Results 71 to 80 of about 14,618 (242)

Network Reconnaissance in IPv6-based Residential Broadband Networks [PDF]

open access: yesarXiv, 2020
Network scanning has been a widely used technique to gather information on the Internet as a whole. The transition from IPv4 to IPv6 causes traditional network scanning to become less useful. An increasing number of hosts is either IPv6-only or not publicly addressable via IPv4 due to the use of NAT, prompting a need for network scanning techniques for
arxiv  

Phase Changes in the Evolution of the IPv4 and IPv6 AS-Level Internet Topologies [PDF]

open access: yes, 2010
In this paper we investigate the evolution of the IPv4 and IPv6 Internet topologies at the autonomous system (AS) level over a long period of time.We provide abundant empirical evidence that there is a phase transition in the growth trend of the two networks. For the IPv4 network, the phase change occurred in 2001.
arxiv   +1 more source

Visualizing MAC and IPv6 Address Allocations [PDF]

open access: yesarXiv, 2023
In this work, I describe a method for visualizing two types of network address allocations: Media Access Control (MAC) addresses -- hardware identifiers permanently assigned to network interfaces -- and Internet Protocol Version 6 (IPv6) allocations -- subnetworks assigned from a larger, encompassing network (e.g., allocated /64 networks from a /48 ...
arxiv  

Full‐mesh VPN performance evaluation for a secure edge‐cloud continuum

open access: yesSoftware: Practice and Experience, Volume 54, Issue 8, Page 1543-1564, August 2024.
Abstract The recent introduction of full‐mesh virtual private network (VPN) solutions which offer near native performance, coupled with modern encryption algorithms and easy scalability as a result of a central control plane have a strong potential to enable the implementation of a seamless edge‐cloud continuum.
Vojdan Kjorveziroski   +3 more
wiley   +1 more source

IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

open access: yesSensors, 2013
Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability
Peter Kirstein   +4 more
doaj   +1 more source

Unconsidered Installations: Discovering IoT Deployments in the IPv6 Internet [PDF]

open access: yesIn Proceedings of the 2024 IEEE/IFIP Network Operations and Management Symposium (NOMS '24), May 6-10, 2024, Seoul, Korea
Internet-wide studies provide extremely valuable insight into how operators manage their Internet of Things (IoT) deployments in reality and often reveal grievances, e.g., significant security issues. However, while IoT devices often use IPv6, past studies resorted to comprehensively scan the IPv4 address space.
arxiv   +1 more source

Improved 5G network slicing for enhanced QoS against attack in SDN environment using deep learning

open access: yesIET Communications, Volume 18, Issue 13, Page 759-777, August 2024.
Software‐defined networking is utilized with the OpenFlow protocol and Ryu control to optimize broadband and enhance attack detection using neural networks. The proposed system was evaluated using a 5G dataset, and the results demonstrated an accuracy of 99%, surpassing the results of four previous articles.
Mohammed Salah Abood   +10 more
wiley   +1 more source

Dynamic MTU : Technique to reduce packet drops in IPv6 network resulted due to smaller path mtu size [PDF]

open access: yes, 2019
With an increase in the number of internet users and the need to secure internet traffic, the unreliable IPv4 protocol has been replaced by a more secure protocol, called IPv6 for Internet system. The IPv6 protocol does not allow intermediate routers to fragment the on-going IPv6 packet.
arxiv   +1 more source

Enhanced reliability in hazardous event detection: A resilient multipath routing protocol for wireless sensor networks

open access: yesIET Wireless Sensor Systems, Volume 14, Issue 4, Page 111-131, August 2024.
The authors propose the Reliable Resilient Multipath Routing Protocol to support hazardous event detection and monitoring in wireless sensor networks. The protocol employs proactive and reactive network management techniques to increase connection redundancy and maintain connectivity during failures.
Bálint Áron Üveges, András Oláh
wiley   +1 more source

PERFORMANCE ANALYSIS BETWEEN EXPLICIT SCHEDULING AND IMPLICIT SCHEDULING OF PARALLEL ARRAY-BASED DOMAIN DECOMPOSITION USING OPENMP [PDF]

open access: yesJournal of Engineering Science and Technology, 2014
With the continuous revolution of multicore architecture, several parallel programming platforms have been introduced in order to pave the way for fast and efficient development of parallel algorithms.
MOHAMMED FAIZ ABOALMAALY   +3 more
doaj  

Home - About - Disclaimer - Privacy