The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Tracing denial-of-service (DoS) attacks back to their source is a difficult task for network administrators. The source of attacks, sometimes, comes from a single source or multiple sources that makes harder to an investigator to trace attackers back to their original computer. In order to make attacks more difficult to discover, sophisticated attackers could hide their original IP address by using...
The importance of the analysis and understanding of the network traffic has constantly been increasing due to insights that this provides towards determination of user behaviour and resource usage. The data analyses in order to determine the related parameters are performed by selection of a small subset of the complete flow data due to data privacy and heavy computational/memory load issues. That...
The introduction of coherent optics and wavelength division multiplexing (WDM) in telecommunication networks has led to unprecedented gains in backbone capacity. The increase in optical layer capacity inadvertently exacerbates the problem of traffic loss due to optical component failures. IP networks are designed over optical backbone networks, where each IP link traverses a multihop optical lightpath...
Handling link failures is the fundamental task of routing schemes. Routing protocols based on link state (e.g., OSPF) require a global state advertisement and re-computation when link failure happens, and will cause inevitable delivery failures. To improve the routing resilience without introducing significant extra overhead, we propose a new routing approach, Keep Forwarding (KF) to achieve k-link...
The system introduced here is an experimental study which helps in controlling the characteristics and ON/OFF states of a control valve. A graphical user Interface has been developed using supervisory control and data acquisition (SCADA) and the programming of the control system has been done using programmable logic control (PLC). A descriptive study has been incorporated in this paper to formulize...
Among various types of computer threats, botnet is the most serious one against cyber security as they provide several illegal activities such as denial of service attacks, spamming, click fraud and other type of espionage activities. A botnet is a network of infected computers called bots which are under the control of one person known as Botmaster. Botmaster will have full control over the compromised...
A cost effective surveillance robot which can be controlled from anywhere in the world if the user has an access to internet or a Wi-Fi. In this proposed model the system on board contains a camera for a live streaming, in which the video output will be in a browser so that the user need not install any software related to the surveillance robot, which provides and user friendly operation. In this...
Internet has become prime source of information to access. The access to information can be affected by DDoS attacks. Pool of available IPv4 addresses are in exhaustion. IPv6 addresses are now in use to some extent by the organization. Attacks in the form of DDoS attack reduces the availability of resources to minimum level. IDPM on IPv6 traceback technique will ensure that the source of attack will...
Cloud computing is offering efficacy oriented IT services to users throughout the world. It enables the hosting of assorted applications from user, scientific, commercial as well as business domains. The core inspiration following Cloud Computing is that the entire system can be controlled as well as worked using simply an HTTP client. The cloud user is required to have only a web based client to...
Link state IP protocols like OSPF and IS-IS work upon network state advertisements. Link state packets travel all over the network, advertising recent failure or changes in the network. It is IP router responsibility to execute the complex updating process which includes recalculating shortest paths and updating central and local forwarding tables. Since forwarding tables must be updated for forwarding...
This paper gives an explanatorily idea of connecting mobile phones in a same WIFI system using WLAN(Wireless Local Area Network) Access Point(AP) or P2P(Peer-to-Peer) connection system. By using this IP based local connection system, mobile phone users can share files, photos, send messages and even call other mobile device free of cost. The system will also have a feature to automatically detect...
Advances in optical communications and switching technologies are enabling energy-efficient, flexible, higher-utilization network operations. To take full advantage of these capabilities, the scope of optical circuit networks can be increased in both the vertical and horizontal directions. In the vertical direction, some of the existing Internet applications, transport-layer protocols, and application-programming...
Internet Protocol version 6 (IPv6) is the newest version of the protocol that is used for communications on the Internet. And it has been in existence for many years. But, currently many organizations have slowed their migration to IPv6 because they realize that the security considerations and products for IPv6 might be insufficient, they realize that they cannot deploy IPv6 without first considering...
In this work, we have investigated the processes required for visual extracting and the remote control of KUKA KR-125 industrial robot manipulator. For this purpose, the robot controller communicates with the external system via anEthernet cable IEEE 802.3. The exchanged data are transmitted thanks to TCP/IP Protocol. To do this, we performed a client/server application with all relevant motions control...
This paper describes how to build applications of productivity measurement internet bandwidth usage, which explains the use of the framework and variables from previous research, up to the application and database design, and design algorithms that will be used to obtain the values of any variables measurement. Framework and measurement variables will be used as the basis of business processes applications,...
LAN Chat Messenger (LCM) using VOIP offers zero cost communication among staffs in a company. Not limited to that, it is also allows them to chat, send files and free voice call. This study offers voice call and file transfer which helps to solve the communication issue especially on time and cost of the communication maintenance. The information exchange between individual becomes smoother and provides...
This is a short paper on the historical growth and spread of spam and Internet abuse, including telemarketing and mobile messaging spam, in India. Additionally, it covers current and proposed Indian law, and regulatory / law enforcement actions against cybercrime.
This paper presents a cheap and simple health monitoring system which is well applicable at home or in an institution. The system provides a good opportunity to gather and store health information about one or more observed patients. The collected information can help analyze the patient's state of heath. In the regularly gathered information the analyzer methods can search patterns which refer to...
Control system is the core of the smart home technology. The networking and informatization of smart home system all require it. This paper studies on a control system in smart home system based on ARM which includes two environments, LAN and WAN. Private IP is used in LAN environments, and dynamic domain name server (DDNS) which is provided by Peanut hull is used in WAN environments for control functions...
Cybercrime is all about the crimes in which communication channel and communication device has been used directly or indirectly as a medium whether it is a Laptop, Desktop, PDA, Mobile phones, Watches, Vehicles. The report titled “Global Risks for 2012”, predicts cyber-attacks as one of the top five risks in the World for Government and business sector. Cyber crime is a crime which is harder to detect...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.