Gotowa bibliografia na temat „Packet trace”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Packet trace”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Packet trace"

1

Yang, Ming Hour. "Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy". Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/239280.

Pełny tekst źródła
Streszczenie:
Traceback schemes have been proposed to trace the sources of attacks that usually hide by spoofing their IP addresses. Among these methods, schemes using packet logging can achieve single-packet traceback. But packet logging demands high storage on routers and therefore makes IP traceback impractical. For lower storage requirement, packet logging and packet marking are fused to make hybrid single-packet IP traceback. Despite such attempts, their storage still increases with packet numbers. That is why RIHT bounds its storage with path numbers to guarantee low storage. RIHT uses IP header’s ID and offset fields to mark packets, so it inevitably suffers from fragment and drop issues for its packet reassembly. Although the 16-bit hybrid IP traceback schemes, for example, MORE, can mitigate the fragment problem, their storage requirement grows up with packet numbers. To solve the storage and fragment problems in one shot, we propose a single-packet IP traceback scheme that only uses packets’ ID field for marking. Our major contributions are as follows: (1) our fragmented packets with tracing marks can be reassembled; (2) our storage is not affected by packet numbers; (3) it is the first hybrid single-packet IP traceback scheme to achieve zero false positive and zero false negative rates.
Style APA, Harvard, Vancouver, ISO itp.
2

ARYANTA, DWI, i BAYU AGUNG PRANATA. "Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP". ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 2, nr 2 (1.07.2014): 85. http://dx.doi.org/10.26760/elkomika.v2i2.85.

Pełny tekst źródła
Streszczenie:
ABSTRAKOSPF (Open Shortest Path First) dan EIGRP (Enhanced Interior Gateway Routing Protocol) adalah dua routing protokol yang banyak digunakan dalam jaringan komputer. Perbedaan karakteristik antar routing protokol menimbulkan masalah dalam pengiriman paket data. Teknik redistribution adalah solusi untuk melakukan komunikasi antar routing protokol. Dengan menggunakan software Cisco Packet Tracer 5.3 pada penelitian ini dibuat simulasi OSPF dan EIGRP yang dihubungkan oleh teknik redistribution, kemudian dibandingkan kualitasnya dengan single routing protokol EIGRP dan OSPF. Parameter pengujian dalam penelitian ini adalah nilai time delay dan trace route. Nilai trace route berdasarkan perhitungan langsung cost dan metric dibandingkan dengan hasil simulasi. Hasilnya dapat dilakukan proses redistribution OSPF dan EIGRP. Nilai delay redistribution lebih baik 1% dibanding OSPF dan 2-3% di bawah EIGRP tergantung kepadatan traffic. Dalam perhitungan trace route redistribution dilakukan 2 perhitungan, yaitu cost untuk area OSPF dan metric pada area EIGRP. Pengambilan jalur utama dan alternatif pengiriman paket berdasarkan nilai cost dan metric yang terkecil, hal ini terbukti berdasarkan perhitungan dan simulasi.Kata kunci: OSPF, EIGRP, Redistribution, Delay, Cost, Metric.ABSTRACTOSPF (Open Shortest Path First) and EIGRP (Enhanced Interior Gateway Routing Protocol) are two routing protocols are widely used in computer networks. Differences between the characteristics of routing protocols pose a problem in the delivery of data packets. Redistribution technique is the solution for communication between routing protocols. By using the software Cisco Packet Tracer 5.3 in this study were made simulating OSPF and EIGRP redistribution linked by technique, then compared its quality with a single EIGRP and OSPF routing protocols. Testing parameters in this study is the value of the time delay and trace route. Value trace route based on direct calculation of cost and metric compared with the simulation results. The result can be OSPF and EIGRP redistribution process. Value delay redistribution 1% better than OSPF and EIGRP 2-3% under traffic density dependent. In calculating the trace route redistribution is done 2 calculations, the cost for OSPF area and the area of the EIGRP metric. Making primary and alternate paths based on the packet delivery rate and the cost of the smallest metric, it is proved by calculation and simulation.Keywords: OSPF, EIGRP, Redistribution, Delay, Cost, Metric.
Style APA, Harvard, Vancouver, ISO itp.
3

Pang, Ruoming, Mark Allman, Vern Paxson i Jason Lee. "The devil and packet trace anonymization". ACM SIGCOMM Computer Communication Review 36, nr 1 (10.01.2006): 29–38. http://dx.doi.org/10.1145/1111322.1111330.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Dennis, Simone, i Helen Alexiou. "(Re)making smoking: Of packets and practice". Journal of Material Culture 23, nr 4 (29.09.2018): 459–71. http://dx.doi.org/10.1177/1359183518799537.

