The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The lack of technical equipment is one of the hurdles in facing challenges in engineering education and basic research for universities in developing countries. In this paper we present a low-cost laboratory mostly based on commercial off-the-shelf wifi routers. A basic workbench is made out of three second hand wireless routers. Our local market provided plenty of used D-Link DIR-300. Total cost...
The problems associated with multipath routing in Border Gateway Protocol (BGP) for Autonomous Systems (ASes) can be solved with some model or control systems from the Software Defined Networking (SDN). The SdN controller could be used to solve the inconsistencies in the scalability and latency of the Routing Information Base (RIB) of ASes. Also, a set of modules for Inter-AS routing and Brokering...
In this paper, we address the issue of profiling users over the Internet using meta-data logs derived from network flow data (hence preserving a high degree of privacy). In this broader context, we specifically aim to empirically demonstrate that Internet volume and time of usage of humans do exhibit repeatable behavior over time. In our experimental study, Internet usage statistics of octets and...
MEC or Multi-Access Edge Computing is a network service delivery architecture that enables cloud computing capabilities at the edge of the access network. Realisation of the MEC vision is challenging with current network technologies: service discovery and routing, secure network slicing and distributed mobility management require complex capabilities in the network. This demo features an OMEC use...
The Internet of Things (IoT) is becoming important in many areas that include health, entertainment, manufacturing, automotive, home and building automation, industrial, etc. Will it be important for education and more specifically for teaching and learning? If so, what engineering subjects would benefit the most and how effective could the IoT be for teaching and learning? Can IoT technologies and...
Network Address Translation (NAT) allows multiple devices with private addresses to share one public address. NAT was mainly confined to home gateways, but with the exhaustion of the IPv4 address space, large-scale NATs have been deployed. Other technologies causing large-scale address sharing are on the rise as well (e.g. VPNs). Large-scale address sharing is problematic, since it limits the number...
In order to improve the management intelligent level and the level of information sharing for higher law college instructors, and improve the efficiency of management of higher law college counselors work, and promote the sharing of college counselors and educational resources and scheduling information, Higher Law College Counselors work management system is developed and designed. The system adopts...
Signature-based Network Intrusion Detection Systems (NIDS) are an integral part of modern network security solutions. They help to detect and prevent network attacks and intrusions. However, they show critical performance problems in today's high speed networks. Filters have been proposed to reduce the amount of traffic to be analyzed by a NIDS, yet, such filters need to be very carefully designed...
With the rapid development of the Internet, especially in recent years, the development of mobile Internet is increasingly rapid. Message push, which is an important way for mobile client to publish information and make communication, plays a significant role in mobile Internet. MQTT protocol is one of the implementation technologies of message push in Android system with low power consumption and...
The SSL protocol has been widely used for verifying digital identities and to secure Internet traffic since the early days of the web. Although X.509 certificates have been in existence for more than two decades, individual user uptake has been low due to the high cost of issuance and maintenance of such certs. This has led to a situation whereby users are able to verify the identity of an organization...
Internet of Things (IoT) has revolutionized the traditional Internet where only human-centric services were offered. It has enabled objects to have the ability to connect and communicate through the Internet. IoT has several applications such as smart water management systems. However, they require high energy-efficient sensor nodes that are able to communicate across long distance. This motivates...
Smart objects (SOs) have been utilized widely to transform the physical environment around us to a digital world using the Internet of things (IoT) vision. Integrating a huge number of these devices into the Internet presents a significant necessity for an efficient discovery mechanism with high capability of an autonomous configuration and detection for theses devices and their provided services...
The nature of Internet traffic has changed dramatically within the last few years, where a large volume of traffic is originated from mobile applications (known as apps), web based multimedia streaming, computation offloading like cloud computing and Internet of Things (IoT) etc. These types applications generate multiple parallel short lived end-to-end connections. However, the three major requirements...
Many BitTorrent clients are using these networks as a video-on-demand service, taking advantage of the popularity and the enormity of the collection of media available. However, it is a common sense that transforming the swarms into an on-demand media service causes serious damage to the overall network performance, given that streamer clients modify the method of downloading determined in the protocol...
It is expected that there are a variety of energy resources to be jointly operated by the power system in the future. Through jointly operating all types of energy resources via the Internet, Energy Internet is a promising solution to increase energy efficiency. However, the increasing integration of energy resources inevitably imposes challenges in secure communication in the Energy Internet. Resourceful...
The Internet of Things(IoT) has been developing rapidly since the past decade. It is becoming a crucial part of everyday life. It is becoming a way of living in which machines perform activities on their own by communicating with each other, without the need for human beings to instruct them. In such a scenario, which concerns daily life, privacy, and secrecy should be of at most priority. Since in...
Ad-Hoc and Delay-Tolerant Networks (AHDTNs) can be very useful in environments where more traditional networking technologies fail. Determining the practical effectiveness of AHDTNs can however be challenging. We review design considerations and practical experience with a novel mechanism for monitoring and analyzing the performance of AHDTNs. This new mechanism, AllNet Trace, somewhat resembles a...
Current approaches to Information-Centric Networking (ICN) facilitate the publication and retrieval of content in a network through a variety of discovery, caching and forwarding approaches, thus defining an equivalent of the data plane in the current Internet infrastructure. However, in contrast to the current Internet, ICN lacks a definition of the control plane for the management of the operation...
In recent years, privacy issues in the networking field are getting more important. In particular, there is a lively debate about how Internet Service Providers (ISPs) should collect and treat data coming from passive network measurements. This kind of information, such as flow records or HTTP logs, carries considerable knowledge from several points of view: traffic engineering, academic research,...
Cyber-attacks have become more threatening as Internet evolves, particularly for Internet Service Providers (ISPs) that play a rule of carrying them to their subscribers. In order to protect themselves and their subscribers, ISPs invest in typical protection systems like IDS, IPS, or Firewalls, that are designed for perimeter-based operation. Even though these expensive systems are efficient to protect...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.