Academic literature on the topic 'ISP network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ISP network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "ISP network"

1

Huynh, Chinh Nguyen. "Fast detecting Hot-IPs in high speed networks." Science and Technology Development Journal 18, no. 3 (August 30, 2015): 242–53. http://dx.doi.org/10.32508/stdj.v18i3.841.

Full text
Abstract:
Hot-IPs, hosts appear with high frequency in networks, cause many threats for systems such as denial of service attacks or Internet worms. One of their main characteristics is quickly sending a large number of packets to victims in a short time in network. This paper presents a solution to find Hot-IPs by using non-adaptive group testing approach. The proposed solution has been implemented in combination with the distributed architecture and parallel processing techniques to quickly detect Hot-IPs in ISP networks. Experimental results can be applied to detect Hot-IPs in ISP networks.
APA, Harvard, Vancouver, ISO, and other styles
2

El Amrani, Mohamed, Hamid Garmani, Mohamed Baslam, and Rachid El Ayachi. "The Competition Between ISPs in Presence of the Net Neutrality." International Journal of Informatics and Communication Technology (IJ-ICT) 6, no. 3 (December 1, 2017): 166. http://dx.doi.org/10.11591/ijict.v6i3.pp166-178.

Full text
Abstract:
<p>In this work, we present an economic model of computer networks that describes the in-teraction between Internet Service Providers (ISP ), customers and content provider. The competition between ISP s may be translated by the prices they require and the qualities of service (QoS) they offer. The customer demand for service from an ISP does not only de-pend on the price and quality of service (QoS) of the ISP , but it is influenced by all those offered by its competitors. This behavior has been extensively analyzed using game the-ory as a decision support tool. We interpret a non-neutral network when a content provider privileges ISP s by offering them more bandwidth to ensure proper QoS to support ap-plications that require more data transport capacity (voice over internet protocol (V OIP ) the live video streaming, online gaming). In addition, our work focuses on the price game analysis and QoS between ISP s in two cases: neutral network and non-neutral network. After showing the existence and uniqueness of equilibrium in terms of quality of service, we analyzed the impact of net neutrality on competition between ISP s. We also validated our theoretical study with numerical results, which show that the game has an equilibrium point which depends on all the parameters of the system.</p>
APA, Harvard, Vancouver, ISO, and other styles
3

Khan, Mohsin. "MPLS Traffic Engineering in ISP Network." International Journal of Computer Applications 59, no. 4 (December 18, 2012): 23–32. http://dx.doi.org/10.5120/9536-3972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chandekar, Kalpak, and Nithya V. "IPV6 Deployment in an ISP Network." Journal of Advanced Research in Dynamical and Control Systems 12, no. 5 (May 30, 2020): 40–46. http://dx.doi.org/10.5373/jardcs/v12i5/20201687.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Heckmann, O., M. Piringer, J. Schmitt, and R. Steinmetz. "Generating realistic ISP-level network topologies." IEEE Communications Letters 7, no. 7 (July 2003): 335–36. http://dx.doi.org/10.1109/lcomm.2003.814708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dawadi, Babu R., Danda B. Rawat, Shashidhar R. Joshi, and Pietro Manzoni. "Legacy Network Integration with SDN-IP Implementation towards a Multi-Domain SoDIP6 Network Environment." Electronics 9, no. 9 (September 6, 2020): 1454. http://dx.doi.org/10.3390/electronics9091454.

Full text
Abstract:
The logical separation of the data plane and the control plane of the network device conceptually defined by software-defined networking (SDN) creates many opportunities to create smart networking with better efficiency for network management and operation. SDN implementation over telecommunications (Telcos) and Internet service provider (ISP) networks is a challenging issue due to the lack of a high maturity level of SDN-based standards and several other critical factors that are considered during the real-time migration of existing legacy IPv4 networks. Different migration approaches have been studied; however, none of them seem to be close to realizing implementation. This paper implements the SDN-IP and Open Network Operating System (ONOS) SDN controller to migrate legacy IPv4 networks to multi-domain software-defined IPv6 (SoDIP6) networks and experimentally evaluate the viability of joint network migration in the ISP networks. We present results using extensive simulations for the suitable placement of the master ONOS controller during network migration by considering minimum control path latency using optimal path routing and the breadth first router replacement (BFR) technique. Our empirical analysis and evaluations show that the identification of the median router to attach the master controller and router migration planning using BFR give better results for carrier-grade legacy networks’ migration to SoDIP6 networks.
APA, Harvard, Vancouver, ISO, and other styles
7

Sousa, Pedro. "Towards Effective Control of P2P Traffic Aggregates in Network Infrastructures." Journal of Communications Software and Systems 11, no. 1 (March 23, 2015): 37. http://dx.doi.org/10.24138/jcomss.v11i1.116.

Full text
Abstract:
Nowadays, many P2P applications proliferate in the Internet. The attractiveness of many of these systems relies on the collaborative approach used to exchange large resources without the dependence and associated constraints of centralized approaches where a single server is responsible to handle all the requests from the clients. As consequence, some P2P systems are also interesting and cost-effective approaches to be adopted by content providers and other Internet players. However, there areseveral coexistence problems between P2P applications and Internet Service Providers (ISPs) due to the unforeseeable behavior of P2P traffic aggregates in ISP infrastructures.In this context, this work proposes a collaborative P2P/ISPsystem able to underpin the development of novel Traffic Engineering (TE) mechanisms contributing for a better coexistence between P2P applications and ISPs. Using the devised system, two TE methods are described being able to estimate and control the impact of P2P traffic aggregates on the ISP network links. One of the TE methods allows that ISP administrators are able to foresee the expected impact that a given P2P swarm will have in the underlying network infrastructure. The other TE method enables the definition of ISP friendly P2P topologies, where specific network links are protected from P2P traffic. As result, the proposed system and associated mechanisms will contributefor improved ISP resource management tasks and to foster the deployment of innovative ISP-friendly systems.
APA, Harvard, Vancouver, ISO, and other styles
8

Dawadi, Babu R., Abhishek Thapa, Roshan Guragain, Dilochan Karki, Sandesh P. Upadhaya, and Shashidhar R. Joshi. "Routing Performance Evaluation of a Multi-Domain Hybrid SDN for Its Implementation in Carrier Grade ISP Networks." Applied System Innovation 4, no. 3 (July 21, 2021): 46. http://dx.doi.org/10.3390/asi4030046.

Full text
Abstract:
Legacy IPv4 networks are strenuous to manage and operate. Network operators are in need of minimizing the capital and operational expenditure of running network infrastructure. The implementation of software-defined networking (SDN) addresses those issues by minimizing the expenditures in the long run. Legacy networks need to integrate with the SDN networks for smooth migration towards the fully functional SDN environment. In this paper, we compare the network performance of the legacy network with the SDN network for IP routing in order to determine the feasibility of the SDN deployment in the Internet Service provider (ISP) network. The simulation of the network is performed in the Mininet test-bed and the network traffic is generated using a distributed Internet traffic generator. An open network operating system is used as a controller for the SDN network, in which the SDN-IP application is used for IP routing. Round trip time, bandwidth, and packet transmission rate from both SDN and legacy networks are first collected and then the comparison is made. We found that SDN-IP performs better in terms of bandwidth and latency as compared to legacy routing. The experimental analysis of interoperability between SDN and legacy networks shows that SDN implementation in a production level carrier-grade ISP network is viable and progressive.
APA, Harvard, Vancouver, ISO, and other styles
9

Tedja, Andreas, Charles Lim, and Heru Purnomo Ipung. "Detecting Network Anomalies In ISP Network Using DNS And NetFlow." ICONIET PROCEEDING 2, no. 3 (February 13, 2019): 238–42. http://dx.doi.org/10.33555/iconiet.v2i3.38.

Full text
Abstract:
The Internet has become the biggest medium for people to communicate with otherpeople all around the world. However, the Internet is also home to hackers with maliciouspurposes. This poses a problem for Internet Service Providers (ISP) and its user, since it ispossible that their network is compromised and damages may be done. There are many types ofmalware that currently exist on the Internet. One of the growing type of malware is botnet.Botnet can infect a system and make it a zombie machine capable of doing distributed attacksunder the command of the botmaster. In order to make detection of botnet more difficult,botmasters often deploy fast flux. Fast flux will shuffle IP address of the domain of themalicious server, making tracking and detection much more difficult. However, there are stillnumerous ways to detect fast flux, one of them is by analysing DNS data. Domain Name System(DNS) is a crucial part of the Internet. DNS works by translating IP address to its associateddomain name. DNS are often being exploited by hackers to do its malicious activities. One ofthem is to deploy fast flux.Because the characteristics of fast flux is significantly different thannormal Internet traffic characteristics, it is possible to detect fast flux from normal Internettraffic from its DNS information. However, while detecting fast flux services, one must becautious since there are a few Internet services which have almost similar characteristics as fastflux service. This research manages to detect the existence of fast flux services in an ISPnetwork. The result is that fast flux mostly still has the same characteristics as found on previousresearches. However, current fast flux trend is to use cloud hosting services. The reason behindthis is that cloud hosting services tend to have better performance than typical zombie machine.Aside from this, it seems like there has been no specific measures taken by the hosting service toprevent this, making cloud hosting service the perfect medum for hosting botnet and fast fluxservices.
APA, Harvard, Vancouver, ISO, and other styles
10

Sujarwo, Imam, Desmulyati Desmulyati, and Imam Budiawan. "IMPLEMENTASI LOAD BALANCING MENGGUNAKAN METODE PCC (PER CONNECTION CLASIFIER) DI UNIVERSITAS KRISNADWIPAYANA." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 5, no. 2 (February 1, 2020): 171–76. http://dx.doi.org/10.33480/jitk.v5i2.1184.

Full text
Abstract:
On the internet connection with 2 service ISP (Internet Service Provider) to consider the possibility of interruption on the internet connection. PCC (Per Connection Clasifier) is a method of load balancing in the merge 2 ISP service. Internet network connection is needed by a company or agency that performs each job with depend internet network connection. It is therefore necessary internet network are always standby when the failure occurs the internet connection. At this writing performed a system. First test done with 1 ISP service. Testing both with the use of PCC in the normal state and with the use of PCC occurs when lost connection on one of the links. By using 2 ISP services can be separated between local bandwidth and internasioan done on the second test. On testing the second can be proved that by using the 2 service ISP with load balancing PCC and much better against the service connection network the internet because there is a system that is always on standby when it happened lost connection on one of the links. With system blocks the IP automatically can protect the server mikrotik from attack heacker.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "ISP network"

1

Sandford, Peter. "Inferring malicious network events in commercial ISP networks using traffic summarisation." Thesis, Loughborough University, 2012. https://dspace.lboro.ac.uk/2134/9580.

Full text
Abstract:
With the recent increases in bandwidth available to home users, traffic rates for commercial national networks have also been increasing rapidly. This presents a problem for any network monitoring tool as the traffic rate they are expected to monitor is rising on a monthly basis. Security within these networks is para- mount as they are now an accepted home of trade and commerce. Core networks have been demonstrably and repeatedly open to attack; these events have had significant material costs to high profile targets. Network monitoring is an important part of network security, providing in- formation about potential security breaches and in understanding their impact. Monitoring at high data rates is a significant problem; both in terms of processing the information at line rates, and in terms of presenting the relevant information to the appropriate persons or systems. This thesis suggests that the use of summary statistics, gathered over a num- ber of packets, is a sensible and effective way of coping with high data rates. A methodology for discovering which metrics are appropriate for classifying signi- ficant network events using statistical summaries is presented. It is shown that the statistical measures found with this methodology can be used effectively as a metric for defining periods of significant anomaly, and further classifying these anomalies as legitimate or otherwise. In a laboratory environment, these metrics were used to detect DoS traffic representing as little as 0.1% of the overall network traffic. The metrics discovered were then analysed to demonstrate that they are ap- propriate and rational metrics for the detection of network level anomalies. These metrics were shown to have distinctive characteristics during DoS by the analysis of live network observations taken during DoS events. This work was implemented and operated within a live system, at multiple sites within the core of a commercial ISP network. The statistical summaries are generated at city based points of presence and gathered centrally to allow for spacial and topological correlation of security events. The architecture chosen was shown to be exible in its application. The system was used to detect the level of VoIP traffic present on the network through the implementation of packet size distribution analysis in a multi-gigabit environment. It was also used to detect unsolicited SMTP generators injecting messages into the core. ii Monitoring in a commercial network environment is subject to data protec- tion legislation. Accordingly the system presented processed only network and transport layer headers, all other data being discarded at the capture interface. The system described in this thesis was operational for a period of 6 months, during which a set of over 140 network anomalies, both malicious and benign were observed over a range of localities. The system design, example anomalies and metric analysis form the majority of this thesis.
APA, Harvard, Vancouver, ISO, and other styles
2

Gao, Hongyan. "Network and I/O Characteristics of ISP Mail Servers." University of Cincinnati / OhioLINK, 2002. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1013197957.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Doležal, Martin. "Implementace vybrané technologie pro ISP." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-234777.

Full text
Abstract:
The thesis focuses on implementation of selected technology within the company CPU-Kocourek, s.r.o, which provides varied internet services. Based on the theoretical part and the analysis of the current situation are proposed solutions suitable for the management of access network provider. The proposal part contains selection of the best proposal and its implementation into the routine mode of operation.
APA, Harvard, Vancouver, ISO, and other styles
4

Důbrava, Marek. "Řízení datového toku v ISP síti." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242049.

Full text
Abstract:
The thesis focuses on the control of data flow in networks of Internet service providers. The problem of aggregation and related overload network elements are shown. Theoretical section describes the standardized methods for managing data flow. The parameters associated with managing data flow are described for devices selected devices. The thesis displays measurements depicting to which extent the ECN algorithm occurs in practice. In the thesis is theoretically described HTB program, which is complemented by a newly described algorithm. The new algorithm is implemented into the program and tested on a real network ISP.
APA, Harvard, Vancouver, ISO, and other styles
5

Cheema, Ansar Zaman, and Imran Ullah Saqib. "Collaborating ISPs Supporting Various Real-Time Services." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4902.

Full text
Abstract:

These days, internet service providers (ISPs) face the challenge about how to increase profitability while hey must ensure a good quality service at the same time and scale up their network. The study involves previous research papers. On the bases of those papers,the comparison is made between different alternatives. The purpose on this study is to find a solution that combines different methods and configurations about how several ISPs could cooperate. Its implementation includes how different ISPs can configure their networks to cooperate on service provision supporting various real-time services.

APA, Harvard, Vancouver, ISO, and other styles
6

Kmoníček, Tomáš. "Aplikace pro monitorování a správu sítě pro ISP." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-217877.

Full text
Abstract:
The objective of this master‘s thesis is to develop an ISP application for service monitoring and management. A fully functioning monitoring software has been developed that allows the administrator to check round-trip time and packet loss in the entire network. Another function of the application is obtaining information from network devices by the SNMP protocol (e.g. packet and byte count etc.). The software uses this information to create graphs per hour, day, week or year. All graphs and statistics are visualised on the administration website. For the purpose of client administration, a client database has been developed. This part of the application enables the management of payments, IP addresses, contacts etc. Both parts of the web pages have been developed by using mod_python and AJAX, making the application similar to standard desktop applications. The testing application has been developed by using Python and the entire application has been designed for modules, which can be later used for the development of other functions.
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Sheng. "Future development trends of optical transport network infrastructure an infrastructural framework for metropolitan-based optical transport networks : a field test of a Chinese ISP and a case study of a Chinese electrical power company /." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20070822.115714/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cao, Wei Qiu. "A new Content Distribution Network architecture - PlentyCast." Thesis, KTH, Mikroelektronik och informationsteknik, IMIT, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92592.

Full text
Abstract:
Content Distribution Networks have existed for some years. They involve the following problem domains and have attracted attention both in academic research and industry: content replica placement, content location and routing, swarm intelligence, and overlay network self-organization for this type of distributed system. In this project, we propose a novel Content Distribution Network architecture – PlentyCast. This study focuses on improving access latency, network scalability, high content availability, low bandwidth consumption, and improving infrastructure performance for Content Distribution Networks. Outstanding problems such as: Flash crowd, DoS, and difficulty of traffic engineering due to Peer-to-Peer are addressed.
Mediadistributionsnätverk har funnits några år. De har fått uppmärksamhet i både akademisk forskning och i industrin och kännetecknas av följande frågor: placering av innehållskopior, lokalisering av innehåll och routing, svärm intelligens, överlagrade nätverks självorganisering för denna typ av fördelade system. I denna rapport studeras en ny nätverksarkitektur för innehållsfördelning - PlentyCast. Denna studie fokuserar på tillgångslatens, nätverksskalbarhet, hög innehållstillgång, låg bandbreddskonsumtion, och förbättrad infrastrukturprestanda för Innehållsfördelningsnätverk.
APA, Harvard, Vancouver, ISO, and other styles
9

Abrar, Mirza Kashif, and Imran Pervaiz. "Reliability and Load Handling Problem in Internet Service Provider’s Network." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4228.

Full text
Abstract:

This thesis puts forward a new solution to provide the reliable network to the Internet Service Provider (ISP). This study mainly focuses on the ISPs network to provide reliability and the load balancing. It offers a guide line for the best reliable solution to the ISPs, individual organizations or other types of service providers which are engaged in providing reliable communications to their subscribers. These reliable services may be real time communications which include weather forecasts, tracking systems, online Internet protocol TV (IPTV) programs and many other ISPs services which are totally depend on the reliable network.

With the appearance and expansion of Internet subscribers all over the world, ISPs services are becoming more popular. The rapid increase of connection-demand and highly traffic network is the main reason behind the need to scale reliable network. To offer better solutions, a new theoretical and practical approach should be considered that can cover the reliable network.

The suggested network structure monitors the links, spreads the network traffic with multiple devices and takes a backup (redundant) link automatically when changes occur in the network topology. In order to support the redundancy, load balancing and reduce the failover time, the hot standby routing protocol (HSRP) is implemented on the suggested network. As we have analyzed that in any network, scalability bringing to raised the network traffic broadcast issue. Broadcast storms can be prevented by setting threshold values of traffic-filters. The threshold level helps to control broadcast traffic in networks.

With regard to suggested solutions, it is necessary to observe the limitations and advantages of the recommended reliable network structure. Therefore, this research will include the advantages and limitations of the techniques used to offer ISP services such as scalability, security and IPv6.

APA, Harvard, Vancouver, ISO, and other styles
10

Parolek, Pavel. "Bezpečnost bezdrátové sítě poskytovatele internetových služeb." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-223791.

Full text
Abstract:
This thesis analyzes the wireless network security of the Internet service provider company Net-Connect s.r.o. It identifies its weak points and suggests measures that lead to the increase of the wireless network security.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "ISP network"

1

Abubakar, Sufi Faruq Ibne. ISP Setup Manual (Book): Step by step guide for ISP and Corporate Network. Dhaka: SnA Media & Publications, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pakistan's ISI: Network of terror in India. New Delhi: A.P.H. Pub. Corp., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Martey, Abe. IS-IS network design solutions. Indianapolis, Ind: Cisco Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Novell's guide to NetWare 5 and TCP/IP. San Jose: Novell Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Novell's guide to integrating NetWare and TCP/IP. San Jose, CA: Novell Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Peter, Rybaczyk, and Kuo Peter 1959-, eds. Internetworking with NetWare TCP/IP. Indianapolis, IN: New Riders, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Parkhurst, William R. Cisco router OSPF: Design and implementation guide. New York: McGraw Hill, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

IP routing primer. Indianapolis, Ind: Macmillan Technical Pub., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cougias, Dorian J. AppleTalk network services. Boston: AP Professional, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Washburn, K. TCP/IP: Running a successful network. Wokingham, England: Addison-Wesley, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "ISP network"

1

Guan, Qi. "Quality of Services for ISP Networks." In Telecommunication Network Intelligence, 471–83. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35522-1_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dai, Linhui, Xiaohong Liu, Chengqi Li, and Jun Chen. "AWNet: Attentive Wavelet Network for Image ISP." In Computer Vision – ECCV 2020 Workshops, 185–201. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-67070-2_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Papafili, Ioanna, Sergios Soursos, and George D. Stamoulis. "Improvement of BitTorrent Performance and Inter-domain Traffic by Inserting ISP-Owned Peers." In Network Economics for Next Generation Networks, 97–108. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01796-4_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gyarmati, László, and Tuan Anh Trinh. "On Competition for Market Share in a Dynamic ISP Market with Customer Loyalty: A Game-Theoretic Analysis." In Network Economics for Next Generation Networks, 11–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01796-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Park, Jeong-Hyun, and Boo-Hyung Lee. "Wireless Interent Service of Visited Mobile ISP Subscriber on GPRS Network." In Lecture Notes in Computer Science, 135–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11893011_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Windisch, Gerd. "Analysis of the YouTube Server Selection Behavior Observed in a Large German ISP Network." In Lecture Notes in Computer Science, 192–201. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13488-8_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Morales, Flavio, Hernan Valencia, and Renato M. Toasa. "Implementation of a Wireless Network for an ISP in the Alhajuela Community from Ecuador." In Advances in Intelligent Systems and Computing, 280–90. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32033-1_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Doverspike, Robert D., K. K. Ramakrishnan, and Chris Chase. "Structural Overview of ISP Networks." In Computer Communications and Networks, 19–93. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84882-828-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tachibana, Atsuo, Yuichiro Hei, Tomohiko Ogishi, and Shigehiro Ano. "IP Performance Management Infrastructure for ISP." In NETWORKING 2008 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 276–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-79549-0_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nagaraja, Shishir, Virajith Jalaparti, Matthew Caesar, and Nikita Borisov. "P3CA: Private Anomaly Detection Across ISP Networks." In Privacy Enhancing Technologies, 38–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22263-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "ISP network"

1

Jeong-Hyun Park and Jong-Heung Park. "Interworking between GPRS AND ISP for Wireless Internet Service of Mobile ISP Subscriber." In 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006. IEEE, 2006. http://dx.doi.org/10.1109/noms.2006.1687663.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stelte, Bjorn. "ISP traceback - Attack path detection." In 2013 IEEE Conference on Communications and Network Security (CNS). IEEE, 2013. http://dx.doi.org/10.1109/cns.2013.6682728.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kamiyama, Noriaki, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada, and Haruhisa Hasegawa. "Analyzing influence of network topology on designing ISP-operated CDN." In 2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS). IEEE, 2010. http://dx.doi.org/10.1109/netwks.2010.5624931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bischof, Zachary S., John S. Otto, Mario A. Sánchez, John P. Rula, David R. Choffnes, and Fabián E. Bustamante. "Crowdsourcing ISP characterization to the network edge." In the first ACM SIGCOMM workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2018602.2018617.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ye, M., J. Wu, and K. Xu. "Caching the P2P Traffic in ISP Network." In 2008 IEEE International Conference on Communications. IEEE, 2008. http://dx.doi.org/10.1109/icc.2008.1098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Windisch, Gerd, Thomas Martin Knoll, and Thomas Bauschert. "Robust routing in ISP networks considering YouTube traffic demand fluctuations." In 2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks). IEEE, 2014. http://dx.doi.org/10.1109/netwks.2014.6959201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mushtaq, Mubashar, Ubaid Abbasi, and Toufik Ahmed. "Network-aware streaming services delivery over ISP-driven P2P networks." In 2011 IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 2011. http://dx.doi.org/10.1109/ccnc.2011.5766597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Oktian, Yustus Eko, Elizabeth Nathania Witanto, Sandra Kumi, and Sang-Gon Lee. "ISP Network Bandwidth Management: Using Blockchain and SDN." In 2019 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2019. http://dx.doi.org/10.1109/ictc46691.2019.8939811.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Modrzejewski, Remigiusz, Luca Chiaraviglio, Issam Tahiri, Frederic Giroire, Esther Le Rouzic, Edoardo Bonetto, Francesco Musumeci, Roberto Gonzalez, and Carmen Guerrero. "Energy efficient content distribution in an ISP network." In 2013 IEEE Global Communications Conference (GLOBECOM 2013). IEEE, 2013. http://dx.doi.org/10.1109/glocom.2013.6831508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tuncer, Daphne, Marinos Charalambides, Raul Landa, and George Pavlou. "More control over network resources: An ISP caching perspective." In 2013 9th International Conference on Network and Service Management (CNSM). IEEE, 2013. http://dx.doi.org/10.1109/cnsm.2013.6727806.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "ISP network"

1

Jones, G., ed. Operational Security Requirements for Large Internet Service Provider (ISP) IP Network Infrastructure. RFC Editor, September 2004. http://dx.doi.org/10.17487/rfc3871.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Griffiths, C., J. Livingood, L. Popkin, R. Woundy, and Y. Yang. Comcast's ISP Experiences in a Proactive Network Provider Participation for P2P (P4P) Technical Trial. RFC Editor, September 2009. http://dx.doi.org/10.17487/rfc5632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Roush, Wayne B. Update: ISU FARM Network. Ames: Iowa State University, Digital Repository, 2014. http://dx.doi.org/10.31274/farmprogressreports-180814-2187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Roush, Wayne B. Update: ISU FARM Network. Ames: Iowa State University, Digital Repository, 2013. http://dx.doi.org/10.31274/farmprogressreports-180814-2581.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Roush, Wayne. Update: ISU FARM Network. Ames: Iowa State University, Digital Repository, 2015. http://dx.doi.org/10.31274/farmprogressreports-180814-1332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Smidt, Micah B. ISU FARM Network: Northeast. Ames: Iowa State University, Digital Repository, 2013. http://dx.doi.org/10.31274/farmprogressreports-180814-142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cleveland, William S., Hui Chen, Bowei Xi, and Jin Cao. Internet Protocol (IP) Network Measurement, Characterization, Modeling, and Control for Self-Managed Networks. Fort Belvoir, VA: Defense Technical Information Center, September 2005. http://dx.doi.org/10.21236/ada439560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Roush, Wayne B. The New ISU Farm Network. Ames: Iowa State University, Digital Repository, 2012. http://dx.doi.org/10.31274/farmprogressreports-180814-1307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Smidt, Micah B. ISU FARM Network: North Central. Ames: Iowa State University, Digital Repository, 2013. http://dx.doi.org/10.31274/farmprogressreports-180814-190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Asadullah, S., A. Ahmed, C. Popoviciu, P. Savola, and J. Palet. ISP IPv6 Deployment Scenarios in Broadband Access Networks. RFC Editor, January 2007. http://dx.doi.org/10.17487/rfc4779.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography