Results 51 to 60 of about 31,345 (245)
Mitigating BGP Route Leaks With Attributes and Communities: A Stopgap Solution for Path Plausibility
ABSTRACT The Border Gateway Protocol (BGP) is known to have serious security vulnerabilities. One of these vulnerabilities is BGP route leaks. A BGP route leak describes the propagation of route announcements beyond their intended scope, violating the Gao‐Rexford model.
Nils Höger +2 more
wiley +1 more source
Propuesta de métrica para evaluar los protocolos de enrutamiento y direccionamiento IP
El presente artículo compara el rendimiento de los direccionamientos IPV4 e IPV6 usando los protocolos de enrutamiento RIP, BGP y OSPF en dos escenarios: 1) teórico, usando la métrica propuesta en el presente artículo, y 2) con la herramienta de JMeter ...
Joel Carroll Vargas +2 more
doaj +1 more source
DESAIN DAN IMPLEMENTASI IPv6 OVER IPv4 TUNNELING PADA BACKBONE JARINGAN LAN/WAN DI UNIVERSITAS MUHAMMADIYAH MALANG [PDF]
IPv6 over IPv4 Tunneling merupakan salah satu metode untuk mengatasi\ud masa transisi dari IPv4 ke IPv6. Fungsi ini digunakan agar host yang\ud diimplementasikan IPv6 dapat berkomunikasi dengan host yang di\ud implementasikan IPv4 melalui jaringan router
Nur Fajri, Hendra
core
The Security Flag in the IPv4 Header [PDF]
Firewalls, packet filters, intrusion detection systems, and the like often have difficulty distinguishing between packets that have malicious intent and those that are merely unusual. We define a security flag in the IPv4 header as a means of distinguishing the two cases.
openaire +2 more sources
IoT and Man‐in‐the‐Middle Attacks
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni +2 more
wiley +1 more source
Simulasi Penggunaan Ipv6 Pada PD. Pumas Jaya Menggunakan Metode Manual Tunneling
Internet usage trends with IPv4 addresses that only have 32-bit addresses could no longer cope with the large allocation of the required addresses. Internet Engineering Task Force (IETF) has issued a new standard of Internet protocol called IPv6 to ...
Elidjen Elidjen +3 more
doaj +1 more source
Network layer access control for context-aware IPv6 applications [PDF]
As part of the Lancaster GUIDE II project, we have developed a novel wireless access point protocol designed to support the development of next generation mobile context-aware applications in our local environs.
Cheverst, Keith +5 more
core +2 more sources
The throughput results of the dual DUT setup could approximate well that of the single DUT setup. Their difference followed the predictions of our theoretical considerations. However, the latency results did not always follow the theoretical expectations.
Gábor Lencse, Szabolcs Szilágyi
wiley +1 more source
A comprehensive survey on software‐defined networking for smart communities
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary +3 more
wiley +1 more source
Kondisi Migrasi Internet Protocol version 6 (IPv6) di Indonesia
Sejalan dengan pertumbuhan industri Internet di Indonesia tersebut, maka kebutuhan akan alamat Internet Protocol (IP) juga pasti meningkat. Operator Internet akan membutuhkan alamat IP untuk mengembangkan layanannya hingga ke seluruh pelosok negeri ...
Fahrizal Lukman Budiono, Riza Azmi
doaj +1 more source

