Academic literature on the topic 'Routers (Computer networks) Internet'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Routers (Computer networks) Internet.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Routers (Computer networks) Internet"

1

Schwarz, Franziska, Klaus Schwarz, Daniel Fuchs, Reiner Creutzburg, and David Akopian. "Firmware Vulnerability Analysis of Widely Used Low-Budget TP-Link Routers." Electronic Imaging 2021, no. 3 (June 18, 2021): 135–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-135.

Full text
Abstract:
TP-Link Technologies Co, Ltd. is a Chinese manufacturer of networking products and has a 42% share of the consumer WLAN market, making it the market leader. The company sells about 150 million devices per year. Many people worldwide use the Internet every day and are connected to the Internet with their computers. In the world of smart homes, even coffee machines, refrigerators, smart sockets, and light bulbs have found their way to the Internet, not to mention the many smartphones, which are, of course, also connected to the Internet. Since many different dangers come from a heater or printer and the many other smart devices directly connected to the Internet, there is a safe haven: the local area network. To connect to the Internet, one needs a modem, which is built into a router in many cases. Routers route network packets back and forth between several computer networks. They are used to connect to the Internet, and they are the bridge between the home network and the Internet in almost every household connected to the Internet. Because of their nature as a bridge between local and global networks, they are also the largest attack vector. [19] This paper examines how up-to-date the firmware of standard home network routers is and how secure the firmware is. In order to obtain a representative result, the examined routers were selected according to fixed rules. Each router had to be a product of the manufacturer TP-Link, the routers had to be in the low-budged range (less than 20 Euro) and be available from Amazon. Also, two different types of investigations were identified for the selected devices. Firstly, the devices were examined in the form of physically existing hardware, and secondly, an attempt was made to access the firmware via the manufacturer’s website. It was found that even the fixing of current vulnerabilities and recently released update files are no guarantee that older vulnerabilities have been fixed. Secrets such as private keys and certificates are hard-coded in the firmware and can be extracted from update files. Moreover, devices are deliberately built to make it impossible to install the latest alternative firmware.
APA, Harvard, Vancouver, ISO, and other styles
2

Sihotang, Bil Klinton, Sumarno Sumarno, and Bahrudi Efendi Damanik. "Implementasi Access Control List Pada Mikrotik dalam Mengamankan Koneksi Internet Koperasi Sumber Dana Mutiara." JURIKOM (Jurnal Riset Komputer) 7, no. 2 (April 26, 2020): 229. http://dx.doi.org/10.30865/jurikom.v7i2.2010.

Full text
Abstract:
The need for information and internet access at this time is very high. To accept it is wrong only with computer networks as a medium. In a network that requires a network that has been segmented using a Virtual Local Area Network (VLAN), the application of an Access Control List (ACL) is required to be granted access rights for each device in the network. The Access Control List (ACL) can filter the data traffic of a network by controlling whether the packets are passed or issued. A network is built using several different network devices, one of which is a router. A router is a tool that can process different data packet networks (between networks) through a process called routing. lots of companies that produce routers, mikrotik is one of the companies that produce routers. mikrotik is easy to do because it uses Winbox in Gui's view, besides that the hotspot server in it is provided with several management facilities that can be arranged according to network requirements
APA, Harvard, Vancouver, ISO, and other styles
3

Majid, Nuur Wachid Abdul, and Syifaul Fuada. "RIP VS. OSPF ROUTING PROTOCOLS: WHICH ONE IS THE BEST FOR A REAL-TIME COMPUTER NETWORK?" Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 11, no. 1 (April 30, 2020): 249–56. http://dx.doi.org/10.24176/simet.v11i1.3796.

Full text
Abstract:
The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached. In this short article, we discuss the comparison of two popular routing protocols, i.e., Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) using two network simulators, i.e., Graphical Network Simulator-3 (GNS3) and Enterprise Network Simulation Platform (ENSP). Both of OSPF and RIP routing protocols can be used in the same topology and have differences in the connection time required to connect communication between routers. Thru GNS3 and ENSP, we obtained the comparison result at ideal condition; we found that the OSPF routing protocol (83 ms) has a faster time or efficient in connection than RIP (177 ms). Besides, we found that compared to GNS3 network simulators (329 ms), the ENSP has a relatively more rapid average time (94 ms). This work suggests that a Huawei router with ENSP is faster than a Cisco router which is used by GNS3. Hopefully, this information can be refereed by internet network administrators to build real-time computer networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Deebalakshmi, R., and V. L. Jyothi. "Intelligent Packet Delivery in Router Using Structure Optimized Neural Network." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 2 (May 1, 2018): 545. http://dx.doi.org/10.11591/ijeecs.v10.i2.pp545-553.

Full text
Abstract:
The Internet itself is a worldwide network connecting millions of computers and less significant networks. Computers communicated by routers. Crucial the role of a router is to our technique of communicating and computing. Routers are situated at gateways, the spaces where two or more networks connect, and are the decisive device that keeps data flow between networks and keeps the networks connected to the Internet. When data is sent between places on one network or from one network to a second network the data is always seen and intended for to the proper place by the router. The router carries out this by using headers and routing tables to establish the best path for routing the data packets. This trim down the effectiveness of edge router only when the path engaged, it will enhanced by classification method, predictable classification methods like port based ,deep packet inspection and statistical classification are give less precision. In this system structured optimized neural network is used for more precise organization. Classification output forwarded to router dynamically for intellectual packet delivery. The method will improve router competence by greater than before throughput and decreased latency.<span style="font-size: 9.0pt; line-height: 115%; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; letter-spacing: .05pt; mso-ansi-language: EN-IN; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold; mso-bidi-font-style: italic;" lang="EN-IN">The Internet itself is a worldwide <a href="https://www.webopedia.com/TERM/I/network.htm"><span style="color: windowtext; text-decoration-line: none;">network</span></a> connecting millions of <a href="https://www.webopedia.com/TERM/I/computer.htm"><span style="color: windowtext; text-decoration-line: none;">computers</span></a> and less significant networks. Computers communicated by routers. Crucial the role of a router is to our technique of communicating and computing. Routers are situated at <a href="https://www.webopedia.com/TERM/G/gateway.html"><span style="color: windowtext; text-decoration-line: none;">gateways</span></a>, the spaces where two or more networks connect, and are the decisive device that keeps data flow between networks and keeps the networks connected to the Internet. When data is sent between places on one network or from one network to a second network the data is always seen and intended for to the proper place by the router. The router carries out this by using <a href="https://www.webopedia.com/TERM/R/header.htm"><span style="color: windowtext; text-decoration-line: none;">headers</span></a> and routing tables to establish the best path for routing the data packets. This trim down the effectiveness of edge router only when the path engaged, it will enhanced by classification method, predictable classification methods like port based ,deep packet inspection and statistical classification are give less precision. In this system structured optimized neural network is used for more precise organization. Classification output forwarded to router dynamically for intellectual packet delivery. The method will improve router competence by greater than before throughput and decreased latency.</span>
APA, Harvard, Vancouver, ISO, and other styles
5

Ganjali, Yashar, and Nick McKeown. "Update on buffer sizing in internet routers." ACM SIGCOMM Computer Communication Review 36, no. 5 (October 10, 2006): 67–70. http://dx.doi.org/10.1145/1163593.1163605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

DURRESI, ARJAN, VAMSI PARUCHURI, LEONARD BAROLLI, RAJGOPAL KANNAN, and S. S. IYENGAR. "EFFICIENT AND SECURE AUTONOMOUS SYSTEM BASED TRACEBACK." Journal of Interconnection Networks 05, no. 02 (June 2004): 151–64. http://dx.doi.org/10.1142/s0219265904001076.

Full text
Abstract:
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet, causing the defense against Distributed Denial of Service attacks to become one of the hardest problems on the Internet today. Previous solutions for this problem try to traceback to the exact origin of the attack by requiring every router's participation. For many reasons this requirement is impractical and the victim results with an approximate location of the attacker. Reconstruction of the whole path is also very difficult due to the sheer size of the Internet. This paper presents lightweight schemes for tracing back to the attack-originating AS instead to the exact origin itself. Once the attack-originating AS is determined, all further routers in the path to the attacker are within that AS and under the control of a single entity; which can presumably monitor local traffic in a more direct way than a generalized, Internet scale, packet marking scheme can. We furthermore, provide a scheme to prevent compromised routers from forging markings.
APA, Harvard, Vancouver, ISO, and other styles
7

Curran, Kevin, Derek Woods, Nadene McDermot, and Colleen Bradley. "The effects of badly behaved routers on Internet congestion." International Journal of Network Management 13, no. 1 (January 2003): 83–94. http://dx.doi.org/10.1002/nem.464.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vural, Serdar, Ning Wang, Pirabakaran Navaratnam, and Rahim Tafazolli. "Caching Transient Data in Internet Content Routers." IEEE/ACM Transactions on Networking 25, no. 2 (April 2017): 1048–61. http://dx.doi.org/10.1109/tnet.2016.2616359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Suthaharan, Shan. "Reduction of queue oscillation in the next generation Internet routers." Computer Communications 30, no. 18 (December 2007): 3881–91. http://dx.doi.org/10.1016/j.comcom.2007.10.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Aminah, Nina Siti, Muhamamad Reza Ramadhani Raharjo, and Maman Budiman. "Low-cost wireless mesh communications based on openWRT and voice over internet protocol." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (December 1, 2021): 5119. http://dx.doi.org/10.11591/ijece.v11i6.pp5119-5126.

Full text
Abstract:
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-line-of-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Routers (Computer networks) Internet"

1

Wang, Feng. "Building scalable next generation Internet routers /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?CSED%202008%20WANGF.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Spring, Neil Timothy. "Efficient discovery of network topology and routing policy in the Internet /." Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chim, Tat-wing, and 詹達榮. "Novel algorithms to improve internet traffic distribution management." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B29798322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lu, Zhenxin, and 蘆振鑫. "Location-aware routing with reduced location maintenance routing for Ad hoc networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B29737308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lou, Jianyu Shen Xiaojun. "Frame-based packet scheduling algorithms for input queued switches." Diss., UMK access, 2006.

Find full text
Abstract:
Thesis (Ph. D.)--School of Computing and Engineering. University of Missouri--Kansas City, 2006.
"A dissertation in computer networking and telecommunications networking." Advisor: Xiaojun Shen. Typescript. Vita. Title from "catalog record" of the print edition Description based on contents viewed Nov. 1, 2007. Includes bibliographical references (leaves 121-127). Online version of the print edition.
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Minchong. "Proportional integrator with short-lived flows adjustment." Link to electronic thesis, 2004. http://www.wpi.edu/Pubs/ETD/Available/etd-0122104-154529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Johnson, Eamon B. "Enforcing Authorization and Attribution of Internet Traffic at the Router via Transient Addressing." Case Western Reserve University School of Graduate Studies / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=case1315601254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Valancius, Vytautas. "Wide-area route control for online services." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43623.

Full text
Abstract:
Accelerated by on-demand computing, the number and diversity of the Internet services is increasing. Such online services often have unique requirements for the underlying wide-area network: For instance, online gaming service might benefit from low delay and jitter paths to client, while online data backup service might benefit from cheaper paths. Unfortunately, today's Internet does not accommodate fine-grained, service-specific wide-area route control. In this dissertation, I achieve the following goals: 1) improve the access to the routes, 2) quantify the benefits of fine-grained route control, and 3) evaluate the efficiency of current payment schemes for the wide-area routes. * Improving access to wide-area route control. Online services face significant technological and procedural hurdles in accessing the routes: Each service in need to control the Internet routes, has to obtain own equipment, Internet numbered resources, and establish contracts with upstream ISPs. In this dissertation, I propose and describe implementation and deployment of a secure and scalable system which provides on-demand access to the Internet routes. In setting such as cloud data center, the system can support multiple online services, providing each service with an illusion of direct connectivity to the neighboring Internet networks, which, for all practical purposes, allows services to participate fully in the Internet routing. * Quantifying the benefits of fine-grained route control. Even if online services are presented with wide-area route choice, it is not clear how much tangible benefit such choice provides. Most modern Online Service Providers (OSP) rely primarily on the content routing to improve network performance between the clients and the replicas. In this dissertation, I quantify the potential benefit the OSPs can gain if they perform a joint network and content routing. Among other findings, I find that by performing joint content and network routing, OSPs can achieve 22% larger latency reduction than can be obtained by content routing alone. * Modeling and evaluating the efficiency of the current payment schemes for wide-area routes. Finally, increasing diversity and sophistication of the online services participating in the Internet routing poses a challenge to payment models used in today's Internet. Service providers today charge business customers a blended rate: a single, "average" price for unit of bandwidth, without regard to cost or value of individual customer's flows. In my dissertation, I set to understand how efficient this payment model is and if more granular payment model, accounting for the cost and value of different flows could increase the ISP profit and the consumer surplus. I develop an econometric demand and cost model and map three real-world ISP data sets to it. I find that ISPs can indeed improve the economic efficiency with just a few pricing tiers.
APA, Harvard, Vancouver, ISO, and other styles
9

Chung, Jae Won. "Congestion control for streaming media." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-081805-084831/.

Full text
Abstract:
Dissertation (Ph.D.) -- Worcester Polytechnic Institute.
Keywords: streaming media; streaming transport protocol; active queue management (AQM); Internet congestion control. Includes bibliographical references (p. 236-248).
APA, Harvard, Vancouver, ISO, and other styles
10

Xiong, Lixiang. "Scheduling in packet switches with relaxed constraint." School of Electrical, Computer and Telecommunications Engineering - Faculty of Informatics, 2004. http://ro.uow.edu.au/theses/372.

Full text
Abstract:
In this thesis, I present a series of new scheduling algorithms for an ATM-like crossbar input-queued switching fabric of an IP router. These new scheduling algorithms are developed based on three popular existing scheduling algorithms: Parallel Iterative Matching, Round Robin Matching, and Iterative Round Robin Matching with SLIP. The basic idea of our research is to divide all outputs of the IP router into a few groups. All outputs in the same output group are multiplexed into a high-speed link. Cells (traffic) can be directed to a group of outputs instead of an individual output. The performance of our new scheduling algorithms are measured with simulation. The simulation results indicate that our new scheduling algorithms can achieve an excellent throughput while consuming much less computing time than existing scheduling algorithms
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Routers (Computer networks) Internet"

1

Danny, McPherson, and Cisco Systems Inc, eds. Internet routing architectures. 2nd ed. Indianapolis, Ind: Cisco, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Halabi, Bassam. Internet routing architectures. Indianapolis, IN: Cisco Press, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Routing in the Internet. Englewood Cliffs, N.J: Prentice Hall PTR, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

OSPF: Anatomy of an Internet routing protocol. Reading, Mass: Addison-Wesley, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Reynolds, Harry. JNCIP: Juniper Networks Certified Internet Professional : study guide. San Francisco, Calif: SYBEX, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Keller, Ralph M. Self configuring services for extensible networks: A routing integrated approach. Aachen: Shaker, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cisco router networking. New York: McGraw-Hill, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Reynolds, Harry. JNCIE: Juniper Networks Certified Internet Expert : study guide. San Francisco: Sybex, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hu lian wang zhong fu wu zhi liang yu duo bo lu you ji shu. Beijing: Ke xue chu ban she, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1965-, Zhang Zhi-Li, ed. Localized quality of service routing for the Internet. Boston: Kluwer Academic Publishers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Routers (Computer networks) Internet"

1

Howser, Gerry. "The Router." In Computer Networks and the Internet, 179–92. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Howser, Gerry. "Route Interchange Protocol." In Computer Networks and the Internet, 245–69. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Howser, Gerry. "Populating and Maintaining the Route Table." In Computer Networks and the Internet, 193–98. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Leguay, Jérémie, Matthieu Latapy, Timur Friedman, and Kavé Salamatian. "Describing and Simulating Internet Routes." In NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 659–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11422778_53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Song, Min. "Routers." In Handbook of Computer Networks, 364–74. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118256053.ch23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gebali, Fayez. "Switches and Routers." In Analysis of Computer and Communication Networks, 1–30. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-74437-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mrozowski, Pawel, and Andrzej Chydzinski. "Performance Evaluation of Routers with the Dropping-Function Queueing." In Computer Networks, 243–52. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07941-7_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kogan, Yaakov. "Reliability Metrics for Routers in IP Networks." In Computer Communications and Networks, 97–112. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84882-828-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chavula, Josiah, Nick Feamster, Antoine Bagula, and Hussein Suleman. "Quantifying the Effects of Circuitous Routes on the Latency of Intra-Africa Internet Traffic: A Study of Research and Education Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 64–73. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16886-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bilski, Tomasz. "QoS Predictability of Internet Services." In Computer Networks, 163–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13861-4_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Routers (Computer networks) Internet"

1

Gunes, M. H., and K. Sarac. "Resolving Anonymous Routers in Internet Topology Measurement Studies." In IEEE INFOCOM 2008 - IEEE Conference on Computer Communications. IEEE, 2008. http://dx.doi.org/10.1109/infocom.2008.162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gunes, M. H., and K. Sarac. "Resolving Anonymous Routers in Internet Topology Measurement Studies." In 27th IEEE International Conference on Computer Communications (INFOCOM 2008). IEEE, 2008. http://dx.doi.org/10.1109/infocom.2007.162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Crespelle, Christophe, Matthieu Latapy, and Elie Rotenberg. "Rigorous Measurement of IP-Level Neighborhood of Internet Core Routers." In IEEE INFOCOM 2010 - IEEE Conference on Computer Communications Workshops. IEEE, 2010. http://dx.doi.org/10.1109/infcomw.2010.5466707.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zervas, G., Y. Qin, R. Nejabati, and D. Simeonidou. "Service oriented optical burst switched edge and core routers for future internet." In 2008 5th International Conference on Broadband Communications, Networks and Systems (BROADNETS). IEEE, 2008. http://dx.doi.org/10.1109/broadnets.2008.4769051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zheng, Xing, Lingling Sun, Jie Jin, and Xiaojun Wang. "Energy efficient solutions for the networks and routers." In 2015 2nd International Conference on Electrical, Computer Engineering and Electronics. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/icecee-15.2015.239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Song, Jinwoo, and Young B. Moon. "A Secure Cyber-Manufacturing System Augmented by the Blockchain." In ASME 2019 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/imece2019-10366.

Full text
Abstract:
Abstract Cyber-Manufacturing System (CMS) is an innovative factory of the future, where manufacturing information is being constantly exchanged among many entities through various computer networks including the Internet. However, CMS ushers in the unique security challenges from the sheer volume and pervasiveness of exchanged data, and increased accessibility of the system by its outsiders and insiders. Also, the connections among the physical components can reveal accessible routes into the system. This research presents a unique approach to secure CMS augmented by a Blockchain. The secure Cyber-Manufacturing System with Blockchain consists of four layers: User layer, Provider layer, Service layer, and Blockchain layer. To validate how the system enables safe communications in CMS, auditing physical data through the private blockchain was experimented on a CMS testbed. The results of three different physical data audits are compared; the system’s effectiveness is demonstrated.
APA, Harvard, Vancouver, ISO, and other styles
7

Ben Neji, Nizar, and Adel Bouhoula. "Self-adjusting scheme for high speed routers." In 2008 33rd IEEE Conference on Local Computer Networks (LCN 2008). IEEE, 2008. http://dx.doi.org/10.1109/lcn.2008.4664229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lareida, Andri, George Petropoulos, Valentin Burger, Michael Seufert, Sergios Soursos, and Burkhard Stiller. "Augmenting home routers for socially-aware traffic management." In 2015 IEEE 40th Conference on Local Computer Networks (LCN). IEEE, 2015. http://dx.doi.org/10.1109/lcn.2015.7366329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jain, Animesh, Ritesh Parikh, and Valeria Bertacco. "High-radix on-chip networks with low-radix routers." In 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, 2014. http://dx.doi.org/10.1109/iccad.2014.7001365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Livi, Sergio, Lucile Sassatelli, and Guillaume Urvoy-Keller. "HTTP adaptive streaming and access router management: The users' and network's perspectives." In 2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI). IEEE, 2016. http://dx.doi.org/10.1109/cci.2016.7778890.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Routers (Computer networks) Internet"

1

Asaeda, H., H. Liu, and Q. Wu. Tuning the Behavior of the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) for Routers in Mobile and Wireless Networks. RFC Editor, May 2012. http://dx.doi.org/10.17487/rfc6636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography