Sciweavers

5324 search results - page 930 / 1065
» Internet Security Protocols
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Towards Economically Viable Infrastructure-Based Overlay Multicast Networks
—Internet-scale dissemination of streaming contents (e.g., live sports games) can be achieved by infrastructure-based overlay multicast networks, where multicast service provider...
Varun Khare, Bo Zhang
WWIC
2009
Springer
157views Communications» more  WWIC 2009»
14 years 2 months ago
An Adaptive Optimized RTO Algorithm for Multi-homed Wireless Environments
As a transport layer protocol SCTP uses end to end metrics, such as Retransmission Time Out (RTO), to manage mobility handover. Our investigation illustrates that Wireless LAN (WLA...
Sheila Fallon, Paul Jacob, Yuansong Qiao, Liam Mur...
SIGCOMM
2009
ACM
14 years 2 months ago
Rapid service creation using the JUNOS SDK
The creation of services on IP networks is a lengthy process. The development time is further increased if this involves the equipment manufacturer adding third-party technology i...
James Kelly, Wladimir Araujo, Kallol Banerjee
SIGCOMM
2009
ACM
14 years 2 months ago
Network virtualization: a view from the bottom
The interest in network virtualization has been growing steadily among the networking community in the last few years. Network virtualization opens up new possibilities for the ev...
Jorge Carapinha, Javier Jiménez
ICC
2008
IEEE
159views Communications» more  ICC 2008»
14 years 2 months ago
A Performance Study of Mobile Handoff Delay in IEEE 802.11-Based Wireless Mesh Networks
— Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. One important component of realizing large-...
Akshay Mangalam Srivatsa, Jiang Xie