Results 31 to 40 of about 3,326 (213)
Analisis Kesiapan Penyelenggara Jaringan Internet di Indonesia dalam Migrasi ke IPv6
Internet Protocol merupakan sumberdaya pengalamatan jaringan yang sifatnya terbatas. Sejak dikembangkankan konsep TCP/IP, sumberdaya pengalamatan jaringan dan internet berbasiskan pada Internet Protokol versi 4 (IPv4) yang memiliki 4 miliar alamat unik ...
Riza Azmi
doaj +1 more source
Parsing Millions of DNS Records Per Second
ABSTRACT Objectives To enhance the throughput of DNS parsing by addressing the computational expense of processing large plain text DNS zone files. To specifically increase the speed of parsing DNS zone files compared to existing state‐of‐the‐art parsers. Method Development of a new approach named simdzone for DNS parsing.
Jeroen Koekkoek, Daniel Lemire
wiley +1 more source
Propuesta de métrica para evaluar los protocolos de enrutamiento y direccionamiento IP
El presente artículo compara el rendimiento de los direccionamientos IPV4 e IPV6 usando los protocolos de enrutamiento RIP, BGP y OSPF en dos escenarios: 1) teórico, usando la métrica propuesta en el presente artículo, y 2) con la herramienta de JMeter ...
Joel Carroll Vargas +2 more
doaj +1 more source
Mitigating BGP Route Leaks With Attributes and Communities: A Stopgap Solution for Path Plausibility
ABSTRACT The Border Gateway Protocol (BGP) is known to have serious security vulnerabilities. One of these vulnerabilities is BGP route leaks. A BGP route leak describes the propagation of route announcements beyond their intended scope, violating the Gao‐Rexford model.
Nils Höger +2 more
wiley +1 more source
Configuring Hosts to Auto-detect (IPv6, IPv6-in-IPv4, or IPv4) Network Connectivity
This document specifies a new IPv6 deployment protocol called CHANC, which stands for Configuring Hosts to Auto-detect (IPv6, IPv6-in-IPv4, or IPv4) Network Connectivity. The main part is an application level tunneling protocol that allows Internet Service Providers (ISPs) to rapidly start deploying IPv6 service to their subscribers whom connected to ...
Hamarsheh, Ala +2 more
openaire +2 more sources
IoT and Man‐in‐the‐Middle Attacks
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni +2 more
wiley +1 more source
Simulasi Penggunaan Ipv6 Pada PD. Pumas Jaya Menggunakan Metode Manual Tunneling
Internet usage trends with IPv4 addresses that only have 32-bit addresses could no longer cope with the large allocation of the required addresses. Internet Engineering Task Force (IETF) has issued a new standard of Internet protocol called IPv6 to ...
Elidjen Elidjen +3 more
doaj +1 more source
A Methodology for the Emulation of IPv4
Mobile configurations and wide-area net-works have garnered tremendous interest from both cryptographers and electrical en-gineers in the last several years. In this paper, we disconfirm the analysis of object-oriented languages, which embodies the un-proven principles of artificial intelligence.
openaire +1 more source
The throughput results of the dual DUT setup could approximate well that of the single DUT setup. Their difference followed the predictions of our theoretical considerations. However, the latency results did not always follow the theoretical expectations.
Gábor Lencse, Szabolcs Szilágyi
wiley +1 more source
Kondisi Migrasi Internet Protocol version 6 (IPv6) di Indonesia
Sejalan dengan pertumbuhan industri Internet di Indonesia tersebut, maka kebutuhan akan alamat Internet Protocol (IP) juga pasti meningkat. Operator Internet akan membutuhkan alamat IP untuk mengembangkan layanannya hingga ke seluruh pelosok negeri ...
Fahrizal Lukman Budiono, Riza Azmi
doaj +1 more source

