Results 31 to 40 of about 29,682 (240)

Protocolo IPv6 com pilha dupla em um campus universitário

open access: yesRevista Brasileira de Computação Aplicada, 2015
Com o esgotamento do endereçamento IPv4 sendo uma realidade, a adoção do IPv6 se torna cada vez mais necessária. Os protocolos IPv4 e IPv6 são incompatíveis e têm questões de operação diferentes, o que torna a implementação do IPv6 relativamente difícil ...
Fernando Barreto
doaj   +1 more source

Comparative Analysis of the Capabilities of IPv6 and IPv4 Protocols to Provide the Designated Quality of Service

open access: yesDoklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki, 2023
The paper presents a comparative analysis of the IPv4 and IPv6 data transfer protocols to ensure a given quality of service (QoS). As parameters of QoS, the bandwidth and the associated transmission rate, as well as the amount of delay and jitter – delay
V. V. Bachilo   +2 more
doaj   +1 more source

Configuring Hosts to Auto-detect (IPv6, IPv6-in-IPv4, or IPv4) Network Connectivity

open access: yesKSII Transactions on Internet and Information Systems, 2011
This document specifies a new IPv6 deployment protocol called CHANC, which stands for Configuring Hosts to Auto-detect (IPv6, IPv6-in-IPv4, or IPv4) Network Connectivity. The main part is an application level tunneling protocol that allows Internet Service Providers (ISPs) to rapidly start deploying IPv6 service to their subscribers whom connected to ...
Hamarsheh, Ala   +2 more
openaire   +3 more sources

Autonomous construction framework for crane control with enhanced soft actor–critic algorithm and real‐time progress monitoring

open access: yesComputer-Aided Civil and Infrastructure Engineering, EarlyView.
Abstract With the shortage of skilled labors, there is an increasing demand for automation in the construction industry. This study presents an autonomous construction framework for crane control with enhanced soft actor–critic (SAC‐E) algorithm and real‐time progress monitoring.
Yifei Xiao, T. Y. Yang, Fan Xie
wiley   +1 more source

Performance Analysis for Wireless Networks: An Analytical Approach by Multifarious Sym Teredo

open access: yesThe Scientific World Journal, 2014
IPv4-IPv6 transition rolls out numerous challenges to the world of Internet as the Internet is drifting from IPv4 to IPv6. IETF recommends few transition techniques which includes dual stack and translation and tunneling.
D. Shalini Punithavathani, Sheryl Radley
doaj   +1 more source

Scarcity in IP addresses: IPv4 Address Transfer Markets and the Regional Internet Address Registries [PDF]

open access: yes, 2008
We are running out of Internet addresses. This paper evaluates address transfer policies that Internet governance agencies are considering as a response to the depletion of the IPv4 address space.
Milton Mueller
core  

Traffic engineering in multihomed sites [PDF]

open access: yes, 2005
It is expected that IPv6 multihomed sites will obtain as many global prefixes as direct providers they have, so traffic engineering techniques currently used in IPv4 multihomed sites is no longer suitable.
Azcorra, Arturo   +4 more
core   +3 more sources

The Security Flag in the IPv4 Header [PDF]

open access: yes, 2003
Firewalls, packet filters, intrusion detection systems, and the like often have difficulty distinguishing between packets that have malicious intent and those that are merely unusual. We define a security flag in the IPv4 header as a means of distinguishing the two cases.
openaire   +2 more sources

Parsing Millions of DNS Records Per Second

open access: yesSoftware: Practice and Experience, Volume 55, Issue 4, Page 778-788, April 2025.
ABSTRACT Objectives To enhance the throughput of DNS parsing by addressing the computational expense of processing large plain text DNS zone files. To specifically increase the speed of parsing DNS zone files compared to existing state‐of‐the‐art parsers. Method Development of a new approach named simdzone for DNS parsing.
Jeroen Koekkoek, Daniel Lemire
wiley   +1 more source

Mitigating BGP Route Leaks With Attributes and Communities: A Stopgap Solution for Path Plausibility

open access: yesInternational Journal of Network Management, Volume 35, Issue 2, March/April 2025.
ABSTRACT The Border Gateway Protocol (BGP) is known to have serious security vulnerabilities. One of these vulnerabilities is BGP route leaks. A BGP route leak describes the propagation of route announcements beyond their intended scope, violating the Gao‐Rexford model.
Nils Höger   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy