The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The problems associated with multipath routing in Border Gateway Protocol (BGP) for Autonomous Systems (ASes) can be solved with some model or control systems from the Software Defined Networking (SDN). The SdN controller could be used to solve the inconsistencies in the scalability and latency of the Routing Information Base (RIB) of ASes. Also, a set of modules for Inter-AS routing and Brokering...
Prefix hijacking is a serious threat in the Internet routing landscape. The Border Gateway Protocol has no origin authentication by design. Countermeasures, e.g. on-top authentication as implemented by R-PKI infrastructures, are not yet deployed on a very large scale. Being victim of prefix hijacking is a difficult situation with few options. Not only the owner of a prefix is victim but all the networks...
Software defined networking (SDN) technology promises a new bright future to IP network. Significant number of SDN researches have been done so far to facilitate network operation and management efficiently. However, until now there are only few frameworks to support emulation, verification, and implementation of the SDN. Mininet is one of the most popular tools because of the openness, cost effectiveness,...
Border Gateway Protocol (BGP) has been the de facto inter-domain routing protocol since it was introduced. Its destination-based routing nature, which is not able to choose a specific end-to-end AS-level route, might overload some popular peering (or inter-AS) links, while making some others underused. This could result in congestion and cause service disruption. To cope with the issue of destination-based...
Video content makes up more than half of the world's Internet traffic, and this figure is expected to grow rapidly. New techniques that remove traffic redundancy have been shown to significantly improve network performance since many concurrent streams deliver the same video. These techniques employ smart routers that recognize duplicated video streams and merge them to reduce traffic redundancy....
Information-Centric Networking (ICN) introduces a paradigm shift from a host centric communication model for Future Internet architectures. It supports the retrieval of a particular content regardless of the physical location of the content. Emergency network in a disaster scenario or disruptive network presents a significant challenge to the ICN deployment. In this paper, we present a Content dIstribution...
The original design of the Internet was a resilient, distributed system, that may be able to route around (and therefore recover from) massive disruption—up to and including nuclear war. However, network routing effects and business decisions cause traffic to often be routed through a relatively small set of Autonomous Systems (ASes). This is not merely an academic issue; it has practical...
Current approaches to Information-Centric Networking (ICN) facilitate the publication and retrieval of content in a network through a variety of discovery, caching and forwarding approaches, thus defining an equivalent of the data plane in the current Internet infrastructure. However, in contrast to the current Internet, ICN lacks a definition of the control plane for the management of the operation...
Despite years of research, the Internet still lacks a routing protocol with guaranteed termination. As is well-known, decentralization of routing decisions among the Autonomous Systems (ASes) that comprise the Internet may result in permanent oscillations of the state of its routing protocol — the Border Gateway Protocol (BGP). Some permanent oscillations are made from routing loops — the propagation...
The current Internet allows vulnerable anonymous attackers to masquerade as legitimate users, making them susceptible to various malicious attacks such as spoofing or denial of service (DoS) attacks. Existing security technologies (terminal security SW, firewall, IDS / IPS, VPN) are being studied individually, but it is difficult to apply security protocols and solutions currently used to new services...
The provision of Internet connectivity for a vehicle anywhere anytime is an essential element to realize the vision of Connected Car. However, we observe that the current vehicular network technologies mainly focus on single-hop communications having limited coverage for the Internet connectivity. Accordingly, in order to support the always Internet connectivity, multi-hop routing that can cover wider...
The concept of persistent identification is increasingly important for research data management. At the beginnings it was only considered as a persistent naming mechanism for research datasets, which is achieved by providing an abstraction for addresses of research datasets. However, recent developments in research data management have led persistent identification to move towards a concept which...
Existing Internet protocols assume persistent end-to-end connectivity, which cannot be guaranteed in disruptive and high-latency space-terrestrial networks. To operate over these challenging networks, Delay/Disruption Tolerant Networking (DTN) architecture has been proposed. Although recent advances, evaluating DTN routing in large-scale networks spanning prolonged time-evolving topologies remain...
Collaborative Earth observation satellite constellations are arising as a new paradigm with important advantages in comparison with traditional monolithic systems. In this context, Disruptions Tolerant Networking (DTN) protocols were proposed to provide efficient and autonomous store-carry-and-forward data transport. Although a scheduled contact plan can be used to optimize routing and data delivery...
The Locator/Identifier Separation Protocol (LISP) separates classical IP addresses into two categories: one for identifying terminals, the other for routing. To associate identifiers and locators LISP needs a specific mechanism, called mapping system. This technology is still at an early stage but two experimental platforms have already been deployed in the Internet: LISP Beta Network and LISP-Lab...
This paper provides insight into the effects of cross-border infrastructure and logical interconnections in Africa on both intra-country and cross-border latency on end-to-end Internet paths, by comparing Internet performance measurements between different countries. We collected ICMP pings between countries using Speedchecker and applied a community detection algorithm to group countries based on...
Over the past two decades, implementing routing lookups in dedicated hardware has been accepted as an undisputable gold standard in core Internet routers due to ever increasing performance requirements and unabated global routing table growth. Several recent proposals depart from that line of thinking and suggest that software algorithms running on commodity multi-core CPUs might (again) become well...
Information Centric Networking (ICN) is future Internet architecture for distribution of the contents which are location independent and are cached in the ICN nodes, making them efficient for distribution and retrieval. ICN architecture is based on new protocols for unique naming and transferring of data objects over the network. Its focus is on delivery of data objects to the end user rather than...
Interactive and multimedia applications depend on the stability of end-to-end paths on the Internet for predictable performance and good quality of service. On the other hand, network providers depend on multiple paths to ensure fault tolerance and use load balancing between these paths to enhance the overall network throughput. In this study, we analyze the path dynamics within service providers'...
For reenterable models of IP networks with dynamic routing according to RIP protocol, measuring subnets for QoS parameters evaluation have been essentially modified and extended. Online algorithms of statistical analysis have been specified by colored Petri nets. The mean and variance of the packet delivery time have been evaluated. As a result, the computation precision has grown and an essential...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.