Deploying IP telephony or voice over IP (VoIP) is a major and challenging task. This paper describes an analytical approach and tool to assess the readiness of existing IP network...
While the Mobile IP protocol does not exclude the use of multiple Home Agents (HAs), it does not impose any particular model either. Recent solutions propose that a mobile node us...
Imed Romdhani, Jose Munoz, Hatem Bettahar, Abdelma...
Most research on Distributed Hash Tables (DHTs) assumes ephemeral, lightly loaded deployments. Each node has a lifetime of a few hours and initiates a lookup once every few second...
— The stability and robustness of BGP remains one of the most critical elements in sustaining today’s Internet. In this paper, we study the structure and stability of origin ad...
Sophie Y. Qiu, Patrick Drew McDaniel, Fabian Monro...
Online monitoring of a physical phenomenon over a geographical area is a popular application of sensor networks. Networks representative of this class of applications are typicall...
Abstract— Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources and one or more base stations, which are much more powerful l...
Andre Mota, Leonardo B. Oliveira, Felipe F. Rocha,...
Traffic engineering is one of the important enhancements introduced by the deployment of Multiprotocol Label Switching (MPLS) into IP-networks. Minimizing congestion is a central ...
Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of sensors are becoming increasing popular. Managing and presenting the informati...
John C. McEachen, Cheng Kah Wai, Vonda L. Olsavsky
— In this paper we study multi-hop ad hoc routing in a scalable Underwater Sensor Network (UWSN), which is a novel network paradigm for ad hoc investigation of the world below th...
Uichin Lee, Jiejun Kong, Joon-Sang Park, Eugenio M...
— In order to support mobile users, the basic Internet protocols have been extended with protocols (e.g., Mobile IPv6) for intercepting and forwarding packets to a mobile and pos...
Johnny Lai, Y. Ahmet Sekercioglu, Norbert Jordan, ...