The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a novel hardware architecture based on static random access memory (SRAM) for longest prefix match (LPM) search scheme to achieve wire speed IP processing. The central idea of this architecture is to store the IP prefixes virtually in routing table. To virtually store IP prefixes, we reserve only a single bit per prefix irrespective of their lengths. The proposed architecture consumes...
Detecting heavy activity aggregation in data streams is a critical task for many networking, data base and data-mining applications. The aggregation points often belong to hierarchical domains (e.g. IP domain, XML data tree, etc.). These aggregation points are referred to as hierarchical heavy hitters. The hierarchical domains is usually very large with respect to both the number of aggregation points...
Providing robust content delivery service, such as Video on Demand, with efficient wireless resource usage is important for mobile users. To achieve this, we have proposed a proactive content caching scheme utilizing transportation systems (e.g., train.) Because our previous prototype is immature and has a scalability issue, in this paper, we introduce efficient transmission mechanism of Interest...
By improvements of ICT (Information and Communications Technologies), a lot of advanced high speed communication standards such as 3G (3rd generation mobile telecommunications), LTE (Long Term Evolution) and High speed WLAN (Wireless Local Area Network) have been developed. Recently, most devices destined for consumer use, equip more than one communication interface based on the above high speed communication...
With the soar of Software Defined Networking planning a network service becomes harder of a task than ever before. Selecting traditional network elements that provide the best value for money given the performance requirements and the allocated budget is not the only option today: one might also take the software solution on generic hardware alternative. The problem is that the set of available solutions...
Online Social Network(OSN) has become an important platform where people share their life and opinions nowadays, which is followed by security problems especially privacy leakage. Contents generated by OSN users can be browsed and shared by friends or even strangers, which may contain their privacy information and leads to a high risk of privacy leakage. However, traditional DPI mechanism, such as...
Data offloading on unlicensed band is one of the significant solutions in the era of the mobile traffic explosion. To utilize spectrum resource on unlicensed band, it is required to fairly coexist with other devices which are operating in the same channel. It can be achieved all secondary users to comply with channel access mechanism. In this paper, we analyze the frame based and load based channel...
This paper investigates the wireless mesh IP video surveillance models and evaluates their performance in terms of throughput, End-to-End delay and jitter. Wireless Mesh Network consists of either a wireless or wired backbone network from which Mesh Gateways (MGs), Access Points (APs), wireless Mesh Routers (MRs) and Mesh Client (MCs) are linked together through carefully designed topologies. WMN...
This paper presents implementation of a reactive base station selection scheme for millimeter-wave (mmWave) communications. In mmWave communications, the frame loss rate increases and the throughput sharply decreases when a pedestrian blocks a line-of-sight (LOS) path. To alleviate this human blockage problem, base stations can be selected so as to maintain LOS paths on the basis of communication...
4th Generation Long Term Evolution (4G LTE) networks are in commercial service in most countries around the globe, or about to be launched into commercial service. Given that LTE is about to become the global wireless technology of choice, these networks have to operate in any conceivable environment. In doing so, their backhaul transport is served by a wide variety of networks built on a mix of technologies...
This poster presents an extension to the currently limited Docker's networks. Specifically, to guarantee quality of service (QoS) on the network, our extension allows users to assign priorities to Docker's containers and configures the network to service these containers based on their assigned priority. Providing QoS not only improves the user experience but also reduces the operation cost by allowing...
Mobile IP (MIP) was created to enable users keeping the same IP address while traveling to a different network because the mobility function of MIP is performed on the network layer rather than the physical layer so that users can continue their connections without sessions or connections dropped and they remain similar to destination. Mobile IP is scalable for a large number of users and it is most...
Software-defined datacenters consolidate discrete hardware units into pools of abstract resource types that are dynamically allocated to the clients sharing the infrastructure. The allocation needs to be both fair to the clients and also make efficient use of the system resources. Unlike approaches that allocate individual resources independently, we propose a model for making integrated allocation...
This paper deals with a method to measure the quality of Giga Internet service. The existing method needs both remote servers and a client application when measuring Internet quality such as throughput(speed), delay and loss. On the other hand, the proposed method only needs a single-sided application which is installed in a personal computer(PC). The key technique is to use traffic loopback algorithm...
Distributed Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. In this paper, we study the impact of a UDP flood attack on TCP throughputs, round-trip time, and CPU utilization on the latest version of Windows and Linux platforms, namely, Windows Server 2012 and Linux Ubuntu 13. This paper also evaluates several defense mechanisms...
Internet traffic has been growing year-after-year for decades, but processing all that traffic through traditional IP routers has become an obstacle to further expansion. Router bypass has been introduced recently to overcome capacity limitations and processing costs of IP routers. With router bypass, a portion of traffic is provisioned to bypass the traditional router and is instead switched by the...
This paper addresses one serious SDN-specific attack, i.e., data-to-control plane saturation attack, which overloads the infrastructure of SDN networks. In this attack, an attacker can produce a large amount of table-miss packet_in messages to consume resources in both control plane and data plane. To mitigate this security threat, we introduce an efficient, lightweight and protocol-independent defense...
The rapid increase in data centre communication in recent years has led to a wave of interest in the problems that affect communications in the data centre environment. Many data centre applications rely on TCP/IP protocols for reliable data transport, which while successful for many Internet applications, does not integrate with and perform seamlessly in the data centre environment. One of these...
This paper analyzes the impact of transceiver impairments on outage probability (OP) and throughput of decode-and-forward two-way cognitive relay (TWCR) networks, where the relay is self-powered by harvesting energy from the transmitted signals. We consider two bidirectional relaying protocols namely, multiple access broadcast (MABC) protocol and time division broadcast (TDBC) protocol, as well as,...
Software Defined Network (SDN) has the ability to separate data plane from the control plane in a network. Visual Network Description (VND) is a GUI tool which helps to develop this network manually while simulation. With this tool, one can manually setup the required components in SDN and can define the properties of different links, switches and controllers attached with it for simulating this network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.