The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet eXchange Points (IXPs) serve as landmarks where many network service providers meet to obtain reciprocal connectivity. Some of them, especially the largest, offer route servers as a convenient technology to simplify the setup of a high number of bi-lateral peerings. Due to their potential to support a quick and easy interconnection among the networks of multiple providers, IXPs are becoming...
In this paper, a comparison of Internet of Things protocols used for data transfer in Internet of Things constrained networks is presented. Setting up such a network with a large number of physical interconnected IoT devices can be a challenge. In the IoT world, one of the key challenges is to efficiently support M2M communication in constrained networks. This can be achieved using MQTT (Message Queuing...
Content Delivery Networks (CDN) are witnessing the outburst of video streaming (e.g., personal live streaming or Video-on-Demand) where the video content, produced or accessed by mobile phones, must be quickly transferred from a point to another of the network. Whenever a user requests a video not directly available at the edge server, the CDN network must 1) identify the best location in the network...
Wikipedia is one of the most popular information platforms on the Internet. The user access pattern to Wikipedia pages depends on their relevance in the current worldwide social discourse. We use publically available statistics about the top-1000 most popular pages on each day to estimate the efficiency of caches for support of the platform. While the data volumes are moderate, the main goal of Wikipedia...
This paper presents an IPv4/IPv6 communication method in virtual machine environment called Virtual IVI. The purpose is to find an easy way to translate IPv4 service into IPv6 service in datacenter with less hardware change and less applications modification in IPv4 servers. The proposed new mechanism is based on IVI technology which is a stateless IPv4/IPv6 translation technique developed by China...
Current networks have much limitations due to their rigidity, which is given by static configurations mainly based on commands or static scripts. The resource provisioning is less automatic and the efficiency decreases. Moreover, virtualization and cloud are changing radically the traffic patterns of the data center. This is mainly due to the communication between servers, because the applications...
Current networks have much limitations due to their rigidity, which is given by static configurations mainly based on commands or static scripts. The resource provisioning is less automatic and the efficiency decreases. Moreover, virtualization and cloud are changing radically the traffic patterns of the data center. This is mainly due to the communication between servers, because the applications...
Security, interoperability, scalability, and mobility support are key challenges for the Internet of Things (IoT). Information Centric Networking (ICN) is an emerging paradigm for the Future Internet design that brings all the potential to face these challenges thanks to name-driven networking primitives. As a matter of fact, ICN natively supports multicast, mobility, content oriented security, and...
The denial of service attack is the most powerful damaging attacks used by hackers to harm a business or organization. This attack is one of most dangerous cyber-attacks. It causes service outages and the loss of millions, depending on the time of attack. In past few years, the use of the attack has enlarged due to the accessibility of free tools. This tool can be blocked simply by having a good firewall,...
Internet plays a significant role that it has helped the mankind to be advanced. One of the remarkable applications of Internet is the feature that enables to download any form of data. In order to accomplish it, devices are required that has specific functions. When a PC works for downloading purpose, it uses all its resources, though they are not wholly required and leads to large power consumption...
The Technology is increasing day by day. Modern technology gives better solution to busy working people. Now a days, houses are equipped with variety of appliances like personal computer, switches, doorbells, Ovens, Televisions, LED lighting, Water heaters, HVAC (Heating, Ventilation, & Air Conditioning)etc. It becomes difficult to monitor all the appliances at a time. Sometimes if no one present...
As technology rises in innovation and proliferation in the present times, with everyday life melding into the digital realm, so too rise the dangers and threats that such a digital dimension presents. In an age where cyber space has become so synced with physical lives, we must learn the need for cyber security and endeavor to propagate awareness for the same. In this paper, we explore and summarize...
The emerging technologies in IoT unveils various devices for the convenience of users, but comes with the price of streaming and processing a large amount of data for delivering useful and presentable results. Especially the multimedia content can be estimated as the most expensive to compute and distribute in IoT environments due to the data size and complexity of algorithms. This may cause bottlenecks...
Over the years cybercriminals have misused the Domain Name System (DNS) – a critical component of the Internet – to gain profit. Despite this persisting trend, little empirical information about the security of Top-Level Domains (TLDs) and of the overall 'health' of the DNS ecosystem exists. In this paper, we present security metrics for this ecosystem and measure the operational values of such metrics...
Distributed Denial of Service (DDoS) attacks employing reflected UDP amplification are regularly used to disrupt networks and systems. The amplification allows one rented server to generate significant volumes of data, while the reflection hides the identity of the attacker. Consequently this is an attractive, low risk, strategy for criminals bent on vandalism and extortion. To measure the uptake...
Huge amount of data with both space and text information, e.g., geo-tagged tweets, is flooding on the Internet. Such spatio-textual data stream contains valuable information for millions of users with various interests on different keywords and locations. Publish/subscribe systems enable efficient and effective information distribution by allowing users to register continuous queries with both spatial...
Connected moving objects with location sensors form the world of the Internet of Moving Things. This world includes people, animals, vehicles, drones, and vessels, to name a few. The conventional spatial libraries including Microsoft SQL Server Spatial (SqlSpatial) are primarily developed to evaluate spatial operations on stationary things. When it comes to real-world applications for the Internet...
The WTFast's Gamers Private Network (GPN®) is a client/server solution that makes online games faster. GPN® connects online video-game players with a common game service across a wide-area network. Online games are interactive competitions by individual players who compete in a virtual environment. Response time, latency and its predictability are keys to GPn® success and runs against the vast complexity...
Although people think that their identity is not revealed on the internet, the confidentiality and protection of personal information on unreliable networks such as the internet is an important question. In this study, a sample application on network packet tracing and analysis of network cameras with Wireshark program is realized to show how partial access to personal information and location information...
Content delivery networks are a key infrastructure component used by Video on Demand (VoD) services to deliver content over the Internet. We study a content delivery system consisting of a central server and multiple co-located caches, each with limited storage and service capabilities. This work evaluates the performance of such a system as a function of the storage capacity of the caches, the content...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.