Results 211 to 220 of about 37,323 (253)
Some of the next articles are maybe not open access.
Transparent Multichannel IPv6 (TMC-IPv6) : Abschlussbericht
2021Diagramme
Deutschmann, Jörg +2 more
openaire +1 more source
A Stateless Spatial IPv6 Address Configuration Scheme for Internet of Things
Journal of the Institution of Electronics and Telecommunication Engineers, 2021The Internet of Things (IoT) is going to create a heterogeneous network of billions or trillions of connected things with self-aware, self-configuration capabilities that will exchange data with each other.
Gyanendra Kumar, Parul Tomar
semanticscholar +1 more source
2014
Main subject of this final paper is the Internet Protocol version 6 – how and due to what needs is was designed and created, what are the principles of its functioning and what new possibilities is it offering. To be able to talk about IPv6, we certainly have to mention its forerunner: the Internet Protocol version 4.
openaire +3 more sources
Main subject of this final paper is the Internet Protocol version 6 – how and due to what needs is was designed and created, what are the principles of its functioning and what new possibilities is it offering. To be able to talk about IPv6, we certainly have to mention its forerunner: the Internet Protocol version 4.
openaire +3 more sources
SPIE-IPv6: single IPv6 packet traceback
29th Annual IEEE International Conference on Local Computer Networks, 2004The source path isolation engine (SPIE), developed at BBN, provides accurate tracing of single IP packets through a network. The SPIE system calculates several small hash values for each packet as it traverses a router, then stores these values in a data structure called a Bloom filter.
W.T. Strayer +3 more
openaire +1 more source
Discovering the IPv6 Network Periphery
Passive and Active Network Measurement Conference, 2020We consider the problem of discovering the IPv6 network periphery, i.e., the last hop router connecting endhosts in the IPv6 Internet. Finding the IPv6 periphery using active probing is challenging due to the IPv6 address space size, wide variety of ...
Erik C. Rye, Robert Beverly
semanticscholar +1 more source
Request for Comments, 2008
Network-based mobility management enables IP mobility for a host without requiring its participation in any mobility-related signaling. The network is responsible for managing IP mobility on behalf of the host.
Sri Gundavelli +4 more
semanticscholar +1 more source
Network-based mobility management enables IP mobility for a host without requiring its participation in any mobility-related signaling. The network is responsible for managing IP mobility on behalf of the host.
Sri Gundavelli +4 more
semanticscholar +1 more source
IEEE/ACM Transactions on Networking, 2020
Segment Routing (SR) is a source routing paradigm which is widely used in Traffic Engineering (TE). By using SR, a node steers a packet through an ordered list of instructions called segments.
Ying Tian +6 more
semanticscholar +1 more source
Segment Routing (SR) is a source routing paradigm which is widely used in Traffic Engineering (TE). By using SR, a node steers a packet through an ordered list of instructions called segments.
Ying Tian +6 more
semanticscholar +1 more source
6VecLM: Language Modeling in Vector Space for IPv6 Target Generation
ECML/PKDD, 2020Fast IPv6 scanning is challenging in the field of network measurement as it requires exploring the whole IPv6 address space but limited by current computational power.
Tianyu Cui +4 more
semanticscholar +1 more source
Towards the Construction of Global IPv6 Hitlist and Efficient Probing of IPv6 Address Space
International Workshop on Quality of Service, 2020Fast IPv4 scanning has made sufficient progress in network measurement and security research. However, it is infeasible to perform brute-force scanning of the IPv6 address space.
Guanglei Song +6 more
semanticscholar +1 more source
Towards A User-Level Understanding of IPv6 Behavior
ACM/SIGCOMM Internet Measurement Conference, 2020IP address classification and clustering are important tools for security practitioners in understanding attacks and employing proactive defenses. Over the past decade, network providers have begun transitioning from IPv4 to the more flexible IPv6, and a
Frank H. Li, D. Freeman
semanticscholar +1 more source

