With network components increasingly reliable, routing is playing an ever greater role in determining network reliability. This has spurred much activity in improving routing stabi...
—Intrusion Detection Systems (IDS) have become ubiquitous in the defense against virus outbreaks, malicious exploits of OS vulnerabilities, and botnet proliferation. As attackers...
IP Telephony based on Peer-to-Peer (P2P) technology has being gaining attentions for its innovative approach to providing VoIP service. At the same time, it has raised many new re...
— The tolerable packet-loss ratio of an Internet Protocol (IP) based wireless networks varies according to the specific services considered. File transfer for example must be er...
Abstract--We present experimental results for the performance of selected voice codecs using the Datagram Congestion Control Protocol (DCCP) with TCP-Friendly Rate Control (TFRC) c...