نتایج جستجو برای: bypass router
تعداد نتایج: 57702 فیلتر نتایج به سال:
Managing the complexity of designing chips containing billions of transistors requires decoupling computation from communication. For the communication, scalable and compositional interconnects, such as networks on chip (NoC), must be used. In this paper we show that guaranteed services are essential in achieving this decoupling. Guarantees typically come at the cost of lower resource utilizati...
NEMO Basic Support (NEMO BS) adds a mobility function to IPv6 routers, such a router is called as a mobile router. The network behind the mobile router (mobile network) becomes logically static. This function is considered useful when a network has a lot of nodes that do not have a mobility function but move with the network. The typical usage of this technology is the network provided in a tra...
A subjectively influenced router for vehicles in a fourjunction traffic system is presented. The router is based on a 3-layer Backpropagation Neural Network (BPNN) and a greedy routing procedure. The BPNN detects priorities of vehicles based on the subjective criteria. The subjective criteria and the routing procedure depend on the routing plan towards vehicles depending on the user. The routin...
of the Operation and Maintenance System in Component-Router Yong Jiang, Jianping Wu [[email protected]] Department of Computer Science and Technology, Tsinghua University, Beijing, 100084 Phone: +86-010-62785822 Fax: +86-010-62788109 Abstract: The OAM (Operations and Maintenance) module of a router fulfills the management and manipulation of the router. The OAM is one of the most ...
INTRODUCTION As the use of the TCP/IP protocol suite expanded during the 1990s in tandem with the growth in the use of the Internet, organizations began to realize a new security threat emerging as their networks were connected to the Internet. As academic, government, and commercial networks were connected to the Internet, they became subject to attack from literally an unlimited number of com...
IP traceback can be used to find direct generator(s) and path(s) of attacking traffic. Probabilistic marking schemes, as one type of IP traceback technologies, have been most studied, but they are difficult to fast reconstruct attacking path(s) and defend against spoofed marks generated by attacking source(s). In this paper, we present Adaptive Probabilistic Marking scheme (APM). In APM, when e...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید