|
Browse All Reviews > Computer Systems Organization (C) > Computer-Communication Networks (C.2) > Network Protocols (C.2.2) > Protocol Architecture (C.2.2...)
|
|
|
|
|
|
|
|
|
1-10 of 27
Reviews about "Protocol Architecture (C.2.2...)":
|
Date Reviewed |
|
A generic IP paging architecture and protocol Liebsch M., Lamparter B. Computer Networks 49(3): 427-448, 2005. Type: Article
Modern technology allows one to use the Internet or a cellular phone almost anywhere. The structure behind this connectivity is usually hierarchical; that is, mobile users connect to base stations. Several base stations are grouped and...
|
Apr 13 2007 |
|
Enabling reliable many-to-many communication in ad-hoc pervasive environments Vollset E., Ezhilchelvan P. Pervasive Computing and Communications Workshops (Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops,Mar 8-Mar 12, 2005) 65-69, 2005. Type: Proceedings
An issue in making computing potently diffuse throughout a domain is the need to come up with an efficient, many-to-many dissemination protocol among a group of n devices that communicate using omni-directional wirel...
|
Aug 11 2006 |
|
Performance analysis of TLS Web servers Coarfa C., Druschel P., Wallach D. ACM Transactions on Computer Systems 24(1): 39-69, 2006. Type: Article
The analysis of performance costs of security operations in multifaceted secure Web servers is extremely odd. Is it feasible to ascertain an exact model for simulating the behaviors of secure replicated clusters of Web servers with loa...
|
Jul 11 2006 |
|
NUTSS: a SIP-based approach to UDP and TCP network connectivity Guha S., Takeda Y., Francis P. Future directions in network architecture (Proceedings of the ACM SIGCOMM Workshop on Future Directions in Network Architecture, Portland, OR, Aug 30, 2004) 43-48, 2004. Type: Proceedings
Network address translations (NATs) have proven to be a costly hurdle in the widespread deployment of voice over IP (VoIP). The cost can be measured in financial terms, as well as missed opportunities for a wider deployment of the tech...
|
Feb 21 2006 |
|
Improving fairness of TCP Vegas Li J., Ma C. International Journal of Network Management 15(1): 3-10, 2005. Type: Article
An important factor in the robustness of the Internet is end-to-end transmission control protocol (TCP). Two well-known congestion avoidance mechanisms are TCP Reno and TCP Vegas. Hosts using TCP Reno may not react in time to the conge...
|
May 16 2005 |
|
Enhanced of key agreement protocols resistant to a denial-of-service attack Hwang M., Lo J., Liu C. Fundamenta Informaticae 61(3,4): 389-398, 2004. Type: Article
The establishment of session keys for sending secret messages between an initiator and a responder is a well-studied field of research. Shoichi Hirose and Kanta Matsuura pointed out that techniques used for the authentication of these ...
|
Feb 25 2005 |
|
An architecture for packet-striping protocols Hari A., Varghese G., Parulkar G. ACM Transactions on Computer Systems 17(4): 249-287, 1999. Type: Article
With the ever-growing power of computer CPUs (such as the recent advent of 1.0 GHz PC processors), network speeds for Internet access and Internet service provider (ISP) backbones usually become the bottlenecks. Although many new techn...
|
Feb 1 2000 |
|
The Totem multiple-ring ordering and topology maintenance protocol Agarwal D., Moser L., Melliar-Smith P., Budhia R. ACM Transactions on Computer Systems 16(2): 93-132, 1998. Type: Article
I found this paper to be interesting and well written. The authors do an excellent job of presenting examples and algorithms, as well as the results of performance evaluation. The paper is technical, and should be of interest to those ...
|
Sep 1 1998 |
|
The fair distributed queue (FDQ) protocol for high-speed metropolitan-area networks Kabatepe M., Vastola K. IEEE/ACM Transactions on Networking 4(3): 331-339, 1996. Type: Article
This paper describes yet another variant on the distributed queue dual bus (DQDB) protocol. The fair distributed queue (FDQ) protocol is intended to be used on fiber optic metropolitan area networks similar to those used with DQDB. The...
|
Sep 1 1997 |
|
The Totem single-ring ordering and membership protocol Amir Y., Moser L., Melliar-Smith P., Agarwal D., Ciarfella P. ACM Transactions on Computer Systems 13(4): 311-342, 1995. Type: Article
Totem is a single-ring protocol for high-performance, fault-tolerant distributed systems that must continue to operate despite network partitioning and re-merging and despite processor failure and restart. Totem provides totally ordere...
|
Feb 1 1997 |
|
|
|
|
|
|