Filters








53,287 Hits in 7.0 sec

Architecture and protocols for the Internet of Things: A case study

Angelo P. Castellani, Nicola Bui, Paolo Casari, Michele Rossi, Zach Shelby, Mich Zorzi
2010 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)  
In this paper, we describe a practical realization of an Internet-of-Things (IoT) architecture at the University of Padova, Italy.  ...  A support for the 6LoWPAN standard makes nodes reachable from outside the network using IPv6 and provides an infrastructure to realize IoT applications.  ...  In order to realize the Internet of Things, the simple, efficient way of realizing the REST architecture presented in this paper is surely needed as a global standard.  ... 
doi:10.1109/percomw.2010.5470520 dblp:conf/percom/CastellaniBCRSZ10 fatcat:4serxgfncbhnjlacfoyfk7wmzm

The design philosophy of the DARPA internet protocols

D. Clark
1988 Symposium proceedings on Communications architectures and protocols - SIGCOMM '88  
Implementors tried such things as moving the transport protocols to a front end processor, with the idea that the protocols would be implemented only once, rather than again for every type of host.  ...  For example, the Internet protocol is based on a connectionless or datagram mode of service. The motivation for this has been greatly misunderstood.  ... 
doi:10.1145/52324.52336 dblp:conf/sigcomm/Clark88 fatcat:ws6q2lc2d5bg3hggkgqirdsxom

Greening of the internet

Maruti Gupta, Suresh Singh
2003 Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '03  
Using sample packet traces, we first show that it is indeed reasonable to do this and then we discuss the changes that may need to be made to current Internet protocols to support a more aggressive strategy  ...  We discuss the impact on network protocols of saving energy by putting network interfaces and other router & switch components to sleep.  ...  David also provided the idea of using wireless energy costs as a point of comparison. The authors would also like to thank David Burns for assisting us in data collection.  ... 
doi:10.1145/863955.863959 dblp:conf/sigcomm/GuptaS03 fatcat:c2ydhpwkifaihfz72dwqhngjl4

Greening of the internet

Maruti Gupta, Suresh Singh
2003 Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '03  
Using sample packet traces, we first show that it is indeed reasonable to do this and then we discuss the changes that may need to be made to current Internet protocols to support a more aggressive strategy  ...  We discuss the impact on network protocols of saving energy by putting network interfaces and other router & switch components to sleep.  ...  David also provided the idea of using wireless energy costs as a point of comparison. The authors would also like to thank David Burns for assisting us in data collection.  ... 
doi:10.1145/863956.863959 fatcat:37xm53hezbh7boxpb4e6pcw7d4

Using pathchar to estimate Internet link characteristics

Allen B. Downey
1999 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication - SIGCOMM '99  
, the SIGMETRICS reviewers and program committee, the SIGCOMM reviewers and program committee, and Van Jacobson for writing pathchar.  ...  Acknowledgements Many thanks to k claffy at CAIDA, Jason Lavoie at MINT, Greg Miller at MCI, Evi Nemeth and Daniel McRobb at CAIDA, Rich Wolski at the University of Tennessee, Mark Crovella at Boston University  ...  Our example paths, and the 11 links that comprise them, are not intended to be a statistical sample of the Internet (cf. Psxson's empirical studies [3, 41) .  ... 
doi:10.1145/316188.316228 dblp:conf/sigcomm/Downey99 fatcat:mrz266ltpbbkdf2e74lbvzr2ue

A study of prefix hijacking and interception in the internet

Hitesh Ballani, Paul Francis, Xinyang Zhang
2007 Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '07  
This paper presents a study of such prefix hijacking and interception with the following contributions: (1). We present a methodology for prefix interception, (2).  ...  We estimate the fraction of traffic to any prefix that can be hijacked and intercepted in the Internet today, (3).  ...  F49620-02-1-0233 and PA8750-05-C-0268 and by a grant from Intel.  ... 
doi:10.1145/1282380.1282411 dblp:conf/sigcomm/BallaniFZ07 fatcat:ykex24bnmfcepnyhdmxv43aomm

A knowledge plane for the internet

David D. Clark, Craig Partridge, J. Christopher Ramming, John T. Wroclawski
2003 Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '03  
and advice to other elements of the network.  ...  Instead, we propose a new construct, the Knowledge Plane, a pervasive system within the network that builds and maintains highlevel models of what the network is supposed to do, in order to provide services  ...  The authors thank the SIGCOMM reviewers and the many participants in the DARPA Knowledge Plane Study for discussions and comments that have contributed greatly to the development of our perspective.  ... 
doi:10.1145/863955.863957 dblp:conf/sigcomm/ClarkPRW03 fatcat:zzia3rvsvzff7pfy34cvlmj3a4

The end-to-end effects of Internet path selection

Stefan Savage, Andy Collins, Eric Hoffman, John Snell, Thomas Anderson
1999 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication - SIGCOMM '99  
The path taken by a packet traveling across the Internet depends on a large number of factors, including routing protocols and pernetwork routing policies.  ...  We find that in 30-80% of the cases, there is an alternate path with significantly superior quality. We argue that the overall result is robust and we explore two hypotheses for explaining it.  ...  Varadhan et al. present a simulation study of the effect of path changes on the performance of transport protocols [VEF98]  ... 
doi:10.1145/316188.316233 dblp:conf/sigcomm/SavageCHSA99 fatcat:67m2gw5sobbe7hilmxcr54ye2i

A knowledge plane for the internet

David D. Clark, Craig Partridge, J. Christopher Ramming, John T. Wroclawski
2003 Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '03  
and advice to other elements of the network.  ...  Instead, we propose a new construct, the Knowledge Plane, a pervasive system within the network that builds and maintains highlevel models of what the network is supposed to do, in order to provide services  ...  The authors thank the SIGCOMM reviewers and the many participants in the DARPA Knowledge Plane Study for discussions and comments that have contributed greatly to the development of our perspective.  ... 
doi:10.1145/863956.863957 fatcat:rs2yvginw5hrplfgzknnr4ryi4

On selfish routing in internet-like environments

Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker
2003 Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '03  
In this paper, we use a game-theoretic approach to investigate the performance of selfish routing in Internet-like environments based on realistic topologies and traffic demands in our simulations.  ...  Moreover, the adaptive nature of selfish overlays can significantly reduce the effectiveness of traffic engineering by making network traffic less predictable.  ...  Zegura, and the anonymous reviewers.  ... 
doi:10.1145/863955.863974 dblp:conf/sigcomm/QiuYZS03 fatcat:il7qi2knwzbjlj5my4nrc6tx4y

On selfish routing in internet-like environments

Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker
2003 Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '03  
In this paper, we use a game-theoretic approach to investigate the performance of selfish routing in Internet-like environments based on realistic topologies and traffic demands in our simulations.  ...  Moreover, the adaptive nature of selfish overlays can significantly reduce the effectiveness of traffic engineering by making network traffic less predictable.  ...  Zegura, and the anonymous reviewers.  ... 
doi:10.1145/863973.863974 fatcat:yfcsyfel6neqpow3twjp2lp6ze

Can internet video-on-demand be profitable?

Cheng Huang, Jin Li, Keith W. Ross
2007 Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '07  
Video-on-demand in the Internet has become an immensely popular service in recent years. But due to its high bandwidth requirements and popularity, it is also a costly service to provide.  ...  We consider the design and potential benefits of peer-assisted video-on-demand, in which participating peers assist the server in delivering VoD content.  ...  REAL-WORLD CASE STUDY The previous section presented a theoretical model that exposed many of the fundamental issues of peer-assisted VoD.  ... 
doi:10.1145/1282380.1282396 dblp:conf/sigcomm/HuangLR07 fatcat:qv4lo2dv5bhlxclqte4evhjumm

Thinging-Based Conceptual Modeling: Case Study of a Tendering System [article]

Sabah Al-Fedaghi, Esraa Haidar
2020 arXiv   pre-print
may enhance and facilitate a supplementary understanding of the OO model itself.  ...  We apply a recently developed model called the Thinging Machine (TM) model which uniformly integrates static and dynamic modeling features to this problem of requirements specification.  ...  Ethics This article is original and contains unpublished material. The corresponding author confirms that all of the other authors have read and approved the manuscript.  ... 
arXiv:2007.00168v1 fatcat:tybuu76ytngy3egapc6zjjztye

Session directories and scalable Internet multicast address allocation

Mark Handley
1998 Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication - SIGCOMM '98  
Despite our best efforts to make such an approach scale, this analysis ultimately reveals significant scaling problems, and suggests a new approach to multicast address allocation in the Internet environment  ...  A multicast session directory is a mechanism by which users can discover the existence of multicast sessions.  ...  Figure 15 : 15 Simulations Figure 16 : 16 Delay in a Multicast Request-Response Protocol model of the real internet.  ... 
doi:10.1145/285237.285269 dblp:conf/sigcomm/Handley98 fatcat:3q4mq7nj3zas7ju5nxnhgggsxe

Securing internet coordinate embedding systems

Mohamed Ali Kaafar, Laurent Mathy, Chadi Barakat, Kave Salamatian, Thierry Turletti, Walid Dabbous
2007 Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '07  
This paper addresses the issue of the security of Internet Coordinate Systems, by proposing a general method for malicious behavior detection during coordinate computations.  ...  A combination of simulations and Planet-Lab experiments are used to demonstrate the validity, generality, and effectiveness of the proposed approach for two representative coordinate embedding systems,  ...  Acknowledgments We would like to thank Dina Papagiannaki, Guy Leduc and the anonymous reviewers for their useful comments that helped improve the paper.  ... 
doi:10.1145/1282380.1282388 dblp:conf/sigcomm/KaafarMBSTD07 fatcat:5prbgms35ncbdalaf5er5vohiq
« Previous Showing results 1 — 15 out of 53,287 results