Journal articles on the topic 'IP Networks'

To see the other types of publications on this topic, follow the link: IP Networks.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IP Networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Nedyalkov, Ivan. "Benefits of Using Network Modeling Platforms When Studying IP Networks and Traffic Characterization." Computers 12, no. 2 (February 16, 2023): 41. http://dx.doi.org/10.3390/computers12020041.

Full text
Abstract:
This article addresses the benefits of using IP network modeling platforms to study IP networks. For the purposes of this study, several models of IP networks were created, through which various hypotheses were studied. Additionally, different operational variants of the modeled IP networks were created. The use of the GNS3 platform was proposed, as well as several tools for monitoring the processes in IP networks. The application of IP network modeling platforms to study power electronic devices was also addressed. IP network modeling platforms greatly facilitate both the process of studying IP networks and the process of training professionals to design, install, and maintain different types of IP network. Thanks to the GNS3 IP network modeling platform, it was possible to implement different models of IP networks with different functionalities. It was very easy to determine the answers to posed hypotheses/questions through the capabilities of the IP network modeling platforms. The questions posed by the hypotheses addressed in this paper were answered thanks to the results obtained from the research carried out with the IP network modeling platform GNS3. The present study confirmed that the use of these platforms, in particular the GNS3 platform, for the modeling of IP networks is an excellent substitute for expensive network equipment, and the IP network models created in the platform performed almost like networks made of real devices.
APA, Harvard, Vancouver, ISO, and other styles
2

Nedyalkov, Ivan. "Performance comparison between virtual MPLS IP network and real IP network without MPLS." International journal of electrical and computer engineering systems 12, no. 2 (June 21, 2021): 83–90. http://dx.doi.org/10.32985/ijeces.12.2.3.

Full text
Abstract:
In this paper an IP based network consisting of two separate IP networks - a virtual one, running MPLS and an experimental IP network, connected to the virtual one, have been studied. VoIP traffic is exchanged between the two networks. Both networks are connected to the Internet and exchange traffic with it. The virtual network is created by using GNS3. The purpose of this paper is to show a comparison in the performance between the two IP networks. In addition, mathematical distributions and approximations have been made to be used to further evaluate the performance of the two networks. The used methodology in the present work can be applied in the study of different IP networks through which different types of real-time traffic passes.
APA, Harvard, Vancouver, ISO, and other styles
3

Xirasagar, Sindhu, and Masoud Mojtahed. "Securing IP networks." Network Security 2010, no. 1 (January 2010): 13–17. http://dx.doi.org/10.1016/s1353-4858(10)70016-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Semenov, E. S., M. S. Deogenov, S. V. Galich, D. A. Tyukhtyaev, and A. O. Pasuk. "IP network optimization by software defined networks." Infokommunikacionnye tehnologii 13, no. 4 (December 2015): 414–19. http://dx.doi.org/10.18469/ikt.2015.13.4.09.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rusan, Andrei, and Radu Vasiu. "IP Impairment Testing for Wireless Mobile Networks." Balkan Region Conference on Engineering and Business Education 2, no. 1 (December 20, 2017): 284–91. http://dx.doi.org/10.1515/cplbu-2017-0037.

Full text
Abstract:
Abstract Wireless mobile telecommunications are of growing importance and an enabler for the Internet of Things. Most networks are IP based or moving to an IP based infrastructure, including the latest 4G LTE and the future 5G networks. Understanding and being able to predict the behavior and performance of such networks in various scenarios and conditions is critical. This drives the need to study IP impairments in wireless telecommunications networks and to assess their impact on network and service performance. One method is to emulate/generate IP impairments while observing and measuring their impact on network performance. In this paper the authors analyze the challenges associated with analyzing the behavior of mobile wireless networks. They discuss the importance and benefits of IP impairments testing and mention the high cost of dedicated IP impairment emulators for telecommunications. A flexible and affordable solution is proposed for educational purposes and the study of IP impairments on wireless telecommunication networks.
APA, Harvard, Vancouver, ISO, and other styles
6

Choi, Mi-Jung, James W. Hong, and Hong-Taek Ju. "XML-Based Network Management for IP Networks." ETRI Journal 25, no. 6 (December 3, 2003): 445–63. http://dx.doi.org/10.4218/etrij.03.0103.0062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Natali, Juwanda, Fajrillah Fajrillah, and T. M. Diansyah. "IMPLEMENTASI STATIC NAT TERHADAP JARINGAN VLAN MENGGUNAKAN IP DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP)." Jurnal Ilmiah Informatika 1, no. 1 (June 26, 2016): 51–58. http://dx.doi.org/10.35316/jimi.v1i1.444.

Full text
Abstract:
To build a network interconnect Local Area Network (LAN) that will be needed in the form of Virtual groups Local Area Network (LAN). DHCP IP address given by the router to the PC located in the network. NAT (Network Address Translation) is one method that is used as an IP translation to gain entrance into a different network. NAT (Network Address Translation) can allow a host to go into different networks without allowing the host intended to tap into their networks using VLAN With the two different networks into a single switch can be connected. Giving DHCP IP will allow the network administrator to provide the IP address to a PC for IP assigned automatically by the router. An IP host is forwarded in a network with NAT.
APA, Harvard, Vancouver, ISO, and other styles
8

Ruan, Lu, and Fangcheng Tang. "Survivable IP network realization in IP-over-WDM networks under overlay model." Computer Communications 29, no. 10 (June 2006): 1772–79. http://dx.doi.org/10.1016/j.comcom.2005.10.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Burakowski, Wojciech, Jarosław Śliwiński, Halina Tarasiuk, Andrzej Bęben, Ewa Niewiadomska-Szynkiewicz, Piotr Pyda, and Jordi Mongay Batalla. "The IP QoS System." Journal of Telecommunications and Information Technology, no. 3 (June 28, 2023): 5–11. http://dx.doi.org/10.26636/jtit.2011.3.1151.

Full text
Abstract:
This paper shortly describes the IP QoS System which offers strict quality of service (QoS) guarantees in IP-based networks and supports a number of, so called, classes of services. Such solution requires to implement in the network a set of QoS mechanisms and algorithm working on packet, connection request and provisioning levels. Furthermore, we require signaling system for informing the network about new connection request and network resource allocation capabilities for providing required resources to given connection. The IP QoS System is based on the next generation networks (NGN) and differentiated services (DiffServ) architectures and, at least for now, it is designed for single domain only.
APA, Harvard, Vancouver, ISO, and other styles
10

Sanmateu, A., F. Paint, L. Morand, S. Tessier, P. Fouquart, A. Sollund, and E. Bustos. "Seamless mobility across IP networks using Mobile IP." Computer Networks 40, no. 1 (September 2002): 181–90. http://dx.doi.org/10.1016/s1389-1286(02)00273-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Das, Saurav, Guru Parulkar, and Nick McKeown. "Rethinking IP Core Networks." Journal of Optical Communications and Networking 5, no. 12 (November 27, 2013): 1431. http://dx.doi.org/10.1364/jocn.5.001431.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

McDermott, Paul. "Security in IP Networks." Network Security 2000, no. 12 (December 2000): 7–9. http://dx.doi.org/10.1016/s1353-4858(00)12016-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Nikolaou, N. A., T. B. Zohariodis, J. Serrat-Fernandez, and B. Doshi. "Network monogement of multiservice multimedia IP-based networks." IEEE Network 17, no. 3 (May 2003): 6–7. http://dx.doi.org/10.1109/mnet.2003.1201470.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Mulyadi. "PENERAPAN IP VERSI 6 DALAM MEMBANGUN JARINGAN LAN." Jurnal Informatika Komputer, Bisnis dan Manajemen 19, no. 3 (November 20, 2023): 16–26. http://dx.doi.org/10.61805/fahma.v19i3.49.

Full text
Abstract:
The development of computer networks is so fast along with technological developments. IPv6 is a new type of IP addressing as a successor to the IPv4 type. This study uses the type of network configuration using IPv6.The application of IPv6 in this computer network configuration is to prove that IPv6 can be used to replace IPv4 in building computer networks. The method used in this research is to conduct a trial with one of the computer network simulation software, namely Cisco Packet Tracer from a network topology that has been designed. This research was carried out through 5 stages as follows: making network design, analysis of network device requirements, conceptual analysis of configuration requirements, software network configuration and network connectivity tests. IPv6 can be used to build networks from the simplest to complex networks including LAN networks. The test results of the two network topology experiments made can be configured using IPv6 and it is proven that all computers connected to the network are all connected (100%) after the connectivity test using the ping utility. IPv6 is recommended to be used along with the increasing use of telecommunications equipment that requires an internet connection.
APA, Harvard, Vancouver, ISO, and other styles
15

Alviansyah, Alif, Sri Lestanti, and Rizki Dwi Romadhona. "Implementasi IP Forwarding Dengan Menggunakan IP Public Pada Alita Komputer Kota Blitar." JOURNAL ZETROEM 6, no. 1 (March 12, 2024): 109–13. http://dx.doi.org/10.36526/ztr.v6i1.3163.

Full text
Abstract:
Abstract - Alita Computer in Blitar is a company that specializes in computer service. According to a survey, the desired monitoring system for the company has not been realized because the data collection process and the format of reports processed by the administrators are not globally accessible. Therefore, customers are unable to view the status of processes via mobile devices on the internet.Thisresearch offers a solution to address this issue by establishing an online information web server accessible to customers through an external network. This web server will provide integrated monitoring with computer service data. The service provided involves utilizing IP forwarding with a public IP address, allowing the web server, which previously operated within a local network, to be accessed from external networks. In MikroTik devices, port forwarding is employed as a method to redirect data traffic from specific IP addresses and ports to other destination IP addresses and ports. Port forwarding using MikroTik is utilized to access servers or services in a local network from the internet.As a result of testing, the web server, initially located at IP address 192.168.100.100, was inaccessible to the public. However, after implementing IP forwarding with the public IP address 36.8.12.138, the web server became accessible even through external networks.
APA, Harvard, Vancouver, ISO, and other styles
16

Chiesa, Marco, Gabor Retvari, and Michael Schapira. "Oblivious Routing in IP Networks." IEEE/ACM Transactions on Networking 26, no. 3 (June 2018): 1292–305. http://dx.doi.org/10.1109/tnet.2018.2832020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Marchetta, Pietro, Valerio Persico, Giuseppe Aceto, Alessio Botta, and Antonio Pescape. "Measuring Networks Using IP Options." IEEE Network 31, no. 3 (May 2017): 30–36. http://dx.doi.org/10.1109/mnet.2017.1600070nm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Xirasagar, Sindhu, and Masoud Mojtahed. "Securing IP networks, part I." Network Security 2009, no. 11 (November 2009): 10–14. http://dx.doi.org/10.1016/s1353-4858(09)70122-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Thottan, M., and Chuanyi Ji. "Anomaly detection in IP networks." IEEE Transactions on Signal Processing 51, no. 8 (August 2003): 2191–204. http://dx.doi.org/10.1109/tsp.2003.814797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Ranum, Marcus J. "Strategic security for IP networks." Information Security Technical Report 2, no. 3 (January 1997): 46–52. http://dx.doi.org/10.1016/s1363-4127(97)89710-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Meyer, Helen. "Strategic security for IP networks." Computers & Security 15, no. 7 (January 1996): 590. http://dx.doi.org/10.1016/s0167-4048(97)88129-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Basu, K., A. T. Campbell, and A. Joseph. "IP-based mobile telecommunications networks." IEEE Personal Communications 7, no. 4 (August 2000): 8–9. http://dx.doi.org/10.1109/mpc.2000.863990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Armitage, G. J. "IP multicasting over ATM networks." IEEE Journal on Selected Areas in Communications 15, no. 3 (April 1997): 445–57. http://dx.doi.org/10.1109/49.564141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Dawadi, Babu R., Abhishek Thapa, Roshan Guragain, Dilochan Karki, Sandesh P. Upadhaya, and Shashidhar R. Joshi. "Routing Performance Evaluation of a Multi-Domain Hybrid SDN for Its Implementation in Carrier Grade ISP Networks." Applied System Innovation 4, no. 3 (July 21, 2021): 46. http://dx.doi.org/10.3390/asi4030046.

Full text
Abstract:
Legacy IPv4 networks are strenuous to manage and operate. Network operators are in need of minimizing the capital and operational expenditure of running network infrastructure. The implementation of software-defined networking (SDN) addresses those issues by minimizing the expenditures in the long run. Legacy networks need to integrate with the SDN networks for smooth migration towards the fully functional SDN environment. In this paper, we compare the network performance of the legacy network with the SDN network for IP routing in order to determine the feasibility of the SDN deployment in the Internet Service provider (ISP) network. The simulation of the network is performed in the Mininet test-bed and the network traffic is generated using a distributed Internet traffic generator. An open network operating system is used as a controller for the SDN network, in which the SDN-IP application is used for IP routing. Round trip time, bandwidth, and packet transmission rate from both SDN and legacy networks are first collected and then the comparison is made. We found that SDN-IP performs better in terms of bandwidth and latency as compared to legacy routing. The experimental analysis of interoperability between SDN and legacy networks shows that SDN implementation in a production level carrier-grade ISP network is viable and progressive.
APA, Harvard, Vancouver, ISO, and other styles
25

Copeland, John A., Randal Abler, and Keith L. Bernhardt. "IP flow identification for IP traffic carried over switched networks." Computer Networks 31, no. 5 (March 1999): 493–504. http://dx.doi.org/10.1016/s0169-7552(98)00290-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Sijben, Paul G. A., Mike Buckley, John P. L. Segers, and Louise F. A. Spergel. "Application-level control of IP networks: IP beyond the Internet." Bell Labs Technical Journal 6, no. 1 (August 14, 2002): 98–116. http://dx.doi.org/10.1002/bltj.2266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Al-Fedaghi, Sabah S., and Ghadeer Aldamkhi. "Conceptual Modeling of an IP Phone Communication System." International Journal of Interdisciplinary Telecommunications and Networking 13, no. 3 (July 2021): 83–94. http://dx.doi.org/10.4018/ijitn.2021070106.

Full text
Abstract:
In computing, a network generally denotes devices, often referred to as nodes, connected by links. Networks that are modeled with diagrams consist of hundreds of symbols, images, pictures, and icons, such as a computer, a server rack, or a cloud-based storage system. Network representations provide valuable insights into understanding the systems' underlying structures and mechanisms. Nevertheless, this unusually large number of superficial symbols and icons reflects a need for more systematic representations of the interiority of nodes. To give uniformity to this cascade of notions of basic units of nodes in network diagrams, the authors propose adoption of a new modeling methodology, called a thinging (abstract) machine (TM) (abstract machine of things) that represents all notions as a single diagrammatic machine. Because of the large number of network types, in this paper, they specifically and without loss of generality focus on IP telephone (internet protocol telephone) networks to exemplify communication networks. A real case study of IP telephone networks is modeled using TM.
APA, Harvard, Vancouver, ISO, and other styles
28

Maharrey, Brandon Keith, Alvin S. Lim, and Song Gao. "Interconnection between IP Networks and Wireless Sensor Networks." International Journal of Distributed Sensor Networks 8, no. 12 (December 4, 2012): 567687. http://dx.doi.org/10.1155/2012/567687.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Sugimoto, Shinta, Ryoji Kato, and Toshikane Oda. "Network-Controlled Route Optimization for Heterogeneous Mobile IP Networks." Journal of Information Processing 17 (2009): 26–38. http://dx.doi.org/10.2197/ipsjjip.17.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Díaz-Cacho Medina, Miguel, Emma Delgado Romero, and Antonio Barreiro Blas. "Control/Network Codesign Basics for IP-Based Shared Networks." Mathematical Problems in Engineering 2011 (2011): 1–23. http://dx.doi.org/10.1155/2011/239512.

Full text
Abstract:
Network and control relationship is an essential aspect in the design of networked control systems (NCSs). The design parameters are mainly centered in the transmission rate and in the packet structure, and some studies have been made to determine how transmission rate affects the network delay and consequently the stability of the control. In Internet, these analysis are mathematically complex due to the large number of different potential scenarios. Using empirical methods, this work deduces that the transmission scheduling problem of an NCS can be solved by designing an appropriate transport protocol, taken into account high and periodic sampling rates. The transport protocol features are determined by simulation, using a new test platform based on the NS2 network simulation suite, to develop control/network codesign solutions. Conclusions of this paper are that the transport features are packet-loss-based flow control, best effort, and fairness, supplemented by a packet priority scheme.
APA, Harvard, Vancouver, ISO, and other styles
31

Ben-Artzi, A., A. Chandna, and U. Warrier. "Network management of TCP/IP networks: present and future." IEEE Network 4, no. 4 (July 1990): 35–43. http://dx.doi.org/10.1109/65.56550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Afrizal, Afrizal, and Fitriani Fitriani. "Penerapan IPV4 dan IPV6 pada Jaringan yang Terhubung." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, no. 1 (September 9, 2019): 13. http://dx.doi.org/10.35870/jtik.v3i1.78.

Full text
Abstract:
The computer networks is growing rapidly along with the increasing of computer's users. The large number of computers or hosts connected in a network will make it difficult to manage, so it needs a unique identity on each host connected to a computer network. The IP address technology is a solution to overcome the complexity of local and global computer networks. The IPv4 is the IP addressing technology for every host connected in a network, but the growth of computer users hence the availability of IPv4 address becomes very limited, so the IPv6 technology is developed. To avoid IP address conflicts around the world, the IP address allocation and distribution blocks for each Internet service providers worldwide is arranged by RFC (Request for Comments) standards. This journal describes the IPv4 and IPv6 addresses technology implementation on the host connected in a computer network. It is expected that with this journal both IP addresses generation can be applied in a computer network appropriately.Keywords:ip address, ipv4, ipv6
APA, Harvard, Vancouver, ISO, and other styles
33

Upadhyay, Paramesh C., and Sudarshan Tiwari. "Network Layer Mobility Management Schemes for IP-Based Mobile Networks." International Journal of Mobile Computing and Multimedia Communications 2, no. 3 (July 2010): 47–60. http://dx.doi.org/10.4018/jmcmc.2010070104.

Full text
Abstract:
Mobility is a natural phenomenon in cellular networks. The worldwide popularity of mobile communications and Internet has necessitated the merger of the two fast growing technologies to get their fullest advantages. The Internet protocol (IP) was designed for static hosts only. Therefore, in order to add mobility in Internet, the Internet protocol needs to be redefined. This paper is intended to present an overview of various mobility management schemes, available in literature, for IP-based mobile networks.
APA, Harvard, Vancouver, ISO, and other styles
34

Papan, Jozef, Ivana Bridova, Peter Brida, Michal Hraska, Slavomir Tatarka, and Oleksandra Yeremenko. "Comparison of New Solutions in IP Fast Reroute." Elektronika ir Elektrotechnika 29, no. 2 (April 24, 2023): 78–83. http://dx.doi.org/10.5755/j02.eie.33863.

Full text
Abstract:
Currently, network requirements are placed on the efficiency and size of the networks. These conditions can be ensured by modern converged networks that integrate the functions of both data and telecommunication networks. Line or router failures have always been a part of transmission networks, which is no different from converged networks. As a result of outages, which can take from ms to tens of seconds, packets are lost. These outages cause degraded transmission quality, which is undesirable when transmitting real-time multimedia services (Voice over IP, video). To solve the mentioned problems, the IETF organization has developed IP Fast Reroute mechanisms to minimise the time to restore the connection after a line or node failure and, consequently, less packet loss. The article reviews and compares the latest IP Fast Reroute mechanisms deployed in the last three years. First, we have Optimistic Fast Rerouting, which calculates optimistic and fallback scenarios. The second is Post-processing Fast Reroute, which decomposes the network according to metrics such as load and route length. Third, Local Fast Reroute focused on low congestion and random access.
APA, Harvard, Vancouver, ISO, and other styles
35

Wang, Liang, Hyojoon Kim, Prateek Mittal, and Jennifer Rexford. "RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks." Proceedings on Privacy Enhancing Technologies 2023, no. 3 (July 2023): 194–210. http://dx.doi.org/10.56553/popets-2023-0077.

Full text
Abstract:
Enterprise networks face increasing threats against the privacy of their clients. Existing enterprise services like Network Address Translation (NAT) offer limited privacy protection, at the cost of requiring per-flow state. In this paper, we introduce RAVEN (Rapid Address Variation for Enterprise Networks), a network-based privacy solution that is complementary to application-layer defenses. RAVEN protects privacy by frequently changing the client's public IP address. With RAVEN, a client is not limited to using a single IP address at a given time, or even for a given connection. RAVEN goes further, breaking the association between packets that belong to the same connection by frequently changing the client's IP address within a single connection. RAVEN achieves this through a novel division of labor: the client uses a transport protocol, like QUIC, that supports seamless connection migration, and decides when to switch its IP address, while the enterprise network actually changes the client's IP address in a stateless manner at line rate and ensures end-to-end packet delivery. We implement RAVEN using QUIC and off-the-shelf programmable switches. We deploy RAVEN in a test IPv6 network and evaluate its defense against webpage fingerprinting attacks. Even with a strong adversary, the average precision of the best adaptive attacks drops from 0.96 to 0.84, with a 0.5% degradation in client throughput. When RAVEN changes IP addresses at unpredictable frequency, the precision of the best attacks falls to 0.78---the same effectiveness as WTF-PAD.
APA, Harvard, Vancouver, ISO, and other styles
36

Maksic, Natasa, and Aleksandra Smiljanic. "Platform for capacity reservation in IP networks." Serbian Journal of Electrical Engineering 10, no. 1 (2013): 103–11. http://dx.doi.org/10.2298/sjee1301103m.

Full text
Abstract:
The fast development of multimedia devices and services causes the need for increase of the transport capacity of packet networks. OSPF-TE uses both the information about network topology and the link utilization when finding the routing path. Accordingly, it might find path even in the cases when the shortest path routing would cause overloaded link and dropped packets. In this paper we develop the platform for capacity reservation in IP networks. We implement OSPF-TE protocol as an extension of the existing OSPF. In addition, the basic functionalities of the reservation protocol and the user interface are implemented. We present the simulation environment for the verification of our implementation and for the analysis of various routing algorithms based on the information conveyed by OSPF-TE.
APA, Harvard, Vancouver, ISO, and other styles
37

MĂLĂCEA, Cătălina Maria, Dan Nicolae ROBU, and Marian ALEXANDRU. "MOBILITY IN IP NETWORKS USING LISP AND OPENWRT." Review of the Air Force Academy 16, no. 3 (December 19, 2018): 85–90. http://dx.doi.org/10.19062/1842-9238.2018.16.3.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Payaswini P, Payaswini P., and Dr Manjaiah D. H. Dr. Manjaiah D.H. "A Technology Overview of IP Based 4G-Networks." International Journal of Scientific Research 2, no. 6 (June 1, 2012): 113–15. http://dx.doi.org/10.15373/22778179/june2013/36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Pólkowski, Marcin, and Dariusz Laskowski. "Reliability of IP Tunnels in Military Networks." Journal of KONBiN 39, no. 1 (October 1, 2016): 21–40. http://dx.doi.org/10.1515/jok-2016-0030.

Full text
Abstract:
Abstract The military networks, contrary to commercial ones, require standards which provide the highest level of security and reliability. The process to assuring redundancy of the main connections through applying various protocols and transmission media causes problem with time needed to re-establish virtual tunnels between different locations in case of damaged link. This article compares reliability of different IP (Internet Protocol) tunnels, which were implemented on military network devices.
APA, Harvard, Vancouver, ISO, and other styles
40

Batmaz, Burak, and Atakan Doğan. "1 Gbit/s UDP/IP Offload Engine IP Core with PCIe Interface." Journal of Circuits, Systems and Computers 27, no. 04 (December 6, 2017): 1850053. http://dx.doi.org/10.1142/s0218126618500536.

