• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 658
Next 10 →

MINT - A Mobile Internet Router

by Anders Klemets , 1993
"... Today, mobility of portable computers and workstations is not transparent to users. They adjust to reduced services as long as they have no connection to a supporting infrastructure. The goal of the Walkstation project is to realize a user transparent mobile IP router (MINT) for wireless links (infr ..."
Abstract - Cited by 14 (2 self) - Add to MetaCart
Today, mobility of portable computers and workstations is not transparent to users. They adjust to reduced services as long as they have no connection to a supporting infrastructure. The goal of the Walkstation project is to realize a user transparent mobile IP router (MINT) for wireless links

Drago: Detecting, quantifying and locating hidden routers in traceroute IP paths

by Pietro Marchetta - In IEEE Global Internet Symposium , 2013
"... Abstract—Traceroute is probably the most famous networking tool widely adopted in both industry and research. Despite its long life, however, measurements based on Traceroute are potentially inaccurate, misleading or incomplete due to several unresolved issues. In this paper, we face the limitation ..."
Abstract - Cited by 3 (3 self) - Add to MetaCart
represented by hidden routers- devices that do not decrement the TTL, being thus totally invisible to Traceroute. We present, evaluate and release DRAGO, a novel active probing technique composed of three main steps. First, a novel Traceroute enhanced by the IP Timestamp option is launched toward a

The Personal Router: An Agent for Wireless Access

by P. Faratin, J. Wroclawski, G. Lee, S. Parsons - In Proceedings of American Association of Arti£cial Intelligence Fall Symposium , 2002
"... The Personal Router is a mobile personal user agent whose task is to dynamically model the user, update its knowledge of a market of wireless service providers and select providers that satisfies the user’s expected preferences. The task of seamlessly managing the procurement and execution of short ..."
Abstract - Cited by 9 (2 self) - Add to MetaCart
The Personal Router is a mobile personal user agent whose task is to dynamically model the user, update its knowledge of a market of wireless service providers and select providers that satisfies the user’s expected preferences. The task of seamlessly managing the procurement and execution of short

A Scalable Method for Router Attack Detection and Location in Link State Routing

by Anirban Chakrabarti, G. Manimaran , 2002
"... The Internet infrastructure security has been gaining importance in recent years due to growing concerns for cyber-warfare. Network threats can be categorized as: routing table "poisoning," packet "mistreating," and denial-of-service attacks. Among these, the routing table poison ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
poisoning attack is the most devastating and least researched topic which needs immediate research attention. In this paper, we develop a scalable method for detecting router attacks and locating the malicious routers (within a small bounded set of nodes) in link state routing protocols. We carry out

A Scalable Method for Router Attack Detection and Location in Link State Routing

by unknown authors
"... The routing table poisoning attack is one of the most devastating and least researched topic among Internet attacks, which needs immediate research attention. In this paper, we develop a scalable method for detecting router attacks and locating the malicious routers (within a small bounded set of no ..."
Abstract - Add to MetaCart
The routing table poisoning attack is one of the most devastating and least researched topic among Internet attacks, which needs immediate research attention. In this paper, we develop a scalable method for detecting router attacks and locating the malicious routers (within a small bounded set

Multicast Router Discovery Status of This Memo

by J. Martin, Netzwert Ag , 2005
"... This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this pro ..."
Abstract - Add to MetaCart
of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2005). The concept of Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) snooping requires the ability to identify the location of multicast routers. Since snooping

Dynamic Management of Multiple Mobile Routers

by Manabu Tsukada, Thierry Ernst, Ryuji Wakikawa, Koshiro Mitsuya - Proceedings of the IEEE Malaysia International Conference on Communications and IEEE International Conference on Networks , 2005
"... Abstract — Network mobility (NEMO) support is used to maintain the Internet connectivity of a group of terminals located into a network that changes its point of attachment to the Internet. The Internet access is made through a number of interfaces on a Mobile Router acting as a gateway of the mobil ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract — Network mobility (NEMO) support is used to maintain the Internet connectivity of a group of terminals located into a network that changes its point of attachment to the Internet. The Internet access is made through a number of interfaces on a Mobile Router acting as a gateway

IPv6 Internet Border Router

by Aurbind Sharma, A. L. An
"... Abstract — A number of micromobility protocols have been proposed in the recent past for IPv4 based networks. In this paper we present Auto-update Micromobility (AUM)- a novel approach for providing micromobility in IPv6 environments. The proposed scheme exploits the basic IPv6 feature of hierarchic ..."
Abstract - Add to MetaCart
of hierarchical addressing structure for efficient location management and provides specialized mechanisms for seamless mobility support. AUM takes an end-to-end approach to micromobility rather than a proxy approach taken by current proposals. This results in much simplified routing and a scalable architecture

A Flexible and Performant Virtual Router

by N. Egi, A. Greenhalgh, M. Hoerdt, L. Mathy
"... We explore the building of a flexible and performant virtual router architecture constructed from off-the-shelf hardware components. We aim to show that it is possible to design an isolated and fair router system used by multiple users who share the same physical hardware platform by allocating each ..."
Abstract - Add to MetaCart
place for a router’s control plane it is not an ideal location for virtualizing the forwarding plane where we avoid the context switches but maintain the isolation and parallelization of the virtual forwarding planes.

Signal Stability based Adaptive Routing (SSA) for Ad-Hoc Mobile Networks

by Rohit Dube, Cynthia D. Rais, Kuang-yeh Wang, Satish K. Tripathi - IEEE Personal Communications , 1997
"... Unlike static networks, ad-hoc networks have no spatial hierarchy and suffer from frequent link failures which prevent mobile hosts from using traditional routing schemes. Under these conditions, mobile hosts must find routes to destinations without the use of designated routers and also must dynami ..."
Abstract - Cited by 165 (0 self) - Add to MetaCart
Unlike static networks, ad-hoc networks have no spatial hierarchy and suffer from frequent link failures which prevent mobile hosts from using traditional routing schemes. Under these conditions, mobile hosts must find routes to destinations without the use of designated routers and also must
Next 10 →
Results 11 - 20 of 658
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University