Letteratura scientifica selezionata sul tema "IP (Computer network protocol)"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "IP (Computer network protocol)".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "IP (Computer network protocol)"

1

Neeru Kumari e Dr. Tilak Raj. "OSPF Metric Convergence and Variation Analysis During Redistribution with Routing Information Protocol". International Research Journal on Advanced Engineering and Management (IRJAEM) 2, n. 06 (22 giugno 2024): 1985–91. http://dx.doi.org/10.47392/irjaem.2024.0293.

Testo completo
Abstract (sommario):
Open Shortest Path First networking protocol falls under the category of Interior gateway routing protocols and is multi-vendor supported. The task of OSPF like any other routing protocol is to calculate the best path between source IP address and destination IP address within the organisation computer network. There are various other routing protocols like Routing Information Protocol, Border Gateway Protocol, Intermediate System - Intermediate System (IS-IS), Enhanced Interior Gateway Routing Protocol, etc. which are used in computer network. Routing protocols have different algorithms through which they compute the best path selection criteria. OSPF because of its flexible design is often used with other routing protocol over the large network. This research focuses on the working of OSPF metric value variation and convergence for best path selection using network simulation tool like Cisco Packet Tracer tool for getting similar outcome just like a real networking device like router working in a real production environment. This research would use multiple combinations of OSPF metric calculation for routes learned from other routing protocols like Routing Information Protocol (RIP). Being able to correctly identify metric values obtain by testing with OSPF and other routing protocols and analysis them for best path selection.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

KOVACIK, Cyril Filip, e Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK". Acta Electrotechnica et Informatica 1335-8243, n. 1338-3957 (9 giugno 2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.

Testo completo
Abstract (sommario):
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end devices, determination of the operational properties of this implementation, and their comparison in different conditions. VoIP traffic is compared at different bandwidths and implemented by different configurations of IP protocols. By investigated implementations of IP protocols are meant IPv4, IPv6, and IPv4 protocol with applied NAT. As part of the application of various IP protocols is also compared VoIP communication with a video stream on a local basis. The conclusion of the paper is devoted to the graphical evaluation of these observations and to draw conclusions based on them.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Alfaresa, Yuansa, Bongga Arifwidodo e Fauza Khair. "Automate IGP and EGP Routing Protocol Configuration using a Network Automation Library". Jurnal Online Informatika 8, n. 2 (28 dicembre 2023): 222–31. http://dx.doi.org/10.15575/join.v8i2.1157.

Testo completo
Abstract (sommario):
Data communication is sending data from client to client through a computer network. The increasing use of data communication makes computer networks more complex. Complex computer networks make it difficult for network administrators to configure them, especially routing protocol configuration. Network administrators are in charge of configuring routing protocols and managing networks. In addition, the more devices on the network, the greater the chance of human error from the administrator. Therefore, network automation is one solution that helps network administrators overcome this. This study focuses on analyzing the performance of network automation using the Paramiko and Telnetlib libraries. The routing protocol used by OSPF for IGP and BGP for EGP. The scenario in this study involves configuring IP addresses and configuring OSPF and BGP routing. Based on the test results, the Telnetlib library is better than the Paramiko library in terms of script delivery time, convergence time, and delay by 19.237% when applied to the IGP and EGP routing protocols.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Rafif Abyakto, Naif Baihaqi, M. Aldi Firdaus, Salsabila Aulia e Didik Aribowo. "Simulasi TCP-IP Menggunakan Topologi Bus". Uranus : Jurnal Ilmiah Teknik Elektro, Sains dan Informatika 2, n. 2 (11 maggio 2024): 07–14. http://dx.doi.org/10.61132/uranus.v2i2.97.

Testo completo
Abstract (sommario):
One important technique for understanding and analyzing computer network performance is TCP/IP simulacrum. In this research, we simulate a TCP/IP network using the bus topology as a model. We use the Cisco Packet Tracer simulated network topology builder to create a bus topology and implement the TCP/IP protocol. The simulation results provide more accurate understanding of how the TCP/IP protocol functions within a bus network. We analyze network performance in terms of throughput, latency, and packet loss. The analysis's findings indicate that bus topologies have a certain amount of leeway in network operations, particularly when a collision occurs. However, this simulation offers a valuable tool to improve computer network design and management.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

YIMING, ALIMUJIANG, e TOSHIO EISAKA. "A SWITCHED ETHERNET PROTOCOL FOR HARD REAL-TIME EMBEDDED SYSTEM APPLICATIONS". Journal of Interconnection Networks 06, n. 03 (settembre 2005): 345–60. http://dx.doi.org/10.1142/s0219265905001460.

Testo completo
Abstract (sommario):
This paper presents a protocol to support hard real-time traffic of end-to-end communication over non real-time LAN technology. The network is set up with nodes and switches, and real-time communication is handled by software (protocol) added between the Ethernet protocols and the TCP/IP suite. The proposed protocol establishes a virtual circuit based on admission control and manages hard real-time traffic to bypass the TCP/IP stack. This makes considerably reduce the dwell time in the nodes, and increase the achievable data frame rate. After the bypassing, traffic schedule is performed according to dynamic-priority EDF algorithm. The work does not need any modifications in the Ethernet hardware and coexists with TCP/IP suites, and then the LAN with the protocol can be connected to any existing Ethernet networks. It can be adopted in industrial hard real-time applications such as embedded systems, distributed control systems, parallel signal processing and robotics. We have performed some experiments to evaluate the protocol. Compared to some conventional hard real-time network protocols, the proposed one has better real-time performances and meets the requirements of reliability for hard real-time systems.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Bein, Adrian Sean, e Alexander Williams. "Networking IP Restriction filtering and network address". IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, n. 2 (30 aprile 2020): 172–77. http://dx.doi.org/10.34306/itsdi.v1i2.149.

Testo completo
Abstract (sommario):
Permissions setting on a computer is necessary. This is an effort that is not easy to change the system configuration or settings changed by the user. With a network of computers, of course, permissions settings do not need to be done one by one manually. Because in a computer network course there are many collections of computers connected together. Permissions setting so that the system can use the client-server applications that access restrictions can be done effectively. As the implementation of client-server applications can be created using Visual Basic 6.0. This language has been able to access the socket on the Windows operating system, named Winsock API that supports TCP / IP. This protocol is widely used because of the reliability of client-server application programming. The application is divided into two main applications, namely the client and server program name with the name of the Receiver Sender program. Receiver function receives instructions restriction of access rights Sender and sends reports to the Sender process execution. While Sender functions to send instructions restrictions permissions via the Registry to the Receiver. And after the test, the application can block important features available in the Windows operating system. So it is expected that these applications can help in permissions setting on a computer network.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Upadhyay, Paramesh C., e Sudarshan Tiwari. "Network Layer Mobility Management Schemes for IP-Based Mobile Networks". International Journal of Mobile Computing and Multimedia Communications 2, n. 3 (luglio 2010): 47–60. http://dx.doi.org/10.4018/jmcmc.2010070104.

Testo completo
Abstract (sommario):
Mobility is a natural phenomenon in cellular networks. The worldwide popularity of mobile communications and Internet has necessitated the merger of the two fast growing technologies to get their fullest advantages. The Internet protocol (IP) was designed for static hosts only. Therefore, in order to add mobility in Internet, the Internet protocol needs to be redefined. This paper is intended to present an overview of various mobility management schemes, available in literature, for IP-based mobile networks.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Hu, Yao, Ting Peng e Lianming Zhang. "Software-Defined Congestion Control Algorithm for IP Networks". Scientific Programming 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/3579540.

Testo completo
Abstract (sommario):
The rapid evolution of computer networks, increase in the number of Internet users, and popularity of multimedia applications have exacerbated the congestion control problem. Congestion control is a key factor in ensuring network stability and robustness. When the underlying network and flow information are unknown, the transmission control protocol (TCP) must increase or reduce the size of the congestion window to adjust to the changes of traffic in the Internet Protocol (IP) network. However, it is possible that a software-defined approach can relieve the network congestion problem more efficiently. This approach has the characteristic of centralized control and can obtain a global topology for unified network management. In this paper, we propose a software-defined congestion control (SDCC) algorithm for an IP network. We consider the difference between TCP and the user datagram protocol (UDP) and propose a new method to judge node congestion. We initially apply the congestion control mechanism in the congested nodes and then optimize the link utilization to control network congestion.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Hammoudi, Modhar A. "Building Model for the University of Mosul Computer Network Using OPNET Simulator". Tikrit Journal of Engineering Sciences 18, n. 2 (30 giugno 2011): 34–44. http://dx.doi.org/10.25130/tjes.18.2.04.

Testo completo
Abstract (sommario):
This paper aims at establishing a model in OPNET (Optimized Network Engineering Tool) simulator for the University of Mosul computer network. The proposed network model was made up of two routers (Cisco 2600), core switch (Cisco6509), two servers, ip 32 cloud and 37 VLANs. These VLANs were connected to the core switch using fiber optic cables (1000BaseX). Three applications were added to test the network model. These applications were FTP (File Transfer Protocol), HTTP (Hyper Text Transfer Protocol) and VoIP (Voice over Internet Protocol). The results showed that the proposed model had a positive efficiency on designing and managing the targeted network and can be used to view the data flow in it. Also, the simulation results showed that the maximum number of VoIP service users could be raised up to 5000 users when working under IP Telephony. This means that the ability to utilize VoIP service in this network can be maintained and is better when subjected to IP telephony scheme
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Stepanov, P. P., G. V. Nikonova, T. S. Pavlyuchenko e V. V. Soloviev. "Features of Address Resolution Protocol Operation in Computer Networks". Programmnaya Ingeneria 13, n. 5 (16 maggio 2022): 211–18. http://dx.doi.org/10.17587/prin.13.211-218.

Testo completo
Abstract (sommario):
The paper analyzes the network protocols of computer networks to identify potential vulnerabilities at the software level. The conditions for carrying out a man-in-the-middle attack in networks using the Address Resolution Protocol (ARP) are investigated. Such attacks are of a rather dangerous type, since they are based on the shortcomings of the ARP protocol. A detailed analysis of the stages of the attack and the sequence of impact on the attacked node is given. The technology of ARP spoofing (poisoning) and methods that allow one to infiltrate an existing connection and communication process are examined in detail. An implementation of an ARP spoofing attack in the Python and C# programming languages using the Soapy and SharpPcap libraries is presented. Examples of implementation of denial-of-service (DoS) attacks in a peer-to-peer network using the ARP protocol in C# are given. The article also describes examples of man-in-the-middle attacks associated with various protocols and infiltration into the address space of routers, such as DHCP (a protocol that dynamically assigns an IP address to a client computer) spoofing and ICMP (Internet Control Message Protocol) redirection. Methods for hacking a router and substituting a MAC address and examples of scripts that implement: sending a fake ARP packet; a function for performing a DoS attack; changing the Linux MAC address; router hacks, are presented in the article.
Gli stili APA, Harvard, Vancouver, ISO e altri

Tesi sul tema "IP (Computer network protocol)"

1

Nematbakhsh, Mohammadali. "TCP/IP PROTOCOL BOARD USING SINGLE CHIP PROCESSOR". Thesis, The University of Arizona, 1985. http://hdl.handle.net/10150/275389.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Carter, Steven Michael. "Implementation and analysis of the IP measurement protocol (IPMP)". Master's thesis, Mississippi State : Mississippi State University, 2001. http://library.msstate.edu/etd/show.asp?etd=etd-11152001-090121.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Zhao, Ting. "Fast IP lookup engine /". View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20ZHAOT.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Mustell, Eliot John. "Internet Protocol Version 6: The Next Generation?" [Milwaukee, Wis.] : e-Publications@Marquette, 2009. http://epublications.marquette.edu/theses_open/23.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Ramasubramaniam, Venkata Lakshmanan. "A framework for reliable multicast protocol". [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000599.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Wu, Chen. "A new TCP protocol based on end-to-end available bandwidth measurement /". View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202005%20WU.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Arpaci, Mutlu. "Congestion avoidance in TCP/IP networks". Diss., Georgia Institute of Technology, 2001. http://hdl.handle.net/1853/15356.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Ahmed, Mahad A. (Mahad Mohamed) 1973 Carleton University Dissertation Engineering Systems and Computer. "Performance analysis and improvement of the Open Shortest Path First routing protocol". Ottawa.:, 1999.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Bickhart, Ryan W. "Transparent TCP-to-SCTP translation shim layer". Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 0.44 Mb, 82 p, 2005. http://wwwlib.umi.com/dissertations/fullcit/1428177.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Williams, James Pate. "A quantitative study of musical instrument digital interface (MIDI) over Internet Protocol (IP) protocols". Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Fall/Dissertation/WILLIAMS_JAMES_14.pdf.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Libri sul tema "IP (Computer network protocol)"

1

Cameron, Deb, a cura di. TCP/IP Network Administration. Beijing: O’Reilly Media, 2010.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Hunt, Craig. TCP/IP Network Administration. Sebastopol, CA: O’Reilly Media, 1992.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Blank, Andrew G. TCP/IP JumpStart. New York: John Wiley & Sons, Ltd., 2006.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Forouzan, Behrouz A. TCP/IP protocol suite. Boston: McGraw-Hill, 2000.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Osterloh, Heather. TCP/IP primer plus. Indianapolis, Ind: Sams, 2002.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Forouzan, Behrouz A. TCP/IP protocol suite. 2a ed. Boston: McGraw-Hill, 2003.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Hunt, Craig. TCP/IP Network Administration. A cura di Mike Loukides e Debra Cameron. 3a ed. Beijing: O’Reilly Media, 2002.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Hunt, Craig. TCP/IP Network Administration. Sebastopol, CA: O’Reilly Media, 1992.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Hunt, Craig. TCP/IP Network Administration. 3a ed. Sebastopol, CA: O’Reilly Media, 2002.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Loukides, Mike, e Gigi Estabrook, a cura di. TCP/IP Network Administration. 2a ed. Beijing: O’Reilly Media, 1998.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Capitoli di libri sul tema "IP (Computer network protocol)"

1

Skurowski, Przemysław, Robert Wójcicki e Zbigniew Jerzak. "Evaluation of IP Transmission Jitter Estimators Using One-Way Active Measurement Protocol (OWAMP)". In Computer Networks, 153–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13861-4_15.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Yew, Kok Meng, R. M. Zahidur e Sai Peck Lee. "Mean Time Offset Protocol for Cluster of Auction Servers Over TCP/IP Network". In Lecture Notes in Computer Science, 323–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-46652-9_33.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Siddiqi, Amir, e Biswajit Nandy. "Improving Network Convergence Time and Network Stability of an OSPF-Routed IP Network". In NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 469–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11422778_38.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Tsolakou, E., E. Nikolouzou e S. Venieris. "On Providing End-To-End QoS Introducing a Set of Network Services in Large-Scale IP Networks". In NETWORKING 2002: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications, 1227–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-47906-6_112.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Elahi, Ata, e Alex Cushman. "Voice over Internet Protocols (Voice over IP)". In Computer Networks, 229–41. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-42018-4_11.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

de Alencar, Marcelo Sampaio. "The TCP/IP Protocol". In Cryptography and Network Security, 135–57. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003337768-8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Wozniak, Jozef, Przemyslaw Machan, Krzysztof Gierlowski, Michal Hoeft e Michal Lewczuk. "Comparative Analysis of IP-Based Mobility Protocols and Fast Handover Algorithms in IEEE 802.11 Based WLANs". In Computer Networks, 87–101. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21771-5_11.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Weik, Martin H. "network management protocol". In Computer Science and Communications Dictionary, 1088. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12251.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Marchette, David J. "TCP/IP Networking". In Computer Intrusion Detection and Network Monitoring, 3–42. New York, NY: Springer New York, 2001. http://dx.doi.org/10.1007/978-1-4757-3458-4_1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Kong, Ki-Sik, Ui-Sung Song, Jin-Su Kim e Chong-Sun Hwang. "Performance Analysis of IP Mobility Protocols in Wireless Mobile Networks". In Lecture Notes in Computer Science, 412–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25969-5_37.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Atti di convegni sul tema "IP (Computer network protocol)"

1

Gazdar, A., e A. Belghith. "A Discrete Optimal Broadcasting Protocol in an IP Network". In IEEE International Conference on Computer Systems and Applications, 2006. IEEE, 2006. http://dx.doi.org/10.1109/aiccsa.2006.205222.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Kleptsov, M. Y., e M. V. Katina. "A METHOD FOR DETECTING AND PREVENTING ARP-SPOOFING ATTACKS ON A COMPUTER NETWORK". In Intelligent transport systems. Russian University of Transport, 2024. http://dx.doi.org/10.30932/9785002446094-2024-611-616.

Testo completo
Abstract (sommario):
The ARP-spoofing (Address Resolution Protocol- spoofing) cyberattack nowadays poses a serious threat to the security of computer networks (CS). It is based on the abuse of the ARP protocol, which is responsible for matching IP addresses and physical MAC addresses in local networks. Using this type of attack, an attacker can intercept, redirect and even modify network traffic between devices, leading to serious negative consequences, such as reducing the confidentiality of transmitted data, introducing malware and spoofing network traffic. In the context of the constant development of information technology, the relevance and importance of this problem is increasing, especially for organizations and users of networks working in the logistics and transport. Transport has become a leader in the growth rate of fishing attacks. In this industry, by the end of 2023, the share of attacks of this type increased 2.4 times. This is the data of the BI.ZONE company. Based on the above, the main purpose of this article is, based on the analysis of methods of substitution and distortion of ARP records of the network infrastructure, to propose ways to protect against ARP spoofing, which are based on monitoring ARP records.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

LENARDIC, DANIEL Z., BRANKA ZOVKO-CIHLAR e MISLAV GRGIC. "ANALYSIS OF TCP/IP PROTOCOL BEHAVIOUR IN A CONGESTED MULTIMEDIA COMPUTER NETWORK". In Proceedings of the 9th International Workshop on Systems, Signals and Image Processing. WORLD SCIENTIFIC, 2002. http://dx.doi.org/10.1142/9789812776266_0007.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Bai, Jin, Salim Hariri e Youssif Al-Nashif. "A Network Protection Framework for DNP3 over TCP/IP protocol". In 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2014. http://dx.doi.org/10.1109/aiccsa.2014.7073172.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Makaya, Christian, e Samuel Pierre. "Handoff Protocol for Heterogeneous All-IP-based Wireless Networks". In 2006 Canadian Conference on Electrical and Computer Engineering. IEEE, 2006. http://dx.doi.org/10.1109/ccece.2006.277808.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Aksoy, Ahmet, e Mehmet Hadi Gunes. "Operating System Classification Performance of TCP/IP Protocol Headers". In 2016 IEEE 41st Conference on Local Computer Networks: Workshops (LCN Workshops). IEEE, 2016. http://dx.doi.org/10.1109/lcn.2016.036.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

T., Charan Raj, Kumar Raja V., Suresh Kumar S. e Vamsi Krishna P. "Usage of Internet Protocal (IP) Network in Digital Library". In International Conference on Computer Applications — Networking. Singapore: Research Publishing Services, 2010. http://dx.doi.org/10.3850/978-981-08-7301-1_1410.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Liu Jiong, Zhang Jingbin, Han Kun, Chen Guang, Sun Pengchun e Feng Yeti. "A new data link layer protocol for satellite IP networks". In 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC). IEEE, 2013. http://dx.doi.org/10.1109/mec.2013.6885388.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Al-Rawi, Akram, e Azzedine Lansari. "Effect of Windows XP Firewall on Network Simulation and Testing". In InSITE 2007: Informing Science + IT Education Conference. Informing Science Institute, 2007. http://dx.doi.org/10.28945/3170.

Testo completo
Abstract (sommario):
The objective of this paper is to report findings from simulating and testing local area network (LAN) connectivity using Windows XP operating system and Cisco Networking Academy network devices. In this study, a simple routing protocol, RIP, is used as routing protocol. Two different techniques, Cisco Networking Academy hardware lab and Cisco Packet Tracer 4, were used to compare their performance to simulate network connectivity. Primary findings showed that the settings of the Windows XP firewall on the host computer have a direct impact on the test results. These findings are critical as there are no similar reports in the literature and only a careful investigation allowed the researchers to come to this conclusion. Furthermore, study results also offer suggestions for fixing problems that hinder simulation results of LANs that use Windows XP workstations. These findings can help CCNA students and faculty understand the reasons for unexplained connectivity problems when performing CCNA labs. The study also provides a simple method to avoid connectivity problems when using Windows ping.exe and tracert.exe which implement the TCP/IP protocol ICMP
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Munir, M. S., K. Ahmed, A. S. M. Shihavuddin, S. M. Nizamuddin e M. J. Sarker. "A new SS7-SIGTRAN protocol interchanger software and hardware to implement an improved distributed database based ATM network using existing IP network". In 2008 11th International Conference on Computer and Information Technology (ICCIT). IEEE, 2008. http://dx.doi.org/10.1109/iccitechn.2008.4803027.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Rapporti di organizzazioni sul tema "IP (Computer network protocol)"

1

Holdrege, M., e P. Srisuresh. Protocol Complications with the IP Network Address Translator. RFC Editor, gennaio 2001. http://dx.doi.org/10.17487/rfc3027.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Kazovsky, Leonid G., Ian White, Matt Rogge, Kapil Shrikhande e Erie Hu. Internet Protocol-Hybrid Opto-Electronic Ring Network (IP-HORNET): A Novel Internet Protocol-Over-Wavelength Division Multiplexing (IP-Over-WDM) Multiple-Access Metropolitan Area Network (MAN). Fort Belvoir, VA: Defense Technical Information Center, aprile 2003. http://dx.doi.org/10.21236/ada415560.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Johansson, O., G. Salgueiro e V. Gurbani. Locating Session Initiation Protocol (SIP) Servers in a Dual-Stack IP Network. A cura di D. Worley. RFC Editor, settembre 2016. http://dx.doi.org/10.17487/rfc7984.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Cleveland, William S., Hui Chen, Bowei Xi e Jin Cao. Internet Protocol (IP) Network Measurement, Characterization, Modeling, and Control for Self-Managed Networks. Fort Belvoir, VA: Defense Technical Information Center, settembre 2005. http://dx.doi.org/10.21236/ada439560.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Kastenholz, F. The Definitions of Managed Objects for the IP Network Control Protocol of the Point-to-Point Protocol. RFC Editor, giugno 1993. http://dx.doi.org/10.17487/rfc1473.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Callon, R. W., e H. W. Braun. Guidelines for the use of Internet-IP addresses in the ISO Connectionless-Mode Network Protocol. RFC Editor, giugno 1986. http://dx.doi.org/10.17487/rfc0986.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Callon, R. W., e H. W. Braun. Guidelines for the use of Internet-IP addresses in the ISO Connectionless-Mode Network Protocol. RFC Editor, febbraio 1989. http://dx.doi.org/10.17487/rfc1069.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

LI, Zhendong, Hangjian Qiu, xiaoqian Wang, chengcheng Zhang e Yuejuan Zhang. Comparative Efficacy of 5 non-pharmaceutical Therapies For Adults With Post-stroke Cognitive Impairment: Protocol For A Bayesian Network Analysis Based on 55 Randomized Controlled Trials. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, giugno 2022. http://dx.doi.org/10.37766/inplasy2022.6.0036.

Testo completo
Abstract (sommario):
Review question / Objective: This study will provide evidence-based references for the efficacy of 5 different non-pharmaceutical therapies in the treatment of post-stroke cognitive impairment(PSCI). 1. Types of studies. Only randomized controlled trials (RCTs) of Transcranial Magnetic Stimulation(TMS), Transcranial Direct Current Stimulation(tDCS), Acupuncture, Virtual Reality Exposure Therapy(VR) and Computer-assisted cognitive rehabilitation(CA) for PSCI will be recruited. Additionally, Studies should be available in full papers as well as peer reviewed and the original data should be clear and adequate. 2. Types of participants. All adults with a recent or previous history of ischaemic or hemorrhagic stroke and diagnosed according to clearly defined or internationally recognized diagnostic criteria, regardless of nationality, race, sex, age, or educational background. 3.Types of interventions and controls. The control group takes non-acupuncture treatment, including conventional rehabilitation or in combination with symptomatic support therapy. The experimental group should be treated with acupuncture on basis of the control group. 4.The interventions of the experimental groups were Transcranial Magnetic Stimulation(TMS), Transcranial Direct Current Stimulation(tDCS), Acupuncture, Virtual Reality Exposure Therapy(VR) or Computer-assisted cognitive rehabilitation(CA), and the interventions of the control group takes routine rehabilitation and cognition training or other therapies mentioned above that were different from the intervention group. 5.Types of outcomes. The primary outcomes are measured with The Mini-Mental State Examination (MMSE) and/or The Montreal Cognitive Assessment Scale (MoCA), which have been widely used to evaluate the cognitive abilities. The secondary outcome indicator was the Barthel Index (BI) to assess independence in activities of daily living (ADLs).
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia