The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The research of fast position miners in tunnels is of great importance in that it can provide accurate information about where the miners are, and minimize the loss of the disaster. To solve the problem of localization in underground mining areas where GPS positioning is not available, underground miners localization system based on ZigBee and WebGIS technology is proposed. Underground miners are...
An Internet router may receive a batch of tens of thousands of updates (insert a new rule or delete/change an existing rule) in any instant (i.e., with the same time stamp). This paper deals with analyzing possible orderings of a batch of updates such that forwarding table consistency is maintained while these updates are performed one at a time as in a table that supports incremental updates rather...
To manage the changing conditions of the Internet and diagnose the cause of anomalies within it, network operators must obtain and analyze information from network devices such as routers and network monitoring tools. Of that information, route information exchanged by Border Gateway Protocol (BGP) is essential for understanding the Internet at an inter-autonomous-system (AS) level. However, the information...
Sophisticated routing protocols, such as content-based routing, have been studied and proposed to replace Internet Protocol (IP) in the future Internet. Routing based on content will make finding, querying, and retrieving the desired information possible within the routers rather than having the routers forward the packets to data servers or domain name servers. However, one of the main reasons that...
Emerging Web2.0 applications such as virtual worlds or social networking websites strongly differ from usual OLTP applications. First, the transactions are encapsulated in an API such that it is possible to know which data a transaction will access, before processing it. Second, the simultaneous transactions are very often commutative since they access distinct data. Anticipating that the workload...
The existing designs for providing Anycast services are either to confine each Anycast group to a preconfigured topological region or to globally distribute routes to individual Anycast group which causes the routing tables to grow proportionally to the number of all global Anycast groups in the entire Internet to result in Anycast scalability problem, both of which restrict and hinder the application...
False routing announcements are a serious security problem, which can lead to widespread service disruptions in the Internet. A number of detection systems have been proposed and implemented recently, however, it takes time to detect attacks, notify operators, and stop false announcements. Thus detection systems should be complemented by a mitigation scheme that can protect data delivery before the...
KAD is one of the most popular Peer-to-Peer (P2P) networks on the Internet. It uses Kademlia-based Distributed Hash Tables (DHTs) to form a tree-structured P2P network. Iterative routing algorithm is used on Kademlia to perform key-value DHT lookup operation based on XOR distance of peer identifiers, which are randomized. Therefore the lookup operation might increase the lookup latency, as well as...
In the 1960s, a mathematical conjecture was brought forward with the name "Six Degrees of Separation" and indicated that the gap between any two people was not more than 6. It was widely used in the field of sociology and came under more and more attention. However, with the help of the Internet, people are becoming connected than ever and the social networking is expanding well beyond previous...
The emergency call service is to forward the emergency call originated from subscribers in an emergency situation to the nearest PSAP (Public Safety Answering Point) based on their location. However, it is relatively difficult to measure an accurate location of subscribers of the internet telephone based on the IP address. Therefore, the paper introduces methods and implemented examples in the KT...
With the development of Internet, effective and steady routing protocol has become an important factor which ensures the network performance. And scientific researchers have been pay much attention to testing on routing protocol. Conformance test on IS-IS protocol is studied, which is one of the main IGPs (internal gateway protocol). Moreover, the adjacency state machine of the protocol is improved...
Current day Internet is vulnerable to a variety of attacks during routing between Autonomous Systems (ASes). Routing between ASes in the internet is taken care of by standard de-facto inter-domain protocol called Border Gateway Protocol (BGP). BGP generally performs the hearsay technique for propagating the route for an IP prefix. Each BGP speaker advertises the AS -PATH through UPDATE messages for...
IP address lookup is a fundamental task for Internet routers, due to the rapid growth of both traffic and links capacity. Many algorithms have been proposed to improve lookup performance in terms of memory consumption, search speed and update complexity. Due to the presence of wildcards and netmasks, such algorithms adopt several techniques to deal with longest prefix matching. However, the analysis...
In a publish/subscribe network, message delivery is guaranteed for all active subscribers at publish time. However, in a dynamic scenario where users join and leave the network, a user may be interested in content published before the subscription time. In this paper, we introduce mechanisms that enable caching in such networks, while maintaining the main principle of loose-coupled and asynchronous...
The Border Gateway Protocol (BGP) is one of the key components of today's Internet infrastructure. Many ISPs rely on BGP for convergence of inter-domain routes upon BGP link failures. However, the convergence of BGP requires several seconds of downtime, which may cause critical performance degradation of applications. In this paper, we propose the use of an intra-domain routing protocol to provide...
Number portability is a telecommunications service allowing users to change the service provider, service type or location and retain the telephone number. A variety of number portability implementations exist within the public telephone network. A demand for a unified solution to number portability arose with the accession of a packet based telephony. ENUM offers a translation mechanism between the...
It is generally recognized that the current routing scheme of Internet suffers from serious scalability problems. In this paper, we work with the abstract but 'Internet-like' network model consisting of an infinite-variance power-law random graph (IVPLRG) and adopt the idea of a routing scheme proposed by Carmi, Cohen and Dolev (C-C-D). The scheme fits very naturally to the spontaneously emerging...
To solve major limitations to the current Internet such as scalability, mobility and QoS-aware inter-domain routing, IRTF RRG has recently proposed identifier(ID)/locator(Loc) decoupling mechanism. Several proposals for distributing ID/Loc mapping information among transit routers have been discussed so far, but the mapping information distribution system itself has not been studied in detail. This...
Government agencies, researchers, and developers have worked to build distributed networks and systems enabling anonymous communication on the Internet. Within the last ten years, the maturation of these systems have enhanced the effectiveness and availability of anonymous communication, allowing criminals to electronically participate in illicit activities such as money laundering, child pornography,...
Proxy mobile IPv6 (PMIPv6) is being actively standardized by IETF, and its salient features, such as supporting unmodified mobile node (MN), expedite the real deployment of IP mobility management. However, current research and development mainly focus on its unicast mechanism. In this paper, we propose two multicast listener mobility mechanisms for PMIPv6, named LMA-MLM and MAG-MLM, by drawing a lesson...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.