Sciweavers

7329 search results - page 379 / 1466
» Network Extractor Protocols
Sort
View
CONEXT
2009
ACM
15 years 6 months ago
RFDump: an architecture for monitoring the wireless ether
Networking researchers have been using tools like wireshark and tcpdump to sniff packets on physical links that use different types of datalink protocols, e.g. Ethernet or 802.11,...
Kaushik Lakshminarayanan, Samir Sapra, Srinivasan ...
140
Voted
ISCIS
2005
Springer
15 years 10 months ago
Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation
A P2P network that is overlayed over Internet can consist of thousands, or even millions of nodes. To analyze the performance of a P2P network, or an algorithm or protocol designed...
Selim Ciraci, Ibrahim Korpeoglu, Özgür U...
ITICSE
2004
ACM
15 years 10 months ago
Teaching computer networking with the help of personal computer networks
This paper describes an “experiential” learning approach to teaching a foundational course on Computer Networking. In additional to the traditional laboratory sessions and ana...
Rocky K. C. Chang
141
Voted
NCA
2005
IEEE
15 years 10 months ago
A Wide Area Network Simulation of Single-Round Group Membership Algorithms
A recent theoretical result proposed Sigma, a novel GM protocol that forms views using a singleround of message exchange. Prior GM protocols have required more rounds in the worst...
Roger Khazan, Sophia Yuditskaya
151
Voted
ADHOCNOW
2005
Springer
15 years 10 months ago
Message Stability and Reliable Broadcasts in Mobile Ad-Hoc Networks
Abstract. Many to many reliable broadcast is useful while building distributed services like group membership and agreement in a MANET. Efforts in implementing reliable broadcast ...
Kulpreet Singh, Andronikos Nedos, Gregor Gärt...