Academic literature on the topic 'Application layer protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Application layer protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Application layer protocol"

1

G. Hamid, Harth, and Zainab T. Alisa. "A survey on IoT application layer protocols." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (March 10, 2021): 1663. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1663-1672.

Full text
Abstract:
<span>The constant evolution in internet technology has made. The internet of things (IoT) to be the center of research fields in computer engineering. This review paper discusses the choice of an application layer protocol in an IoT system integration so first, the paper briefly defines the potential protocols. After that, it opens up a comparison between these protocols according to how they manage their overhead and messages which affects traffic management and thus starts the discussion. The main contribution of this work is the simplification of comparison between session layer protocols in the benefit of IoT applications exclusively. IoT system Standards and platforms are being improved constantly. IoT enables application devices to connect and coordinate their tacks, such applications like healthcare, smart home, and industrial automation. Several protocols have been discussed to provide effective communication for resource-limited devices. However, their traffic management is still a field for researches, to find the optimal protocol choice for different situations. The review collects the results of other works that experimentally compared application layer protocols in the IoT environment and presents the graphical and tabular compression. Finally, the conclusion summarize the choice in different applications.</span>
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Rajesh. "COMPUTER NETWORK -- APPLICATION LAYER PROTOCOL." International Journal of Advanced Research 4, no. 6 (June 30, 2016): 51–63. http://dx.doi.org/10.21474/ijar01/760.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hosseini, Mojtaba, and Nicolas D. Georganas. "End System Multicast Protocol for Collaborative Virtual Environments." Presence: Teleoperators and Virtual Environments 13, no. 3 (June 2004): 263–78. http://dx.doi.org/10.1162/1054746041422325.

Full text
Abstract:
IP Multicasting has been a crucial requirement of many scalable networked virtual environments by providing an efficient network mechanism through which a sender can transmit its information to a large number of receivers without having to send multiple copies of the same data over a physical link. The widespread deployment of IP Multicast has been slow due to some yet unresolved issues, prompting recent efforts in the development of multicasting protocols at the application layer instead of at the network layer. Most of these protocols address the case of a single source streaming media to a large number of receivers in applications such as video-on-demand or live broadcast. Collaborative and distributed virtual environments exhibit different characteristics that in turn necessitate a different set of requirements for application layer multicast protocols. This paper presents an introduction to application layer multicasting as it relates to distributed and collaborative virtual environments and the development of our own end system multicast protocol for multi-sender virtual teleconference applications.
APA, Harvard, Vancouver, ISO, and other styles
4

Xie, Bai Lin, and Sheng Yi Jiang. "Detecting Application-Layer Attacks Based on User's Application-Layer Behaviors." Applied Mechanics and Materials 411-414 (September 2013): 607–12. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.607.

Full text
Abstract:
This paper presents an application-layer attack detection method based on user’s application-layer behaviors. In this method, the keywords of an application-layer protocol and their inter-arrival times are used as the observations, a hidden semi-Markov model is used to describe the application-layer behaviors of a normal user who is using the application-layer protocol. This method is also based anomaly detection. In theory, application-layer anomaly detection can identify the known, unknown and novel attacks happened on application-layer. The experimental results show that this method can identify several application-layer attacks, and has high detection accuracy and low false positive ratio.
APA, Harvard, Vancouver, ISO, and other styles
5

Sangheon Pack, Kunwoo Park, Taekyoung Kwon, and Yanghee Choi. "SAMP: scalable application-layer mobility protocol." IEEE Communications Magazine 44, no. 6 (June 2006): 86–92. http://dx.doi.org/10.1109/mcom.2006.1668425.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

KITAGAWA, Takahisa, Miyuki HANAOKA, and Kenji KONO. "A State-Aware Protocol Fuzzer Based on Application-Layer Protocols." IEICE Transactions on Information and Systems E94-D, no. 5 (2011): 1008–17. http://dx.doi.org/10.1587/transinf.e94.d.1008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cai, Jun, Jian-Zhen Luo, and Fangyuan Lei. "Analyzing Network Protocols of Application Layer Using Hidden Semi-Markov Model." Mathematical Problems in Engineering 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/9161723.

Full text
Abstract:
With the rapid development of Internet, especially the mobile Internet, the new applications or network attacks emerge in a high rate in recent years. More and more traffic becomes unknown due to the lack of protocol specifications about the newly emerging applications. Automatic protocol reverse engineering is a promising solution for understanding this unknown traffic and recovering its protocol specification. One challenge of protocol reverse engineering is to determine the length of protocol keywords and message fields. Existing algorithms are designed to select the longest substrings as protocol keywords, which is an empirical way to decide the length of protocol keywords. In this paper, we propose a novel approach to determine the optimal length of protocol keywords and recover message formats of Internet protocols by maximizing the likelihood probability of message segmentation and keyword selection. A hidden semi-Markov model is presented to model the protocol message format. An affinity propagation mechanism based clustering technique is introduced to determine the message type. The proposed method is applied to identify network traffic and compare the results with existing algorithm.
APA, Harvard, Vancouver, ISO, and other styles
8

XIE, Bai-Lin, and Shun-Zheng YU. "Application Layer Real-time Proactive Defense System Based on Application Layer Protocol Analysis." Chinese Journal of Computers 34, no. 3 (May 19, 2011): 452–63. http://dx.doi.org/10.3724/sp.j.1016.2011.00452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ayyagari, A., and A. Ray. "A Fiber-Optic Network Protocol for Computer Integrated Manufacturing." Journal of Engineering for Industry 114, no. 3 (August 1, 1992): 345–51. http://dx.doi.org/10.1115/1.2899802.

Full text
Abstract:
This paper presents the architecture and performance analysis of a fiber-optic-based network protocol for computer integrated manufacturing (CIM). Its adaptation as the common medium access control (MAC) layer protocol in the fiber-optic-based version of the Manufacturing Automation Protocol (MAP) and Technical and Office Protocols (TOP) will make their specifications identical up to the presentation layer; only the application layer which is user specific could be different.
APA, Harvard, Vancouver, ISO, and other styles
10

Suherman, S., Naemah Mubarakah, and Marwan Al-Akaidi. "Minimizing Energy Consumption on Mobile Phone by Rearranging Transport Protocol Load." International Journal of Engineering & Technology 7, no. 3.2 (June 20, 2018): 713. http://dx.doi.org/10.14419/ijet.v7i3.2.15350.

Full text
Abstract:
There are two transport layer protocols that have been used in the internet protocol (IP) networks: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both protocols have been utilized for video streaming applications. This paper examines energy consumed by a mobile device when TCP or UDP employed by the application within it for streaming a video file. A transport protocol load management is proposed to reduce the mobile device energy consumptions. The experiments were conducted in the 802.11 environment. The results show that the proposed method is able to minimize mobile device energy consumptions up to 10.7% and 3.34% for both TCP and UDP protocols.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Application layer protocol"

1

Al, Osman Hussein. "Application Layer Protocol for Haptic Networking." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27663.

Full text
Abstract:
The transmission of haptic information over the network has recently received significant attention. The wide spectrum of haptic applications makes it difficult to capture the widely varying requirements of these applications into one generic protocol. In this paper, we introduce ALPHAN (Application Layer Protocol for Haptic Networking), a novel application layer protocol for haptic communication. The protocol is strategically placed at the application layer so that it can easily be customized according to the application requirements and needs. An extension to the HAptic Meta-Language (HAUL) is proposed to define its networking parameters. The protocol introduces the concept of Multiple Buffering where priorities are attributed to different sending buffers in a collaborative haptic environment. The protocol also supports some concepts introduced in previous haptic communication protocols like local lag and key packets.
APA, Harvard, Vancouver, ISO, and other styles
2

Thorp, Brian J. "Application Layer Multipoint Extension for the Session Initiation Protocol." Thesis, Virginia Tech, 2005. http://hdl.handle.net/10919/42245.

Full text
Abstract:
The Session Initiation Protocol (SIP) was first published in 1999, by the Internet Engineering Task Force (IETF), to be the standard for multimedia transfers. SIP is a peer-to-peer signaling protocol that is capable of initiating, modifying, and terminating media sessions. SIP utilizes existing Internet Protocols (IP) such as Domain Name Service (DNS) and the Session Description Protocol (SDP), allowing it to seamlessly integrate into existing IP networks. As SIP has matured and gained acceptance, its deficiencies when functioning as a multipoint communications protocol have become apparent. SIP currently supports two modes of operation referred to as conferencing and multicasting. Conferencing is the unicast transmission of session information between conference members. Multicasting uses IP multicast to distribute session information. This thesis proposes an extension for the Session Initiation Protocol that improves functionality for multipoint communications. When using conferencing, a SIP user-agent has limited information about the conference it is taking part in. This extension increases the awareness of a SIP node by providing it with complete conference membership information, the ability to detect neighboring node failures, and the ability to automatically repair conference partitions. Signaling for conferencing was defined and integrated into a standard SIP implementation where it was used to demonstrate the above capabilities. Using a prototype implementation, the additional functionality was shown to come at the cost of a modest increase in transaction message size and processing complexity. IP multicast has limited deployment in todayâ s networks reducing the usability of this useful feature. Since IP multicast support is not guaranteed, the use of application layer multicast protocols is proposed to replace the use of IP multicast. An efficient means of negotiating an application layer protocol is proposed as well as the ability to provide the protocol with session information to begin operation. A ring protocol was defined and implemented using the proposed extension. Performance testing revealed that the application layer protocol had slightly higher processing complexity than conferencing, but on average had a smaller transaction message size.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
3

Stone, Steven Walter. "A rapidly reconfigurable, application layer, virtual environment network protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA312937.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Agrawal, Ambuj. "Implementation of Application Layer Protocol for an Active RFID System." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/34961.

Full text
Abstract:
The emerging technology of active RFID tags has strong potential in the areas of real time health monitoring, sorting of cargo, and large scale inventory management because of their longer communication range and larger data storage capacity. The market of active RFID is growing very rapidly and therefore there has been an increase in the number of companies engaging in this field. But very often it is found that the products available in the market are not always suited to the application at hand. To overcome this problem, off the shelf active RFID products which were reconfigurable and followed a standard PHY and MAC layer protocol were used for this work. By reprogramming the application layer protocol of the RFID hardware, these devices were made suitable for the desired application. This also allowed the RFID tags to extend their functionality by interfacing extra modules with themselves. The work presented in this thesis describes the way in which the microcontroller on board the active RFID tags and readers can be programmed so that the functionality of the RFID hardware can be changed as per requirements. It also shows that extra modules can be added to the tag by successfully interfacing an accelerometer module with the tag.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
5

Diabi, Abdelfettah. "A hybrid application-layer multicasting protocol for distributed simulations on the Internet." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27213.

Full text
Abstract:
IP multicast is typically used to support message transmission among entities in collaborative virtual simulations running on Intranets, especially military training simulations. But, IP Multicast is mostly not available on the Internet because it is not deployable by ISP's due to undefined billing at the source and unlimited amount of overlay topologies for data transmission. Alternatively, researches have in recent years proposed the use of Application Layer Multicasting techniques (ALM) to alleviate this problem and to allow a somewhat scalable message passing among peers in a group of users on the Internet. As the number of users grows in the session, efficient handling of resources and scalable communication between users becomes critical due to network traffic and computation required to track all objects in the session. In this thesis, peer-to-peer communication architecture for distributed simulation is proposed. The architecture uses both proxies and end-systems to provide a number of communication services: (1) Best effort LAN multicast; (2) Timely-reliable LAN multicast; (3) Best effort peer to peer delivery on the Internet; (4) Timely-reliable peer to peer delivery on the Internet, and (5) Any combination of the above, including LAN to Internet translation and vice versa. The main achievement of this research could be summarized as the design, justification, and implementation of an architecture that, in comparison to others, has higher efficiency and guaranteed reliability for performing tightly synchronous collaborative tasks in Collaborative Virtual Environments (CVEs).
APA, Harvard, Vancouver, ISO, and other styles
6

Mehta, Anil. "MAC AND APPLICATION LAYER PROTOCOLS FOR HIGH PERFORMANCE NETWORKING." OpenSIUC, 2011. https://opensiuc.lib.siu.edu/dissertations/396.

Full text
Abstract:
High-performance networking (HPN) is of significance today in order to enable next-generation applications using wired and wireless networks. Some of the examples of HPN include low-latency industrial sensing, monitoring and automation using Wireless Sensor Networks (WSNs). HPN however requires protocol optimization at many layers of the open system interface (OSI) network model in order to meet the stringent performance constraints of the given applications. Furthermore, these protocols need to be impervious to denial of service (DoS) and distributed DoS (DDoS) attacks. Some of the key performance aspects of HPN are low point-to-point and end-to-end latency, high reliability of transmitted frames and performance predictability under various network load situations. This work focuses on two discrete issues in designing protocols for HPN applications. The first research issue looks at the Medium Access Control (MAC) layer of the OSI network model for designing of MAC protocols that provide low-latency and high reliability for point-to-point communication under a WSN. Existing standards in this area are governed by IEEE 802.15.4 specification which defines protocols for MAC and PHY layers for short-range, low bit-rate, and low-cost wireless networks. However, the IEEE 802.15.4 specification is inefficient in terms of latency and reliability performance and, as a result, is unable to meet the stringent operational requirements as defined by counterpart wired sensor networks. Work presented under current research issue describes new MAC protocols that are able to show low-latency transmission performance under strict timing constants for power limited WSNs. This enhancement of the MAC protocols is named extended GTS (XGTS) contained under extended CFP (ECFP) and is published under the IEEE's 802.15.4e standard. The second research issue focuses on the application layer of the OSI network model to design protocols that enhance the robustness of the text based protocols to various traffic inputs. The purpose of this is to increase the reliability of the given text based application layer protocol under a varied load. Session Initiation Protocol (SIP) is used as a case study and the work aims to build algorithms that ensure that SIP can continue to function under specific traffic conditions, which would otherwise deem the protocol useless due to DoS and DDoS attacks. Proposed algorithms investigate techniques that enhance the robustness of the SIP against parsing attacks without performing a deep parse of the protocol data unit (PDU). The desired effect of this is to reduce the time spent in parsing the SIP messages at a SIP router and as a result increase the number of SIP messages processed per unit time at a SIP router.
APA, Harvard, Vancouver, ISO, and other styles
7

Krontiris, Alexandros. "Evaluation of Certificate Enrollment over Application Layer Security." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-236033.

Full text
Abstract:
This thesis analyzes Application Layer security protocols for certificate enrollment and management. EDHOC, Ephemeral Diffie-HellmanOver COSE, is a recently developed key exchange protocol whichis designed to provide authentication and key-exchange functionality with compact message sizes and minimum round-trip-time. The workof this thesis extends the EDHOC protocol with a certificate enrollment functionality, targeting IoT constrained devices and it has been implemented for analysis and evaluation purposes. The main scope of this document is to study the security, performance and scalability (in descendingorder of importance) of enrollment over EDHOC compared to other certificate enrollment protocols.
Detta examensarbete analyserar säkerhetsprotokoll av typen ApplicationLayer för certifikatregistrering och hantering. EDHOC, Ephemeral Diffie-Hellman Over COSE, har implementerats, analyserats och utvärderats. EDHOC är ett nyligen utvecklat Application Layer-protokoll som är utformat för att tillhandahålla autentiserings- och nyckelfunktionsfunktioner med kompakta meddelandestorlekar och minimala rundturstider, inriktat på IoT-begränsade enheter. Huvudområdet för examensarbetet är att studera säkerhet, prestanda och skalbarhet (i fallande ordning av betydelse) hos EDHOC jämfört med andra föreslagna Application Layer-säkerhetsprotokoll som utför certifikatsskrivning.
APA, Harvard, Vancouver, ISO, and other styles
8

Cousin, Bernard. "Methodologie de validation des systemes structures en couches par reseaux de petri : application au protocole transport." Paris 6, 1987. http://www.theses.fr/1987PA066322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Журавльов, Павло Володимирович. "Сервіс автоматизованого перенесення існуючих рішень для Інтернету речей на Thingspeak." Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/26947.

Full text
Abstract:
Загальний обсяг роботи: 76 сторінок, 19 ілюстрацій, 17 таблиць, перелік посилань із X найменувань. Актуальність теми. Область використання платформи Thingspeak обмежена необхідністю використання протоколу HTTP для взаємодії з клієнтськими пристроями. В останні роки набувають все більшої популярності альтернативні протоколи, спроектовані для інтернету речей і пристрої на їх базі, чим обумовлена необхідність розширення платформи Thingspeak для додавання підтримки даних протоколів і пристроїв. Мета та задачі дослідження Аналіз підходів до розширення області використання платформи Thingspeak з подальшим забезпеченням можливості використання існуючих рішень, які взаємодіють, використовуючи протокол який не підтримуються розглянутою платформою. Головним завданням є дослідження, що полягає у проектуванні проміжного додатку для забезпечення взаємодії пристроїв, які використовують протокол MQTT з платформою Thingspeak. Вирішення поставлених завдань та досягнуті результати В результаті виконання роботи була реалізована система, що здійснює трансляцію протоколів MQTT та HTTP з проміжною конвертацією даних у формат, що відповідає моделі даних платформи Thingspeak. Дана реалізація також включає можливість встановлення правил, за якими відбувається конвертація. Для керування параметрами конвертації даних було розроблено веб-додаток з графічним інтерфейсом адміністратора. Система проста у розгортанні та може бути використана як доповнення до розгорнутої платформи Thingspeak. Об’єкт дослідження. Інтернет речей. Предмет дослідження. Мережева взаємодія між додатками Інтернету речей. Підходи до створення додатків, які виконують функцію трансляції протоколів прикладного рівня. Методи дослідження. Для вирішення проблеми в даній роботі використовуються методи аналізу, синтезу, системного аналізу, порівняння та логічного узагальнення результатів. Наукова новизна. Наукова новизна роботи полягає у аналізі та реалізації методів, що дозволяють конвертувати не підтримуваний системою Thingspeak протокол MQTT у HTTP. Практичне значення одержаних результатів. Розроблений додаток може бути розгорнутий на кафедральній інфраструктурі. Він включає в собі зручний користувацький інтерфейс для встановлення конфігурацій та може бути використаний для інтеграції існуючих додатків з підтримкую протоколу MQTT та кафедральної платформи Thingspeak.
The thesis contains 76 pages, 19 figures, 19 tables, 25 references. Relevance. The scope of the Thingspeak platform is limited by the need to use the HTTP protocol to interact with client devices. In recent years, alternative protocols have been developed for the Internet of things and devices on their base are becoming increasingly popular, due to the need to expand the Thingspeak platform to add support for these protocols and devices. Purpose. An analysis of approaches to extending the use of the Thingspeak platform, further enabling the use of existing solutions that implement the protocol but are not supported by the platform under consideration. The main task is to study the design of an intermediate application to interoperate devices that use the MQTT protocol with the Thingspeak platform. Results. As a result of the work, a system that transmits MQTT and HTTP protocols with an intermediate data conversion into a format that matches the Thingspeak data model was implemented. This implementation also includes the ability to set the rules for which the conversion is carried out. To manage the data conversion parameters, a web application with a graphical user interface was developed. The system is easy to deploy and can be used as a complement to existing technology with Thingspeak platform. Object of research. Internet of Things. Subject of research. Networking between Internet applications of things. Approaches to creating applications that perform the function of translating application level protocols. Research methods. In order to solve the problem in this work, methods of analysis, synthesis, system analysis, comparison and logical generalization of the results are used. Scientific novelty. The scientific novelty of the work consists in the analysis and implementation of methods that allow the conversion of the Thingspeak-compliant MQTT protocol to HTTP. Practical value. The developed application can be deployed on the existing university infrastructure. It includes a convenient interface for describing configurations and can be used to integrate existing applications supporting the MQTT protocol and the Thingspeak platform.
Общий объем работы 76 страниц, 19 иллюстраций, 19 таблицы, список литературы из 25 наименований. Актуальность темы. Область применения платформы Thingspeak ограничена необходимостью использования протокола HTTP для взаимодействия с клиентскими устройствами. В последние годы приобретают все большую популярность альтернативные протоколы, разработанные для интернета вещей и устройства на их базе, чем обусловлена необходимость расширения платформы Thingspeak для добавления поддержки данных протоколов и устройств. Цель и задачи исследования. Анализ подходов к расширению области использования платформы Thingspeak с последующим обеспечением возможности использования существующих решений, реализующих протокол, но не поддерживаются рассматриваемой платформой. Главной задачей является исследование, заключающееся в проектировании промежуточного приложения для обеспечения взаимодействия устройств, использующих протокол MQTT с платформой Thingspeak. Решение поставленных задач и достигнутые результатах В результате выполнения работы была реализована система, осуществляющая трансляцию протоколов MQTT и HTTP с промежуточной конвертацией данных в формат, соответствующий модели данных платформы Thingspeak. Данная реализация также включает возможность установки правил, по которым происходит конвертация. Для управления параметрами конвертации данных был разработан веб-приложение с графическим интерфейсом администратора. Система проста в развертывании и может быть использована как дополнение к развернутой платформе Thingspeak. Объект исследования. Интернет вещей. Предмет исследования. Сетевое взаимодействие между приложениями Интернета вещей. Подходы к созданию приложений, которые выполняют функцию трансляции протоколов прикладного уровня. Методи исследования. Для решения проблемы в данной работе используются методы анализа, синтеза, системного анализа, сравнения и логического обобщения результатов. Научная новизна. Научная новизна работы заключается в анализе и реализации методов, позволяющих конвертировать неподдерживаемый системой Thingspeak протокол MQTT в HTTP. Практическое значение полученных результатов Разработанное приложение может быть развернуто на кафедральной инфраструктуре. Оно включает в себя удобный интерфейс для описания конфигураций и может быть использован для интеграции существующих приложений с поддержкой протокола MQTT и кафедральной платформы Thingspeak.
APA, Harvard, Vancouver, ISO, and other styles
10

Bian, Song. "Realizing Homomorphic Secure Protocols through Cross-Layer Design Techniques." Kyoto University, 2019. http://hdl.handle.net/2433/242926.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Application layer protocol"

1

Florio, Vincenzo De. Application-layer fault-tolerance protocols. Hershey PA: Information Science Reference, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

IFIP TC6/WG6.5 International Conference on Upper Layer Protocols, Architectures, and Applications (1994 Barcelona, Spain). Upper layer protocols, architectures, and applications: Proceedings of the IFIP TC6/WG6.5 International Conference on Upper Layer Protocols, Architectures, and Applications, Barcelona, Spain, 1-3 June, 1994. Amsterdam: Elsevier, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

IFIP TC6/WG6.5 International Conference on Upper Layer Protocols, Architectures, and Applications (1992 Vancouver, B.C.). Upper layer protocols, architectures, and applications: Proceedings of the IFIP TC6/WG6.5 International Conference on Upper Layer Protocols, Architectures, and Applications, Vancouver, B.C., Canada, 27-29 May, 1992. Amsterdam: North-Holland, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

IFIP WG6.5 International Symposium on Message Handling Systems and Application Layer Communication Protocols (1990 Zurich, Switzerland). Message handling systems and application layer communication protocols: Proceedings of the IFIP WG6.5 International Symposium on Message Handling Systems and Application Layer Communication Protocols, Zurich, Switzerland, 3-5 October 1990. Amsterdam: North-Holland, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jones, Tim M. TCP/IP Application Layer Protocol for Embedded Systems. Laxmi Publications, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

A Rapidly Reconfigurable, Application Layer, Virtual Environment Network Protocol. Storming Media, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

TCP/IP Application Layer Protocols for Embedded Systems (With CD-ROM) (Networking Series). Charles River Media, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Neufeld, Gerald. Upper Layer Protocols, Architectures and Applications: Proceedings of the Ifip Tc6.5 International Conference on Upper Layer Protocols, Architecture (IFIP Transactions C: Communication Systems). North-Holland, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schicker, P. Message Handling Systems and Application Layer Communication Protocols: Proceedings of the Ifip Wg6.5 International, Symposium on Message Handling S. North-Holland, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

William H, Boothby. 13 Nuclear Weapons. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198728504.003.0013.

Full text
Abstract:
This chapter analyses how the law of armed conflict applies to the possession and use of nuclear weapons, noting that no law of armed conflict treaty has been adopted which either prohibits or restricts the development, stockpiling, transfer, possession, or use of such weapons, or threats to use nuclear weapons. Equally, there is no law of armed conflict treaty in existence that contains any other kind of provision with particular reference to such weapons. The chapter points out that certain states ratified Additional Protocol 1 on the explicit basis that the new rules introduced by the treaty have no application to nuclear weapons. In a later section the chapter considers the 1996 International Court of Justice Advisory Opinion of 8 July 1996, noting the criticism that has been made of the non liquet terms in which the judgment was expressed. In a short concluding section, the prospects for nuclear disarmament are briefly assessed.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Application layer protocol"

1

Xiaoju, Liao, Yin Mingyong, and Lu Hai. "Application Layer Protocol Identification Algorithm Design." In Lecture Notes in Electrical Engineering, 307–11. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27311-7_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Wei. "A multimedia application adaptation layer (MAAL) protocol." In Lecture Notes in Computer Science, 115–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58494-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lucena, Norka B., James Pease, Payman Yadollahpour, and Steve J. Chapin. "Syntax and Semantics-Preserving Application-Layer Protocol Steganography." In Information Hiding, 164–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30114-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gecse, Roland. "Conformance testing methodology of Internet protocols Internet application-layer protocol testing — the Hypertext Transfer Protocol." In Testing of Communicating Systems, 35–48. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35381-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Düssel, Patrick, Christian Gehl, Pavel Laskov, and Konrad Rieck. "Incorporation of Application Layer Protocol Syntax into Anomaly Detection." In Information Systems Security, 188–202. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89862-7_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cheng, Peng, Qiong-Hai Dai, and Qiu-Feng Wu. "A Neural Network Based Application Layer Multicast Routing Protocol." In Advances in Neural Networks - ISNN 2006, 156–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11760191_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hübsch, Christian, Christoph P. Mayer, and Oliver P. Waldhorst. "On Runtime Adaptation of Application-Layer Multicast Protocol Parameters." In Lecture Notes in Computer Science, 226–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13971-0_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Houimli, Manel, Laid Kahloul, and Siham Benaoune. "Performance Analysis of Internet of Things Application Layer Protocol." In Advances in Intelligent Systems and Computing, 225–34. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91337-7_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sairam, K. V. S. S. S. S., and Chandra Singh. "Link Layer Traffic Connectivity Protocol Application and Mechanism in Optical Layer Survivability Approach." In International Conference on Computer Networks and Communication Technologies, 479–90. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8681-6_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Jing, Naijie Gu, and Weijia Jia. "An Efficient Fibonacci Series Based Hierarchical Application-Layer Multicast Protocol." In Lecture Notes in Computer Science, 131–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11943952_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Application layer protocol"

1

Li, Kunhao, Bo Lang, Hongyu Liu, and Shaojie Chen. "SSL/TLS Encrypted Traffic Application Layer Protocol and Service Classification." In 11th International Conference on Embedded Systems and Applications (EMSA 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120621.

Full text
Abstract:
Network traffic protocols and service classification are the foundations of network quality of service (QoS) and security technologies, which have attracted increasing attention in recent years. At present, encryption technologies, such as SSL/TLS, are widely used in network transmission, so traditional traffic classification technologies cannot analyze encrypted packet payload. This paper first proposes a two-level application layer protocol classification model that combines packets and sessions information to address this problem. The first level extracts packet features, such as entropy and randomness of ciphertext, and then classifies the protocol. The second level regards the session as a unit and determines the final classification results by voting on the results of the first level. Many application layer protocols only correspond to one specific service, but HTTPS is used for many services. For the HTTPS service classification problem, we combine session features and packet features and establish a service identification model based on CNN-LSTM. We construct a dataset in a laboratory environment. The experimental results show that the proposed method achieves 99.679% and 96.27% accuracy in SSL/TLS application layer protocol classification and HTTPS service classification, respectively. Thus, the service classification model performs better than other existing methods.
APA, Harvard, Vancouver, ISO, and other styles
2

Ma, Yujie, Lei Wang, Jingwu Cui, and Baoyu Zheng. "Design of P2P Application Layer Protocol." In 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN). IEEE, 2016. http://dx.doi.org/10.1109/msn.2016.036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kitamura, Tsutomu, Takayuki Shizuno, Toshiya Okabe, and Hideaki Tani. "A Lightweight Application-Layer Signaling Protocol." In 2009 First Asian Conference on Intelligent Information and Database Systems, ACIIDS. IEEE, 2009. http://dx.doi.org/10.1109/aciids.2009.47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Osman, Hussein Al, Mohamad Eid, Rosa Iglesias, and Abdulmotaleb El Saddik. "ALPHAN: Application Layer Protocol for HAptic Networking." In 2007 IEEE International Workshop on Haptic, Audio and Visual Environments and Games. IEEE, 2007. http://dx.doi.org/10.1109/have.2007.4371595.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Besharati, Reza, Mozafar Bag-Mohammadi, and Mashallah Abbassi Dezfouli. "A Topology-Aware Application Layer Multicast Protocol." In 2010 7th IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 2010. http://dx.doi.org/10.1109/ccnc.2010.5421721.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stangaciu, Valentin, Madalina Stanciu, Loredana Lupu, Mihai V. Micea, and Vladimir Cretu. "Application layer protocol for IoT using wireless sensor networks communication protocols." In 2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 2017. http://dx.doi.org/10.1109/icumt.2017.8255160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kitagawa, Takahisa, Miyuki Hanaoka, and Kenji Kono. "AspFuzz: A state-aware protocol fuzzer based on application-layer protocols." In 2010 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2010. http://dx.doi.org/10.1109/iscc.2010.5546704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

ÖZDOĞAN, Erdal, and O. Ayhan ERDEM. "Hybrid Application Layer Protocol Design for IoT Environments." In 6th International Conference on Computer Science, Engineering and Information Technology. Aircc Publishing Corporation, 2019. http://dx.doi.org/10.5121/csit.2019.91322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tang, Hong, Milena Janic, and Xiaoming Zhou. "Hopcount in the NICE Application Layer Multicast Protocol." In Multiconference on "Computational Engineering in Systems Applications. IEEE, 2006. http://dx.doi.org/10.1109/cesa.2006.4281797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vestenicky, Martin, Slavomir Matuska, and Robert Hudec. "Application Layer Protocol for the PREDICON Weather Station." In 2018 New Trends in Signal Processing (NTSP). IEEE, 2018. http://dx.doi.org/10.23919/ntsp.2018.8524099.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Application layer protocol"

1

Kiesel, S., S. Previdi, W. Roome, S. Shalunov, and R. Woundy. Application-Layer Traffic Optimization (ALTO) Protocol. Edited by R. Alimi, R. Penno, and Y. Yang. RFC Editor, September 2014. http://dx.doi.org/10.17487/rfc7285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Friedl, S., A. Popov, A. Langley, and E. Stephan. Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension. RFC Editor, July 2014. http://dx.doi.org/10.17487/rfc7301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Thomson, M. Application-Layer Protocol Negotiation (ALPN) for WebRTC. RFC Editor, January 2021. http://dx.doi.org/10.17487/rfc8833.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shoemaker, R. B. Automated Certificate Management Environment (ACME) TLS Application‑Layer Protocol Negotiation (ALPN) Challenge Extension. RFC Editor, February 2020. http://dx.doi.org/10.17487/rfc8737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Patil, P., T. Reddy, G. Salgueiro, and M. Petit-Huguenin. Application-Layer Protocol Negotiation (ALPN) Labels for Session Traversal Utilities for NAT (STUN) Usages. RFC Editor, January 2015. http://dx.doi.org/10.17487/rfc7443.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lai, Yen-Chun. A Research on the Application Layer Protocols of Wireless Communication of Electric Vehicle. Warrendale, PA: SAE International, October 2013. http://dx.doi.org/10.4271/2013-32-9035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Allende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.

Full text
Abstract:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH, will be no longer secure. Quantum computers will be able to break them within a short period of time. Similarly, Grover's algorithm concedes a quadratic advantage for mining blocks in certain consensus protocols such as proof of work. Today, there are hundreds of billions of dollars denominated in cryptocurrencies that rely on blockchain ledgers as well as the thousands of blockchain-based applications storing value in blockchain networks. Cryptocurrencies and blockchain-based applications require solutions that guarantee quantum resistance in order to preserve the integrity of data and assets in their public and immutable ledgers. We have designed and developed a layer-two solution to secure the exchange of information between blockchain nodes over the internet and introduced a second signature in transactions using post-quantum keys. Our versatile solution can be applied to any blockchain network. In our implementation, quantum entropy was provided via the IronBridge Platform from CQC and we used LACChain Besu as the blockchain network.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography