Sciweavers

TNC
2004
104views Education» more  TNC 2004»
14 years 8 days ago
An Optical Network Infrastructure Suitable for Global Grid Computing
This paper presents a novel Grid network scenario based on an optical infrastructure using optical burst switching. The functional blocks required are identified as Core Router th...
Dimitra Simeonidou, Reza Nejabati, Mike J. O'Mahon...
TNC
2004
146views Education» more  TNC 2004»
14 years 8 days ago
Connective Middleware for Voice and Integrated Communications
To engage Internet2 users in an exploration of peer-to-peer, real-time communications, these users require connectivity. Superior networking connectivity alone is not sufficient. ...
Ben Teitelbaum
TNC
2004
125views Education» more  TNC 2004»
14 years 8 days ago
Performance Analysis of Multicast Mobility in a Hierarchical Mobile IP Proxy Environment
Mobility support in IPv6 networks is ready for release as an RFC, stimulating major discussions on improvements to meet real-time communication requirements. Sprawling hot spots o...
Thomas C. Schmidt, Matthias Wählisch
TNC
2004
140views Education» more  TNC 2004»
14 years 8 days ago
Seamless Multimedia Communications in Heterogeneous Mobile Access Networks
With the advent of the new wireless technologies allowing for higher data rates, the provision of high quality multimedia services over the upcoming wireless and mobile networks i...
Pedro M. Ruiz, Juan A. Botía, Antonio F. G&...
TNC
2004
96views Education» more  TNC 2004»
14 years 8 days ago
A Roaming Authentication Solution for WiFi Using IPSec VPNs With Client Certificates
Several solutions have been proposed to provide authentication and safe encryption for Wifi networks in order to overcome the limitation of WEP based security. This document descr...
Carlos Ribeiro, Fernando Silva, Andre Zuquete
TNC
2004
120views Education» more  TNC 2004»
14 years 8 days ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer
TNC
2004
105views Education» more  TNC 2004»
14 years 8 days ago
Why Seamless? Towards Exploiting WLAN-Based Intermittent Connectivity on the Road
This paper discusses new mobile usage scenarios for WLAN technologies and presents an architecture that is based on the notion of intermittent connectivity instead of seamless con...
Jörg Ott, Dirk Kutscher
TNC
2004
116views Education» more  TNC 2004»
14 years 8 days ago
Class of Service Concepts in Autonomous Systems
The bandwidth broker architectures introduced to manage diffserv still have scalability flaws in the mean of large volumes of end-to-end tunnels and workload they have to handle. ...
Jean-Alexander Müller, Sven Hessler, Klaus Ir...
TNC
2004
104views Education» more  TNC 2004»
14 years 8 days ago
IPv6 Transitioning Management - Laying the Foundation for Managed IPv4/IPv6 Interoperation
This paper highlights the need to supplement the work within the IPv6 community on IPv6 management with mechanisms specifically to support IPv6 transitioning. As a major feature o...
Michael Mackay, Christopher Edwards