Results 11 to 20 of about 6,499,676 (377)

5G Campus Networks: A First Measurement Study

open access: yesIEEE Access, 2021
A 5G campus network is a 5G network for the users affiliated with the campus organization, e.g., an industrial campus, covering a prescribed geographical area. A 5G campus network can operate as a so-called 5G non-standalone (NSA) network (which requires
Justus Rischke   +4 more
doaj   +1 more source

Packetization and Packet Curves in Network Calculus [PDF]

open access: yesProceedings of the 6th International Conference on Performance Evaluation Methodologies and Tools, 2012
Arrival and service curves are core functions in the Network Calculus framework. Based on those curves, we present in this talk a new formalism for data packetization in Network Calculus, the packet curves. Indeed, a more precise knowledge of the packet characteristics can be efficiently exploited to get tighter performance bounds, for example for ...
Bouillard, Anne   +2 more
openaire   +3 more sources

EXPERIMENTAL PERFORMANCE EVALUATION AND FEASIBILITY STUDY OF 6LoWPAN BASED INTERNET OF THINGS [PDF]

open access: yesActa Electrotechnica et Informatica, 2017
Nowadays, demand for low power, small, mobile and flexible computing machines that interconnects are growing rapidly. This study highlights internet of things (IoT) model regarding sensor node discovery and IPV6 framework using 6LoWPAN. Contiki network
James AGAJO   +5 more
doaj   +1 more source

Subset Codes for Packet Networks [PDF]

open access: yesIEEE Communications Letters, 2013
In this paper, we present a coding-theoretic framework for message transmission over packet-switched networks. Network is modeled as a channel which can induce packet errors, deletions, insertions, and out of order delivery of packets. The proposed approach can be viewed as an extension of the one introduced by Koetter and Kschischang for networks ...
Mladen Kovacevic, Dejan Vukobratovic
openaire   +3 more sources

Comprehensive Performance Analysis of Privacy Protection Protocols Utilizing Fake Packet Injection Techniques

open access: yesIEEE Access, 2020
In many Internet of Things (IoT) systems and monitoring wireless sensor networks (WSNs), sensor nodes are expected to function for prolonged periods of time with no scope of recharging the sensor node batteries.
Lilian C. Mutalemwa, Seokjoo Shin
doaj   +1 more source

Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware

open access: yesSensors, 2021
More than 75% of Internet traffic is now encrypted, and this percentage is constantly increasing. The majority of communications are secured using common encryption protocols such as SSL/TLS and IPsec to ensure security and protect the privacy of ...
Eva Papadogiannaki, Sotiris Ioannidis
doaj   +1 more source

Packet reordering, high speed networks and transport protocol performance [PDF]

open access: yes, 2004
We performed end-to-end measurements of UDP/IP flows across an Internet backbone network. Using this data, we characterized the packet reordering processes seen in the network.
Gharai, L., Lehman, T., Perkins, C.S.
core   +3 more sources

A Protocol for Packet Network Intercommunication [PDF]

open access: yesIEEE Transactions on Communications, 1974
A protocol that supports the sharing of resources that exist in different packet switching networks is presented. The protocol provides for variation in individual network packet sizes, transmission failures, sequencing, flow control, end-to-end error checking, and the creation and destruction of logical process-to-process connections.
Robert E. Kahn, Vinton G. Cerf
openaire   +3 more sources

Delay-based network coding packet selection [PDF]

open access: yesManagement Science Letters, 2014
Network coding is introduced as a technique to improve performance in communication networks. In network coding, intermediate nodes mix packets to enhance network performance. To increase throughput, several approaches have been proposed based on network
Rasoul Nikoee Saravani   +1 more
doaj   +1 more source

IoT Device Identification Using Directional Packet Length Sequences and 1D-CNN

open access: yesSensors, 2022
With the large-scale application of the Internet of Things (IoT), security issues have become increasingly prominent. Device identification is an effective way to secure IoT environment by quickly identifying the category or model of devices in the ...
Xiangyu Liu, Yi Han, Yanhui Du
doaj   +1 more source

Home - About - Disclaimer - Privacy