The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In today's Internet age, web-based applications are an extremely logical way to disseminate, update, and visualize information. Our modern wired infrastructure and high-speed wireless access points make it possible to access high-bandwidth demanding applications from nearly everywhere. However, in places where infrastructure does not exist, and where information needs to be disseminated over areas...
It is necessary to monitor and control remotely the devices in scattered unattended machine rooms. The remote monitoring and controlling system are designed based on SNMP and TCP/IP, which uses mainly existing intranet. Following the introductions of SNMP and TCP/IP, overview design and software design of the system are presented. The system may achieve the management of unattended machine rooms and...
Covert channels are malicious conversation in a legitimate secured network communication that violates the security policies laid down. Covert channels are hidden, intended design in the legitimate communication whose motto is to leak information. Trapdoors are unintended design with a communication system that exists in network covert channels as a part of rudimentary protocols. Subliminal channel,...
The availability of multimedia contents to be played back while driving constitutes an added value to both drivers and passengers, improving the travel experience. These contents can be already on-board, diffused through broadcast networks or delivered on demand by servers as data streams. Vehicular ad-hoc networks allow envisaging a new way to access multimedia contents based on epidemic data dissemination,...
A novel SQL Tunnelling system to allow communication with an SQL database is developed by utilising the standard Internet protocol HTTP. The communication with the database is allowed by a client interacting with a Web Service running on a standard off-the-shelf HTTP Server. With this tunnelling system, access to a database can be provided without providing access to the database native communication...
In this paper, we introduce a secure communication protocol for tag authentication and data access authorization in EPCglobal Class 1 Generation 2 (EPC GEN-2) RFID systems. The proposed protocol adopts a process-oriented design to exploit the memory space at tag and backend server ends more efficiently. Based on the formal logic proof and protocol analysis, our scheme not only provides data confidentiality...
Authentication of RFID tags is commonly achieved through cryptographic means with protocols that encrypt communication between the parties of interest. There is an extensive literature in this area that address various facets associated with authentication. As RFID tags gain more popularity, there is a concomitant increase in frequency with which they (i.e., the tagged object) change ownership. There...
In this paper, a design plan of distributed logging diagram system based on the latest Windows communication foundation (WCF) technology is proposed, which can satisfy the demand on graphic drawing, data preparation and presentation of the logging drawing, and also is service-oriented. The server side services are designed as based on template architecture which could change database in configuration...
The locator/identifier separation protocol (LISP) is being considered in the Internet community as an evolutionary path towards future Internet. Routing scalability and enhanced traffic engineering capabilities beyond BGP are major highlights of the proposal. An implementation from Cisco systems is being tested in a global infrastructure named LISP+ALT, while an open source implementation, namely...
Traditional network monitoring tools such as Sniffer, Netview, not only provide the flow of network, but also analyze all kinds of protocols in TCP/IP protocol family, but they can't provide the analysis on TDS protocol which used in the Microsoft SQL Sever 2000 in detail. According to the result of testing and researching TDS 7.1 protocol, sums up the communication rule and packet structure of TDS...
SIP flow management should respect the specific characteristics of SIP protocol applied in multimedia or telecom services for meeting stringent quality of service (QoS) requirement. The specific characteristics include explicit session structure for correlating a series of SIP messages, stringent response time required by real-time applications, extra overhead imposed by SIP message retransmission,...
Communication and information services are the important parts of virtual test systematic supporting environment. With the background of a military virtual testing system, we have achieved a virtual testing platform for communication based on RT-TCP/IP and real-time database technology. In the communication level, we analyzed the real-time performance of RT-TCP/IP and demonstrated the feasibility...
This article presents a metadata catalog, intended for use in grids. The catalog provides high availability, by replication across several hosts. The replicas are kept consistent using a replication protocol based on the Paxos algorithm. A majority of the replicas must be available in order for the system to function. The data model used in the catalog is RDF, which allows users to create their own...
In this paper, the remote operating system detection is discussed and some detection methods which contain active detection and passive detection are studied and compared. The implement of remote operating system detection based on Libnet is provided and the architecture of total system is presented. The principle of Libnet is studied and it can improve detection performance and scalability. The detection...
The Naval Research Laboratory's (NRL) Digital Mapping, Charting and Geodesy Analysis Program (DMAP) team, located at Stennis Space Center, conducts research involving the online storage and manipulation of geospatial data. One aspect of this research concerns metadata. Metadata is ?data about data? or simply put, various bits of information that provide an understanding of certain aspects of the data...
It is not easy for systems using different method among the existing methods to interoperate each other because they have the closed system architecture and follows the mutually exclusive method. By using the proposed scheme, it is possible to easily deploy new services and protocols to the network without efforts to develop a new transport control function for the existing network equipment as well...
This paper presents new Signaling System No. 7 (SS7) to IP based Signaling Transport (SIGTRAN) protocol interchanger software and related hardware to implement an improved distributed database based Automated Teller Machine (ATM) network where the countrywide existing IP network can be used. Currently the ATM network is based on fully centralized database environment. This leads to varying transaction...
Web database is a combined production with database technology and Web technology, it stores and manages a great deal of data, if they are embezzled or juggled, which maybe bring enormous political and economic losses to the society. So it is imperative to properly establish security for Web database against illegitimate intrusion. The host identity protocol (HIP) is designed by the Internet Engineering...
The unique features of voice over Internet protocol (VoIP) systems introduce various security challenges which entail novel detection approaches. Signature-based detection approaches have been lacking the necessary flexibility to model attacks semantically and to thwart obfuscation. In this paper, we demonstrate the design and implementation of a signature database that complements a specification-based...
The SIP protocol provides authentication and authorization of SIP requests through a challenge-response authentication scheme inherited by the HTTP protocol and named HTTP Digest Authentication. The current specification defines a particular algorithm for calculating the challenge response that uses the MD5 hash of a combination of user name, realm, and password. Unfortunately, a lot of authentication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.