35 research outputs found

    Report from the IAB Workshop on Environmental Impact of Internet Applications and Systems, 2022

    Get PDF
    Internet communications and applications have both environmental costs and benefits. The IAB ran an online workshop in December 2022 to explore and understand these impacts. The role of the workshop was to discuss the impacts and the evolving industry needs, and to identify areas for improvements and future work. A key goal of the workshop was to call further attention to the topic and bring together a diverse stakeholder community to discuss these issues. Note that this document is a report on the proceedings of the workshop. The views and positions documented in this report are those of the workshop participants and do not necessarily reflect IAB views and positions

    09102 Abstracts Collection -- Perspectives Workshop: Naming and Addressing in a Future Internet

    Get PDF
    From 01.03. to 04.03.2009, the Perspectives Workshop 09102 ``Perspectives Workshop: Naming and Addressing in a Future Internet \u27\u27 was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available

    Mobile IP version 6 (MIPv6) route optimization security design

    No full text
    Abstract- Mobile IPv6 (MIPv6) allows a Mobile Node to talk directly to its peers while retaining the ability to move around and change the currently used IP address. This mode of operation is called Route Optimization (RO), as it allows the packets to traverse a shorter route than the default one through the Home Agent. In Route Optimization, the peer node learns a binding between the Mobile Node’s permanent Home Address and its current temporary Care-of-Address. Once such a binding is in place, the peer node will send all packets whose destination is the Home Address to the Care-of-Address. This is potentially dangerous, since a malicious host might be able to establish false bindings, thereby preventing some packets from reaching their intended destination, diverting some traffic to the attacker, or flooding third parties with unwanted traffic. In this paper we discuss the design rationale behind the MIPv6 Route Optimization Security Design. * I

    Tik-76.168 Tietamystekniikan erikoistyo: ROCC, Robust Compiler Compiler

    No full text
    Contents 1 Scope of the work 3 2 Parsers and parser generators 4 2.1 The LR parsing algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 3 Methods for error correction 7 3.1 No recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 3.2 Hand-coded error recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 3.3 Panic mode recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.4 Corrective methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.4.1 Graham-Hayley-Joy method . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.4.2 Burke-Fischer method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.4.3 Global correction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 4 Methods used in ROCC 12 4.1 Error correction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

    Security of Internet location management

    No full text
    Abstract I
    corecore