IPv4

Results: 1352



#Item
51Trace2Flow  Karol Adamski, Maciej Korczyński, Lucjan Janowski, Krzysztof Rusek 3rd NMRG Workshop on Netflow/IPFIX Usage in Network Management July 30, 2010, Maastricht

Trace2Flow Karol Adamski, Maciej Korczyński, Lucjan Janowski, Krzysztof Rusek 3rd NMRG Workshop on Netflow/IPFIX Usage in Network Management July 30, 2010, Maastricht

Add to Reading List

Source URL: mkorczynski.com

Language: English - Date: 2015-02-15 17:10:41
52Characterizing IPv4 Anycast Adoption and Deployment Danilo Cicalese Jordan Augé

Characterizing IPv4 Anycast Adoption and Deployment Danilo Cicalese Jordan Augé

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-12-02 16:52:34
53WIDE Technical-Report inRFC1918 Usage based on DNS queries to an AS112 server wide-tr-kato-as112-rep-01.pdf

WIDE Technical-Report inRFC1918 Usage based on DNS queries to an AS112 server wide-tr-kato-as112-rep-01.pdf

Add to Reading List

Source URL: member.wide.ad.jp

Language: English - Date: 2010-11-25 21:46:22
54Using Path MTU Discovery (PMTUD) for a higher DNS responsiveness Willem Toorop   NLnet

Using Path MTU Discovery (PMTUD) for a higher DNS responsiveness Willem Toorop NLnet

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2013-05-31 10:00:18
55Review Exercises Chapter 4 1. What are terminal mobility, user mobility, and service mobility? 2. What are the advantages of using Network Access Identifier (NAI) instead of using IP address? 3. Describe the differences

Review Exercises Chapter 4 1. What are terminal mobility, user mobility, and service mobility? 2. What are the advantages of using Network Access Identifier (NAI) instead of using IP address? 3. Describe the differences

Add to Reading List

Source URL: people.cs.nctu.edu.tw

Language: English
56Applied IPv6 Security VersionNov 2002 Dominik Schnitzer1  This article gives a short introduction to the IPv6 protocol, used for the next

Applied IPv6 Security VersionNov 2002 Dominik Schnitzer1 This article gives a short introduction to the IPv6 protocol, used for the next

Add to Reading List

Source URL: www.schnitzer.at

Language: English - Date: 2009-08-25 09:16:23
57Wi-Fi Internet connectivity and privacy: hiding your tracks on the wireless Internet Carlos J. Bernardos∗, Juan Carlos Z´un´ iga†, Piers O’Hanlon‡ ∗  Universidad Carlos III de Madrid. E-mail:

Wi-Fi Internet connectivity and privacy: hiding your tracks on the wireless Internet Carlos J. Bernardos∗, Juan Carlos Z´un´ iga†, Piers O’Hanlon‡ ∗ Universidad Carlos III de Madrid. E-mail:

Add to Reading List

Source URL: www.it.uc3m.es

Language: English - Date: 2015-09-03 12:41:39
58Global Policy Proposal for the Allocation of IPv4 Blocks to Regional Internet Registries

Global Policy Proposal for the Allocation of IPv4 Blocks to Regional Internet Registries

Add to Reading List

Source URL: archive.icann.org

Language: Arabic - Date: 2012-02-25 22:34:40
    59Rbridges: Transparent Routing  Radia Perlman Sun Microsystems Laboratories  Abstract— This paper describes a method of interconnecting

    Rbridges: Transparent Routing Radia Perlman Sun Microsystems Laboratories Abstract— This paper describes a method of interconnecting

    Add to Reading List

    Source URL: www.postel.org

    Language: English - Date: 2004-08-30 19:33:05
    60Embargo: 31st Jan 2011 following RIPE/IANA press release on IPv4 exhaustion. London, UK, 31st January 2011: The old Internet is running out! FireBrick to the rescue helping ISPs rise to the challenge of IPv6 FireBrick, a

    Embargo: 31st Jan 2011 following RIPE/IANA press release on IPv4 exhaustion. London, UK, 31st January 2011: The old Internet is running out! FireBrick to the rescue helping ISPs rise to the challenge of IPv6 FireBrick, a

    Add to Reading List

    Source URL: www.firebrick.co.uk

    Language: English - Date: 2011-01-30 11:31:27