Search results for "Application layer"
showing 10 items of 10 documents
Automated Synthesis of Application-layer Connectors from Automata-based Specifications
2019
Abstract Ubiquitous and Pervasive Computing, and the Internet of Things, promote dynamic interaction among heterogeneous systems. To achieve this vision, interoperability among heterogeneous systems represents a key enabler, and mediators are often built to solve protocol mismatches. Many approaches propose the synthesis of mediators. Unfortunately, a rigorous characterization of the concept of interoperability is still lacking, hence making hard to assess their applicability and soundness. In this paper, we provide a framework for the synthesis of mediators that allows us to: (i) characterize the conditions for the mediator existence and correctness; and (ii) establish the applicability bo…
An object-oriented development platform for transport layer protocols
2002
Transport layer protocols have become a necessary communication element for new and classical real-time applications. The implementation of these protocols has never been structured and the designers of transport layer protocols have always developed without following any pattern. The library we have designed tries to avoid this. We propose a C++ library which could be used to develop transport layer protocols, considering every generic element inside a protocol as an object. At the end we apply the library to a well known transport layer protocol known as SNR.
On the Provisioning of Mobile Digital Terrestrial TV Services to Vehicles With DVB-T
2012
[EN] Most of the DVB-T (Digital Video Broadcasting -Terrestrial) networks deployments worldwide have been designed for fixed rooftop antennas and high transmission capacity, not providing good coverage level for vehicular mobile reception. This letter analyzes how to combine different technical solutions, so far studied individually, in order to increase the robustness of the transmission for vehicular reception to provide in-band mobile services. In particular, we consider: receive antenna diversity, hierarchical modulation, and Application Layer Forward Error Correction (AL-FEC). Performance evaluation results have been obtained by means of simulations, laboratory tests, and field measure…
Experiences with the integration of protocol software tools
1996
An analysis of a number of protocol software tools that are widely used in the development of communication protocols in the Finnish telecommunications industry is presented. To analyse the integrated use of these tools, a non-trivial application layer protocol with ACSE, ROSE and a simple presentation layer has been designed and implemented with the help of these software tools. Particular attention has been paid to compose a complete protocol implementation from the fragments produced with separate tools. Our observations clearly indicate that this integration is a major problem with the current practices.
Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol
2015
Denial of Service attacks remain one of the most serious threats to the Internet nowadays. In this study, we propose an algorithm for detection of Denial of Service attacks that utilize SSL/TLS protocol. These protocols encrypt the data of network connections on the application layer which makes it impossible to detect attackers activity based on the analysis of packet payload. For this reason, we concentrate on statistics that can be extracted from packet headers. Based on these statistics, we build a model of normal user behavior by using several data mining algorithms. Once the model has been built, it is used to detect DoS attacks. The proposed framework is tested on the data obtained w…
Data Stream Clustering for Application-Layer DDoS Detection in Encrypted Traffic
2018
Application-layer distributed denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed using legitimate requests from legitimately connected network machines that make these attacks undetectable by signature-based intrusion detection systems. Moreover, the attacks may utilize protocols that encrypt the data of network connections in the application layer, making it even harder to detect an attacker’s activity without decrypting users’ network traffic, and therefore violating their privacy. In this paper, we present a method that allows us to detect various application-l…
Repair Mechanisms for Broadcast Transmissions in Hybrid Cellular & DVB-H Systems
2006
This paper proposes a framework for investigating potential infrastructure cost savings in hybrid cellular and DVB- H systems by performing efficient error repair of broadcast transmissions. The main idea is to reuse as much as possible the existing network infrastructure to provide mobile TV services. The cellular system is not only employed to collect information, but also to send repair data to the users whose conditions are temporarily affected by noise, interference and fading. To enable an easy and efficient implementation of the repair mechanisms we adopt the use of application layer - forward error correction (AL-FEC) with digital fountain coding.
Application Layer FEC for Mobile TV Delivery in IP Datacast Over DVB-H Systems
2009
In this paper we investigate the potential gain that can be obtained in DVB-H using application layer forward error correction (AL-FEC) to perform a multi-burst protection of the transmission for improving the reception of streaming services for mobile terminals. Compared to the conventional approach with link layer multi protocol encapsulation FEC (MPE-FEC), this technique allows to increase the robustness of the DVB-H transmission not only as a function of the capacity devoted for error repair (FEC overhead), but also as a function of the number of bursts jointly encoded. The main drawback of this approach is an increase of the network latency, that can be translated into a larger service…
Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks
2017
With the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from…
Underwater Multirobot Cooperative Intervention MAC Protocol
2020
This work introduces a Medium Access Control (MAC) protocol designed to allow a group of underwater robots that share a wireless communication channel to effectively communicate with each other. The goal of the Underwater Multirobot Cooperative Intervention MAC (UMCI-MAC) protocol presented in this work is to minimize the end to end delay and the jitter. The access to the medium in UMCI-MAC follows a Time Division Multiple Access (TDMA) strategy which is arbitrated by a master, which also has the capability to prioritize the transmission of some nodes over the rest of the network. Two experiments have been carried out with a team of four Autonomous Underwater Vehicles (AUV) in order to comp…