Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper explores the use of TCP fingerprints for identifying and blocking spammers. Evidence has shown that some bots use custom protocol stacks for tasks such as sending spam. If a receiver could effectively identify the bot TCP fingerprint, connection requests from spam bots could be dropped immediately, thus reducing the amount of spam received and processed by a mail server. Starting from a...
In the design of mobile phone monitoring system, the balance of real-time video playback fluency and clarity is the key of the design work. For this problem, the designer can use image data compression international standard, such as MPEG standards, and real-time transport protocol RTP to reallize real-time video data transmission on GPRS, but the final result is extremely poor. On the basis of introducing...
The separation between edge and core addresses has been proposed to address the scalability problem of the Internet routing system. One main challenge is to design an efficient mapping mechanism for the two address spaces. The layer structure is attractive because of its scalability and simple index mechanism, while existing layered mapping system lacks a clear structure study and faces serious deployment...
Network traffic classification can be employed for providing enhanced Quality of Service (QoS), network security, traffic management, etc. Classifying network traffic with statistical characteristics of traffic flows has the advantages of fast processing speed, fairly high accuracy, ability of handling encrypted traffic, etc. However, Nagle's algorithm coalesces small TCP packets, and sometimes there...
Nowadays, a multimedia service platform is to be developed where service components in the appliances are exposed in a service oriented architecture. Innovative new services can be created by mashing up the service components. In this paper, the idea is demonstrated by using a system, whose client is on Android phone and server is on Flex AIR (Adobe Integrated Runtime). The client and server are going...
Applications based on peer-to-peer (P2P) protocols have become tremendously popular over the last few years, now accounting for a significant share of the total network traffic. To avoid restrictions imposed by network administrators for various reasons, the P2P protocols have become more sophisticated and employ various techniques to avoid detection and recognition with standard measurement tools...
The wide scale deployment of Internet combined with several advancements in hardware and software technologies created opportunities for several Internet based applications such as Voice Over IP (VoIP) that involves the delivery of voice, video and data to the end user. SIP, the Session Initiation Protocol, is a signaling protocol for Internet conferencing, telephony, presence, events notification...
In recent years, Internet Protocol (IP) telephony is becoming popular because it offers more flexibility in the implementation of new features and services. Session Initiation Protocol (SIP) is a peer-to-peer, multimedia signaling protocol standardized by the Internet Engineering Task Force (IETF) plays a vital role in providing services to IP telephony. SIP is ASCII-based, resembling HTTP, and reuses...
In this paper we describe a new service that allows multimedia sharing between UPnP terminals connected to remote networks. The service grants the confidentiality of users' contents since they are still stored in the home network. Our approach uses IP Multimedia Subsystem (IMS) framework to establish a secure HTTP session between remote devices. A new Remote Access Application Server is deployed in...
In this paper, we derive an analytical model for the estimation of the overhead introduced in a file transfer procedure by three different reliable protocols, namely TCP, SCTP, and Saratoga. The model estimates the introduced overhead down to the IP layer, taking into account uncorrelated packet loss on the channel. The model distinguishes between the overhead on the forward link (server to client),...
Networking has experienced tremendous changes. Once dedicated to one single type of services, technologies are now offering integrated services: we want to have access to any services anywhere. One challenge is the mobility, with 3G terrestrial offers beginning to be successful. In such a context, satellite systems appear as a real opportunity since they may fill the gap between dense connected areas...
The presence of IPv4/IPv6 translation gateway provides transparent routing mechanism to IPv4-only nodes and IPv6-only nodes which trying to establish communication from disparate address realms. However, the mechanism breaks TCP/IP intrinsic functionalities that results in IPSec cannot be applied in this environment. The existing solutions to address the compatibility issues between translation gateway...
Satellite communication sector has been offering voice services from very beginning of its existence. Over the last several years commercial deployment of data services has become globally a widespread reality. However satellite communication was not originally designed for data transmission and therefore optimization of protocol behavior is often required to increase efficiency. The purpose of this...
With the proliferation of the Internet, voice over IP and multimedia communication become more and more important. One of the protocol that facilitated this development is Session Initiation Protocol (SIP). SIP is a signaling protocol which manages the session establishment and termination. It can be based on UDP or TCP at the transport layer. In this paper, the strengths and weaknesses of SIP over...
HTTPS is designed to protect a connection against eavesdropping and man-in-the-middle attacks. HTTPS is however often compromised and voided when users are to embrace invalid certificates or disregard if HTTPS is being used. The current HTTPS deployment relies on unsophisticated users to safeguard themselves by performing legitimacy judgment. We propose HTTPS Lock, a simple and immediate approach...
The rapid development of network technology in particular the widely use of the internet based on TCP/IP protocol, affects the way people work, learn and live greatly. Network's business value and importance increases as people get more dependent on network. Every walk of life's development and various activities of the word are inseparable from the Internet. However, as the telecommunication operation...
Transmission Control Protocol (TCP) Synchronized (SYN) Flood has become a problem to the network management to defend the network server from being attacked by the malicious attackers. The malicious attackers can easily exploit the TCP three-way handshake by making the server exhausted and unavailable. The main problem in this paper is how to detect TCP SYN flood through network. This paper used anomaly...
The aim of this study is to quantify performance of network file transfer for research testbed. This study was carried out because Internet users nowadays has surfing tendency to stream video, download and upload video which need more Internet bandwidth. In addition, there is also a requirement for clarification between theoretical and actual performance of Internet Protocol version 6 (IPv6). This...
802.11-based WLAN deployments have become a commodity to provide today's wireless Internet access. In this paper, we conduct a practical study on the performance of FTP file transfers over real WLAN equipment. To this end, we propose a new analytic model that translates the highly complex dynamics of the FTP/TCP/IP/MAC-stack, and their interactions, into a single parameter, which will be called the...
Traffic engineering and an economical provisioning of bandwidth is crucial for network providers in times of high competition in broadband access networks. We investigate the efficiency of caching as an option to shorten end-to-end paths and delays while at the same time reducing traffic loads. The portion of HTTP based distribution of cacheable content on the Internet is increasing in recent time...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.