Academic literature on the topic 'TCP/IP (Computer network protocol)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'TCP/IP (Computer network protocol).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "TCP/IP (Computer network protocol)"

1

Rafif Abyakto, Naif Baihaqi, M. Aldi Firdaus, Salsabila Aulia, and Didik Aribowo. "Simulasi TCP-IP Menggunakan Topologi Bus." Uranus : Jurnal Ilmiah Teknik Elektro, Sains dan Informatika 2, no. 2 (May 11, 2024): 07–14. http://dx.doi.org/10.61132/uranus.v2i2.97.

Full text
Abstract:
One important technique for understanding and analyzing computer network performance is TCP/IP simulacrum. In this research, we simulate a TCP/IP network using the bus topology as a model. We use the Cisco Packet Tracer simulated network topology builder to create a bus topology and implement the TCP/IP protocol. The simulation results provide more accurate understanding of how the TCP/IP protocol functions within a bus network. We analyze network performance in terms of throughput, latency, and packet loss. The analysis's findings indicate that bus topologies have a certain amount of leeway in network operations, particularly when a collision occurs. However, this simulation offers a valuable tool to improve computer network design and management.
APA, Harvard, Vancouver, ISO, and other styles
2

YIMING, ALIMUJIANG, and TOSHIO EISAKA. "A SWITCHED ETHERNET PROTOCOL FOR HARD REAL-TIME EMBEDDED SYSTEM APPLICATIONS." Journal of Interconnection Networks 06, no. 03 (September 2005): 345–60. http://dx.doi.org/10.1142/s0219265905001460.

Full text
Abstract:
This paper presents a protocol to support hard real-time traffic of end-to-end communication over non real-time LAN technology. The network is set up with nodes and switches, and real-time communication is handled by software (protocol) added between the Ethernet protocols and the TCP/IP suite. The proposed protocol establishes a virtual circuit based on admission control and manages hard real-time traffic to bypass the TCP/IP stack. This makes considerably reduce the dwell time in the nodes, and increase the achievable data frame rate. After the bypassing, traffic schedule is performed according to dynamic-priority EDF algorithm. The work does not need any modifications in the Ethernet hardware and coexists with TCP/IP suites, and then the LAN with the protocol can be connected to any existing Ethernet networks. It can be adopted in industrial hard real-time applications such as embedded systems, distributed control systems, parallel signal processing and robotics. We have performed some experiments to evaluate the protocol. Compared to some conventional hard real-time network protocols, the proposed one has better real-time performances and meets the requirements of reliability for hard real-time systems.
APA, Harvard, Vancouver, ISO, and other styles
3

Hu, Yao, Ting Peng, and Lianming Zhang. "Software-Defined Congestion Control Algorithm for IP Networks." Scientific Programming 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/3579540.

Full text
Abstract:
The rapid evolution of computer networks, increase in the number of Internet users, and popularity of multimedia applications have exacerbated the congestion control problem. Congestion control is a key factor in ensuring network stability and robustness. When the underlying network and flow information are unknown, the transmission control protocol (TCP) must increase or reduce the size of the congestion window to adjust to the changes of traffic in the Internet Protocol (IP) network. However, it is possible that a software-defined approach can relieve the network congestion problem more efficiently. This approach has the characteristic of centralized control and can obtain a global topology for unified network management. In this paper, we propose a software-defined congestion control (SDCC) algorithm for an IP network. We consider the difference between TCP and the user datagram protocol (UDP) and propose a new method to judge node congestion. We initially apply the congestion control mechanism in the congested nodes and then optimize the link utilization to control network congestion.
APA, Harvard, Vancouver, ISO, and other styles
4

Wu Boqiao, Liu Xuefei, Tan Aiping, and Weniee Evelyn. "Network Management Scheme Based on TCP/IP Protocol." International Journal of Digital Content Technology and its Applications 7, no. 6 (March 31, 2013): 937–45. http://dx.doi.org/10.4156/jdcta.vol7.issue6.106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Prabadevi, B., and N. Jeyanthi. "Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks." Cybernetics and Information Technologies 17, no. 4 (November 27, 2017): 69–86. http://dx.doi.org/10.1515/cait-2017-0042.

Full text
Abstract:
AbstractThe bridge protocol (Address Resolution Protocol) ARP, integrating Ethernet (Layer 2) and IP protocol (Layer 3) plays a vital role in TCP/IP communication since ARP packet is the first packet generated during any TCP/IP communications and they are the first traffic from the host. In the large data center, as the size of the broadcast domain (i.e., number of hosts on the network) increases consequently the broadcast traffic from the communication protocols like ARP also increases. This paper addresses the problem faced by Layer 2 protocols like insecured communication, scalability issues and VM migration issues. The proposed system addresses these issues by introducing two new types of messaging with traditional ARP and also combat the ARP Cache poisoning attacks like host impersonation, MITM, Distributed DoS by making ARP stateful. The components of the proposed methodology first start the process by decoding the packets, updates the invalid entry made by the user with Timestamp feature and messages being introduced. The system has been implemented and compared with various existing solutions.
APA, Harvard, Vancouver, ISO, and other styles
6

Anderson, Daniel K., and W. Michael Reed. "The Effects of Internet Instruction, Prior Computer Experience, and Learning Style on Teachers' Internet Attitudes and Knowledge." Journal of Educational Computing Research 19, no. 3 (October 1998): 227–46. http://dx.doi.org/10.2190/8wx1-5q3j-p3bw-jd61.

Full text
Abstract:
What is now called the Internet started out as a small number of federally funded Department of Defense (Advanced Research Project Agency, or ARPA) supercomputers networked together to share information. In order to guarantee data transmission between these nodes, this network (ARPANET) shared a common set of protocols that was designed to allow for high speed and reliable transfer. This protocol suite is TCP/IP (Transmission Control Protocol/Internet Protocol). Most microcomputers now have a TCP/IP implementation available (e.g., MacTCP) and can, therefore, join the millions of computers that have access to the plethora of resources on the Internet. The Internet is not a static set of nodes, not a limited number of library holdings, not a one-directional paradigm of data transmission. Rather, it is a vibrant and absorbing setting that can foster new learning environments, or enrage educators with its diverse commands, lack of direction, and tenuous consistency.
APA, Harvard, Vancouver, ISO, and other styles
7

Thuneibat, Saed, and Buthayna Al Sharaa. "Dynamic source routing protocol with transmission control and user datagram protocols." Indonesian Journal of Electrical Engineering and Computer Science 30, no. 1 (April 1, 2023): 137. http://dx.doi.org/10.11591/ijeecs.v30.i1.pp137-143.

Full text
Abstract:
Dynamic source routing protocol (DSR) is a common routing protocol in wireless network without infrastructure, called ad-hoc network, DSR used just above internet protocol (IP) at the network layer. The upper transport layer provides reliability by transmission control protocol (TCP) and user datagram protocol (UDP). The choice between DSR/TCP and DSR/UDP is an actual issue for network designers and engineers. The question arises: which one provides better quality of service (QoS) parameters, less delay and jitter, greater throughput, and data rates. This paper focuses on the study and analysis of DSR and comparison of DSR/TCP and DSR/UDP by simulation in network simulator (NS2) environment. Another comparison of DSR and ad hoc on-demand distance vector (AODV) is provided. Design and simulation of the protocols in ad hoc network accurately describe the behavior in real system and QoS parameters are obtained.
APA, Harvard, Vancouver, ISO, and other styles
8

Amin, Muhammad, Dian Kurnia, and Kevin Mikli. "Design of Three Class Internet Protocol Routing Model Based on Linux Command Line Interface." Journal of Applied Engineering and Technological Science (JAETS) 3, no. 2 (June 24, 2022): 133–38. http://dx.doi.org/10.37385/jaets.v3i2.764.

Full text
Abstract:
The world of information technology is currently experiencing very rapid development, especially in internet technology. The Internet itself is a form of utilization of a computer network system, a computer network system consisting of a group of computer systems and other computing hardware linked together through communication channels to facilitate communication and resource sharing among various users. TCP / IP is a standard protocol that is applied to the internet network. The existence of a router in a TCP/IP network is very important, this is due to the large number of hosts and the differences in the devices used on a TCP/IP network. Router is a computer network device that is used to forward data packets from one network to another, both within the scope of LAN and WAN networks (Yani A., 2008). As a result, a routing mechanism is needed that can integrate many users with a high degree of flexibility. Routing is generally divided into two categories, namely static routing and dynamic routing. Static routing is a routing mechanism that depends on the routing table with manual configuration while dynamic routing is a routing mechanism where the routing table exchange between routers on the network is carried out dynamically. Routing in the world of information technology (IT) is part of how to improve network performance. Routing is a process to choose the path (path) traversed by the packet. Routing itself is very instrumental in building a network, be it LAN or WAN. Currently the use of routing in a network is something that needs to be taken into account in a company. Today's companies that have business processes in the IT sector are very dependent on network availability. Network reliability is the main point in the operation of the system. An adequate and reliable network infrastructure is very much needed by the company, especially regarding the company's electability. Companies that have large-scale networks need several techniques so that the network can work optimally and reliably in overcoming various problems that arise, including network connectivity that is still not stable and link redundancy has not been implemented as a backup path to overcome network failures if interference occurs. alternative network paths that are used to increase network availability, so that if there is a broken link in a network, the data path can still be connected without affecting the connectivity of devices on the network
APA, Harvard, Vancouver, ISO, and other styles
9

Bein, Adrian Sean, and Alexander Williams. "Networking IP Restriction filtering and network address." IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, no. 2 (April 30, 2020): 172–77. http://dx.doi.org/10.34306/itsdi.v1i2.149.

Full text
Abstract:
Permissions setting on a computer is necessary. This is an effort that is not easy to change the system configuration or settings changed by the user. With a network of computers, of course, permissions settings do not need to be done one by one manually. Because in a computer network course there are many collections of computers connected together. Permissions setting so that the system can use the client-server applications that access restrictions can be done effectively. As the implementation of client-server applications can be created using Visual Basic 6.0. This language has been able to access the socket on the Windows operating system, named Winsock API that supports TCP / IP. This protocol is widely used because of the reliability of client-server application programming. The application is divided into two main applications, namely the client and server program name with the name of the Receiver Sender program. Receiver function receives instructions restriction of access rights Sender and sends reports to the Sender process execution. While Sender functions to send instructions restrictions permissions via the Registry to the Receiver. And after the test, the application can block important features available in the Windows operating system. So it is expected that these applications can help in permissions setting on a computer network.
APA, Harvard, Vancouver, ISO, and other styles
10

Жебель, В. А., and А. И. Солдатов. "The Reliability Coefficient for Network Data Transmissions." Успехи кибернетики / Russian Journal of Cybernetics, no. 2(14) (June 30, 2023): 60–67. http://dx.doi.org/10.51790/2712-9942-2023-4-2-09.

Full text
Abstract:
в статье представлены результаты исследования способов защиты информации, передаваемой по вычислительным сетям, которые могут быть перехвачены и прочитаны, а также перехвачены и модифицированы. Показано, что существующие методы защищают информацию в сети с помощью криптографии (шифрования трафика), и только несколько методов проводят анализ поля TTL. В статье проведены исследования стека протоколов TCP/IP, сетевой модели OSI и полей кадра, установлены поля заголовков, которые будут использоваться в работе. Описаны инструменты, при помощи которых проводились исследования, отражается конфигурация пакетов. Предложен комплексный коэффициент достоверности для повышения достоверности передачи данных в сети предприятия за счет использования проверочных пакетов. Данный коэффициент является составным и включается в себя различные флаги и поля из сетевых протоколов стека TCP/IP, которые анализируются после приема. Предлагается гипотеза составления данного коэффициента достоверности и примерная шкала измерения. По результатам анализа делается вывод о достоверности принятых данных согласно данной шкалы измерения. this study considers the protection of information transmitted over computer networks that can be intercepted and decoded, or modified. It is shown that existing data protection methods use cryptography (traffic encryption). Just a few methods analyze the TTL field. We studied the TCP/IP protocol stack, the OSI network model, and the frame fields, and identified the header fields to be used. We presented the research tools and their configuration. We proposed a comprehensive reliability coefficient to assess the reliability of data transmission in corporate network through the use of verification packets. The composite coefficient includes various flags and fields from the TCP/IP network protocols, which are analyzed after reception. A hypothesis for building the reliability coefficient, and an approximate measurement scale are proposed. The analysis shows that the hypothesis and scale are correct.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "TCP/IP (Computer network protocol)"

