Zobrazeno 1 - 10
of 2 509
pro vyhledávání: '"IP forwarding"'
Publikováno v:
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), Vol 5, Iss 6, Pp 1099-1105 (2021)
Security monitoring systems using face recognition can be applied to CCTV or IP cameras. This is intended to improve the security system and make it easier for users to track criminals is theft. The experiment was carried out by detecting human faces
Externí odkaz:
https://doaj.org/article/b24d532c494c4b8a9ee2a8a1fc74b818
Autor:
Niels ten Oever
Publikováno v:
Globalizations, 20(1), 184-200. Taylor and Francis Ltd.
This paper explores how a deeply embedded norm can be used to exert power and control in the governance of distributed infrastructures, such as the Internet. Through the lens of norm conflict, I analyse a case of resistance against the introduction o
Autor:
Adyasha Behera, Amrutanshu Panigrahi
In multi-radio wireless mesh networks, one node is eligible to transmit packets over multiple channels to different destination nodes simultaneously. This feature of multi-radio wireless mesh network makes high throughput for the network and increase
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::80f396184e375197e29985af18960168
Autor:
Bharati Patil, D. Vydeki
Publikováno v:
Journal of Advanced Research in Dynamical and Control Systems. 12:235-243
Publikováno v:
Journal of Telecommunications and the Digital Economy. 8:18-30
Anomalous events such as link failure, misconfiguration, and Denial of Service attacks can affect the Internet inter-domain routing protocol. This effect can range from small to large-scale impact. While large-scale events can be detected using one o
Publikováno v:
International Journal of Information Technology. 12:1171-1182
The slow adoption of IPv6 protocol by organizations has led to internet service providers (ISP) investing minimal resources in setting up IPv6 Internet connectivity, ultimately resulting in sub optimally tuned IPv6 Internet routing fabric. The altoge
Publikováno v:
ACM SIGCOMM Computer Communication Review. 50:25-37
Several "NewSpace" companies have launched the first of thousands of planned satellites for providing global broadband Internet service. The resulting low-Earth-orbit (LEO) constellations will not only bridge the digital divide by providing service t
Autor:
V. Yu. Zubok
Publikováno v:
Реєстрація, зберігання і обробка даних. 21:67-75
Attacks on the global routing, in particular hijacking and interception of routes (route hijack and route leak), are one of the large-scale problems of cybersecurity. Prefix hijacking is a phenomenon in which the Autonomous System (AS) illegally decl
Autor:
Oleg Berzin
Hierarchical Mobility Label Based Network (H-MLBN) is a new approach to the network layer mobility management problem that relies on MPLS-aware control plane and MPLS-based forwarding plane to provide IP mobility support for IPv4 and IPv6 mobile host
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::79abed2f462399b83b4d8a12ffa52624
http://arxiv.org/abs/2110.09607
http://arxiv.org/abs/2110.09607
Autor:
Bahaa Al-Musawi, Noor Hadi Hammood
Publikováno v:
2021 International Congress of Advanced Technology and Engineering (ICOTEN).
Unregular events such as large-scale power outages and routing table leaks (RTL) can negatively affect the global routing stability and interrupt Internet services. The Border Gateway Protocol (BGP) is the de-facto Internet routing protocol responsib