Academic literature on the topic 'Packet trace'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Packet trace.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Packet trace":

1

Yang, Ming Hour. "Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/239280.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Traceback schemes have been proposed to trace the sources of attacks that usually hide by spoofing their IP addresses. Among these methods, schemes using packet logging can achieve single-packet traceback. But packet logging demands high storage on routers and therefore makes IP traceback impractical. For lower storage requirement, packet logging and packet marking are fused to make hybrid single-packet IP traceback. Despite such attempts, their storage still increases with packet numbers. That is why RIHT bounds its storage with path numbers to guarantee low storage. RIHT uses IP header’s ID and offset fields to mark packets, so it inevitably suffers from fragment and drop issues for its packet reassembly. Although the 16-bit hybrid IP traceback schemes, for example, MORE, can mitigate the fragment problem, their storage requirement grows up with packet numbers. To solve the storage and fragment problems in one shot, we propose a single-packet IP traceback scheme that only uses packets’ ID field for marking. Our major contributions are as follows: (1) our fragmented packets with tracing marks can be reassembled; (2) our storage is not affected by packet numbers; (3) it is the first hybrid single-packet IP traceback scheme to achieve zero false positive and zero false negative rates.
2

ARYANTA, DWI, and BAYU AGUNG PRANATA. "Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 2, no. 2 (July 1, 2014): 85. http://dx.doi.org/10.26760/elkomika.v2i2.85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
ABSTRAKOSPF (Open Shortest Path First) dan EIGRP (Enhanced Interior Gateway Routing Protocol) adalah dua routing protokol yang banyak digunakan dalam jaringan komputer. Perbedaan karakteristik antar routing protokol menimbulkan masalah dalam pengiriman paket data. Teknik redistribution adalah solusi untuk melakukan komunikasi antar routing protokol. Dengan menggunakan software Cisco Packet Tracer 5.3 pada penelitian ini dibuat simulasi OSPF dan EIGRP yang dihubungkan oleh teknik redistribution, kemudian dibandingkan kualitasnya dengan single routing protokol EIGRP dan OSPF. Parameter pengujian dalam penelitian ini adalah nilai time delay dan trace route. Nilai trace route berdasarkan perhitungan langsung cost dan metric dibandingkan dengan hasil simulasi. Hasilnya dapat dilakukan proses redistribution OSPF dan EIGRP. Nilai delay redistribution lebih baik 1% dibanding OSPF dan 2-3% di bawah EIGRP tergantung kepadatan traffic. Dalam perhitungan trace route redistribution dilakukan 2 perhitungan, yaitu cost untuk area OSPF dan metric pada area EIGRP. Pengambilan jalur utama dan alternatif pengiriman paket berdasarkan nilai cost dan metric yang terkecil, hal ini terbukti berdasarkan perhitungan dan simulasi.Kata kunci: OSPF, EIGRP, Redistribution, Delay, Cost, Metric.ABSTRACTOSPF (Open Shortest Path First) and EIGRP (Enhanced Interior Gateway Routing Protocol) are two routing protocols are widely used in computer networks. Differences between the characteristics of routing protocols pose a problem in the delivery of data packets. Redistribution technique is the solution for communication between routing protocols. By using the software Cisco Packet Tracer 5.3 in this study were made simulating OSPF and EIGRP redistribution linked by technique, then compared its quality with a single EIGRP and OSPF routing protocols. Testing parameters in this study is the value of the time delay and trace route. Value trace route based on direct calculation of cost and metric compared with the simulation results. The result can be OSPF and EIGRP redistribution process. Value delay redistribution 1% better than OSPF and EIGRP 2-3% under traffic density dependent. In calculating the trace route redistribution is done 2 calculations, the cost for OSPF area and the area of the EIGRP metric. Making primary and alternate paths based on the packet delivery rate and the cost of the smallest metric, it is proved by calculation and simulation.Keywords: OSPF, EIGRP, Redistribution, Delay, Cost, Metric.
3

Pang, Ruoming, Mark Allman, Vern Paxson, and Jason Lee. "The devil and packet trace anonymization." ACM SIGCOMM Computer Communication Review 36, no. 1 (January 10, 2006): 29–38. http://dx.doi.org/10.1145/1111322.1111330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dennis, Simone, and Helen Alexiou. "(Re)making smoking: Of packets and practice." Journal of Material Culture 23, no. 4 (September 29, 2018): 459–71. http://dx.doi.org/10.1177/1359183518799537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Taking as foundational the well-established anthropological idea that material things can be determinative of expectations and practice, the authors advance the notion that packets are constitutive of smoking in the era of smokefree legislation. Adorned with warnings, graphic messaging and particular colouration, they say that packets do not simply respond to the ‘problem’ of smoking; they are actively involved in remaking it anew, in, with and for the smokefree context, in which smoking is purposefully denormalized. Focusing in the main on the graphic images that ‘plain’ packets bear, they track and trace this constitutional force via sensory means, attending particularly to a reworking of the role presently accorded to vision in the Australian government’s public health ‘view’ that assumes a stark separation between the cigarette packet and the respondent smoker.
5

ARYANTA, DWI, ARSYAD RAMADHAN DARLIS, and DIMAS PRIYAMBODHO. "Analisis Kinerja EIGRP dan OSPF pada Topologi Ring dan Mesh." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 2, no. 1 (January 1, 2014): 53. http://dx.doi.org/10.26760/elkomika.v2i1.53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
ABSTRAKEIGRP (Enhanced Interior Gateway Routing Protocol) dan OSPF (Open Shortest Path Fisrt) adalah routing protokol yang banyak digunakan pada suatu jaringan komputer. EIGRP hanya dapat digunakan pada perangkat Merk CISCO, sedangkan OSPF dapat digunakan pada semua merk jaringan. Pada penelitian ini dibandingkan delay dan rute dari kedua routing protokol yang diimplementasikan pada topologi Ring dan Mesh. Cisco Packet Tracer 5.3 digunakan untuk mensimulasikan kedua routing protokol ini. Skenario pertama adalah perancangan jaringan kemudian dilakukan pengujian waktu delay 100 kali dalam 5 kasus. Skenario kedua dilakukan pengujian trace route untuk mengetahui jalur yang dilewati paket data lalu memutus link utama. Pada skenario kedua juga dilakukan perbandingan nilai metric dan cost hasil simulasi dengan perhitungan rumus. Skenario ketiga dilakukan pengujian waktu konvergensi untuk setiap routing protokol pada setiap topologi. Hasilnya EIGRP lebih cepat 386 µs daripada OSPF untuk topologi Ring sedangkan OSPF lebih cepat 453 µs daripada EIGRP untuk topologi Mesh. Hasil trace route menunjukan rute yang dipilih oleh routing protokol yaitu nilai metric dan cost yang terkecil. Waktu konvergensi rata-rata topologi Ring pada EIGRP sebesar 12,75 detik dan 34,5 detik pada OSPF sedangkan topologi Mesh di EIGRP sebesar 13 detik dan 35,25 detik di OSPF.Kata Kunci: EIGRP, OSPF, Packet Tracer 5.3, Ring, Mesh, KonvergensiABSTRACTEIGRP (Enhanced Interior Gateway Routing Protocol) and OSPF (Open Shortest Path Fisrt) is the routing protocol that is widely used in a computer network. EIGRP can only be used on devices Brand CISCO, while OSPF can be used on all brands of network. In this study comparison of both the delay and the routing protocol implemented on Ring and Mesh topology. Cisco Packet Tracer 5.3 is used to simulate both the routing protocol. The first scenario is the design of the network and then do the test of time delay 100 times in 5 cases. The second scenario tested trace route to determine the path of the data packet and then disconnect the main link. In the second scenario also conducted a cost comparison of metrics and the simulation results with the calculation formula. The third scenario testing time for each routing protocol convergence on any topology. The result EIGRP faster than 386 microseconds for a ring topology while OSPF OSPF 453 microseconds faster than EIGRP for Mesh topology. The results showed trace route chosen by the routing protocol metric value and cost is the smallest. Average convergence time in the EIGRP topology Ring of 12.75 seconds and 34.5 seconds, while the Mesh topology in an OSPF EIGRP for 13 seconds and 35.25 seconds in OSPF.Keywords: EIGRP,OSPF, Packet Tracer 5.3, Ring, Mesh, Convergence
6

Paxson, Vern. "Automated packet trace analysis of TCP implementations." ACM SIGCOMM Computer Communication Review 27, no. 4 (October 1997): 167–79. http://dx.doi.org/10.1145/263109.263160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Et. al., Dr B. Shadaksharappa,. "Attack Prediction By Using Greedy Algorithm For Diminishing The Drop And Delay In Wireless Sensor Networks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 11, 2021): 1072–82. http://dx.doi.org/10.17762/turcomat.v12i6.2425.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The essential constraint of the internet is that forwarding the data packets of data among the restricted and trustworthy data nodes. If the receiver node is attacker node then it'll drop the data rather than forwarding the data to ensuing neighbor node. Therefore, efficient and secure data transmission is extremely necessary within the network data transmission. Each router node within the network can accept the data packets up to its buffer size only. Once the queue value reached the buffer threshold value then congestion can occur at the node. Once congestion happens then it would lose the data packets. By sending the data packets to the next neighbour node this problem will be resolved. This congestion will be handled by the Fully Distributed Congestion Control FDCC and Cooperative and Memory Efficient Token Bucket (CMTB) algorithms. Because the data is transmitted to the next neighbour node predicting the node behavior is extremely necessary because it is an attacker or the conventional transmitter node because it has to transmit the efficient data securely to the destination node. In this paper, the node behavior will be predicted by analyzing the trace file. The simulation results show that this proposed method would provide a lot of security in data transmission. The WSN comprises a group of sensor nodes that are disseminated on the network. These sensor nodes initially exchange their data packets to the near nodes to send the data packets to the target node. During the transmission of these data packets some data packets drop may also happen inside the network. This packet drop should be kept up as low as feasible for correct data transmission to the target node or destination node. This algorithm highlights the routes with high link quality, low packet delay and with low packet drop. Simulation results show that this proposed algorithm can provide the most effective path for transmitting the data to the destination meanwhile it reduces the packet drop and packet delay.
8

Memon, Mudasar Latif, Mukesh Kumar Maheshwari, Navrati Saxena, Abhishek Roy, and Dong Ryeol Shin. "Artificial Intelligence-Based Discontinuous Reception for Energy Saving in 5G Networks." Electronics 8, no. 7 (July 11, 2019): 778. http://dx.doi.org/10.3390/electronics8070778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
5G is expected to deal with high data rates for different types of wireless traffic. To enable high data rates, 5G employs beam searching operation to align the best beam pairs. Beam searching operation along with high order modulation techniques in 5G, exhausts the battery power of user equipment (UE). LTE network uses discontinuous reception (DRX) with fixed sleep cycles to save UE energy. LTE-DRX in current form cannot work in 5G network, as it does not consider multiple beam communication and the length of sleep cycle is fixed. On the other hand, artificial intelligence (AI) has a tendency to learn and predict the packet arrival-time values from real wireless traffic traces. In this paper, we present AI based DRX (AI-DRX) mechanism for energy efficiency in 5G enabled devices. We propose AI-DRX algorithm for multiple beam communications, to enable dynamic short and long sleep cycles in DRX. AI-DRX saves the energy of UE while considering delay requirements of different services. We train a recurrent neural network (RNN) on two real wireless traces with minimum root mean square error (RMSE) of 5 ms for trace 1 and 6 ms for trace 2. Then, we utilize the trained RNN model in AI-DRX algorithm to make dynamic short or long sleep cycles. As compared to LTE-DRX, AI-DRX achieves 69 % higher energy efficiency on trace 1 and 55 % more energy efficiency on trace 2, respectively. The AI-DRX attains 70 % improvement in energy efficiency for trace 2 compared with Poisson packet arrival model for λ = 1 / 20 .
9

Spiekermann, Daniel, and Jörg Keller. "Requirements for Crafting Virtual Network Packet Captures." Journal of Cybersecurity and Privacy 2, no. 3 (July 6, 2022): 516–26. http://dx.doi.org/10.3390/jcp2030026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Currently, network environments are complex infrastructures with different levels of security, isolation and permissions. The management of these networks is a complex task, faced with different issues such as adversarial attacks, user demands, virtualisation layers, secure access and performance optimisation. In addition to this, forensic readiness is a demanded target. To cover all these aspects, network packet captures are used to train new staff, evaluate new security features and improve existing implementations. Because of this, realistic network packet captures are needed that cover all appearing aspects of the network environment. Packet generators are used to create network traffic, simulating real network environments. There are different network packet generators available, but there is no valid rule set defining the requirements targeting packet generators. The manual creation of such network traces is a time-consuming and error-prone task, and the inherent behaviour of virtual networks eradicates a straight-forward automation of trace generation in comparison to common networks. Hence, we analyse relevant conditions of modern virtualised networks and define relevant requirements for a valid packet generation and transformation process. From this, we derive recommendations for the implementation of packet generators that provide valid and correct packet captures for use with virtual networks.
10

Liu, X., J. Xu, J. Yue, and S. L. Vadas. "Numerical modeling study of the momentum deposition of small amplitude gravity waves in the thermosphere." Annales Geophysicae 31, no. 1 (January 3, 2013): 1–14. http://dx.doi.org/10.5194/angeo-31-1-2013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract. We study the momentum deposition in the thermosphere from the dissipation of small amplitude gravity waves (GWs) within a wave packet using a fully nonlinear two-dimensional compressible numerical model. The model solves the nonlinear propagation and dissipation of a GW packet from the stratosphere into the thermosphere with realistic molecular viscosity and thermal diffusivity for various Prandtl numbers. The numerical simulations are performed for GW packets with initial vertical wavelengths (λz) ranging from 5 to 50 km. We show that λz decreases in time as a GW packet dissipates in the thermosphere, in agreement with the ray trace results of Vadas and Fritts (2005) (VF05). We also find good agreement for the peak height of the momentum flux (zdiss) between our simulations and VF05 for GWs with initial λz ≤ 2π H in an isothermal, windless background, where H is the density scale height. We also confirm that zdiss increases with increasing Prandtl number. We include eddy diffusion in the model, and find that the momentum deposition occurs at lower altitudes and has two separate peaks for GW packets with small initial λz. We also simulate GW packets in a non-isothermal atmosphere. The net λz profile is a competition between its decrease from viscosity and its increase from the increasing background temperature. We find that the wave packet disperses more in the non-isothermal atmosphere, and causes changes to the momentum flux and λz spectra at both early and late times for GW packets with initial λz ≥ 10 km. These effects are caused by the increase in T in the thermosphere, and the decrease in T near the mesopause.

Dissertations / Theses on the topic "Packet trace":

1

Shepard, Timothy Jason. "TCP packet trace analysis." Thesis, Massachusetts Institute of Technology, 1990. http://hdl.handle.net/1721.1/13577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1990.
Includes bibliographical references (leaves 66-67).
by Timothy Jason Shepard.
M.S.
2

Nilsson, Samuel, and Joakim Eriksson. "Estimating Application Energy Consumption Through Packet Trace Analysis." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-110348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The advancement of mobile clients and applications makes it possible for people to always stayconnected, sending and receiving data constantly. The nature of the 3G technology widelyused, however, causes a high battery drain in cellular phones and because of that a lot of toolsfor measuring mobile phones energy consumption has been developed. In this report we lookinto the trace-driven tool EnergyBox and find out how we can use it to estimate the energyconsumption of 3G transmissions for an application we’ve developed ourselves. We beginwith identifying the types of traffic our application generates and identify which parts of itmake up our applications background traffic. Different combinations of the identified traffictypes are looked into in order to decide which ones that need to be present in the packet tracesfor an estimation of our applications energy footprint for 3G transmission. Further, answersare sought to how long the time span should be for which the packet traces are collected andhow many of them are needed in order to draw a conclusion about our application’s energyfootprint. We conclude that all traffic types responsible for our application’s backgroundtraffic need to be present in the analyzed packet traces, and data suggests that collectingmore than 10 one minute packet traces does not improve accuracy significantly (less than1%). Without user interaction, our application generates traffic, which transmitted over 3G,drains as much as an average of 930mW, meaning that a Samsung Galaxy S4 battery with acapacity of 9.88Wh would last for a maximum of 10 hours and 30 minutes (excluding otherenergy consuming sources inside the handset).
3

Zhao, Song. "HTTP Traffic Analysis based on a Lossy Packet-level Trace." Case Western Reserve University School of Graduate Studies / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=case1373030307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Salvador, Mark A. Z. "Trace gas detection in hyperspectral imagery using the wavelet packet subspace." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (Ph.D.)--George Mason University, 2008.
Vita: p. 213. Thesis directors: Ronald G. Resmini, Richard B. Gomez. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computational Sciences and Informatics. Title from PDF t.p. (viewed July 3, 2008). Includes bibliographical references (p. 204-212). Also issued in print.
5

Tlaiss, Ziad. "Automated network packet traces analysis methods for fault recognition and TCP flavor identification." Electronic Thesis or Diss., Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2023. http://www.theses.fr/2023IMTA0384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Ces dernières années, le domaine du dépannage réseau a suscité un intérêt particulier de la part des chercheurs en raison de la complexité et de l’importance de cette tâche. Le travail présenté dans cette thèse se concentre sur l’automatisation du dépannage réseau à l’aide de mesures de performance extraites des captures de paquets. La première contribution de cette thèse réside dans l’extraction de caractéristiques permettant d’identifier la cause fondamentale d’une anomalie en analysant des traces de paquets TCP montrant des connexions médiocres. Nous avons classé quatre causes de dégradation fréquemment observées : les problèmes de transmission, les problèmes de congestion, les problèmes de gigue et les limitations d’application. La deuxième contribution de cette thèse réside dans le développement d’une méthode automatisée pour détecter l’instant de sortie de l’état Slow-Start. L’importance de cette méthode réside dans le gain de temps précieux dans l’analyse des problèmes réseau, étant donné que l’état Slow-Start est un indicateur clé pour le diagnostic des défauts. La troisième contribution de cette thèse consiste en l’identification de l’algorithme de contrôle de congestion BBR. L’objectif principal est de détecter si un contrôle de l’envoi des paquets (’pacing’) est utilisé dans une connexion TCP. Cette méthode repose sur la modélisation de la distribution de la durée de l’inter-paquet pendant l’état Slow-Start. L’objectif est de reconnaître les distributions monomodales de l’inter-paquet dans le cas de BBR par rapport aux distributions à deux composantes mélangées dans le cas de CUBIC
In recent years, the field of network troubleshooting has garnered significant attention from researchers due to the complexity and importance of this task. The work presented in this thesis focuses on automating network troubleshooting using performance metrics extracted from packet captures. The first contribution of this thesis lies in extracting features to identify the root cause of an anomaly by analyzing TCP packet traces with bad performance. We have categorized four frequently observed causes of degradation: transmission problems, congestion problems, jitter problems, and application-limited problems. The second contribution of this thesis involves developing an automated method to detect the moment of exiting the Slow-Start state. The significance of this method lies in saving valuable time in the analysis of network degradation, as the Slow-Start state serves as a key indicator for fault diagnosis. The third contribution of this thesis revolves around identifying the BBR congestion control algorithm. The primary goal of our approach is to detect whether packet pacing is employed in a TCP connection. This method relies on modeling the distribution of inter-packet duration during the Slow-Start state. The objective is to distinguish unimodal distributions of inter-packet intervals in the case of BBR compared to mixed two component distributions in the case of CUBIC
6

Ravichandran, Shruthi. "A user-friendly programming framework for wireless sensor networks." Thesis, Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Wireless sensor networks (WSNs) are increasingly being used for monitoring physical environments in lieu of tethered monitoring systems. Being power efficient and wirelessly accessible, WSNs find applications in a variety of domains like health, structural and climate monitoring systems. Despite such diverse use cases, more than often, WSNs are used by researchers with basic or no prior programming experience. Consequently, more time is spent learning to program the sensors than collecting and analysing domain-specific data. To cater to this generic user base, a multi-platform user-friendly programming framework for WSNs has been developed. This framework provides: 1) a visual network comparison tool that analyzes packet traces of two networks to generate a juxtaposed visual comparison of contrasting network characteristics, 2) a scripting language based on the TinyOS sensor network platform that aims at reducing code size and improving programming efficacy, and 3) a visual programming tool with basic sensor drag-and-drop modules for generating simple WSN programs. These tools were also developed to serve as a gentle introduction to the WSN programming environment for middle and high school students. In the absence of resources (sensors), the framework also allows programmers to verify program functionality by remotely simulating and verifying program behaviour in the OMNeT simulation environment.
7

Arancibia-Robert, Nicolas-Jose. "Paquets d'Arthur des représentations cohomologiques." Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066119/document.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Cette thèse a pour objectif de montrer que les paquets de représentations cohomologiques d’un groupe réductif classique quasi déployé, défini sur R, construits par J. Arthur coïncident avec les paquets précédemments définis de manière plus élémentaire et plus explicite par Adams et Johnson
The aim of this thesis is to prove that the packets of cohomological representation of quasi-split classical groups, defined over R, by Arthur coincide with the packets defined previously in a more elementary way by Adams and Johnson
8

Haneberg-Diggs, Dominique Miguel. "Seismic attributes of the Clinton interval reservoir in the Dominion East Ohio Gabor gas storage field near North Canton, Ohio." Wright State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=wright1418759184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hellström, Joakim. "Utvärdering av nätverkssimulering och enhetsemulering : GNS3 och Packet Tracer." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-25192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Denna rapport tar upp hur ett par olika programvaror, nämligen Packet Tracer och GNS3 kan användas för att simulera verklig utrustning i syftet att använda dessa hos ett företag i labbmiljö för att förbereda en implementation av ny hårdvara samtidigt som kostnaderna kan hållas nere, men också hur dessa programvaror kan användas i studiesyfte och använda som komplement till fysisk utrustning inför laborationer och examinationer i de olika kurserna som Cisco erbjuder. Det är också en utvärdering för att avgöra vilken av programvarorna som är den bästa att använda. En topologi sätts upp, komplett med IP-adressering med relativt vanlig konfiguration för att se hur dessa programvaror hanterar och klarar av dessa konfigurationer. Det visar sig att båda programvarorna presterar bra i de flesta fall, men de avbildningar av IOS som testats i GNS3 saknar stöd för PortSecurity som standard, så Packet Tracer tar titeln. Packet Tracer lämpar sig bäst för grundläggande studier med sina enkla paketspårningar medan GNS3 fungerar bättre för mer avancerade topologier med möjlighet till import av befintlig hårdvara. Nyckelord:  Cisco, Packet Tracer, GNS3, Simulering.
This report focuses on Packet Tracer and GNS3 and how these can be used to simulate real equipment at a company to prepare for implementation of new hardware while mitigating cost. It also shows how these can be used for educational purposes as a complement to real-world equipment for the courses held by Cisco. It’s also an evaluation of both softwares to decide which of them that is the best choise in a given scenario. A topology is created, complete with an IPaddressing table and fairly common configurations. The goal is to examine how the softwares behave and if they can handle the configurations. Both of them do well during testing, but the images of IOS that were tested in GNS3 do not support PortSecurity in its standard configuration so the title go to Packet Tracer. Packet Tracer is best suited for basic educational purposes because of its easy and understandable packet tracking abilities while GNS3 is better for more advanced topologies with support for importing pre-owned hardware.
10

Іванчук, Богдан Іванович, and Назарій Євгенович Бурак. "Особливості використання засобів Cisco Packet Tracer при вивченні комп'ютерних мереж." Thesis, Львівський державний університет безпеки життєдіяльності, 2020. http://hdl.handle.net/123456789/6994.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Packet trace":

1

Office, Montana Consumer Protection. Montana do-not-call list: Information packet. [Helena, Mont.]: Consumer Protection Office, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Roth, Jürgen. Makler des Todes: Wafffenhändler packen aus. Hamburg: Rasch und Röhring, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Horzepa, Stan. Getting on track with APRS: A hands-on guide to the automatic packet reporting system. Newington, CT: American Radio Relay League, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

H, Mathews Kenneth, and United States. Dept. of Agriculture. Economic Research Service., eds. U.S. beef industry: Cattle cycles, price spreads, and packer concentration. Washington, DC: U.S. Dept. of Agriculture, ERS, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

H, Mathews Kenneth, and United States. Dept. of Agriculture. Economic Research Service, eds. U.S. beef industry: Cattle cycles, price spreads, and packer concentration. Washington, DC: U.S. Dept. of Agriculture, ERS, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Griffen-Foley, Bridget. Sir Frank Packer, the young master: A biography. Sydney: HarperCollins, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

1962-, Fournier D. J., and Risk Reduction Engineering Laboratory (U.S.), eds. The Fate of trace metals in a rotary kiln incinerator with a Venturi/packed column scrubber. Cincinnati, OH: U.S. Environmental Protection Agency, Risk Reduction Engineering Laboratory, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vincenti, Serge. Caravane des Andes: L'expédition Lama, 3,500 kilomètres sur les trace des Incas. Paris: A. Michel, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

McCormick, Jane. Breaking my silence: Confessions of a rat pack party girl and sex-trade survivor. St. Paul, MN: Rapfire Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Morrison, Catherine J. Cost economies and market power in U.S. beef packing. [Oakland, Calif.]: Division of Agriculture and Natural Resources, California Agriculture Experiment Station, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Packet trace":

1

Weik, Martin H. "trace packet." In Computer Science and Communications Dictionary, 1801. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_19789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lee, Yeonhee, Wonchul Kang, and Youngseok Lee. "A Hadoop-Based Packet Trace Processing Tool." In Traffic Monitoring and Analysis, 51–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20305-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lukashin, Alexey, Leonid Laboshin, Vladimir Zaborovsky, and Vladimir Mulukha. "Distributed Packet Trace Processing Method for Information Security Analysis." In Lecture Notes in Computer Science, 535–43. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-10353-2_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jo, Jinyong, Jaiseung Kwak, and Okhwan Byeon. "MEET : Multicast Debugging Toolkit with End-to-End Packet Trace." In Advances in Multimedia Information Processing - PCM 2005, 441–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11582267_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bathula, Pooja Reddy, Snigdha Pv, Laasya Lata Anumakonda, Mohammed Mahaboob Basha, and Pandya Vyomal Naishadhkumar. "Home Automation Using Packet Tracer." In Advances in Communication, Devices and Networking, 611–23. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2004-2_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Seth, Sakshi, Visal Naqvi, Rishi Raj Dalmia, and Ruchi Tripathi. "Implementation of College Network Scenario Using Cisco Packet Tracer." In Proceedings of the 2nd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications, 337–48. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6407-6_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Min, and Xingjuan Li. "Design Scheme of Network Security Experiment Based on Packet Tracer." In Computer Science and Education, 318–26. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2446-2_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sabahi-Kaviani, Zeynab, Fatemeh Ghassemi, and Fateme Bajelan. "Automatic Transition System Model Identification for Network Applications from Packet Traces." In Fundamentals of Software Engineering, 212–27. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68972-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Utsav, Ankur, Amit Abhishek, Ratna Priya, and Harsha Wardhan. "IoT Implementation for CO2 Level Monitoring System Using CISCO Packet Tracer." In Algorithms for Intelligent Systems, 595–602. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6307-6_60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hoene, Christian, Sven Wiethölter, and Adam Wolisz. "Predicting the Perceptual Service Quality Using a Trace of VoIP Packets." In Quality of Service in the Emerging Networking Panorama, 21–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30193-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Packet trace":

