Warning: file_put_contents(cache/omni_f5b72733681ace8d9403f11542dd5b54.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
OneAccess OneOS V4.2 User Guide
OneAccess OneOS V4.2 User Guide Data & Voice User Guides/Manuals For OneOS Routers: ONE30 ONE50 ONE60 ONE100 ONE150 ONE200 ONE300 Also: GPRS EDGE modem (ONECell25) UMTS modem (ONECell35)...
View Book →Migrating to IPv6 : a practical guide to implementing IPv6 in mobile and fixed networks
xxxii, 418 p. : 25 cm...
View Book →Cisco TCP/IP routing professional reference
1 online resource (xviii, 486 pages) :...
View Book →Challenges and Opportunities in Edge Computing
Many cloud-based applications employ a data centre as a central server to process data that is generated by edge devices, such as smartphones, tablets and wearables. This model places ever increasing ...
View Book →communications :: wellfleet :: router :: 110066A Modifying Software Images for Wellfleet Routers 199
From the bitsavers.org collection, a scanned-in computer-related document. communications :: wellfleet :: router :: 110066A Modifying Software Images for Wellfleet Routers 199502...
View Book →
Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks
Denial of Service (DoS) attacks are one of the most challenging threats to Internet security. An attacker typically compromises a large number of vulnerable hosts and uses them to flood the victim's s...
View Book →ERIC ED462080: Schools and Libraries Program: Update on State-Level Funding by Category of Service.
This report provides state-level data on the amount of funds committed to the following three categories of eligible services for each of the first three years of the Federal Communications Commission...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →DTIC ADA461474: A Multipath Framework Architecture for Integrated Services
A major concern with the IETF proposed Integrated Services (Intserv) architecture for providing Quality of Service is that the amount of reservation state it stores in the routers and the RSVP protoco...
View Book →Probabilistic Analysis of Onion Routing in a Black-box Model
We perform a probabilistic analysis of onion routing. The analysis is presented in a black-box model of anonymous communication in the Universally Composable framework that abstracts the essential pro...
View Book →Using data network metrics, graphics, and topology to explore network characteristics
Yehuda Vardi introduced the term network tomography and was the first to propose and study how statistical inverse methods could be adapted to attack important network problems (Vardi, 1996). More rec...
View Book →Indoor Localization Algorithm For Smartphones
Increasing sources of sensor measurements and prior knowledge have become available for indoor localization on smartphones. How to effectively utilize these sources for enhancing localization accuracy...
View Book →Remote access for Cisco networks
xvii, 490 p. : 23 cm...
View Book →NASA Technical Reports Server (NTRS) 20050019510: Delivering Faster Congestion Feedback with the Mar
Computer networks use congestion feedback from the routers and destinations to control the transmission load. Delivering timely congestion feedback is essential to the performance of networks. Reactio...
View Book →Object-oriented Packet Caching for ICN
One of the most discussed features offered by Information-centric Networking (ICN) architectures is the ability to support packet-level caching at every node in the network. By individually naming eac...
View Book →Yarrp'ing the Internet: Randomized High-Speed Active Topology Discovery
Obtaining a "snapshot" of the Internet topology remains an elusive task. Existing active topology discovery techniques and production systems require significant probing time -- time during which the ...
View Book →
An SDN-based approach to enhance BGP security
BGP is vulnerable to a series of attacks. Many solutions have been proposed in the past two decades, but the most effective remain largely undeployed. This is due to three fundamental reasons: the sol...
View Book →Towards Loop-Free Forwarding of Anonymous Internet Datagrams that Enforce Provenance
The way in which addressing and forwarding are implemented in the Internet constitutes one of its biggest privacy and security challenges. The fact that source addresses in Internet datagrams cannot b...
View Book →Evaluation of a Non-intrusive packet delivery monitoring service on Networks-on-Chip
We present the design and evaluation of a non-intrusive packet delivery monitoring service on a Network-on-Chip (NoC) that focus real-time systems. Recent works show that using adaptive routing or opt...
View Book →