نتایج جستجو برای: bypass router

تعداد نتایج: 57702  

Journal: :Journal of Statistical Mechanics: Theory and Experiment 2016

Journal: :International Journal of Advanced Network, Monitoring and Controls 2020

2003
E. Rijpkema K. Goossens A. Rădulescu J. Dielissen J. van Meerbergen P. Wielage

Managing the complexity of designing chips containing billions of transistors requires decoupling computation from communication. For the communication, scalable and compositional interconnects, such as networks on chip (NoC), must be used. In this paper we show that guaranteed services are essential in achieving this decoupling. Guarantees typically come at the cost of lower resource utilizati...

Journal: :JNW 2006
Keiichi Shima Yojiro Uo Nobuo Ogashiwa Satoshi Uda

NEMO Basic Support (NEMO BS) adds a mobility function to IPv6 routers, such a router is called as a mobile router. The network behind the mobile router (mobile network) becomes logically static. This function is considered useful when a network has a lot of nodes that do not have a mobility function but move with the network. The typical usage of this technology is the network provided in a tra...

2012
Anilkumar Kothalil Gopalakrishnan

A subjectively influenced router for vehicles in a fourjunction traffic system is presented. The router is based on a 3-layer Backpropagation Neural Network (BPNN) and a greedy routing procedure. The BPNN detects priorities of vehicles based on the subjective criteria. The subjective criteria and the routing procedure depend on the routing plan towards vehicles depending on the user. The routin...

2000
Yong Jiang Jianping Wu

of the Operation and Maintenance System in Component-Router Yong Jiang, Jianping Wu [[email protected]] Department of Computer Science and Technology, Tsinghua University, Beijing, 100084 Phone: +86-010-62785822 Fax: +86-010-62788109 Abstract: The OAM (Operations and Maintenance) module of a router fulfills the management and manipulation of the router. The OAM is one of the most ...

1999

INTRODUCTION As the use of the TCP/IP protocol suite expanded during the 1990s in tandem with the growth in the use of the Internet, organizations began to realize a new security threat emerging as their networks were connected to the Internet. As academic, government, and commercial networks were connected to the Internet, they became subject to attack from literally an unlimited number of com...

2013
Hongcheng Tian Jun Bi Xiaoke Jiang

IP traceback can be used to find direct generator(s) and path(s) of attacking traffic. Probabilistic marking schemes, as one type of IP traceback technologies, have been most studied, but they are difficult to fast reconstruct attacking path(s) and defend against spoofed marks generated by attacking source(s). In this paper, we present Adaptive Probabilistic Marking scheme (APM). In APM, when e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید