Results 41 to 50 of about 30,969 (244)
Parsing Millions of DNS Records Per Second
ABSTRACT Objectives To enhance the throughput of DNS parsing by addressing the computational expense of processing large plain text DNS zone files. To specifically increase the speed of parsing DNS zone files compared to existing state‐of‐the‐art parsers. Method Development of a new approach named simdzone for DNS parsing.
Jeroen Koekkoek, Daniel Lemire
wiley +1 more source
Case Study - IPv6 based building automation solution integration into an IPv4 Network Service Provider infrastructure [PDF]
The case study presents a case study describing an Internet Protocol (IP) version 6 (v6) introduction to an IPv4 Internet Service Provider (ISP) network infrastructure.
Bogomilov, Ivan, Milovanov, Nikolay
core
Preserving Established Communications in IPv6 Multi-homed Sites with MEX [PDF]
This research was supported by the SAM (Advanced Mobility Services) project, funded by the Spanish National R&D Programme under contract MCYT TIC2002-04531-C04-03.A proper support for multimedia communications transport has to provide fault tolerance ...
Azcorra, Arturo+4 more
core +3 more sources
Mitigating BGP Route Leaks With Attributes and Communities: A Stopgap Solution for Path Plausibility
ABSTRACT The Border Gateway Protocol (BGP) is known to have serious security vulnerabilities. One of these vulnerabilities is BGP route leaks. A BGP route leak describes the propagation of route announcements beyond their intended scope, violating the Gao‐Rexford model.
Nils Höger+2 more
wiley +1 more source
Analisis Kesiapan Penyelenggara Jaringan Internet di Indonesia dalam Migrasi ke IPv6
Internet Protocol merupakan sumberdaya pengalamatan jaringan yang sifatnya terbatas. Sejak dikembangkankan konsep TCP/IP, sumberdaya pengalamatan jaringan dan internet berbasiskan pada Internet Protokol versi 4 (IPv4) yang memiliki 4 miliar alamat unik ...
Riza Azmi
doaj +1 more source
IoT and Man‐in‐the‐Middle Attacks
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni+2 more
wiley +1 more source
Propuesta de métrica para evaluar los protocolos de enrutamiento y direccionamiento IP
El presente artículo compara el rendimiento de los direccionamientos IPV4 e IPV6 usando los protocolos de enrutamiento RIP, BGP y OSPF en dos escenarios: 1) teórico, usando la métrica propuesta en el presente artículo, y 2) con la herramienta de JMeter ...
Joel Carroll Vargas+2 more
doaj +1 more source
Mobile IP: state of the art report [PDF]
Due to roaming, a mobile device may change its network attachment each time it moves to a new link. This might cause a disruption for the Internet data packets that have to reach the mobile node.
Heijenk, Geert, Karagiannis, Georgios
core +2 more sources
Network layer access control for context-aware IPv6 applications [PDF]
As part of the Lancaster GUIDE II project, we have developed a novel wireless access point protocol designed to support the development of next generation mobile context-aware applications in our local environs.
Cheverst, Keith+5 more
core +2 more sources
The Security Flag in the IPv4 Header [PDF]
Firewalls, packet filters, intrusion detection systems, and the like often have difficulty distinguishing between packets that have malicious intent and those that are merely unusual. We define a security flag in the IPv4 header as a means of distinguishing the two cases.
openaire +2 more sources