Results 31 to 40 of about 3,326 (213)

Analisis Kesiapan Penyelenggara Jaringan Internet di Indonesia dalam Migrasi ke IPv6

open access: yesBuletin Pos dan Telekomunikasi: Media Komunikasi Ilmiah, 2012
Internet Protocol merupakan sumberdaya pengalamatan jaringan yang sifatnya terbatas. Sejak dikembangkankan konsep TCP/IP, sumberdaya pengalamatan jaringan dan internet berbasiskan pada Internet Protokol versi 4 (IPv4) yang memiliki 4 miliar alamat unik ...
Riza Azmi
doaj   +1 more source

Parsing Millions of DNS Records Per Second

open access: yesSoftware: Practice and Experience, Volume 55, Issue 4, Page 778-788, April 2025.
ABSTRACT Objectives To enhance the throughput of DNS parsing by addressing the computational expense of processing large plain text DNS zone files. To specifically increase the speed of parsing DNS zone files compared to existing state‐of‐the‐art parsers. Method Development of a new approach named simdzone for DNS parsing.
Jeroen Koekkoek, Daniel Lemire
wiley   +1 more source

Propuesta de métrica para evaluar los protocolos de enrutamiento y direccionamiento IP

open access: yesAvances, 2019
El presente artículo compara el rendimiento de los direccionamientos IPV4 e IPV6 usando los protocolos de enrutamiento RIP, BGP y OSPF en dos escenarios: 1) teórico, usando la métrica propuesta en el presente artículo, y 2) con la herramienta de JMeter ...
Joel Carroll Vargas   +2 more
doaj   +1 more source

Mitigating BGP Route Leaks With Attributes and Communities: A Stopgap Solution for Path Plausibility

open access: yesInternational Journal of Network Management, Volume 35, Issue 2, March/April 2025.
ABSTRACT The Border Gateway Protocol (BGP) is known to have serious security vulnerabilities. One of these vulnerabilities is BGP route leaks. A BGP route leak describes the propagation of route announcements beyond their intended scope, violating the Gao‐Rexford model.
Nils Höger   +2 more
wiley   +1 more source

Configuring Hosts to Auto-detect (IPv6, IPv6-in-IPv4, or IPv4) Network Connectivity

open access: yesKSII Transactions on Internet and Information Systems, 2011
This document specifies a new IPv6 deployment protocol called CHANC, which stands for Configuring Hosts to Auto-detect (IPv6, IPv6-in-IPv4, or IPv4) Network Connectivity. The main part is an application level tunneling protocol that allows Internet Service Providers (ISPs) to rapidly start deploying IPv6 service to their subscribers whom connected to ...
Hamarsheh, Ala   +2 more
openaire   +2 more sources

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
wiley   +1 more source

Simulasi Penggunaan Ipv6 Pada PD. Pumas Jaya Menggunakan Metode Manual Tunneling

open access: yesComTech, 2010
Internet usage trends with IPv4 addresses that only have 32-bit addresses could no longer cope with the large allocation of the required addresses. Internet Engineering Task Force (IETF) has issued a new standard of Internet protocol called IPv6 to ...
Elidjen Elidjen   +3 more
doaj   +1 more source

A Methodology for the Emulation of IPv4

open access: yesInternational Journal of Innovative Technology and Exploring Engineering, 2019
Mobile configurations and wide-area net-works have garnered tremendous interest from both cryptographers and electrical en-gineers in the last several years. In this paper, we disconfirm the analysis of object-oriented languages, which embodies the un-proven principles of artificial intelligence.
openaire   +1 more source

Equivalence and difference of the dual device under test setup and the single device under test setup of RFC 8219

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 3, February 2025.
The throughput results of the dual DUT setup could approximate well that of the single DUT setup. Their difference followed the predictions of our theoretical considerations. However, the latency results did not always follow the theoretical expectations.
Gábor Lencse, Szabolcs Szilágyi
wiley   +1 more source

Kondisi Migrasi Internet Protocol version 6 (IPv6) di Indonesia

open access: yesBuletin Pos dan Telekomunikasi: Media Komunikasi Ilmiah, 2011
   Sejalan dengan pertumbuhan industri Internet di Indonesia tersebut, maka kebutuhan akan alamat Internet Protocol (IP) juga pasti meningkat. Operator Internet akan membutuhkan alamat IP untuk mengembangkan layanannya hingga ke seluruh pelosok negeri ...
Fahrizal Lukman Budiono, Riza Azmi
doaj   +1 more source

Home - About - Disclaimer - Privacy