Academic literature on the topic 'IP (Computer network protocol)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IP (Computer network protocol).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "IP (Computer network protocol)"

1

Neeru Kumari and Dr. Tilak Raj. "OSPF Metric Convergence and Variation Analysis During Redistribution with Routing Information Protocol." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 06 (June 22, 2024): 1985–91. http://dx.doi.org/10.47392/irjaem.2024.0293.

Full text
Abstract:
Open Shortest Path First networking protocol falls under the category of Interior gateway routing protocols and is multi-vendor supported. The task of OSPF like any other routing protocol is to calculate the best path between source IP address and destination IP address within the organisation computer network. There are various other routing protocols like Routing Information Protocol, Border Gateway Protocol, Intermediate System - Intermediate System (IS-IS), Enhanced Interior Gateway Routing Protocol, etc. which are used in computer network. Routing protocols have different algorithms through which they compute the best path selection criteria. OSPF because of its flexible design is often used with other routing protocol over the large network. This research focuses on the working of OSPF metric value variation and convergence for best path selection using network simulation tool like Cisco Packet Tracer tool for getting similar outcome just like a real networking device like router working in a real production environment. This research would use multiple combinations of OSPF metric calculation for routes learned from other routing protocols like Routing Information Protocol (RIP). Being able to correctly identify metric values obtain by testing with OSPF and other routing protocols and analysis them for best path selection.
APA, Harvard, Vancouver, ISO, and other styles
2

KOVACIK, Cyril Filip, and Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK." Acta Electrotechnica et Informatica 1335-8243, no. 1338-3957 (June 9, 2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.

Full text
Abstract:
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end devices, determination of the operational properties of this implementation, and their comparison in different conditions. VoIP traffic is compared at different bandwidths and implemented by different configurations of IP protocols. By investigated implementations of IP protocols are meant IPv4, IPv6, and IPv4 protocol with applied NAT. As part of the application of various IP protocols is also compared VoIP communication with a video stream on a local basis. The conclusion of the paper is devoted to the graphical evaluation of these observations and to draw conclusions based on them.
APA, Harvard, Vancouver, ISO, and other styles
3

Alfaresa, Yuansa, Bongga Arifwidodo, and Fauza Khair. "Automate IGP and EGP Routing Protocol Configuration using a Network Automation Library." Jurnal Online Informatika 8, no. 2 (December 28, 2023): 222–31. http://dx.doi.org/10.15575/join.v8i2.1157.

Full text
Abstract:
Data communication is sending data from client to client through a computer network. The increasing use of data communication makes computer networks more complex. Complex computer networks make it difficult for network administrators to configure them, especially routing protocol configuration. Network administrators are in charge of configuring routing protocols and managing networks. In addition, the more devices on the network, the greater the chance of human error from the administrator. Therefore, network automation is one solution that helps network administrators overcome this. This study focuses on analyzing the performance of network automation using the Paramiko and Telnetlib libraries. The routing protocol used by OSPF for IGP and BGP for EGP. The scenario in this study involves configuring IP addresses and configuring OSPF and BGP routing. Based on the test results, the Telnetlib library is better than the Paramiko library in terms of script delivery time, convergence time, and delay by 19.237% when applied to the IGP and EGP routing protocols.
APA, Harvard, Vancouver, ISO, and other styles
4

Rafif Abyakto, Naif Baihaqi, M. Aldi Firdaus, Salsabila Aulia, and Didik Aribowo. "Simulasi TCP-IP Menggunakan Topologi Bus." Uranus : Jurnal Ilmiah Teknik Elektro, Sains dan Informatika 2, no. 2 (May 11, 2024): 07–14. http://dx.doi.org/10.61132/uranus.v2i2.97.

Full text
Abstract:
One important technique for understanding and analyzing computer network performance is TCP/IP simulacrum. In this research, we simulate a TCP/IP network using the bus topology as a model. We use the Cisco Packet Tracer simulated network topology builder to create a bus topology and implement the TCP/IP protocol. The simulation results provide more accurate understanding of how the TCP/IP protocol functions within a bus network. We analyze network performance in terms of throughput, latency, and packet loss. The analysis's findings indicate that bus topologies have a certain amount of leeway in network operations, particularly when a collision occurs. However, this simulation offers a valuable tool to improve computer network design and management.
APA, Harvard, Vancouver, ISO, and other styles
5

YIMING, ALIMUJIANG, and TOSHIO EISAKA. "A SWITCHED ETHERNET PROTOCOL FOR HARD REAL-TIME EMBEDDED SYSTEM APPLICATIONS." Journal of Interconnection Networks 06, no. 03 (September 2005): 345–60. http://dx.doi.org/10.1142/s0219265905001460.

Full text
Abstract:
This paper presents a protocol to support hard real-time traffic of end-to-end communication over non real-time LAN technology. The network is set up with nodes and switches, and real-time communication is handled by software (protocol) added between the Ethernet protocols and the TCP/IP suite. The proposed protocol establishes a virtual circuit based on admission control and manages hard real-time traffic to bypass the TCP/IP stack. This makes considerably reduce the dwell time in the nodes, and increase the achievable data frame rate. After the bypassing, traffic schedule is performed according to dynamic-priority EDF algorithm. The work does not need any modifications in the Ethernet hardware and coexists with TCP/IP suites, and then the LAN with the protocol can be connected to any existing Ethernet networks. It can be adopted in industrial hard real-time applications such as embedded systems, distributed control systems, parallel signal processing and robotics. We have performed some experiments to evaluate the protocol. Compared to some conventional hard real-time network protocols, the proposed one has better real-time performances and meets the requirements of reliability for hard real-time systems.
APA, Harvard, Vancouver, ISO, and other styles
6

Bein, Adrian Sean, and Alexander Williams. "Networking IP Restriction filtering and network address." IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, no. 2 (April 30, 2020): 172–77. http://dx.doi.org/10.34306/itsdi.v1i2.149.

Full text
Abstract:
Permissions setting on a computer is necessary. This is an effort that is not easy to change the system configuration or settings changed by the user. With a network of computers, of course, permissions settings do not need to be done one by one manually. Because in a computer network course there are many collections of computers connected together. Permissions setting so that the system can use the client-server applications that access restrictions can be done effectively. As the implementation of client-server applications can be created using Visual Basic 6.0. This language has been able to access the socket on the Windows operating system, named Winsock API that supports TCP / IP. This protocol is widely used because of the reliability of client-server application programming. The application is divided into two main applications, namely the client and server program name with the name of the Receiver Sender program. Receiver function receives instructions restriction of access rights Sender and sends reports to the Sender process execution. While Sender functions to send instructions restrictions permissions via the Registry to the Receiver. And after the test, the application can block important features available in the Windows operating system. So it is expected that these applications can help in permissions setting on a computer network.
APA, Harvard, Vancouver, ISO, and other styles
7

Upadhyay, Paramesh C., and Sudarshan Tiwari. "Network Layer Mobility Management Schemes for IP-Based Mobile Networks." International Journal of Mobile Computing and Multimedia Communications 2, no. 3 (July 2010): 47–60. http://dx.doi.org/10.4018/jmcmc.2010070104.

Full text
Abstract:
Mobility is a natural phenomenon in cellular networks. The worldwide popularity of mobile communications and Internet has necessitated the merger of the two fast growing technologies to get their fullest advantages. The Internet protocol (IP) was designed for static hosts only. Therefore, in order to add mobility in Internet, the Internet protocol needs to be redefined. This paper is intended to present an overview of various mobility management schemes, available in literature, for IP-based mobile networks.
APA, Harvard, Vancouver, ISO, and other styles
8

Hu, Yao, Ting Peng, and Lianming Zhang. "Software-Defined Congestion Control Algorithm for IP Networks." Scientific Programming 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/3579540.

Full text
Abstract:
The rapid evolution of computer networks, increase in the number of Internet users, and popularity of multimedia applications have exacerbated the congestion control problem. Congestion control is a key factor in ensuring network stability and robustness. When the underlying network and flow information are unknown, the transmission control protocol (TCP) must increase or reduce the size of the congestion window to adjust to the changes of traffic in the Internet Protocol (IP) network. However, it is possible that a software-defined approach can relieve the network congestion problem more efficiently. This approach has the characteristic of centralized control and can obtain a global topology for unified network management. In this paper, we propose a software-defined congestion control (SDCC) algorithm for an IP network. We consider the difference between TCP and the user datagram protocol (UDP) and propose a new method to judge node congestion. We initially apply the congestion control mechanism in the congested nodes and then optimize the link utilization to control network congestion.
APA, Harvard, Vancouver, ISO, and other styles
9

Hammoudi, Modhar A. "Building Model for the University of Mosul Computer Network Using OPNET Simulator." Tikrit Journal of Engineering Sciences 18, no. 2 (June 30, 2011): 34–44. http://dx.doi.org/10.25130/tjes.18.2.04.

Full text
Abstract:
This paper aims at establishing a model in OPNET (Optimized Network Engineering Tool) simulator for the University of Mosul computer network. The proposed network model was made up of two routers (Cisco 2600), core switch (Cisco6509), two servers, ip 32 cloud and 37 VLANs. These VLANs were connected to the core switch using fiber optic cables (1000BaseX). Three applications were added to test the network model. These applications were FTP (File Transfer Protocol), HTTP (Hyper Text Transfer Protocol) and VoIP (Voice over Internet Protocol). The results showed that the proposed model had a positive efficiency on designing and managing the targeted network and can be used to view the data flow in it. Also, the simulation results showed that the maximum number of VoIP service users could be raised up to 5000 users when working under IP Telephony. This means that the ability to utilize VoIP service in this network can be maintained and is better when subjected to IP telephony scheme
APA, Harvard, Vancouver, ISO, and other styles
10

Stepanov, P. P., G. V. Nikonova, T. S. Pavlyuchenko, and V. V. Soloviev. "Features of Address Resolution Protocol Operation in Computer Networks." Programmnaya Ingeneria 13, no. 5 (May 16, 2022): 211–18. http://dx.doi.org/10.17587/prin.13.211-218.

Full text
Abstract:
The paper analyzes the network protocols of computer networks to identify potential vulnerabilities at the software level. The conditions for carrying out a man-in-the-middle attack in networks using the Address Resolution Protocol (ARP) are investigated. Such attacks are of a rather dangerous type, since they are based on the shortcomings of the ARP protocol. A detailed analysis of the stages of the attack and the sequence of impact on the attacked node is given. The technology of ARP spoofing (poisoning) and methods that allow one to infiltrate an existing connection and communication process are examined in detail. An implementation of an ARP spoofing attack in the Python and C# programming languages using the Soapy and SharpPcap libraries is presented. Examples of implementation of denial-of-service (DoS) attacks in a peer-to-peer network using the ARP protocol in C# are given. The article also describes examples of man-in-the-middle attacks associated with various protocols and infiltration into the address space of routers, such as DHCP (a protocol that dynamically assigns an IP address to a client computer) spoofing and ICMP (Internet Control Message Protocol) redirection. Methods for hacking a router and substituting a MAC address and examples of scripts that implement: sending a fake ARP packet; a function for performing a DoS attack; changing the Linux MAC address; router hacks, are presented in the article.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "IP (Computer network protocol)"

1

Nematbakhsh, Mohammadali. "TCP/IP PROTOCOL BOARD USING SINGLE CHIP PROCESSOR." Thesis, The University of Arizona, 1985. http://hdl.handle.net/10150/275389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Carter, Steven Michael. "Implementation and analysis of the IP measurement protocol (IPMP)." Master's thesis, Mississippi State : Mississippi State University, 2001. http://library.msstate.edu/etd/show.asp?etd=etd-11152001-090121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhao, Ting. "Fast IP lookup engine /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20ZHAOT.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mustell, Eliot John. "Internet Protocol Version 6: The Next Generation?" [Milwaukee, Wis.] : e-Publications@Marquette, 2009. http://epublications.marquette.edu/theses_open/23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ramasubramaniam, Venkata Lakshmanan. "A framework for reliable multicast protocol." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wu, Chen. "A new TCP protocol based on end-to-end available bandwidth measurement /." View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202005%20WU.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Arpaci, Mutlu. "Congestion avoidance in TCP/IP networks." Diss., Georgia Institute of Technology, 2001. http://hdl.handle.net/1853/15356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ahmed, Mahad A. (Mahad Mohamed) 1973 Carleton University Dissertation Engineering Systems and Computer. "Performance analysis and improvement of the Open Shortest Path First routing protocol." Ottawa.:, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bickhart, Ryan W. "Transparent TCP-to-SCTP translation shim layer." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 0.44 Mb, 82 p, 2005. http://wwwlib.umi.com/dissertations/fullcit/1428177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Williams, James Pate. "A quantitative study of musical instrument digital interface (MIDI) over Internet Protocol (IP) protocols." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Fall/Dissertation/WILLIAMS_JAMES_14.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "IP (Computer network protocol)"

1

Cameron, Deb, ed. TCP/IP Network Administration. Beijing: O’Reilly Media, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hunt, Craig. TCP/IP Network Administration. Sebastopol, CA: O’Reilly Media, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Blank, Andrew G. TCP/IP JumpStart. New York: John Wiley & Sons, Ltd., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Forouzan, Behrouz A. TCP/IP protocol suite. Boston: McGraw-Hill, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Osterloh, Heather. TCP/IP primer plus. Indianapolis, Ind: Sams, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Forouzan, Behrouz A. TCP/IP protocol suite. 2nd ed. Boston: McGraw-Hill, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hunt, Craig. TCP/IP Network Administration. Edited by Mike Loukides and Debra Cameron. 3rd ed. Beijing: O’Reilly Media, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hunt, Craig. TCP/IP Network Administration. Sebastopol, CA: O’Reilly Media, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hunt, Craig. TCP/IP Network Administration. 3rd ed. Sebastopol, CA: O’Reilly Media, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Loukides, Mike, and Gigi Estabrook, eds. TCP/IP Network Administration. 2nd ed. Beijing: O’Reilly Media, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "IP (Computer network protocol)"

1

Skurowski, Przemysław, Robert Wójcicki, and Zbigniew Jerzak. "Evaluation of IP Transmission Jitter Estimators Using One-Way Active Measurement Protocol (OWAMP)." In Computer Networks, 153–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13861-4_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yew, Kok Meng, R. M. Zahidur, and Sai Peck Lee. "Mean Time Offset Protocol for Cluster of Auction Servers Over TCP/IP Network." In Lecture Notes in Computer Science, 323–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-46652-9_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Siddiqi, Amir, and Biswajit Nandy. "Improving Network Convergence Time and Network Stability of an OSPF-Routed IP Network." In NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 469–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11422778_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tsolakou, E., E. Nikolouzou, and S. Venieris. "On Providing End-To-End QoS Introducing a Set of Network Services in Large-Scale IP Networks." In NETWORKING 2002: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications, 1227–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-47906-6_112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Elahi, Ata, and Alex Cushman. "Voice over Internet Protocols (Voice over IP)." In Computer Networks, 229–41. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-42018-4_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

de Alencar, Marcelo Sampaio. "The TCP/IP Protocol." In Cryptography and Network Security, 135–57. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003337768-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wozniak, Jozef, Przemyslaw Machan, Krzysztof Gierlowski, Michal Hoeft, and Michal Lewczuk. "Comparative Analysis of IP-Based Mobility Protocols and Fast Handover Algorithms in IEEE 802.11 Based WLANs." In Computer Networks, 87–101. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21771-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Weik, Martin H. "network management protocol." In Computer Science and Communications Dictionary, 1088. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Marchette, David J. "TCP/IP Networking." In Computer Intrusion Detection and Network Monitoring, 3–42. New York, NY: Springer New York, 2001. http://dx.doi.org/10.1007/978-1-4757-3458-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kong, Ki-Sik, Ui-Sung Song, Jin-Su Kim, and Chong-Sun Hwang. "Performance Analysis of IP Mobility Protocols in Wireless Mobile Networks." In Lecture Notes in Computer Science, 412–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25969-5_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "IP (Computer network protocol)"

1

Gazdar, A., and A. Belghith. "A Discrete Optimal Broadcasting Protocol in an IP Network." In IEEE International Conference on Computer Systems and Applications, 2006. IEEE, 2006. http://dx.doi.org/10.1109/aiccsa.2006.205222.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kleptsov, M. Y., and M. V. Katina. "A METHOD FOR DETECTING AND PREVENTING ARP-SPOOFING ATTACKS ON A COMPUTER NETWORK." In Intelligent transport systems. Russian University of Transport, 2024. http://dx.doi.org/10.30932/9785002446094-2024-611-616.

Full text
Abstract:
The ARP-spoofing (Address Resolution Protocol- spoofing) cyberattack nowadays poses a serious threat to the security of computer networks (CS). It is based on the abuse of the ARP protocol, which is responsible for matching IP addresses and physical MAC addresses in local networks. Using this type of attack, an attacker can intercept, redirect and even modify network traffic between devices, leading to serious negative consequences, such as reducing the confidentiality of transmitted data, introducing malware and spoofing network traffic. In the context of the constant development of information technology, the relevance and importance of this problem is increasing, especially for organizations and users of networks working in the logistics and transport. Transport has become a leader in the growth rate of fishing attacks. In this industry, by the end of 2023, the share of attacks of this type increased 2.4 times. This is the data of the BI.ZONE company. Based on the above, the main purpose of this article is, based on the analysis of methods of substitution and distortion of ARP records of the network infrastructure, to propose ways to protect against ARP spoofing, which are based on monitoring ARP records.
APA, Harvard, Vancouver, ISO, and other styles
3

LENARDIC, DANIEL Z., BRANKA ZOVKO-CIHLAR, and MISLAV GRGIC. "ANALYSIS OF TCP/IP PROTOCOL BEHAVIOUR IN A CONGESTED MULTIMEDIA COMPUTER NETWORK." In Proceedings of the 9th International Workshop on Systems, Signals and Image Processing. WORLD SCIENTIFIC, 2002. http://dx.doi.org/10.1142/9789812776266_0007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bai, Jin, Salim Hariri, and Youssif Al-Nashif. "A Network Protection Framework for DNP3 over TCP/IP protocol." In 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2014. http://dx.doi.org/10.1109/aiccsa.2014.7073172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Makaya, Christian, and Samuel Pierre. "Handoff Protocol for Heterogeneous All-IP-based Wireless Networks." In 2006 Canadian Conference on Electrical and Computer Engineering. IEEE, 2006. http://dx.doi.org/10.1109/ccece.2006.277808.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Aksoy, Ahmet, and Mehmet Hadi Gunes. "Operating System Classification Performance of TCP/IP Protocol Headers." In 2016 IEEE 41st Conference on Local Computer Networks: Workshops (LCN Workshops). IEEE, 2016. http://dx.doi.org/10.1109/lcn.2016.036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

T., Charan Raj, Kumar Raja V., Suresh Kumar S., and Vamsi Krishna P. "Usage of Internet Protocal (IP) Network in Digital Library." In International Conference on Computer Applications — Networking. Singapore: Research Publishing Services, 2010. http://dx.doi.org/10.3850/978-981-08-7301-1_1410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liu Jiong, Zhang Jingbin, Han Kun, Chen Guang, Sun Pengchun, and Feng Yeti. "A new data link layer protocol for satellite IP networks." In 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC). IEEE, 2013. http://dx.doi.org/10.1109/mec.2013.6885388.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Rawi, Akram, and Azzedine Lansari. "Effect of Windows XP Firewall on Network Simulation and Testing." In InSITE 2007: Informing Science + IT Education Conference. Informing Science Institute, 2007. http://dx.doi.org/10.28945/3170.

Full text
Abstract:
The objective of this paper is to report findings from simulating and testing local area network (LAN) connectivity using Windows XP operating system and Cisco Networking Academy network devices. In this study, a simple routing protocol, RIP, is used as routing protocol. Two different techniques, Cisco Networking Academy hardware lab and Cisco Packet Tracer 4, were used to compare their performance to simulate network connectivity. Primary findings showed that the settings of the Windows XP firewall on the host computer have a direct impact on the test results. These findings are critical as there are no similar reports in the literature and only a careful investigation allowed the researchers to come to this conclusion. Furthermore, study results also offer suggestions for fixing problems that hinder simulation results of LANs that use Windows XP workstations. These findings can help CCNA students and faculty understand the reasons for unexplained connectivity problems when performing CCNA labs. The study also provides a simple method to avoid connectivity problems when using Windows ping.exe and tracert.exe which implement the TCP/IP protocol ICMP
APA, Harvard, Vancouver, ISO, and other styles
10

Munir, M. S., K. Ahmed, A. S. M. Shihavuddin, S. M. Nizamuddin, and M. J. Sarker. "A new SS7-SIGTRAN protocol interchanger software and hardware to implement an improved distributed database based ATM network using existing IP network." In 2008 11th International Conference on Computer and Information Technology (ICCIT). IEEE, 2008. http://dx.doi.org/10.1109/iccitechn.2008.4803027.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "IP (Computer network protocol)"

1

Holdrege, M., and P. Srisuresh. Protocol Complications with the IP Network Address Translator. RFC Editor, January 2001. http://dx.doi.org/10.17487/rfc3027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kazovsky, Leonid G., Ian White, Matt Rogge, Kapil Shrikhande, and Erie Hu. Internet Protocol-Hybrid Opto-Electronic Ring Network (IP-HORNET): A Novel Internet Protocol-Over-Wavelength Division Multiplexing (IP-Over-WDM) Multiple-Access Metropolitan Area Network (MAN). Fort Belvoir, VA: Defense Technical Information Center, April 2003. http://dx.doi.org/10.21236/ada415560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Johansson, O., G. Salgueiro, and V. Gurbani. Locating Session Initiation Protocol (SIP) Servers in a Dual-Stack IP Network. Edited by D. Worley. RFC Editor, September 2016. http://dx.doi.org/10.17487/rfc7984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cleveland, William S., Hui Chen, Bowei Xi, and Jin Cao. Internet Protocol (IP) Network Measurement, Characterization, Modeling, and Control for Self-Managed Networks. Fort Belvoir, VA: Defense Technical Information Center, September 2005. http://dx.doi.org/10.21236/ada439560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kastenholz, F. The Definitions of Managed Objects for the IP Network Control Protocol of the Point-to-Point Protocol. RFC Editor, June 1993. http://dx.doi.org/10.17487/rfc1473.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Callon, R. W., and H. W. Braun. Guidelines for the use of Internet-IP addresses in the ISO Connectionless-Mode Network Protocol. RFC Editor, June 1986. http://dx.doi.org/10.17487/rfc0986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Callon, R. W., and H. W. Braun. Guidelines for the use of Internet-IP addresses in the ISO Connectionless-Mode Network Protocol. RFC Editor, February 1989. http://dx.doi.org/10.17487/rfc1069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

LI, Zhendong, Hangjian Qiu, xiaoqian Wang, chengcheng Zhang, and Yuejuan Zhang. Comparative Efficacy of 5 non-pharmaceutical Therapies For Adults With Post-stroke Cognitive Impairment: Protocol For A Bayesian Network Analysis Based on 55 Randomized Controlled Trials. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, June 2022. http://dx.doi.org/10.37766/inplasy2022.6.0036.

Full text
Abstract:
Review question / Objective: This study will provide evidence-based references for the efficacy of 5 different non-pharmaceutical therapies in the treatment of post-stroke cognitive impairment(PSCI). 1. Types of studies. Only randomized controlled trials (RCTs) of Transcranial Magnetic Stimulation(TMS), Transcranial Direct Current Stimulation(tDCS), Acupuncture, Virtual Reality Exposure Therapy(VR) and Computer-assisted cognitive rehabilitation(CA) for PSCI will be recruited. Additionally, Studies should be available in full papers as well as peer reviewed and the original data should be clear and adequate. 2. Types of participants. All adults with a recent or previous history of ischaemic or hemorrhagic stroke and diagnosed according to clearly defined or internationally recognized diagnostic criteria, regardless of nationality, race, sex, age, or educational background. 3.Types of interventions and controls. The control group takes non-acupuncture treatment, including conventional rehabilitation or in combination with symptomatic support therapy. The experimental group should be treated with acupuncture on basis of the control group. 4.The interventions of the experimental groups were Transcranial Magnetic Stimulation(TMS), Transcranial Direct Current Stimulation(tDCS), Acupuncture, Virtual Reality Exposure Therapy(VR) or Computer-assisted cognitive rehabilitation(CA), and the interventions of the control group takes routine rehabilitation and cognition training or other therapies mentioned above that were different from the intervention group. 5.Types of outcomes. The primary outcomes are measured with The Mini-Mental State Examination (MMSE) and/or The Montreal Cognitive Assessment Scale (MoCA), which have been widely used to evaluate the cognitive abilities. The secondary outcome indicator was the Barthel Index (BI) to assess independence in activities of daily living (ADLs).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography