The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traffic monitoring and analysis has become necessary to understand the nature of information flowing within an organization. This is particularly important due to the recent trend of increase in the percentage of anomalous traffic in the overall organizational traffic composition. In this work, we attempt to determine the typical characteristics seen in various organizational network traffic. We use...
Although people think that their identity is not revealed on the internet, the confidentiality and protection of personal information on unreliable networks such as the internet is an important question. In this study, a sample application on network packet tracing and analysis of network cameras with Wireshark program is realized to show how partial access to personal information and location information...
Due to the continuous growth of the Internet, current internet communication protocol (IPv4) is no longer sufficient for the future. The Next generation Internet Protocol (IPv6) brings the solution for the long predicted limitations of IPv4. But the resistance to change from IPv4 is hindering the adoption of IPv6. In Africa, IPv4 is still in use and as a result affecting the acceptance of IPv6. These...
The main design principle of Information-Centric Networking (ICN) is the name based routing, that makes users able to ask for a data object by only using its name, and makes the network deliver data to users from a nearby cache if in-network caching is available. Software-Defined Networking (SDN) decouples the control layer from the data layer, so that the complexity, and network control and management...
Today, we see the development of the Internet of Things (IoT). Latest IoT devices are embedded, single-board computers (SBC) equipped with Ethernet and WiFi. Those SBCs are run an operating system and have network interfaces and use standard Internet protocols like IP, TCP, and so on. Compared to the envisioned devices for the future IoT these SBCs are still large and connected to a steady power supply...
The diversity of wireless networks and protocols used by Internet of Things makes solutions non-interoperable. Moreover, some Things are not always able to communicate due to resource constrains or environmental factors. In this paper, those issues are addressed by introducing the concept of virtual Things. It means that each real Thing is virtualized in a local server or in the cloud, enabling communication...
With the rapid development of Internet communications, there is a growing demand to support devices being connected to multiple Internet service providers simultaneously. For example, every modern smartphone already provides at least mobile broadband(UMTS, LTE) as well as Wi-Fi interfaces. This multi-homing property can be used for resilience, but there is also an increasing interest in making use...
This paper proposes a Domain Name System (DNS) Name Autoconfiguration called DNSNAv4 for Internet-of-Things (IoT) Devices in Internet Protocol (IP) version 4 (IPv4). The manual configuration of domain names of devices might be a cumbersome burden for users as the number of devices increases. A legacy scheme called DNS Name Autoconfiguration (DNSNA) for IPv6 networks can be used to register DNS names...
Many IoT devices are part of fixed critical infrastructure, where the mere act of moving an IoT device may constitute an attack. Moving pressure, chemical and radiation sensors in a factory can have devastating consequences. Relocating roadside speed sensors, or smart meters without knowledge of command and control center can similarly wreck havoc. Consequently, authenticating geolocation of IoT devices...
Internet users are interested in content regardless of its location; however, the current client/server architecture still requires requests to be directed to a specific server. Information-centric networking (ICN) is a recent vein that relaxes this requirement through the use of name-based forwarding, where forwarding decisions are based on content names instead of IP addresses. Despite previous...
Named Data Networking (NDN) uses content names as routing entries, and thus the scalability of NDN routing is of primary concern. NDN allows in-network caching as a built-in functionality; however, if network nodes make caching decisions individually, duplicate copies of the same content may exist among nearby nodes. To address these problems, we propose Coordinated Routing and Caching (CoRC) that...
Longest-prefix name-based forwarding in Content-Centric Networking poses many significant challenges on design of routers and algorithms, because the name space is many orders of magnitude larger and significantly more complex than the IP address space. IP forwarding algorithms are no longer applicable and cannot reach the satisfactory performance. In this paper, we present a framework of fast longest-name-prefix...
Internet has witnessed its paramount function transition from host-to-host communication to content dissemination. Named Data Networking (NDN) and Content-Centric Networking (CCN) emerge as a clean slate network architecture to embrace this shift. Pending Interest Table (PIT) in NDN/CCN keeps track of the Interest packets that are received but yet un-responded, which brings NDN/CCN significant features,...
This paper addresses the need for standard communication protocols for IoT devices with limited power and computational capabilities. The world is rapidly changing with the proliferation and deployment of IoT devices. This will bring in new communication challenges as these devices are connected to Internet and need to communicate with each other in real time. The paper provides an overview of IoT...
Internet Protocol version 6 (IPv6) is presently gaining demand in almost every region of the world. In near future, IPv6 would be the key area of research and expansion in the internet protocol standards. IPv6 was built with the aim of improving the mobility and communications among these devices. Mobile IPv6 is becoming a highly demanding research area under which a lot of investigations are yet...
We analyze the design space for implementing the Constrained Application Protocol (CoAP) within Content-Centric Networks (CCN), identifying several CoAP specific scenarios and seeing how they map to CCNs. We present an evaluation, recommendations for implementations and extensions, and directions for future work. Our key result is that while several protocol features and flows map naturally, some...
Our research group has proposed a VNT control method based on attractor selection. Since the number of attractors composing an attractor set is limited, it is important to decide what kind of attractors should be prepared. The existing method prepares attractors such that their topological characteristics are different from each other. However, since the existing method does not incorporate current...
Internet of Things (IoT) connects a large volume of devices together, via different modes of wired and wireless communication interfaces. The existing transport layer protocols, like TCP and UDP as well as their variants, lack functionality to handle the diverge and heterogeneous communication standards while ensuring the IoT transport requirements like short-lived packet or message transfer, short...
To better understand the Internet infrastructure services is crucial to the design, operation, and management of Internet applications. The lack of better understanding of the actual usage of allocated IP addresses is among many such challenges, due to the wide deployment of IP address multiplexing techniques, such as NAT. To address this issue, we propose a novel analysis approach based on large-scale...
IPv6 has become popular now-a-days among the ISPs, organization and end users because of its magnificent features and due to the limitation of IPv4. The migration from IPv4 to IPv6 is mandatory due to the address scarcity and security vulnerabilities of IPv4. But the deployment of IPv6 is far beyond satisfactory level in Bangladesh. So, a smooth as well as effective transition mechanism is needed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.