The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Delay/Disruption Tolerant Networks (DNTs) enables nodes to communicate by means of asynchronous sending messages without the need for an end-to-end path. In this paper, we study the problem of multicasting in DTNs. Several schemes have been proposed for multicast routing assuming the group of message receivers is known by sender, and the group members do not change during the process of message delivery...
Internet protocol version 6 (IPv6) has significant advantages over Internet protocol version 4 (IPv4), however it will take a long time to transit from IPv4 to IPv6. Most studies on peer- to-peer (P2P) are based on a single Internet protocol (such as IPv4). And there is no effective method to achieve the communication between IPv4 peers and IPv6 peers in IPv4 and IPv6 coexistence network. This paper...
This paper proposes a simple and effective algorithm to improve the quality of service on the Internet by providing alternate path between source and destination nodes when the delay or packet loss rate on the primary path becomes unacceptable. We combine Source Routing with an Intermediate Node forwarding mechanism to yield a multipath routing mechanism called SIR (Source Intermediate Routing). It...
Using simulation and empirical analysis, we examine asymmetry in pricing patterns within high-tech markets, where market leaders lead in both price increases and decreases. We examine 475,866 prices and 51,260 price changes for 810 high-tech products from 26 vendors over 283 days. We show that price premiums exist for the market leaders, but these leaders also engage in aggressive price decreases...
Delay-Tolerant Networks(DTN) are wireless networks where disconnections may occur frequently due to node mobility, power outages and propagation phenomena. In order to achieve data delivery, store-and-forward protocols are used in DTN and routing protocols based on epidemic message dissemination has been proposed, such as Epidemic routing. Under Epidemic routing, packets can be completely delivered...
Diffserv(Differentiated Service) is a promising technique to realize scalable QoS control in the internet. Therefore, extensive efforts have been made for the practical use of this technique. Diffserv is already introduced in some networks. Control functions for Diffserv are installed in edge routers and core routers. This enables a scalable QoS control as mentioned above. This paper proposes a new...
Cybercrime is a worsening problem that can lead to loss of financial and personal information. However, e-crime is particular hard to detect since Internet is boundless that make evidence hard to collect. Additionally, compare to others crime issues, e-crime is an emerging crime type thus previous crime theories should be refined and new methods of predicting e-crime should be further developed. In...
Multicast switches have become indispensible for modern computer networks due to the proliferation of multicast traffic on the Internet. One important issue which greatly affects the performance of a multicast switch is how to reduce data loss caused by blocking during the process of duplication and routing of the packets. This paper proposes a multicast crossbar switch with an inner queue at each...
Peer-to-Peer(P2P) network has some closer relation-ship with Internet while the scale of P2P network increases. Active P2P worms attack neighbour peers based on hit-list and pose a severe threat to both P2P network and Internet. Due to the complexity of P2P network, the traditional worms propagation model cannot be adequate to exact model P2P worms spread. Both the dynamic characteristic of P2P network...
DoS attacks bring serious threats to the Internet and the Capabilities technique is promising to defend against DoS attacks. In this paper, we firstly make profound researches on shortcomings and inadequacies of TVA (Traffic Validation Architecture), a typical Capabilities scheme based on router. And we propose ASTVA (TVA based on Autonomous Systems), which can effectively lower the cost of security...
New product diffusion is a form of technological diffusion. Nowadays, Software, as a virtual product, has its own characteristics and behaviors. Once, software has the same channels along with other real goods, but with the internet's development, software's diffusion channels have be changed, each person can download and buy them on internet. In this paper, we used a simulation way to study software...
The authors investigate the performance profit of concurrent multi-path transmission (CMT) schemes of Stream Control Transmission Protocol (SCTP) over various network environments. The results of simulation show that the performance profit of CMT-SCTP schemes strongly depends on network conditions (e.g., bandwidth). This implies that there are still a lot of studies to be needed on how to effectively...
Given a large scale Internet, how can we derive a representative simplifying topology model by network simulation? There are many known algorithms to compute interesting measures (scale down the number of clients, deletion methods, contraction methods, et al.), but most of them only reduce the scale of the network topology, the facticity of network simulation results can't be guaranteed. So when simplifying...
We propose and study a message diffusion network model of IM system with local-world preferential connections and acquaintance introduction mechanisms, which exist in IM system. We put forward the algorithms to generate the message diffusion network model and through simulation results we talk about the topological properties of this network. The topological properties such as degree distribution,...
Reduction of overhead is essential in increasing the scalability and power efficiency of peer-to-peer (P2P) file sharing systems for mobile ad hoc networks (MANET). Previously researchers mainly focused on reducing overhead of query process, and paid little attention to file transfer process. This paper presents a cluster-based P2P file sharing protocol for MANET, focusing on file transfer process...
In this work, we present an analytical model of malware spreading in wireless personal area networks (WPAN) based on IEEE 802.15. This model describes WPAN by means of some statistical parameters such as the average node degree of the network, the average encountering rate between nodes and the duration of connection etc. Also it expounds what effects the network protocols and moving patterns have...
Without considering the controversial issue such as copyright, file sharing is the most popular application in a Peer-to-Peer (P2P) network. Piece-based file sharing is an intuitive way to speed up the sharing process in a P2P network, such as the BT P2P network, and Rarest Piece First (RPF) is the most common way to distribute file pieces. As heterogeneous networks have been fast developing, the...
As other signaling protocols in the past, also SIP suffers of server overload leading to performance collapse. In this framework, recent Internet drafts propose the improvements of overload control mechanisms already presented in SIP and/or a closed loop system model for overload avoidance. In this framework, the paper presents the system simulator developed extending the network simulator (ns-2)...
Linear-time configurations and RAID have garnered great interest from both analysts and theorists in the last several years. Given the current status of pseudorandom models, cyberneticists obviously desire the study of DHCP, which embodies the extensive principles of machine learning. Based on the game-theoretic methodology and lossless algorithm, it is concluded that the discovered scheme can be...
As part of the resource allocation mechanisms, each router must implement some queuing discipline that governs how packets are buffered while waiting to be transmitted. Various queuing disciplines can be used to control which packets get transmitted (bandwidth allocation) and which packets get dropped (buffer space). The queuing discipline also affects the latency experienced by a packet, by determining...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.