95 research outputs found

    Mobile Ad-Hoc Networks

    Get PDF
    Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of-the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: quality-of-service and video communication, routing protocol and cross-layer design. A few interesting problems about security and delay-tolerant networks are also discussed. This book is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks

    A hybrid network/host mobility management scheme for next generation networks

    Get PDF
    Includes bibliographical references.The author proposes a hybrid network/host interworking scheme to allow the MN to transition smoothly between different access networks supporting two distinct mobility approaches

    Network emulation focusing on QoS-Oriented satellite communication

    Get PDF
    This chapter proposes network emulation basics and a complete case study of QoS-oriented Satellite Communication

    Segurança e privacidade em terminologia de rede

    Get PDF
    Security and Privacy are now at the forefront of modern concerns, and drive a significant part of the debate on digital society. One particular aspect that holds significant bearing in these two topics is the naming of resources in the network, because it directly impacts how networks work, but also affects how security mechanisms are implemented and what are the privacy implications of metadata disclosure. This issue is further exacerbated by interoperability mechanisms that imply this information is increasingly available regardless of the intended scope. This work focuses on the implications of naming with regards to security and privacy in namespaces used in network protocols. In particular on the imple- mentation of solutions that provide additional security through naming policies or increase privacy. To achieve this, different techniques are used to either embed security information in existing namespaces or to minimise privacy ex- posure. The former allows bootstraping secure transport protocols on top of insecure discovery protocols, while the later introduces privacy policies as part of name assignment and resolution. The main vehicle for implementation of these solutions are general purpose protocols and services, however there is a strong parallel with ongoing re- search topics that leverage name resolution systems for interoperability such as the Internet of Things (IoT) and Information Centric Networks (ICN), where these approaches are also applicable.Segurança e Privacidade são dois topicos que marcam a agenda na discus- são sobre a sociedade digital. Um aspecto particularmente subtil nesta dis- cussão é a forma como atribuímos nomes a recursos na rede, uma escolha com consequências práticas no funcionamento dos diferentes protocols de rede, na forma como se implementam diferentes mecanismos de segurança e na privacidade das várias partes envolvidas. Este problema torna-se ainda mais significativo quando se considera que, para promover a interoperabili- dade entre diferentes redes, mecanismos autónomos tornam esta informação acessível em contextos que vão para lá do que era pretendido. Esta tese foca-se nas consequências de diferentes políticas de atribuição de nomes no contexto de diferentes protocols de rede, para efeitos de segurança e privacidade. Com base no estudo deste problema, são propostas soluções que, através de diferentes políticas de atribuição de nomes, permitem introdu- zir mecanismos de segurança adicionais ou mitigar problemas de privacidade em diferentes protocolos. Isto resulta na implementação de mecanismos de segurança sobre protocolos de descoberta inseguros, assim como na intro- dução de mecanismos de atribuiçao e resolução de nomes que se focam na protecçao da privacidade. O principal veículo para a implementação destas soluções é através de ser- viços e protocolos de rede de uso geral. No entanto, a aplicabilidade destas soluções extende-se também a outros tópicos de investigação que recorrem a mecanismos de resolução de nomes para implementar soluções de intero- perabilidade, nomedamente a Internet das Coisas (IoT) e redes centradas na informação (ICN).Programa Doutoral em Informátic

    Actas da 10ª Conferência sobre Redes de Computadores

    Get PDF
    Universidade do MinhoCCTCCentro AlgoritmiCisco SystemsIEEE Portugal Sectio

    IPv6 tactical network management

    Get PDF
    Current and emerging technologies and equipment, such as unmanned aerial vehicles, ground sensors, networked radios, operator-worn sensor vests, and nanotechnology applications offer warfighters unprecedented command and control and information detection capabilities, yet the use of this technology has not been fully realized. The current protocol, IPv4, is incapable of providing enough addresses due to a depletion of IPv4 address space. IPv6, however, offers unprecedented network support for tactical-level sensor and communications assets in terms of increased address space, Quality of Service (QoS), flexibility, and security. The Department of Defense is transitioning from IPv4 to IPv6 in order to capitalize on IPv6's expanded capabilities. However, one unresolved area is proper IPv6 network management. Currently, the majority of the configuration and operational knowledge is in the mind of a very few individuals. The expertise currently available must be developed for application by the tactical network manager operating out on the edge of the network, in order to properly administer both an IPv4/IPv6 dual stacked network during the phased protocol transition and a purely native IPv6 network. Second, IPv6 features a robust Quality of Service (QoS) capability previously unavailable through IPv4, which requires research to determine the optimum configuration to support the warfighter's diverse requirements.http://archive.org/details/ipvtacticalnetwo109454574Outstanding ThesisUS Marine Corps (USMC) author.Approved for public release; distribution is unlimited

    EVALUATING THE CYBER SECURITY IN THE INTERNET OF THINGS: SMART HOME VULNERABILITIES

    Get PDF
    The need for advanced cyber security measures and strategies is attributed to modern sophistication of cyber-attacks and intense media attention when attacks and breaches occur. In May 2014, a congressional report suggested that Americans used approximately 500 million Internet-capable devices at home, including, but not limited to Smartphones, tablets, and other Internet-connected devices, which run various unimpeded applications. Owing to this high level of connectivity, our home environment is not immune to the cyber-attack paradigm; rather, the home has evolved to become one of the most influenced markets where the Internet of Things has had extensive surfaces, vectors for attacks, and unanswered security concerns. Thus, the aim of the present research was to investigate behavioral heuristics of the Internet of Things by adopting an exploratory multiple case study approach. A controlled Internet of Things ecosystem was constructed consisting of real-life data observed during a typical life cycle of initial configuration and average use. The information obtained during the course of this study involved the systematic acquisition and analysis of Smart Home ecosystem link-layer protocol data units (PDUs). The methodology employed during this study involved a recursive multiple case study evaluation of the Smart Home ecosystem data-link layer PDUs and aligned the case studies to the existing Intrusion Kill Chain design model. The proposed solution emerging from the case studies builds the appropriate data collection template while concurrently developing a Security as a Service (SECaaS) capability to evaluate collected results

    The VPQ scheduler in access point for VoIP over WLAN

    Get PDF
    The Voice over Internet Protocol (VoIP) application has observed the fastest growth in the world of telecommunication.VoIP is seen as a short-term and long-trem transmission for voice and audio traffic. Meanwhile, VoIP is moving on Wireless Local Area Networks (WLANs) based on IEEE 802.11 standards.Currently, there are many packet scheduling algorithms for real-time transmission over network.Unfortunately, the current scheduling will not be able to handle the VoIP packets with the proper manner and they have some drawbacks over real-time applications.The objective of this research is to propose a new Voice Priority Queue (VPQ) packet scheduling and algorithm to ensure more throughput, fairness and efficient packet scheduling for VoIP performance of queues and traffics.A new scheduler flexible which is capable of satisfying the VoIP traffic flows.Experimental topologies on NS-2 network simulator were analyzed for voice traffic. Preliminary results show that this can achieve maximum and more accurate VoIP quality throughput and fairness index in access point for VoIP over WLANs.We verified and validated VPQ an extensive experimental simulation study under various traffic flows over WLANs
    corecore