نتایج جستجو برای: network protocol

تعداد نتایج: 879051  

2000
Sang Ho Bae Sung-Ju Lee Mario Gerla

The On-Demand Multicast Routing Protocol (ODMRP) is an effective and effwient routing protocol designed for mobile wireless ad hoc networks. One of the major strengths of ODMRP is its capability to operate both as a unicast and a multicast routing protocol. This versatility of ODMRP can increase network effziency as the network can handle both unicast and multicast traffw with one protocol We d...

2008
Yuwang Yang Yutao Ju Hengxin Xia Wei Zhao Ya Zhen

This article mainly designs a network protocol stack and network detection system for humanitarianism succor under radiation emergency conditions. The network protocol stack is based on the link and physical layers of IEEE 802.15.4 standard, and composed mainly of a hybrid multi-channel MAC protocol with virtual mechanism and power control mechanism and a routing protocol with ad hoc on-demand ...

2015
Janaka Wijekoon Rajitha Tennekoon Erwin Harahap Hiroaki Nishi

In network research, network simulators have been shown to be useful for testing and changing network protocols by means of a controlled manner. As an Internet systems simulator, ns-3 simulator provides an ideal simulation environment for network research. However, ns-3 is lack of table-driven IPv4 routing modules. Despite the fact that a routing protocol is a mandatory component of a network, ...

1999
Kenji ISHIDA Yoshiaki KAKUDA Tohru KIKUNO Kitsutaro AMANO

In this paper we present a distributed routing protocol for finding two node-disjoint paths between each pair of nodes in a computer network. In the proposed protocol, each node in the network has the same procedure, which is driven by local information with respect to the network topology, such as adjacent nodes on a spanning tree in the network. Thus, the execution of the protocol can continu...

Journal: :Digital Technical Journal 1993
Ross W. Callon Radia J. Perlman I. Michael C. Shand

1 Abstract Digital developed the intermediate system-to-intermediate system (IS-IS) intradomain routing information exchange protocol for the DECnet Phase V network layer architecture. This protocol, which has been adopted by the International Organization for Standardization, is based on a link state routing algorithm. The benefits derived from the IS-IS protocol include a self-stablizing meth...

2012
G. Nakamoto R. Durst C. Growney J. Andresen J. Ma N. Trivedi R. Quang D. Pisano

The Identity-Based Internet Protocol (IBIP) Network project is experimenting with a new enterprise oriented network architecture using standard IP version 6 protocol to encode user and host identity (ID) information into the IP address. Our motivation is to increase our security posture by leveraging identity, reducing our threat exposure, enhancing situational understanding of our environment,...

Journal: :RFC 1989
Jeffrey D. Case Mark S. Fedor Martin L. Schoffstall James R. Davin

The SNMP development tool provides an environment for rapid agent prototyping and construction. With the following information provided, this tool is used to set up a running multilingual SNMP agent: a description of a Management Information Base (MIB) in Abstract Syntax Notation One (ASN.1) instrumentation functions for the managed objects in the MIB, written in Erlang. The advantage of using ...

2007
Godred Fairhurst Nihal Samaraweera

Time-Line: A Network Protocol for 1.1 The CAL Application Network Multimedia Supporting A CAL application is being developed which will be used Classroom-Based CAL as a part of the taught medical course at the Forester Hill Medical School during 1997. The application takes the Dr Godred Fairhurst1, Dr Nihal Samaraweera1, Steven. student through a series of high quality video clips Pavett2 Dr Ne...

Journal: :IACR Cryptology ePrint Archive 2015
Aanchal Malhotra Isaac E. Cohen Erik Brakke Sharon Goldberg

We explore the risk that network attackers can exploit unauthenticated Network Time Protocol (NTP) traffic to alter the time on client systems. We first discuss how an onpath attacker, that hijacks traffic to an NTP server, can quickly shift time on the server’s clients. Then, we present an extremely low-rate (single packet) denial-of-service attack that an off-path attacker, located anywhere o...

2017
Kazu Yamamoto

Over seven years, we have developed several network protocol libraries including anti-spam, DNS, HTTP/1.1, HTTP/2 and TLS 1.3 in Haskell. Based on these experiences, we regard Haskell as a safe and highly-concurrent network programming language thanks to its strong type system and lightweight threads (i.e. green threads). This paper describes advantages and disadvantages of Haskell and reports ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید