The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Border Gateway Protocol (BGP) has been the de facto inter-domain routing protocol since it was introduced. Its destination-based routing nature, which is not able to choose a specific end-to-end AS-level route, might overload some popular peering (or inter-AS) links, while making some others underused. This could result in congestion and cause service disruption. To cope with the issue of destination-based...
Education needs to provide the means and resources to respond to new forms of education in which Information and Communication Technologies are implicit. Teaching experiences that make innovative and creative use of technology underlie a series of common ideas and pedagogical approaches that seek to harness the full potential of these technologies, framed in a new culture of learning. These are called...
BBR is a recently proposed congestion control. Instead of using packet loss as congestion signal, like many currently used congestion controls, it uses an estimate of the available bottleneck link bandwidth to determine its sending rate. BBR tries to provide high link utilization while avoiding to create queues in bottleneck buffers. The original publication of BBR shows that it can deliver superior...
A large software project usually has lots of various textual learning resources about its API, such as tutorials, mailing lists, user forums, etc. Text retrieval technology allows developers to search these API learning resources for related documents using free-text queries, but it suffers from the lexical gap between search queries and documents. In this paper, we propose a novel approach for improving...
Smart objects (SOs) have been utilized widely to transform the physical environment around us to a digital world using the Internet of things (IoT) vision. Integrating a huge number of these devices into the Internet presents a significant necessity for an efficient discovery mechanism with high capability of an autonomous configuration and detection for theses devices and their provided services...
In this paper, we present an NDN-based architecture for the dissemination of roadside information to cars. Our focus is on flooding events which are often caused by severe weather which also impacts the communication infrastructure. We compare the performance of different message forwarding strategies in VANETs (Vehicular Adhoc Networks) through simulation. In addition, we analyze how our approach...
DDoS attack is one of the major concerns for network and cloud service providers, due to its substantial impact on revenue/cost and especially on their reputation. Also, network administrators are looking for solutions to manage voluminous data traffic. SDN is an emerging networking paradigm that provides a flexible network management. Hence, SDN is being widely adopted for wired, wireless, and mobile...
The current Internet architecture follows a hostcentric communication model, intended for machine to machine connection and message passing. Modern Internet users are mainly interested in accessing information by name, irrespective of physical location. Information centric networking (ICN) was developed to rethink Internet foundations. Innetwork caching is one of the main features of ICN. Studying...
The nature of Internet traffic has changed dramatically within the last few years, where a large volume of traffic is originated from mobile applications (known as apps), web based multimedia streaming, computation offloading like cloud computing and Internet of Things (IoT) etc. These types applications generate multiple parallel short lived end-to-end connections. However, the three major requirements...
Third-party libraries (3PLs) are widely introduced into Android apps and they typically request permissions for their own functionalities. Current Android systems manage permissions in process (app) granularity. Hence, the host app and the 3PLs share the same permission set. 3PL-apps may therefore introduce security risks. Separating the permission sets of the 3PLs and those of the host app are critical...
Nowadays, if one purchases a communication device it is typically equipped with a few network interfaces. Similarly, a professional service in the Internet is run via a couple of interfaces to avoid a single point of failure. Despite the existence of many transmission paths, most of data is expedited and received by the same interfaces. The remaining ones serve as backup only, according to the premises...
Many BitTorrent clients are using these networks as a video-on-demand service, taking advantage of the popularity and the enormity of the collection of media available. However, it is a common sense that transforming the swarms into an on-demand media service causes serious damage to the overall network performance, given that streamer clients modify the method of downloading determined in the protocol...
The development of the Internet and the emergence of smart devices have brought about significant changes in the existing shopping structure and shopping patterns, and have resulted in notable qualitative growth and development in everyday life of consumers. In particular, the shopping structure is changing in the form of an Omni Channel to maximize customer's purchase experience. However, since Omni...
We have tested a scheme that measures the quality of education (QoE) in the network engineering program through the progress, outcomes or any evidence of the capstone project. We use simple relations based on efficiencies but weighted and with ambiguities. For this end, the performance of students are quantified through the definition of events which are actions that can help weakly or substantially...
Undergraduates perform independent research or use research, regardless of their discipline. For most students, this work is part of a formalized experience. However, formalized training in research methods, biases, and disposition is rare; students acquire these skills through mentoring, modeling, and making mistakes, and in the context and content of the discipline. These methods are not ideal....
It is predicted that cryptocurrencies will play an important role in the global economy. Therefore, it is prudent for us to understand the importance and monetary value of such cryptocurrencies, and strategize our investments accordingly. One of the ways to obtain cryptocurrency is via mining. As solo mining is not possible because of the computational requirements, pool mining has gained popularity...
Over the past several years, billions of dollars have been invested globally to build out high speed networks for consumers and businesses alike. Today home internet speed of 100 Mbps are common with some areas offering home networking speeds of 1 Gbps. During the same time period, enormous compute capacity has been deployed in data centers at the core of the internet — primarily to deliver new services...
Understanding user behavior is essential for source optimization in mobile networks, including urban planning, road traffic engineering, and content distribution. In this paper, we take the first step to investigate the basic characterization of user behavior over 340,000 users of a 4G mobile network in a large metropolitan area. Our study is carried on from two aspects: mobility and application usage...
Video content makes up more than half of the world's Internet traffic, and this figure is expected to grow rapidly. New techniques that remove traffic redundancy have been shown to significantly improve network performance since many concurrent streams deliver the same video. These techniques employ smart routers that recognize duplicated video streams and merge them to reduce traffic redundancy....
Discussing medical concerns at various online forums is a worldwide trend that reveals how patients are becoming interested in medical education. There is a global trend of building online communities such as Patient-like-Me those patients use to learn from each other. The Internet penetration is continually increasing in developing countries in West Africa. However, there are not any existing studies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.