Results 311 to 320 of about 6,618,249 (381)
Some of the next articles are maybe not open access.
P4: programming protocol-independent packet processors
CCRV, 2013P4 is a high-level language for programming protocol-independent packet processors. P4 works in conjunction with SDN control protocols like OpenFlow. In its current form, OpenFlow explicitly specifies protocol headers on which it operates.
P. Bosshart +10 more
semanticscholar +1 more source
Networking with Cognitive Packets
2002Based on our earlier work ("Towards networks with intelligent packets", Proc. 14th Int. Symp. on Computer and Information Sciences, p. 1-11, Oct. 1999), we discuss packet networks in which intelligent capabilities for routing and flow control are concentrated in the packets, rather than in the nodes and protocols.
Erol Gelenbe, Ricardo Lent, Zhiguang Xu
openaire +1 more source
Gathering data with packet-in-packet in wireless sensor networks
Computer Networks, 2020Abstract In many wireless sensor network (WSN) mission-critical applications, a collector, e.g., a drone acting as a data sink, is required to gather data from all the source nodes in the area of interest. It is, thus, an all-to-one scenario. Data from each node (e.g., local temperature or its binary status) normally only consists of several bytes ...
Xiaoyuan Ma +3 more
openaire +1 more source
1983 IEEE Symposium on Security and Privacy, 1983
The trend towards common user packet switched networks has increased the need for the provision of adequate end-to-end security techniques in order to protect the data of individual groups of network users. The techniques which can be employed in order to provide adequate end-to-end security measures are considered in this paper frc,mamilitary ...
openaire +1 more source
The trend towards common user packet switched networks has increased the need for the provision of adequate end-to-end security techniques in order to protect the data of individual groups of network users. The techniques which can be employed in order to provide adequate end-to-end security measures are considered in this paper frc,mamilitary ...
openaire +1 more source
On the packet interleaved interface between packet switched network and computers
Proceedings of the third ACM symposium on Data communications and Data networks Analysis and design - DATACOMM '73, 1973This paper describes a study of transmission control procedure for computer to computer and computer to terminal communication through a public packet switched network.Four types of basic data link are defined over a packet travel path in the network, and the functions required for the data link are discussed.By applying the result of the discussion ...
H. Ohba +3 more
openaire +1 more source
Joint call and packet QoS in cellular packet networks
Computer Networks, 2007This paper proposes a novel call admission control scheme capable of providing a combination of call and packet level quality of service requirements in cellular packet networks. Specifically, we propose a distributed call admission control scheme called PFG, which maximizes the wireless channel utilization subject to a predetermined bound on the call ...
Majid Ghaderi +2 more
openaire +1 more source
Packet detection for wireless networking with multiple packet reception
MILCOM 2009 - 2009 IEEE Military Communications Conference, 2009A blueprint for an experimental low-power communications device (wireless mote) suitable for ad-hoc and networking applications is presented. The proposed device implements a random access packet-based communications protocol that exploits a special packet structure which is composed of separate header and payload portions.
Eric Son +3 more
openaire +1 more source
Fair Packet Forwarding in Opportunistic Networks
2011 IEEE 73rd Vehicular Technology Conference (VTC Spring), 2011Most replication-based packet forwarding algorithms in opportunistic networks neglect the fairness issue on the success rate distribution among all participants. In this paper we discuss the fairness evaluation on success rate, and propose a new fair packet forwarding strategy which operates as a plugin for traditional utility-based routing protocols ...
Li, VOK, Fan, X, Xu, K
openaire +2 more sources
1993
The telephone network is basically a circuit-switched network where a circuit is allocated for the whole duration of the call. This is a satisfactory mode of operation for speech conversation, where the circuit is used more or less continuously by one subscriber or the other.
openaire +1 more source
The telephone network is basically a circuit-switched network where a circuit is allocated for the whole duration of the call. This is a satisfactory mode of operation for speech conversation, where the circuit is used more or less continuously by one subscriber or the other.
openaire +1 more source
Proceedings of the 2nd International Workshop on Cloud Computing Platforms, 2012
In the presence of limitations in the availability of energy for data centres, especially in dense urban areas, a novel system that we call an Energy Packet Network is discussed as a means to provide energy on demand to Cloud Computing servers. This approach can be useful in the presence of renewable energy sources, and if scarce sources of energy must
openaire +1 more source
In the presence of limitations in the availability of energy for data centres, especially in dense urban areas, a novel system that we call an Energy Packet Network is discussed as a means to provide energy on demand to Cloud Computing servers. This approach can be useful in the presence of renewable energy sources, and if scarce sources of energy must
openaire +1 more source

