To see the other types of publications on this topic, follow the link: Internet protocol.

Journal articles on the topic 'Internet protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Internet protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sridevi, Sridevi. "Barriers for Adopting Internet Protocol Version6." International Journal of Scientific Research 2, no. 6 (June 1, 2012): 105–7. http://dx.doi.org/10.15373/22778179/june2013/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

MOCNEJ, Jozef, Adrian PEKAR, Winston K.G. SEAH, Erik KAJATI, and Iveta ZOLOTOVA. "INTERNET OF THINGS UNIFIED PROTOCOL STACK." Acta Electrotechnica et Informatica 19, no. 2 (June 30, 2019): 24–32. http://dx.doi.org/10.15546/aeei-2019-0011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, X. K., R. H. Deng, and F. Bao. "Multicast Internet protocol." Computer Communications 23, no. 11 (June 2000): 1047–54. http://dx.doi.org/10.1016/s0140-3664(00)00167-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weik, H. "Internet Core Protocol." Computer Communications 24, no. 7-8 (April 2001): 744. http://dx.doi.org/10.1016/s0140-3664(00)00269-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Samjani, A. "Mobile Internet protocol." IEEE Potentials 20, no. 1 (2001): 16–18. http://dx.doi.org/10.1109/45.913205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ford, Bryan. "Unmanaged Internet Protocol." ACM SIGCOMM Computer Communication Review 34, no. 1 (January 2004): 93–98. http://dx.doi.org/10.1145/972374.972391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shue, Craig A., and Minaxi Gupta. "An Internet without the Internet protocol." Computer Networks 54, no. 18 (December 2010): 3232–45. http://dx.doi.org/10.1016/j.comnet.2010.06.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Levä, Tapio, Antti Riikonen, Juuso Töyli, and Heikki Hämmäinen. "A Framework for Measuring the Deployment of Internet Protocols." International Journal of IT Standards and Standardization Research 12, no. 1 (January 2014): 38–62. http://dx.doi.org/10.4018/ijitsr.2014010103.

Full text
Abstract:
Internet protocols spread to potential adopters through several successive phases of implementation, commercialization, acquisition, and adoption of the protocol. This process of protocol deployment involves several stakeholders and varies depending on the deployment environment and the protocol in question. This complexity and the lack of comprehensive measurement studies call for a further conceptualization of measuring protocol diffusion along the whole deployment process. Therefore, this article develops a framework for measuring the deployment of Internet protocols, consisting of deployment steps, deployment models, deployment measures, and data sources. The measures are further linked to each other through deployment gaps and delays. In order to demonstrate the framework, it is used to assess how a set of pre-installed protocols spread in the Finnish mobile market. The framework highlights the differences between the deployment models and the importance to use both the deployment measures and gaps in the analysis of protocol success. Furthermore, the illustrative results indicate that protocol deployment is driven by applications, and show the existence of large deployment gaps between the protocol possession and usage. The results are relevant especially to researchers interested in holistically analyzing protocol deployment and protocol developers for measuring and improving the success of their protocols.
APA, Harvard, Vancouver, ISO, and other styles
9

Henry, Susanna S., B. Vijay Kumar, V. Santhosh Kumar, and Gurwinder Singh. "Protocol Verification of Translation in Mobile Internet Protocol Version 4 and 6." Journal of Computers 11, no. 2 (March 2016): 149–58. http://dx.doi.org/10.17706/jcp.11.2.149-158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alnile, Naseef Husam Mohammad, Yasmin Makki Mohialden, Majd S. Ahmed, and Majd S. Ahmed. "A comparative study of IP Versions 4, 5, and 6." Journal La Multiapp 2, no. 3 (August 11, 2021): 10–15. http://dx.doi.org/10.37899/journallamultiapp.v2i3.390.

Full text
Abstract:
This research examines the Internet Protocol (IP) versions 4, 5, and 6, as well as the differences between them and which protocol is more suitable for the future of the internet, among other things. Through this research, we have established the most advantageous characteristics of these protocols, as well as the specific elements that each protocol uses to allow the internet network to operate at maximum capacity. The main aim of this study is to discover which of the internet protocols, IPv4, IPv5, or IPv6, is the most widely used. IPv4 is the most widely used protocol, followed by IPv5. The most essential elements of getting a more relevant job on the internet network are highlighted in this article. It all comes down to how IP protocols operate and what they accomplish.
APA, Harvard, Vancouver, ISO, and other styles
11

Andersen, David G., Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, and Scott Shenker. "Accountable internet protocol (aip)." ACM SIGCOMM Computer Communication Review 38, no. 4 (October 2008): 339–50. http://dx.doi.org/10.1145/1402946.1402997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Thomas, J., and A. J. Elbirt. "Understanding Internet Protocol Security." Information Systems Security 13, no. 4 (September 2004): 39–43. http://dx.doi.org/10.1201/1086/44640.13.4.20040901/83731.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Frankel, Sheila, and David Green. "Internet Protocol Version 6." IEEE Security & Privacy Magazine 6, no. 3 (May 2008): 83–86. http://dx.doi.org/10.1109/msp.2008.65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Deering, S. E. "SIP: Simple Internet Protocol." IEEE Network 7, no. 3 (May 1993): 16–28. http://dx.doi.org/10.1109/65.224022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Partovi, S. "RIP: Radiology Internet Protocol." RadioGraphics 16, no. 6 (November 1996): 1495–501. http://dx.doi.org/10.1148/radiographics.16.6.8946550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Cooter, M. "Six sense [Internet protocol]." Engineering & Technology 5, no. 3 (February 20, 2010): 48–50. http://dx.doi.org/10.1049/et.2010.0312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Hussein, Mahmoud, Ahmed I. Galal, Emad Abd-Elrahman, and Mohamed Zorkany. "Internet of Things (IoT) Platform for Multi-Topic Messaging." Energies 13, no. 13 (June 30, 2020): 3346. http://dx.doi.org/10.3390/en13133346.

Full text
Abstract:
IoT-based applications operate in a client–server architecture, which requires a specific communication protocol. This protocol is used to establish the client–server communication model, allowing all clients of the system to perform specific tasks through internet communications. Many data communication protocols for the Internet of Things are used by IoT platforms, including message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), MQTT for sensor networks (MQTT-SN), data distribution service (DDS), constrained application protocol (CoAP), and simple object access protocol (SOAP). These protocols only support single-topic messaging. Thus, in this work, an IoT message protocol that supports multi-topic messaging is proposed. This protocol will add a simple “brain” for IoT platforms in order to realize an intelligent IoT architecture. Moreover, it will enhance the traffic throughput by reducing the overheads of messages and the delay of multi-topic messaging. Most current IoT applications depend on real-time systems. Therefore, an RTOS (real-time operating system) as a famous OS (operating system) is used for the embedded systems to provide the constraints of real-time features, as required by these real-time systems. Using RTOS for IoT applications adds important features to the system, including reliability. Many of the undertaken research works into IoT platforms have only focused on specific applications; they did not deal with the real-time constraints under a real-time system umbrella. In this work, the design of the multi-topic IoT protocol and platform is implemented for real-time systems and also for general-purpose applications; this platform depends on the proposed multi-topic communication protocol, which is implemented here to show its functionality and effectiveness over similar protocols.
APA, Harvard, Vancouver, ISO, and other styles
18

Agyemang, Justice Owusu, Jerry John Kponyo, James Dzisi Gadze, Henry Nunoo-Mensah, and Dantong Yu. "A Lightweight Messaging Protocol for Internet of Things Devices." Technologies 10, no. 1 (January 29, 2022): 21. http://dx.doi.org/10.3390/technologies10010021.

Full text
Abstract:
The move towards intelligent systems has led to the evolution of IoT. This technological leap has over the past few years introduced significant improvements to various aspects of the human environment, such as health, commerce, transport, etc. IoT is data-centric; hence, it is required that the underlying protocols are scalable and sufficient to support the vast D2D communication. Several application layer protocols are being used for M2M communication protocols such as CoAP, MQTT, etc. Even though these messaging protocols have been designed for M2M communication, they are still not optimal for communications where message size and overhead are of much concern. This research paper presents a Lightweight Messaging Protocol (LiMP), which is a minified version of CoAP. We present a detailed protocol stack of the proposed messaging protocol and also perform a benchmark analysis of the protocol on some IoT devices. The proposed minified protocol achieves minimal overhead (a header size of 2 bytes) and has faster point-to-point communication from the benchmark analysis; for communication over LAN, the LiMP-TCP outperformed the CoAP-TCP by an average of 21% whereas that of LiMP-UDP was over 37%. For a device to remote server communication, LiMP outperformed CoAP by an average of 15%.
APA, Harvard, Vancouver, ISO, and other styles
19

Cohen, Fred. "Internet holes — Part 1: Internet Control Message Protocol." Network Security 1995, no. 8 (August 1995): 8–10. http://dx.doi.org/10.1016/1353-4858(96)89742-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Tribble, Dennis A. "Overview of Transport Control Protocol/Internet Protocol communications." American Journal of Health-System Pharmacy 66, no. 5 (March 1, 2009): 446–48. http://dx.doi.org/10.2146/ajhp070591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Yang, Q., and J. M. Pitts. "Scalable voice over Internet protocol service-level agreement guarantees in converged transmission control protocol/Internet protocol networks." IET Communications 4, no. 8 (2010): 1026. http://dx.doi.org/10.1049/iet-com.2009.0491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Sari, Riri Fitri, Lukman Rosyidi, Bambang Susilo, and Muhamad Asvial. "A Comprehensive Review on Network Protocol Design for Autonomic Internet of Things." Information 12, no. 8 (July 22, 2021): 292. http://dx.doi.org/10.3390/info12080292.

Full text
Abstract:
The autonomic Internet of Things is the creation of self-management capability in the Internet of Things system by embedding some autonomic properties, with the goal of freeing humans from all detail of the operation and management of the system. At same time, this provides a system to always operate on the best performance. This paper presents a review of the recent studies related to the design of network communication protocol, which can support autonomic Internet of Things. Many of the studies come from the research and development in Wireless Sensor Network protocols, as it becomes one of the key technologies for the Internet of Things. The identified autonomic properties are self-organization, self-optimization, and self-protection. We review some protocols with the objective of energy consumption reduction and energy harvesting awareness, as it can support the self-energy-awareness property. As the result, the protocol designs are mapped according to each autonomic property supported, including protocols for MAC layer, protocols for clustering, protocols for routing, and protocols for security. This can be used to map the advances of communication protocol research for the autonomic Internet of Things and to identify the opportunities for future research.
APA, Harvard, Vancouver, ISO, and other styles
23

Vijayan, Alpha, and SumeenaP S. "FILTERING MECHANISMS ON INTERNET PROTOCOL." International Journal of Advanced Research 5, no. 6 (June 30, 2017): 724–29. http://dx.doi.org/10.21474/ijar01/4471.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Batra, Ayushi. "Internet Protocol version 6 (IPv6)." International Journal for Research in Applied Science and Engineering Technology V, no. XI (November 23, 2017): 1869–73. http://dx.doi.org/10.22214/ijraset.2017.11270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Leiner, B., R. Cole, J. Postel, and D. Mills. "The DARPA internet protocol suite." IEEE Communications Magazine 23, no. 3 (March 1985): 29–34. http://dx.doi.org/10.1109/mcom.1985.1092530.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Lee, D. C., and D. L. Lough. "The Internet Protocol version 6." IEEE Potentials 17, no. 2 (1998): 11–12. http://dx.doi.org/10.1109/45.666638.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Stallings, W. "IPv6: the new Internet protocol." IEEE Communications Magazine 34, no. 7 (July 1996): 96–108. http://dx.doi.org/10.1109/35.526895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Kim, Pyungho. "Internet Protocol TV in Perspective." Television & New Media 10, no. 6 (August 19, 2009): 536–45. http://dx.doi.org/10.1177/1527476409340908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Goode, B. "Voice over Internet protocol (VoIP)." Proceedings of the IEEE 90, no. 9 (September 2002): 1495–517. http://dx.doi.org/10.1109/jproc.2002.802005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Maresca, M., N. Zingirian, and P. Baglietto. "Internet protocol support for telephony." Proceedings of the IEEE 92, no. 9 (August 2004): 1463–77. http://dx.doi.org/10.1109/jproc.2004.832950.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Sarkar, P., K. Voruganti, K. Meth, O. Biran, and J. Satran. "Internet Protocol storage area networks." IBM Systems Journal 42, no. 2 (2003): 218–31. http://dx.doi.org/10.1147/sj.422.0218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Batiha, Khaldoun. "The magic of internet protocol." Journal of Advanced Computer Science & Technology 6, no. 1 (February 8, 2017): 1. http://dx.doi.org/10.14419/jacst.v6i1.6714.

Full text
Abstract:
As the developing use of web and intranet keep on expanding colossally, the issue to suit more clients and gadgets has been risen. Subsequently, a location range must be required to oblige the hurry. Sadly, IPv4 address region and alternatives are insufficient to meet this new necessity. A fresh out of the box new Protocol is expected to satisfy the developing interest. IPv6 is the best response to the above issues. We should have an early on study on IPv6 convention. IPv6 convention offers verity of advantages that incorporates a more extensive location region and upgraded choices and changes that are not beforehand be found in the IPv4. IPv6 in contrast with IPv4 have a wide address range, simple documentations for representation of a location, enhanced administrations and alternatives, upgraded header, propelled highlights, new choices and bolster, auto setup highlight, new convention bolster, Network Security, Virus and Worms Security, Support for different Operating frameworks and stage including Microsoft windows, Linux and MAC.
APA, Harvard, Vancouver, ISO, and other styles
33

Faridah, Faridah. "DESAIN VOIP SERVER MENGGUNAKAN 3CXPHONE SYSTEM DAN SOFTPHONE PADA KANTOR PDAM KABUPATEN KEPULAUAN SELAYAR." ILTEK : Jurnal Teknologi 12, no. 01 (April 11, 2017): 1702–5. http://dx.doi.org/10.47398/iltek.v12i01.398.

Full text
Abstract:
TCP/IP (Transmission Control Protocol/Internet Protocol) merupakan Protokol yang dapat dikoneksikan dalam jaringan data diberbagai komputer di dunia. Dalam penerapannya protocol ini dapat dipakai untuk keperluan perangkat lunak (software) pada system operasi, sehingga banyak yang memanfaatkan dan mengembangkan untuk dapat mengirim pesan suara. Teknologi VoIP (Voice over Internet Protocol) adalah salahsatu solusinya. Implementasi VoIP dapat dilakukan dengan merancang suatu jaringan nirkabel, menggunakan software 3CX Phone System dan IP PBX yang dibuat khusus untuk system operasi Windows dengan menggunakan protocol standar SIP. Dimana dalam pengeturan dan penggunaanya jauh lebih mudah. Teknologi ini mamp umengubah suara analog menjadi paket data kemudian melalui jaringan data public internet maupun private internet paket data tersebut dilewatkan, sehingga komunikasi dapat berjalan. Dengan adanya VoIP biaya komunikasi dapat dikurangi sehingga dapat mereduksi biaya percakapan bahkansecara gratis.
APA, Harvard, Vancouver, ISO, and other styles
34

Mohd Aman, Azana Hafizah, Rosilah Hassan, Aisha-Hassan Abdalla Hashim, and Huda Adibah Mohd Ramli. "Investigation of Internet of Things Handover Process for Information Centric Networking and Proxy Mobile Internet Protocol." Mehran University Research Journal of Engineering and Technology 38, no. 4 (October 1, 2019): 867–74. http://dx.doi.org/10.22581/muet1982.1904.01.

Full text
Abstract:
IoT (Internet of Things) technically connects billions of entities to the Internet. The IoT is divided between the technology and the service itself. As a result, great efforts are needed to join data from many contexts and services. This reason has motivated proposals to develop solutions that can overcome existing issues of limitations for mobility, security, reliability and scalability of IoT. These billions of devices are interconnected to each other either using unicast, multicast or broadcast communications, and mixture of static and mobile communications. This paper aims to investigate the parameters of mobility performance in handover process for mobile multicast IoT environment. Investigation is done quantitatively by evaluating the parameters of handover process for IoT in two networking protocols that are possible to support acceptable mobility performance for IoT. The protocols are ICN (Information Centric Networking) and Proxy Mobile Internet Protocol. The evaluation parameters include packet loss and service recovery time. The metrics are extracted from the handover process flow for each network protocol topology. The service recovery time parameter is assumed as the time duration for each message to travel from sender to receiver, while packet loss parameter depends on the packet arrival rate and service recovery time. The results show that the ICN performs better than Proxy Mobile Internet Protocol.
APA, Harvard, Vancouver, ISO, and other styles
35

Shilton, Katie. "Engaging Values Despite Neutrality." Science, Technology, & Human Values 43, no. 2 (June 15, 2017): 247–69. http://dx.doi.org/10.1177/0162243917714869.

Full text
Abstract:
Internet protocol development is a social process, and resulting protocols are shaped by their developers’ politics and values. This article argues that the work of protocol development (and more broadly, infrastructure design) poses barriers to developers’ reflection upon values and politics in protocol design. A participant observation of a team developing internet protocols revealed that difficulties defining the stakeholders in an infrastructure and tensions between local and global viewpoints both complicated values reflection. Further, Internet architects tended to equate a core value of interoperability with values neutrality. The article describes how particular work practices within infrastructure development overcame these challenges by engaging developers in praxis: situated, lived experience of the social nature of technology.
APA, Harvard, Vancouver, ISO, and other styles
36

Chalasani Srinivas, Dr, Dr Srinivas Malladi, and . "A Light Protocol for Tracking Secure Stuff for the Internet of Things." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 121. http://dx.doi.org/10.14419/ijet.v7i2.32.15384.

Full text
Abstract:
The Internet of Things (IoT) is growing in the web of an age-old IPv6 address for Internet connections and messages that arise between these and other devices and systems that work with the Internet. It is equipped with the unique ID and data transfer capability through the network. Among other things, tracking and tracking online travel is a major issue. Although there are many tracking techniques for moving objects, many are at risk. So there is a need for tracking the safety of an object Safety protocols should provide visibility and tracking of street objects in support of the Internet (IoT). This protocol is based on the RFID Identity System for IoT Objects. Existing ones do not provide authentication of sites that lead to fakes. Great use of energy. The proposed protocol improves road safety tracking using the base protocol light and SPDL. The requested protocol is intended to ensure accuracy, accuracy, confidentiality and encryption. To ensure safe monitoring of objects, the requested protocols use cryptic primitives that use HMAC concepts that are used to authenticate an object. This protocol introduction relies on code authentication code (CMC), which is used to reduce power consumption at low cost. The testing of a test network evaluates protocol implementation and is found to be safer and requires less calculation than existing protocols.
APA, Harvard, Vancouver, ISO, and other styles
37

Chalasani Srinivas, Dr, and Dr Srinivas Malladi. "A light protocol for tracking secure stuff for the internet of things." International Journal of Engineering & Technology 7, no. 3 (July 11, 2018): 1491. http://dx.doi.org/10.14419/ijet.v7i3.11254.

Full text
Abstract:
The Internet of Things (IoT) is growing in the web of an age-old IPv6 address for Internet connections and messages that arise between these and other devices and systems that work with the Internet. It is equipped with the unique ID and data transfer capability through the network. Among other things, tracking and tracking online travel is a major issue. Although there are many tracking techniques for moving objects, many are at risk. So there is a need for tracking the safety of an object Safety protocols should provide visibility and tracking of street objects in support of the Internet (IoT). This protocol is based on the RFID Identity System for IoT Objects. Existing ones do not provide authentication of sites that lead to fakes. Great use of energy. The proposed protocol improves road safety tracking using the base protocol light and SPDL. The requested protocol is intended to ensure accuracy, accuracy, confidentiality and encryption. To ensure safe monitoring of objects, the requested protocols use cryptic primitives that use HMAC concepts that are used to authenticate an object. This protocol introduction relies on code authentication code (CMC), which is used to reduce power consumption at low cost. The testing of a test network evaluates protocol implementation and is found to be safer and requires less calculation than existing protocols.
APA, Harvard, Vancouver, ISO, and other styles
38

Khalid, Madiha, Umar Mujahid, and Muhammad Najam-ul-Islam. "Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks." International Journal of Distributed Sensor Networks 14, no. 8 (August 2018): 155014771879512. http://dx.doi.org/10.1177/1550147718795120.

Full text
Abstract:
Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with the rest of the world. The radio frequency identification system is used as node identification mechanism in the Internet of Thing networks. Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. To reduce the overall cost of radio frequency identification enabled Internet of Thing network security, the researchers use simple bitwise logical operations such as XOR, AND, OR, and Rot and have proposed many ultralightweight mutual authentication protocols. However, almost all the previously proposed protocols were later found to be vulnerable against several attack models. Recently, a new ultralightweight mutual authentication protocol has been proposed which involves only XOR and Rotation functions in its design and claimed to be robust against all possible attack models. In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. We have exploited weak structure of the protocol messages and proposed three attacks against the said protocol: one desynchronization and two full disclosure attacks.
APA, Harvard, Vancouver, ISO, and other styles
39

Ridgewell, Justin, and Hala ElAarag. "Network-coded internet-friendly transport protocol." Journal of Algorithms & Computational Technology 11, no. 3 (March 9, 2017): 201–16. http://dx.doi.org/10.1177/1748301817693847.

Full text
Abstract:
This paper presents the design of network-coded TCP (NCTCP). NCTCP is a reliable TCP-like transport protocol that uses network coding to dramatically improve the overall performance in networks with lossy links. By sending datagrams that represent a linear combination of packets, we are able to receive data in an orderless fashion and still push data in byte-correct order to the receiver.s application layer. To eliminate roundoff errors, we generate consecutive-ones linear combinations of packets that form totally unimodular matrices. We then decode these datagrams using an efficient technique. In addition, NCTCP has an additive increase multiplicative decrease (AIMD) congestion control mechanism that uses round-trip times to increase the performance on wireless networks without hurting the performance on wired networks. Unlike TCP.s AIMD mechanism, NCTCP does not use a congestion window. Furthermore, NCTCP can be implemented in user space and hence does not need any changes to the kernel. We test our protocol using ns-2 simulator using several performance measurements, namely, throughput, goodput, efficiency and receiver efficiency. Our simulations show that NCTCP performs better than standard TCP implementations and previously proposed network coding protocols; TCP/NC and CTCP. We also demonstrate that NCTCP is TCP-friendly and maintains the fairness property essential for the health of the internet.
APA, Harvard, Vancouver, ISO, and other styles
40

Anderson, Daniel K., and W. Michael Reed. "The Effects of Internet Instruction, Prior Computer Experience, and Learning Style on Teachers' Internet Attitudes and Knowledge." Journal of Educational Computing Research 19, no. 3 (October 1998): 227–46. http://dx.doi.org/10.2190/8wx1-5q3j-p3bw-jd61.

Full text
Abstract:
What is now called the Internet started out as a small number of federally funded Department of Defense (Advanced Research Project Agency, or ARPA) supercomputers networked together to share information. In order to guarantee data transmission between these nodes, this network (ARPANET) shared a common set of protocols that was designed to allow for high speed and reliable transfer. This protocol suite is TCP/IP (Transmission Control Protocol/Internet Protocol). Most microcomputers now have a TCP/IP implementation available (e.g., MacTCP) and can, therefore, join the millions of computers that have access to the plethora of resources on the Internet. The Internet is not a static set of nodes, not a limited number of library holdings, not a one-directional paradigm of data transmission. Rather, it is a vibrant and absorbing setting that can foster new learning environments, or enrage educators with its diverse commands, lack of direction, and tenuous consistency.
APA, Harvard, Vancouver, ISO, and other styles
41

Mutombo, Vially Kazadi, Seungyeon Lee, Jusuk Lee, and Jiman Hong. "EER-RL: Energy-Efficient Routing Based on Reinforcement Learning." Mobile Information Systems 2021 (April 19, 2021): 1–12. http://dx.doi.org/10.1155/2021/5589145.

Full text
Abstract:
Wireless sensor devices are the backbone of the Internet of things (IoT), enabling real-world objects and human beings to be connected to the Internet and interact with each other to improve citizens’ living conditions. However, IoT devices are memory and power-constrained and do not allow high computational applications, whereas the routing task is what makes an object to be part of an IoT network despite of being a high power-consuming task. Therefore, energy efficiency is a crucial factor to consider when designing a routing protocol for IoT wireless networks. In this paper, we propose EER-RL, an energy-efficient routing protocol based on reinforcement learning. Reinforcement learning (RL) allows devices to adapt to network changes, such as mobility and energy level, and improve routing decisions. The performance of the proposed protocol is compared with other existing energy-efficient routing protocols, and the results show that the proposed protocol performs better in terms of energy efficiency and network lifetime and scalability.
APA, Harvard, Vancouver, ISO, and other styles
42

Wheeb, Ali Hussein. "Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow in Wired Networks." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 6 (December 1, 2017): 3552. http://dx.doi.org/10.11591/ijece.v7i6.pp3552-3557.

Full text
Abstract:
<p>The demand for internet applications has increased rapidly. Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task Force (IETF). In this paper, we evaluate the performance of UDP, DCCP, SCTP and TFRC protocols for different traffic flows: data transmission, video traffic, and VOIP in wired networks. The performance criteria used for this evaluation include throughput, end to end delay, and packet loss rate. Well-known network simulator NS-2 used to implement the UDP, DCCP, SCTP, and TFRC protocols performance comparison. Based on the simulation results, the performance throughput of SCTP and TFRC is better than UDP. Moreover, DCCP performance is superior SCTP and TFRC in term of end-to-end delay.</p>
APA, Harvard, Vancouver, ISO, and other styles
43

Wang, Jianyi. "The Performance and Future of QUIC Protocol in the Modern Internet." Network and Communication Technologies 6, no. 1 (July 7, 2021): 28. http://dx.doi.org/10.5539/nct.v6n1p28.

Full text
Abstract:
Quick UDP Internet Connections (QUIC) protocol is a potential replacement for the TCP protocol to transport HTTP encrypted traffic. It is based on UDP and offers flexibility, speed, and low latency. The performance of QUIC is related to the everyday web browsing experience. QUIC is famous for its Forward Error Correction (Luyi, Jinyi, &amp; Xiaohua, 2012) and congestion control (Hari, Hariharan, &amp; Srinivasan, 1999) algorithm that improves user browsing delay by reducing the time spent on loss recovery (J&ouml;rg, Ernst, &amp; Don, 1998). This paper will compare QUIC with other protocols such as HTTP/2 over TCP, WebSocket, and TCP fast open in terms of latency reduction and loss recovery to determine the role of each protocol in the modern internet. Furthermore, this paper will propose potential further improvements to the QUIC protocol by studying other protocols.
APA, Harvard, Vancouver, ISO, and other styles
44

Pang, Yu Jun, Jun Wang, and Li Feng Wei. "Research of Embedded Internet Technology for Internet of Things." Applied Mechanics and Materials 55-57 (May 2011): 2153–56. http://dx.doi.org/10.4028/www.scientific.net/amm.55-57.2153.

Full text
Abstract:
Development of Internet of things, the application of embedded Internet technology will be wide. This paper introduces characteristic of embedded Internet technology, concludes and compares resolutions of how to connect embedded equipment to Internet. At the same time, this paper analyses characteristic of embedded TCP/IP protocol and present method for developing embedded TCP/IP protocol.
APA, Harvard, Vancouver, ISO, and other styles
45

Haj Aliwi, H. S., N. K. A. Alajmi, P. Sumari, and K. Alieyan. "A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time." Engineering, Technology & Applied Science Research 6, no. 4 (August 26, 2016): 1050–55. http://dx.doi.org/10.48084/etasr.664.

Full text
Abstract:
Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP) applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX) and the extension of the eXtensible Messaging and Presence Protocol (Jingle) in terms of delay time during call setup, call teardown, and media sessions.
APA, Harvard, Vancouver, ISO, and other styles
46

Babatunde, Olabenjo, and Omar Al-Debagy. "A Comparative Review Of Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6)." International Journal of Computer Trends and Technology 13, no. 1 (July 25, 2014): 10–13. http://dx.doi.org/10.14445/22312803/ijctt-v13p103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Cai, Jun, Jian-Zhen Luo, and Fangyuan Lei. "Analyzing Network Protocols of Application Layer Using Hidden Semi-Markov Model." Mathematical Problems in Engineering 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/9161723.

Full text
Abstract:
With the rapid development of Internet, especially the mobile Internet, the new applications or network attacks emerge in a high rate in recent years. More and more traffic becomes unknown due to the lack of protocol specifications about the newly emerging applications. Automatic protocol reverse engineering is a promising solution for understanding this unknown traffic and recovering its protocol specification. One challenge of protocol reverse engineering is to determine the length of protocol keywords and message fields. Existing algorithms are designed to select the longest substrings as protocol keywords, which is an empirical way to decide the length of protocol keywords. In this paper, we propose a novel approach to determine the optimal length of protocol keywords and recover message formats of Internet protocols by maximizing the likelihood probability of message segmentation and keyword selection. A hidden semi-Markov model is presented to model the protocol message format. An affinity propagation mechanism based clustering technique is introduced to determine the message type. The proposed method is applied to identify network traffic and compare the results with existing algorithm.
APA, Harvard, Vancouver, ISO, and other styles
48

Silva, Daniel, Liliana I. Carvalho, José Soares, and Rute C. Sofia. "A Performance Analysis of Internet of Things Networking Protocols: Evaluating MQTT, CoAP, OPC UA." Applied Sciences 11, no. 11 (May 26, 2021): 4879. http://dx.doi.org/10.3390/app11114879.

Full text
Abstract:
IoT data exchange is supported today by different communication protocols and different protocolar frameworks, each of which with its own advantages and disadvantages, and often co-existing in a way that is mandated by vendor policies. Although different protocols are relevant in different domains, there is not a protocol that provides better performance (jitter, latency, energy consumption) across different scenarios. The focus of this work is two-fold. First, to provide a comparison of the different available solutions in terms of protocolar features such as type of transport, type of communication pattern support, security aspects, including Named-data networking as relevant example of an Information-centric networking architecture. Secondly, the work focuses on evaluating three of the most popular protocols used both in Consumer as well as in Industrial IoT environments: MQTT, CoAP, and OPC UA. The experimentation has been carried out first on a local testbed for MQTT, COAP and OPC UA. Then, larger experiments have been carried out for MQTT and CoAP, based on the large-scale FIT-IoT testbed. Results show that CoAP is the protocol that achieves across all scenarios lowest time-to-completion, while OPC UA, albeit exhibiting less variability, resulted in higher time-to-completion in comparison to CoAP or MQTT.
APA, Harvard, Vancouver, ISO, and other styles
49

Prof Dr Aftab Malik, Dr. Haroon Ur-Rashid Rashid, and Waqar Azeem. "ANALYSIS OF BORDER GATEWAY PROTOCOL, ITS TYPES AND MEASURES TO AVOID RISK." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 3 (September 30, 2019): 3–9. http://dx.doi.org/10.54692/lgurjcsit.2019.030379.

Full text
Abstract:
This is the age of digital communication. The process involves sending messages from one end of the network to other end using the internet, extranets and the Internet of Things (IOT) Technologies. Initially, the internet is a small community. But today internet becomes a global community as thousands of different administrative entities own and operate the internet. The process of transferring data across the network is known as routing. The process of routing is performed by using routers. Routers use certain protocols to achieve this task. The Broader Gateway Protocol (BGP) is an interdomain routing protocol that is used to connect two different autonomous systems. The autonomous system is collection of network that runs under a single administrative entity. This paper includes analysis and important techniques of border gateway protocol, types of BGP, its attributes, security threats and measures to avoid risks.
APA, Harvard, Vancouver, ISO, and other styles
50

Oniga, Bogdan, Leon Denis, Vasile Dadarlat, and Adrian Munteanu. "Message-Based Communication for Heterogeneous Internet of Things Systems." Sensors 20, no. 3 (February 6, 2020): 861. http://dx.doi.org/10.3390/s20030861.

Full text
Abstract:
The Internet of Things (IoT) domain presents a wide spectrum of technologies for building IoT applications. The requirements are varying from one application to another granting uniqueness to each IoT system. Each application demands custom implementations to achieve efficient, secure and cost-effective environments. They pose a set of properties that cannot be addressed by a single-based protocol IoT network. Such properties are achievable by designing a heterogeneous IoT system, which integrates diverse IoT protocols and provides a network management solution to efficiently manage the system components. This paper proposes an IoT message-based communication model applied atop the IoT protocols in order to achieve functional scalability and network management transparency agnostic to the employed communication protocol. The paper evaluates the proposed communication model and proves its functional scalability in a heterogeneous IoT system. The experimental assessment compares the payload size of the proposed system with respect to the LwM2M standard, a protocol designed specifically for IoT applications. In addition, the paper discusses the energy consumption introduced by the proposed model as well as the options available to reduce such impact.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography