The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Active Queue Management (AQM) algorithms have seen a lot of attention in recent academic literature as well as in the popular press. The problem with traditional AQM is that it is designed to operate on queues at the IP layer. However, the problem popularly called bufferbloat can move about among many queues some of which are resistant to traditional AQM such as Layer 2MAC protocols used in cable/DSL...
Providing secure communication has become an essential requirement for VoIP networks. To meet this requirement in a VoIP environment is more complex than in conventional data networks due to the implementation of realtime applications. Network traffic can be encrypted by many solutions. One of them is a widely used and standardized IPSec. During the experiments we have consequently tested the impact...
In software Defined Networking a Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attack is an attempt to make a machine or network resources unavailable for its intended users. Hence the need for protection of such network controller against attacks from within or outside a network is very much important. Although network devices in open flow can also be targeted by attackers and so...
Wavelength division multiplexing (WDM) appears to be the solution of choice for providing a faster networking infrastructure that can meet the explosive growth of the Internet. It has the scalability problem with increasing the access node numbers in WDM ring architecture, so we further propose the alternatives of hierarchical WDM ring architecture. Since the traditional IP provides the best effort...
In today's digital era with the development of various types of gadgets causes the growth of traffic and the number of internet service on the network. To provide the maximum monitoring system that can determine service availability, network conditions, uptime and downtime. Protocol monitoring system used in this research is the Simple Network Management Protocol (SNMP). Due to the use of SNMP protocol...
Cloud computing enables the provisioning of resources in a reliable and on-demand manner. With the increasing importance of the network bandwidth in the Cloud environment, the networking related resources need to be optimally allocated together with the traditional Cloud computing resources. In addition, the significant growth of the global data center traffic poses the challenge of supporting demands...
The use by a growing number of users of Cloud-based services requires an adaptation of the network technologies used to access them. We propose to combine two novel protocols at the state of the art at Cloud access middle-boxes to better profit from spare unused network path diversity. The first protocol, Multipath TCP, allows creating multiple TCP/IP sub flows, as much as needed. The second, the...
In this paper we present an approach to implement security as a Virtualized Network Function (VNF) that is implemented within a Software-Defined Infrastructure (SDI). We present a scalable, flexible, and seamless design for a Deep Packet Inspection (DPI) system for network intrusion detection and prevention. We discuss how our design introduces significant reductions in both capital and operational...
The need for the development and use of a Network Management System (NMS) arises ipso facto that a typically huge network incorporates a huge number of interlinked network components for the transfer of data across channels making it essential to ensure the up keeping of such components for an uninterrupted communication. Such large scale deployment of components makes it tricky for an individual...
Distributed Denial of Service (DDoS) attacks are the major concern for the security experts. DDoS attack presents a serious risk to the internet. In this type of attack a huge number of accommodated targets send a request at the victim's site simultaneously, to exhaust the resources (whether computing or communication resources) within very less time. In the last few years, it is recognised that DDoS...
The paper presents a control-theoretic approach to the design of a rate oscillation cancellation module. The main objective was to develop an effective method applicable to an audiovisual streaming system operating in an IP network. The proposed discrete-time nonlinear model represents functions of a real stream adaptation system based on the widely used RTP/RTCP protocol set. The paper demonstrates...
This paper presents an innovative control based Traffic Controller which provides at sharing a single resource, namely the available bit rate, among a set of IP flows characterized by different Quality of Service (QoS) requirements. The main novelty behind the proposed Traffic Controller is that it relies on an original control based approach which exploits a closed-loop architecture and a fuzzy tuner...
EVS is expected to fill the large gap between the quality and capacity currently available and those expected for 4G, and beyond, mobile communications systems. The large bit-rate and bandwidth ranges, and the complex structures of the new codec make it challenging to deploy and operate. In this paper, we explain how EVS is systematically integrated into the VoLTE ecosystems, outlining session negotiation...
This paper presents an analysis of a rate adaptive multimedia streaming technique according to which rate changes are obtained by varying the inter-packet transmission interval, rather than altering the source coding rate. Instead of constraining the transmitter to operate in real-time, the time scale of the proposed packet scheduler can vary between zero when the network is congested, to as faster...
Internet Service Providers (ISPs) need to cope with a growing amount of over-the-top (OTT) traffic, often without a share in the high revenues of the content providers. To achieve an efficient global delivery of content, today content providers usually employ content delivery networks (CDNs) located at the edge of ISP networks from where content is delivered to end users via IP unicast. Many OTT services...
The rapid traffic growth fueled by mobile devices spread and high speed network access calls for substantial innovation at network layer. The content-centric nature of Internet usage highlights the limitations of the host-centric model in coping with dynamic content-to-location binding, mobility, multicast, multi-homing, etc. If transmission capacity speedups in the backhaul may hide inefficiencies...
In this paper we propose classical control theory to look at the end-to-end congestion control algorithm used by the Transmission Control Protocol/Internet Protocol (TCP/IP). By using this approach we show that classical control modeling using Laplace transforms and Smith's principle give a simple and rigorous model of the role played by congestion window and advertised window variables in today's...
About 5 years ago Content Centric Network (CCN) has a role in the communication on diverse devices which had made bandwidth in backbone traffic was rapidly increasing until now, there was a problem in CCN number of users and devices is connected in network increases. We thus propose a new technique to manage bandwidth between backbone traffic and Content Centric Network that combined the concept of...
The Wi-Fi technology has been fast growing and available on a huge number of electronic devices. Moreover, due to the easiness in deployment a Wi-Fi user is normally in the coverage of several surrounding Wi-Fi access points (APs). The Wi-Fi virtualization, which abstracts a Wi-Fi interface to appear as several virtual ones to the user, is one of the most significant current approaches in improving...
When statistical multiplexing is used to provide connectivity to a number of client hosts through a high-delay link, the original TCP as well as TCP variants born to improve performance on those links often provide poor performance and sub-optimal QoS properties. To guarantee intra-protocol fairness, inter-protocol friendliness, low queues utilization and optimal throughput in mission-critical scenarios,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.