De-ossifying the internet transport layer: A survey and future perspectives

G Papastergiou, G Fairhurst, D Ros… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
It is widely recognized that the Internet transport layer has become ossified, where further
evolution has become hard or even impossible. This is a direct consequence of the …

Intra-and inter-domain multicast routing protocols: A survey and taxonomy

M Ramalho - IEEE Communications Surveys & Tutorials, 2000 - ieeexplore.ieee.org
A multicast routing protocol should be scalable, robust, use minimal network overhead,
consume minimal memory resources, inter-operate with other multicast routing protocols …

Deployment issues for the IP multicast service and architecture

C Diot, BN Levine, B Lyles, H Kassem… - IEEE …, 2000 - ieeexplore.ieee.org
IP multicast offers the scalable point-to-multipoint delivery necessary for using group
communication applications on the Internet. However, the IP multicast service has seen slow …

Multicasting in delay tolerant networks: semantic models and routing algorithms

W Zhao, M Ammar, E Zegura - Proceedings of the 2005 ACM SIGCOMM …, 2005 - dl.acm.org
Delay tolerant networks (DTNs) are a class of emerging networks that experience frequent
and long-duration partitions. These networks have a variety of applications in situations such …

Fast tag searching protocol for large-scale RFID systems

Y Zheng, M Li - IEEE/ACM Transactions On Networking, 2012 - ieeexplore.ieee.org
Fast searching a particular subset in a large number of products attached with radio
frequency identification (RFID) tags is of practical importance for a variety of applications, but …

SpringerBriefs in Computer Science

S Zdonik, P Ning, S Shekhar, J Katz, X Wu, LC Jain… - 2012 - Springer
This is an introduction to multicast routing, which is the study of methods for routing from one
source to many destinations, or from many sources to many destinations. Multicast is …

Hordes: a multicast based protocol for anonymity

BN Levine, C Shields - Journal of Computer Security, 2002 - content.iospress.com
With widespread acceptance of the Internet as a public medium for communication and
information retrieval, there has been rising concern that the personal privacy of users can be …

Responder anonymity and anonymous peer-to-peer file sharing

V Scarlata, BN Levine, C Shields - … International Conference on …, 2001 - ieeexplore.ieee.org
Data transfer over TCP/IP provides no privacy for network users. Previous research in
anonymity has focused on the provision of initiator anonymity. We explore methods of …

[BUCH][B] Internetworking with satellite constellations

L Wood - 2001 - search.proquest.com
The development and growth of the Internet during the past thirty years has led to demand
for and development of Internet services everywhere and over every possible …

Multicast traffic engineering for software-defined networks

LH Huang, HC Hsu, SH Shen… - IEEE INFOCOM 2016 …, 2016 - ieeexplore.ieee.org
Although Software-Defined Networking (SDN) enables flexible network resource allocations
for traffic engineering, current literature mostly focuses on unicast communications …