Academic literature on the topic 'Computer network protocols – Testing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer network protocols – Testing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer network protocols – Testing"
Che, Xiaoping, and Stephane Maag. "Passive performance testing of network protocols." Computer Communications 51 (September 2014): 36–47. http://dx.doi.org/10.1016/j.comcom.2014.06.001.
Full textSidhu, D. P., and C. S. Chang. "Probabilistic testing of protocols." ACM SIGCOMM Computer Communication Review 19, no. 4 (August 1989): 295–302. http://dx.doi.org/10.1145/75247.75275.
Full textYang, Xiao Jing, and Sheng Li Chen. "Study on a Wireless Temperature and Humidity Monitoring System for Workshop with Constant Temperature Based on SCM." Applied Mechanics and Materials 701-702 (December 2014): 593–97. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.593.
Full textJedermann, Reiner, Markus Becker, Carmelita Gorg, and Walter Lang. "Testing network protocols and signal attenuation in packed food transports." International Journal of Sensor Networks 9, no. 3/4 (2011): 170. http://dx.doi.org/10.1504/ijsnet.2011.040238.
Full textOlenev, Valentin, Irina Lavrovskaya, Yuriy Sheynin, Ilya Korobkov, Elena Suvorova, Elena Podgornova, Dmitry Dymov, and Sergey Kochura. "STP-ISS Transport Protocol for SpaceWire On-Board Networks." International Journal of Embedded and Real-Time Communication Systems 5, no. 4 (October 2014): 45–76. http://dx.doi.org/10.4018/ijertcs.2014100103.
Full textRiska, Riska, and Hendri Alamsyah. "Analisis Perbandingan Protokol Transport Pada Video Streaming di Jaringan Lokal (LAN) Menggunakan Videolan Client." JURNAL MEDIA INFORMATIKA BUDIDARMA 3, no. 2 (April 14, 2019): 126. http://dx.doi.org/10.30865/mib.v3i2.1110.
Full textWarman, Indra, and Alex Franozal. "QoS Analysis on OSPFv3 And RIPng Using GRE Tunneling on IPv6 Integrated Ipv4 Network." MATEC Web of Conferences 215 (2018): 01005. http://dx.doi.org/10.1051/matecconf/201821501005.
Full textZhang, Yujun. "Transport Mechanism Applied to Computer Network Protocol Conformance Testing." Journal of Computer Research and Development 42, no. 1 (2005): 102. http://dx.doi.org/10.1360/crad20050114.
Full textMohd Fuzi, Mohd Faris, Khairunnisa Abdullah, Iman Hazwam Abd Halim, and Rafiza Ruslan. "Network Automation using Ansible for EIGRP Network." Journal of Computing Research and Innovation 6, no. 4 (September 20, 2021): 59–69. http://dx.doi.org/10.24191/jcrinn.v6i4.237.
Full textWang, Qun, Zhonghao Sun, Zhangquan Wang, Shiping Ye, Ziyi Su, Hao Chen, and Chao Hu. "A Practical Format and Semantic Reverse Analysis Approach for Industrial Control Protocols." Security and Communication Networks 2021 (March 12, 2021): 1–11. http://dx.doi.org/10.1155/2021/6690988.
Full textDissertations / Theses on the topic "Computer network protocols – Testing"
Kou, Tian. "Conformance testing of OSI protocols : the class O transport protocol as an example." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26427.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Dany, Hendra. "Application of the ferry clip approach to multi-party and interoperability testing." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28971.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Lo, Jeffrey Kin Hung. "Open systems interconnection passive monitor OSI-PM." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29418.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Ko, Kai-Chung. "Protocol test sequence generation and analysis using AI techniques." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29192.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Wvong, Russil. "A new methodology for OSI conformance testing based on trace analysis." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29343.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Sala, Dolors. "Design and evaluation of MAC protocols for hybrid fiber/coaxial systems." Diss., Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/13268.
Full textWibling, Oskar. "Creating Correct Network Protocols." Doctoral thesis, Uppsala universitet, Avdelningen för datorteknik, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-9361.
Full textFoulkes, Philip James. "An investigation into the control of audio streaming across networks having diverse quality of service mechanisms." Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1004865.
Full textMirza, Aamir Mehmood, and Mohtashim Khan. "Ethernet Network Functionality Testing." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-3720.
Full textEthernet functionality testing as a generic term used for checking connectivity,throughput and capability to transfer packets over the network. Especially in the packet-switchenvironment, Ethernet testing has become an essential part for deploying a reliable network.Over a long distance Ethernet testing parameter for analyzing network performance must havetwo devices attached and synchronized.
Saab Microwave Systems is among the leading suppliers of radar systems developing groundbased,naval and air-borne radar systems. To ensure the correct functionality, the developerwants to verify the performance of computer network and looking for a suitable solution.
A software application is required to verify and test the functionality of the Ethernet network andto verify the functionality and performance of the TCP/IP stack of newly added node. Theprograms shall be easily ported to different operating systems and must not depend on specificproduct properties.A software application, “NetBurst”, is developed for Ethernet functionality testing. Theapplication is vendor and platform independent.
Shu, Guoqiang. "Formal Methods and Tools for Testing Communication Protocol System Security." The Ohio State University, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=osu1211333211.
Full textBooks on the topic "Computer network protocols – Testing"
Tarnay, Katie. Protocol specification and testing. New York: Plenum Press, 1991.
Find full textDiwakar, T. N. Implementation of hierarchical conformance testing platform for LAPB. Bangalore: Dept. of Electrical Communication Engineering, Indian Institute of Science, 1996.
Find full textIFIP, WG 6. 1. International Workshop on Protocol Specification Testing and Verification (4th 1984 Skytop Lodge Pa ). Protocol specification, testing, and verification, IV: Proceedings of the IFIP WG 6.1 International Workshop on Protocol Specification, Testing, and Verification. Amsterdam: North-Holland, 1985.
Find full textIFIP WG 6.1 International Workshop on Protocol Specification, Testing, and Verification (5th 1985 Toulouse, France and Moissac, Tarn-et-Garonne, France). Protocol specification, testing, and verification, V: Proceedings of the IFIP WG 6.1 Fifth International Workshop on Protocol Specification, Testing, and Verification. Amsterdam: North-Holland, 1986.
Find full textIFIP WG 6.1 International Workshop on Protocol Specification, Testing, and Verification (6th 1986 Montréal, Québec). Protocol specification, testing, and verification, VI: Proceedings of the IFIP WG 6.1 Sixth International Workshop on Protocol Specification, Testing, and Verification. Amsterdam: North-Holland, 1987.
Find full textIFIP WG 6.1 International Workshop on Protocol Specification, Testing, and Verification (7th 1987 Zurich, Switzerland). Protocol specification, testing, and verification, VII: Proceedings of the IFIP WG 6.1 Seventh International Conference on Protocol Specification, Testing, and Verification. Amsterdam: North-Holland, 1987.
Find full textIFIP WG6.1 International Workshop on Protocol Specification, Testing and Verification (5th 1985 Toulouse-Moissac). Protocol specification, testing, and verification, V: Proceedings of the IFIP WG 6.1 fifth International Workshop on Protocol Specification, Testing, and Verification organized by the LAAS du CNRS, Toulouse-Moissac, France, June 10-13, 1985. Amsterdam: North-Holland, 1986.
Find full textIFIP WG 6.1 International Workshop on Protocol Specification, Testing and Verification (6th Montreal, Quebec 1986). Protocol specification, testing and verification, VI: Proceedings of the IFIP WG6.1 sixth International Workshop on Protocol Specification Testing, and Verification organized by Concordia University and Université de Montréal Montreal, Quebec, Canada, June 10-13, 1986. Amsterdam: North-Holland, 1987.
Find full textIFIP TC6/WG6.1 International Symposium on Protocol Specification, Testing and Verification (15th 1995 Warsaw, Poland). Protocol specification, testing and verification XV: Proceedings of the fifteenth IFIP WG6.1 International Symposium on Protocol Specification, Testing and Verification, Warsaw, Poland, June 1995. London: Chapman & Hall on behalf of the International Federation for Information Processing (IFIP), 1996.
Find full textHegde, Malati. An experience in using UIO sequences and rural Chinese postman tours for conformance testing of a Q.931 implementation. Bangalore: Dept. of Electrical Communication Engineering, Indian Institute of Science, 1992.
Find full textBook chapters on the topic "Computer network protocols – Testing"
Miller, R. E., D. L. Chen, D. Lee, and R. Hao. "Coping with Nondeterminism in Network Protocol Testing." In Lecture Notes in Computer Science, 129–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11430230_10.
Full textJing, Chuanming, Zhiliang Wang, Xia Yin, and Jianping Wu. "A Formal Approach to Robustness Testing of Network Protocol." In Lecture Notes in Computer Science, 24–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88140-7_3.
Full textAlcalde, Baptiste, Ana Cavalli, Dongluo Chen, Davy Khuu, and David Lee. "Network Protocol System Passive Testing for Fault Management: A Backward Checking Approach." In Lecture Notes in Computer Science, 150–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30232-2_10.
Full textNeelakantan, B., and S. V. Raghavan. "Protocol Conformance Testing — A Survey." In Computer Networks, Architecture and Applications, 175–91. Boston, MA: Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34887-2_11.
Full textHarrim, Muhannad, Mohamed El-Wakil, and Ala Al-Fuqaha. "Network Layer Protocols." In Handbook of Computer Networks, 40–62. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118256053.ch4.
Full textFranklin, Matthew, Juan A. Garay, and Moti Yung. "Self-Testing/Correcting Protocols." In Lecture Notes in Computer Science, 269–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48169-9_19.
Full textKizza, Joseph Migga. "Computer Network Security Protocols." In Guide to Computer Network Security, 359–89. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_17.
Full textKizza, Joseph Migga. "Computer Network Security Protocols." In Guide to Computer Network Security, 365–96. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_17.
Full textKizza, Joseph Migga. "Computer Network Security Protocols." In Guide to Computer Network Security, 357–86. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_17.
Full textKizza, Joseph Migga. "Computer Network Security Protocols." In Texts in Computer Science, 367–98. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_17.
Full textConference papers on the topic "Computer network protocols – Testing"
Vu, Minh, Lisong Xu, Sebastian Elbaum, Wei Sun, and Kevin Qia. "Efficient systematic testing of network protocols with temporal uncertain events." In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. IEEE, 2019. http://dx.doi.org/10.1109/infocom.2019.8737390.
Full textWang, Xiaoshuang, Sunil Agham, Vikram Munishwar, Vaibhav Nipunage, Shailendra Singh, and Kartik Gopalan. "Transparent Network Protocol Testing and Evaluation." In 2013 22nd International Conference on Computer Communication and Networks (ICCCN 2013). IEEE, 2013. http://dx.doi.org/10.1109/icccn.2013.6614205.
Full textLi Haifeng, Wang Shaolei, Zhang Bin, Shuai Bo, and Tang Chaojing. "Network protocol security testing based on fuzz." In 2015 4th International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2015. http://dx.doi.org/10.1109/iccsnt.2015.7490895.
Full textAl-Rawi, Akram, and Azzedine Lansari. "Effect of Windows XP Firewall on Network Simulation and Testing." In InSITE 2007: Informing Science + IT Education Conference. Informing Science Institute, 2007. http://dx.doi.org/10.28945/3170.
Full textWen, Shameng, Chao Feng, Qingkun Meng, Bin Zhang, Ligeng Wu, and Chaojing Tang. "Multi-packet symbolic execution testing for network protocol binary software." In 2016 5th International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2016. http://dx.doi.org/10.1109/iccsnt.2016.8070233.
Full textAllen, William, Chin Dou, and Gerald Marin. "A Model-based Approach to the Security Testing of Network Protocol Implementations." In 2006 31st IEEE Conference on Local Computer Networks. IEEE, 2006. http://dx.doi.org/10.1109/lcn.2006.322216.
Full textHan, Xing, Qiaoyan Wen, and Zhao Zhang. "A mutation-based fuzz testing approach for network protocol vulnerability detection." In 2012 2nd International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2012. http://dx.doi.org/10.1109/iccsnt.2012.6526099.
Full textBo Huang and Qiaoyan Wen. "An automatic fuzz testing method designed for detecting vulnerabilities on all protocol." In 2011 International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2011. http://dx.doi.org/10.1109/iccsnt.2011.6182047.
Full textJing, Chuanming, Xia Yin, Zhiliang Wang, and Jianping Wu. "A Formal Approach to Robustness Testing of Network Protocol with Time Constraints." In 2008 9th International Conference for Young Computer Scientists (ICYCS). IEEE, 2008. http://dx.doi.org/10.1109/icycs.2008.401.
Full textHua, Li, Ye Xinming, Wu Chengyong, Hang Chengbao, and Wang Lingling. "Modeling Nondeterministic Feature with Petri Net for Network Protocol in Interoperability Testing." In 2009 WRI World Congress on Computer Science and Information Engineering. IEEE, 2009. http://dx.doi.org/10.1109/csie.2009.466.
Full text