Academic literature on the topic 'Computer network protocols – Testing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer network protocols – Testing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer network protocols – Testing"

1

Che, Xiaoping, and Stephane Maag. "Passive performance testing of network protocols." Computer Communications 51 (September 2014): 36–47. http://dx.doi.org/10.1016/j.comcom.2014.06.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sidhu, D. P., and C. S. Chang. "Probabilistic testing of protocols." ACM SIGCOMM Computer Communication Review 19, no. 4 (August 1989): 295–302. http://dx.doi.org/10.1145/75247.75275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yang, Xiao Jing, and Sheng Li Chen. "Study on a Wireless Temperature and Humidity Monitoring System for Workshop with Constant Temperature Based on SCM." Applied Mechanics and Materials 701-702 (December 2014): 593–97. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.593.

Full text
Abstract:
A wireless temperature and humidity monitoring system for workshop with constant temperature based on AT89C52 Single chip microcomputer and nRF905 wireless microchip is studied. The system is consists of base station and slave station. Base station is mainly consists of temperature acquisition module, humidity acquisition module, wireless communicating module and communicating testing module. Good communication protocols play an important role in ensuring the correct monitoring data. So the network topology, communication data form, ad hoc networks protocol, mac protocol and data link layer protocols are discussed for commutation protocol to host computer software. The cost of the system is low and it has a large function area and a good performance. It is able to provide messages of workshop with constant temperature for improving machining accuracy and prolonging the life of equipment in machine shop.
APA, Harvard, Vancouver, ISO, and other styles
4

Jedermann, Reiner, Markus Becker, Carmelita Gorg, and Walter Lang. "Testing network protocols and signal attenuation in packed food transports." International Journal of Sensor Networks 9, no. 3/4 (2011): 170. http://dx.doi.org/10.1504/ijsnet.2011.040238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Olenev, Valentin, Irina Lavrovskaya, Yuriy Sheynin, Ilya Korobkov, Elena Suvorova, Elena Podgornova, Dmitry Dymov, and Sergey Kochura. "STP-ISS Transport Protocol for SpaceWire On-Board Networks." International Journal of Embedded and Real-Time Communication Systems 5, no. 4 (October 2014): 45–76. http://dx.doi.org/10.4018/ijertcs.2014100103.

Full text
Abstract:
The paper describes the development of a new transport protocol for the SpaceWire onboard networks. It starts from the overview and analysis of existing SpaceWire-oriented transport protocols. Then the paper considers the general industrial requirements for the Transport protocol, which should operate over the SpaceWire network technology. The main two chapters of the paper present the first and the second revisions of the new STP-ISS transport protocol, which has been developed in accordance with the results of the overview and technical requirements. In addition, the authors describe STP-ISS modeling process, which was very efficient for the STP ISS protocol development, testing, analysis and improvement.
APA, Harvard, Vancouver, ISO, and other styles
6

Riska, Riska, and Hendri Alamsyah. "Analisis Perbandingan Protokol Transport Pada Video Streaming di Jaringan Lokal (LAN) Menggunakan Videolan Client." JURNAL MEDIA INFORMATIKA BUDIDARMA 3, no. 2 (April 14, 2019): 126. http://dx.doi.org/10.30865/mib.v3i2.1110.

Full text
Abstract:
The use of video streaming on computer networks uses the method of delivering multimedia content in the form of streaming that can be done with several transport protocols such as RTP, RTSP, and HTTP. The protocol has its own character and of course also has its own quality comparison. Therefore, this study will compare the quality of each of these protocols. The assessment criteria to be carried out in this study are the value of throughput, delay and jitter. Streaming video will be done with the VLC application and measuring the quality of services using the Wireshark application. From the results of the testing that the author did, the best video streaming quality on the local network is using HTTP protocol with a throughput value of 418.635 kbps, Delay 8.65 ms, and jitter 19,618 ms.
APA, Harvard, Vancouver, ISO, and other styles
7

Warman, Indra, and Alex Franozal. "QoS Analysis on OSPFv3 And RIPng Using GRE Tunneling on IPv6 Integrated Ipv4 Network." MATEC Web of Conferences 215 (2018): 01005. http://dx.doi.org/10.1051/matecconf/201821501005.

