Results 11 to 20 of about 53,372 (247)
An evaluation of IPv6 multicast router in JGN IPv6 networks [PDF]
This paper describes an evaluation of IPv6 multicast routers. The JGN IPv6 project has performed various evaluations and verifications of IPv6 routers. Seven (7) types of routers from six vendors were tested, for which PIM-SM was employed as an IPv6 multicast protocol for the evaluation.
Kazumasa Kobayashi+5 more
openaire +2 more sources
El presente artículo tiene como finalidad hacer un recuento de lo que es el protocolo IPv6; desde la evolución de IPv4, que motivó el diseño de nuevas características, hasta los detalles que componen la nueva versión del protocolo de Internet. En las secciones principales del artículo se explican los inconvenientes de IPv4 que se resuelven al ...
Castillo Medina, Carlos A+1 more
openaire +4 more sources
Existing identity-based schemes utilized in Vehicular Ad hoc Networks (VANETs) rely on roadside units to offer conditional privacy-preservation authentication and are vulnerable to insider attacks.
Mahmood A. Al-Shareeda+3 more
doaj +1 more source
ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK [PDF]
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end
Cyril Filip KOVACIK, Gabriel BUGAR
doaj +1 more source
Software-defined networking (SDN) is a revolutionary innovation in network technology with many desirable features, including flexibility and manageability.
Abdullah Ahmed Bahashwan+5 more
doaj +1 more source
Evaluación del Rendimiento de una red IPv6 utilizando IPSec en Modo Túnel
El espacio de direcciones IPv4 está a punto de llegar a su límite y podría colapsar, para corregir este evento muchos proponen que las redes existentes deberán realizar la migración definitiva a IPv6, tomando como referencia que este protocolo permitirá ...
Yumber Alejandro Ponce Loor+1 more
doaj +1 more source
Address Resolution (AR) and Duplicate Address Detection (DAD) are considered the most important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from each Internet Protocol version 6 (IPv6) host communicating with other ...
Ahmed K. Al-Ani+3 more
doaj +1 more source
The distributed denial of service (DDoS) attack is one of the most destructive organized cyber-attacks against online services or computers on the network.
Ayman Ghaben+3 more
doaj +1 more source
A Review of Scalability Issues in Software-Defined Exchange Point (SDX) Approaches: State-of-the-Art
Internet Exchange Points (IXPs) interconnect heterogeneous networks and transfer substantial traffic volumes. In the past decade, the number of IXPs has seen tremendous growth, with more operators connecting to these IXPs even though these IXPs faced ...
Abdijalil Abdullahi+2 more
doaj +1 more source
The rapid advances in the wireless communication industry have paved the way for the enhancement of wireless mobile ad-hoc networks (MANETs) to support various domains including civilian environments, emergency operations, and military affairs.
Baidaa Hamza Khudayer+3 more
doaj +1 more source