The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to accretion demand and size of the contents makes today's Internet architecture inefficient. This host centric model does not seem effective to cater current communication needs where users focus on desired content. As a result, translation between content information and networking domain should take place, typically consisting of an establishment of a delivery path between the content provider...
NoC based high performance MP-SoCs can have multiple secure regions or Trusted Execution Environments (TEEs). These TEEs can be separated by non-secure regions or Rich Execution Environments (REEs) in the same MP-SoC. All communications between two TEEs need to cross the in-between REEs. Without any security mechanisms, these traffic flows can face router attacks in REEs. Both routing table and routing...
In this paper, we outline the recent efforts of our research in defense against Distributed Denial of Service (DDoS) attacks. In particular, we present a novel approach to IP traceback, namely Unique Flow Marking (UFM), and we evaluate UFM against other marking schemes. Our results show that the UFM can reduce the number of marked packets compared to the other marking schemes, while achieving a better...
Commercial community wireless networks usually rely on wireless donors to give away Internet access while at home in exchange for access while they are mobile. The donors who make up the network get nothing immediate in return for providing Internet access. In this paper, we explore automatic configuration for a model of community networks in which donors mesh with each other and can aggregate Internet...
Multi Protocol Label Switching (MPLS) Virtual Private Networks (VPNs) have seen an unparalleled increasing adoption in the last decade. Although their flexibility as transport technology and their effectiveness for traffic engineering are well recognized, VPNs are difficult to set up and manage, due to the complexity of configurations, to the number of involved protocols, and to the limited control...
Source-specific routing (not to be confused with source routing) is a routing technique where routing decisions depend on both the source and the destination address of a packet. Source-specific routing solves some difficult problems related to multihoming, notably in edge networks, and is therefore a useful addition to the multihoming toolbox. In this paper, we describe the semantics of source-specific...
Delay Tolerant Network (DTN) shows some features like link frequent interruptions, long delays, limited resources and so on, while nodes fight each other to win the network resources in the process of communication, which can lead to network congestion in delay tolerant network. Therefore, congestion control is a key issue in delay tolerant network research. The present congestion control strategies...
Border Gateway Protocol (BGP) is an exterior gateway classless path vector routing protocol. It is a routing protocol operated to exchange routing information among different autonomous system over the internet. BGP hold multitudinous unprotected security, since it works with the received information from neighboring routers which could be wrong sometime. Routing is the backbone of any network, the...
Future home networks are expected to become extremely sophisticated, yet only the most technically adept persons are equipped with skills to manage them. In this paper, we provide a novel solution as to how complex smart home networks can be collaboratively managed with the assistance of operators and third party experts. Our solution rests in separating the management and control functionalities...
Increasing numbers of service providers have tended to use tens of geographically dispersed datacenters in recent years. Thus, a major unmet challenge is efficiently transferring data among multiple datacenters in different domains. Traditional single-path transfer mechanism based on BGP has limited reliability and low link utilization; therefore, multi-path inter-domain flow transfer mechanisms have...
This paper provide a variety of services through multiple service classes where each service class will provide a different performance in terms of response time. These service classes will be designed to provide appropriate levels of service to user applications. Different classes of services and the packets between different classes are classified as per the application request and study and analysis...
Service implementation is done for providing different services to the customer. Layer3 virtual private network implementation using IPv4 and IPv6 routing protocol is done and with this policy is implemented using MP-BGP as exterior gateway protocol. Layer 3 virtual private network in internet protocol version 6 is known as 6VPE technology, which is implemented using BGP and layer 3 VPN (VPRN for...
Named Data Networking (NDN) is a proposed information-centric design for the future Internet architecture, where application names are directly used to route requests for data. This key component of the architecture raises concerns about scalability of the forwarding system in NDN network, i.e., how to keep the routing table sizes under control given unbounded nature of application data namespaces...
A large number of technologies have proved the possibility of fast convergence. However the most difficult part is not guarantee the convergence speed but how to control it properly. In this paper, we proposed a scheme to configure parameters of routing protocol based on the real-time network state evaluation. The goal is to adjust the pace of routing convergence according to the different importance...
The vast majority of current Internet usage is data retrieval and information exchange. As a result, the focus has been shifted from the current location-based system to an Information-Centric system, where information can be cached and accessed from anywhere within the network rather than from the end hosts only. To support this functionality, data must be uniquely identified regardless of the location...
IP spoofing based attacks remains a serious and open security problem due to the fact that the current Internet implements no source address authentication mechanisms. A series of anti-spoofing practices have long been proposed while their actual implementation seems far from satisfactory. Route based filters were extensively studied in the design of Inter-AS source address validation methods. Traditional...
It is a well-known fact that the Internet traffic travels through public networks and these networks are vulnerable and congested. Whenever an error in a packet is detected, the packet should be retransmitted back to the receiver to reduce/overcome the data loss. Automatic repeat request (ARQ) method is a well-known data retransmission method used by protocols such as Transmission Control Protocol...
Internet routers are a commons. While modest regulatory measures have generally been successful for Information Communication Technologies (ICT), this paper argues that the lack of regulation has hindered the technological evolution of the Internet in some areas. This issue is examined through five Internet problems, and the technological solutions adopted. The key contribution of this paper is the...
Information Centric Networks (ICN) has emerged as a new Internet paradigm where the users are being provided seamless access to contents rather than the host as in classical approach. For ICN realization, the current Internet requires architectural changes. These changes must be incorporated such that existing applications continue running without any difficulties. In this paper, we introduce a novel...
Named Data Networking (NDN) is an entirely new internet architecture inspired by years of empirical research into network usage. NDN is related to Content Centric Networking. Unique feature of NDN is its adaptive forwarding plane. In NDN, the packets carry the data name instead of the source and destination address. In NDN, communication takes place by the exchange of Interest and Data packets. Data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.