The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Host identification, today, can be done at many layers of the network protocol stack depending on the identifiable parameter used for classification. But, these generally include fields from TCP/IP/MAC packets; that can be spoofed or manipulated very easily to misguide the identification process or include intolerable error into. Identification on wireless networks can be done with better precision...
CUBIC TCP is an enhancement over BIC (Binary Increase Congestion Control) with a cubic window growth function. It has been optimized for high bandwidth-delay product environments and has been the default TCP implementation in Linux since kernel-2.6.18. In this paper, we conduct an experimental evaluation of CUBIC TCP in a small buffer regime; i.e. buffers of the order of a few tens of packets. The...
On one hand, the convergence of the Internet, Telecommunication and Broadcasting is generating new services over the Internet, and on the other hand, the online experience is getting improved via the introduction of user profile mobility and web session mobility. While different architectural schemes for HTTP session mobility have been proposed and implemented in the academia, the industry has introduced...
The availability of multimedia contents to be played back while driving constitutes an added value to both drivers and passengers, improving the travel experience. These contents can be already on-board, diffused through broadcast networks or delivered on demand by servers as data streams. Vehicular ad-hoc networks allow envisaging a new way to access multimedia contents based on epidemic data dissemination,...
Rapid OS deployment has always been a challenging task in enterprise data center environments. In particular, deploying hundreds of thousands of systems is necessary to automate the installation process. This paper describes BitTorrent-based OS provisioning method to afford large-scale data centers. It can save the time necessary for installing and deploying operating systems and software.
Application migration is a promising technique to enable users of computational devices to continue a task even though the executing device changes. One key challenge to realise application migrations is to maintain the network sessions in case a network based application is migrated. This article presents a solution to maintain network sessions in application migration scenarios. We develop a prototype...
We study how much energy can be saved by reshaping audio streaming traffic before receiving at the mobile devices. The rationale is the following: Mobile network interfaces (WLAN and 3G) are in active mode when they transmit or receive data, otherwise they are in idle/sleep mode. To save energy, minimum possible time should be spent in active mode and maximum in idle/sleep mode. It is well known that...
A novel SQL Tunnelling system to allow communication with an SQL database is developed by utilising the standard Internet protocol HTTP. The communication with the database is allowed by a client interacting with a Web Service running on a standard off-the-shelf HTTP Server. With this tunnelling system, access to a database can be provided without providing access to the database native communication...
Botnets are a combination of cyber attack, infection, and dissemination, and they become one of the most severe threats on the Internet. Cross the Internet, the infected host might launch any kind of attacks such as DDoS (Distributed Denial-of-Service) or Phishing. Comparing with botnets using other command-and-control (C&C) channels, web-based botnets are difficult to detect, because the C&C...
Malicious attackers intended to annihilate the availability of network server with threats such as Transmission Control Protocol (TCP) Synchronized (SYN) Flood. The attackers usually make the server exhausted and unavailable in order to complete the TCP three-way handshake mechanism. Detecting TCP SYN Flood in the Hypertext Transfer Protocol (HTTP) is the main problem in this paper. Anomaly detection...
During the last decades TCP and the networks it is used in steadily evolved. To aid further development it is crucial to give researchers measurement tools so they can evaluate and analyze their TCP modifications in real world network environments. In this paper we introduce the new measurement tool flowgrind. Unlike existing measurement tools, flowgrind's distributed architecture allows for an easy...
Improving video streaming performance is a main target today for the development of services and related business opportunities in the Internet. For this reason the definition of an efficient video transport paradigm is yet a challenging task. The most common protocol for data transmission in the Internet is TCP but it has been widely believed not suitable for multimedia streaming because of bandwidth...
A finite state machine contains a finite number of states and produces outputs on state transitions after receiving inputs. Finite state machines are widely used to model systems in diverse areas, including sequential circuits, certain types of programs, and, more recently, communication protocols. The denial of service (DoS) attacks are the hackneyed and evil cyberattacks in the IP which can be easily...
Pervasive computing is characterized by heterogeneous devices that usually have scarce resources requiring optimized usage. These devices may use different communication protocols which can be switched at runtime. As different communication protocols have different quality of service (QoS) properties, this motivates optimized self-adaption of protocols for devices, e.g., considering power consumption...
Energy consumption is a concern with mobile de-vices nowadays. Network interfaces are among the most power hungry components in these devices. In this paper, we describe the design and implementation of a client-centric protocol for energy efficiency. Inspired by earlier work, our protocol works by exploiting the TCP flow-control mechanism to shape incoming traffic into bursts in order to utilize...
Ubiquitous patient care monitoring system can be defined as the combination of communication technology and body sensor nodes. Ubiquitous patient care monitoring is the part of telemedicine monitoring, an application communication protocol which is HTTP (Hypertext Transfer protocol), used to access information from handheld devices such as PCs, PDA (personal digital assistant) etc. which have the...
Cashless electronic transaction is getting immense popularity nowadays due to its procedural and bureaucratic simplicity. Almost each and every organization and financial institutes prefers electronic transaction in lieu of pen-paper based banking approach, which depends on high speed internet technology. However, this online monetary transaction is a long cherished blessing for the developed countries...
As the core infrastructure of the VoIP, IMS and IPTV, SIP based network is now increasingly been deployed throughout the world. Due mainly to the relatively high flow rate and the exorbitant session maintenance, SIP servers are similarly susceptible to the Denial-of-Service (DoS) Attacks above the IP stack, especially when the Distributed spoofing URI is considered. A hybrid SIP DoS detection method...
Transmission Control Protocol (TCP) Synchronized (SYN) Flood has become a problem to the network management to defend the network server from being attacked by the malicious attackers. The malicious attackers can easily exploit the TCP three-way handshake by making the server exhausted and unavailable with spoofed Internet Protocol (IP) address. The main problem in this paper is how to detect TCP...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.