The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Community networks are a new, emerging form of organising local network access and access to the public Internet where people themselves operate and build their networks. However, little research has been performed on the stability of the resulting bottom-up infrastructure. In this work, the BGP behaviour of community networks is empirically studied by evaluating dumps of BGP messages from the AWMN...
NoC based high performance MP-SoCs can have multiple secure regions or Trusted Execution Environments (TEEs). These TEEs can be separated by non-secure regions or Rich Execution Environments (REEs) in the same MP-SoC. All communications between two TEEs need to cross the in-between REEs. Without any security mechanisms, these traffic flows can face router attacks in REEs. Both routing table and routing...
Commercial community wireless networks usually rely on wireless donors to give away Internet access while at home in exchange for access while they are mobile. The donors who make up the network get nothing immediate in return for providing Internet access. In this paper, we explore automatic configuration for a model of community networks in which donors mesh with each other and can aggregate Internet...
Multi Protocol Label Switching (MPLS) Virtual Private Networks (VPNs) have seen an unparalleled increasing adoption in the last decade. Although their flexibility as transport technology and their effectiveness for traffic engineering are well recognized, VPNs are difficult to set up and manage, due to the complexity of configurations, to the number of involved protocols, and to the limited control...
Source-specific routing (not to be confused with source routing) is a routing technique where routing decisions depend on both the source and the destination address of a packet. Source-specific routing solves some difficult problems related to multihoming, notably in edge networks, and is therefore a useful addition to the multihoming toolbox. In this paper, we describe the semantics of source-specific...
Delay Tolerant Network (DTN) shows some features like link frequent interruptions, long delays, limited resources and so on, while nodes fight each other to win the network resources in the process of communication, which can lead to network congestion in delay tolerant network. Therefore, congestion control is a key issue in delay tolerant network research. The present congestion control strategies...
Border Gateway Protocol (BGP) is an exterior gateway classless path vector routing protocol. It is a routing protocol operated to exchange routing information among different autonomous system over the internet. BGP hold multitudinous unprotected security, since it works with the received information from neighboring routers which could be wrong sometime. Routing is the backbone of any network, the...
Increasing numbers of service providers have tended to use tens of geographically dispersed datacenters in recent years. Thus, a major unmet challenge is efficiently transferring data among multiple datacenters in different domains. Traditional single-path transfer mechanism based on BGP has limited reliability and low link utilization; therefore, multi-path inter-domain flow transfer mechanisms have...
Service implementation is done for providing different services to the customer. Layer3 virtual private network implementation using IPv4 and IPv6 routing protocol is done and with this policy is implemented using MP-BGP as exterior gateway protocol. Layer 3 virtual private network in internet protocol version 6 is known as 6VPE technology, which is implemented using BGP and layer 3 VPN (VPRN for...
Named Data Networking (NDN) is a proposed information-centric design for the future Internet architecture, where application names are directly used to route requests for data. This key component of the architecture raises concerns about scalability of the forwarding system in NDN network, i.e., how to keep the routing table sizes under control given unbounded nature of application data namespaces...
A large number of technologies have proved the possibility of fast convergence. However the most difficult part is not guarantee the convergence speed but how to control it properly. In this paper, we proposed a scheme to configure parameters of routing protocol based on the real-time network state evaluation. The goal is to adjust the pace of routing convergence according to the different importance...
The vast majority of current Internet usage is data retrieval and information exchange. As a result, the focus has been shifted from the current location-based system to an Information-Centric system, where information can be cached and accessed from anywhere within the network rather than from the end hosts only. To support this functionality, data must be uniquely identified regardless of the location...
IP spoofing based attacks remains a serious and open security problem due to the fact that the current Internet implements no source address authentication mechanisms. A series of anti-spoofing practices have long been proposed while their actual implementation seems far from satisfactory. Route based filters were extensively studied in the design of Inter-AS source address validation methods. Traditional...
Named Data Networking (NDN) is an entirely new internet architecture inspired by years of empirical research into network usage. NDN is related to Content Centric Networking. Unique feature of NDN is its adaptive forwarding plane. In NDN, the packets carry the data name instead of the source and destination address. In NDN, communication takes place by the exchange of Interest and Data packets. Data...
Social media is essential to many consumer services nowadays. To enhance applicable areas, we propose a novel robust mobile communication system even for the case that public wireless network is not sufficiently available, such as in a big event where a large number of people participate or in a disaster situation. We have developed a novel routing method to overcome the technical problems in terms...
In spite of their commercial success, Cloud services are still subject to two major weak points: data security and infrastructure resiliency. In this paper, we propose an original Cloud network architecture aiming at improving the resiliency of Cloud network infrastructures interconnecting remote datacenters. The main originality of this architecture consists in exploiting the principles of Software...
Snapshots of the Forwarding Information Base (FIB) in Internet routers can be compressed (or aggregated) to at least half of their original size, as shown by previous studies. However, the permanent stream of updates to the FIB due to routing updates complicates FIB aggregation in practice: keeping a (near-)optimally aggregated FIB in face of these routing updates is algorithmically challenging. A...
A route leak can be defined as a security gap that occurs due to the infringement of the routing policies that any two Autonomous Systems (ASes) have agreed upon. Route leaks are seemingly simple, but hard to resolve since the ASes keep their routing policies confidential. Indeed, the traditional palliatives, such as the utilization of route filters, are no longer used by a large number of ASes, given...
Integrated Internet-MANET (IIM) architecture is a hybrid network which is an interconnection of the wired Internet and wireless MANET. This interconnection is facilitated through gateways. Some of the important issues in this integration are gateway discovery and gateway load balancing. So far, these issues have been addressed separately in the literature. The issues of gateway load balancing and...
This paper presents Griffin, a scheme of geometric routing on flat names to conduct massive content distribution and retrieval. A tree-based metric space T is proposed according to the concept of hierarchical division of symbol space. In Griffin, the network topology is embedded into the T-space, and content names are mapped to the T-space. Content publication and retrieval are supported by geometric...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.