Marnix Goossens | Vrije Universiteit Brussel (original) (raw)
Papers by Marnix Goossens
Icn, 2001
This paper describes the ideas behind a new way of running Internet applications on an ATM networ... more This paper describes the ideas behind a new way of running Internet applications on an ATM network. ATM already contains some functionality of the network layer and therefore there is no need to duplicate them in the IP stack. Instead of adapting the TCP/IP stack to ATM at the bottom, we replace the TCP/IP stack with something else that is capable of supporting the QoS needs of applications. The intention is to have Internet applications working over ATM with the same performance as a native ATM application could obtain.
... P. Liefooghe, M. Goossens Tele.Com Group INFO/TW Vrije Universiteit Brussel Pleinlaan 2 1050 ... more ... P. Liefooghe, M. Goossens Tele.Com Group INFO/TW Vrije Universiteit Brussel Pleinlaan 2 1050 Brussel, Belgium {pieter,marnix}@info.vub.ac.be ... A group in the SSM or Holbrook model [11] on the other hand has more restrictions and as a consequence more control. ...
Proceedings of the 10th Wseas International Conference on Telecommunications and Informatics and Microelectronics Nanoelectronics Optoelectronics and Wseas International Conference on Signal Processing, 2011
This paper introduces a new protocol called D6across4, which stands for Deploying IPv6 Service ac... more This paper introduces a new protocol called D6across4, which stands for Deploying IPv6 Service across local IPv4 access networks. The protocol aims to encourage Internet Service Providers (ISPs) to start deploying IPv6 service to their customers (end-users). It utilizes the automatic IPv6-in-IPv4 tunnels to transport IPv6 traffic (data and control information) over local IPv4 access networks. The key aspects of this protocol include: providing IPv6 service to end-users equivalent to native one, stateful operation, and requiring simple configurations on both end-user's host and ISP sides at the time of setup. D6across4 connected hosts can communicate with other IPv6 hosts outside their local IPv4 access network. The simulation results showed that D6across4 performance parameters (e.g. latency and throughput) are acceptable in comparison to both IPv4 and IPv6 performance parameters.
Proceedings of the Third Ieee Symposium on Parallel and Distributed Processing, Dec 2, 1991
Proceedings of the 11th International Conference on Telecommunications and Informatics Proceedings of the 11th International Conference on Signal Processing, Apr 1, 2012
This paper analyzes the technical and nontechnical impediments for a smooth and successful transi... more This paper analyzes the technical and nontechnical impediments for a smooth and successful transition from IPv4 protocol to IPv6 protocol in the Internet. It tries to illustrate and defines most obstacles that hold the widespread deployment of IPv6 at both sides: end-users and Internet Service Providers (ISPs). The paper also suggests transparent, auto-configured, and cost effective solutions for both end-users and ISPs parties to allow a smooth and successful widespread deployment of IPv6.
ABSTRACT This document specifies a new IPv6 deployment protocol called CHANC, which stands for Co... more ABSTRACT This document specifies a new IPv6 deployment protocol called CHANC, which stands for Configuring Hosts to Auto-detect (IPv6, IPv6-in-IPv4, or IPv4) Network Connectivity. The main part is an application level tunneling protocol that allows Internet Service Providers (ISPs) to rapidly start deploying IPv6 service to their subscribers whom connected to the Internet via IPv4-only access networks. It carries IPv6 packets over HTTP protocol to be transmitted across IPv4-only network infrastructure. The key aspects of this protocol are: offers IPv6 connectivity via IPv4-only access networks, stateless operation, economical solution, assures most firewall traversal, and requires simple installation and automatic configuration at customers‟ hosts. All data packets and routing information of the IPv6 protocol will be carried over the IPv4 network infrastructure. A simple application and a pseudo network driver must be installed at the end-user‟s hosts to make them able to work with this protocol. Such hosts will be able to auto-detect the ISP available connectivity in the following precedence: native IPv6, IPv6-in-IPv4, or no IPv6 connectivity. Because the protocol does not require changing or upgrading customer edges, a minimal cost in the deployment to IPv6 service should be expected. The simulation analysis showed that the performance of CHANC is pretty near to those of native IPv6, 6rd, and IPv4 protocols. Also, the performance of CHANC is much better than that of D6across4 protocol.
Proceedings of the 1992 Acm Annual Conference on Communications, 1992
This document describes a bi-directional IPv6/IPv4 Socket Layer Translator (SLT) for border gatew... more This document describes a bi-directional IPv6/IPv4 Socket Layer Translator (SLT) for border gateway routers. The new technique is called AIN-SLT which stands for Assuring Interconnection between Heterogeneous (IPv4/IPv6) Networks Using SLT. This mechanism assures a smooth heterogeneous communication between IPv6 and IPv4 nodes without using protocol translation. It applies IPv6/IPv4 socket Application Programming Interface (API) translation methodology between two heterogeneous networks by terminating IPv6/IPv4 connection points at the application layer. The AIN-SLT mechanism has many advantages over current translation/tunneling approaches, and so it does not require any configuration at end-users' hosts, it has the ability to translate non-NAT friendly traffic (i.e. FTP and SIP traffic), and it achieves a reliable communication by not breaking end-to-end protocol characteristics and security at physical layer (i.e. IPsec).
ABSTRACT In this paper we introduce a mechanism for hosts to use applications of any IP version c... more ABSTRACT In this paper we introduce a mechanism for hosts to use applications of any IP version capability (IPv4-only, IPv6 only, or dual IPv4/IPv6) regardless of the IP version of their network communication (IPv4 or IPv6), without any modification to those programs. DAC effectively shields the application layer IPv4/IPv6 operation from the underlying IPv4/IPv6 communication between the hosts. The authors consider the provision of this kind of functionality an essential condition for the changeover towards IPv6 to succeed. The proposed mechanism is a generalisation of an experimental protocol called “Bump-in-the-API (BIA)”
International Journal of Computers Communications Control, 2011
This paper introduces a new IPv6 deployment protocol called E4Deliver6, which stands for Exploiti... more This paper introduces a new IPv6 deployment protocol called E4Deliver6, which stands for Exploiting Local IPv4only Access Networks to Deliver IPv6 Service to End-users. The protocol intends to help the Internet Service Providers (ISPs) to rapidly start providing IPv6 service to the end-users. E4Deliver6 tunnels the IPv6 traffic into IPv4 traffic to transit the IPv4-only access network infrastructure. The new protocol offers IPv6 service alongside IPv4 service to the end-users, economical solution, and requires simple and automatic configurations at both end-users' hosts and ISP sides at the time of setup. E4Deliver6 connected hosts will be able to communicate with other IPv6-only servers outside their local IPv4-only access network. The performance analysis of E4Deliver6 showed that the performance parameters (e.g. Latency and Throughput) are acceptable in comparison to other stateless protocols (e.g. 6rd) and it is much better than other stateful protocols (e.g. BDMS) performance parameters.
Proceedings of the 3rd World Congress on Intelligent Control and Automation (Cat. No.00EX393), 2000
ABSTRACT In order to model and analyze the data traffic behaviors with feedback mechanism in high... more ABSTRACT In order to model and analyze the data traffic behaviors with feedback mechanism in high-speed data communication system, we start from the feedback control model proposed by Izmailov (1996), which is based on differential delay equations. However, instead of specifying the processing rate to be constant, we extend it to a general functional model. We also add a random item for describing the uncertainties in a real communication system. We analyze the stability of the system with these models. Theoretically, the results show that the system can be stabilized and that the buffer size can be controlled even if the system is suffering from a large delay or has variations in its delay, or if some other uncertain situations are present
Multi-domain routing and path computation is a well-known problem, which has extensively been ana... more Multi-domain routing and path computation is a well-known problem, which has extensively been analyzed in pure IP (packet) networks. In circuit switched optical multi-domain networks there are however still routing and path computation limitations that require additional investigations. Traffic grooming is combining a number of low speed traffic streams so that the high capacity of each lightpath may be used as efficiently as possible. As path computation implements the core of the grooming function, it is obvious that traffic grooming in optical multi-domain networks still needs additional research and development. This work presents a detailed IP/MPLS based ASON/GMPLS multi-domain framework to address the problems of lightpath routing and traffic grooming in optical multi-domain multi-layer networks.
This document specifies a mechanism for hosts with any network connectivity (IPv4 only, IPv6 only... more This document specifies a mechanism for hosts with any network connectivity (IPv4 only, IPv6 only, or dual IPv4/IPv6 connectivity) to run applications of any capability (IPv4 only, IPv6 only, or dual IPv4/IPv6) without any modification to those applications. It is a generalisation of a previous experimental protocol called "Bump-in-the-API" (BIA) [RFC3338]. New mechanism of BIA allows a changeover between the application layer and the IP communication layers from IPv4 to IPv6 and vice versa or IPv6 to IPv4 and vice versa, without requiring those applications to be converted in addressing capabilities, effectively shielding the application layer from IPv4 or IPv6 connectivity. This is considered by the authors to be one of the essential conditions for the transition to IPv6 in the Internet to be successful.
Proceedings 25th Annual IEEE Conference on Local Computer Networks. LCN 2000, 2000
We describe an architecture, which allows transparent access to the multicast infrastructure even... more We describe an architecture, which allows transparent access to the multicast infrastructure even when not directly connected to it. In that context, we introduce the concepts dynamic tunnel server location and rare-based path characterization. We propose changes to the UMTP in order to allow dynamic tunnel server location through firewalls. We present dynamic congestion discovery with an associated tunnel hand-over mechanism. The features of a session directory application, which integrates the dynamic tunnel mechanism, is shown. The concept of “channels” for session announcements is introduced. Finally, we present a SAP/SDP proxy location and query mechanism
This document describes a bi-directional IPv6/IPv4 Socket Layer Translator (SLT) for border gatew... more This document describes a bi-directional IPv6/IPv4 Socket Layer Translator (SLT) for border gateway routers. The new technique is called AIN-SLT which stands for Assuring Interconnection between Heterogeneous (IPv4/IPv6) Networks Using SLT. This mechanism assures a smooth heterogeneous communication between IPv6 and IPv4 nodes without using protocol translation. It applies IPv6/IPv4 socket Application Programming Interface (API) translation methodology between two heterogeneous networks by terminating IPv6/IPv4 connection points at the application layer. The AIN-SLT mechanism has many advantages over current translation/tunneling approaches, and so it does not require any configuration at end-users’ hosts, it has the ability to translate non-NAT friendly traffic (i.e. FTP and SIP traffic), and it achieves a reliable communication by not breaking end-to-end protocol characteristics and security at physical layer (i.e. IPsec).
KSII Transactions on Internet and Information Systems, 2011
ABSTRACT This document specifies a new IPv6 deployment protocol called CHANC, which stands for Co... more ABSTRACT This document specifies a new IPv6 deployment protocol called CHANC, which stands for Configuring Hosts to Auto-detect (IPv6, IPv6-in-IPv4, or IPv4) Network Connectivity. The main part is an application level tunneling protocol that allows Internet Service Providers (ISPs) to rapidly start deploying IPv6 service to their subscribers whom connected to the Internet via IPv4-only access networks. It carries IPv6 packets over HTTP protocol to be transmitted across IPv4-only network infrastructure. The key aspects of this protocol are: offers IPv6 connectivity via IPv4-only access networks, stateless operation, economical solution, assures most firewall traversal, and requires simple installation and automatic configuration at customers‟ hosts. All data packets and routing information of the IPv6 protocol will be carried over the IPv4 network infrastructure. A simple application and a pseudo network driver must be installed at the end-user‟s hosts to make them able to work with this protocol. Such hosts will be able to auto-detect the ISP available connectivity in the following precedence: native IPv6, IPv6-in-IPv4, or no IPv6 connectivity. Because the protocol does not require changing or upgrading customer edges, a minimal cost in the deployment to IPv6 service should be expected. The simulation analysis showed that the performance of CHANC is pretty near to those of native IPv6, 6rd, and IPv4 protocols. Also, the performance of CHANC is much better than that of D6across4 protocol.
IETE Technical Review, 2014
ABSTRACT This paper analyses the technical and non-technical obstacles that block the widespread ... more ABSTRACT This paper analyses the technical and non-technical obstacles that block the widespread deployment of IPv6 on the Internet (at both sides: end-users and Internet Service Providers (ISPs)). It reviews the current basic and standard IPv6 transition mechanisms that have been proposed by the Internet Engineering Task Force (IETF). The paper also suggests transparent, auto-configured, and cost-effective solutions for both end-users and ISPs parties, and compares them with the current techniques to allow a smooth and successful widespread deployment of IPv6.
Lecture Notes in Computer Science, 2005
2007 Conference on Lasers and Electro-Optics (CLEO)
Advanced polymer photonic devices are reported. These include a directly diode-pumped polymer las... more Advanced polymer photonic devices are reported. These include a directly diode-pumped polymer laser, a femtosecond polymer laser, and a broadband solid state polymer optical amplifier.
Icn, 2001
This paper describes the ideas behind a new way of running Internet applications on an ATM networ... more This paper describes the ideas behind a new way of running Internet applications on an ATM network. ATM already contains some functionality of the network layer and therefore there is no need to duplicate them in the IP stack. Instead of adapting the TCP/IP stack to ATM at the bottom, we replace the TCP/IP stack with something else that is capable of supporting the QoS needs of applications. The intention is to have Internet applications working over ATM with the same performance as a native ATM application could obtain.
... P. Liefooghe, M. Goossens Tele.Com Group INFO/TW Vrije Universiteit Brussel Pleinlaan 2 1050 ... more ... P. Liefooghe, M. Goossens Tele.Com Group INFO/TW Vrije Universiteit Brussel Pleinlaan 2 1050 Brussel, Belgium {pieter,marnix}@info.vub.ac.be ... A group in the SSM or Holbrook model [11] on the other hand has more restrictions and as a consequence more control. ...
Proceedings of the 10th Wseas International Conference on Telecommunications and Informatics and Microelectronics Nanoelectronics Optoelectronics and Wseas International Conference on Signal Processing, 2011
This paper introduces a new protocol called D6across4, which stands for Deploying IPv6 Service ac... more This paper introduces a new protocol called D6across4, which stands for Deploying IPv6 Service across local IPv4 access networks. The protocol aims to encourage Internet Service Providers (ISPs) to start deploying IPv6 service to their customers (end-users). It utilizes the automatic IPv6-in-IPv4 tunnels to transport IPv6 traffic (data and control information) over local IPv4 access networks. The key aspects of this protocol include: providing IPv6 service to end-users equivalent to native one, stateful operation, and requiring simple configurations on both end-user's host and ISP sides at the time of setup. D6across4 connected hosts can communicate with other IPv6 hosts outside their local IPv4 access network. The simulation results showed that D6across4 performance parameters (e.g. latency and throughput) are acceptable in comparison to both IPv4 and IPv6 performance parameters.
Proceedings of the Third Ieee Symposium on Parallel and Distributed Processing, Dec 2, 1991
Proceedings of the 11th International Conference on Telecommunications and Informatics Proceedings of the 11th International Conference on Signal Processing, Apr 1, 2012
This paper analyzes the technical and nontechnical impediments for a smooth and successful transi... more This paper analyzes the technical and nontechnical impediments for a smooth and successful transition from IPv4 protocol to IPv6 protocol in the Internet. It tries to illustrate and defines most obstacles that hold the widespread deployment of IPv6 at both sides: end-users and Internet Service Providers (ISPs). The paper also suggests transparent, auto-configured, and cost effective solutions for both end-users and ISPs parties to allow a smooth and successful widespread deployment of IPv6.
ABSTRACT This document specifies a new IPv6 deployment protocol called CHANC, which stands for Co... more ABSTRACT This document specifies a new IPv6 deployment protocol called CHANC, which stands for Configuring Hosts to Auto-detect (IPv6, IPv6-in-IPv4, or IPv4) Network Connectivity. The main part is an application level tunneling protocol that allows Internet Service Providers (ISPs) to rapidly start deploying IPv6 service to their subscribers whom connected to the Internet via IPv4-only access networks. It carries IPv6 packets over HTTP protocol to be transmitted across IPv4-only network infrastructure. The key aspects of this protocol are: offers IPv6 connectivity via IPv4-only access networks, stateless operation, economical solution, assures most firewall traversal, and requires simple installation and automatic configuration at customers‟ hosts. All data packets and routing information of the IPv6 protocol will be carried over the IPv4 network infrastructure. A simple application and a pseudo network driver must be installed at the end-user‟s hosts to make them able to work with this protocol. Such hosts will be able to auto-detect the ISP available connectivity in the following precedence: native IPv6, IPv6-in-IPv4, or no IPv6 connectivity. Because the protocol does not require changing or upgrading customer edges, a minimal cost in the deployment to IPv6 service should be expected. The simulation analysis showed that the performance of CHANC is pretty near to those of native IPv6, 6rd, and IPv4 protocols. Also, the performance of CHANC is much better than that of D6across4 protocol.
Proceedings of the 1992 Acm Annual Conference on Communications, 1992
This document describes a bi-directional IPv6/IPv4 Socket Layer Translator (SLT) for border gatew... more This document describes a bi-directional IPv6/IPv4 Socket Layer Translator (SLT) for border gateway routers. The new technique is called AIN-SLT which stands for Assuring Interconnection between Heterogeneous (IPv4/IPv6) Networks Using SLT. This mechanism assures a smooth heterogeneous communication between IPv6 and IPv4 nodes without using protocol translation. It applies IPv6/IPv4 socket Application Programming Interface (API) translation methodology between two heterogeneous networks by terminating IPv6/IPv4 connection points at the application layer. The AIN-SLT mechanism has many advantages over current translation/tunneling approaches, and so it does not require any configuration at end-users' hosts, it has the ability to translate non-NAT friendly traffic (i.e. FTP and SIP traffic), and it achieves a reliable communication by not breaking end-to-end protocol characteristics and security at physical layer (i.e. IPsec).
ABSTRACT In this paper we introduce a mechanism for hosts to use applications of any IP version c... more ABSTRACT In this paper we introduce a mechanism for hosts to use applications of any IP version capability (IPv4-only, IPv6 only, or dual IPv4/IPv6) regardless of the IP version of their network communication (IPv4 or IPv6), without any modification to those programs. DAC effectively shields the application layer IPv4/IPv6 operation from the underlying IPv4/IPv6 communication between the hosts. The authors consider the provision of this kind of functionality an essential condition for the changeover towards IPv6 to succeed. The proposed mechanism is a generalisation of an experimental protocol called “Bump-in-the-API (BIA)”
International Journal of Computers Communications Control, 2011
This paper introduces a new IPv6 deployment protocol called E4Deliver6, which stands for Exploiti... more This paper introduces a new IPv6 deployment protocol called E4Deliver6, which stands for Exploiting Local IPv4only Access Networks to Deliver IPv6 Service to End-users. The protocol intends to help the Internet Service Providers (ISPs) to rapidly start providing IPv6 service to the end-users. E4Deliver6 tunnels the IPv6 traffic into IPv4 traffic to transit the IPv4-only access network infrastructure. The new protocol offers IPv6 service alongside IPv4 service to the end-users, economical solution, and requires simple and automatic configurations at both end-users' hosts and ISP sides at the time of setup. E4Deliver6 connected hosts will be able to communicate with other IPv6-only servers outside their local IPv4-only access network. The performance analysis of E4Deliver6 showed that the performance parameters (e.g. Latency and Throughput) are acceptable in comparison to other stateless protocols (e.g. 6rd) and it is much better than other stateful protocols (e.g. BDMS) performance parameters.
Proceedings of the 3rd World Congress on Intelligent Control and Automation (Cat. No.00EX393), 2000
ABSTRACT In order to model and analyze the data traffic behaviors with feedback mechanism in high... more ABSTRACT In order to model and analyze the data traffic behaviors with feedback mechanism in high-speed data communication system, we start from the feedback control model proposed by Izmailov (1996), which is based on differential delay equations. However, instead of specifying the processing rate to be constant, we extend it to a general functional model. We also add a random item for describing the uncertainties in a real communication system. We analyze the stability of the system with these models. Theoretically, the results show that the system can be stabilized and that the buffer size can be controlled even if the system is suffering from a large delay or has variations in its delay, or if some other uncertain situations are present
Multi-domain routing and path computation is a well-known problem, which has extensively been ana... more Multi-domain routing and path computation is a well-known problem, which has extensively been analyzed in pure IP (packet) networks. In circuit switched optical multi-domain networks there are however still routing and path computation limitations that require additional investigations. Traffic grooming is combining a number of low speed traffic streams so that the high capacity of each lightpath may be used as efficiently as possible. As path computation implements the core of the grooming function, it is obvious that traffic grooming in optical multi-domain networks still needs additional research and development. This work presents a detailed IP/MPLS based ASON/GMPLS multi-domain framework to address the problems of lightpath routing and traffic grooming in optical multi-domain multi-layer networks.
This document specifies a mechanism for hosts with any network connectivity (IPv4 only, IPv6 only... more This document specifies a mechanism for hosts with any network connectivity (IPv4 only, IPv6 only, or dual IPv4/IPv6 connectivity) to run applications of any capability (IPv4 only, IPv6 only, or dual IPv4/IPv6) without any modification to those applications. It is a generalisation of a previous experimental protocol called "Bump-in-the-API" (BIA) [RFC3338]. New mechanism of BIA allows a changeover between the application layer and the IP communication layers from IPv4 to IPv6 and vice versa or IPv6 to IPv4 and vice versa, without requiring those applications to be converted in addressing capabilities, effectively shielding the application layer from IPv4 or IPv6 connectivity. This is considered by the authors to be one of the essential conditions for the transition to IPv6 in the Internet to be successful.
Proceedings 25th Annual IEEE Conference on Local Computer Networks. LCN 2000, 2000
We describe an architecture, which allows transparent access to the multicast infrastructure even... more We describe an architecture, which allows transparent access to the multicast infrastructure even when not directly connected to it. In that context, we introduce the concepts dynamic tunnel server location and rare-based path characterization. We propose changes to the UMTP in order to allow dynamic tunnel server location through firewalls. We present dynamic congestion discovery with an associated tunnel hand-over mechanism. The features of a session directory application, which integrates the dynamic tunnel mechanism, is shown. The concept of “channels” for session announcements is introduced. Finally, we present a SAP/SDP proxy location and query mechanism
This document describes a bi-directional IPv6/IPv4 Socket Layer Translator (SLT) for border gatew... more This document describes a bi-directional IPv6/IPv4 Socket Layer Translator (SLT) for border gateway routers. The new technique is called AIN-SLT which stands for Assuring Interconnection between Heterogeneous (IPv4/IPv6) Networks Using SLT. This mechanism assures a smooth heterogeneous communication between IPv6 and IPv4 nodes without using protocol translation. It applies IPv6/IPv4 socket Application Programming Interface (API) translation methodology between two heterogeneous networks by terminating IPv6/IPv4 connection points at the application layer. The AIN-SLT mechanism has many advantages over current translation/tunneling approaches, and so it does not require any configuration at end-users’ hosts, it has the ability to translate non-NAT friendly traffic (i.e. FTP and SIP traffic), and it achieves a reliable communication by not breaking end-to-end protocol characteristics and security at physical layer (i.e. IPsec).
KSII Transactions on Internet and Information Systems, 2011
ABSTRACT This document specifies a new IPv6 deployment protocol called CHANC, which stands for Co... more ABSTRACT This document specifies a new IPv6 deployment protocol called CHANC, which stands for Configuring Hosts to Auto-detect (IPv6, IPv6-in-IPv4, or IPv4) Network Connectivity. The main part is an application level tunneling protocol that allows Internet Service Providers (ISPs) to rapidly start deploying IPv6 service to their subscribers whom connected to the Internet via IPv4-only access networks. It carries IPv6 packets over HTTP protocol to be transmitted across IPv4-only network infrastructure. The key aspects of this protocol are: offers IPv6 connectivity via IPv4-only access networks, stateless operation, economical solution, assures most firewall traversal, and requires simple installation and automatic configuration at customers‟ hosts. All data packets and routing information of the IPv6 protocol will be carried over the IPv4 network infrastructure. A simple application and a pseudo network driver must be installed at the end-user‟s hosts to make them able to work with this protocol. Such hosts will be able to auto-detect the ISP available connectivity in the following precedence: native IPv6, IPv6-in-IPv4, or no IPv6 connectivity. Because the protocol does not require changing or upgrading customer edges, a minimal cost in the deployment to IPv6 service should be expected. The simulation analysis showed that the performance of CHANC is pretty near to those of native IPv6, 6rd, and IPv4 protocols. Also, the performance of CHANC is much better than that of D6across4 protocol.
IETE Technical Review, 2014
ABSTRACT This paper analyses the technical and non-technical obstacles that block the widespread ... more ABSTRACT This paper analyses the technical and non-technical obstacles that block the widespread deployment of IPv6 on the Internet (at both sides: end-users and Internet Service Providers (ISPs)). It reviews the current basic and standard IPv6 transition mechanisms that have been proposed by the Internet Engineering Task Force (IETF). The paper also suggests transparent, auto-configured, and cost-effective solutions for both end-users and ISPs parties, and compares them with the current techniques to allow a smooth and successful widespread deployment of IPv6.
Lecture Notes in Computer Science, 2005
2007 Conference on Lasers and Electro-Optics (CLEO)
Advanced polymer photonic devices are reported. These include a directly diode-pumped polymer las... more Advanced polymer photonic devices are reported. These include a directly diode-pumped polymer laser, a femtosecond polymer laser, and a broadband solid state polymer optical amplifier.