The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
VoIP is replacing traditional telephony system over PSTN as a more affordable communication tool on account of convergence of networks. Meanwhile, security issue brings more attention and becomes more important. SIP is based on text message. This makes the protocol easy to implement but also creates opportunity for hackers to steal or modify the messages. There exist a various approaches to secure...
There have been a number of network monitoring projects launched to cope with cyber threats in the Internet. In those projects, several types of sensors such as black hole sensor, low and high interaction honey pot, and web crawlers are deployed to analyze characteristics of attackers from various perspectives. However, there are some problems of deployment and operation of network monitoring systems,...
Predictive methods for learning network distances are often more desirable than direct performance measurements between end hosts. Yet, predicting network distances remains an open and difficult problem, as the results from a number of comparative and analytical studies have shown. From an application requirements perspective, there is significant room for improvement in achieving prediction accuracies...
Data center networks are characterized by high link speeds, low propagation delays, small switch buffers, and temporally clustered arrivals of many concurrent TCP flows fulfilling data transfer requests. However, the combination of these features can lead to transient buffer overflow and bursty packet losses, which in turn lead to TCP retransmission timeouts that degrade the performance of short-lived...
In real-time networked control systems, the end-to-end path delays on the communication network should be bounded in order to satisfy the stringent timing constraints of physical system. While the packet delivery on a single path could be significantly affected by network congestion levels, transmitting duplicate packets along multiple paths can overcome fluctuations of the time delay on a specific...
Due to diverse network latencies, participants in a Distributed Virtual Environment (DVE) may observe different inconsistency levels of the simulated virtual world, which can seriously affect fair competition among them. In this paper, we investigate how to disseminate Dead Reckoning (DR)-based updates with the objectives of achieving fairness among participants and reducing inconsistency as much...
In this paper, the fuzzy logic-based decision algorithm is proposed for queue scheduling. This algorithm is employed to determine the optimal values for achieving fairness control for each queue-type serviced. It takes into account the dynamic nature of the internet traffic as regards to its time-varying packet arrival process that affects the network states and performance. In order that the fairness...
Near Field Communication (NFC) is one of the technologies, in conjunction with Bluetooth and 6LoWPAN, which makes feasible the wireless transmission of information from small objects and sensors to Internet-enabled devices. This presents a new technological generation, denominated Internet of Things (IoT), which is able to integrate in Internet the sensors and objects located surround us. Our research...
Future Internet research activities try to increase the flexibility of the Internet. A well known approach in this area is to build protocol graphs by connecting functional blocks together. The protocol graph that should be used is the one most suitable to the application's requirements. This paper presents a Multistep Process Model to find the most suitable protocol graph. We evaluate our proposed...
Over 40 research projects are currently on-going worldwide aimed at designing the new architecture of the Internet. One of these projects — System IIP led in Poland — covers a wide spectrum of issues including network technologies, architectures, virtualization aspects, and applications. In this paper, we focus on implementation issues of network resource provisioning in System IIP, as well as on...
Optical networks have been pointed out as strong candidates to ensure energy-efficiency in the Internet backbone, as well as the distributed applications such as computational grids. In this paper, we propose a distributed framework to address energy-efficient lightpath establishment problem for computational grids over the optical WDM backbone. Each backbone node maintains two thresholds to determine...
Content Centric Networking (CCN) Architecture has been suggested to overcome weaknesses of current Internet architecture. This architecture is based on the concept of decoupling data from location and retrieving contents by name instead of location. Transport layer protocol i.e. CCNx has been proposed for use with CCN. CCNx performs longest prefix match between requested content name and entries stored...
Most user terminals or Internet hosts are equipped with two or more interfaces that can simultaneously be attached to different access networks. These multihomed hosts can offer ubiquitous and cost-effective connectivity, while improving resiliency and bandwidth. Each interface would get an address (or locator) from the edge network to which it attaches. Thus the multihomed host has multiple locators...
In this paper the bifurcation behavior of a TCP fluid flow model for Internet congestion control in Wireless Networks is investigated. These bifurcation behaviors may cause heavy oscillation of average queue length and induce network instability. An impulsive control method was proposed for controlling bifurcations in the Internet congestion control system. Simulation results show that the nonlinear...
This document is written to give the chronology of technological evolution at IIT Bombay in Distance Education activity. Various technologies used are described in brief. The next technology have emerged out of some need that was unfulfilled in the previous technology used. A glimpse of future technologies likely to be used in distance learning are mentioned. The impact of distance education on different...
As the Internet becomes increasingly popular and mature, constant increase of demands and complexities for network traffic has been an big issue. A concentration of large traffic demands to one routing node or one communication line makes a network congestion. This congestion causes increment of total network delay and the total amount of packet losses. These losses grow retransmission of packets,...
Internet Protocol (IP) suite and Ethernet physical layer are the current trend in home and industrial systems communication protocols. Unfortunately, in the field of power line automation protocols that are in wide use in home automation applications, the lack of IP convergence leads to difficulties, because of the variety and high costs of systems and solutions that need to be integrated. This paper...
How to provide quality of service (QoS) guarantees in routing and switching systems has become one of the key research topics in the areas of routing and switching technologies. Differentiated services architecture (DiffServ) is known as a promising way for supporting QoS in a high-speed backbone network scenario. However, the measurement indexes for realtime multimedia traffic, which plays very important...
This paper discusses basic issues about the performance of semi-structured query processing in very large data sets. It is based on recent algorithm-engineering work, on the state of the art in performance management for XML query processing and on theoretical studies about the complexity structure of the querying problem. Its main conclusions provide a concrete view on the interaction between terabyte...
Traffic analysis, where eavesdroppers retrieve networking information such as source-destination pairs and paths of data flow, severely compromises user privacy and can equip an adversary to launch more powerful network attacks. Anonymous communication, where users exchange information without revealing the communicating parties is essential in any data network. Chaum Mixing, where relay nodes or...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.