To see the other types of publications on this topic, follow the link: TCP/IP.

Journal articles on the topic 'TCP/IP'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'TCP/IP.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chang, R. "Illustrated TCP/IP." Computer Communications 24, no. 11 (June 2001): 1117. http://dx.doi.org/10.1016/s0140-3664(00)00346-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Keanini, Tim. "Protecting TCP/IP." Network Security 2005, no. 11 (November 2005): 13–16. http://dx.doi.org/10.1016/s1353-4858(05)70303-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Oroo Oyondi Felix. "TCP/IP stack transport layer performance, privacy, and security issues." World Journal of Advanced Engineering Technology and Sciences 11, no. 2 (March 30, 2024): 175–200. http://dx.doi.org/10.30574/wjaets.2024.11.2.0098.

Full text
Abstract:
Transmission Control Protocol/ Internet Protocol (TCP/IP) is the backbone of Internet transmission. The Transport Layer of the TCP/IP stack, which includes TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols, plays a crucial role in ensuring reliable communication between devices over a network. To come up with measures that make networks more secure, it is important to learn about the vulnerabilities that exist in the transport TCP/IP stack and then have an understanding of the typical attacks carried out in such layer. This paper explores how the TCP Protocol works, the TCP/IP 3 Way Handshake, TCP Header Structure, the typical vulnerabilities and the classical attacks of transport layer TCP/IP, tools, and solutions adopted to prevent and reduce the chances of some of these attacks. The findings indicated that the major TCP/ IP stack transport layer threats include Finger printing, SYN Flood, TCP reassembly and sequencing, IP Spoofing, TCP session hijacking, RST and FIN denial of service attack, Ping of Death, Low Rate/ Shrew Attacks. Their preventive measures and mechanisms are discussed.
APA, Harvard, Vancouver, ISO, and other styles
4

Meyer, D., and G. Zobrist. "TCP/IP versus OSI." IEEE Potentials 9, no. 1 (February 1990): 16–19. http://dx.doi.org/10.1109/45.46812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Williamson, Carey, and Qian Wu. "Context-aware TCP/IP." ACM SIGMETRICS Performance Evaluation Review 30, no. 1 (June 2002): 262–63. http://dx.doi.org/10.1145/511399.511371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Timothy Murkomen. "Performance, privacy, and security issues of TCP/IP at the application layer: A comprehensive survey." GSC Advanced Research and Reviews 18, no. 3 (March 30, 2024): 234–64. http://dx.doi.org/10.30574/gscarr.2024.18.3.0106.

Full text
Abstract:
TCP/IP is the backbone of modern network communication, connecting devices across the world. TCP/IP at its core is a suite of protocols that enables the transmission of data between computers, facilitating the foundation of the interconnected global network. At the Application Layer of TCP/IP is where the interaction between software applications and the network occurs. The user-centric protocols such as HTTP, SMTP, FTP, POP3, IMAP and DNS facilitate various tasks at this layer such as web browsing, email communication, and file transfer. This comprehensive survey conducted an exploration of the performance, security and privacy issues at the application layer of the TCP/IP. It initiated by providing a background of TCP/IP model, it’s architecture and the core characteristics, with major focus on the application layer. This paper aimed to discuss the state-of-the-art of performance, privacy and security concerns in TCP/IP application layer. It also proposed future research areas to equip researchers, practitioners, policy makers and the decision makers with tangible knowledge, offering guidance in navigating the performance, privacy and security concerns in TCP/IP Application Layer. It aimed to discuss the current performance, privacy and security research gaps at the Application Layer of the TCP/IP Model. The findings of this research sheds light on the performance, privacy and security issues while suggesting the countermeasures to strengthen and optimize the overall performance, security and privacy of TCP/IP model at the application layer. The paper finally suggests future directions and research areas at the TCP/IP application layer.
APA, Harvard, Vancouver, ISO, and other styles
7

Winnie Owoko. "Survey on evolving threats in TCP/IP header attacks: Emerging trends and future directions." World Journal of Advanced Engineering Technology and Sciences 11, no. 2 (April 30, 2024): 454–75. http://dx.doi.org/10.30574/wjaets.2024.11.2.0127.

