To cope with the various problems arising from Internet protocol such as scarcity of IP addresses in the Internet and increase in the number of paths, research and development has...
Many schemes have been proposed to support TCP traffic in a Differentiated Services network. We present in this paper an analytical model to study the performance of these schemes....
The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported...
Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
Block-level continuous data protection (CDP) logs every disk block update so that disk updates within a time window are undoable. Standard file servers and DBMS servers can enjoy...
: Ad hoc networks are networks that consist of wireless mobile nodes. They are networks that do not require any preestablished infrastructure. Their ability to quickly and dynamica...