Filters








3,484 Hits in 4.2 sec

IETF Standardization in the Field of the Internet of Things (IoT): A Survey

Isam Ishaq, David Carels, Girum Teklemariam, Jeroen Hoebeke, Floris Abeele, Eli Poorter, Ingrid Moerman, Piet Demeester
2013 Journal of Sensor and Actuator Networks  
In this paper, we will briefly review the history of integrating constrained devices into the Internet, followed by an extensive overview of IETF standardization work in the 6LoWPAN, ROLL and CoRE working  ...  As such the aim of this paper is twofold: apart from giving readers solid insights in IETF standardization work on the Internet of Things, it also aims to encourage readers to further explore the world  ...  Acknowledgments The research leading to these results has received funding from the European Union's Seventh  ... 
doi:10.3390/jsan2020235 fatcat:l4upaxr4v5bsbgz6n7rld7lsdm

Specification and verification of network managers for large internets

D. L. Cohrs, B. P. Miller
1989 Computer communication review  
Network elements are grouped together in the specification of domains of administration.  ...  In its descriptive aspect, NMSL specifies abstractions of the network components and their instantiations, and verifies the consistency of such a specification.  ...  The Internet and OS1 network management systems are meant for use in large, distributed intemets, with no central administration.  ... 
doi:10.1145/75247.75251 fatcat:haizwfkv5vc67c3vmndwtgzhca

Specification and verification of network managers for large internets

D. L. Cohrs, B. P. Miller
1989 Symposium proceedings on Communications architectures & protocols - SIGCOMM '89  
Network elements are grouped together in the specification of domains of administration.  ...  In its descriptive aspect, NMSL specifies abstractions of the network components and their instantiations, and verifies the consistency of such a specification.  ...  The Internet and OS1 network management systems are meant for use in large, distributed intemets, with no central administration.  ... 
doi:10.1145/75246.75251 dblp:conf/sigcomm/CohrsM89 fatcat:o4wwk4kup5awjclpgukjsuu3pi

Towards Large-Scale Network Virtualization [chapter]

Panagiotis Papadimitriou, Ines Houidi, Wajdi Louati, Djamal Zeghlache, Christoph Werle, Roland Bless, Laurent Mathy
2012 Lecture Notes in Computer Science  
Most existing virtual network (VN) provisioning approaches assume a single administrative domain and therefore, VN deployments are limited to the geographic footprint of the substrate provider.  ...  To this end, we present a framework for large-scale VN provisioning.  ...  In the future, we plan to implement a simulator optimized for large scale and thereby, examine scalability issues with VN embedding onto multiple large infrastructures.  ... 
doi:10.1007/978-3-642-30630-3_2 fatcat:5z23vhpsa5bktkiojbh5gcr3zm

Service naming in large-scale and multi-domain networks

R. Ahmed, R. Boutaba, F. Cuervo, Y. Iraqi, Tianshu Li, N. Limam, Jin Xiao, J. Ziembicki
2005 IEEE Communications Surveys and Tutorials  
. 39 requirements of a large-scale multi-domain setting.  ...  Discovery and management of these systems require the ability to name the provided services.  ...  ACKNOWLEDGMENT This research is partially supported by Alcatel Canada, the Natural Sciences and Engineering Research Council of Canada (NSERC), and Communications and Information Technology Ontario (CITO  ... 
doi:10.1109/comst.2005.1610549 fatcat:2hpv4bahsjepvl6lgh2fhbswga

Robots as-a-Service in Cloud Computing: Search and Rescue in Large-scale Disasters Case Study [article]

Carla Mouradian, Sami Yangui, Roch H. Glitho
2017 arXiv   pre-print
This paper discusses a case study on search and rescue IoT applications in large-scale disaster scenarios.  ...  Enabling these applications in cloud environments requires the design of appropriate IoT Infrastructure-as-a-Service (IoT IaaS) to ease the provisioning of the IoT objects as cloud services.  ...  The first machine executes IaaS1 and NAT Server. The second executes IaaS2 and Presence Server. 3 appengine.google.com The third and the fourth respectively execute IaaS3 and IaaS4.  ... 
arXiv:1710.04919v4 fatcat:l5i2qmaivngmnav356i7frt7ty

Service provider DevOps for large scale modern network services

Juhoon Kim, Catalin Meirosu, Ioanna Papafili, Rebecca Steinert, Sachin Sharma, Fritz-Joachim Westphal, Mario Kind, Apoorv Shukla, Felician Nemeth, Antonio Manzalini
2015 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)  
Although the goals of DevOps in data centers are well-suited for the demands of agile service creation, additional requirements specific to the virtualized and software-defined network environment are  ...  In this paper, we thoroughly debate DevOps requirements for developing a modern service creation platform by taking EU FP7 project UNIFY as a reference architecture and suggest the corresponding extensions  ...  In this section, we summarize the current status of the discussion that we are driving in IETF on this topic, and make some additional considerations. A.  ... 
doi:10.1109/inm.2015.7140502 dblp:conf/im/KimMPSSWKSNM15 fatcat:kxdrl3x2gfg3vey5h26rk7yh64

The Large Immortal Machine and the Ticking Time Bomb

Susan Landau
2012 Social Science Research Network  
In 2000, in light of CALEA and other efforts to develop wiretapping standards, the IETF examined whether wiretapping requirements should be included in the design of IETF standards.  ...  That threat stayed largely in the background until the middle of the last decade.  ... 
doi:10.2139/ssrn.2028152 fatcat:mmajfarhevdmnpnobgpugc5lzu

Topology discovery for large ethernet networks

Bruce Lowekamp, David O'Hallaron, Thomas Gross
2001 Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '01  
We have implemented the new algorithm, and it has accurately determined the topology of several different networks using a variety of hardware and network configurations.  ...  Recent work has demonstrated that bridged Ethernet topology can be determined using standard SNMP MIBs; however, these algorithms require each bridge to learn about all other bridges in the network.  ...  ACKNOWLEDGEMENTS Special thanks to Nancy Miller, Mark Puskar, and the Remos team for their help in the development of the software, and to Andrej Bauer for providing comments on the formal proofs.  ... 
doi:10.1145/383059.383078 dblp:conf/sigcomm/LowekampOG01 fatcat:xat5ugyplvambdlajzjzhuuvkm

Topology discovery for large ethernet networks

Bruce Lowekamp, David O'Hallaron, Thomas Gross
2001 Computer communication review  
We have implemented the new algorithm, and it has accurately determined the topology of several different networks using a variety of hardware and network configurations.  ...  Recent work has demonstrated that bridged Ethernet topology can be determined using standard SNMP MIBs; however, these algorithms require each bridge to learn about all other bridges in the network.  ...  ACKNOWLEDGEMENTS Special thanks to Nancy Miller, Mark Puskar, and the Remos team for their help in the development of the software, and to Andrej Bauer for providing comments on the formal proofs.  ... 
doi:10.1145/964723.383078 fatcat:vlgdwyml4bambbhldxptapx7ey

An Intelligent Mobile-Agent Based Scalable Network Management Architecture for Large-Scale Enterprise System [article]

A.K. Sharma, Atul Mishra, Vijay Singh
2012 arXiv   pre-print
Thus, controlling and managing the traffic in these networks is a challenging task.  ...  in terms of their own framing and protocol structures.  ...  Moreover, agents support parallel execution (load balancing) of large computation which can be easily divided among various computational resources.  ... 
arXiv:1202.1941v1 fatcat:2ejuxzjxunejbnod7zzv23oram

No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large [article]

Wilfried Mayer, Aaron Zauner, Martin Schmiedecker, Markus Huber
2015 arXiv   pre-print
Lastly, we analyze the volatility of TLS certificates and trust anchors in the e-mail ecosystem and argue that while the overall trend points in the right direction, there are still many steps needed towards  ...  In this paper we are the first to present a scalable methodology to assess the state of security mechanisms in the e-mail ecosystem using commodity hardware and open-source software.  ...  Thanks to Viktor Dukhovni for valuable feedback and insights into OpenSSL specifics, MTA operational details and discussion on opportunistic e-mail encrytion in general.  ... 
arXiv:1510.08646v2 fatcat:pwqhszlhifeobboupn3nexcvle

SUBMARINE: an architecture for IP routing over large NBMA networks

A.G. Lauck, C.R. Kalmanek, K.K. Ramakrishnan
1999 IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320)  
This paper describes a robust and efficient solution to the problem of supporting IP over a large nonbroadcast multiple-access (NBMA) network, such as ATM.  ...  As communications networks grow in both speed and scale, there is a need to switch packets at higher speeds.  ...  Several solutions have been suggested both in the literature and in the engineering community (the IETF and ATM Forum in particular) for this problem of "routing over large clouds" [1] .  ... 
doi:10.1109/infcom.1999.749257 dblp:conf/infocom/LauckKR99 fatcat:fxi346cqbzhc5mfh63pdcw4ro4

Resource and service discovery in large-scale multi-domain networks

Reaz Ahmed, Noura Limam, Jin Xiao, Youssef Iraqi, Raouf Boutaba
2007 IEEE Communications Surveys and Tutorials  
Although a few survey papers have been published on this subject, our contribution focuses on comparing and analyzing key discovery approaches in the context of large-scale and multidomain networks.  ...  The comparison is conducted based on a set of well-defined criteria, leading to a selection of few approaches that can serve as the guide in designing a global service discovery system for large-scale  ...  In addition to supporting a large number of services/users participating over a large network, service globalization may require interoperation of diverse discovery systems based in independently-administrated  ... 
doi:10.1109/comst.2007.4444748 fatcat:shfbgcgy3bgnfem4iobvs4xdhy

Split Architecture for Large Scale Wide Area Networks [article]

Wolfgang John, Alisa Devlic, Zhemin Ding, David Jocha, Andras Kern, Mario Kind, Andreas Köpsel, Viktor Nordell, Sachin Sharma, Pontus Sköldström, Dimitri Staessens, Attila Takacs, Steffen Topp (+3 others)
2014 arXiv   pre-print
It presents the SplitArchitecture proposal, the SPARC concept for Software Defined Networking (SDN) introduced for large-scale wide area networks such as access/aggregation networks, and evaluates technical  ...  First we present the control and management architecture of the proposed SplitArchitecture.  ...  This example defines a split finite state machine, i.e. some parts of a state machine are executed in the data plane, while the remaining parts execute in the control plane.  ... 
arXiv:1402.2228v1 fatcat:yk55ysl3fvd3naembxsscve4oe
« Previous Showing results 1 — 15 out of 3,484 results