The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, along with the increasing popularity of multi-hop wireless networks, there has been a growing demand in the coupling of these networks to external ones such as the Internet. As traffic destined for external networks increases, special attention is required not only in gateway selection, but also in optimized routing and scheduling in order to maximize the network performance. In this...
In the current Internet landscape, a stub autonomous system (AS) could choose from a number of providers and peers to advertise its routes. However, the route selection may not always result in a best choice in terms of end-to-end path performance. Instead of having an AS to monitor all possible paths, we argue that it is much more effective and beneficial for a number of neighboring ASes to cooperate...
The ossification of Internet infrastructure and protocols have hindered the advancement of itself. GENI, AKARI and several other similar initiatives are pushing forward to overcome this hindrance. They facilitate researchers with networking platforms dedicated for innovative networking experiments. In these virtualized platforms, researchers can define their own forwarding schemes which can be radically...
A wireless mesh network (WMN) has been popularly researched as a wireless backbone for Internet access with off-the-shelf and inexpensive equipments. Nowadays, several applications like contents sharing, multicast video streaming, vehicular networks encourage to build mesh networks in urban areas. However, the deployment of WMNs in unlicensed bands of dense urban areas imposes many challenges. While...
This paper proposes an intelligent rate controller for the Internet traffic. Called the IntelRate (Intelligent Rate), it is a router-based controller and uses the fuzzy logic control approach to adjust the source sending rate based on the instantaneous queue size of the router. Unlike other explicit congestion control protocols, the IntelRate controller need not evaluate the link states (such as bottleneck...
Network survivability is an important topic for the Internet. To improve the performance of the Internet during failure, IP Fast Reroute (IPFRR) mechanisms are proposed to establish backup routes for failure-affected packets. NotVia, a most prominent one, provides 100% protection coverage for single-node failures. However, it brings in nontrivial computing and memory pressure to routers with special...
Dynamic, flexible and programmable network nodes will enable the key infrastructure for the Future Internet. Reengineering of the traditional router architectures is required in order to allow hardware- and vendor-independent routing functions and to design open and cost-effective service platforms. This paper presents a modular programmable router architecture to support multi-granular routing based...
This paper is focused on the analysis of energy-aware multi hop routing metrics for wireless environments which integrate heterogeneous devices that are carried or owned by Internet end-users. The paper gives our own (initial) perspective on how network energy-savings may be improved by considering not only a single (sender) node perspective, but also the perspective of its potential successors when...
The following topics are dealt with: optical Internet; nanophotonics; green ICT; solar cells; LED; wireless mesh and sensor network; and optical switching and routing.
This paper addresses the issues of automatic address and prefix configuration of MANET routers. Specifically, the paper analyzes the differences between “classic IP networks” and MANETs, emphasizing the interface, link, topology, and addressing assumptions present in “classic IP networks”. The paper presents a model for how this can be matched to the specific...
The process of categorizing packets into flows in an Internet router is called packet classification. All packets belonging to the same flow obey a predefined rule and are processed in a similar manner by the router itself. For example, all packets with the same destination IP address and protocol may be defined as a flow. Packet classification is the foundation of many Internet functions such as...
A mix is a communication proxy that hides the relationship between incoming and outgoing messages. Routing traffic through a path of mixes is a powerful tool for providing privacy. When mixes are used for interactive communication, such as VoIP and web browsing, attackers can undermine user privacy by observing timing information along the path. Mixes can prevent these attacks by inserting dummy packets...
A frequent subject in forums, academia and industry is the evolution of the Internet in terms of routing. Basically, the scalability in the Default Free Zone related to (1) the growing rate of the routing tables and (2) the convergence of the routing system, are pointed by routing experts as the main concerns of the current mechanism. Several approaches have emerged, but they normally require a mapping...
Wireless Mesh Networks represent a promising technology to provide wireless Internet connectivity over a large community. This new technology not only allows a fast, easy and inexpensive network deployment, but also enables many new applications including community-scale peer-based communication or sharing of network resources and services. In this work, we propose an effective publish/subscribe communication...
We present a novel resilient routing policy for controlling the routing across peering links between Internet carriers. Our policy is aimed at offering more reliability, dependability and better performance to the routing decision with respect to the current practice (e.g., hot-potato routing). Our work relies on a non-cooperative game framework, called Peering Equilibrium MultiPath (PEMP), that has...
Secure virtualization is the enabling technique to protect both network providers and user services. Particularly, secure routing in the virtualized service domains is one of the key research areas that has not been explored in literature. In this paper, we present a new secure routing framework to address both network-centric and user-centric networking service models for the future Internet. We...
We present a new Internet architecture based on de-conflated identities (ADI) that explicitly establishes the separation of ownership of hosts from the underlying infrastructure connectivity. A direct impact of this de-conflated Internet architecture is the ability to express organizational policies separately and thus more naturally, from the underlying infrastructure routing policies. Host or organizational...
In this paper, the dependency of length of burst losses on the packet inter-arrival time in Voice over Internet Protocol (VoIP) is analyzed and modeled using the semi-Markov process. The model helps in predicting future loss lengths for a given pattern of packet arrivals at the queue. A simulation testbed with Cisco routers was setup to study the effect of packet inter-arrival time on burst loss patterns...
This paper describes an architecture to support QoS flows in an OpenFlow environment with a centralized `controller' and many `forwarders.' The paper primarily focuses on the analytical framework for optimization of the QoS flow routing, and the functionality needed within the controller and forwarders to efficiently support QoS. We also describe the control layer messaging between the controller...
We present the design and evaluation of NPLA (Network Prefix Level Authentication), a system allowing source addresses to be validated within the network to the granularity of network prefix. Prefix routers use public key cryptography to insert NPLA headers in outgoing packets. En route entities holding the corresponding public key verify the source of a packet. NPLA provides deployment incentives...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.