Full text
Abstract:
The TCP/IP protocol suite, a cornerstone of modern networking, faces escalating threats from evolving attack vectors targeting its headers. This survey explores emerging trends in TCP/IP header attacks, assessing their potential impact and outlining future directions for defense strategies. By scrutinizing recent research and real-world incidents, the paper aims to offer insights into the evolving threat landscape and provide recommendations for enhancing network security. Key areas of investigation include the historical evolution of TCP/IP header vulnerabilities, the adaptation of attackers' techniques over time, and the development of novel defense mechanisms to counteract these threats. The survey underscores the critical importance of understanding TCP/IP header attacks in contemporary cybersecurity and highlights the necessity for proactive measures to safeguard network infrastructures. By addressing the challenges posed by evolving TCP/IP header attacks and identifying areas for further research and development, this survey contributes to the ongoing efforts to strengthen network defenses and mitigate the risks associated with cyber threats targeting TCP/IP protocols.
APA, Harvard, Vancouver, ISO, and other styles
8

Miajee, Md Rezaul Karim. "Network layer: TCP/IP Model." American International Journal of Sciences and Engineering Research 1, no. 1 (November 30, 2018): 16–17. http://dx.doi.org/10.46545/aijser.v1i1.23.

Full text
Abstract:
Networklayer. The networklayer is in charge of information transmission acrossnetworks. This layer handles the directing of information between PCs. Directing requires some mind boggling and critical strategies for a parcel exchanged system structure. To achieve the steering of bundles sending from a source and conveying to a goal, a way or course through the system must be chosen. This layer makes an interpretation of sensible system tending to into physical locations and oversees issues, for example, outline discontinuity and traffic control. The system layer analyzes the goal address and decides the connection to be utilized to achieve that goal.. This paper is about what language is, how language works, and ways to define languages.
APA, Harvard, Vancouver, ISO, and other styles
9

Dunn, N. "Review: Windows NT TCP/IP." Computer Bulletin 41, no. 2 (March 1, 1999): 31. http://dx.doi.org/10.1093/combul/41.2.31-c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Renqi, and E. A. Unger. "Security issues with TCP/IP." ACM SIGAPP Applied Computing Review 3, no. 1 (June 20, 1995): 6–13. http://dx.doi.org/10.1145/214310.214313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Feitelson, Dror. "Teaching TCP/IP Hands-On." IEEE Distributed Systems Online 8, no. 11 (November 2007): 5. http://dx.doi.org/10.1109/mdso.2007.66.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Britton, E. G., J. Tavs, and R. Bournas. "TCP/IP: The next generation." IBM Systems Journal 34, no. 3 (1995): 452–71. http://dx.doi.org/10.1147/sj.343.0452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Barakat, C. "TCP/IP modeling and validation." IEEE Network 15, no. 3 (2001): 38–47. http://dx.doi.org/10.1109/65.923939.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Highland, Harold Joseph. "TCP/IP (lack of) security." Computers & Security 14, no. 7 (January 1995): 606. http://dx.doi.org/10.1016/0167-4048(96)81670-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Løvdal, Einar. "The challenge of TCP/IP." Computer Networks and ISDN Systems 17, no. 4-5 (October 1989): 376–79. http://dx.doi.org/10.1016/0169-7552(89)90062-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Nilausen, Jesper, Ole Jensen, and Bo Hindsboel. "SNA‐TCP/IP internet interoperability." International Journal of Network Management 5, no. 6 (November 1995): 352–59. http://dx.doi.org/10.1002/nem.4560050611.

Full text
Abstract:
AbstractUsing several examples, this article illustrates that making traditional SNA and TCP/IP environments work together is very easy to accomplish, and there are several alternative solutions to connecting IBM to the Internet.
APA, Harvard, Vancouver, ISO, and other styles
17

Saad Qassim Fleh. "PROPOSED ALGORITHM FOR TCP/IP TRAFFIC OVER ATM NETWORK." Diyala Journal of Engineering Sciences 4, no. 1 (June 1, 2011): 108–24. http://dx.doi.org/10.24237/djes.2011.04108.