Full text
Abstract:
Every year, the availability of public IPv4 addresses is running low. However, the IETF (Internet Engineering Task Force) has set a new addressing standard called IPv6 (Internet Protocol version 6). IPv6 implementations can not be immediately performed on all end-to-end lines, a transition phase is required, one of which is the GRE tunneling method. IPv6 has some differences with IPv4, then in line with the presence of IPv6 will required the protocol that compatible with IPv6, among which is the routing protocol. Some dynamic routing protocols are created to support and can run on IPv6 such as RIPng and OSPFv3. Aim of this study is examines OSPFv3 routing protocols and RIPng routing protocols in terms of Quality of Service (QoS). The test is done by using seven routers with three scenarios in each routing protocol, ie scenario with best path active condition, when the network changes in other words best path down, and the scenario with best path condition has changed and the network has returned to normal. Testing is done by testing QoS parameters (delay, packet loss, and throughput) when the client computer downloads files with the .iso extension from the server. Downloaded files have different sizes, from 100 Mega Byte to 1 Giga Byte. From the results obtained that OSPFv3 provides better QoS (delay, packet loss, and throughput) than RIPng on integrated IPv6 network using GRE tunnel and can be a reference when going to transition from IPv4 to IPv6 using GRE Tunnel.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Yujun. "Transport Mechanism Applied to Computer Network Protocol Conformance Testing." Journal of Computer Research and Development 42, no. 1 (2005): 102. http://dx.doi.org/10.1360/crad20050114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mohd Fuzi, Mohd Faris, Khairunnisa Abdullah, Iman Hazwam Abd Halim, and Rafiza Ruslan. "Network Automation using Ansible for EIGRP Network." Journal of Computing Research and Innovation 6, no. 4 (September 20, 2021): 59–69. http://dx.doi.org/10.24191/jcrinn.v6i4.237.

Full text
Abstract:
Network automation has evolved into a solution that emphasizes efficiency in all areas. Furthermore, communication and computer networks rely on a platform that provides the necessary technological infrastructure for packet transfer through the Internet using routing protocols. The Enhanced Interior Gateway Routing Protocol (EIGRP) is a hybrid routing protocol that combines the properties of both distance-vector and link-state routing methods. The traditional technique to configure EIGRP is inefficient and requires repeated processes compared to the network automation concept. Network automation helps to assist network administrators in automating and verifying the EIGRP configuration using scripting. This paper implemented network automation using Ansible to configure EIGRP routing and advanced configuration in the GNS3 environment. This study is focused on automated scripting to configure IP Addresses to the interfaces, EIGRP routing protocol, a default static route and advanced EIGRP configurations. Ansible ran the scripting on Network Automation Docker and pushed the configurations to the routers. The network automation docker communicated with other routers via SSH. In the testing phase, the running configuration between the traditional approach and automation scripting in the Ansible playbook was compared to verify EIGRP configurations' accuracy. The findings show that Ansible has successfully deployed the configuration to the routers with no errors. Ansible can help network administrators minimized human mistakes, reduce time-consuming and enable device visibility across the network environment. Implementing EIGRP authentication and hardening process can enhance the network security level for future study.
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Qun, Zhonghao Sun, Zhangquan Wang, Shiping Ye, Ziyi Su, Hao Chen, and Chao Hu. "A Practical Format and Semantic Reverse Analysis Approach for Industrial Control Protocols." Security and Communication Networks 2021 (March 12, 2021): 1–11. http://dx.doi.org/10.1155/2021/6690988.

Full text
Abstract:
Industrial control protocol is the basis of communication and interaction of industrial control system, and its security is related to the whole industrial infrastructure. Because many industrial control systems use proprietary protocols, it is necessary to adopt protocol reverse analysis technology to parse them and then detect whether there are secure vulnerabilities in the protocols by means of fuzzy testing. However, most of the existing technologies are designed for common network protocols, and there is no improvement for industrial control protocol. Therefore, we propose a multistage ensemble reverse analysis method, namely, MSERA, which fully considers the design concept of industrial control protocols. MSERA divides the traditional reverse analysis process into three stages and identifies the fields with different semantic characteristics in different stages and combines with field rectification to effectively improve the results of reverse analysis of industrial control protocols. Through the experimental comparison of some public and proprietary industrial control protocols, it is found that MSERA not only outperforms Netzob in the accuracy of field split but also far exceeds Netzob in semantic recognition accuracy. The experimental results show that MSERA is very practical and suitable for reverse analysis of industrial control protocols.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computer network protocols – Testing"

1

Kou, Tian. "Conformance testing of OSI protocols : the class O transport protocol as an example." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26427.

Full text
Abstract:
This thesis addresses the problem of conformance testing of communication protocol implementations. Test sequence generation techniques for finite state machines (FSM) have been developed to solve the problem of high costs of an exhaustive test. These techniques also guarantee a complete coverage of an implementation in terms of state transitions and output functions, and therefore provide a sound test of the implementation under test. In this thesis, we have modified and applied three test sequence generation techniques on the class 0 transport protocol. A local tester and executable test sequences for the ISO class 0 transport protocol have been developed on a portable protocol tester to demonstrate the practicality of the test methods and test methodologies. The local test is achieved by an upper tester residing on top of the implementation under test (IUT) and a lower tester residing at the bottom of the IUT. Tests are designed based on the state diagram of an IUT. Some methodologies of parameter variations have also been used to test primitive parameters of the implementation. Some problems encountered during the implementation of the testers and how they are resolved are also discussed in the thesis.
Science, Faculty of
Computer Science, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
2

Dany, Hendra. "Application of the ferry clip approach to multi-party and interoperability testing." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28971.

Full text
Abstract:
As communications protocols are becoming more complex and sophisticated, developing a test system that has the ability to provide a controlled environment for comprehensive protocol testing is essential to achieve a "real open system". This thesis advocates the need for a multi-party test method as currently identified by ISO, and discusses two important aspects of protocol testing: Conformance and Interoperability. They are complementary to each other and are necessary to ensure the conformity and interoperability of a protocol implementation. The proposed ferry clip based test architecture is presented. Both the concepts and design principles employed to achieve a flexible and generalized test system and the specific components which comprise the Ferry Clip based Test System are described. The test system is general and flexible not only with respect to the test configurations and test methods but also with respect to the protocol to be tested, the system under test, and the underlying communication system. Applications of the ferry clip approach to multi-party conformance and interoperability testing are discussed, followed by an example of MHS conformance testing which demonstrates the applicability of the ferry clip approach to multi-party testing.
Science, Faculty of
Computer Science, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
3

Lo, Jeffrey Kin Hung. "Open systems interconnection passive monitor OSI-PM." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29418.

Full text
Abstract:
The Open Systems Interconnection Passive Monitor (OSI-PM), which is based on the principles of the OSI-Reference Model (OSI-RM), provides a framework for the development of multi-layer passive monitoring and testing. It adopts the same seven-layer architecture of the OSI-RM and provides the capability of selectively displaying, capturing, and analyzing the protocol events on single or multiple connections for any subset or all of the seven layers. Different from conventional monitors, the OSI-PM is able to detect protocol violation as they occur in addition to the monitoring functions. The current OSI-PM is able to monitor and test up to the transport layer of the OSI-RM. This thesis discusses the design, prototype implementation and testing of the OSI-PM.
Science, Faculty of
Computer Science, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
4

Ko, Kai-Chung. "Protocol test sequence generation and analysis using AI techniques." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29192.

Full text
Abstract:
This thesis addresses two major issues in protocol conformance testing: test sequence generation and test result analysis. For test sequence generation, a new approach based on the constraint satisfaction problem (CSP) techniques, which is widely used in the AI community, is presented. This method constructs a unique test sequence for a given FSM by using an initial test sequence, such as a transition tour or an UIO test sequence, and incrementally generating a set of test subsequences which together represent the constraints imposed on the overall structure of the FSM. The new method not only generates test sequence with fault coverage which is at least as good as the one provided by the existing methods, but also allows the implementation under test (IUT) to have a larger number of states than that in the specification. In addition, the new method also lends itself naturally to both test result analysis and fault coverage measurement. For test result analysis, the CSP method uses the observed sequence as the initial sequence, constructs all fault models which satisfy the initial sequence and introduces additional subsequences to pinpoint the IUT fault model. In addition, a second method for test result analysis is proposed, which is originated from a model of diagnostic reasoning from first principle, another well-known AI techniques which produces all minimal diagnoses by considering the overall consistency of the system together with the observation. Unlike the first method, the second method does not require the computation of all fault models explicitly, and hence is considered to be more suitable for large systems. To our knowledge, the proposed methods in this thesis represent the first attempt in applying AI techniques to the problem of protocol test sequence generation and analysis.
Science, Faculty of
Computer Science, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
5

Wvong, Russil. "A new methodology for OSI conformance testing based on trace analysis." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29343.

Full text
Abstract:
This thesis discusses the problems of the conventional ISO 9646 methodology for OSI conformance testing, and proposes a new methodology based on trace analysis. In the proposed methodology, a trace analyzer is used to determine whether the observed behavior of the implementation under test is valid or invalid. This simplifies test cases dramatically, since they now need only specify the expected behavior of the IUT; unexpected behavior is checked by the trace analyzer. Test suites become correspondingly smaller. Because of this reduction in size and complexity, errors in test suites can be found and corrected far more easily. As a result, the reliability and the usefulness of the conformance testing process are greatly enhanced. In order to apply the proposed methodology, trace analyzers are needed. Existing trace analyzers are examined, and found to be unsuitable for OSI conformance testing. A family of new trace analysis algorithms is presented and proved. To verify the feasibility of the proposed methodology, and to demonstrate its benefits, it is applied to a particular protocol, the LAPB protocol specified by ISO 7776. The design and implementation of a trace analyzer for LAPB are described. The conventional ISO 8882-2 test suite for LAPB, when rewritten to specify only the expected behavior of the IUT, is found to be more than an order of magnitude smaller.
Science, Faculty of
Computer Science, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
6

Sala, Dolors. "Design and evaluation of MAC protocols for hybrid fiber/coaxial systems." Diss., Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/13268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wibling, Oskar. "Creating Correct Network Protocols." Doctoral thesis, Uppsala universitet, Avdelningen för datorteknik, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-9361.

Full text
Abstract:
Network protocol construction is a complex and error prone task. The challenges originate both from the inherent complexity of developing correct program code and from the distributed nature of networked systems. Protocol errors can have devastating consequences. Even so, methods for ensuring protocol correctness are currently only used to a limited extent. A central reason for this is that they are often complex and expensive to employ. In this thesis, we develop methods to perform network protocol testing and verification, with the goal to make the techniques more accessible and readily adoptable. We examine how to formulate correctness requirements for ad hoc routing protocols used to set up forwarding paths in wireless networks. Model checking is a way to verify such requirements automatically. We investigate scalability of finite-state model checking, in terms of network size and topological complexity, and devise a manual abstraction technique to improve scalability. A methodology combining simulations, emulations, and real world experiments is developed for analyzing the performance of wireless protocol implementations. The technique is applied in a comparison of the ad hoc routing protocols AODV, DSR, and OLSR. Discrepancies between simulations and real world behavior are identified; these are due to absence of realistic radio propagation and mobility models in simulation. The issues are mainly related to how the protocols sense their network surroundings and we identify improvements to these capabilities. Finally, we develop a methodology and a tool for automatic verification of safety properties of infinite-state network protocols, modeled as graph transformation systems extended with negative application conditions. The verification uses symbolic backward reachability analysis. By introducing abstractions in the form of summary nodes, the method is extended to protocols with recursive data structures. Our tool automatically verifies correct routing of the DYMO ad hoc routing protocol and several nontrivial heap manipulating programs.
APA, Harvard, Vancouver, ISO, and other styles
8

Foulkes, Philip James. "An investigation into the control of audio streaming across networks having diverse quality of service mechanisms." Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1004865.

Full text
Abstract:
The transmission of realtime audio data across digital networks is subject to strict quality of service requirements. These networks need to be able to guarantee network resources (e.g., bandwidth), ensure timely and deterministic data delivery, and provide time synchronisation mechanisms to ensure successful transmission of this data. Two open standards-based networking technologies, namely IEEE 1394 and the recently standardised Ethernet AVB, provide distinct methods for achieving these goals. Audio devices that are compatible with IEEE 1394 networks exist, and audio devices that are compatible with Ethernet AVB networks are starting to come onto the market. There is a need for mechanisms to provide compatibility between the audio devices that reside on these disparate networks such that existing IEEE 1394 audio devices are able to communicate with Ethernet AVB audio devices, and vice versa. The audio devices that reside on these networks may be remotely controlled by a diverse set of incompatible command and control protocols. It is desirable to have a common network-neutral method of control over the various parameters of the devices that reside on these networks. As part of this study, two Ethernet AVB systems were developed. One system acts as an Ethernet AVB audio endpoint device and another system acts as an audio gateway between IEEE 1394 and Ethernet AVB networks. These systems, along with existing IEEE 1394 audio devices, were used to demonstrate the ability to transfer audio data between the networking technologies. Each of the devices is remotely controllable via a network neutral command and control protocol, XFN. The IEEE 1394 and Ethernet AVB devices are used to demonstrate the use of the XFN protocol to allow for network neutral connection management to take place between IEEE 1394 and Ethernet AVB networks. User control over these diverse devices is achieved via the use of a graphical patchbay application, which aims to provide a consistent user interface to a diverse range of devices.
APA, Harvard, Vancouver, ISO, and other styles
9

Mirza, Aamir Mehmood, and Mohtashim Khan. "Ethernet Network Functionality Testing." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-3720.

Full text
Abstract:

Ethernet functionality testing as a generic term used for checking connectivity,throughput and capability to transfer packets over the network. Especially in the packet-switchenvironment, Ethernet testing has become an essential part for deploying a reliable network.Over a long distance Ethernet testing parameter for analyzing network performance must havetwo devices attached and synchronized.

Saab Microwave Systems is among the leading suppliers of radar systems developing groundbased,naval and air-borne radar systems. To ensure the correct functionality, the developerwants to verify the performance of computer network and looking for a suitable solution.

A software application is required to verify and test the functionality of the Ethernet network andto verify the functionality and performance of the TCP/IP stack of newly added node. Theprograms shall be easily ported to different operating systems and must not depend on specificproduct properties.A software application, “NetBurst”, is developed for Ethernet functionality testing. Theapplication is vendor and platform independent.

 

APA, Harvard, Vancouver, ISO, and other styles
10

Shu, Guoqiang. "Formal Methods and Tools for Testing Communication Protocol System Security." The Ohio State University, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=osu1211333211.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer network protocols – Testing"

1

Tarnay, Katie. Protocol specification and testing. New York: Plenum Press, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Diwakar, T. N. Implementation of hierarchical conformance testing platform for LAPB. Bangalore: Dept. of Electrical Communication Engineering, Indian Institute of Science, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

IFIP, WG 6. 1. International Workshop on Protocol Specification Testing and Verification (4th 1984 Skytop Lodge Pa ). Protocol specification, testing, and verification, IV: Proceedings of the IFIP WG 6.1 International Workshop on Protocol Specification, Testing, and Verification. Amsterdam: North-Holland, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

IFIP WG 6.1 International Workshop on Protocol Specification, Testing, and Verification (5th 1985 Toulouse, France and Moissac, Tarn-et-Garonne, France). Protocol specification, testing, and verification, V: Proceedings of the IFIP WG 6.1 Fifth International Workshop on Protocol Specification, Testing, and Verification. Amsterdam: North-Holland, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

IFIP WG 6.1 International Workshop on Protocol Specification, Testing, and Verification (6th 1986 Montréal, Québec). Protocol specification, testing, and verification, VI: Proceedings of the IFIP WG 6.1 Sixth International Workshop on Protocol Specification, Testing, and Verification. Amsterdam: North-Holland, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

IFIP WG 6.1 International Workshop on Protocol Specification, Testing, and Verification (7th 1987 Zurich, Switzerland). Protocol specification, testing, and verification, VII: Proceedings of the IFIP WG 6.1 Seventh International Conference on Protocol Specification, Testing, and Verification. Amsterdam: North-Holland, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

IFIP WG6.1 International Workshop on Protocol Specification, Testing and Verification (5th 1985 Toulouse-Moissac). Protocol specification, testing, and verification, V: Proceedings of the IFIP WG 6.1 fifth International Workshop on Protocol Specification, Testing, and Verification organized by the LAAS du CNRS, Toulouse-Moissac, France, June 10-13, 1985. Amsterdam: North-Holland, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

IFIP WG 6.1 International Workshop on Protocol Specification, Testing and Verification (6th Montreal, Quebec 1986). Protocol specification, testing and verification, VI: Proceedings of the IFIP WG6.1 sixth International Workshop on Protocol Specification Testing, and Verification organized by Concordia University and Université de Montréal Montreal, Quebec, Canada, June 10-13, 1986. Amsterdam: North-Holland, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

IFIP TC6/WG6.1 International Symposium on Protocol Specification, Testing and Verification (15th 1995 Warsaw, Poland). Protocol specification, testing and verification XV: Proceedings of the fifteenth IFIP WG6.1 International Symposium on Protocol Specification, Testing and Verification, Warsaw, Poland, June 1995. London: Chapman & Hall on behalf of the International Federation for Information Processing (IFIP), 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hegde, Malati. An experience in using UIO sequences and rural Chinese postman tours for conformance testing of a Q.931 implementation. Bangalore: Dept. of Electrical Communication Engineering, Indian Institute of Science, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer network protocols – Testing"

1

Miller, R. E., D. L. Chen, D. Lee, and R. Hao. "Coping with Nondeterminism in Network Protocol Testing." In Lecture Notes in Computer Science, 129–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11430230_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jing, Chuanming, Zhiliang Wang, Xia Yin, and Jianping Wu. "A Formal Approach to Robustness Testing of Network Protocol." In Lecture Notes in Computer Science, 24–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88140-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alcalde, Baptiste, Ana Cavalli, Dongluo Chen, Davy Khuu, and David Lee. "Network Protocol System Passive Testing for Fault Management: A Backward Checking Approach." In Lecture Notes in Computer Science, 150–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30232-2_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Neelakantan, B., and S. V. Raghavan. "Protocol Conformance Testing — A Survey." In Computer Networks, Architecture and Applications, 175–91. Boston, MA: Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34887-2_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Harrim, Muhannad, Mohamed El-Wakil, and Ala Al-Fuqaha. "Network Layer Protocols." In Handbook of Computer Networks, 40–62. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118256053.ch4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Franklin, Matthew, Juan A. Garay, and Moti Yung. "Self-Testing/Correcting Protocols." In Lecture Notes in Computer Science, 269–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48169-9_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kizza, Joseph Migga. "Computer Network Security Protocols." In Guide to Computer Network Security, 359–89. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kizza, Joseph Migga. "Computer Network Security Protocols." In Guide to Computer Network Security, 365–96. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kizza, Joseph Migga. "Computer Network Security Protocols." In Guide to Computer Network Security, 357–86. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kizza, Joseph Migga. "Computer Network Security Protocols." In Texts in Computer Science, 367–98. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer network protocols – Testing"

1

Vu, Minh, Lisong Xu, Sebastian Elbaum, Wei Sun, and Kevin Qia. "Efficient systematic testing of network protocols with temporal uncertain events." In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. IEEE, 2019. http://dx.doi.org/10.1109/infocom.2019.8737390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Xiaoshuang, Sunil Agham, Vikram Munishwar, Vaibhav Nipunage, Shailendra Singh, and Kartik Gopalan. "Transparent Network Protocol Testing and Evaluation." In 2013 22nd International Conference on Computer Communication and Networks (ICCCN 2013). IEEE, 2013. http://dx.doi.org/10.1109/icccn.2013.6614205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li Haifeng, Wang Shaolei, Zhang Bin, Shuai Bo, and Tang Chaojing. "Network protocol security testing based on fuzz." In 2015 4th International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2015. http://dx.doi.org/10.1109/iccsnt.2015.7490895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Al-Rawi, Akram, and Azzedine Lansari. "Effect of Windows XP Firewall on Network Simulation and Testing." In InSITE 2007: Informing Science + IT Education Conference. Informing Science Institute, 2007. http://dx.doi.org/10.28945/3170.

Full text
Abstract:
The objective of this paper is to report findings from simulating and testing local area network (LAN) connectivity using Windows XP operating system and Cisco Networking Academy network devices. In this study, a simple routing protocol, RIP, is used as routing protocol. Two different techniques, Cisco Networking Academy hardware lab and Cisco Packet Tracer 4, were used to compare their performance to simulate network connectivity. Primary findings showed that the settings of the Windows XP firewall on the host computer have a direct impact on the test results. These findings are critical as there are no similar reports in the literature and only a careful investigation allowed the researchers to come to this conclusion. Furthermore, study results also offer suggestions for fixing problems that hinder simulation results of LANs that use Windows XP workstations. These findings can help CCNA students and faculty understand the reasons for unexplained connectivity problems when performing CCNA labs. The study also provides a simple method to avoid connectivity problems when using Windows ping.exe and tracert.exe which implement the TCP/IP protocol ICMP
APA, Harvard, Vancouver, ISO, and other styles
5

Wen, Shameng, Chao Feng, Qingkun Meng, Bin Zhang, Ligeng Wu, and Chaojing Tang. "Multi-packet symbolic execution testing for network protocol binary software." In 2016 5th International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2016. http://dx.doi.org/10.1109/iccsnt.2016.8070233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Allen, William, Chin Dou, and Gerald Marin. "A Model-based Approach to the Security Testing of Network Protocol Implementations." In 2006 31st IEEE Conference on Local Computer Networks. IEEE, 2006. http://dx.doi.org/10.1109/lcn.2006.322216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Han, Xing, Qiaoyan Wen, and Zhao Zhang. "A mutation-based fuzz testing approach for network protocol vulnerability detection." In 2012 2nd International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2012. http://dx.doi.org/10.1109/iccsnt.2012.6526099.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bo Huang and Qiaoyan Wen. "An automatic fuzz testing method designed for detecting vulnerabilities on all protocol." In 2011 International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2011. http://dx.doi.org/10.1109/iccsnt.2011.6182047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jing, Chuanming, Xia Yin, Zhiliang Wang, and Jianping Wu. "A Formal Approach to Robustness Testing of Network Protocol with Time Constraints." In 2008 9th International Conference for Young Computer Scientists (ICYCS). IEEE, 2008. http://dx.doi.org/10.1109/icycs.2008.401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hua, Li, Ye Xinming, Wu Chengyong, Hang Chengbao, and Wang Lingling. "Modeling Nondeterministic Feature with Petri Net for Network Protocol in Interoperability Testing." In 2009 WRI World Congress on Computer Science and Information Engineering. IEEE, 2009. http://dx.doi.org/10.1109/csie.2009.466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography