Gotowa bibliografia na temat „IP (Computer network protocol)”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „IP (Computer network protocol)”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "IP (Computer network protocol)"

1

Neeru Kumari i Dr. Tilak Raj. "OSPF Metric Convergence and Variation Analysis During Redistribution with Routing Information Protocol". International Research Journal on Advanced Engineering and Management (IRJAEM) 2, nr 06 (22.06.2024): 1985–91. http://dx.doi.org/10.47392/irjaem.2024.0293.

Pełny tekst źródła
Streszczenie:
Open Shortest Path First networking protocol falls under the category of Interior gateway routing protocols and is multi-vendor supported. The task of OSPF like any other routing protocol is to calculate the best path between source IP address and destination IP address within the organisation computer network. There are various other routing protocols like Routing Information Protocol, Border Gateway Protocol, Intermediate System - Intermediate System (IS-IS), Enhanced Interior Gateway Routing Protocol, etc. which are used in computer network. Routing protocols have different algorithms through which they compute the best path selection criteria. OSPF because of its flexible design is often used with other routing protocol over the large network. This research focuses on the working of OSPF metric value variation and convergence for best path selection using network simulation tool like Cisco Packet Tracer tool for getting similar outcome just like a real networking device like router working in a real production environment. This research would use multiple combinations of OSPF metric calculation for routes learned from other routing protocols like Routing Information Protocol (RIP). Being able to correctly identify metric values obtain by testing with OSPF and other routing protocols and analysis them for best path selection.
Style APA, Harvard, Vancouver, ISO itp.
2

KOVACIK, Cyril Filip, i Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK". Acta Electrotechnica et Informatica 1335-8243, nr 1338-3957 (9.06.2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.

Pełny tekst źródła
Streszczenie:
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end devices, determination of the operational properties of this implementation, and their comparison in different conditions. VoIP traffic is compared at different bandwidths and implemented by different configurations of IP protocols. By investigated implementations of IP protocols are meant IPv4, IPv6, and IPv4 protocol with applied NAT. As part of the application of various IP protocols is also compared VoIP communication with a video stream on a local basis. The conclusion of the paper is devoted to the graphical evaluation of these observations and to draw conclusions based on them.
Style APA, Harvard, Vancouver, ISO itp.
3

Alfaresa, Yuansa, Bongga Arifwidodo i Fauza Khair. "Automate IGP and EGP Routing Protocol Configuration using a Network Automation Library". Jurnal Online Informatika 8, nr 2 (28.12.2023): 222–31. http://dx.doi.org/10.15575/join.v8i2.1157.

Pełny tekst źródła
Streszczenie:
Data communication is sending data from client to client through a computer network. The increasing use of data communication makes computer networks more complex. Complex computer networks make it difficult for network administrators to configure them, especially routing protocol configuration. Network administrators are in charge of configuring routing protocols and managing networks. In addition, the more devices on the network, the greater the chance of human error from the administrator. Therefore, network automation is one solution that helps network administrators overcome this. This study focuses on analyzing the performance of network automation using the Paramiko and Telnetlib libraries. The routing protocol used by OSPF for IGP and BGP for EGP. The scenario in this study involves configuring IP addresses and configuring OSPF and BGP routing. Based on the test results, the Telnetlib library is better than the Paramiko library in terms of script delivery time, convergence time, and delay by 19.237% when applied to the IGP and EGP routing protocols.
Style APA, Harvard, Vancouver, ISO itp.
4

Rafif Abyakto, Naif Baihaqi, M. Aldi Firdaus, Salsabila Aulia i Didik Aribowo. "Simulasi TCP-IP Menggunakan Topologi Bus". Uranus : Jurnal Ilmiah Teknik Elektro, Sains dan Informatika 2, nr 2 (11.05.2024): 07–14. http://dx.doi.org/10.61132/uranus.v2i2.97.

Pełny tekst źródła
Streszczenie:
One important technique for understanding and analyzing computer network performance is TCP/IP simulacrum. In this research, we simulate a TCP/IP network using the bus topology as a model. We use the Cisco Packet Tracer simulated network topology builder to create a bus topology and implement the TCP/IP protocol. The simulation results provide more accurate understanding of how the TCP/IP protocol functions within a bus network. We analyze network performance in terms of throughput, latency, and packet loss. The analysis's findings indicate that bus topologies have a certain amount of leeway in network operations, particularly when a collision occurs. However, this simulation offers a valuable tool to improve computer network design and management.
Style APA, Harvard, Vancouver, ISO itp.
5

YIMING, ALIMUJIANG, i TOSHIO EISAKA. "A SWITCHED ETHERNET PROTOCOL FOR HARD REAL-TIME EMBEDDED SYSTEM APPLICATIONS". Journal of Interconnection Networks 06, nr 03 (wrzesień 2005): 345–60. http://dx.doi.org/10.1142/s0219265905001460.

Pełny tekst źródła
Streszczenie:
This paper presents a protocol to support hard real-time traffic of end-to-end communication over non real-time LAN technology. The network is set up with nodes and switches, and real-time communication is handled by software (protocol) added between the Ethernet protocols and the TCP/IP suite. The proposed protocol establishes a virtual circuit based on admission control and manages hard real-time traffic to bypass the TCP/IP stack. This makes considerably reduce the dwell time in the nodes, and increase the achievable data frame rate. After the bypassing, traffic schedule is performed according to dynamic-priority EDF algorithm. The work does not need any modifications in the Ethernet hardware and coexists with TCP/IP suites, and then the LAN with the protocol can be connected to any existing Ethernet networks. It can be adopted in industrial hard real-time applications such as embedded systems, distributed control systems, parallel signal processing and robotics. We have performed some experiments to evaluate the protocol. Compared to some conventional hard real-time network protocols, the proposed one has better real-time performances and meets the requirements of reliability for hard real-time systems.
Style APA, Harvard, Vancouver, ISO itp.
6

Bein, Adrian Sean, i Alexander Williams. "Networking IP Restriction filtering and network address". IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, nr 2 (30.04.2020): 172–77. http://dx.doi.org/10.34306/itsdi.v1i2.149.

Pełny tekst źródła
Streszczenie:
Permissions setting on a computer is necessary. This is an effort that is not easy to change the system configuration or settings changed by the user. With a network of computers, of course, permissions settings do not need to be done one by one manually. Because in a computer network course there are many collections of computers connected together. Permissions setting so that the system can use the client-server applications that access restrictions can be done effectively. As the implementation of client-server applications can be created using Visual Basic 6.0. This language has been able to access the socket on the Windows operating system, named Winsock API that supports TCP / IP. This protocol is widely used because of the reliability of client-server application programming. The application is divided into two main applications, namely the client and server program name with the name of the Receiver Sender program. Receiver function receives instructions restriction of access rights Sender and sends reports to the Sender process execution. While Sender functions to send instructions restrictions permissions via the Registry to the Receiver. And after the test, the application can block important features available in the Windows operating system. So it is expected that these applications can help in permissions setting on a computer network.
Style APA, Harvard, Vancouver, ISO itp.
7

Upadhyay, Paramesh C., i Sudarshan Tiwari. "Network Layer Mobility Management Schemes for IP-Based Mobile Networks". International Journal of Mobile Computing and Multimedia Communications 2, nr 3 (lipiec 2010): 47–60. http://dx.doi.org/10.4018/jmcmc.2010070104.

Pełny tekst źródła
Streszczenie:
Mobility is a natural phenomenon in cellular networks. The worldwide popularity of mobile communications and Internet has necessitated the merger of the two fast growing technologies to get their fullest advantages. The Internet protocol (IP) was designed for static hosts only. Therefore, in order to add mobility in Internet, the Internet protocol needs to be redefined. This paper is intended to present an overview of various mobility management schemes, available in literature, for IP-based mobile networks.
Style APA, Harvard, Vancouver, ISO itp.
8

Hu, Yao, Ting Peng i Lianming Zhang. "Software-Defined Congestion Control Algorithm for IP Networks". Scientific Programming 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/3579540.

Pełny tekst źródła
Streszczenie:
The rapid evolution of computer networks, increase in the number of Internet users, and popularity of multimedia applications have exacerbated the congestion control problem. Congestion control is a key factor in ensuring network stability and robustness. When the underlying network and flow information are unknown, the transmission control protocol (TCP) must increase or reduce the size of the congestion window to adjust to the changes of traffic in the Internet Protocol (IP) network. However, it is possible that a software-defined approach can relieve the network congestion problem more efficiently. This approach has the characteristic of centralized control and can obtain a global topology for unified network management. In this paper, we propose a software-defined congestion control (SDCC) algorithm for an IP network. We consider the difference between TCP and the user datagram protocol (UDP) and propose a new method to judge node congestion. We initially apply the congestion control mechanism in the congested nodes and then optimize the link utilization to control network congestion.
Style APA, Harvard, Vancouver, ISO itp.
9

Hammoudi, Modhar A. "Building Model for the University of Mosul Computer Network Using OPNET Simulator". Tikrit Journal of Engineering Sciences 18, nr 2 (30.06.2011): 34–44. http://dx.doi.org/10.25130/tjes.18.2.04.

Pełny tekst źródła
Streszczenie:
This paper aims at establishing a model in OPNET (Optimized Network Engineering Tool) simulator for the University of Mosul computer network. The proposed network model was made up of two routers (Cisco 2600), core switch (Cisco6509), two servers, ip 32 cloud and 37 VLANs. These VLANs were connected to the core switch using fiber optic cables (1000BaseX). Three applications were added to test the network model. These applications were FTP (File Transfer Protocol), HTTP (Hyper Text Transfer Protocol) and VoIP (Voice over Internet Protocol). The results showed that the proposed model had a positive efficiency on designing and managing the targeted network and can be used to view the data flow in it. Also, the simulation results showed that the maximum number of VoIP service users could be raised up to 5000 users when working under IP Telephony. This means that the ability to utilize VoIP service in this network can be maintained and is better when subjected to IP telephony scheme
Style APA, Harvard, Vancouver, ISO itp.
10

Stepanov, P. P., G. V. Nikonova, T. S. Pavlyuchenko i V. V. Soloviev. "Features of Address Resolution Protocol Operation in Computer Networks". Programmnaya Ingeneria 13, nr 5 (16.05.2022): 211–18. http://dx.doi.org/10.17587/prin.13.211-218.

Pełny tekst źródła
Streszczenie:
The paper analyzes the network protocols of computer networks to identify potential vulnerabilities at the software level. The conditions for carrying out a man-in-the-middle attack in networks using the Address Resolution Protocol (ARP) are investigated. Such attacks are of a rather dangerous type, since they are based on the shortcomings of the ARP protocol. A detailed analysis of the stages of the attack and the sequence of impact on the attacked node is given. The technology of ARP spoofing (poisoning) and methods that allow one to infiltrate an existing connection and communication process are examined in detail. An implementation of an ARP spoofing attack in the Python and C# programming languages using the Soapy and SharpPcap libraries is presented. Examples of implementation of denial-of-service (DoS) attacks in a peer-to-peer network using the ARP protocol in C# are given. The article also describes examples of man-in-the-middle attacks associated with various protocols and infiltration into the address space of routers, such as DHCP (a protocol that dynamically assigns an IP address to a client computer) spoofing and ICMP (Internet Control Message Protocol) redirection. Methods for hacking a router and substituting a MAC address and examples of scripts that implement: sending a fake ARP packet; a function for performing a DoS attack; changing the Linux MAC address; router hacks, are presented in the article.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "IP (Computer network protocol)"

1

Nematbakhsh, Mohammadali. "TCP/IP PROTOCOL BOARD USING SINGLE CHIP PROCESSOR". Thesis, The University of Arizona, 1985. http://hdl.handle.net/10150/275389.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Carter, Steven Michael. "Implementation and analysis of the IP measurement protocol (IPMP)". Master's thesis, Mississippi State : Mississippi State University, 2001. http://library.msstate.edu/etd/show.asp?etd=etd-11152001-090121.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Zhao, Ting. "Fast IP lookup engine /". View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20ZHAOT.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Mustell, Eliot John. "Internet Protocol Version 6: The Next Generation?" [Milwaukee, Wis.] : e-Publications@Marquette, 2009. http://epublications.marquette.edu/theses_open/23.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Ramasubramaniam, Venkata Lakshmanan. "A framework for reliable multicast protocol". [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000599.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Wu, Chen. "A new TCP protocol based on end-to-end available bandwidth measurement /". View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202005%20WU.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Arpaci, Mutlu. "Congestion avoidance in TCP/IP networks". Diss., Georgia Institute of Technology, 2001. http://hdl.handle.net/1853/15356.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Ahmed, Mahad A. (Mahad Mohamed) 1973 Carleton University Dissertation Engineering Systems and Computer. "Performance analysis and improvement of the Open Shortest Path First routing protocol". Ottawa.:, 1999.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Bickhart, Ryan W. "Transparent TCP-to-SCTP translation shim layer". Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 0.44 Mb, 82 p, 2005. http://wwwlib.umi.com/dissertations/fullcit/1428177.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Williams, James Pate. "A quantitative study of musical instrument digital interface (MIDI) over Internet Protocol (IP) protocols". Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Fall/Dissertation/WILLIAMS_JAMES_14.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "IP (Computer network protocol)"

1

Cameron, Deb, red. TCP/IP Network Administration. Beijing: O’Reilly Media, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Hunt, Craig. TCP/IP Network Administration. Sebastopol, CA: O’Reilly Media, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Blank, Andrew G. TCP/IP JumpStart. New York: John Wiley & Sons, Ltd., 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Forouzan, Behrouz A. TCP/IP protocol suite. Boston: McGraw-Hill, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Osterloh, Heather. TCP/IP primer plus. Indianapolis, Ind: Sams, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Forouzan, Behrouz A. TCP/IP protocol suite. Wyd. 2. Boston: McGraw-Hill, 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Hunt, Craig. TCP/IP Network Administration. Redaktorzy Mike Loukides i Debra Cameron. Wyd. 3. Beijing: O’Reilly Media, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Hunt, Craig. TCP/IP Network Administration. Sebastopol, CA: O’Reilly Media, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Hunt, Craig. TCP/IP Network Administration. Wyd. 3. Sebastopol, CA: O’Reilly Media, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Loukides, Mike, i Gigi Estabrook, red. TCP/IP Network Administration. Wyd. 2. Beijing: O’Reilly Media, 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "IP (Computer network protocol)"

1

Skurowski, Przemysław, Robert Wójcicki i Zbigniew Jerzak. "Evaluation of IP Transmission Jitter Estimators Using One-Way Active Measurement Protocol (OWAMP)". W Computer Networks, 153–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13861-4_15.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Yew, Kok Meng, R. M. Zahidur i Sai Peck Lee. "Mean Time Offset Protocol for Cluster of Auction Servers Over TCP/IP Network". W Lecture Notes in Computer Science, 323–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-46652-9_33.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Siddiqi, Amir, i Biswajit Nandy. "Improving Network Convergence Time and Network Stability of an OSPF-Routed IP Network". W NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 469–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11422778_38.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Tsolakou, E., E. Nikolouzou i S. Venieris. "On Providing End-To-End QoS Introducing a Set of Network Services in Large-Scale IP Networks". W NETWORKING 2002: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications, 1227–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-47906-6_112.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Elahi, Ata, i Alex Cushman. "Voice over Internet Protocols (Voice over IP)". W Computer Networks, 229–41. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-42018-4_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

de Alencar, Marcelo Sampaio. "The TCP/IP Protocol". W Cryptography and Network Security, 135–57. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003337768-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Wozniak, Jozef, Przemyslaw Machan, Krzysztof Gierlowski, Michal Hoeft i Michal Lewczuk. "Comparative Analysis of IP-Based Mobility Protocols and Fast Handover Algorithms in IEEE 802.11 Based WLANs". W Computer Networks, 87–101. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21771-5_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Weik, Martin H. "network management protocol". W Computer Science and Communications Dictionary, 1088. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12251.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Marchette, David J. "TCP/IP Networking". W Computer Intrusion Detection and Network Monitoring, 3–42. New York, NY: Springer New York, 2001. http://dx.doi.org/10.1007/978-1-4757-3458-4_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Kong, Ki-Sik, Ui-Sung Song, Jin-Su Kim i Chong-Sun Hwang. "Performance Analysis of IP Mobility Protocols in Wireless Mobile Networks". W Lecture Notes in Computer Science, 412–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25969-5_37.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "IP (Computer network protocol)"

1

Gazdar, A., i A. Belghith. "A Discrete Optimal Broadcasting Protocol in an IP Network". W IEEE International Conference on Computer Systems and Applications, 2006. IEEE, 2006. http://dx.doi.org/10.1109/aiccsa.2006.205222.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Kleptsov, M. Y., i M. V. Katina. "A METHOD FOR DETECTING AND PREVENTING ARP-SPOOFING ATTACKS ON A COMPUTER NETWORK". W Intelligent transport systems. Russian University of Transport, 2024. http://dx.doi.org/10.30932/9785002446094-2024-611-616.

Pełny tekst źródła
Streszczenie:
The ARP-spoofing (Address Resolution Protocol- spoofing) cyberattack nowadays poses a serious threat to the security of computer networks (CS). It is based on the abuse of the ARP protocol, which is responsible for matching IP addresses and physical MAC addresses in local networks. Using this type of attack, an attacker can intercept, redirect and even modify network traffic between devices, leading to serious negative consequences, such as reducing the confidentiality of transmitted data, introducing malware and spoofing network traffic. In the context of the constant development of information technology, the relevance and importance of this problem is increasing, especially for organizations and users of networks working in the logistics and transport. Transport has become a leader in the growth rate of fishing attacks. In this industry, by the end of 2023, the share of attacks of this type increased 2.4 times. This is the data of the BI.ZONE company. Based on the above, the main purpose of this article is, based on the analysis of methods of substitution and distortion of ARP records of the network infrastructure, to propose ways to protect against ARP spoofing, which are based on monitoring ARP records.
Style APA, Harvard, Vancouver, ISO itp.
3

LENARDIC, DANIEL Z., BRANKA ZOVKO-CIHLAR i MISLAV GRGIC. "ANALYSIS OF TCP/IP PROTOCOL BEHAVIOUR IN A CONGESTED MULTIMEDIA COMPUTER NETWORK". W Proceedings of the 9th International Workshop on Systems, Signals and Image Processing. WORLD SCIENTIFIC, 2002. http://dx.doi.org/10.1142/9789812776266_0007.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Bai, Jin, Salim Hariri i Youssif Al-Nashif. "A Network Protection Framework for DNP3 over TCP/IP protocol". W 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2014. http://dx.doi.org/10.1109/aiccsa.2014.7073172.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Makaya, Christian, i Samuel Pierre. "Handoff Protocol for Heterogeneous All-IP-based Wireless Networks". W 2006 Canadian Conference on Electrical and Computer Engineering. IEEE, 2006. http://dx.doi.org/10.1109/ccece.2006.277808.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Aksoy, Ahmet, i Mehmet Hadi Gunes. "Operating System Classification Performance of TCP/IP Protocol Headers". W 2016 IEEE 41st Conference on Local Computer Networks: Workshops (LCN Workshops). IEEE, 2016. http://dx.doi.org/10.1109/lcn.2016.036.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

T., Charan Raj, Kumar Raja V., Suresh Kumar S. i Vamsi Krishna P. "Usage of Internet Protocal (IP) Network in Digital Library". W International Conference on Computer Applications — Networking. Singapore: Research Publishing Services, 2010. http://dx.doi.org/10.3850/978-981-08-7301-1_1410.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Liu Jiong, Zhang Jingbin, Han Kun, Chen Guang, Sun Pengchun i Feng Yeti. "A new data link layer protocol for satellite IP networks". W 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC). IEEE, 2013. http://dx.doi.org/10.1109/mec.2013.6885388.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Al-Rawi, Akram, i Azzedine Lansari. "Effect of Windows XP Firewall on Network Simulation and Testing". W InSITE 2007: Informing Science + IT Education Conference. Informing Science Institute, 2007. http://dx.doi.org/10.28945/3170.

Pełny tekst źródła
Streszczenie:
The objective of this paper is to report findings from simulating and testing local area network (LAN) connectivity using Windows XP operating system and Cisco Networking Academy network devices. In this study, a simple routing protocol, RIP, is used as routing protocol. Two different techniques, Cisco Networking Academy hardware lab and Cisco Packet Tracer 4, were used to compare their performance to simulate network connectivity. Primary findings showed that the settings of the Windows XP firewall on the host computer have a direct impact on the test results. These findings are critical as there are no similar reports in the literature and only a careful investigation allowed the researchers to come to this conclusion. Furthermore, study results also offer suggestions for fixing problems that hinder simulation results of LANs that use Windows XP workstations. These findings can help CCNA students and faculty understand the reasons for unexplained connectivity problems when performing CCNA labs. The study also provides a simple method to avoid connectivity problems when using Windows ping.exe and tracert.exe which implement the TCP/IP protocol ICMP
Style APA, Harvard, Vancouver, ISO itp.
10

Munir, M. S., K. Ahmed, A. S. M. Shihavuddin, S. M. Nizamuddin i M. J. Sarker. "A new SS7-SIGTRAN protocol interchanger software and hardware to implement an improved distributed database based ATM network using existing IP network". W 2008 11th International Conference on Computer and Information Technology (ICCIT). IEEE, 2008. http://dx.doi.org/10.1109/iccitechn.2008.4803027.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "IP (Computer network protocol)"

1

Holdrege, M., i P. Srisuresh. Protocol Complications with the IP Network Address Translator. RFC Editor, styczeń 2001. http://dx.doi.org/10.17487/rfc3027.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Kazovsky, Leonid G., Ian White, Matt Rogge, Kapil Shrikhande i Erie Hu. Internet Protocol-Hybrid Opto-Electronic Ring Network (IP-HORNET): A Novel Internet Protocol-Over-Wavelength Division Multiplexing (IP-Over-WDM) Multiple-Access Metropolitan Area Network (MAN). Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2003. http://dx.doi.org/10.21236/ada415560.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Johansson, O., G. Salgueiro i V. Gurbani. Locating Session Initiation Protocol (SIP) Servers in a Dual-Stack IP Network. Redaktor D. Worley. RFC Editor, wrzesień 2016. http://dx.doi.org/10.17487/rfc7984.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Cleveland, William S., Hui Chen, Bowei Xi i Jin Cao. Internet Protocol (IP) Network Measurement, Characterization, Modeling, and Control for Self-Managed Networks. Fort Belvoir, VA: Defense Technical Information Center, wrzesień 2005. http://dx.doi.org/10.21236/ada439560.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Kastenholz, F. The Definitions of Managed Objects for the IP Network Control Protocol of the Point-to-Point Protocol. RFC Editor, czerwiec 1993. http://dx.doi.org/10.17487/rfc1473.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Callon, R. W., i H. W. Braun. Guidelines for the use of Internet-IP addresses in the ISO Connectionless-Mode Network Protocol. RFC Editor, czerwiec 1986. http://dx.doi.org/10.17487/rfc0986.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Callon, R. W., i H. W. Braun. Guidelines for the use of Internet-IP addresses in the ISO Connectionless-Mode Network Protocol. RFC Editor, luty 1989. http://dx.doi.org/10.17487/rfc1069.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

LI, Zhendong, Hangjian Qiu, xiaoqian Wang, chengcheng Zhang i Yuejuan Zhang. Comparative Efficacy of 5 non-pharmaceutical Therapies For Adults With Post-stroke Cognitive Impairment: Protocol For A Bayesian Network Analysis Based on 55 Randomized Controlled Trials. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, czerwiec 2022. http://dx.doi.org/10.37766/inplasy2022.6.0036.

Pełny tekst źródła
Streszczenie:
Review question / Objective: This study will provide evidence-based references for the efficacy of 5 different non-pharmaceutical therapies in the treatment of post-stroke cognitive impairment(PSCI). 1. Types of studies. Only randomized controlled trials (RCTs) of Transcranial Magnetic Stimulation(TMS), Transcranial Direct Current Stimulation(tDCS), Acupuncture, Virtual Reality Exposure Therapy(VR) and Computer-assisted cognitive rehabilitation(CA) for PSCI will be recruited. Additionally, Studies should be available in full papers as well as peer reviewed and the original data should be clear and adequate. 2. Types of participants. All adults with a recent or previous history of ischaemic or hemorrhagic stroke and diagnosed according to clearly defined or internationally recognized diagnostic criteria, regardless of nationality, race, sex, age, or educational background. 3.Types of interventions and controls. The control group takes non-acupuncture treatment, including conventional rehabilitation or in combination with symptomatic support therapy. The experimental group should be treated with acupuncture on basis of the control group. 4.The interventions of the experimental groups were Transcranial Magnetic Stimulation(TMS), Transcranial Direct Current Stimulation(tDCS), Acupuncture, Virtual Reality Exposure Therapy(VR) or Computer-assisted cognitive rehabilitation(CA), and the interventions of the control group takes routine rehabilitation and cognition training or other therapies mentioned above that were different from the intervention group. 5.Types of outcomes. The primary outcomes are measured with The Mini-Mental State Examination (MMSE) and/or The Montreal Cognitive Assessment Scale (MoCA), which have been widely used to evaluate the cognitive abilities. The secondary outcome indicator was the Barthel Index (BI) to assess independence in activities of daily living (ADLs).
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii