—TCP/IP protocol suite carries most application data in Internet. TCP flow retrieval has more security meanings than the IP packet payload. Hence, monitoring the TCP flow has mor...
Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Z...
Recently, mobile agents have been proposed for efficient data dissemination in sensor networks [1-6]. In the traditional client/server-based computing architecture, data at multip...
—The shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks coul...
Reliable Server Pooling (RSerPool) is a protocol framework for server redundancy and session failover, currently under standardization by the IETF RSerPool WG. While the basic ide...
This paper describes a new network device to be located in network edge nodes. The device can deal with congestion conditions that may arise when, for example, a home or SME custo...
Thomas Dreibholz, Avril IJsselmuiden, John L. Adam...
Abstract— Powerline communications (PLC) are receiving special attention since they use an already available and ubiquitous infrastructure. The main standard for PLC home network...
Network Address Translation (NAT) is often used in routers that connect home and small-office networks to the Internet. Unfortunately, NAT may not interoperate well with many pro...
The light-trail architecture provides a novel solution to address IP-centric issues at the optical layer. By incorporating drop and continue functionality, overlaid with a lightwe...
Srivatsan Balasubramanian, Wensheng He, Arun K. So...
— The seminar work of Gupta and Kumar [1] showed that multi-hop wireless networks with capacity scalable with the number of nodes, n, are achievable in theory. The transport capa...
Despite recent advancements in cellular phone network infrastructure, survivability of the calls is still an open issue. Important business calls and tele-conferences cannot benef...
Zahid Anwar, William Yurcik, Salman Baset, Henning...