Gotowa bibliografia na temat „TCP/IP (Computer network protocol)”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „TCP/IP (Computer network protocol)”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "TCP/IP (Computer network protocol)"

1

Rafif Abyakto, Naif Baihaqi, M. Aldi Firdaus, Salsabila Aulia i Didik Aribowo. "Simulasi TCP-IP Menggunakan Topologi Bus". Uranus : Jurnal Ilmiah Teknik Elektro, Sains dan Informatika 2, nr 2 (11.05.2024): 07–14. http://dx.doi.org/10.61132/uranus.v2i2.97.

Pełny tekst źródła
Streszczenie:
One important technique for understanding and analyzing computer network performance is TCP/IP simulacrum. In this research, we simulate a TCP/IP network using the bus topology as a model. We use the Cisco Packet Tracer simulated network topology builder to create a bus topology and implement the TCP/IP protocol. The simulation results provide more accurate understanding of how the TCP/IP protocol functions within a bus network. We analyze network performance in terms of throughput, latency, and packet loss. The analysis's findings indicate that bus topologies have a certain amount of leeway in network operations, particularly when a collision occurs. However, this simulation offers a valuable tool to improve computer network design and management.
Style APA, Harvard, Vancouver, ISO itp.
2

YIMING, ALIMUJIANG, i TOSHIO EISAKA. "A SWITCHED ETHERNET PROTOCOL FOR HARD REAL-TIME EMBEDDED SYSTEM APPLICATIONS". Journal of Interconnection Networks 06, nr 03 (wrzesień 2005): 345–60. http://dx.doi.org/10.1142/s0219265905001460.

Pełny tekst źródła
Streszczenie:
This paper presents a protocol to support hard real-time traffic of end-to-end communication over non real-time LAN technology. The network is set up with nodes and switches, and real-time communication is handled by software (protocol) added between the Ethernet protocols and the TCP/IP suite. The proposed protocol establishes a virtual circuit based on admission control and manages hard real-time traffic to bypass the TCP/IP stack. This makes considerably reduce the dwell time in the nodes, and increase the achievable data frame rate. After the bypassing, traffic schedule is performed according to dynamic-priority EDF algorithm. The work does not need any modifications in the Ethernet hardware and coexists with TCP/IP suites, and then the LAN with the protocol can be connected to any existing Ethernet networks. It can be adopted in industrial hard real-time applications such as embedded systems, distributed control systems, parallel signal processing and robotics. We have performed some experiments to evaluate the protocol. Compared to some conventional hard real-time network protocols, the proposed one has better real-time performances and meets the requirements of reliability for hard real-time systems.
Style APA, Harvard, Vancouver, ISO itp.
3

Hu, Yao, Ting Peng i Lianming Zhang. "Software-Defined Congestion Control Algorithm for IP Networks". Scientific Programming 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/3579540.

Pełny tekst źródła
Streszczenie:
The rapid evolution of computer networks, increase in the number of Internet users, and popularity of multimedia applications have exacerbated the congestion control problem. Congestion control is a key factor in ensuring network stability and robustness. When the underlying network and flow information are unknown, the transmission control protocol (TCP) must increase or reduce the size of the congestion window to adjust to the changes of traffic in the Internet Protocol (IP) network. However, it is possible that a software-defined approach can relieve the network congestion problem more efficiently. This approach has the characteristic of centralized control and can obtain a global topology for unified network management. In this paper, we propose a software-defined congestion control (SDCC) algorithm for an IP network. We consider the difference between TCP and the user datagram protocol (UDP) and propose a new method to judge node congestion. We initially apply the congestion control mechanism in the congested nodes and then optimize the link utilization to control network congestion.
Style APA, Harvard, Vancouver, ISO itp.
4

Wu Boqiao, Liu Xuefei, Tan Aiping i Weniee Evelyn. "Network Management Scheme Based on TCP/IP Protocol". International Journal of Digital Content Technology and its Applications 7, nr 6 (31.03.2013): 937–45. http://dx.doi.org/10.4156/jdcta.vol7.issue6.106.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Prabadevi, B., i N. Jeyanthi. "Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks". Cybernetics and Information Technologies 17, nr 4 (27.11.2017): 69–86. http://dx.doi.org/10.1515/cait-2017-0042.

