Using an authoritative data set from a fully instrumented router at the edge of a core network, packet delays through an access link are studied in detail. Three different root ca...
Konstantina Papagiannaki, Darryl Veitch, Nicolas H...
Distributed Denial-of-Service (DDoS) attacks prevent users from accessing services on the target network by flooding the target network with a large volume of traffic. In this pap...
Tracing IP packets back to their origins is an important step in defending the Internet against denial-of-service (DoS) attacks. Two kinds of IP traceback techniques have been prop...
— IP-address lookup is a key processing function of Internet routers. The lookup is challenging because it needs to perform a longest prefix match. In this paper, we present our...
Signicant eort has been invested recently to accelerate handover operations in a next generation mobile Internet. Corresponding works for developing ecient mobile multicast man...