Sciweavers

642 search results - page 50 / 129
» Detecting Spoofed Packets
Sort
View
LCN
2006
IEEE
15 years 10 months ago
On Measuring Anonymity For Wireless Mobile Ad-hoc Networks
We propose an evidence theory based anonymity measuring approach for wireless mobile ad-hoc networks. In our approach, an evidence is a measure of the number of detected packets w...
Dijiang Huang
ISCAS
2005
IEEE
119views Hardware» more  ISCAS 2005»
15 years 10 months ago
Stroboscopic model and bifurcations in TCP/RED
Abstract— In this paper, we derive a simple first-order discretetime model for the Transmission Control Protocol (TCP) with Random Early Detection (RED). We view the network as ...
Mingjian Liu, Hui Zhang, Ljiljana Trajkovic
SIGCOMM
2000
ACM
15 years 9 months ago
When the CRC and TCP checksum disagree
Traces of Internet packets from the past two years show that between 1 packet in 1,100 and 1 packet in 32,000 fails the TCP checksum, even on links where link-level CRCs should ca...
Jonathan Stone, Craig Partridge
119
Voted
IEEEIAS
2008
IEEE
15 years 11 months ago
COTraSE: Connection Oriented Traceback in Switched Ethernet
Layer 2 traceback is an important component of end-toend packet traceback. Whilst IP traceback identifies the origin network, L2 traceback extends the process to provide a more ...
Marios S. Andreou, Aad P. A. van Moorsel
IJHPCN
2006
109views more  IJHPCN 2006»
15 years 4 months ago
Communication issues within high performance computing grids
: This paper presents several ideas pertaining to desirable properties associated with protocols for moving large amounts of data over a grid of high performance computers. The pro...
Robert D. McLeod, Sajid Hussain, Sheng Huang, Mare...