Articles Tagged: Networks
Articles & Features
SECTION: Features
Filter bubbles and fake news
The results of the 2016 Brexit referendum in the U.K. and presidential election in the U.S. surprised pollsters and traditional media alike, and social media is now being blamed in part for creating echo chambers that encouraged the spread of fake news that influenced voters.
By Dominic DiFranzo, Kristine Gloria-Garcia, April 2017
Managing crises, one text at a time
Crisis Text Line CTO Jason Bennett shares his insight on the technology behind this helpline using text to reach people in need of counseling during times of crisis.
By Rahul R. Divekar, Nidhi Rastogi, April 2017
An interview with Mendel Rosenblum
The co-founder of VMware and Associate Professor of Computer Science at Stanford explains how an academic research project evolved into a commercial idea.
By Asaf Cidon, Tomer London, June 2012
Clouds at the crossroads
Despite its promise, most cloud computing innovations have been almost exclusively driven by a few industry leaders, such as Google, Amazon, Yahoo!, Microsoft, and IBM. The involvement of a wider research community, both in academia and industrial labs, has so far been patchy without a clear agenda. In our opinion, the limited participation stems from the prevalent view that clouds are mostly an engineering and business-oriented phenomenon based on stitching together existing technologies and tools.
By Ymir Vigfusson, Gregory Chockler, March 2010
Introduction
By Jerry Guo, August 2006
Introduction
By William Stevenson, October 2005
Introduction
By William Stevenson, August 2005
Learning from nature
By Anh Nguyen, Tadashi Nakano, Tatsuya Suda, August 2005
A distributed security scheme for ad hoc networks
In an ad hoc wireless network where wired infrastructures are not feasible, energy and bandwidth conservation are the two key elements presenting challenges to researchers. Limited bandwidth makes a network easily congested by the control signals of the routing protocol. Routing schemes developed for wired networks seldom consider restrictions of this type. Instead, they assume that the network is mostly stable and that the overhead for routing messages is negligible. Considering these differences between wired and wireless network, it is necessary to develop a wireless routing protocol that limits congestion in the network [1, 5, 8, 9, 10, 11].This paper proposes minor modifications to the existing Ad hoc On Demand Vector (AODV) routing protocol (RFC 3561) in order to restrict congestion in networks during a particular type of Denial of Service (DoS) attack. In addition to this, it incurs absolutely no additional overhead [4]. We describe the DoS attack caused due to Route Request (RREQ) flooding and its implications on existing AODV-driven Mobile Ad hoc Networks (MANET) [2, 14]. To combat this DoS attack, a proactive scheme [12] is proposed. We present an illustration to describe the implications of RREQ flooding on pure AODV and the modified AODV protocols. To quantify the effectiveness of the proposed scheme, we simulated a DoS [6] attack in a mobile environment and study the performance results.
By Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedhia, Nirali Mody, Sugata Sanyal, Ajith Abraham, September 2004
Zero configuration networking
By David Stirling, Firas Al-Ali, June 2003
Q2ADPZ* an open source, multi-platform system for distributed computing
By Zoran Constantinescu, Pavel Petrovic, December 2002
Mobile IP
By Debalina Ghosh, December 2000
Connector: the Internet protocol, part one
By Shvetima Gulati, July 2000
Networking: introduction
By Mark Allman, September 1995
The Fox Project
By Jeremy Buhler, September 1995