The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The IPv6 protocol is the next-generation IP protocol that addresses many of the shortcomings that exist in the IPv4 protocol. Some of the enhancements include increased address space, mandatory security and provisioning of stateless auto-configuration, a technique through which a new node forms its own address without the assistance of centralized host configuration servers operating in the network...
Explicit feedback based congestion control schemes can capture network congestion status more accurately than pure end-to-end schemes. However, some of such schemes require modifying IP header in order to achieve near optimal performance, which incurs complicated computation in routers as well as makes them difficult to deploy in real networks. In contrast, the VCP protocol achieves good performance...
This paper provides an indication that the distance between clients and their local DNS servers (LDNS) can have a significant negative impact on the performance of content delivery networks (CDNs). Consequently, we propose a novel peer-topeer client-side DNS mechanism that moves LDNS close to their clients while still allowing nearby clients to share the common DNS cache. Through trace-driven simulations...
The smart grid is the next-generation power system that incorporates power infrastructures with information technologies. In the smart grid, power devices are interconnected to support a variety of intelligent mechanisms, such as relay protection and demand response. To enable such mechanisms, messages must be delivered in a timely manner via network protocols. A cost-efficient and backward-compatible...
Flow-based traffic processing systems have been widely deployed on multi-core systems for performance purpose. However, the current flow table design cannot balance parallel processing performance and memory usage of locks, and is unable to automatically adapt to different network settings. To address these issues, in this paper we propose a Hypercube Flow Table (HFT) based on multi- dimension hash...
Computer networks serve billions of users all over the world. Research in this field could be performed by building test beds in labs. However, this approach is very expensive, inflexible and hard to reconfigure. It is also difficult and sometimes impossible to replicate some scenarios with test beds. Network simulation on the other hand overcomes all these difficulties. Network simulation can be...
The ever growing number of Internet subscribers through mobile devices has led to the requirement of better mobility management protocols. Mobile IP version 6 (MIPv6) by IETF supports IPv6 mobility by providing mobile nodes with uninterrupted Internet connectivity and services. MIPv6 provides network layer mobility but handoff from one network to another network causes handoff latency. Due to this...
Web-based services involving dynamic computation of the content are increasingly used on the Web. This computation may not only involve processing, but often involves access to other back-end services typically for database access. These multi-tiered Web-based services have different characteristics than traditional Web content and new models need to be considered not only how to manage them, but...
Location management in wireless networks serves the purpose of tracking mobile nodes and locating them prior to establishing new communications. However, existing location management schemes in cellular and wireless local area networks cannot be directly applied to wireless mesh networks (WMNs) without non-trivial modifications due to the special properties of WMNs. In this paper, we propose a hybrid...
This paper describes an empirical research study to characterize attackers and attacks against targets of opportunity. A honey net infrastructure was built and deployed over 167 days that leveraged three different honey pot configurations and a SSH-based authentication proxy to attract and follow attackers over several weeks. A total of 211 attack sessions were recorded and evidence was collected...
In mobile IPv6, packet transfer is interrupted due to the handoff of a mobile node, which results in burst packet loss. This transient behavior decreases the required quality of services for time-critical streaming media applications. This paper introduces an analytical model of streamed video over mobile IP networks considering the effects of handoff. The proposed model focuses on the effect of the...
The communication based train control (CBTC) system is an advanced train control system. It uses high accuracy of train locating, realizes a continuous automatic train control system. DCS system plays an important role in the information interaction between ground equipment and vehicle equipment in CBTC. Based on OPNET simulation console, this paper designs a DCS network, simulates its communication...
High reliability and performance are needed as the Internet becomes an important social infrastructure. Network delay is one of measures of performance of network. As delay between two nodes correlates roughly with the distance between them, the diameter of the network which is the maximum distance of all two nodes must be small. In addition, it is necessary to keep small network delay against network...
The IMS (IP Multimedia Subsystem) can provide multimedia services between heterogeneous wireless networks. But the efficiency of the service session handoff will bring a significant impact to user experience. For the integration of heterogeneous wireless networks, we propose a SIP-based multimedia service session handoff method named MS2HM. To reduce the handoff delay between heterogeneous wireless...
NATO is transforming to a NATO Network Enabled Capability (NNEC). Seamless information flows in this federated secure environment require technology which offers both application-specific network services and priority for operation-critical command and control applications, - particularly when the network is being stressed (e.g. under cyber or physical attack). NATO selected the technology of end-to-end...
The attempt to design a stable and industry-wide standard for a converged telecommunications network carrying IP-only data and voice communications in a voice radio network environment has resulted in a new international standard. Under the cooperative work of RTCA and EUROCAE, Working Group 67 (WG-67) focused on a broad industry agreement for an IP based protocol enabling use of voice radios in an...
This paper describes the design and performance of a geo-synchronous mobile satellite system based on enhancements to terrestrial 3GPP specifications. The corresponding 3G satellite air interface developed by Hughes is called GMR-1 3G and has been standardized at ETSI and ITU standards bodies. System architecture is based on Release-7 all-IP architecture with satellite specific enhancements primarily...
In mobile opportunistic networks, we investigate the effect of infrastructures on content update process. In the network, an information provider continuously generates a time-sensitive content (e.g., news, twits or military commands) whose freshness decreases with time. This information is propagated to users throughout opportunistic contacts. Users prefer to have the more recently generated (i.e...
We propose and evaluate a real-time window-based local call admission control algorithm (RWBLAC) for achieving quality of service in IP networks. RWBLAC utilizes a real time traffic measurement and variation of window based techniques traffic policing for QoS admission decisions. This real time fashion based on actual arrival rate make this research distinct form all other using predefined threshold...
New generation of mobile wireless networks utilizes IP mobility protocols to handle handovers between their different subnets. Among existing options, Proxy Mobile IPv6 (PMIPv6) as a network-based protocol presents higher handover performance comparing with its client-based counterparts such as Mobile IPv6 (MIPv6) and Hierarchical Mobile IPv6 (HMIPv6). Nevertheless, the PMIPv6's operation is limited...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.