Results 11 to 20 of about 6,499,676 (377)
5G Campus Networks: A First Measurement Study
A 5G campus network is a 5G network for the users affiliated with the campus organization, e.g., an industrial campus, covering a prescribed geographical area. A 5G campus network can operate as a so-called 5G non-standalone (NSA) network (which requires
Justus Rischke+4 more
doaj +1 more source
Packetization and Packet Curves in Network Calculus [PDF]
Arrival and service curves are core functions in the Network Calculus framework. Based on those curves, we present in this talk a new formalism for data packetization in Network Calculus, the packet curves. Indeed, a more precise knowledge of the packet characteristics can be efficiently exploited to get tighter performance bounds, for example for ...
Bouillard, Anne+2 more
openaire +3 more sources
EXPERIMENTAL PERFORMANCE EVALUATION AND FEASIBILITY STUDY OF 6LoWPAN BASED INTERNET OF THINGS [PDF]
Nowadays, demand for low power, small, mobile and flexible computing machines that interconnects are growing rapidly. This study highlights internet of things (IoT) model regarding sensor node discovery and IPV6 framework using 6LoWPAN. Contiki network
James AGAJO+5 more
doaj +1 more source
Subset Codes for Packet Networks [PDF]
In this paper, we present a coding-theoretic framework for message transmission over packet-switched networks. Network is modeled as a channel which can induce packet errors, deletions, insertions, and out of order delivery of packets. The proposed approach can be viewed as an extension of the one introduced by Koetter and Kschischang for networks ...
Mladen Kovacevic, Dejan Vukobratovic
openaire +3 more sources
In many Internet of Things (IoT) systems and monitoring wireless sensor networks (WSNs), sensor nodes are expected to function for prolonged periods of time with no scope of recharging the sensor node batteries.
Lilian C. Mutalemwa, Seokjoo Shin
doaj +1 more source
Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware
More than 75% of Internet traffic is now encrypted, and this percentage is constantly increasing. The majority of communications are secured using common encryption protocols such as SSL/TLS and IPsec to ensure security and protect the privacy of ...
Eva Papadogiannaki, Sotiris Ioannidis
doaj +1 more source
Packet reordering, high speed networks and transport protocol performance [PDF]
We performed end-to-end measurements of UDP/IP flows across an Internet backbone network. Using this data, we characterized the packet reordering processes seen in the network.
Gharai, L., Lehman, T., Perkins, C.S.
core +3 more sources
A Protocol for Packet Network Intercommunication [PDF]
A protocol that supports the sharing of resources that exist in different packet switching networks is presented. The protocol provides for variation in individual network packet sizes, transmission failures, sequencing, flow control, end-to-end error checking, and the creation and destruction of logical process-to-process connections.
Robert E. Kahn, Vinton G. Cerf
openaire +3 more sources
Delay-based network coding packet selection [PDF]
Network coding is introduced as a technique to improve performance in communication networks. In network coding, intermediate nodes mix packets to enhance network performance. To increase throughput, several approaches have been proposed based on network
Rasoul Nikoee Saravani +1 more
doaj +1 more source
IoT Device Identification Using Directional Packet Length Sequences and 1D-CNN
With the large-scale application of the Internet of Things (IoT), security issues have become increasingly prominent. Device identification is an effective way to secure IoT environment by quickly identifying the category or model of devices in the ...
Xiangyu Liu, Yi Han, Yanhui Du
doaj +1 more source