Results 51 to 60 of about 30,969 (244)

Equivalence and difference of the dual device under test setup and the single device under test setup of RFC 8219

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 3, February 2025.
The throughput results of the dual DUT setup could approximate well that of the single DUT setup. Their difference followed the predictions of our theoretical considerations. However, the latency results did not always follow the theoretical expectations.
Gábor Lencse, Szabolcs Szilágyi
wiley   +1 more source

Simulasi Penggunaan Ipv6 Pada PD. Pumas Jaya Menggunakan Metode Manual Tunneling

open access: yesComTech, 2010
Internet usage trends with IPv4 addresses that only have 32-bit addresses could no longer cope with the large allocation of the required addresses. Internet Engineering Task Force (IETF) has issued a new standard of Internet protocol called IPv6 to ...
Elidjen Elidjen   +3 more
doaj   +1 more source

A comprehensive survey on software‐defined networking for smart communities

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 1, 10 January 2025.
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary   +3 more
wiley   +1 more source

Temporal and Spatial Classification of Active IPv6 Addresses

open access: yes, 2015
There is striking volume of World-Wide Web activity on IPv6 today. In early 2015, one large Content Distribution Network handles 50 billion IPv6 requests per day from hundreds of millions of IPv6 client addresses; billions of unique client addresses are ...
Berger, Arthur, Plonka, David
core   +1 more source

Towards autonomous device protection using behavioural profiling and generative artificial intelligence

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
The article proposes a novel concept of autonomous device protection based on behavioural profiling by continuously monitoring internal resource usage and exploiting a large language model to distinguish between benign and malicious behaviour. Abstract Demand for autonomous protection in computing devices cannot go unnoticed, considering the rapid ...
Sandeep Gupta, Bruno Crispo
wiley   +1 more source

Kondisi Migrasi Internet Protocol version 6 (IPv6) di Indonesia

open access: yesBuletin Pos dan Telekomunikasi: Media Komunikasi Ilmiah, 2011
   Sejalan dengan pertumbuhan industri Internet di Indonesia tersebut, maka kebutuhan akan alamat Internet Protocol (IP) juga pasti meningkat. Operator Internet akan membutuhkan alamat IP untuk mengembangkan layanannya hingga ke seluruh pelosok negeri ...
Fahrizal Lukman Budiono, Riza Azmi
doaj   +1 more source

DESAIN DAN IMPLEMENTASI IPv6 OVER IPv4 TUNNELING PADA BACKBONE JARINGAN LAN/WAN DI UNIVERSITAS MUHAMMADIYAH MALANG [PDF]

open access: yes, 2007
IPv6 over IPv4 Tunneling merupakan salah satu metode untuk mengatasi\ud masa transisi dari IPv4 ke IPv6. Fungsi ini digunakan agar host yang\ud diimplementasikan IPv6 dapat berkomunikasi dengan host yang di\ud implementasikan IPv4 melalui jaringan router
Nur Fajri, Hendra
core  

End-Site Routing Support for IPv6 Multihoming [PDF]

open access: yes, 2006
Multihoming is currently widely used to provide fault tolerance and traffic engineering capabilities. It is expected that, as telecommunication costs decrease, its adoption will become more and more prevalent.
Azcorra Saloña, Arturo   +3 more
core   +2 more sources

On the EPA's Radar: The Role of Financial Reports in Environmental Regulatory Oversight

open access: yesJournal of Accounting Research, Volume 62, Issue 5, Page 1849-1900, December 2024.
ABSTRACT This paper investigates the role of corporate financial reports in the Environmental Protection Agency's (EPA) regulatory activities. By tracking the EPA's direct retrieval of SEC filings, we identify three key findings. First, the EPA retrieves a large volume of financial reports, especially from firms in high‐pollution industries.
BIN LI, ANNIKA YU WANG
wiley   +1 more source

Home - About - Disclaimer - Privacy