We proposea simple distance-vectorprotocolfor routingin networkshavingunidirectional links. The protocol can be seen as an adaptation for these networks of the strategy as used in...
Francis Chi-Moon Lau, Guihai Chen, Hao Huang, Li X...
This paper studies the transmission control protocol (TCP) performance over a discrete multi-tone (DMT) based asymmetric digital subscriber loop (ADSL) network. The impact of DMT ...
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Whenever handoff for a mobile user occurs in wireless ATM network, its connection must be reestablished in the new area. This paper proposes a new path rerouting scheme based on t...
Hee Yong Youn, Hee-Suk Kim, Hyunseung Choo, Sajal ...
With the emersion of new types of applications on the Internet, the need of broadband access is unavoidable. It also makes the differentiation of services provided by the network ...
Kuo-Chih Chu, Yi-Gang Tai, Wei-Tsong Lee, Pau-Choo...