Full text
Abstract:
In this work, a suggested algorithm is designed that operates at ATM Adaptation Layer (AAL) layer, this algorithm is named Adding Identification number and Matching (AIDM) algorithm. The resulting transport protocol from using AIDM algorithm is named as Improved TCP/IP Reno. AIDM is an efficient recovering technique that attempts to make TCP\IP Reno performance less sensitive to cell losses. Improve TCP/IP Reno is presented and a result is compared with other TCP\IP Reno .This result explain the network performance is enhanced about 20.53 % as average of the enhancement rates of the given samples and the period of time required to recover the damaged cell is reduce .
APA, Harvard, Vancouver, ISO, and other styles
18

de Vivo, Marco, Gabriela O. de Vivo, Roberto Koeneke, and Germinal Isern. "Internet vulnerabilities related to TCP/IP and T/TCP." ACM SIGCOMM Computer Communication Review 29, no. 1 (January 1999): 81–85. http://dx.doi.org/10.1145/505754.505760.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Liu, Biao, and Can Ping Li. "Simulation of IP Fragmentation and Defragmentation on Linux with User Space Application." Advanced Materials Research 216 (March 2011): 261–65. http://dx.doi.org/10.4028/www.scientific.net/amr.216.261.

Full text
Abstract:
TCP/IP is a typical layered protocol suite, and network protocol layering is the widely accepted rule. As studying TCP/IP, conceptually protocol layering is easy to understand, but TCP/IP stack usually is implemented in the kernel of Linux operating system, thus how layering protocol works is hard to know. After studying the IP fragment and defragment process in Linux kernel, a layered protocol defined in application level is designed, and a program based on this application layered protocol to simulate IP fragment and defragment is implemented in this paper. With this program, not only is the process of IP fragmentation and defragmentation in Linux kernel clearly displayed, but also the complete handling of a layered protocol is showed.
APA, Harvard, Vancouver, ISO, and other styles
20

Hassan, Ghassan Muslim, Nadia Mahmood Hussien, and Yasmin Makki Mohialden. "Python TCP/IP libraries: A Review." International Journal Papier Advance and Scientific Review 4, no. 2 (May 25, 2023): 10–15. http://dx.doi.org/10.47667/ijpasr.v4i2.202.

Full text
Abstract:
The Internet's core is TCP/IP, which stands for Transmission Control Protocol/Internet Protocol. It connects network devices on the internet via communication protocols. Python has several TCP/IP packages due to its popularity and flexibility. This paper describes the most popular Python libraries for TCP/IP protocol implementation, including socket, asyncio, Twisted, and Scapy. To help developers choose a library, we compare its benefits, cons, and areas of use, including criteria other than speed and memory utilization. When making web apps, choose wisely.
APA, Harvard, Vancouver, ISO, and other styles
21

Биджиева, С. Х., and К. В. Шебзухова. "Сетевые протоколы передачи данных: преимущества и недостатки." ТЕНДЕНЦИИ РАЗВИТИЯ НАУКИ И ОБРАЗОВАНИЯ 86, no. 1 (2022): 43–45. http://dx.doi.org/10.18411/trnio-06-2022-14.

Full text
Abstract:
В статье анализируются особенности стека протоколов TCP/IP, который включает четыре уровня протоколов: прикладной, транспортный, сетевой и канальный, также рассматриваются принципы обмена данными в сети, особенности адресации в Интернете, выделяются преимущества и недостатки стека протоколов TCP/IP.
APA, Harvard, Vancouver, ISO, and other styles
22

Akyildiz, I. F., Xin Zhang, and Jian Fang. "TCP-Peach+: enhancement of TCP-Peach for satellite IP networks." IEEE Communications Letters 6, no. 7 (July 2002): 303–5. http://dx.doi.org/10.1109/lcomm.2002.801317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Schuehler, D. V., and J. W. Lockwood. "TCP splitter: a TCP/IP flow monitor in reconfigurable hardware." IEEE Micro 23, no. 1 (January 2003): 54–59. http://dx.doi.org/10.1109/mm.2003.1179898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hartono, Rudi, Ade Hendri Hendrawan, and Ritzkal . "Sistem Perancangan Audio Smart Room Menggunakan Arduino Ethernet Shield R3 Berbasis TCP/IP." INOVA-TIF 3, no. 1 (June 5, 2020): 28. http://dx.doi.org/10.32832/inova-tif.v3i1.4066.

Full text
Abstract:
<p><em>Telah berhasil membuat Sistem Perancangan Audio Smart Room Menggunakan Arduino Ethernet Shiel R3 Berbasis Jaringan TCP/IP. Arduino Ethernet shield R3 digunakan sebagai perangkat untuk menghubungkan sistem dengan komputer berbasis TCP/IP, tujuan dilakukan penelitian ini agar sistem informasi ruangan-ruangan di instansi terkait bisa menggunakan sistem tcp/ip agar efektif dan efisien ketika menggunakan sistem tersebut, untuk membuat sistem tersebut peneliti merancang sesuai dengan alur penelitian yang peneliti lakukan yaitu analisis, desain, implementasi, pengujian, dibuatnya sistem berbasis tcp/ip agar sistem bisa termanage dan terkontrol dalam penggunaannya, fungsi TCP/IP adalah sebagai pengalamatan untuk perangkat agar bisa saling berkomunikasi satu sama lain, Sedangkan komputer berfungsi untuk mengakses sistem yang dirancang, sehingga dari komputer bisa memanage kemana informasi akan disebarkan, pada sistem ini peneliti membuat database sistem, fungsi dari database sistem untuk penyimpanan file dari hasil rekam suara yang kemudian akan tersimpan pada database sistem tersebut, sehingga ketika hasil rekam suara sudah tersimpan pada database tinggal dilakukan penyebaran informasi ke ruangan-ruangan yang telah ditentukan, manfaat dari sistem yang telah peneliti buat adalah dalam peneyebaran informasi ke ruangan-ruangan sangat efektif dan efisien, sistem lebih terkontrol dan termanage kemana informasi suara akan digunakan dan informasi yang disebarkan oleh sistem sesuai kepada yang membutuhkan</em></p>
APA, Harvard, Vancouver, ISO, and other styles
25

Shen, Wei, Yubo Peng, and M. D. AKTARUL HASAN. "Underwater Wireless Communication Using TCP/IP." International Journal of Intelligent Internet of Things Computing 1, no. 1 (2023): 1. http://dx.doi.org/10.1504/ijiitc.2023.10048055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Feng, Wu-chang. "The case for TCP/IP puzzles." ACM SIGCOMM Computer Communication Review 33, no. 4 (October 2003): 322–27. http://dx.doi.org/10.1145/972426.944771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Strole, N. C. "SNA and tcp/ip enterprise networking." IEEE Communications Magazine 37, no. 9 (September 1999): 17–20. http://dx.doi.org/10.1109/mcom.1999.790860.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Molinero-Fernandez, P., and N. McKeown. "TCP switching: exposing circuits to IP." IEEE Micro 22, no. 1 (2002): 82–89. http://dx.doi.org/10.1109/40.988693.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Xu, K., Y. Tian, and N. Ansari. "TCP-Jersey for Wireless IP Communications." IEEE Journal on Selected Areas in Communications 22, no. 4 (May 2004): 747–56. http://dx.doi.org/10.1109/jsac.2004.825989.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Bernett, M., and Oleynik Gene. "Uniform communications software using TCP/IP." IEEE Transactions on Nuclear Science 36, no. 5 (1989): 1715–18. http://dx.doi.org/10.1109/23.41135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Partridge, C., and T. J. Shepard. "TCP/IP performance over satellite links." IEEE Network 11, no. 5 (1997): 44–49. http://dx.doi.org/10.1109/65.620521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Ghani, N., and S. Dixit. "TCP/IP enhancements for satellite networks." IEEE Communications Magazine 37, no. 7 (July 1999): 64–72. http://dx.doi.org/10.1109/35.774882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Nagle, John. "Congestion control in IP/TCP internetworks." ACM SIGCOMM Computer Communication Review 25, no. 1 (January 11, 1995): 61–65. http://dx.doi.org/10.1145/205447.205454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Hasan, Md Aktarul, Yubo Peng, and Shen Wei. "Underwater wireless communication using TCP/IP." International Journal of Intelligent Internet of Things Computing 1, no. 4 (2022): 273. http://dx.doi.org/10.1504/ijiitc.2022.129109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Nikolaidis, J. "Practical TCP/IP designing, using and troubleshooting TCP/IP networks on linux and windows [Book Reviews]." IEEE Network 17, no. 4 (July 2003): 6. http://dx.doi.org/10.1109/mnet.2003.1220683.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Li, Yan Xia, Mo Li Zhang, Dan Mei Niu, and Xiao Ling Zhang. "Design and Implementation of Embedded System Based on Modbus TCP/IP." Advanced Materials Research 532-533 (June 2012): 667–71. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.667.

Full text
Abstract:
It is the requirements of limited resources and realtime in embedded system. Design of network communication system based on embedded system is hard. In this paper, we propose the architecture of embedded network using Modbus TCP/IP protocol, analyze the composition of Modbus TCP/IP protocol. It is that Modbus protocol information can be made in the TCP/IP protocol of the Internet transmission, and thus extend the application of Modbus protocol. The network communication system is designed and implemented on the ARM platform using non-blanking socket in Linux. The system is available, stable and worthy of popularization.
APA, Harvard, Vancouver, ISO, and other styles
37

Zhu, Weijun, Xinyue Liang, Mengyao Chen, and Yiran Wang. "A Preliminary Frame of Improved TCP/IP Model for Metaverse Networks." Journal of Physics: Conference Series 2216, no. 1 (March 1, 2022): 012109. http://dx.doi.org/10.1088/1742-6596/2216/1/012109.

Full text
Abstract:
Abstract It is well known that internet will play a key role to the infrastructure of metaverse, while different immerging virtual worlds communicate with each other. However, the existing TCP/IP model is not suitable enough for metaverse networks. To this end, we explore a preliminary frame of revised TCP/IP model. At first, a new layer called metaverse layer is defined. And then, this layer is placed as the top layer, i.e., the upper of the application layer in TCP/IP model. As a result, a novel network model having the six layers is obtained. Our simulated experiments indicate the feasibility of the new model.
APA, Harvard, Vancouver, ISO, and other styles
38

Hernawan, Agung. "Comparative Performance Testing of the Impact of ACK Loss in TCP Tahoe, TCP Reno, and TCP New Reno on the ns-2 Simulator." JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING 7, no. 1 (July 28, 2023): 91–101. http://dx.doi.org/10.31289/jite.v7i1.9542.

Full text
Abstract:
In TCP/IP networks, TCP provides reliable delivery service with the guarantee that packets sent reach their destination. This is achieved through the use of acknowledgments (ACK) as a mechanism. In TCP/IP networks, TCP provides reliable delivery service with the guarantee that packets sent reach their destination. This is achieved through the use of acknowledgments (ACK) as a mechanism. In all three variants of TCP, they rely on the presence of ACK packets. Therefore, testing will be conducted to observe the effect of ACK loss on TCP performance. The testing involves introducing disruptive traffic on the ACK path with varying magnitudes. This disruptive traffic results in the loss of some ACK packets, depending on the magnitude of the disruptive traffic. The testing was conducted using the ns-2 simulator software. The research findings indicate that the loss of ACK packets leads to a decrease in TCP performance. TCP Reno successfully improves the performance of TCP Tahoe, but the algorithm improvement in TCP New Reno does not have an effect on TCP Reno..
APA, Harvard, Vancouver, ISO, and other styles
39

Pang, Yu Jun, Jun Wang, and Li Feng Wei. "Research of Embedded Internet Technology for Internet of Things." Applied Mechanics and Materials 55-57 (May 2011): 2153–56. http://dx.doi.org/10.4028/www.scientific.net/amm.55-57.2153.

Full text
Abstract:
Development of Internet of things, the application of embedded Internet technology will be wide. This paper introduces characteristic of embedded Internet technology, concludes and compares resolutions of how to connect embedded equipment to Internet. At the same time, this paper analyses characteristic of embedded TCP/IP protocol and present method for developing embedded TCP/IP protocol.
APA, Harvard, Vancouver, ISO, and other styles
40

Mohammad Ali, Mohammad Ali. "Up-Gradation of Power System Protection Scheme through TCP/IP Using GUI in MATLAB/Simulink." journal of King Abdulaziz University Engineering Sciences 23, no. 1 (February 3, 2012): 21–36. http://dx.doi.org/10.4197/eng.23-2.2.

Full text
Abstract:
The paper is concerned with the Power System Protection schemes and the resulting design requirement that enhances stability as well as control with the implementation of TCP/IP. It discusses the architecture that upgrades the existing scheme by controlling all the control signals traffic between generating units, transmission system, connected loads and protection devices that are sensitive to control signals using TCP/IP and results are compared using Graphics User Interface (GUI) in MATLAB/Simulink. Protection system describes latest breakers circuit using indirect tripping command from generating units that protects load side through load breakers that receives action signal from local controllers that have a direct communication linkage with main server having strong data base, directly monitors everything through TCP/IP platform using GUI.
APA, Harvard, Vancouver, ISO, and other styles
41

Shi, Xue Fei, Tao Feng, and Xiao Ming Zhang. "Remote Data Acquisition System Based on Embedded RT-Thread." Applied Mechanics and Materials 241-244 (December 2012): 2238–41. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2238.

Full text
Abstract:
Currently integrated network controller could implement data transmission through Internet. But commonly they have higher power consumption, fewer channels which could not be changed and less TCP/IP connection. A remote data acquisition technology based on embedded real-time operating system RT-Thread is presented in this paper. Server and client were constructed respectively according to TCP/IP protocol stack provided by operating system itself. Hardware circuit was centered with large capacity enhanced MCU named STM32F103ZET6. Ethernet interface chip DM9000AEP and network connection HR911105A were applied in our system. Socket API interface functions provided by RT-Thread were utilized in client and server software programs. Experimental results show that this system needs less hardware sources to implement more TCP/IP connections during remote data acquisition process.
APA, Harvard, Vancouver, ISO, and other styles
42

Karolak, Juliusz, and Andrzej Kochan. "An application of TCP and UDP protocols in the connection of railway traffic control systems." WUT Journal of Transportation Engineering 126 (September 1, 2019): 49–59. http://dx.doi.org/10.5604/01.3001.0013.6396.

Full text
Abstract:
The article presents the possible implementation of the interface between computer devices: TCP and UDP protocols of one of the layers of the TCP / IP model, along with their features. Responses to errors were distinguished. Then an example of cooperation between two actual rail traffic control systems and other examples was presented, supplementing them with the proposed classification of connections. Systems are also presented, inside which network connections using TCP and IP protocols are used. The influence of the indicated damages on the substantive work of the connection was also presented.
APA, Harvard, Vancouver, ISO, and other styles
43

Nishijima, Takamichi, Nobuhiro Yokoi, Yoichi Nakamoto, and Hiroyuki Ohsaki. "Estimation of Performance Improvement Derived from TCP/IP Offload Engine with Software Emulation." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 1 (December 20, 2013): 3117–30. http://dx.doi.org/10.24297/ijct.v12i1.3366.

Full text
Abstract:
Many TOE (TCP/IP Offload Engine) devices have been developed and installed in high-end systems. Although there have been many analysis of the effectiveness of TOE devices, there remain open issues related to them. For example, it has not been clarified which part of TCP/IP processing should be performed with hardware and which with software, or how end-to-end TCP/IP performance is affected by the introduction of a TOE device. In this paper, we propose VOSE (Virtual Offloading with Software Emulation), which is a technique for measuring TCP/IP performance improvements derived from different type of TOE devices without implementing TOE prototypes really. VOSE enables virtual offloading without requiring a hardware TOE device by virtually emulating TOE processing on both source and destination end hosts. For demonstrating the effectiveness of VOSE, we apply VOSE to the TCP checksum and IPsec protocol. We extensively examine the accuracy of virtual offloading with VOSE, by comparing performance (i.e., end-to-end performance and CPU processing overhead) between VOSE and a dedicated TOE device. Moreover, we estimate performance improvement that are derived from several TOE devices of IPsec and combinations of those devices, by applying VOSE to header authenticating and payload encryption in IPsec protocol. Consequently, we show that performance improvements which are derived from TOE devices can be estimated correctly.
APA, Harvard, Vancouver, ISO, and other styles
44

KRISTIANA, LISA, and MUHAMMAD RAFLY. "Implementasi Single-Hop Wireless Sensor Network pada Lintasan Mobil Remote Control." MIND Journal 7, no. 1 (June 29, 2022): 72–86. http://dx.doi.org/10.26760/mindjournal.v7i1.72-86.

Full text
Abstract:
ABSTRAKPenerapan teknologi dalam sistem pemantauan dapat mengatasi kelemahan pada pemantauan secara manual. Untuk meningkatkan kualitas pemantauan, diperlukan suatu sistem yang dapat memantau mobil remote control yang berada di lintasan. Wireless Sensor Network (WSN) merupakan teknologi yang dapat meningkatkan efisiensi pemantauan secara otomatis pada area tertentu. WSN pada lintasan menerapkan sistem komunikasi Single-Hop. Sistem Single-Hop menggunakan sensor node (obstacle infrared) untuk mendeteksi mobil di area lintasan, lalu dikirim langsung oleh sink node ke server dengan menggunakan ESP8266-01. Arsitektur WSN menggunakan Topologi Point to Point terhubung langsung antara sensor node dengan Access Point. Metode pengiriman Single-Hop menggunakan Transmission Control Protocol/Internet Protocol (TCP/IP). Hasil pengujian TCP/IP berdasarkan jarak baca sensor menggunakan parameter Quality of Service (QoS) meliputi parameter Delay, Jitter, Throughput, Packet loss, menghasilkan delay, jitter dan throughput yang sangat baik dan stabil, dan paket loss 0%. Kemudian TCP/IP menguji tingkat akurasi pengiriman data ke server sebanyak 400 kali menghasilkan tingkat akurasi 100%.Kata kunci: lintasan mobil remote control, single-hop wireless sensor network ABSTRACTApplication of technology in monitoring system can overcome weaknesses in manual monitoring. To improve quality of monitoring, need system that can monitor remote control cars on track. Wireless Sensor Network (WSN) is technology that can increase monitoring efficiency automatically in certain areas. WSN on track implements Single-Hop communication system. Single-Hop system uses sensor node (obstacle infrared) to detect cars in the track area, then sent directly by sink node to server using ESP8266-01. WSN architecture uses Point to Point topology connected directly between sensor nodes and Access Point. Single-Hop delivery method uses Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP test results based on sensor reading distance using Quality of Service (QoS) parameters including Delay, Jitter, Throughput, Packet loss parameters, resulting in excellent and stable delay, jitter and throughput, and 0% packet loss. Then TCP/IP tests the accuracy of sending data to server 400 times resulting in an accuracy rate of 100%.Keywords: remote control car track, single-hop wireless sensor network
APA, Harvard, Vancouver, ISO, and other styles
45

Giocomazzi, P., L. Musumeci, and G. Verticale. "Transport of TCP/IP traffic over assured forwarding IP-differentiated services." IEEE Network 17, no. 5 (September 2003): 18–28. http://dx.doi.org/10.1109/mnet.2003.1233914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Yan, Shi Yang. "Design and Implementation of ZigBee Gateway for Ethernet." Applied Mechanics and Materials 571-572 (June 2014): 438–42. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.438.

Full text
Abstract:
WSN (Wireless sensor network) using ZigBee has aroused people’s high interest, ZigBee is considered to be a general solution in many fields such as intelligent household, industrial application, security monitoring and medical application. But wireless sensor network can only provide service within a certain range, in order to overcome this limitation and provide remote application capacity, this paper proposes a technological solutions for the interconnection of ZigBee network and the Ethernet, develops a ZigBee gateway based on ARM platform. Based on the analysis of the ZigBee protocol stack and TCP/IP protocol stack, the protocol conversion mechanism of ZigBee and TCP/IP is presented. Through transplantation LwIP protocol stack, this paper achieves the goal of connecting gateway to Internet, and finally realizes the conversion from ZigBee network to TCP/IP network.
APA, Harvard, Vancouver, ISO, and other styles
47

Shi, Zhi Yuan, He Ming Lu, He Zhi Lin, and Lian Fen Huang. "A DHT-Based Networking and Addressing Method in the TCP/IP Building Intercom System." Applied Mechanics and Materials 427-429 (September 2013): 2778–82. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2778.

Full text
Abstract:
In the TCP/IP building intercom system, broadcast addressing or query-list addressing are often used to obtain the IP address of the called party. However, these methods are limited by the function of the network equipment, intolerable resource costs, and high failure rate of querying. To solve such problems, this paper presents a networking and addressing method in the TCP/IP building intercom system which is based on Distributed Hash Table (DHT). Results from theoretical analysis and simulations show the feasibility and superiority of such a method.
APA, Harvard, Vancouver, ISO, and other styles
48

Dovzhenko, Timur. "DSREM REGULATOR IN THE TCP/IP NETWORK." EUREKA: Physics and Engineering 4 (July 29, 2016): 39–46. http://dx.doi.org/10.21303/2461-4262.2016.000127.

Full text
Abstract:
The paper presents the main parameters and describes the behavior of the active queue management (AQM) algorithm which based on random exponential marking (REM) packets in TCP/IP network. It has presented the new AQM algorithm, which has been developed by author, which is based on REM and uses dynamically splitting marking characteristic (DSREM) of network packets. The basic parameters and functional principle of DSREM algorithm have been shown. Block diagram of linearized AQM system, which is based on DSREM management law and describes its main components, is shown. Transfer characteristic for DSREM, which is based on the Laplace transform and its basic parameters, are considered. Simulation of TCP/IP network, which contains congested link for small and large sources of incoming messages using REM and DSREM regulators, is done. Log-frequency characteristics for REM and DSREM methods are obtained and their comparative analysis is performed. It is concluded that the regulator based on DSREM algorithm has better performance and stability of the system can be used in the AQM system.
APA, Harvard, Vancouver, ISO, and other styles
49

Bartoň, Martin, Roman Budjač, Pavol Tanuška, Peter Schreiber, and Tibor Horák. "Industry Communication Based on TCP/IP Protocol." Research Papers Faculty of Materials Science and Technology Slovak University of Technology 29, no. 49 (September 1, 2021): 59–66. http://dx.doi.org/10.2478/rput-2021-0025.

Full text
Abstract:
Abstract The design of control systems needs to ensure communication between multiple PLCs or external IoT devices. Furthermore, there are several ways of communication between them. This article dealt with the PLC communication based on TCP/IP protocol, and compared several communication options between two PLCs of the S7-300 and S7-1200 series connected using Profinet with a solution built in C# connected to the PLC via an OPC server. We used MODBUS TCP, TCON, and PUT/GET program blocks for comparison. We transmitted a digital Boolean data type and an analogue value of the integer data type via Profinet to read data from the S7-300 PLC and send data to the S7-1200. We compared the programming instructions standardly used as a client/server PLC programming with a Windows Forms application, and evaluated the advantages and disadvantages of this solution even when using external IoT devices. The solution was applied and successfully tested for communication between PLC S7-1200 and Nvidia Jetson Nano. We wrote program instructions for PLC in Siemens Tia Portal V15.
APA, Harvard, Vancouver, ISO, and other styles
50

Jiantao Wang, Lun Li, S. H. Low, and J. C. Doyle. "Cross-layer optimization in TCP/IP networks." IEEE/ACM Transactions on Networking 13, no. 3 (June 2005): 582–95. http://dx.doi.org/10.1109/tnet.2005.850219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography