Moozonian
Web Images Developer News Books Maps Shopping Moo-AI
Showing results for routers

Warning: file_put_contents(cache/omni_f5b72733681ace8d9403f11542dd5b54.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Cover of OneAccess OneOS V4.2 User Guide
Internet Archive

OneAccess OneOS V4.2 User Guide

By OneAccess

OneAccess OneOS V4.2 User Guide Data & Voice User Guides/Manuals For OneOS Routers: ONE30 ONE50 ONE60 ONE100 ONE150 ONE200 ONE300 Also: GPRS EDGE modem (ONECell25) UMTS modem (ONECell35)...

View Book →
Cover of Migrating to IPv6 : a practical guide to implementing IPv6 in mobile and fixed networks
Internet Archive

Migrating to IPv6 : a practical guide to implementing IPv6 in mobile and fixed networks

By Blanchet, Marc, 1964-

xxxii, 418 p. : 25 cm...

View Book →
Cover of Cisco TCP/IP routing professional reference
Internet Archive

Cisco TCP/IP routing professional reference

By Lewis, Chris (Christopher S.)

1 online resource (xviii, 486 pages) :...

View Book →
Cover of Challenges and Opportunities in Edge Computing
Internet Archive

Challenges and Opportunities in Edge Computing

By Blesson Varghese, Nan Wang, Sakil Barbhuiya, Peter Kilpatric

Many cloud-based applications employ a data centre as a central server to process data that is generated by edge devices, such as smartphones, tablets and wearables. This model places ever increasing ...

View Book →
Cover of communications :: wellfleet :: router :: 110066A Modifying Software Images for Wellfleet Routers 199
Internet Archive

communications :: wellfleet :: router :: 110066A Modifying Software Images for Wellfleet Routers 199

By Unknown Author

From the bitsavers.org collection, a scanned-in computer-related document. communications :: wellfleet :: router :: 110066A Modifying Software Images for Wellfleet Routers 199502...

View Book →
Cover of Akka.NET Succinctly
dBooks

Akka.NET Succinctly

By Zoran Maksimovic

...

View Book →
Cover of The incredible router
Internet Archive

The incredible router

By Brown, Jeremy

192 pages...

View Book →
Cover of Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks
Internet Archive

Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks

By Katerina J. Argyraki, David R. Cheriton

Denial of Service (DoS) attacks are one of the most challenging threats to Internet security. An attacker typically compromises a large number of vulnerable hosts and uses them to flood the victim's s...

View Book →
Cover of ERIC ED462080: Schools and Libraries Program: Update on State-Level Funding by Category of Service.
Internet Archive

ERIC ED462080: Schools and Libraries Program: Update on State-Level Funding by Category of Service.

By ERIC

This report provides state-level data on the amount of funds committed to the following three categories of eligible services for each of the first three years of the Federal Communications Commission...

View Book →
Cover of Computer and Information Sciences
dBooks

Computer and Information Sciences

By Tadeusz Czachórski, Erol Gelenbe, Krzysztof Grochla, Ricard

31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...

View Book →
Cover of DTIC ADA461474: A Multipath Framework Architecture for Integrated Services
Internet Archive

DTIC ADA461474: A Multipath Framework Architecture for Integrated Services

By Defense Technical Information Center

A major concern with the IETF proposed Integrated Services (Intserv) architecture for providing Quality of Service is that the amount of reservation state it stores in the routers and the RSVP protoco...

View Book →
Cover of Probabilistic Analysis of Onion Routing in a Black-box Model
Internet Archive

Probabilistic Analysis of Onion Routing in a Black-box Model

By Joan Feigenbaum, Aaron Johnson, Paul Syverson

We perform a probabilistic analysis of onion routing. The analysis is presented in a black-box model of anonymous communication in the Universally Composable framework that abstracts the essential pro...

View Book →
Cover of Using data network metrics, graphics, and topology to explore network characteristics
Internet Archive

Using data network metrics, graphics, and topology to explore network characteristics

By A. Adhikari, L. Denby, J. M. Landwehr, J. Meloche

Yehuda Vardi introduced the term network tomography and was the first to propose and study how statistical inverse methods could be adapted to attack important network problems (Vardi, 1996). More rec...

View Book →
Cover of Indoor Localization Algorithm For Smartphones
Internet Archive

Indoor Localization Algorithm For Smartphones

By Kaiqing Zhang, Hong Hu, Wenhan Dai, Yuan Shen, Moe Z. Win

Increasing sources of sensor measurements and prior knowledge have become available for indoor localization on smartphones. How to effectively utilize these sources for enhancing localization accuracy...

View Book →
Cover of Remote access for Cisco networks
Internet Archive

Remote access for Cisco networks

By Burton, William, 1948-

xvii, 490 p. : 23 cm...

View Book →
Cover of NASA Technical Reports Server (NTRS) 20050019510: Delivering Faster Congestion Feedback with the Mar
Internet Archive

NASA Technical Reports Server (NTRS) 20050019510: Delivering Faster Congestion Feedback with the Mar

By NASA Technical Reports Server (NTRS)

Computer networks use congestion feedback from the routers and destinations to control the transmission load. Delivering timely congestion feedback is essential to the performance of networks. Reactio...

View Book →
Cover of Object-oriented Packet Caching for ICN
Internet Archive

Object-oriented Packet Caching for ICN

By Yannis Thomas, George Xylomenos, Christos Tsilopoulos, Georg

One of the most discussed features offered by Information-centric Networking (ICN) architectures is the ability to support packet-level caching at every node in the network. By individually naming eac...

View Book →
Cover of Yarrp'ing the Internet: Randomized High-Speed Active Topology Discovery
Internet Archive

Yarrp'ing the Internet: Randomized High-Speed Active Topology Discovery

By Robert Beverly

Obtaining a "snapshot" of the Internet topology remains an elusive task. Existing active topology discovery techniques and production systems require significant probing time -- time during which the ...

View Book →
Cover of Computer Networks
dBooks

Computer Networks

By Larry Peterson, Bruce Davie

A Systems Approach...

View Book →
Cover of An SDN-based approach to enhance BGP security
Internet Archive

An SDN-based approach to enhance BGP security

By Regivaldo Costa, Fernando M. V. Ramos

BGP is vulnerable to a series of attacks. Many solutions have been proposed in the past two decades, but the most effective remain largely undeployed. This is due to three fundamental reasons: the sol...

View Book →
Cover of Towards Loop-Free Forwarding of Anonymous Internet Datagrams that Enforce Provenance
Internet Archive

Towards Loop-Free Forwarding of Anonymous Internet Datagrams that Enforce Provenance

By J. J. Garcia-Luna-Aceves

The way in which addressing and forwarding are implemented in the Internet constitutes one of its biggest privacy and security challenges. The fact that source addresses in Internet datagrams cannot b...

View Book →
Cover of JUNOS cookbook
Internet Archive

JUNOS cookbook

By Garrett, Aviva

xxii, 657 p. : 24 cm...

View Book →
Cover of Evaluation of a Non-intrusive packet delivery monitoring service on Networks-on-Chip
Internet Archive

Evaluation of a Non-intrusive packet delivery monitoring service on Networks-on-Chip

By Unknown Author

We present the design and evaluation of a non-intrusive packet delivery monitoring service on a Network-on-Chip (NoC) that focus real-time systems. Recent works show that using adaptive routing or opt...

View Book →