Hardware
A Comparative Study on Anonymizing Networks: TOR, I2P, and Riffle Networks Comparison

M. Hosseini Shirvani; A. Akbarifar

Volume 10, Issue 2 , July 2022, , Pages 259-272

https://doi.org/10.22061/jecei.2021.8027.466

Abstract
  Background and Objectives: Among miscellaneous networks, onion-based routing network technologies such as The Onion-based Routing (ToR), Invisible Internet Project (I2P), and Riffle networks are used to communicate anonymously by different worldwide users for security, privacy, and safety requirements. ...  Read More

Hardware
Fault Tolerance of RTMP Protocol for Live Video Streaming Applications in Hybrid Software-Defined Networks

A. Oloomi; H. Khanmirza

Volume 7, Issue 2 , July 2019, , Pages 241-250

https://doi.org/10.22061/jecei.2020.6416.314

Abstract
  Background and Objectives: Nowadays, video hosting services receive and stream videos using standard protocols like Real-Time Messaging Protocol (RTMP). During the streaming process, video file streams are usually divided into small multi-second parts, and the player receives these parts instead of the ...  Read More