The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The growing demand for video streaming is straining the current Internet, and mandating a novel approach to future Internet paradigms. The advent of Information-Centric Networks (ICN) promises a novel architecture for addressing this exponential growth in data traffic, with ubiquitous caching to facilitate video delivery. In this paper, we present a novel in-network video caching policy in ICN, named...
Internet playing most efficient part in today's interchangeable infrastructure but it has been observed that IP networks affected with common network failures which cause the cautious concurrence of routing protocols after network failures, whereas several of the proposals available with high network availability regardless of failures, but existing proposals actively handle only single failure and...
The inter-domain routing protocol of the Internet, i.e., Border Gateway Protocol (BGP), is vulnerable to malicious attacks. Although many security solutions for BGP have been proposed, they have mainly focused on topology-based security. Policy-based security has largely been overlooked—a severe concern especially since BGP is a policy-based routing protocol. In this paper, we present an Expectation...
In challenged networks, such as opportunistic networks or Delay Tolerant Networks (DTNs), due to frequent network partition an end-to-end connection between source and destination may not always be possible due to nodes move unpredictably with high speeds. For such type of networks, traditional routing protocols fails to transmit and also no guarantee on delivery of data to specified destination because...
Named Data Networking (NDN) is a novel architecture expected to overcome limitations of the current Internet. User mobility is one of the most relevant limitations to be addressed. NDN supports consumer mobility by design but fails to offer the same level of support for producer mobility. Existing approaches to extend NDN are host-centric, which conflicts with NDN principles, and provide limited support...
Today one cannot think of life without the Internet. The Internet has grown at a very fast pace, which has resulted in heavy Internet traffic. Most of today's internet traffic is due to video streaming services such as YouTube and Netflix. The Average traffic load has risen, and data traffic patterns have also become unpredictable. Therefore, network traffic monitoring and analysis have become essential...
IPv6 over low power wireless personal area network (6L0WPAN) is promising to be used in many different IoT applications. Recently, many protocols have been proposed for 6LoWPAN networks such as RPL routing protocol which is developed by the ROLL working group and expected to be the standard routing protocol for 6LoWPAN. Many problems are facing 6LoWPAN as it connects to the Internet such as congestion...
Cooperation between Wireless Sensor Networks (WSNs) is needed in order to fully realise the vision for the Internet of Things (IoT). As endeavours towards IoT continue, compatibility and interoperability between distinctive networks in WSNs becomes crucial. However, considering the wide range of WSN applications, heterogeneity in the platforms and communication protocols in use is potentially unavoidable...
Mobile ad hoc networks (MANETs) are self-configuring, dynamically adaptable networks of heterogeneous devices, some of which can assume the role of routers. Meanwhile, mobile computing is an increasingly pervasive technology worldwide, thus positioning MANETs as a very suitable technology for disaster scenarios. This article addresses the problem of guaranteeing a minimum operational infrastructure...
Traceroute is widely used, from the diagnosis of network problems to the assemblage of internet maps. However, there are a few serious problems with this tool, in particular due to the presence of load balancing routers in the network[1]. We provide a new publicly-available traceroute, called Paris traceroute, which controls packet header contents to obtain a more precise picture of the actual routes...
The smart grid (SG) is widely acknowledged asthe new solution to be developed to handle distributed network fighting against the increase of renewable energy. Wireless Sensor Networks (WSNs) have been extensively recognized as a promising technology that can improve various aspects of electrical models today as smart grid. Hence, WSNs are well suited for applications based on this type of communication...
The Internet is often thought to be a model of resilience, due to a decentralised, organically-grown architecture. This paper puts this perception into perspective through the results of a security analysis of the Border Gateway Protocol (BGP) routing infrastructure. BGP is a fundamental Internet protocol and its intrinsic fragilities have been highlighted extensively in the literature. A seldom studied...
Internet Protocol version 6 (IPv6) was standardized more than a decade and a half ago even then the security associations has not yet gained its momentum. IPv6 nodes use the Neighbor Discovery Protocol (NDP) to discover other link local address on the link, NDP covers host initialization and address auto configuration. IPv6 mandates to support Internet Protocol Security (IPSec). However, this security...
With this paper we bring forward a composite network of VANET and cellular network. The benefits of this composite network consist of firstly the high speed of transmission of VANET and secondly the large scale cellular system. Also, this network overcomes the drawbacks of the cellular and ad-hoc network. For maintaining several features of ITS (Intelligent Transportation System) applications routing...
The popular method for MANET to access the Internet is choosing some gateways through which MANET can act as a subnet of the Internet. In these solutions, gateways will be the bottleneck of the whole network. Meanwhile, gateway selection and handoff are also the problems. Since aforesaid problems, a new protocol was implemented on embedded devices based on iAODV, and route optimization and link failure...
Sybil attack is useful for mitigating P2P botnets, and the effect depends mainly on influence of Sybil nodes. However, how to improve influence of Sybil nodes is still a problem rarely studied. Taking Kademlia based botnets as the research object, we proposed a method to improve influence of Sybil nodes in P2P botnets. We constructed a testing system based on Planetlab and KAD network, and conducted...
Communication infrastructures under the influence of the disaster strike e.g., earthquake, will be partitioned due to the damage of components such as base stations. The communication model of the Internet bases on a location-oriented ID, i.e., IP address, and depends on the DNS (Domain Name System) for name resolution. Therefore such damage remarkably deprives the reachability to the information...
In emerging non-safety unicast applications of vehicular ad hoc networks (VANETs) such as Internet Access, Content, Map, or Database Download (CMDD), end-to-end and connection-oriented transmission control must be employed to guarantee a desired level of performance. It is envisioned that in the future, these non-safety applications will involve several concurrent flows. Providing a fair distribution...
The Content-Centric Network (CCN), as a promising communication architecture for future networks, is still facing many challenges. In CCNs, it is difficult for the routing protocols, evolved from the proactive routing protocols in the current Internet, to discover temporary content replicas spread in router caches in time. This paper proposes a perceptive forwarding strategy (PFS) to perceive closer...
Software Defined Network is a new paradigm in data communication networks. In contrast to the traditional internet network, SDN separates the control function and the function forwarding. SDN controller operates on the principle of a centralized logical controller. This centralized control causes the controller to have a global network knowledge so that SDN can be more effective in managing the network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.