Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In the research of the anomaly detection system analyzing the packet header on the Internet, previous researches have proposed the anomaly detection system using chi-square values in terms of the source IP address and/or the destination port number. In these previous researches, the chi-square values were calculated from one feature causing the degradation in the False-Positive when the same symbol...
In a network, bridging nodes are those nodes that from a topological perspective, are strategically located between highly connected regions of nodes. Thus, they have high values of the Bridging Centrality (BC) metric. We recently introduced the Localized Bridging Centrality (LBC) metric, which can identify such nodes via distributed computation, yet has an accuracy equal to that of the centralized...
Several studies have shown the potential of Coordinated Multipoint (CoMP) transmission schemes to increase spectral efficiency. However, most CoMP algorithms are susceptible to outdated channel state information, which is a consequence of inter-eNodeB signaling over the backhaul network. User traffic variation constitutes another time-varying process which interacts with CoMP algorithms. These interactions...
The ultimate success of the Wireless Mesh Network paradigm (WMN) in large scale deployments depends on the ability to test it in real world scenarios. A typical application scenario which is worth to be investigated in such a context is peer-to-peer traffic management. The creation of large scale testbeds for evaluating wireless mesh technologies and protocols, and for testing their ability to support...
We examine whether wireless ISPs should be able to legally limit the applications used on wireless devices. The analysis is based on wireless network architecture and communications law. We review how wired and wireless networks differ in traffic management, and conclude that wireless networks require stronger traffic management than wired networks at and below the network layer. We review communications...
The use of the Markov-Additive process of arrivals allows to take into account various classes of the arrived calls, the arrivals by batches, the dependence of arrival rate on the state of the random environment and so on. This probabilistic framework is used for the traffic description in the individual network channel having a certain capacity. The main considered aim is to determine the quotas...
The following topics are dealt with: scalable Internet application; application-driven network optimization; security issues; economic aspect; wireless network; space/earth delay/disruption tolerant networking; smart spaces and ubiquitous solution; and Internet traffic.
To improve the system performance, DSCH and HS-DSCH channels are used in the existing releases of the mobile systems for bursty Internet traffic services. OVSF codes are assigned during the data transfer time of a session in these channels. Here, through the use of a multiplexer / scheduler, a queue and a buffer, we have introduced a Traffic Model Scheduler (TMS) in layer 2 / RLC of HSDPA to reduce...
Along the growth of internet traffic, the penetration of internet access from mobile user has been increased. By augmenting mobile data traffic, the mobile network capacity limits have become significant issues. To cope with the increased mobile user data to cellular radio networks, several offload approaches such as femtocells have been proposed. With regard to 3G core network offload, Selected IP...
The web caching business has significantly changed over the recent years. The percentage of content that is suitable for caching has constantly decreased, e.g. due to unfavorable content formats like Flash or varying URLs due to usage of CDNs. While this of course has a negative impact on the effectiveness of caching, also other parts of the equation have changed: Transmission cost has dropped significantly,...
The use of network data visualization tools for cyber security is particularly challenging when large amounts of diverse data are displayed and continuously updated. These real-time changes can be used for context-sensitive decision making, but are impeded by a lack of expressive visualization techniques. In this work, we propose a new method for the visualization of network traffic - virtual worlds...
Unwanted Internet background traffic (often called "Internet background radiation") is received to every public IPv4 address. This is a problem for cellular phones with an always-online GPRS connection, because receiving the unwanted sporadic data traffic will cause the cellular radio to be used, which in turn drains the device battery. We present measurements of the effect of unwanted Internet...
This paper relates to a method and apparatus for controlling traffic according to user, and more particularly, to a method and apparatus for controlling traffic according to user that detects traffic abnormalities according to an Internet user's online behavior and controls the traffic of users whose behaviors are at variance with regular Internet user behavior patterns through the use of priority...
We present and compare architectures for using a fleet of high-speed Internet subscriber residential gateways to build a hotspot network for offload of cellular data-traffic. We address the central challenges of meeting the security and ease of use expectations of cellular telephony in implementation on popular smartphones and gateways. Attention is given to security shortcomings in the client software...
A low-cost collaboration architecture for web content distribution, that aims to improve all stakeholder's interests, is presented. A peer-to-peer (P2P) contribution among the end users layer is suggested, in order to increase download rates and reduce server traffic and resource usage. In addition, the Internet Service Providers (ISPs) concerns are also considered, with an ISP-aware connection strategy...
While the majority of Internet traffic is becoming of high quality multimedia variety, also mostly generated by consumers themselves, efficient content sharing with intuitive useability and security measure in a mobile environment remains an elusive goal. In this paper, we present a Content-Centric Networking (CCN) based Virtual Private Community (VPC) service which aims at supporting intuitive content...
The Internet is witnessing explosive growth in traffic, in large part due to bulk transfers. Delivering such traffic is expensive for ISPs because they pay other ISPs based on peak utilization. To limit costs, many ISPs are deploying ad-hoc traffic shaping policies that specifically target bulk flows. However, there is relatively little understanding today about the effectiveness of different shaping...
Application layer centralized business players, such as search engines, have revolutionized the Internet, by smartly mediating between the users' generic interests and the specific resources returned. Meanwhile, networks consistently neglect the human nature of demand, and persist in handling a-priori offered load expressed in terms of requests for precisely identified network resources. A twofold...
By rapid development and growth of the Internet, communications has developed into IP-based converged network, based on individual media convergence, such as broadcast, communications, Internet, etc. With the development of network, security issues are very important in managing the network, especially defence against a distributed traffic attack causing traffic congestion can be called essential...
IEEE 802.11 is currently one of the main wireless technologies enabling ubiquitous Internet access. With the growing demand for wireless Internet access and the limited 802.11 radio range, 802.11-based Wireless Mesh Networks have been proposed as a flexible and cost-effective solution to extend the radio coverage of existing network infrastructures. Many solutions have been proposed to create Wireless...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.