Results 41 to 50 of about 30,144 (245)

Mitigating BGP Route Leaks With Attributes and Communities: A Stopgap Solution for Path Plausibility

open access: yesInternational Journal of Network Management, Volume 35, Issue 2, March/April 2025.
ABSTRACT The Border Gateway Protocol (BGP) is known to have serious security vulnerabilities. One of these vulnerabilities is BGP route leaks. A BGP route leak describes the propagation of route announcements beyond their intended scope, violating the Gao‐Rexford model.
Nils Höger   +2 more
wiley   +1 more source

On the security of the Mobile IP protocol family [PDF]

open access: yes, 2007
The Internet Engineering Task Force (IETF) has worked on\ud network layer mobility for more than 10 years and a number\ud of RFCs are available by now. Although the IETF mobility\ud protocols are not present in the Internet infrastructure as of\ud today,
Karagiannis, Georgios   +2 more
core   +1 more source

Analisis Kesiapan Penyelenggara Jaringan Internet di Indonesia dalam Migrasi ke IPv6

open access: yesBuletin Pos dan Telekomunikasi: Media Komunikasi Ilmiah, 2012
Internet Protocol merupakan sumberdaya pengalamatan jaringan yang sifatnya terbatas. Sejak dikembangkankan konsep TCP/IP, sumberdaya pengalamatan jaringan dan internet berbasiskan pada Internet Protokol versi 4 (IPv4) yang memiliki 4 miliar alamat unik ...
Riza Azmi
doaj   +1 more source

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
wiley   +1 more source

Hidden geometric correlations in real multiplex networks

open access: yes, 2016
Real networks often form interacting parts of larger and more complex systems. Examples can be found in different domains, ranging from the Internet to structural and functional brain networks.
A Clauset   +49 more
core   +1 more source

Equivalence and difference of the dual device under test setup and the single device under test setup of RFC 8219

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 3, February 2025.
The throughput results of the dual DUT setup could approximate well that of the single DUT setup. Their difference followed the predictions of our theoretical considerations. However, the latency results did not always follow the theoretical expectations.
Gábor Lencse, Szabolcs Szilágyi
wiley   +1 more source

Service quality measurements for IPv6 inter-networks [PDF]

open access: yes, 2004
Measurement-based performance evaluation of network traffic is becoming very important, especially for networks trying to provide differentiated levels of service quality to the different application flows.
Garcia, F.   +4 more
core   +2 more sources

Simulasi Penggunaan Ipv6 Pada PD. Pumas Jaya Menggunakan Metode Manual Tunneling

open access: yesComTech, 2010
Internet usage trends with IPv4 addresses that only have 32-bit addresses could no longer cope with the large allocation of the required addresses. Internet Engineering Task Force (IETF) has issued a new standard of Internet protocol called IPv6 to ...
Elidjen Elidjen   +3 more
doaj   +1 more source

A comprehensive survey on software‐defined networking for smart communities

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 1, 10 January 2025.
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary   +3 more
wiley   +1 more source

Toward incremental FIB aggregation with quick selections (FAQS)

open access: yes, 2018
Several approaches to mitigating the Forwarding Information Base (FIB) overflow problem were developed and software solutions using FIB aggregation are of particular interest.
Grigoryan, Garegin, Liu, Yaoqing
core   +1 more source

Home - About - Disclaimer - Privacy