1

Paxson, Vern. "Automated packet trace analysis of TCP implementations." In the ACM SIGCOMM '97 conference. New York, New York, USA: ACM Press, 1997. http://dx.doi.org/10.1145/263105.263160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rupp, Andy, Holger Dreger, Anja Feldmann, and Robin Sommer. "Packet trace manipulation rramework for test labs." In the 4th ACM SIGCOMM conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1028788.1028821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gad, Ruediger. "Improving Packet Capture Trace Import in Trace Compass with a Data Transformation DSL." In 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2017. http://dx.doi.org/10.1109/compsac.2017.145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Salvador, Mark Z., Ronald G. Resmini, and Richard B. Gomez. "Hyperspectral trace gas detection using the wavelet packet transform." In SPIE Defense and Security Symposium, edited by Sylvia S. Shen and Paul E. Lewis. SPIE, 2008. http://dx.doi.org/10.1117/12.777586.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rubio-Loyola, Javier, Dolors Sala, and Ali Ismail Ali. "Maximizing packet loss monitoring accuracy for reliable trace collections." In Metropolitan Area Networks (LANMAN). IEEE, 2008. http://dx.doi.org/10.1109/lanman.2008.4675845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhuqing Wan, Yongping Zhang, Tianjie Cao, Mingming Wu, and Fengjian Wang. "A novel Authenticated Packet Marking Scheme for IP Trace-back." In 2009 2nd IEEE International Conference on Computer Science and Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccsit.2009.5234375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fortner, Scott, and Geoffrey G. Xie. "DSSR: Balancing semantics and speed requirements in packet trace replay." In ICC 2017 - 2017 IEEE International Conference on Communications. IEEE, 2017. http://dx.doi.org/10.1109/icc.2017.7997257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pang, Ruoming, and Vern Paxson. "A high-level programming environment for packet trace anonymization and transformation." In the 2003 conference. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/863955.863994.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ogihara, Kazutaka. "Generating Block IO Trace Data from a Cloud Site Using Packet Capture and Analyzing the IO Trace Data." In 2019 Seventh International Symposium on Computing and Networking Workshops (CANDARW). IEEE, 2019. http://dx.doi.org/10.1109/candarw.2019.00086.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nitta, Christopher, Matthew Farrens, Kevin Macdonald, and Venkatesh Akella. "Inferring packet dependencies to improve trace based simulation of on-chip networks." In the Fifth ACM/IEEE International Symposium. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1999946.1999971.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Packet trace":

1

VonColln, E., and V. Gonchaaroff. Smoothing Disjoint Formant Track Boundaries Caused by Waveform Substitution in Packet Voice Communication. Fort Belvoir, VA: Defense Technical Information Center, May 1996. http://dx.doi.org/10.21236/ada311062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wheeler, E., A. Erler, and A. Seiler. Report on Qiagen Columns with Precipitation versus Packed Bed Technology for Trace Amounts of DNA. Office of Scientific and Technical Information (OSTI), February 2008. http://dx.doi.org/10.2172/929531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sorensen, K., E. Arroyo, A. Erler, A. Christian, D. Camp, and E. Wheeler. Comparison of Packed Beds and Qiagen Columns for Recovering Trace Amounts of B. anthracis DNA from Liquid Suspensions. Office of Scientific and Technical Information (OSTI), June 2006. http://dx.doi.org/10.2172/973645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jones, M. C., R. Nassimbene, J. Wolfe, and N. Frederick. Distributed measurements of tracer response on packed bed flows using a fiberoptic probe array. Final report. Office of Scientific and Technical Information (OSTI), October 1994. http://dx.doi.org/10.2172/72901.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Michalczewsky, Kathia, Alejandro Ramos Martínez, Paolo Giordano, and Barbara Ramos. Trade and Integration Monitor 2017: Beyond the Recovery: Competing for Market Share in the Digital Era (Infographic). Inter-American Development Bank, November 2017. http://dx.doi.org/10.18235/0006373.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In 2016 the value of Latin American and Caribbean exports contracted at a slower pace than that of world trade. This Infographic presents the analysis corresponding to the Trade and Integration Monitor 2017: Beyond Recovery: Competition for markets in the digital era.
6

Fuss, Melvyn, and Leonard Waverman. The Canada-U.S. Auto Pact of 1965: An Experiment in Selective Trade Liberalization. Cambridge, MA: National Bureau of Economic Research, June 1986. http://dx.doi.org/10.3386/w1953.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shi, Min, Yao Yao, Haifeng Ding, Jian Yang, Zhen Feng, Yingying Jiang, and Tao Guo. The Pharyngeal Packs for Dental and Otolaryngological Surgery: A Meta-analysis of High-quality RCTs. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, February 2023. http://dx.doi.org/10.37766/inplasy2023.2.0002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Review question / Objective: To quantitatively evaluate the role of pharyngeal packing in dental and otolaryngological surgeries by meta-analysis Eligibility criteria: Trials were included if they met the following criteria: (1) high-quality randomized controlled trial; (2) application of pharyngeal pack was the only intervention; (3) investigations of dental and otolaryngological surgeries; (4) full English text could be identified; and (5) at least one available parametric indicator was addressed.The exclusion criteria were as follows: (1) low-quality RCT or non-RCT; (2) pharyngeal pack was not the only intervention or the comparison of different pack types; (3) full English text could not be traced; (4) absence of information on selected raw data; and (5) irrelevant studies, reviews, comments or clinical case reports.
8

Bergsen, Pepijn, Carolina Caeiro, Harriet Moynihan, Marianne Schneider-Petsinger, and Isabella Wilkinson. Digital trade and digital technical standards. Royal Institute of International Affairs, January 2022. http://dx.doi.org/10.55317/9781784135133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
There is increasing impetus for stronger cooperation between the US, EU and UK on digital technology governance. Drivers of this trend include the economic incentives arising from opportunities for digital trade; the ambition for digital technology governance to be underpinned by shared values, including support for a democratic, open and global internet; and the need to respond to geopolitical competition, especially from China. Two specific areas of governance in which there is concrete potential to collaborate, and in which policymakers have indicated significant ambitions to do so, are digital trade and digital technical standards. - To leverage strategic opportunities for digital trade, the US, EU and UK need to continue identifying and promoting principles based on shared values and agendas, and demonstrate joint leadership at the global level, including in the World Trade Organization (WTO) on e-commerce. - Policy actors in the US, EU and UK should work individually and collectively to build on the latest generation of digital trade agreements. This will help to promote closer alignment on digital rules and standards, and support the establishment of more up-to-date models for innovation and governance. - Collaborating on digital technical standards, particularly those underlying internet governance and emerging technologies, offers the US, EU and UK strategic opportunities to build a vision of digital technology governance rooted in multi-stakeholder participation and democratic values. This can provide a strong alternative to standards proposals such as China’s ‘New IP’ system. - Policy actors should seek to expand strategic cooperation on standards development among the US, EU and UK, among like-minded countries, and among states that are undecided on the direction of their technology governance, including in the Global South. They should also take practical steps to incorporate the views and expertise of the technology industry, the broader private sector, academia and civil society. By promoting best-practice governance models that are anticipatory, dynamic and flexible, transatlantic efforts for cooperation on digital regulation can better account for the rapid pace of technological change. Early evidence of this more forward-looking approach is emerging through the EU’s proposed regulation of digital services and artificial intelligence (AI), and in the UK’s proposed legislation to tackle online harms. The recently launched EU-US Trade and Technology Council is a particularly valuable platform for strengthening cooperation in this arena. But transatlantic efforts to promote a model of digital governance predicated on democratic values would stand an even greater chance of success if the council’s work were more connected to efforts by the UK and other leading democracies
9

Gonzales, Anthony Peter. CARICOM Report No. 1 (2002). Inter-American Development Bank, January 2002. http://dx.doi.org/10.18235/0008586.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The overall purpose of the report is to appraise progress towards deeper integration among the member states of the Caribbean Community and Common Market (CARICOM). More specifically, and with particular reference to the goals of the CARICOM Single Market and Economy (CSME), it seeks to assess the depth of market integration and functional cooperation by examining the state of policy coordination and harmonization, the level of institutional development, and the degree of capacity sharing. The study also addresses CARICOM's pace of widening and its integration into the world economy, against the backdrop of trends in international trade negotiations.
10

Basco, Ana Inés. Techno-integration of Latin America: institutions, exponential trade, and equality in the era of algorithms. Inter-American Development Bank, November 2017. http://dx.doi.org/10.18235/0010684.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
As part of a Regional Public Good (BPR), 20,200 Latin Americans from 18 countries were interviewed on issues of integration, democracy, equity, environment, technology, and innovation. In a world where globalization is being strongly questioned, particularly among developed countries, it is concluded that Latin Americans are very committed to regional integration. The integration process is challenged by the complexity implied by a heterogeneous regional structure with important differences between countries and within them. The differences are many, ranging from income distribution, productive specialization, the weight of their economies in the regional GDP, belonging to different trade blocs, the preference for certain partners at the time of closer ties, exposure and vulnerability to climate change, to the degree of penetration of ICTs. However, this study shows that there is a common agenda that must be addressed and that can set the pace of regional integration. Social convergence is observed not only in the high support for regional integration and in the existence of an unsatisfied demand for integration, but also in the desire of people to live in a more equitable society, responsible in the use of their natural resources, committed to the fight against climate change and the free movement of people, connected through ICTs and universal access to the Internet, with better quality of democratic institutions, and with greater citizen participation in the decision making process of government and justice. Since this is the agenda for development and regional integration, the opportunity offered by ICTs cannot be overlooked, both in the construction of a subject with a critical conscience, capable of visualizing the problems that afflict it, as well as in its powerful potential to strengthen trade links between countries, strengthen democracy and enhance the development of the region.

To the bibliography