The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Content-Centric Networking (CCN) is a promising architecture in the current Internet, and has the potential to be a revolutionary innovation in the future Network. CCN has not broken away from the binding of physical location and content name, however, the content source mobility will remain a great challenge for CCN. In addition, the problem of the large overhead incurred during the handoff requires...
Software-Defined Networking (SDN) is a de-facto established approach that separates the packet switching functions of a device from its operational logic, which is controlled by a piece of software. Due to its potential for realizing new network architectures and services, a whole thread of scientific literature is devoted to SDN and its most adopted incarnation, OpenFlow. However, limited attention...
Change is necessary to update for IPV6 and evolution in Internet is inevitable, ever since the Internet was born. Internet protocols kept on improving and changing dramatically. They expose new challenges and new features. It's high time that our Internet address have to be upgraded as heap of thing around us got upgraded. Internet protocol is currently version 4 and is being upgraded to 6. Internet...
When facing in-field board test, the functional approach plays an important role. Often, it corresponds to forcing the processor to execute a test program (which could be an application one), observing the produced results (e.g., by looking at the results written in the memory at the end of the test program execution). However, the fault coverage that can be achieved in this way is often difficult...
Web Technology is the development of the mechanism that allows two or more computer devices to communicate over a network. To understand such a complex system there is a need of experiential learning. Authors adopted an "Experiential learning" for teaching the web technology course. Teaching with a hands-on session where the teacher explains the concepts with demonstration and students simultaneously...
Insider threats are a growing concern for industry, government, and campus networks. Yet, vulnerabilities inherent in Address Resolution Protocol (ARP) are exploitable by insiders seeking to launch sophisticated attacks on local area networks (LANs). Such attacks, initialized through ARP spoofing, include denial of service, server redirect, and man-in-the-middle attacks. Unfortunately, the current...
The concept of Software Defined Networking (SDN) has been successfully applied to efficiently configure and manage network infrastructure, e.g. in the context of data centres or WANs, and increasingly for ubiquitous communication. In this paper, we explore the idea of pushing SDN to the end-host. In particular, we consider the scenario of load balancing across multiple host network interfaces. We...
Current proposals for chaining service functions (SFs) do not address some critical management issues, such as the discovery of SF instances close to IP data paths. This information is crucial for deploying complex services both in large cloud networks, where SFs may be moved or replicated, and in the emerging fog/mobile edge computing systems. For this purpose, in this letter, we propose the distributed...
Heterogeneous multiprocessor SoCs (MPSoCs) are becoming very complex with greater demands for performance and low power. Advanced hardware techniques and involved software programming (>1000 registers) are employed to attain low/ultra-low power. Power management (PM) software development time is high. It is made worse with heavy rework when migrating across SoCs. In this paper we propose techniques...
Industrial control system (ICS) security has been a topic of research for several years now and the growing interconnectedness with enterprise systems (ES) is exacerbating the existing issues. Research efforts, however, are impeded by the lack of data that integrate both types of systems. This paper presents an empirical analysis of malicious activities aimed at integrated ICS and ES environment using...
In this paper, an implementation of state management for IPTV Set Top Box(STB) through UDP and WOL is presented. With the implementation, IPTV STB can be hibernated while TV is not being watched. Also, the STB can be waked up from remote site when required tasks have to be performed. So, the STB will be in low power consumption state while required tasks can be performed as necessary. Power consumption...
Hardware-assisted verification, or emulation, delivers the capacity and performance for extremely fast, full System-on-Chip (SoC) testing. Emulation enables longer test cases and more tests to be run in less time. In doing so, it allows more design requirements to be covered while more bugs are uncovered. However, emulation is no longer only about performance and capacity. The landscape is shifting...
Modern SoC designs incorporate several security policies to protect sensitive assets from unauthorized access. The policies affect multiple design blocks, and may involve subtle interactions between hardware, firmware, and software. This makes it difficult for SoC designers to implement these policies, and system validators to ensure adherence. Associated problems include complexity in upgrading these...
Characterizing software changes is fundamental for software maintenance. However existing techniques are imprecise leading to unnecessary maintenance efforts. We introduce a novel approach that computes a precise numeric characterization of program changes, which quantifies the likelihood of reaching target program events (e.g., assert violations or successful termination) and how that evolves with...
With the soar of Software Defined Networking planning a network service becomes harder of a task than ever before. Selecting traditional network elements that provide the best value for money given the performance requirements and the allocated budget is not the only option today: one might also take the software solution on generic hardware alternative. The problem is that the set of available solutions...
In military procurement, Commercial Off The Shelf (COTS) are becoming more and more common, with growing adoption of technologies derived from commercial standards. COTS are very appealing as they simplify procurement, allowing rapid deployment and cost savings. On the other hand, COTS usually need to be customized and adapted to the battlefield requirements, especially with respect to security and...
The prevalent use of systems-on-chip (SoCs) makes them prime targets for software attacks. Proposed security countermeasures monitor software execution in real-time, but are impractical, and require impractical changes to the internal logic of intellectual property (IP) cores. We leverage the software observability provided by the readily available SoC debug architecture to detect attacks without...
While big data analytics continue to grow in popularity among companies and organizations, their large-scale analytic implementations are often completed by software developers with little or no formal training in machine learning or data analysis. These developers are skilled at writing code but they do not have the understanding of the data analytics process to be efficient or necessarily accurate...
Recently, over 100 Gbit/s ultra-high-speed shared IP networks have become available. The large bandwidth they provide can be shared among various users to transmit not only data but also high-quality video through a virtualized network (VN) configured with software defined network (SDN) technology on the shared IP network. The VN can also be reconfigured in case there is not enough bandwidth for the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.