The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network attacks and in particular denial of service (DoS) attacks have emerged as a major way to compromise the availability of servers and interrupt legitimate online services provided by servers. These attacks are among one of the hardest security problems to address because they are simple to implement but hard to prevent and difficult to trace. Tracing the attacker after an attack is crucial to...
We study the problem of optimizing the cost of content delivery in a cooperative network of caches at end-nodes. The caches could be, for example, within the computers of users downloading videos from websites (such as Netflix, Blockbuster etc.), DVRs (such as TiVo, or cable boxes) used as part of video on demand services or public hot-spots (e.g. Wi-Fi access points with a cache) deployed over a...
The purpose of this paper is to describe a new emerging science: Internet science. This paper argues that current Internet is a direct by-product of Shannon's Information theory and its master thesis. After that I attempt a general and generic definition of a network and discuss the different alternatives. This discussion results in defining a network as a set of distributed actors cooperating for...
Video-on-demand (VoD) is a rapidly growing method for viewing and sharing video content over the Internet. However, video on demand consumes a significant amount of bandwidth, forcing content publishers and content delivery networks to examine approaches such as the use of peer-to-peer (P2P) technologies to assist in video distribution. We study the performance impact of a peer localization strategy...
As the most crucial Inter-domain protocol in the Internet, BGP undertakes indispensable responsibility in exchanging routing information across multi-domain networks, consequently it becomes one of the focuses for network attackers. Though there has been existed various schemes to solve the troublesome thing, no one can indeed become the final solution used in real life. As the earliest and comprehensive...
With the emergence of Radio Frequency Identification (RFID) technology and Electronic Product Code (EPC) standard, physical objects attached with the RFID tags can be uniquely identified and traced on the global trading network. Under the new paradigm of the Internet of Things (IoT), RFID becomes an importantly enabling technology. However, there is a limitation in object tracking in the Internet:...
In recent years, BitTorrent traffic accounts for a substantial percentage of Internet traffic in the world. However, the current BitTorrent protocols disregards traffic cost at the underlying network and generate a large amount of inter-AS traffic. As a result, BitTorrent peers may suffer from slow download of files due to long delays. Moreover, ISPs may limit BitTorrent traffic to reduce inter-AS...
Although the Internet achieved tremendous success in the recent decades, several limitations have emerged from recent technical advancement and challenging requirements of diverse applications. For overcoming these limitations, the future Internet can be redesigned in the “clean slate” basis. This paper proposes a novel architecture that considers both horizontal and vertical separations called, Domain-Insulated...
Considering that audiovisual services will highly impact network architecture in the coming year, we check the impact of the traffic growth from several traffic evolution paths. Some optimization scenarios are proposed and compared looking at the Total Cost of Ownership and the network dimensioning. We show that depending on the context, flattening IP hierarchical network, bypassing transit routers...
Internet Service Providers (ISPs) need to balance multiple opposing objectives. On one hand, they strive to offer innovative services to obtain competitive advantages; on the other, they have to interconnect with potentially competing ISPs to achieve reachability, and coordinate with them for certain services. The complexity of balancing these objectives is reflected in the diversity of policies of...
Lately, access loads on servers and network traffic are increasing due to larger content-size and higher request-frequency in content distribution networks. Breadcrumbs (an architecture with guidance information for locating a content cache) is designed to reduce server-loads and to form content oriented network autonomously in cooperation with cached contents. We also proposed Breadcrumbs+ which...
This paper analyzes the applicability of existing communication technology on the Smart Grid. In particular it evaluates how networks, e.g. Peer-to-Peer (P2P) and decentralized Virtual Private Network (VPN) can help set up an agent-based system. It is expected that applications on Smart Grid devices will become more powerful and be able to operate without a central control instance. We analyze which...
In Chord protocol of P2P network, distances between entries in routing table are too long and only half of the identifier space can be covered. To solve this problem, a higher order Chord routing algorithm is proposed. The algorithm presents a new structure formula for routing table, increases distribution density of routing table entries, and extends routing searching coverage areas to the entire...
A variety of personal backup services now allow users to synchronise their files across multiple devices such as laptops and smartphones. These applications typically operate by synchronising each device with a centralised storage service across the Internet. However, access to the Internet may occasionally not be available, leaving any unsynchronised content in a vulnerable state. To address this,...
the paper first analyzes the basic theory of the CDN (Content Delivery Network) audio and video system and the P2P (peer to peer) audio and video system, and presents its own limitations of each kind of the architecture. Then a hybrid model has been proposed, which integrates CDN and P2P to build the audio and video public network platform. The paper describes the architecture of the hybrid model,...
Community networks are an emerging and successful model for the Future Internet across Europe and far beyond. The CONFINE project complements existing FIRE (Future Internet Research and Experimentation) infrastructures by establishing Community-Lab, a new facility for experimentally-driven research built on the federation of existing community IP networks constituted by more than 20,000 nodes and...
This paper presents experimental results for calculating both node- and edge separators on Autonomous System graphs generated from BGP routing information. The separator of a network graph describes a range of interesting properties as it captures components that are critical to overall connectivity. These components play special roles in terms of routing and deserve special attention from those in-charge...
P2P has become more and more popular because of its convenience and low cost to deploy. Recently it's applied to several fields such as streaming, instant messaging, distributed storage and file sharing. The model of P2P has evaluated from central control to fully distributed. When the overlay reaches a great scale, it's necessary to know the network size of this P2P overlay for optimizing the overlay...
Many Internet users use P2P live streaming services which deliver live video contents to many users. In the services, the video content is sliced into small pieces called chunks. The peers not only receive but also send the chunks to watch the video contents. Source's load for delivering is reduced. In an Offer Select method, each peer offers sendable chunks to it's neighbors. The neighbors select...
The integration of social networking concepts into the Internet of Things (IoT) has led to the so called Social Internet of Things (SIoT) paradigm, according to which the objects are capable of establishing social relationships in an autonomous way with respect to their owners. The benefits are those of improving scalability in information/service discovery when the SIoT is made of huge numbers of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.