The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently many prominent web sites face so called Distributed Denial of Service Attacks (DDoS). DDoS attacks are a virulent, relatively new type of attack on the availability of Internet services and resources. To avoid denigration most of the commercial sites do not expose that they were attacked that is the biggest challenges of the researchers. Network congestion caused by DDoS attack can be managed...
In this paper, we introduce a scheme that enables secure image trading over the Internet. The involved parties in our image trading system are image provider, server provider, and commercial user. The proposed scheme facilitates secure storing and retrieval of original images for trading, but prevents access to unauthorized users and untrustworthy server provider. The original images are visually...
Routing schemes in Delay Tolerant Networks depend on the intermediate nodes to carry messages till the forwarding of the messages to other nodes or delivery of the messages to their destinations. Thus, efficient and faster spreading of messages is essential to reduce the delay of sending a message from source to destination. In this work, we aim to design a new agent aided routing scheme in Delay...
This paper presents a software simulator to be used as a part of a didactic strategy based on project-based learning where students better understand technical details associated to self-organizing wireless devices. This simulator is implemented as a multi-agent, web-based system where each device is an autonomous agent that can be controlled by students via configuration. System simulates two types...
In dealing with computer networks, these allow the flow of information through the resources of various equipment's. This work describes the implementation through the encapsulation of Protocol DNP3, usually employed in Smart Grid communication, in a simulator of discrete events. The NS-2 is a simulator in open source of network events, that facilitate the development of communication networks scenarios...
Nowadays, due to excessive queuing, delays on the Internet can grow longer than several round trips between the Moon and the Earth — for which the “bufferbloat” term was recently coined. Some point to active queue management (AQM) as the solution. Others propose end-to-end low-priority congestion control techniques (LPCC). Under both approaches, promising advances have been made in recent times: notable...
Wireless networks today are partially being formed by nodes (e.g. Internet access points, smartphones, femtocells)that are owned and carried by humans. In such scenarios where several strangers are expected to interact for the sake of robust data transmission, trust and reputation are of vital importance. As such, User Centric Networks require well-defined trust metrics in order to ensure the robustness...
Unlike the conventional routing techniques in the Internet where routing privileges are given to trustworthy and fully authenticated nodes, Delay Tolerant Networks (DTNs) allow any node to participate in routing due to the lack of consistent infrastructure and central administration. This creates new security challenges as even authorized nodes in DTNs could inject several malicious threats against...
Network virtualization is considered to be not only an enabler to overcome the inflexibility of the current Internet infrastructure but also an enabler to achieve an energy-efficient Future Internet. Virtual network embedding (VNE) is a critical issue in network virtualization technology. This paper explores a joint power-aware node and link resource allocation approach to handle the VNE problem with...
This paper proposes an integrated approach to the VNE problem, in which different virtual nodes of a virtual network could be assigned to a physical node as long as this node's available resources can satisfy the total resource requirements of these virtual nodes. We carry out extensive simulations to investigate the benefits of sharing physical nodes. The simulation results demonstrate that (1) Compared...
With rapid development of information and communication technology, human behavior has extended to mobile internet. In this paper, we studied posting behavior of micro-blog users in mobile internet. Statistical results suggest that there exist significant negative correlation between inter-event time and social concern. This means that users' interest in posting micro-blogs is influenced by social...
The Internet Protocol version 6 (IPv6) is being adopted in networks around the world as the Internet Protocol version 4 (IPv4) address space is nearing maximum capacity. Security needs are changing because of various new aspects of IPv6, such as the way addresses are determined. There are security applications that are being developed to meet these needs; however, there are not many production IPv6...
In this paper, we present the development of an assistance system for finite element analysis. This software helps students, and also beginners from industry, to learn numerical simulation techniques based on the CAx-program CATIA V5. The software which was written in Python programming language, is interconnected to CATIA via the COM-interface. This program analyses the users activities to give hints,...
This work analyses the feasibility of use Femtocells networks to provide return channel on Digital TV. The results were compared with a similar simulation using Wimax networks. The same numbers of users was used to create two scenarios, the first using only WiMAX networks, and the second using femtocell network. The results show that femtocell networking is a promising solution for the return channel...
In this paper, we make an in-depth investigation on the issue of distributing link stress. It is a fundamental problem in popular Internet TV systems because the service quality at the receiving side is determined by network congestion and bandwidth usage of the links. Less congestion level and balanced bandwidth usage enable IPTV systems to accommodate more subscribers and service channels, which...
Information-Centric Networking is (ICN) gaining increasingly concerns, as an important direction of the future Internet architecture research. To study the impacts of various cache policies on overall performance of ICN network, we formulate the in- network caching problem of ICN into Mixed-Integer Linear Programming problem. Furthermore, we infer that frequency-based cache policies like LFU are supposed...
Current Internet architecture is challenged by the overwhelming multiplication of available content and the increasing requirements of the content delivery applications. Content Delivery Networks have been playing a catalytic role in content delivery solutions, replicating (caching) content at the edges of the network. In this paper, we investigate the role and the benefits of a more flexible and...
With the advancement of communication technologies, multiple wireless local area networks (WLANs) have been often deployed in the same building for the Internet access services. Usually, their wireless access-points (APs) have been independently managed and operated by different groups such as departments or laboratories in a university or a company. Then, a WLAN user host can detect signals from...
The P2P-assisted video-on-demand (P2P VoD) service has achieved tremendous success among the Internet users. There are three core strategies in the P2P VoD system: the piece selection policy, the peer selection policy as well as the replica management policy. Different from the existing research works that only consider single policy optimization, we for the first time study the existing P2P VoD policies...
The need for service resilience is leading to a steadily growing number of multi-homed Internet sites. In consequence, this results in a growing demand for utilising multiple Internet accesses simultaneously, in order to improve application payload throughput during normal operation. Multi-path Transport Layer protocol extensions - like Multi-Path TCP (MPTCP) for TCP and Concurrent Multipath Transfer...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.