Pełny tekst źródła
Streszczenie:
AbstractThe bridge protocol (Address Resolution Protocol) ARP, integrating Ethernet (Layer 2) and IP protocol (Layer 3) plays a vital role in TCP/IP communication since ARP packet is the first packet generated during any TCP/IP communications and they are the first traffic from the host. In the large data center, as the size of the broadcast domain (i.e., number of hosts on the network) increases consequently the broadcast traffic from the communication protocols like ARP also increases. This paper addresses the problem faced by Layer 2 protocols like insecured communication, scalability issues and VM migration issues. The proposed system addresses these issues by introducing two new types of messaging with traditional ARP and also combat the ARP Cache poisoning attacks like host impersonation, MITM, Distributed DoS by making ARP stateful. The components of the proposed methodology first start the process by decoding the packets, updates the invalid entry made by the user with Timestamp feature and messages being introduced. The system has been implemented and compared with various existing solutions.
Style APA, Harvard, Vancouver, ISO itp.
6

Anderson, Daniel K., i W. Michael Reed. "The Effects of Internet Instruction, Prior Computer Experience, and Learning Style on Teachers' Internet Attitudes and Knowledge". Journal of Educational Computing Research 19, nr 3 (październik 1998): 227–46. http://dx.doi.org/10.2190/8wx1-5q3j-p3bw-jd61.

Pełny tekst źródła
Streszczenie:
What is now called the Internet started out as a small number of federally funded Department of Defense (Advanced Research Project Agency, or ARPA) supercomputers networked together to share information. In order to guarantee data transmission between these nodes, this network (ARPANET) shared a common set of protocols that was designed to allow for high speed and reliable transfer. This protocol suite is TCP/IP (Transmission Control Protocol/Internet Protocol). Most microcomputers now have a TCP/IP implementation available (e.g., MacTCP) and can, therefore, join the millions of computers that have access to the plethora of resources on the Internet. The Internet is not a static set of nodes, not a limited number of library holdings, not a one-directional paradigm of data transmission. Rather, it is a vibrant and absorbing setting that can foster new learning environments, or enrage educators with its diverse commands, lack of direction, and tenuous consistency.
Style APA, Harvard, Vancouver, ISO itp.
7

Thuneibat, Saed, i Buthayna Al Sharaa. "Dynamic source routing protocol with transmission control and user datagram protocols". Indonesian Journal of Electrical Engineering and Computer Science 30, nr 1 (1.04.2023): 137. http://dx.doi.org/10.11591/ijeecs.v30.i1.pp137-143.

Pełny tekst źródła
Streszczenie:
Dynamic source routing protocol (DSR) is a common routing protocol in wireless network without infrastructure, called ad-hoc network, DSR used just above internet protocol (IP) at the network layer. The upper transport layer provides reliability by transmission control protocol (TCP) and user datagram protocol (UDP). The choice between DSR/TCP and DSR/UDP is an actual issue for network designers and engineers. The question arises: which one provides better quality of service (QoS) parameters, less delay and jitter, greater throughput, and data rates. This paper focuses on the study and analysis of DSR and comparison of DSR/TCP and DSR/UDP by simulation in network simulator (NS2) environment. Another comparison of DSR and ad hoc on-demand distance vector (AODV) is provided. Design and simulation of the protocols in ad hoc network accurately describe the behavior in real system and QoS parameters are obtained.
Style APA, Harvard, Vancouver, ISO itp.
8

Amin, Muhammad, Dian Kurnia i Kevin Mikli. "Design of Three Class Internet Protocol Routing Model Based on Linux Command Line Interface". Journal of Applied Engineering and Technological Science (JAETS) 3, nr 2 (24.06.2022): 133–38. http://dx.doi.org/10.37385/jaets.v3i2.764.

Pełny tekst źródła
Streszczenie:
The world of information technology is currently experiencing very rapid development, especially in internet technology. The Internet itself is a form of utilization of a computer network system, a computer network system consisting of a group of computer systems and other computing hardware linked together through communication channels to facilitate communication and resource sharing among various users. TCP / IP is a standard protocol that is applied to the internet network. The existence of a router in a TCP/IP network is very important, this is due to the large number of hosts and the differences in the devices used on a TCP/IP network. Router is a computer network device that is used to forward data packets from one network to another, both within the scope of LAN and WAN networks (Yani A., 2008). As a result, a routing mechanism is needed that can integrate many users with a high degree of flexibility. Routing is generally divided into two categories, namely static routing and dynamic routing. Static routing is a routing mechanism that depends on the routing table with manual configuration while dynamic routing is a routing mechanism where the routing table exchange between routers on the network is carried out dynamically. Routing in the world of information technology (IT) is part of how to improve network performance. Routing is a process to choose the path (path) traversed by the packet. Routing itself is very instrumental in building a network, be it LAN or WAN. Currently the use of routing in a network is something that needs to be taken into account in a company. Today's companies that have business processes in the IT sector are very dependent on network availability. Network reliability is the main point in the operation of the system. An adequate and reliable network infrastructure is very much needed by the company, especially regarding the company's electability. Companies that have large-scale networks need several techniques so that the network can work optimally and reliably in overcoming various problems that arise, including network connectivity that is still not stable and link redundancy has not been implemented as a backup path to overcome network failures if interference occurs. alternative network paths that are used to increase network availability, so that if there is a broken link in a network, the data path can still be connected without affecting the connectivity of devices on the network
Style APA, Harvard, Vancouver, ISO itp.
9

Bein, Adrian Sean, i Alexander Williams. "Networking IP Restriction filtering and network address". IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, nr 2 (30.04.2020): 172–77. http://dx.doi.org/10.34306/itsdi.v1i2.149.

Pełny tekst źródła
Streszczenie:
Permissions setting on a computer is necessary. This is an effort that is not easy to change the system configuration or settings changed by the user. With a network of computers, of course, permissions settings do not need to be done one by one manually. Because in a computer network course there are many collections of computers connected together. Permissions setting so that the system can use the client-server applications that access restrictions can be done effectively. As the implementation of client-server applications can be created using Visual Basic 6.0. This language has been able to access the socket on the Windows operating system, named Winsock API that supports TCP / IP. This protocol is widely used because of the reliability of client-server application programming. The application is divided into two main applications, namely the client and server program name with the name of the Receiver Sender program. Receiver function receives instructions restriction of access rights Sender and sends reports to the Sender process execution. While Sender functions to send instructions restrictions permissions via the Registry to the Receiver. And after the test, the application can block important features available in the Windows operating system. So it is expected that these applications can help in permissions setting on a computer network.
Style APA, Harvard, Vancouver, ISO itp.
10

Жебель, В. А., i А. И. Солдатов. "The Reliability Coefficient for Network Data Transmissions". Успехи кибернетики / Russian Journal of Cybernetics, nr 2(14) (30.06.2023): 60–67. http://dx.doi.org/10.51790/2712-9942-2023-4-2-09.

Pełny tekst źródła
Streszczenie:
в статье представлены результаты исследования способов защиты информации, передаваемой по вычислительным сетям, которые могут быть перехвачены и прочитаны, а также перехвачены и модифицированы. Показано, что существующие методы защищают информацию в сети с помощью криптографии (шифрования трафика), и только несколько методов проводят анализ поля TTL. В статье проведены исследования стека протоколов TCP/IP, сетевой модели OSI и полей кадра, установлены поля заголовков, которые будут использоваться в работе. Описаны инструменты, при помощи которых проводились исследования, отражается конфигурация пакетов. Предложен комплексный коэффициент достоверности для повышения достоверности передачи данных в сети предприятия за счет использования проверочных пакетов. Данный коэффициент является составным и включается в себя различные флаги и поля из сетевых протоколов стека TCP/IP, которые анализируются после приема. Предлагается гипотеза составления данного коэффициента достоверности и примерная шкала измерения. По результатам анализа делается вывод о достоверности принятых данных согласно данной шкалы измерения. this study considers the protection of information transmitted over computer networks that can be intercepted and decoded, or modified. It is shown that existing data protection methods use cryptography (traffic encryption). Just a few methods analyze the TTL field. We studied the TCP/IP protocol stack, the OSI network model, and the frame fields, and identified the header fields to be used. We presented the research tools and their configuration. We proposed a comprehensive reliability coefficient to assess the reliability of data transmission in corporate network through the use of verification packets. The composite coefficient includes various flags and fields from the TCP/IP network protocols, which are analyzed after reception. A hypothesis for building the reliability coefficient, and an approximate measurement scale are proposed. The analysis shows that the hypothesis and scale are correct.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "TCP/IP (Computer network protocol)"

1

Nematbakhsh, Mohammadali. "TCP/IP PROTOCOL BOARD USING SINGLE CHIP PROCESSOR". Thesis, The University of Arizona, 1985. http://hdl.handle.net/10150/275389.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Arpaci, Mutlu. "Congestion avoidance in TCP/IP networks". Diss., Georgia Institute of Technology, 2001. http://hdl.handle.net/1853/15356.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Bickhart, Ryan W. "Transparent TCP-to-SCTP translation shim layer". Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 0.44 Mb, 82 p, 2005. http://wwwlib.umi.com/dissertations/fullcit/1428177.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Zhao, Ting. "Fast IP lookup engine /". View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20ZHAOT.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Wu, Chen. "A new TCP protocol based on end-to-end available bandwidth measurement /". View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202005%20WU.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Holl, David J. "A performance analysis of TCP and STP implementations and proposals for new QoS classes for TCP/IP". Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0501103-111419.

Pełny tekst źródła
Streszczenie:
Thesis (M.S.)--Worcester Polytechnic Institute.
Keywords: TCP; RED; satellite; PEP; STP; performance enhancing proxy; segment caching; IP-ABR; Internet; bandwidth reservation; IP-VBR; congestion avoidance; bandwidth sharing. Includes bibliographical references (p. 98-99).
Style APA, Harvard, Vancouver, ISO itp.
7

Olsén, Jörgen. "Stochastic modeling and simulation of the TCP protocol /". Uppsala : Matematiska institutionen, Univ. [distributör], 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-3534.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Mustell, Eliot John. "Internet Protocol Version 6: The Next Generation?" [Milwaukee, Wis.] : e-Publications@Marquette, 2009. http://epublications.marquette.edu/theses_open/23.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Ramasubramaniam, Venkata Lakshmanan. "A framework for reliable multicast protocol". [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000599.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Zhou, Kaiyu. "Packet loss models of the Transmission Control Protocol". Click to view the E-thesis via HKUTO, 2006. http://sunzi.lib.hku.hk/hkuto/record/B36873172.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "TCP/IP (Computer network protocol)"

1

Blank, Andrew G. TCP/IP JumpStart. New York: John Wiley & Sons, Ltd., 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Cameron, Deb, red. TCP/IP Network Administration. Beijing: O’Reilly Media, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Hunt, Craig. TCP/IP Network Administration. Sebastopol, CA: O’Reilly Media, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Forouzan, Behrouz A. TCP/IP protocol suite. Boston: McGraw-Hill, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Osterloh, Heather. TCP/IP primer plus. Indianapolis, Ind: Sams, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Forouzan, Behrouz A. TCP/IP protocol suite. Wyd. 2. Boston: McGraw-Hill, 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Hunt, Craig. TCP/IP Network Administration. Redaktorzy Mike Loukides i Debra Cameron. Wyd. 3. Beijing: O’Reilly Media, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Hunt, Craig. TCP/IP Network Administration. Sebastopol, CA: O’Reilly Media, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Hunt, Craig. TCP/IP Network Administration. Wyd. 3. Sebastopol, CA: O’Reilly Media, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Loukides, Mike, red. TCP/IP: Network Administration. Sebastopol, CA: O’Reilly Media, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "TCP/IP (Computer network protocol)"

1

Yew, Kok Meng, R. M. Zahidur i Sai Peck Lee. "Mean Time Offset Protocol for Cluster of Auction Servers Over TCP/IP Network". W Lecture Notes in Computer Science, 323–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-46652-9_33.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

de Alencar, Marcelo Sampaio. "The TCP/IP Protocol". W Cryptography and Network Security, 135–57. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003337768-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Marchette, David J. "TCP/IP Networking". W Computer Intrusion Detection and Network Monitoring, 3–42. New York, NY: Springer New York, 2001. http://dx.doi.org/10.1007/978-1-4757-3458-4_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Lei, Shu, Wang Jin, Xu Hui, Jinsung Cho i Sungyoung Lee. "Connecting Sensor Networks with TCP/IP Network". W Lecture Notes in Computer Science, 330–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11610496_44.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Li, Nanjun, i Werner Zorn. "Visualizing TCP/IP Network Flows to Control Congestion and Bottlenecks". W Communications in Computer and Information Science, 40–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00205-2_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Chang, Kyung-Bae, Il-Joo Shim i Gwi-Tae Park. "Separated Ethernet Algorithm for Intelligent Building Network Integration Using TCP/IP". W Lecture Notes in Computer Science, 452–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11552413_65.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Lan, Shizhan, Lifang Ma i Jing Huang. "Research and Practice of TCP Protocol Optimization in Mobile Internet". W Communications in Computer and Information Science, 187–96. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8285-9_14.

Pełny tekst źródła
Streszczenie:
AbstractThis paper analyzes the problems of traditional TCP protocol in the wireless network environment and proposes a scheme based on performance-enhancing agents, which is more suitable for the actual situation of current wireless core networks. TCP application optimization was employed to enhance congestion control. Based on the automatic learning mechanism of network path features, this paper proposes herein the dynamic algorithm ZetaTCP. In practice, the performance enhancement agent based on ZetaTCP In practice, the performance enhancement proxy based on ZetaTCP was verified and achieves good results in LTE networks. In practice, the performance enhancement proxy based on ZetaTCP was verified and achieved good results in the LTE network.
Style APA, Harvard, Vancouver, ISO itp.
8

Zhang, Xuechen, Guiquan Liu i Song Jiang. "Improve Throughput of Storage Cluster Interconnected with a TCP/IP Network Using Intelligent Server Grouping". W Lecture Notes in Computer Science, 373–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15672-4_31.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Luglio, Michele, Cesare Roseti i Francesco Zampgnaro. "A Satellite Network Emulation Platform for Implementation and Testing of TCP/IP Applications". W Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 1–2. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35576-9_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Pavesi, Jaime, Thamara Villegas, Alexey Perepechko, Eleazar Aguirre i Lorena Galeazzi. "Validation of ICS Vulnerability Related to TCP/IP Protocol Implementation in Allen-Bradley Compact Logix PLC Controller". W Communications in Computer and Information Science, 355–64. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33229-7_30.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "TCP/IP (Computer network protocol)"

1

Bai, Jin, Salim Hariri i Youssif Al-Nashif. "A Network Protection Framework for DNP3 over TCP/IP protocol". W 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2014. http://dx.doi.org/10.1109/aiccsa.2014.7073172.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

LENARDIC, DANIEL Z., BRANKA ZOVKO-CIHLAR i MISLAV GRGIC. "ANALYSIS OF TCP/IP PROTOCOL BEHAVIOUR IN A CONGESTED MULTIMEDIA COMPUTER NETWORK". W Proceedings of the 9th International Workshop on Systems, Signals and Image Processing. WORLD SCIENTIFIC, 2002. http://dx.doi.org/10.1142/9789812776266_0007.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Aksoy, Ahmet, i Mehmet Hadi Gunes. "Operating System Classification Performance of TCP/IP Protocol Headers". W 2016 IEEE 41st Conference on Local Computer Networks: Workshops (LCN Workshops). IEEE, 2016. http://dx.doi.org/10.1109/lcn.2016.036.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Hossain, Ziaul, i Gorry Fairhurst. "Measuring Performance of Web Protocol with Updated Transport Layer Techniques for Faster Web Browsing". W 10th International Conference on Computer Networks & Communications (CCNET 2023). Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130401.

Pełny tekst źródła
Streszczenie:
Popular Internet applications such as web browsing, web video download or variable-rate voice suffer from standard Transport Control Protocol (TCP) behaviour because their transmission rate and pattern are different from conventional bulk transfer applications. Previous works have analysed the interaction of these applications with the congestion control algorithms in TCP and proposed Congestion Window Validation (CWV) as a solution. However, this method was incomplete and has been shown to present drawbacks. This paper focuses on the ‘newCWV’ which was proposed to address these drawbacks. newCWV depicts a practical mechanism to estimate the available path capacity and suggests a more appropriate congestion control behaviour. These new modifications benefit variable-rate applications that are bursty in nature, with shorter transfer durations. In this paper, this algorithm was implemented in the Linux TCP/IP stack and tested by experiments, where results indicate that, with newCWV, the browsing can get 50% faster in an uncongested network.
Style APA, Harvard, Vancouver, ISO itp.
5

Montanari, Tony. "The Internet and the Citrus Industry". W ASME 1997 Citrus Engineering Conference. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/cec1997-4306.

Pełny tekst źródła
Streszczenie:
The Internet is a worldwide connection of thousands of computer networks. All of them speak the same language, TCP/IP, the standard protocol. The Internet allows people with access to these networks to share information and knowledge. Resources available on the Internet are chat groups, e-mail, newsgroups, file transfers, and the World Wide Web. The Internet has no centralized authority and it is uncensored. The Internet belongs to everyone and to no one. Paper published with permission.
Style APA, Harvard, Vancouver, ISO itp.
6

Al-Rawi, Akram, i Azzedine Lansari. "Effect of Windows XP Firewall on Network Simulation and Testing". W InSITE 2007: Informing Science + IT Education Conference. Informing Science Institute, 2007. http://dx.doi.org/10.28945/3170.

Pełny tekst źródła
Streszczenie:
The objective of this paper is to report findings from simulating and testing local area network (LAN) connectivity using Windows XP operating system and Cisco Networking Academy network devices. In this study, a simple routing protocol, RIP, is used as routing protocol. Two different techniques, Cisco Networking Academy hardware lab and Cisco Packet Tracer 4, were used to compare their performance to simulate network connectivity. Primary findings showed that the settings of the Windows XP firewall on the host computer have a direct impact on the test results. These findings are critical as there are no similar reports in the literature and only a careful investigation allowed the researchers to come to this conclusion. Furthermore, study results also offer suggestions for fixing problems that hinder simulation results of LANs that use Windows XP workstations. These findings can help CCNA students and faculty understand the reasons for unexplained connectivity problems when performing CCNA labs. The study also provides a simple method to avoid connectivity problems when using Windows ping.exe and tracert.exe which implement the TCP/IP protocol ICMP
Style APA, Harvard, Vancouver, ISO itp.
7

Mok, Swee M. "Development of a Web-Based Controller for Remote Sensing and Control of Manufacturing Processes". W ASME 1998 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1998. http://dx.doi.org/10.1115/detc98/cie-5526.

Pełny tekst źródła
Streszczenie:
Abstract This paper introduces the concept of a networked controller that leverages the capability of web services. By doing so, it enables the implementation of a large set of factory monitoring and control equipment that is cost effective and manageable. By using the factory local area network for communication, and industrial computers based on standard hardware and software as the controller platform, cost is minimized. A networked solution based on Transmission Control Protocol / Internet Protocol (TCP/IP) allows the controller to communicate with factory engineers through their desktop computers as efficiently as it can with other computers. Engineers can set up each unit for its intended function by installing the appropriate sensors. Java applet technology is employed for remote setup and control. Controller requirements such as remote configuration, client processing, and data presentation are presented. A method for overcoming real time issues is proposed using a client/server design. A prototype was built to demonstrate some of the concepts. Discussions are then made on possible future work using a Finite State Machine design methodology to improve overall system reliability.
Style APA, Harvard, Vancouver, ISO itp.
8

Ryan, Les M. "Breaking the Barriers: An Architecture for Multi-Host Access to Field Devices". W 1996 1st International Pipeline Conference. American Society of Mechanical Engineers, 1996. http://dx.doi.org/10.1115/ipc1996-1909.

Pełny tekst źródła
Streszczenie:
An overview of some of the many host applications that collect and use data from field devices such as RTUs, PLCs and flow computers is given and the need to provide multi-host access to these field devices is established. The challenges in providing multi-host access to field device networks is discussed as well as some of the current methods used. The concept of using a gateway to interface field device networks to wide area networks (WAN) is introduced with a brief discussion on the advantages of using TCP/IP for host to gateway transport. Several popular field device network protocols are assessed for their multi-host access capabilities with and without a field device network gateway.
Style APA, Harvard, Vancouver, ISO itp.
9

Mahabaleshwarkar, Ketaki, Neha Mundada, Amruta Chavan i Amruta Panage. "TCP/IP protocol accelaration". W 2012 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2012. http://dx.doi.org/10.1109/iccci.2012.6158829.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Kanmai, Zhi. "TCP/IP Protocol Security Problems and Defenses". W 2020 International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI). IEEE, 2020. http://dx.doi.org/10.1109/ichci51889.2020.00033.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii