|
|
|
Manar Aldaoud, Dawood Al-Abri, Medhat Awadalla and Firdous Kausar
Named Data Networking (NDN) is a future Internet architecture that requires an Inter-Domain Routing (IDR) to route its traffic globally. Address resolution is a vital component of any IDR system that relies on a Domain Name System (DNS) resolver to trans...
ver más
|
|
|
|
|
|
|
Qiang Liu, Rui Han and Yang Li
Idle bandwidth resources are inefficiently distributed among different users. Currently, the utilization of user bandwidth resources mostly relies on traditional IP networks, implementing relevant techniques at the application layer, which creates scalab...
ver más
|
|
|
|
|
|
|
Omar I. Dallal Bashi, Shymaa Mohammed Jameel, Yasir Mahmood Al Kubaisi, Husamuldeen K. Hameed and Ahmad H. Sabry
Security identification solutions against WLAN network attacks according to straightforward digital detectors, such as SSID, IP addresses, and MAC addresses, are not efficient in identifying such hacking or router impersonation. These detectors can be si...
ver más
|
|
|
|
|
|
|
Ali A. Hammadi and Zaid H. Nasralla
As the Internet grows in capacity, the energy consumption of Information and Communication Technologies (ICT) are significantly increasing. Significant research efforts on energy conservation have been devoted to devise different technological solutions ...
ver más
|
|
|
|
|
|
|
Yong Xu, Hong Ni and Xiaoyong Zhu
Information-Centric Networking (ICN) has revolutionized the manner of content acquisition by shifting the communication mode from host-centric to information-centric. Considering the existing, large amount of IP infrastructure in current networks, the ne...
ver más
|
|
|
|
|
|
|
Sheeraz Ahmed, Zahoor Ali Khan, Syed Muhammad Mohsin, Shahid Latif, Sheraz Aslam, Hana Mujlid, Muhammad Adil and Zeeshan Najam
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government agencies. They harm internet businesses, limit access to information and services, and damage corporate brands. Attackers use application layer DDoS attac...
ver más
|
|
|
|
|
|
|
Hideto Kayashima and Hideharu Amano
The building block computation system is constructed by stacking various chips three-dimensionally. The stacked chips incorporate the same TCI IP (Through Chip Interface Intellectual Property) but cannot provide identical characteristics, requiring adjus...
ver más
|
|
|
|
|
|
|
Surjit Singh, Vivek Mehla and Srete Nikolovski
As information technology advances quickly, so does the 5G?6G network management system, which is moving toward greater integration, decentralization, diversity, and intelligence. As flexibility is a crucial criterion for 5G?6G network architecture, we u...
ver más
|
|
|
|
|
|
|
Chun-Liang Lee, Guan-Yu Lin and Yaw-Chung Chen
To support advanced network services, Internet routers must perform packet classification based on a set of rules called packet filters. If two or more filters overlap, a filter conflict will occur and lead to ambiguity in packet classification. Further,...
ver más
|
|
|
|
|
|
|
Salahadin Seid Musa, Marco Zennaro, Mulugeta Libsie and Ermanno Pietrosemoli
Recently the Internet of Vehicles (IoV) has become a promising research area in the field of the Internet of Things (IoT), which enables vehicles to communicate and exchange real-time information with each other, as well as with infrastructure, people, a...
ver más
|
|
|
|