Results 21 to 30 of about 305,450 (294)

Packet reordering, high speed networks and transport protocol performance [PDF]

open access: yes, 2004
We performed end-to-end measurements of UDP/IP flows across an Internet backbone network. Using this data, we characterized the packet reordering processes seen in the network.
Gharai, L., Lehman, T., Perkins, C.S.
core   +3 more sources

Delay-based network coding packet selection [PDF]

open access: yesManagement Science Letters, 2014
Network coding is introduced as a technique to improve performance in communication networks. In network coding, intermediate nodes mix packets to enhance network performance. To increase throughput, several approaches have been proposed based on network
Rasoul Nikoee Saravani   +1 more
doaj   +1 more source

Architecture, design, and modeling of the OPSnet asynchronous optical packet switching node [PDF]

open access: yes, 2005
An all-optical packet-switched network supporting multiple services represents a long-term goal for network operators and service providers alike.
Harle, D.A., Vanderbauwhede, W.A.
core   +1 more source

Carrier Sense Random Packet CDMA Protocol in Dual-Channel Networks [PDF]

open access: yes, 2015
Code resource wastage is caused by the reason that many hopping frequency (FH) sequences are unused, which occurs under the condition that the number of the actual subnets needed for the tactical network is far smaller than the networking capacity of ...
Cui, P.   +5 more
core   +2 more sources

Fast Parallel Network Packet Filter System based on CUDA [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2014
In recent years, with the rapid development of the network hardware and software, the network speed is enhanced to multi-gigabit. Network packet filtering is an important strategy of network security to avoid malicious attacks, and it is a computation ...
Che-Lun Hung, Shih-Wei Guo
doaj   +1 more source

IoT Device Identification Using Directional Packet Length Sequences and 1D-CNN

open access: yesSensors, 2022
With the large-scale application of the Internet of Things (IoT), security issues have become increasingly prominent. Device identification is an effective way to secure IoT environment by quickly identifying the category or model of devices in the ...
Xiangyu Liu, Yi Han, Yanhui Du
doaj   +1 more source

Network Coding for Severe Packet Reordering in Multihop Wireless Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2015
Network coding is known to be effective in overcoming packet losses and packet reordering in multihop wireless networks. Despite the benefits, network coding is hard to deploy without being compatible with TCP.
Chansook Lim
doaj   +1 more source

Intrusion Recognition for LTE Core Network Based on Low-Complexity Random Packet Detection [PDF]

open access: yesJisuanji gongcheng, 2020
In Long Term Evolution(LTE) core network,message detection is used in Policy Control and Charging(PCC) system to detect packets passing through the packet data network gateway, which reduces the security threat brought by malicious users.For this reason ...
LIU Yali, SHI Ruifeng, REN Xiaoliang
doaj   +1 more source

Network traffic behaviour near phase transition point [PDF]

open access: yes, 2005
We explore packet traffic dynamics in a data network model near phase transition point from free flow to congestion. The model of data network is an abstraction of the Network Layer of the OSI (Open Systems Interconnection) Reference Model of packet ...
Lawniczak, Anna T., Tang, Xiongwen
core   +2 more sources

End-to-End Algebraic Network Coding for Wireless TCP/IP Networks [PDF]

open access: yes, 2010
The Transmission Control Protocol (TCP) was designed to provide reliable transport services in wired networks. In such networks, packet losses mainly occur due to congestion.
Mao, Tong   +3 more
core   +5 more sources

Home - About - Disclaimer - Privacy