Learn More
Users demand not only seamless continuation but also high throughput of Internet access as they hop across different administrative domains and heterogeneous networks during an ongoing session. By extending the multiple care-of addresses registration based on mobile IPv6, the proposed mechanism may provide seamless access with soft handoff notion as well as(More)
One of the key design issues for the new generation IP routers is the route lookup mechanism. For each incoming IP packet, the IP routing requires to perform a longest prefix matching on the address lookup in order to determine the packet’s next hop. This paper presents a fast route lookup mechanism that only needs tiny SRAM and can be implemented in a(More)
In recent years, vulnerability collection platforms become an important part to facilitate development of information security. Usually, platform administrators collect and ratify vulnerability information, which white hat hackers report at first hand, and users hence know which applications have doubts via vulnerability reports published on the platform.(More)
A pervasive computing system has to be context-aware because it cannot distract users. However, user’s context information can be quite rich and unpredictable. Therefore, how to design an extensible protocol to achieve these requirements and implement a context-aware Internet service is very important. In this paper, we propose a SIP-compatible protocol for(More)
U sers have experienced seamless handoff during cell phone calls when connected to single interfaces. In the future, however, seamless hand-off will become commonplace even when devices are connected to multiple interfaces. The Ambient Networks project (www.ambient-networks.org) is developing a framework to let devices navigate complex network environments,(More)
Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks.(More)
SCTP (Stream control transmission protocol) is a new transport layer protocol that was published as RFC2960 by IETF (the Internet Engineering Task Force) in October 2000 and amended in RFC4960 in September 2007. SCTP provides reliable ordered and unordered transport services. The congestion control and flow control mechanisms for SCTP are very similar to(More)
The multi-channel Hybrid Fiber Coaxial (HFC) network is essentially a shared medium with multi-channels. Its operation requires the use of a scheduling algorithm to manage the data transmission within each channel. The Data-Over-Cable Service Interface Specification (DOCSIS) protocol is an important standard for HFC networks. Since this protocol does not(More)
Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks(More)