Pełny tekst źródła
Streszczenie:
Taking as foundational the well-established anthropological idea that material things can be determinative of expectations and practice, the authors advance the notion that packets are constitutive of smoking in the era of smokefree legislation. Adorned with warnings, graphic messaging and particular colouration, they say that packets do not simply respond to the ‘problem’ of smoking; they are actively involved in remaking it anew, in, with and for the smokefree context, in which smoking is purposefully denormalized. Focusing in the main on the graphic images that ‘plain’ packets bear, they track and trace this constitutional force via sensory means, attending particularly to a reworking of the role presently accorded to vision in the Australian government’s public health ‘view’ that assumes a stark separation between the cigarette packet and the respondent smoker.
Style APA, Harvard, Vancouver, ISO itp.
5

ARYANTA, DWI, ARSYAD RAMADHAN DARLIS i DIMAS PRIYAMBODHO. "Analisis Kinerja EIGRP dan OSPF pada Topologi Ring dan Mesh". ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 2, nr 1 (1.01.2014): 53. http://dx.doi.org/10.26760/elkomika.v2i1.53.

Pełny tekst źródła
Streszczenie:
ABSTRAKEIGRP (Enhanced Interior Gateway Routing Protocol) dan OSPF (Open Shortest Path Fisrt) adalah routing protokol yang banyak digunakan pada suatu jaringan komputer. EIGRP hanya dapat digunakan pada perangkat Merk CISCO, sedangkan OSPF dapat digunakan pada semua merk jaringan. Pada penelitian ini dibandingkan delay dan rute dari kedua routing protokol yang diimplementasikan pada topologi Ring dan Mesh. Cisco Packet Tracer 5.3 digunakan untuk mensimulasikan kedua routing protokol ini. Skenario pertama adalah perancangan jaringan kemudian dilakukan pengujian waktu delay 100 kali dalam 5 kasus. Skenario kedua dilakukan pengujian trace route untuk mengetahui jalur yang dilewati paket data lalu memutus link utama. Pada skenario kedua juga dilakukan perbandingan nilai metric dan cost hasil simulasi dengan perhitungan rumus. Skenario ketiga dilakukan pengujian waktu konvergensi untuk setiap routing protokol pada setiap topologi. Hasilnya EIGRP lebih cepat 386 µs daripada OSPF untuk topologi Ring sedangkan OSPF lebih cepat 453 µs daripada EIGRP untuk topologi Mesh. Hasil trace route menunjukan rute yang dipilih oleh routing protokol yaitu nilai metric dan cost yang terkecil. Waktu konvergensi rata-rata topologi Ring pada EIGRP sebesar 12,75 detik dan 34,5 detik pada OSPF sedangkan topologi Mesh di EIGRP sebesar 13 detik dan 35,25 detik di OSPF.Kata Kunci: EIGRP, OSPF, Packet Tracer 5.3, Ring, Mesh, KonvergensiABSTRACTEIGRP (Enhanced Interior Gateway Routing Protocol) and OSPF (Open Shortest Path Fisrt) is the routing protocol that is widely used in a computer network. EIGRP can only be used on devices Brand CISCO, while OSPF can be used on all brands of network. In this study comparison of both the delay and the routing protocol implemented on Ring and Mesh topology. Cisco Packet Tracer 5.3 is used to simulate both the routing protocol. The first scenario is the design of the network and then do the test of time delay 100 times in 5 cases. The second scenario tested trace route to determine the path of the data packet and then disconnect the main link. In the second scenario also conducted a cost comparison of metrics and the simulation results with the calculation formula. The third scenario testing time for each routing protocol convergence on any topology. The result EIGRP faster than 386 microseconds for a ring topology while OSPF OSPF 453 microseconds faster than EIGRP for Mesh topology. The results showed trace route chosen by the routing protocol metric value and cost is the smallest. Average convergence time in the EIGRP topology Ring of 12.75 seconds and 34.5 seconds, while the Mesh topology in an OSPF EIGRP for 13 seconds and 35.25 seconds in OSPF.Keywords: EIGRP,OSPF, Packet Tracer 5.3, Ring, Mesh, Convergence
Style APA, Harvard, Vancouver, ISO itp.
6

Paxson, Vern. "Automated packet trace analysis of TCP implementations". ACM SIGCOMM Computer Communication Review 27, nr 4 (październik 1997): 167–79. http://dx.doi.org/10.1145/263109.263160.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Et. al., Dr B. Shadaksharappa,. "Attack Prediction By Using Greedy Algorithm For Diminishing The Drop And Delay In Wireless Sensor Networks". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, nr 6 (11.04.2021): 1072–82. http://dx.doi.org/10.17762/turcomat.v12i6.2425.

Pełny tekst źródła
Streszczenie:
The essential constraint of the internet is that forwarding the data packets of data among the restricted and trustworthy data nodes. If the receiver node is attacker node then it'll drop the data rather than forwarding the data to ensuing neighbor node. Therefore, efficient and secure data transmission is extremely necessary within the network data transmission. Each router node within the network can accept the data packets up to its buffer size only. Once the queue value reached the buffer threshold value then congestion can occur at the node. Once congestion happens then it would lose the data packets. By sending the data packets to the next neighbour node this problem will be resolved. This congestion will be handled by the Fully Distributed Congestion Control FDCC and Cooperative and Memory Efficient Token Bucket (CMTB) algorithms. Because the data is transmitted to the next neighbour node predicting the node behavior is extremely necessary because it is an attacker or the conventional transmitter node because it has to transmit the efficient data securely to the destination node. In this paper, the node behavior will be predicted by analyzing the trace file. The simulation results show that this proposed method would provide a lot of security in data transmission. The WSN comprises a group of sensor nodes that are disseminated on the network. These sensor nodes initially exchange their data packets to the near nodes to send the data packets to the target node. During the transmission of these data packets some data packets drop may also happen inside the network. This packet drop should be kept up as low as feasible for correct data transmission to the target node or destination node. This algorithm highlights the routes with high link quality, low packet delay and with low packet drop. Simulation results show that this proposed algorithm can provide the most effective path for transmitting the data to the destination meanwhile it reduces the packet drop and packet delay.
Style APA, Harvard, Vancouver, ISO itp.
8

Memon, Mudasar Latif, Mukesh Kumar Maheshwari, Navrati Saxena, Abhishek Roy i Dong Ryeol Shin. "Artificial Intelligence-Based Discontinuous Reception for Energy Saving in 5G Networks". Electronics 8, nr 7 (11.07.2019): 778. http://dx.doi.org/10.3390/electronics8070778.

Pełny tekst źródła
Streszczenie:
5G is expected to deal with high data rates for different types of wireless traffic. To enable high data rates, 5G employs beam searching operation to align the best beam pairs. Beam searching operation along with high order modulation techniques in 5G, exhausts the battery power of user equipment (UE). LTE network uses discontinuous reception (DRX) with fixed sleep cycles to save UE energy. LTE-DRX in current form cannot work in 5G network, as it does not consider multiple beam communication and the length of sleep cycle is fixed. On the other hand, artificial intelligence (AI) has a tendency to learn and predict the packet arrival-time values from real wireless traffic traces. In this paper, we present AI based DRX (AI-DRX) mechanism for energy efficiency in 5G enabled devices. We propose AI-DRX algorithm for multiple beam communications, to enable dynamic short and long sleep cycles in DRX. AI-DRX saves the energy of UE while considering delay requirements of different services. We train a recurrent neural network (RNN) on two real wireless traces with minimum root mean square error (RMSE) of 5 ms for trace 1 and 6 ms for trace 2. Then, we utilize the trained RNN model in AI-DRX algorithm to make dynamic short or long sleep cycles. As compared to LTE-DRX, AI-DRX achieves 69 % higher energy efficiency on trace 1 and 55 % more energy efficiency on trace 2, respectively. The AI-DRX attains 70 % improvement in energy efficiency for trace 2 compared with Poisson packet arrival model for λ = 1 / 20 .
Style APA, Harvard, Vancouver, ISO itp.
9

Spiekermann, Daniel, i Jörg Keller. "Requirements for Crafting Virtual Network Packet Captures". Journal of Cybersecurity and Privacy 2, nr 3 (6.07.2022): 516–26. http://dx.doi.org/10.3390/jcp2030026.

Pełny tekst źródła
Streszczenie:
Currently, network environments are complex infrastructures with different levels of security, isolation and permissions. The management of these networks is a complex task, faced with different issues such as adversarial attacks, user demands, virtualisation layers, secure access and performance optimisation. In addition to this, forensic readiness is a demanded target. To cover all these aspects, network packet captures are used to train new staff, evaluate new security features and improve existing implementations. Because of this, realistic network packet captures are needed that cover all appearing aspects of the network environment. Packet generators are used to create network traffic, simulating real network environments. There are different network packet generators available, but there is no valid rule set defining the requirements targeting packet generators. The manual creation of such network traces is a time-consuming and error-prone task, and the inherent behaviour of virtual networks eradicates a straight-forward automation of trace generation in comparison to common networks. Hence, we analyse relevant conditions of modern virtualised networks and define relevant requirements for a valid packet generation and transformation process. From this, we derive recommendations for the implementation of packet generators that provide valid and correct packet captures for use with virtual networks.
Style APA, Harvard, Vancouver, ISO itp.
10

Liu, X., J. Xu, J. Yue i S. L. Vadas. "Numerical modeling study of the momentum deposition of small amplitude gravity waves in the thermosphere". Annales Geophysicae 31, nr 1 (3.01.2013): 1–14. http://dx.doi.org/10.5194/angeo-31-1-2013.

Pełny tekst źródła
Streszczenie:
Abstract. We study the momentum deposition in the thermosphere from the dissipation of small amplitude gravity waves (GWs) within a wave packet using a fully nonlinear two-dimensional compressible numerical model. The model solves the nonlinear propagation and dissipation of a GW packet from the stratosphere into the thermosphere with realistic molecular viscosity and thermal diffusivity for various Prandtl numbers. The numerical simulations are performed for GW packets with initial vertical wavelengths (λz) ranging from 5 to 50 km. We show that λz decreases in time as a GW packet dissipates in the thermosphere, in agreement with the ray trace results of Vadas and Fritts (2005) (VF05). We also find good agreement for the peak height of the momentum flux (zdiss) between our simulations and VF05 for GWs with initial λz ≤ 2π H in an isothermal, windless background, where H is the density scale height. We also confirm that zdiss increases with increasing Prandtl number. We include eddy diffusion in the model, and find that the momentum deposition occurs at lower altitudes and has two separate peaks for GW packets with small initial λz. We also simulate GW packets in a non-isothermal atmosphere. The net λz profile is a competition between its decrease from viscosity and its increase from the increasing background temperature. We find that the wave packet disperses more in the non-isothermal atmosphere, and causes changes to the momentum flux and λz spectra at both early and late times for GW packets with initial λz ≥ 10 km. These effects are caused by the increase in T in the thermosphere, and the decrease in T near the mesopause.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Packet trace"

1

Shepard, Timothy Jason. "TCP packet trace analysis". Thesis, Massachusetts Institute of Technology, 1990. http://hdl.handle.net/1721.1/13577.

Pełny tekst źródła
Streszczenie:
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1990.
Includes bibliographical references (leaves 66-67).
by Timothy Jason Shepard.
M.S.
Style APA, Harvard, Vancouver, ISO itp.
2

Nilsson, Samuel, i Joakim Eriksson. "Estimating Application Energy Consumption Through Packet Trace Analysis". Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-110348.

Pełny tekst źródła
Streszczenie:
The advancement of mobile clients and applications makes it possible for people to always stayconnected, sending and receiving data constantly. The nature of the 3G technology widelyused, however, causes a high battery drain in cellular phones and because of that a lot of toolsfor measuring mobile phones energy consumption has been developed. In this report we lookinto the trace-driven tool EnergyBox and find out how we can use it to estimate the energyconsumption of 3G transmissions for an application we’ve developed ourselves. We beginwith identifying the types of traffic our application generates and identify which parts of itmake up our applications background traffic. Different combinations of the identified traffictypes are looked into in order to decide which ones that need to be present in the packet tracesfor an estimation of our applications energy footprint for 3G transmission. Further, answersare sought to how long the time span should be for which the packet traces are collected andhow many of them are needed in order to draw a conclusion about our application’s energyfootprint. We conclude that all traffic types responsible for our application’s backgroundtraffic need to be present in the analyzed packet traces, and data suggests that collectingmore than 10 one minute packet traces does not improve accuracy significantly (less than1%). Without user interaction, our application generates traffic, which transmitted over 3G,drains as much as an average of 930mW, meaning that a Samsung Galaxy S4 battery with acapacity of 9.88Wh would last for a maximum of 10 hours and 30 minutes (excluding otherenergy consuming sources inside the handset).
Style APA, Harvard, Vancouver, ISO itp.
3

Zhao, Song. "HTTP Traffic Analysis based on a Lossy Packet-level Trace". Case Western Reserve University School of Graduate Studies / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=case1373030307.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Salvador, Mark A. Z. "Trace gas detection in hyperspectral imagery using the wavelet packet subspace". Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3067.

Pełny tekst źródła
Streszczenie:
Thesis (Ph.D.)--George Mason University, 2008.
Vita: p. 213. Thesis directors: Ronald G. Resmini, Richard B. Gomez. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computational Sciences and Informatics. Title from PDF t.p. (viewed July 3, 2008). Includes bibliographical references (p. 204-212). Also issued in print.
Style APA, Harvard, Vancouver, ISO itp.
5

Tlaiss, Ziad. "Automated network packet traces analysis methods for fault recognition and TCP flavor identification". Electronic Thesis or Diss., Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2023. http://www.theses.fr/2023IMTA0384.

Pełny tekst źródła
Streszczenie:
Ces dernières années, le domaine du dépannage réseau a suscité un intérêt particulier de la part des chercheurs en raison de la complexité et de l’importance de cette tâche. Le travail présenté dans cette thèse se concentre sur l’automatisation du dépannage réseau à l’aide de mesures de performance extraites des captures de paquets. La première contribution de cette thèse réside dans l’extraction de caractéristiques permettant d’identifier la cause fondamentale d’une anomalie en analysant des traces de paquets TCP montrant des connexions médiocres. Nous avons classé quatre causes de dégradation fréquemment observées : les problèmes de transmission, les problèmes de congestion, les problèmes de gigue et les limitations d’application. La deuxième contribution de cette thèse réside dans le développement d’une méthode automatisée pour détecter l’instant de sortie de l’état Slow-Start. L’importance de cette méthode réside dans le gain de temps précieux dans l’analyse des problèmes réseau, étant donné que l’état Slow-Start est un indicateur clé pour le diagnostic des défauts. La troisième contribution de cette thèse consiste en l’identification de l’algorithme de contrôle de congestion BBR. L’objectif principal est de détecter si un contrôle de l’envoi des paquets (’pacing’) est utilisé dans une connexion TCP. Cette méthode repose sur la modélisation de la distribution de la durée de l’inter-paquet pendant l’état Slow-Start. L’objectif est de reconnaître les distributions monomodales de l’inter-paquet dans le cas de BBR par rapport aux distributions à deux composantes mélangées dans le cas de CUBIC
In recent years, the field of network troubleshooting has garnered significant attention from researchers due to the complexity and importance of this task. The work presented in this thesis focuses on automating network troubleshooting using performance metrics extracted from packet captures. The first contribution of this thesis lies in extracting features to identify the root cause of an anomaly by analyzing TCP packet traces with bad performance. We have categorized four frequently observed causes of degradation: transmission problems, congestion problems, jitter problems, and application-limited problems. The second contribution of this thesis involves developing an automated method to detect the moment of exiting the Slow-Start state. The significance of this method lies in saving valuable time in the analysis of network degradation, as the Slow-Start state serves as a key indicator for fault diagnosis. The third contribution of this thesis revolves around identifying the BBR congestion control algorithm. The primary goal of our approach is to detect whether packet pacing is employed in a TCP connection. This method relies on modeling the distribution of inter-packet duration during the Slow-Start state. The objective is to distinguish unimodal distributions of inter-packet intervals in the case of BBR compared to mixed two component distributions in the case of CUBIC
Style APA, Harvard, Vancouver, ISO itp.
6

Ravichandran, Shruthi. "A user-friendly programming framework for wireless sensor networks". Thesis, Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52248.

Pełny tekst źródła
Streszczenie:
Wireless sensor networks (WSNs) are increasingly being used for monitoring physical environments in lieu of tethered monitoring systems. Being power efficient and wirelessly accessible, WSNs find applications in a variety of domains like health, structural and climate monitoring systems. Despite such diverse use cases, more than often, WSNs are used by researchers with basic or no prior programming experience. Consequently, more time is spent learning to program the sensors than collecting and analysing domain-specific data. To cater to this generic user base, a multi-platform user-friendly programming framework for WSNs has been developed. This framework provides: 1) a visual network comparison tool that analyzes packet traces of two networks to generate a juxtaposed visual comparison of contrasting network characteristics, 2) a scripting language based on the TinyOS sensor network platform that aims at reducing code size and improving programming efficacy, and 3) a visual programming tool with basic sensor drag-and-drop modules for generating simple WSN programs. These tools were also developed to serve as a gentle introduction to the WSN programming environment for middle and high school students. In the absence of resources (sensors), the framework also allows programmers to verify program functionality by remotely simulating and verifying program behaviour in the OMNeT simulation environment.
Style APA, Harvard, Vancouver, ISO itp.
7

Arancibia-Robert, Nicolas-Jose. "Paquets d'Arthur des représentations cohomologiques". Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066119/document.

Pełny tekst źródła
Streszczenie:
Cette thèse a pour objectif de montrer que les paquets de représentations cohomologiques d’un groupe réductif classique quasi déployé, défini sur R, construits par J. Arthur coïncident avec les paquets précédemments définis de manière plus élémentaire et plus explicite par Adams et Johnson
The aim of this thesis is to prove that the packets of cohomological representation of quasi-split classical groups, defined over R, by Arthur coincide with the packets defined previously in a more elementary way by Adams and Johnson
Style APA, Harvard, Vancouver, ISO itp.
8

Haneberg-Diggs, Dominique Miguel. "Seismic attributes of the Clinton interval reservoir in the Dominion East Ohio Gabor gas storage field near North Canton, Ohio". Wright State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=wright1418759184.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Hellström, Joakim. "Utvärdering av nätverkssimulering och enhetsemulering : GNS3 och Packet Tracer". Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-25192.

Pełny tekst źródła
Streszczenie:
Denna rapport tar upp hur ett par olika programvaror, nämligen Packet Tracer och GNS3 kan användas för att simulera verklig utrustning i syftet att använda dessa hos ett företag i labbmiljö för att förbereda en implementation av ny hårdvara samtidigt som kostnaderna kan hållas nere, men också hur dessa programvaror kan användas i studiesyfte och använda som komplement till fysisk utrustning inför laborationer och examinationer i de olika kurserna som Cisco erbjuder. Det är också en utvärdering för att avgöra vilken av programvarorna som är den bästa att använda. En topologi sätts upp, komplett med IP-adressering med relativt vanlig konfiguration för att se hur dessa programvaror hanterar och klarar av dessa konfigurationer. Det visar sig att båda programvarorna presterar bra i de flesta fall, men de avbildningar av IOS som testats i GNS3 saknar stöd för PortSecurity som standard, så Packet Tracer tar titeln. Packet Tracer lämpar sig bäst för grundläggande studier med sina enkla paketspårningar medan GNS3 fungerar bättre för mer avancerade topologier med möjlighet till import av befintlig hårdvara. Nyckelord:  Cisco, Packet Tracer, GNS3, Simulering.
This report focuses on Packet Tracer and GNS3 and how these can be used to simulate real equipment at a company to prepare for implementation of new hardware while mitigating cost. It also shows how these can be used for educational purposes as a complement to real-world equipment for the courses held by Cisco. It’s also an evaluation of both softwares to decide which of them that is the best choise in a given scenario. A topology is created, complete with an IPaddressing table and fairly common configurations. The goal is to examine how the softwares behave and if they can handle the configurations. Both of them do well during testing, but the images of IOS that were tested in GNS3 do not support PortSecurity in its standard configuration so the title go to Packet Tracer. Packet Tracer is best suited for basic educational purposes because of its easy and understandable packet tracking abilities while GNS3 is better for more advanced topologies with support for importing pre-owned hardware.
Style APA, Harvard, Vancouver, ISO itp.
10

Іванчук, Богдан Іванович, i Назарій Євгенович Бурак. "Особливості використання засобів Cisco Packet Tracer при вивченні комп'ютерних мереж". Thesis, Львівський державний університет безпеки життєдіяльності, 2020. http://hdl.handle.net/123456789/6994.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Packet trace"

1

Office, Montana Consumer Protection. Montana do-not-call list: Information packet. [Helena, Mont.]: Consumer Protection Office, 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Roth, Jürgen. Makler des Todes: Wafffenhändler packen aus. Hamburg: Rasch und Röhring, 1986.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Horzepa, Stan. Getting on track with APRS: A hands-on guide to the automatic packet reporting system. Newington, CT: American Radio Relay League, 1996.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

H, Mathews Kenneth, i United States. Dept. of Agriculture. Economic Research Service., red. U.S. beef industry: Cattle cycles, price spreads, and packer concentration. Washington, DC: U.S. Dept. of Agriculture, ERS, 1999.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

H, Mathews Kenneth, i United States. Dept. of Agriculture. Economic Research Service, red. U.S. beef industry: Cattle cycles, price spreads, and packer concentration. Washington, DC: U.S. Dept. of Agriculture, ERS, 1999.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Griffen-Foley, Bridget. Sir Frank Packer, the young master: A biography. Sydney: HarperCollins, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

1962-, Fournier D. J., i Risk Reduction Engineering Laboratory (U.S.), red. The Fate of trace metals in a rotary kiln incinerator with a Venturi/packed column scrubber. Cincinnati, OH: U.S. Environmental Protection Agency, Risk Reduction Engineering Laboratory, 1991.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Vincenti, Serge. Caravane des Andes: L'expédition Lama, 3,500 kilomètres sur les trace des Incas. Paris: A. Michel, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

McCormick, Jane. Breaking my silence: Confessions of a rat pack party girl and sex-trade survivor. St. Paul, MN: Rapfire Press, 2007.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Morrison, Catherine J. Cost economies and market power in U.S. beef packing. [Oakland, Calif.]: Division of Agriculture and Natural Resources, California Agriculture Experiment Station, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Packet trace"

1

Weik, Martin H. "trace packet". W Computer Science and Communications Dictionary, 1801. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_19789.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Lee, Yeonhee, Wonchul Kang i Youngseok Lee. "A Hadoop-Based Packet Trace Processing Tool". W Traffic Monitoring and Analysis, 51–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20305-3_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Lukashin, Alexey, Leonid Laboshin, Vladimir Zaborovsky i Vladimir Mulukha. "Distributed Packet Trace Processing Method for Information Security Analysis". W Lecture Notes in Computer Science, 535–43. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-10353-2_49.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Jo, Jinyong, Jaiseung Kwak i Okhwan Byeon. "MEET : Multicast Debugging Toolkit with End-to-End Packet Trace". W Advances in Multimedia Information Processing - PCM 2005, 441–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11582267_39.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Bathula, Pooja Reddy, Snigdha Pv, Laasya Lata Anumakonda, Mohammed Mahaboob Basha i Pandya Vyomal Naishadhkumar. "Home Automation Using Packet Tracer". W Advances in Communication, Devices and Networking, 611–23. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2004-2_56.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Seth, Sakshi, Visal Naqvi, Rishi Raj Dalmia i Ruchi Tripathi. "Implementation of College Network Scenario Using Cisco Packet Tracer". W Proceedings of the 2nd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications, 337–48. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6407-6_31.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Li, Min, i Xingjuan Li. "Design Scheme of Network Security Experiment Based on Packet Tracer". W Computer Science and Education, 318–26. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2446-2_29.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Sabahi-Kaviani, Zeynab, Fatemeh Ghassemi i Fateme Bajelan. "Automatic Transition System Model Identification for Network Applications from Packet Traces". W Fundamentals of Software Engineering, 212–27. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68972-2_14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Utsav, Ankur, Amit Abhishek, Ratna Priya i Harsha Wardhan. "IoT Implementation for CO2 Level Monitoring System Using CISCO Packet Tracer". W Algorithms for Intelligent Systems, 595–602. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6307-6_60.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Hoene, Christian, Sven Wiethölter i Adam Wolisz. "Predicting the Perceptual Service Quality Using a Trace of VoIP Packets". W Quality of Service in the Emerging Networking Panorama, 21–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30193-6_3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Packet trace"

1

Paxson, Vern. "Automated packet trace analysis of TCP implementations". W the ACM SIGCOMM '97 conference. New York, New York, USA: ACM Press, 1997. http://dx.doi.org/10.1145/263105.263160.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Rupp, Andy, Holger Dreger, Anja Feldmann i Robin Sommer. "Packet trace manipulation rramework for test labs". W the 4th ACM SIGCOMM conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1028788.1028821.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Gad, Ruediger. "Improving Packet Capture Trace Import in Trace Compass with a Data Transformation DSL". W 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2017. http://dx.doi.org/10.1109/compsac.2017.145.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Salvador, Mark Z., Ronald G. Resmini i Richard B. Gomez. "Hyperspectral trace gas detection using the wavelet packet transform". W SPIE Defense and Security Symposium, redaktorzy Sylvia S. Shen i Paul E. Lewis. SPIE, 2008. http://dx.doi.org/10.1117/12.777586.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Rubio-Loyola, Javier, Dolors Sala i Ali Ismail Ali. "Maximizing packet loss monitoring accuracy for reliable trace collections". W Metropolitan Area Networks (LANMAN). IEEE, 2008. http://dx.doi.org/10.1109/lanman.2008.4675845.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Zhuqing Wan, Yongping Zhang, Tianjie Cao, Mingming Wu i Fengjian Wang. "A novel Authenticated Packet Marking Scheme for IP Trace-back". W 2009 2nd IEEE International Conference on Computer Science and Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccsit.2009.5234375.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Fortner, Scott, i Geoffrey G. Xie. "DSSR: Balancing semantics and speed requirements in packet trace replay". W ICC 2017 - 2017 IEEE International Conference on Communications. IEEE, 2017. http://dx.doi.org/10.1109/icc.2017.7997257.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Pang, Ruoming, i Vern Paxson. "A high-level programming environment for packet trace anonymization and transformation". W the 2003 conference. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/863955.863994.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Ogihara, Kazutaka. "Generating Block IO Trace Data from a Cloud Site Using Packet Capture and Analyzing the IO Trace Data". W 2019 Seventh International Symposium on Computing and Networking Workshops (CANDARW). IEEE, 2019. http://dx.doi.org/10.1109/candarw.2019.00086.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Nitta, Christopher, Matthew Farrens, Kevin Macdonald i Venkatesh Akella. "Inferring packet dependencies to improve trace based simulation of on-chip networks". W the Fifth ACM/IEEE International Symposium. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1999946.1999971.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Packet trace"

1

VonColln, E., i V. Gonchaaroff. Smoothing Disjoint Formant Track Boundaries Caused by Waveform Substitution in Packet Voice Communication. Fort Belvoir, VA: Defense Technical Information Center, maj 1996. http://dx.doi.org/10.21236/ada311062.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Wheeler, E., A. Erler i A. Seiler. Report on Qiagen Columns with Precipitation versus Packed Bed Technology for Trace Amounts of DNA. Office of Scientific and Technical Information (OSTI), luty 2008. http://dx.doi.org/10.2172/929531.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Sorensen, K., E. Arroyo, A. Erler, A. Christian, D. Camp i E. Wheeler. Comparison of Packed Beds and Qiagen Columns for Recovering Trace Amounts of B. anthracis DNA from Liquid Suspensions. Office of Scientific and Technical Information (OSTI), czerwiec 2006. http://dx.doi.org/10.2172/973645.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Jones, M. C., R. Nassimbene, J. Wolfe i N. Frederick. Distributed measurements of tracer response on packed bed flows using a fiberoptic probe array. Final report. Office of Scientific and Technical Information (OSTI), październik 1994. http://dx.doi.org/10.2172/72901.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Michalczewsky, Kathia, Alejandro Ramos Martínez, Paolo Giordano i Barbara Ramos. Trade and Integration Monitor 2017: Beyond the Recovery: Competing for Market Share in the Digital Era (Infographic). Inter-American Development Bank, listopad 2017. http://dx.doi.org/10.18235/0006373.

Pełny tekst źródła
Streszczenie:
In 2016 the value of Latin American and Caribbean exports contracted at a slower pace than that of world trade. This Infographic presents the analysis corresponding to the Trade and Integration Monitor 2017: Beyond Recovery: Competition for markets in the digital era.
Style APA, Harvard, Vancouver, ISO itp.
6

Fuss, Melvyn, i Leonard Waverman. The Canada-U.S. Auto Pact of 1965: An Experiment in Selective Trade Liberalization. Cambridge, MA: National Bureau of Economic Research, czerwiec 1986. http://dx.doi.org/10.3386/w1953.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Shi, Min, Yao Yao, Haifeng Ding, Jian Yang, Zhen Feng, Yingying Jiang i Tao Guo. The Pharyngeal Packs for Dental and Otolaryngological Surgery: A Meta-analysis of High-quality RCTs. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, luty 2023. http://dx.doi.org/10.37766/inplasy2023.2.0002.

Pełny tekst źródła
Streszczenie:
Review question / Objective: To quantitatively evaluate the role of pharyngeal packing in dental and otolaryngological surgeries by meta-analysis Eligibility criteria: Trials were included if they met the following criteria: (1) high-quality randomized controlled trial; (2) application of pharyngeal pack was the only intervention; (3) investigations of dental and otolaryngological surgeries; (4) full English text could be identified; and (5) at least one available parametric indicator was addressed.The exclusion criteria were as follows: (1) low-quality RCT or non-RCT; (2) pharyngeal pack was not the only intervention or the comparison of different pack types; (3) full English text could not be traced; (4) absence of information on selected raw data; and (5) irrelevant studies, reviews, comments or clinical case reports.
Style APA, Harvard, Vancouver, ISO itp.
8

Bergsen, Pepijn, Carolina Caeiro, Harriet Moynihan, Marianne Schneider-Petsinger i Isabella Wilkinson. Digital trade and digital technical standards. Royal Institute of International Affairs, styczeń 2022. http://dx.doi.org/10.55317/9781784135133.

Pełny tekst źródła
Streszczenie:
There is increasing impetus for stronger cooperation between the US, EU and UK on digital technology governance. Drivers of this trend include the economic incentives arising from opportunities for digital trade; the ambition for digital technology governance to be underpinned by shared values, including support for a democratic, open and global internet; and the need to respond to geopolitical competition, especially from China. Two specific areas of governance in which there is concrete potential to collaborate, and in which policymakers have indicated significant ambitions to do so, are digital trade and digital technical standards. - To leverage strategic opportunities for digital trade, the US, EU and UK need to continue identifying and promoting principles based on shared values and agendas, and demonstrate joint leadership at the global level, including in the World Trade Organization (WTO) on e-commerce. - Policy actors in the US, EU and UK should work individually and collectively to build on the latest generation of digital trade agreements. This will help to promote closer alignment on digital rules and standards, and support the establishment of more up-to-date models for innovation and governance. - Collaborating on digital technical standards, particularly those underlying internet governance and emerging technologies, offers the US, EU and UK strategic opportunities to build a vision of digital technology governance rooted in multi-stakeholder participation and democratic values. This can provide a strong alternative to standards proposals such as China’s ‘New IP’ system. - Policy actors should seek to expand strategic cooperation on standards development among the US, EU and UK, among like-minded countries, and among states that are undecided on the direction of their technology governance, including in the Global South. They should also take practical steps to incorporate the views and expertise of the technology industry, the broader private sector, academia and civil society. By promoting best-practice governance models that are anticipatory, dynamic and flexible, transatlantic efforts for cooperation on digital regulation can better account for the rapid pace of technological change. Early evidence of this more forward-looking approach is emerging through the EU’s proposed regulation of digital services and artificial intelligence (AI), and in the UK’s proposed legislation to tackle online harms. The recently launched EU-US Trade and Technology Council is a particularly valuable platform for strengthening cooperation in this arena. But transatlantic efforts to promote a model of digital governance predicated on democratic values would stand an even greater chance of success if the council’s work were more connected to efforts by the UK and other leading democracies
Style APA, Harvard, Vancouver, ISO itp.
9

Gonzales, Anthony Peter. CARICOM Report No. 1 (2002). Inter-American Development Bank, styczeń 2002. http://dx.doi.org/10.18235/0008586.

Pełny tekst źródła
Streszczenie:
The overall purpose of the report is to appraise progress towards deeper integration among the member states of the Caribbean Community and Common Market (CARICOM). More specifically, and with particular reference to the goals of the CARICOM Single Market and Economy (CSME), it seeks to assess the depth of market integration and functional cooperation by examining the state of policy coordination and harmonization, the level of institutional development, and the degree of capacity sharing. The study also addresses CARICOM's pace of widening and its integration into the world economy, against the backdrop of trends in international trade negotiations.
Style APA, Harvard, Vancouver, ISO itp.
10

Basco, Ana Inés. Techno-integration of Latin America: institutions, exponential trade, and equality in the era of algorithms. Inter-American Development Bank, listopad 2017. http://dx.doi.org/10.18235/0010684.

Pełny tekst źródła
Streszczenie:
As part of a Regional Public Good (BPR), 20,200 Latin Americans from 18 countries were interviewed on issues of integration, democracy, equity, environment, technology, and innovation. In a world where globalization is being strongly questioned, particularly among developed countries, it is concluded that Latin Americans are very committed to regional integration. The integration process is challenged by the complexity implied by a heterogeneous regional structure with important differences between countries and within them. The differences are many, ranging from income distribution, productive specialization, the weight of their economies in the regional GDP, belonging to different trade blocs, the preference for certain partners at the time of closer ties, exposure and vulnerability to climate change, to the degree of penetration of ICTs. However, this study shows that there is a common agenda that must be addressed and that can set the pace of regional integration. Social convergence is observed not only in the high support for regional integration and in the existence of an unsatisfied demand for integration, but also in the desire of people to live in a more equitable society, responsible in the use of their natural resources, committed to the fight against climate change and the free movement of people, connected through ICTs and universal access to the Internet, with better quality of democratic institutions, and with greater citizen participation in the decision making process of government and justice. Since this is the agenda for development and regional integration, the opportunity offered by ICTs cannot be overlooked, both in the construction of a subject with a critical conscience, capable of visualizing the problems that afflict it, as well as in its powerful potential to strengthen trade links between countries, strengthen democracy and enhance the development of the region.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii