The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The growing of the internet use is proportional with the growing of IP address needs, but the increasing of the IP use is not equal with the number of available IPv4. Then, IPv6 was developed as a solution to overcome the limited amount of IPv4 address. Readiness of various aspects ranging from infrastructure to a service provider is required to implement IPv6. In order to improve the quality of IPv6...
Although there have been a plethora of studies on TCP performance in supporting of various applications, relatively little is known about the interaction between TCP and BGP, which is a specific application running on top of TCP. This paper investigates BGP's slow route propagation by analyzing packet traces collected from a large ISP and Route Views Oregon collector. In particular we focus on the...
Network topology inference uses network measurement methods to find out the elements of internet in the target field and their connection relationship. In traditional network topology inference, traceroute-like methods which bases on the feedback information of routers are used, but anonymous routers seriously affect the performance. So tomography relying on end-to-end measurements has become a hot...
Wireless Mesh Networks have been traditionally deployed to offer Internet access. Following the general trend of convergence, they must increasingly provide customers with communication services whose quality constraints are heterogeneous. For large scale deployments, access to the Internet is provided by multiple gateways installed at different points in the network. Each gateway may be connected...
Multipath routing is an important and promising technique to increase the Internet's reliability and to give users greater control over the service they receive. Currently the interdomain routing protocol limits each router to using a single route for a destination network, which does not satisfy the diverse requirements of end users. In this paper, in order to support the effective and efficient...
This paper proposes a method on reducing processing time of the incoming packets using the signature matching in a router. According to the proposed method, the router has enhanced processing time using signature matching of necessary portion and referring of pre-investigated packet routing table. As a result, this method provides improved quality for real-time traffic such as VoIP and video streaming/conferencing.
Network virtualization is a promising technique for building the Internet of the future since it enables the low cost introduction of new features into network elements. An open issue in virtualization is how to search for an efficient mapping of virtual network elements onto those of the existing physical network, also called the substrate network. Mapping is an NP-hard problem and existing solutions...
Traffic Engineering (TE) is required for reducing highly-loaded links / nodes in parts of a network, thereby distributing the traffic load in the network. For efficient use of network resources, it is important to efficiently map traffic demands to network resources. Therefore, we should consider an appropriate definition of ``distance'' in networks with the topological features of the network instead...
The de facto inter-domain routing protocol, Border Gateway Protocol (BGP), plays a critical role in the Internet routing reliability. Invalid routes generated by mis-configurations or malicious attacks will devastate the Internet routing system. In the near future, deploying a secure BGP in the Internet to completely prevent hijacking is impossible. As a result, lots of hijacking detection systems...
This paper presents an overview of the current service delivery models that exist in the Internet, covering also the motivation that triggered the introduction of each model separately. Different Quality of Service (QoS) frameworks like Integrated Services (IntServ), Differentiated Services (DiffServ) and Multiprotocol Label Switching (MPLS) are presented taking into consideration also the alteration...
Distributed Denial-of-Service (DDoS) attacks are one of the major threats the Internet is facing today. The problem of tracing the attackers is particularly difficult since attackers spoof the source addresses. Researchers all over the world have proposed several packet marking based techniques for DDoS attack mitigation using IP Traceback, however even after a decade of active research no commercial...
In the near future vehicular networks (VANETs) based on wireless technology will be part of our daily lives. VANETs enable vehicles that are not necessarily within the same transmission range to communicate with each other. They also allow vehicles to connect to Roadside Units (RSUs), which are connected to the Internet, forming a backbone mesh that offers the capability of communicating with each...
The wireless world is migrating towards an era that will comprise wireless network infrastructure, as well as more local/temporary structures which, for instance, can be called Opportunistic Networks (ONs). ONs can comprise various terminals/devices, potentially organized in an infrastructure-less (ad-hoc) network mode, and be terminated at a set of access points of the infrastructure-based network...
The Internet is an interconnection of Autonomous Systems (ASes) of which many are controlled by Internet Service Providers (ISPs). ASes use Border Gateway Protocol (BGP) to communicate routing information to each other. BGP does not allow a network to control how its traffic is routed. As a result, traffic belonging to a specific network can be intentionally dropped as it is routed by BGP through...
OSPF is one of the routing protocols which is the most widely used in internet and intranet today. The link-state algorithm in OSPF is based on the thought of local optimization, but in certain cases, routing algorithms based on local optimization might lead to a disadvantage which will remarkably depress global performances. A self-adaptive method based on the genetic algorithm is proposed, which...
In order to construct the highway networks, the road tunnels become an inevitable deign to accommodate physical environment elements (e.g., mountains and rivers) in the world. For the recent constructed tunnels, the communication system within the tunnel is planed and designed ahead of time. However, the cost to build and maintain a complete communication system for existing tunnels may not be a cost...
Low Extra Delay Background Transport (LEDBAT) congestion control algorithm is designed to address the unfairness problem of TCP aggravated by applications that use multiple TCP connections for data transfer. LEDBAT operates under the assumption that the queue delay at the access router of the bottleneck link will be the primary varying contributor to end-to-end one-way delay. However this assumption...
In order to successfully resolve the network infrastructure's problems the network provider has to improve the service quality. However in traditional ways, maintaining and improving of the service quality are generally determined in terms of quality of service criteria, not in terms of satisfaction and perception to the end-user. The latter is represented by Quality of Experience (QoE) that becomes...
This paper addresses the problem of optimal gateways selection and route selection to Internet in backbone wireless mesh networks (WMNs) where each mesh router (MR) is equipped with multiple radio interfaces and a subset of nodes serve as gateways to Internet. Several schemes have been proposed to route packets in WMNs or to select appropriate gateways to connect clients to Internet. However, most...
Integrating nodes in a MANET to the Internet require either a connection to the Internet or they can connect to the Internet through the Internet gateways or servers. For the second case a node in a MANET has to find out the gateway or server to connect to the fixed nodes in the Internet. End to end packet delay and throughput are strongly dependent on the time needed to discover the gateways. A source...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.