1

Nematbakhsh, Mohammadali. "TCP/IP PROTOCOL BOARD USING SINGLE CHIP PROCESSOR." Thesis, The University of Arizona, 1985. http://hdl.handle.net/10150/275389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Arpaci, Mutlu. "Congestion avoidance in TCP/IP networks." Diss., Georgia Institute of Technology, 2001. http://hdl.handle.net/1853/15356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bickhart, Ryan W. "Transparent TCP-to-SCTP translation shim layer." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 0.44 Mb, 82 p, 2005. http://wwwlib.umi.com/dissertations/fullcit/1428177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhao, Ting. "Fast IP lookup engine /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20ZHAOT.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wu, Chen. "A new TCP protocol based on end-to-end available bandwidth measurement /." View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202005%20WU.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Holl, David J. "A performance analysis of TCP and STP implementations and proposals for new QoS classes for TCP/IP." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0501103-111419.

Full text
Abstract:
Thesis (M.S.)--Worcester Polytechnic Institute.
Keywords: TCP; RED; satellite; PEP; STP; performance enhancing proxy; segment caching; IP-ABR; Internet; bandwidth reservation; IP-VBR; congestion avoidance; bandwidth sharing. Includes bibliographical references (p. 98-99).
APA, Harvard, Vancouver, ISO, and other styles
7

Olsén, Jörgen. "Stochastic modeling and simulation of the TCP protocol /." Uppsala : Matematiska institutionen, Univ. [distributör], 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-3534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mustell, Eliot John. "Internet Protocol Version 6: The Next Generation?" [Milwaukee, Wis.] : e-Publications@Marquette, 2009. http://epublications.marquette.edu/theses_open/23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ramasubramaniam, Venkata Lakshmanan. "A framework for reliable multicast protocol." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhou, Kaiyu. "Packet loss models of the Transmission Control Protocol." Click to view the E-thesis via HKUTO, 2006. http://sunzi.lib.hku.hk/hkuto/record/B36873172.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "TCP/IP (Computer network protocol)"

1

Blank, Andrew G. TCP/IP JumpStart. New York: John Wiley & Sons, Ltd., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cameron, Deb, ed. TCP/IP Network Administration. Beijing: O’Reilly Media, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hunt, Craig. TCP/IP Network Administration. Sebastopol, CA: O’Reilly Media, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Forouzan, Behrouz A. TCP/IP protocol suite. Boston: McGraw-Hill, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Osterloh, Heather. TCP/IP primer plus. Indianapolis, Ind: Sams, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Forouzan, Behrouz A. TCP/IP protocol suite. 2nd ed. Boston: McGraw-Hill, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hunt, Craig. TCP/IP Network Administration. Edited by Mike Loukides and Debra Cameron. 3rd ed. Beijing: O’Reilly Media, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hunt, Craig. TCP/IP Network Administration. Sebastopol, CA: O’Reilly Media, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hunt, Craig. TCP/IP Network Administration. 3rd ed. Sebastopol, CA: O’Reilly Media, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Loukides, Mike, ed. TCP/IP: Network Administration. Sebastopol, CA: O’Reilly Media, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "TCP/IP (Computer network protocol)"

1

Yew, Kok Meng, R. M. Zahidur, and Sai Peck Lee. "Mean Time Offset Protocol for Cluster of Auction Servers Over TCP/IP Network." In Lecture Notes in Computer Science, 323–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-46652-9_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

de Alencar, Marcelo Sampaio. "The TCP/IP Protocol." In Cryptography and Network Security, 135–57. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003337768-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Marchette, David J. "TCP/IP Networking." In Computer Intrusion Detection and Network Monitoring, 3–42. New York, NY: Springer New York, 2001. http://dx.doi.org/10.1007/978-1-4757-3458-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lei, Shu, Wang Jin, Xu Hui, Jinsung Cho, and Sungyoung Lee. "Connecting Sensor Networks with TCP/IP Network." In Lecture Notes in Computer Science, 330–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11610496_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Nanjun, and Werner Zorn. "Visualizing TCP/IP Network Flows to Control Congestion and Bottlenecks." In Communications in Computer and Information Science, 40–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00205-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chang, Kyung-Bae, Il-Joo Shim, and Gwi-Tae Park. "Separated Ethernet Algorithm for Intelligent Building Network Integration Using TCP/IP." In Lecture Notes in Computer Science, 452–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11552413_65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lan, Shizhan, Lifang Ma, and Jing Huang. "Research and Practice of TCP Protocol Optimization in Mobile Internet." In Communications in Computer and Information Science, 187–96. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8285-9_14.

Full text
Abstract:
AbstractThis paper analyzes the problems of traditional TCP protocol in the wireless network environment and proposes a scheme based on performance-enhancing agents, which is more suitable for the actual situation of current wireless core networks. TCP application optimization was employed to enhance congestion control. Based on the automatic learning mechanism of network path features, this paper proposes herein the dynamic algorithm ZetaTCP. In practice, the performance enhancement agent based on ZetaTCP In practice, the performance enhancement proxy based on ZetaTCP was verified and achieves good results in LTE networks. In practice, the performance enhancement proxy based on ZetaTCP was verified and achieved good results in the LTE network.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Xuechen, Guiquan Liu, and Song Jiang. "Improve Throughput of Storage Cluster Interconnected with a TCP/IP Network Using Intelligent Server Grouping." In Lecture Notes in Computer Science, 373–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15672-4_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Luglio, Michele, Cesare Roseti, and Francesco Zampgnaro. "A Satellite Network Emulation Platform for Implementation and Testing of TCP/IP Applications." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 1–2. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35576-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pavesi, Jaime, Thamara Villegas, Alexey Perepechko, Eleazar Aguirre, and Lorena Galeazzi. "Validation of ICS Vulnerability Related to TCP/IP Protocol Implementation in Allen-Bradley Compact Logix PLC Controller." In Communications in Computer and Information Science, 355–64. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33229-7_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "TCP/IP (Computer network protocol)"

1

Bai, Jin, Salim Hariri, and Youssif Al-Nashif. "A Network Protection Framework for DNP3 over TCP/IP protocol." In 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2014. http://dx.doi.org/10.1109/aiccsa.2014.7073172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

LENARDIC, DANIEL Z., BRANKA ZOVKO-CIHLAR, and MISLAV GRGIC. "ANALYSIS OF TCP/IP PROTOCOL BEHAVIOUR IN A CONGESTED MULTIMEDIA COMPUTER NETWORK." In Proceedings of the 9th International Workshop on Systems, Signals and Image Processing. WORLD SCIENTIFIC, 2002. http://dx.doi.org/10.1142/9789812776266_0007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Aksoy, Ahmet, and Mehmet Hadi Gunes. "Operating System Classification Performance of TCP/IP Protocol Headers." In 2016 IEEE 41st Conference on Local Computer Networks: Workshops (LCN Workshops). IEEE, 2016. http://dx.doi.org/10.1109/lcn.2016.036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hossain, Ziaul, and Gorry Fairhurst. "Measuring Performance of Web Protocol with Updated Transport Layer Techniques for Faster Web Browsing." In 10th International Conference on Computer Networks & Communications (CCNET 2023). Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130401.

Full text
Abstract:
Popular Internet applications such as web browsing, web video download or variable-rate voice suffer from standard Transport Control Protocol (TCP) behaviour because their transmission rate and pattern are different from conventional bulk transfer applications. Previous works have analysed the interaction of these applications with the congestion control algorithms in TCP and proposed Congestion Window Validation (CWV) as a solution. However, this method was incomplete and has been shown to present drawbacks. This paper focuses on the ‘newCWV’ which was proposed to address these drawbacks. newCWV depicts a practical mechanism to estimate the available path capacity and suggests a more appropriate congestion control behaviour. These new modifications benefit variable-rate applications that are bursty in nature, with shorter transfer durations. In this paper, this algorithm was implemented in the Linux TCP/IP stack and tested by experiments, where results indicate that, with newCWV, the browsing can get 50% faster in an uncongested network.
APA, Harvard, Vancouver, ISO, and other styles
5

Montanari, Tony. "The Internet and the Citrus Industry." In ASME 1997 Citrus Engineering Conference. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/cec1997-4306.

Full text
Abstract:
The Internet is a worldwide connection of thousands of computer networks. All of them speak the same language, TCP/IP, the standard protocol. The Internet allows people with access to these networks to share information and knowledge. Resources available on the Internet are chat groups, e-mail, newsgroups, file transfers, and the World Wide Web. The Internet has no centralized authority and it is uncensored. The Internet belongs to everyone and to no one. Paper published with permission.
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Rawi, Akram, and Azzedine Lansari. "Effect of Windows XP Firewall on Network Simulation and Testing." In InSITE 2007: Informing Science + IT Education Conference. Informing Science Institute, 2007. http://dx.doi.org/10.28945/3170.

Full text
Abstract:
The objective of this paper is to report findings from simulating and testing local area network (LAN) connectivity using Windows XP operating system and Cisco Networking Academy network devices. In this study, a simple routing protocol, RIP, is used as routing protocol. Two different techniques, Cisco Networking Academy hardware lab and Cisco Packet Tracer 4, were used to compare their performance to simulate network connectivity. Primary findings showed that the settings of the Windows XP firewall on the host computer have a direct impact on the test results. These findings are critical as there are no similar reports in the literature and only a careful investigation allowed the researchers to come to this conclusion. Furthermore, study results also offer suggestions for fixing problems that hinder simulation results of LANs that use Windows XP workstations. These findings can help CCNA students and faculty understand the reasons for unexplained connectivity problems when performing CCNA labs. The study also provides a simple method to avoid connectivity problems when using Windows ping.exe and tracert.exe which implement the TCP/IP protocol ICMP
APA, Harvard, Vancouver, ISO, and other styles
7

Mok, Swee M. "Development of a Web-Based Controller for Remote Sensing and Control of Manufacturing Processes." In ASME 1998 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1998. http://dx.doi.org/10.1115/detc98/cie-5526.

Full text
Abstract:
Abstract This paper introduces the concept of a networked controller that leverages the capability of web services. By doing so, it enables the implementation of a large set of factory monitoring and control equipment that is cost effective and manageable. By using the factory local area network for communication, and industrial computers based on standard hardware and software as the controller platform, cost is minimized. A networked solution based on Transmission Control Protocol / Internet Protocol (TCP/IP) allows the controller to communicate with factory engineers through their desktop computers as efficiently as it can with other computers. Engineers can set up each unit for its intended function by installing the appropriate sensors. Java applet technology is employed for remote setup and control. Controller requirements such as remote configuration, client processing, and data presentation are presented. A method for overcoming real time issues is proposed using a client/server design. A prototype was built to demonstrate some of the concepts. Discussions are then made on possible future work using a Finite State Machine design methodology to improve overall system reliability.
APA, Harvard, Vancouver, ISO, and other styles
8

Ryan, Les M. "Breaking the Barriers: An Architecture for Multi-Host Access to Field Devices." In 1996 1st International Pipeline Conference. American Society of Mechanical Engineers, 1996. http://dx.doi.org/10.1115/ipc1996-1909.

Full text
Abstract:
An overview of some of the many host applications that collect and use data from field devices such as RTUs, PLCs and flow computers is given and the need to provide multi-host access to these field devices is established. The challenges in providing multi-host access to field device networks is discussed as well as some of the current methods used. The concept of using a gateway to interface field device networks to wide area networks (WAN) is introduced with a brief discussion on the advantages of using TCP/IP for host to gateway transport. Several popular field device network protocols are assessed for their multi-host access capabilities with and without a field device network gateway.
APA, Harvard, Vancouver, ISO, and other styles
9

Mahabaleshwarkar, Ketaki, Neha Mundada, Amruta Chavan, and Amruta Panage. "TCP/IP protocol accelaration." In 2012 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2012. http://dx.doi.org/10.1109/iccci.2012.6158829.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kanmai, Zhi. "TCP/IP Protocol Security Problems and Defenses." In 2020 International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI). IEEE, 2020. http://dx.doi.org/10.1109/ichci51889.2020.00033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography