Internet Routing Protocol Research Papers (original) (raw)

Although the Internet is valued by many of its supporters particularly because it both defies and defeats physical borders, these important attributes are now being exposed to attempts by both governments and private entities to impose... more

Although the Internet is valued by many of its supporters particularly because it both defies and defeats physical borders, these important attributes are now being exposed to attempts by both governments and private entities to impose territorial limits through blocking or permitting access to content by Internet users based on their geographical location — a territorial partitioning of the Internet. One of these attempts, for example, is the recent Stop Online Piracy Act (“SOPA”) proposal in the United States. This article, as opposed to earlier literature on the topic discussing the possible virtues and methods of raising borders in cyberspace, focuses on an Internet activity that is designed to bypass the territorial partitioning of cyberspace and render any partitioning attempts ineffective. The activity — cybertravel — permits users to access content on the Internet that is normally not available when they connect to the Internet from their geographical location. By utilizing ...

Purpose – To explore the use of LexiURL as a Web intelligence tool for collecting and analysing links to digital libraries, focusing specifically on the National electronic Library for Health (NeLH). Design/methodology/approach – The Web... more

Purpose – To explore the use of LexiURL as a Web intelligence tool for collecting and analysing links to digital libraries, focusing specifically on the National electronic Library for Health (NeLH). Design/methodology/approach – The Web intelligence techniques in this study are a combination of link analysis (web structure mining), web server log file analysis (web usage mining), and text analysis (web content mining), utilizing the power of commercial search engines and drawing upon the information science fields of bibliometrics and webometrics. LexiURL is a computer program designed to calculate summary statistics for lists of links or URLs. Its output is a series of standard reports, for example listing and counting all of the different domain names in the data. Findings – Link data, when analysed together with user transaction log files (i.e., Web referring domains) can provide insights into who is using a digital library and when, and who could be using the digital library if...

This paper outlines an ongoing research project on training, education and sharing of experiences among mobile people. The importance for professionals to continuously learn is widely recognized. Organizations in the new economy are... more

This paper outlines an ongoing research project on training, education and sharing of experiences among mobile people. The importance for professionals to continuously learn is widely recognized. Organizations in the new economy are dependent on organizational knowledge and competence. Mobile workers need alternative educational and knowledge development opportunities that are not restrained by time and space.

The Internet protocol (IP) plays a dominant role in current networking technologies and the wavelength division multiplexing (WDM) technology provides tremendous bandwidth. The IP-over-WDM is becoming the right choice for next-generation... more

The Internet protocol (IP) plays a dominant role in current networking technologies and the wavelength division multiplexing (WDM) technology provides tremendous bandwidth. The IP-over-WDM is becoming the right choice for next-generation Internet networks where optical burst switches (OBS) is a promising technique to bridge the gap between IP and WDM. However, traditional OBS scheduling algorithms either have low computational complexity

Off the shelf routing products often are constrained by design to meet specific needs, both in terms of software and hardware. Networking professionals may face problems that require customisation of software, additional processing... more

Off the shelf routing products often are constrained by design to meet specific needs, both in terms of software and hardware. Networking professionals may face problems that require customisation of software, additional processing facilities or data storage, that are not provided for by those products. The Quagga Routing Suite provides implementations of several common routing protocols, distributed over multiple processes communicating via IPC, and support for their development, with source code provided under a modification-friendly licence. Quagga can help networking professionals build such custom solutions, in combination with other Open Source software packages. Quagga also provides a path for network researchers to increase the visibility of their work, and make it available to a wider community for potential testing and use, increasing the impact of that research.

International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists,... more

International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.

This paper was designed to provide Intranet traffic monitoring by sniffing the packets at the local Area Network (LAN) server end to provide security and control. It was implemented using five computer systems configured with static... more

This paper was designed to provide Intranet traffic monitoring by sniffing the packets at the local Area Network (LAN) server end to provide security and control. It was implemented using five computer systems configured with static Internet Protocol (IP) addresses used in monitoring the IP traffic on the network by capturing and analyzing live packets from various sources and destinations in the network. The LAN was deployed on windows 8 with a D-link 16-port switch, category 6 Ethernet cable and other LAN devices. The IP traffics were captured and analyzed using Wireshark Version 2.0.3. Four network instructions were used in the analysis of the IP traffic and the results displayed the IP and Media Access Control (MAC) address sources and destinations of the frames, Ethernet, IP addresses, User Datagram Protocol (UDP) and Hypertext Transfer Protocol (HTTP). The outcome can aid network administrators to control Intranet access and provide security.

Routing Static dengan 3 Router di Cisco Packet Tracer

During the last decades people have become witnesses to the rapid expansion of data networks. New ways of working, communicating and socializing have been accompanied by new terms such as “Bring your own device” (BYOD), the “Internet of... more

During the last decades people have become witnesses to the rapid expansion of data networks. New ways of working, communicating and socializing have been accompanied by new terms such as “Bring your own device” (BYOD), the “Internet of things” and of course Cloud services. Routing protocol evolution has followed a similar path, simple distance-vector protocols and default routes led the way to link-state and hybrid protocols. This evolution is attributed to the following business demands: fast convergence in data centers in order to accommodate redundancy and failover requirements, public and private clouds service level management, and higher percentage availability.
The focus of this thesis is based on the two internal gateway protocols, OSPF and EIGRP, which monopolize the market, as more or less industry standards. Both operate inside an autonomous system, and while having different ways to form relationships among routing devices, adapt to topology changes and handle failures, they provide the same results: robust routing tables and network stability.
The objective is to evaluate their performance characteristics and more specifically their network convergence duration, video conference packet delay variation, IP voice jitter and CPU utilization in two different topologies. The first topology provides the basis for simulation comparison, while the second examines the scaling effects of both protocols.

In mobile ad hoc networks (MANETs), links are created and destroyed in an unpredictable way, which makes quite challenging the determination of routes between each pair of nodes. In this paper, we propose a formulation of the routing... more

In mobile ad hoc networks (MANETs), links are created and destroyed in an unpredictable way, which makes quite challenging the determination of routes between each pair of nodes. In this paper, we propose a formulation of the routing problem in multi-services MANETs, as well as the implementation of an adaptation of the dynamic source routing (DSR) protocol.

This paper proposes an economical implementation for IoT (Internet of Things) used for monitoring and controlling the home appliances via the Internet. The home automation system uses portable devices such as Smartphones, laptops as a... more

This paper proposes an economical implementation for IoT (Internet of Things) used for monitoring and controlling the home appliances via the Internet. The home automation system uses portable devices such as Smartphones, laptops as a user interface. They can communicate with home automation networks through the Internet. This project aims at controlling home appliances via Smartphone's using Wi-Fi as a communication protocol and an affordable and flexible home control system using a Raspberry pi as a server system. The user can move anywhere and can remotely control home appliances like lights, fan and door lock, through an easy application. The Raspberry pi which acts as the server will be interfaced with relay circuits that control the appliances running at home. The communication with the server allows the user to select the appropriate device. The server communicates with the corresponding relays. This automation system is very useful for people who have physically challenged. The other reason to develop this system is to save time and manpower along with maintaining security and convenience.

Networking offers the framework to congregate largely heterogeneous entities so that they can communicate. In this paper we review aspects of Network architectural design that aims to ensure connectivity and data security for network... more

Networking offers the framework to congregate largely heterogeneous entities so that they can communicate. In this paper we review aspects of Network architectural design that aims to ensure connectivity and data security for network users. Security protocols like the Internet Protocol Security (IPsec) ensures data security for users of a Virtual Private Network which provides encryption, tunneling and authentication services. Virtual Local Area Networks plays a role in network management and security. Access Control lists provides an overview of rights granted to users to access network resources thereby reducing incidence of hacking to the minimum. Combining these techniques in a network would ensure uninterrupted service and data security to network users.

One of the crucial building blocks for Information Centric Networking (ICN) is a name based routing scheme that can route directly on content names instead of IP addresses. However, moving the address space from IP addresses to content... more

One of the crucial building blocks for Information Centric Networking (ICN) is a name based routing scheme that can route directly on content names instead of IP addresses. However, moving the address space from IP addresses to content names brings scalability issues to a whole new level, due to two reasons. First, name aggregation is not as trivial a task as the IP address aggregation in BGP routing. Second, the number of addressable contents in the Internet is several orders of magnitude higher than the number of IP addresses. With the current size of the Internet, name based, anycast routing is very challenging specially when routing efficiency is of prime importance. We propose a novel name-based routing scheme ( Route) for ICN that offers efficient bandwidth usage, guaranteed content lookup and scalable routing table size. Route consists of two components: an alphanumeric Distributed Hash Table (DHT) and an overlay to underlay (Internet topology) mapping algorithm. Simulation results show that Route performs significantly better than Content Centric Network (CCN) (by V. Jacobson et al., 2009) in terms of network bandwidth usage, lookup latency and load balancing.

Wireless and satellite networks often have non-negligible packet corruption rates that can significantly degrade TCP performance. This is due to TCP's assumption that every packet loss is an indication of network congestion (causing... more

Wireless and satellite networks often have non-negligible packet corruption rates that can significantly degrade TCP performance. This is due to TCP's assumption that every packet loss is an indication of network congestion (causing TCP to reduce the transmission rate). This problem has re- ceived much attention in the literature. In this paper, we take a broad look at the problem

International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all... more

International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.

Se presenta un sistema de monitoreo remoto vía internet para módulos de nivel y multivariable, por medio de una interacción entre el PLC S7-1200 y un PC servidor con software LabVIEW®, con el objetivo de dar a conocer una nueva forma para... more

Se presenta un sistema de monitoreo remoto vía internet para módulos de nivel y multivariable, por medio de una interacción entre el PLC S7-1200 y un PC servidor con software LabVIEW®, con el objetivo de dar a conocer una nueva forma para visualizar información sobre un proceso a distancia en tiempo real, que puede ser aplicada a nivel industrial por pequeñas y medianas empresas (PYMES), siendo una solución relativamente más económica que los existentes en el mercado. Se inicia con la selección de los indicadores de producción más relevantes para los 2 procesos, además se hace la selección de las herramientas de software y hardware necesarias para llevar a cabo el monitoreo remoto vía internet a través de un navegador común. Se crea un archivo dinámico en línea con el histórico de los indicadores y finalmente se realizan pruebas de comunicación desde la misma red y una red externa a la institucional para validar el funcionamiento completo del sistema.

Abstrak Softswitch mampu menjawab kekurangan jaringan PSTN dalam hal biaya dan fasilitas serta merupakan sebuah teknologi yang mendigitalisasi data suara ke dalam paket-paket data untuk ditransmisikan melalui jaringan komputer... more

Abstrak Softswitch mampu menjawab kekurangan jaringan PSTN dalam hal biaya dan fasilitas serta merupakan sebuah teknologi yang mendigitalisasi data suara ke dalam paket-paket data untuk ditransmisikan melalui jaringan komputer memanfaatkan Internet Protocol (IP). Softswitch dapat dibangun dengan menggunakan aplikasi-aplikasi yang bersifat freeware, seperti X-Lite. Untuk menguji kualitas suara, kita dapat menganalisis delay, jitter, dan, packet loss. Walaupun menggunakan aplikasi-aplikasi yang bersifat freeware, secara umum Softswitch yang telah dibangun dapat beroperasi dengan baik serta memiliki kualitas suara yang memuaskan.

International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all... more

International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.

Due to the shortage of public IPv4 addresses, the IETF has developed a new version of the Internet Protocol called IPv6. Many institutions all over the world had already started the migration to IPv6. Since this migration has to be done... more

Due to the shortage of public IPv4 addresses, the IETF has developed a new version of the Internet Protocol called IPv6. Many institutions all over the world had already started the migration to IPv6. Since this migration has to be done slowly, the first step is the coexistence of the two protocols (IPv4 and IPv6) for some years. One important issue for IPv6 to gain acceptance, is its performance in end-user applications. Hence, due to the availability of a variety of IPv6 implementations on different operating systems, it is important to evaluate the performance of the different IPv6 stacks, and compare it to the one shown by IPv4. In this paper, we present an upper bound model to compute TCP and UDP throughput for IPv4 and IPv6, in a full-duplex point-to-point connection. Our model can be used for any variant of Ethernet technology (10, 100, and 1000Mbps). To validate this model, we did experiments and compared the maximum theoretical throughput with the experimental ones. Experiments were done with Windows XP SP2, Solaris 10, and Debian 3.1, which are very popular operating systems. The results show that 10Mbps Ethernet technology is already very mature, since it gave performance very close to the maximum theoretical throughput. Experiments with FastEthernet (100Mbps) show a TCP and UDP throughput close to the maximum theoretical throughput, especially for large payload. In the case of GigaEthernet (1000Mbps), experimental results are not far from the maximum throughput for large TCP and UDP payload. However, for small TCP and UDP payload, the differences between our model (the maximum throughput) and the experiments are important. These differences should significantly decrease with the release of faster technology (processors and RAM).