network. Hence, the correctness of received information should be emphasized. To do so, such information should...
Any preservation effort must begin with an assessment of what content to preserve, and web archiving is no different. There have historically been two answers to the question “what should we archive?” The Internet Archive's broad entire-web crawls have been supplemented by narrower domain-or topic-specific collections gathered by numerous libraries. We can characterize this as content selection and...
With the development of modern science and technology, automation, intelligent concept has been deeply rooted in the hearts of the people, Intelligent products have entered our lives every corner. With the popularity of intelligent terminals such as smart mobile phone, our lives become more convenient and quick. Home life as the most closely related to our daily life has become more and more intelligent...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.