Full text
Abstract:
A significant amount of processor power is required to handle packet processing in high speed data networks and taking it to the hardware helps processor to save its energy for other processes. In this study, an Offload Engine IP core that provides the hardware acceleration of UDP/IP protocol stack together with a few other network protocols is introduced. Furthermore, the IP core is equipped with PCI Express (PCIe) interface so as to communicate with applications running on a host PC. Consequently, a processor core deals with only the data processing, while the IP core takes care of the packet processing as per the protocol. The design and implementation of the IP core are verified and tested on an FPGA board; its area utilization and supported features are compared against several competitive designs from the literature. According to these results, the IP core is proved to be a useful one for those network applications that require a hardware-accelerated network protocol stack.
APA, Harvard, Vancouver, ISO, and other styles
41

Tsunoda, H., K. Ohta, N. Kato, and Y. Nemoto. "Supporting IP/LEO Satellite Networks by Handover-Independent IP Mobility Management." IEEE Journal on Selected Areas in Communications 22, no. 2 (February 2004): 300–307. http://dx.doi.org/10.1109/jsac.2003.819977.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Giordano, S., S. Salsano, S. Van den Berghe, G. Ventre, and D. Giannakopoulos. "Advanced QoS provisioning in IP networks: the European premium IP projects." IEEE Communications Magazine 41, no. 1 (January 2003): 30–36. http://dx.doi.org/10.1109/mcom.2003.1166651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Park, Taeyeon, and Arek Dadej. "Adaptive handover control in IP-based mobility networks." Journal of Telecommunications and Information Technology, no. 2 (June 30, 2003): 62–70. http://dx.doi.org/10.26636/jtit.2003.2.169.

Full text
Abstract:
In this paper, we propose framework for an adaptive handover control architecture (AHCA), which aims at enhancing overall IP handover performance while maximising utilisation of resources in wireless access networks. The IP handover procedures in the AHCA adapt dynamically to network conditions, as well as to a wide range of user profiles and application quality of service (QoS) requirements. To confirm our expectations that the AHCA will bring performance benefits in heterogeneous mobile IP networking environment, we have investigated basic performance characteristics of different handover mechanisms. The preliminary simulation results demonstrate that the AHCA will bring significant performance improvements as compared with non adaptive IP handovers.
APA, Harvard, Vancouver, ISO, and other styles
44

Fonseca, Osvaldo, Italo Cunha, Elverton Fazzion, Wagner Meira, Brivaldo Alves da Silva, Ronaldo A. Ferreira, and Ethan Katz-Bassett. "Identifying Networks Vulnerable to IP Spoofing." IEEE Transactions on Network and Service Management 18, no. 3 (September 2021): 3170–83. http://dx.doi.org/10.1109/tnsm.2021.3061486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Alessandria, E., L. Seno, and S. Vitturi. "PERFORMANCE ANALYSIS OF ETHERNET/IP NETWORKS." IFAC Proceedings Volumes 40, no. 22 (2007): 391–98. http://dx.doi.org/10.3182/20071107-3-fr-3907.00054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Koneru, Anupriya, and MHM Krishna Prasad. "P2P Networks with IP Based Communication." International Journal of Asian Business and Information Management 3, no. 4 (October 2012): 51–61. http://dx.doi.org/10.4018/jabim.2012100106.

Full text
Abstract:
P2P communities can be seen as truly Distributed Computing applications in which group members communicate with one another to exchange information. The authors consider security issues in Peer to Peer Networks. For secure exchange of data between the group members the authors present a cryptography protocol and an Identity mechanism which can able to check even the Trust of the Peers based on the available reputation information. The authors are encapsulating the reputations of both the provider and the requester. So the requester cannot (gainfully) maliciously abort the transaction in the middle. In other words, the requester cannot take the service from the provider and then logoff without giving a recommendation to the provider.
APA, Harvard, Vancouver, ISO, and other styles
47

Verma, D. C. "Service level agreements on IP networks." Proceedings of the IEEE 92, no. 9 (August 2004): 1382–88. http://dx.doi.org/10.1109/jproc.2004.832969.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Benameur, N., and J. W. Roberts. "Traffic Matrix Inference in IP Networks." Networks and Spatial Economics 4, no. 1 (March 2004): 103–14. http://dx.doi.org/10.1023/b:nets.0000015658.75205.ed.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Boukerche, Azzedine, Alexander Magnano, and Noura Aljeri. "Mobile IP Handover for Vehicular Networks." ACM Computing Surveys 49, no. 4 (February 6, 2017): 1–34. http://dx.doi.org/10.1145/2996451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Veeraraghavan, M. "Internetworking Telephony, IP and ATM Networks." Journal of Communication and Information Systems 14, no. 1 (June 30, 1999): 1–6. http://dx.doi.org/10.14209/jcis.1999.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography