Artykuły w czasopismach na temat „TCP/IP (Computer network protocol)”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: TCP/IP (Computer network protocol).

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „TCP/IP (Computer network protocol)”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Rafif Abyakto, Naif Baihaqi, M. Aldi Firdaus, Salsabila Aulia i Didik Aribowo. "Simulasi TCP-IP Menggunakan Topologi Bus". Uranus : Jurnal Ilmiah Teknik Elektro, Sains dan Informatika 2, nr 2 (11.05.2024): 07–14. http://dx.doi.org/10.61132/uranus.v2i2.97.

Pełny tekst źródła
Streszczenie:
One important technique for understanding and analyzing computer network performance is TCP/IP simulacrum. In this research, we simulate a TCP/IP network using the bus topology as a model. We use the Cisco Packet Tracer simulated network topology builder to create a bus topology and implement the TCP/IP protocol. The simulation results provide more accurate understanding of how the TCP/IP protocol functions within a bus network. We analyze network performance in terms of throughput, latency, and packet loss. The analysis's findings indicate that bus topologies have a certain amount of leeway in network operations, particularly when a collision occurs. However, this simulation offers a valuable tool to improve computer network design and management.
Style APA, Harvard, Vancouver, ISO itp.
2

YIMING, ALIMUJIANG, i TOSHIO EISAKA. "A SWITCHED ETHERNET PROTOCOL FOR HARD REAL-TIME EMBEDDED SYSTEM APPLICATIONS". Journal of Interconnection Networks 06, nr 03 (wrzesień 2005): 345–60. http://dx.doi.org/10.1142/s0219265905001460.

Pełny tekst źródła
Streszczenie:
This paper presents a protocol to support hard real-time traffic of end-to-end communication over non real-time LAN technology. The network is set up with nodes and switches, and real-time communication is handled by software (protocol) added between the Ethernet protocols and the TCP/IP suite. The proposed protocol establishes a virtual circuit based on admission control and manages hard real-time traffic to bypass the TCP/IP stack. This makes considerably reduce the dwell time in the nodes, and increase the achievable data frame rate. After the bypassing, traffic schedule is performed according to dynamic-priority EDF algorithm. The work does not need any modifications in the Ethernet hardware and coexists with TCP/IP suites, and then the LAN with the protocol can be connected to any existing Ethernet networks. It can be adopted in industrial hard real-time applications such as embedded systems, distributed control systems, parallel signal processing and robotics. We have performed some experiments to evaluate the protocol. Compared to some conventional hard real-time network protocols, the proposed one has better real-time performances and meets the requirements of reliability for hard real-time systems.
Style APA, Harvard, Vancouver, ISO itp.
3

Hu, Yao, Ting Peng i Lianming Zhang. "Software-Defined Congestion Control Algorithm for IP Networks". Scientific Programming 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/3579540.

Pełny tekst źródła
Streszczenie:
The rapid evolution of computer networks, increase in the number of Internet users, and popularity of multimedia applications have exacerbated the congestion control problem. Congestion control is a key factor in ensuring network stability and robustness. When the underlying network and flow information are unknown, the transmission control protocol (TCP) must increase or reduce the size of the congestion window to adjust to the changes of traffic in the Internet Protocol (IP) network. However, it is possible that a software-defined approach can relieve the network congestion problem more efficiently. This approach has the characteristic of centralized control and can obtain a global topology for unified network management. In this paper, we propose a software-defined congestion control (SDCC) algorithm for an IP network. We consider the difference between TCP and the user datagram protocol (UDP) and propose a new method to judge node congestion. We initially apply the congestion control mechanism in the congested nodes and then optimize the link utilization to control network congestion.
Style APA, Harvard, Vancouver, ISO itp.
4

Wu Boqiao, Liu Xuefei, Tan Aiping i Weniee Evelyn. "Network Management Scheme Based on TCP/IP Protocol". International Journal of Digital Content Technology and its Applications 7, nr 6 (31.03.2013): 937–45. http://dx.doi.org/10.4156/jdcta.vol7.issue6.106.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Prabadevi, B., i N. Jeyanthi. "Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks". Cybernetics and Information Technologies 17, nr 4 (27.11.2017): 69–86. http://dx.doi.org/10.1515/cait-2017-0042.

Pełny tekst źródła
Streszczenie:
AbstractThe bridge protocol (Address Resolution Protocol) ARP, integrating Ethernet (Layer 2) and IP protocol (Layer 3) plays a vital role in TCP/IP communication since ARP packet is the first packet generated during any TCP/IP communications and they are the first traffic from the host. In the large data center, as the size of the broadcast domain (i.e., number of hosts on the network) increases consequently the broadcast traffic from the communication protocols like ARP also increases. This paper addresses the problem faced by Layer 2 protocols like insecured communication, scalability issues and VM migration issues. The proposed system addresses these issues by introducing two new types of messaging with traditional ARP and also combat the ARP Cache poisoning attacks like host impersonation, MITM, Distributed DoS by making ARP stateful. The components of the proposed methodology first start the process by decoding the packets, updates the invalid entry made by the user with Timestamp feature and messages being introduced. The system has been implemented and compared with various existing solutions.
Style APA, Harvard, Vancouver, ISO itp.
6

Anderson, Daniel K., i W. Michael Reed. "The Effects of Internet Instruction, Prior Computer Experience, and Learning Style on Teachers' Internet Attitudes and Knowledge". Journal of Educational Computing Research 19, nr 3 (październik 1998): 227–46. http://dx.doi.org/10.2190/8wx1-5q3j-p3bw-jd61.

Pełny tekst źródła
Streszczenie:
What is now called the Internet started out as a small number of federally funded Department of Defense (Advanced Research Project Agency, or ARPA) supercomputers networked together to share information. In order to guarantee data transmission between these nodes, this network (ARPANET) shared a common set of protocols that was designed to allow for high speed and reliable transfer. This protocol suite is TCP/IP (Transmission Control Protocol/Internet Protocol). Most microcomputers now have a TCP/IP implementation available (e.g., MacTCP) and can, therefore, join the millions of computers that have access to the plethora of resources on the Internet. The Internet is not a static set of nodes, not a limited number of library holdings, not a one-directional paradigm of data transmission. Rather, it is a vibrant and absorbing setting that can foster new learning environments, or enrage educators with its diverse commands, lack of direction, and tenuous consistency.
Style APA, Harvard, Vancouver, ISO itp.
7

Thuneibat, Saed, i Buthayna Al Sharaa. "Dynamic source routing protocol with transmission control and user datagram protocols". Indonesian Journal of Electrical Engineering and Computer Science 30, nr 1 (1.04.2023): 137. http://dx.doi.org/10.11591/ijeecs.v30.i1.pp137-143.

Pełny tekst źródła
Streszczenie:
Dynamic source routing protocol (DSR) is a common routing protocol in wireless network without infrastructure, called ad-hoc network, DSR used just above internet protocol (IP) at the network layer. The upper transport layer provides reliability by transmission control protocol (TCP) and user datagram protocol (UDP). The choice between DSR/TCP and DSR/UDP is an actual issue for network designers and engineers. The question arises: which one provides better quality of service (QoS) parameters, less delay and jitter, greater throughput, and data rates. This paper focuses on the study and analysis of DSR and comparison of DSR/TCP and DSR/UDP by simulation in network simulator (NS2) environment. Another comparison of DSR and ad hoc on-demand distance vector (AODV) is provided. Design and simulation of the protocols in ad hoc network accurately describe the behavior in real system and QoS parameters are obtained.
Style APA, Harvard, Vancouver, ISO itp.
8

Amin, Muhammad, Dian Kurnia i Kevin Mikli. "Design of Three Class Internet Protocol Routing Model Based on Linux Command Line Interface". Journal of Applied Engineering and Technological Science (JAETS) 3, nr 2 (24.06.2022): 133–38. http://dx.doi.org/10.37385/jaets.v3i2.764.

Pełny tekst źródła
Streszczenie:
The world of information technology is currently experiencing very rapid development, especially in internet technology. The Internet itself is a form of utilization of a computer network system, a computer network system consisting of a group of computer systems and other computing hardware linked together through communication channels to facilitate communication and resource sharing among various users. TCP / IP is a standard protocol that is applied to the internet network. The existence of a router in a TCP/IP network is very important, this is due to the large number of hosts and the differences in the devices used on a TCP/IP network. Router is a computer network device that is used to forward data packets from one network to another, both within the scope of LAN and WAN networks (Yani A., 2008). As a result, a routing mechanism is needed that can integrate many users with a high degree of flexibility. Routing is generally divided into two categories, namely static routing and dynamic routing. Static routing is a routing mechanism that depends on the routing table with manual configuration while dynamic routing is a routing mechanism where the routing table exchange between routers on the network is carried out dynamically. Routing in the world of information technology (IT) is part of how to improve network performance. Routing is a process to choose the path (path) traversed by the packet. Routing itself is very instrumental in building a network, be it LAN or WAN. Currently the use of routing in a network is something that needs to be taken into account in a company. Today's companies that have business processes in the IT sector are very dependent on network availability. Network reliability is the main point in the operation of the system. An adequate and reliable network infrastructure is very much needed by the company, especially regarding the company's electability. Companies that have large-scale networks need several techniques so that the network can work optimally and reliably in overcoming various problems that arise, including network connectivity that is still not stable and link redundancy has not been implemented as a backup path to overcome network failures if interference occurs. alternative network paths that are used to increase network availability, so that if there is a broken link in a network, the data path can still be connected without affecting the connectivity of devices on the network
Style APA, Harvard, Vancouver, ISO itp.
9

Bein, Adrian Sean, i Alexander Williams. "Networking IP Restriction filtering and network address". IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, nr 2 (30.04.2020): 172–77. http://dx.doi.org/10.34306/itsdi.v1i2.149.

Pełny tekst źródła
Streszczenie:
Permissions setting on a computer is necessary. This is an effort that is not easy to change the system configuration or settings changed by the user. With a network of computers, of course, permissions settings do not need to be done one by one manually. Because in a computer network course there are many collections of computers connected together. Permissions setting so that the system can use the client-server applications that access restrictions can be done effectively. As the implementation of client-server applications can be created using Visual Basic 6.0. This language has been able to access the socket on the Windows operating system, named Winsock API that supports TCP / IP. This protocol is widely used because of the reliability of client-server application programming. The application is divided into two main applications, namely the client and server program name with the name of the Receiver Sender program. Receiver function receives instructions restriction of access rights Sender and sends reports to the Sender process execution. While Sender functions to send instructions restrictions permissions via the Registry to the Receiver. And after the test, the application can block important features available in the Windows operating system. So it is expected that these applications can help in permissions setting on a computer network.
Style APA, Harvard, Vancouver, ISO itp.
10

Жебель, В. А., i А. И. Солдатов. "The Reliability Coefficient for Network Data Transmissions". Успехи кибернетики / Russian Journal of Cybernetics, nr 2(14) (30.06.2023): 60–67. http://dx.doi.org/10.51790/2712-9942-2023-4-2-09.

Pełny tekst źródła
Streszczenie:
в статье представлены результаты исследования способов защиты информации, передаваемой по вычислительным сетям, которые могут быть перехвачены и прочитаны, а также перехвачены и модифицированы. Показано, что существующие методы защищают информацию в сети с помощью криптографии (шифрования трафика), и только несколько методов проводят анализ поля TTL. В статье проведены исследования стека протоколов TCP/IP, сетевой модели OSI и полей кадра, установлены поля заголовков, которые будут использоваться в работе. Описаны инструменты, при помощи которых проводились исследования, отражается конфигурация пакетов. Предложен комплексный коэффициент достоверности для повышения достоверности передачи данных в сети предприятия за счет использования проверочных пакетов. Данный коэффициент является составным и включается в себя различные флаги и поля из сетевых протоколов стека TCP/IP, которые анализируются после приема. Предлагается гипотеза составления данного коэффициента достоверности и примерная шкала измерения. По результатам анализа делается вывод о достоверности принятых данных согласно данной шкалы измерения. this study considers the protection of information transmitted over computer networks that can be intercepted and decoded, or modified. It is shown that existing data protection methods use cryptography (traffic encryption). Just a few methods analyze the TTL field. We studied the TCP/IP protocol stack, the OSI network model, and the frame fields, and identified the header fields to be used. We presented the research tools and their configuration. We proposed a comprehensive reliability coefficient to assess the reliability of data transmission in corporate network through the use of verification packets. The composite coefficient includes various flags and fields from the TCP/IP network protocols, which are analyzed after reception. A hypothesis for building the reliability coefficient, and an approximate measurement scale are proposed. The analysis shows that the hypothesis and scale are correct.
Style APA, Harvard, Vancouver, ISO itp.
11

Baigorria, Luis A., José F. Postigo, Vicente A. Mut i Ricardo O. Carelli. "Telecontrol system based on the Smith predictor using the TCP/IP protocol". Robotica 21, nr 3 (13.05.2003): 303–12. http://dx.doi.org/10.1017/s0263574702004812.

Pełny tekst źródła
Streszczenie:
In this paper, development and implementation are presented of a client software package for remote process control. The proposed software is based on a client-server model under an Intranet architecture. The architecture is proposed for a telecontrol system of a real process, which includes the possibility of integrating I/O devices with data networks based on open protocols such as TCP/IP. This protocol allows the implementation of control systems using a low-cost alternative. Also, the Smith predictor is revised for remote control applications over an Ethernet network. Some experiences on a laboratory pasteurization plant are addressed to show both developed controllers and architecture performance.
Style APA, Harvard, Vancouver, ISO itp.
12

Zhuang, Dian Zheng, i Yu Hua Zhu. "Research on Network NC Manufacturing Based on Internet". Applied Mechanics and Materials 441 (grudzień 2013): 947–50. http://dx.doi.org/10.4028/www.scientific.net/amm.441.947.

Pełny tekst źródła
Streszczenie:
The paper introduced the method and technology of how to implement a Integrated Manufacturing, each CNC machining equipment is equipped with a special communication unit, each communication unit are directly connected with the DNC main control computers on the Internet, effect of special communication unit is mainly data buffer and protocol conversion, the TCP/IP protocol is used between communication unit and DNC main control Internet computer, and used serial communication protocol communication between communication unit and NC equipment. Using this technology, all kinds of CNC machining equipment and DNC system can be easily with the CAD/CAM/CAE system, digital profile measurement system, fault diagnosis and error compensation of intelligent system integration, providing good technical conditions for further information of various advanced manufacturing environment integration.
Style APA, Harvard, Vancouver, ISO itp.
13

Cooling, Jim. "A guide to the TCP/IP protocol suite". Computer Communications 18, nr 1 (styczeń 1995): 56–57. http://dx.doi.org/10.1016/0140-3664(95)90076-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Abood, Amany Mohammad, Maysam Sameer Hussein, Zainab G. Faisal i Zainab H. Tawfiq. "Design and simulation of video monitoring structure over TCP/IP system using MATLAB". Indonesian Journal of Electrical Engineering and Computer Science 24, nr 3 (1.12.2021): 1840. http://dx.doi.org/10.11591/ijeecs.v24.i3.pp1840-1845.

Pełny tekst źródła
Streszczenie:
Video monitoring systems are undergoing an evolution from conventional analog to digital clarification to provide better rate and security over internet protocols. In addition, analog surveillance becomes insufficient to face enormous demand of security of system contains more than hundreds of camera often deployed in hotels environments far away from room control. This paper presents the design and simulation of a video monitoring scheme in excess of a transmission control protocol/internet protocol (TCP/IP) system using MATLAB. Sophisticated cameras could record directly high-definition digital videos based on digital technology which simply communicate the control room relaying on ordinary internet protocol infrastructure networks. This technology provides a flexible network interface over a wide variety of heterogeneous technology networks. Though, the acceptance of IP designed for video monitoring pretense severe difficulties in terms of power processing, system dependability, required bandwidth, and security of networks. The advantage of IP based video monitoring system has been investigated over conventional analog systems and the challenges of the method are described. The open research issues are still requiring a final solution to permits complete abandon against conventional technology of analog methods. In conclusion, the method to tackle the purpose of video monitoring in actual operation is proposed and verified properly by means of model simulation.
Style APA, Harvard, Vancouver, ISO itp.
15

Peng, Rui, Yong Dong Li i Guang Yang. "Design of a Remote Monitoring System Based on the TCP/IP Protocol". Applied Mechanics and Materials 339 (lipiec 2013): 313–17. http://dx.doi.org/10.4028/www.scientific.net/amm.339.313.

Pełny tekst źródła
Streszczenie:
With the development of science and technology, the remote monitoring system is more and more widely used in management control integration systems. The remote monitoring system proposed in this paper is composed of sensor, collector adapted to various sensor signals and host computer of monitoring center. The collector whose core control chip is STR912FW based on ARM9 structure, is distributed in monitor environment as independent node, and communicates with host computer though Ethernet network (TCP/IP Protocol). It has been shown that the monitoring system has many advantages such as supporting online distributed monitoring, adding or removing nodes conveniently, low cost, high stability and high practicability.
Style APA, Harvard, Vancouver, ISO itp.
16

Reddy, N. Ramanjaneya, Chenna Reddy Pakanati i M. Padmavathamma. "An Enhanced Queue Management Scheme for Eradicating Congestion of TFRC over Wired Environment". International Journal of Electrical and Computer Engineering (IJECE) 7, nr 3 (1.06.2017): 1347. http://dx.doi.org/10.11591/ijece.v7i3.pp1347-1354.

Pełny tekst źródła
Streszczenie:
<p class="Abstract">To accomplish increasing real time requirements, user applications have to send different kinds of data with different speeds over the internet. To effectuate the aims of the computer networks, several protocols have been added to TCP/IP protocol suite. Transport layer has to implement emerging techniques to transfer huge amount of data like multimedia streaming. To transmit multimedia applications, one of the suitable congestion control mechanisms in transport layer is TCP Friendly Rate Control Protocol (TFRC). It controls congestion based on its equation. To get more smoothed throughput, intermediate nodes (like Routers. etc.) have to use suitable procedures in all real time situations. To eradicate the level of congestion in the network, we introduce enhanced Holt-Winters equations to RED queue management algorithm and applied to TFRC. The simulation results have shown that this strategy reduces packet loss and increases throughput.</p>
Style APA, Harvard, Vancouver, ISO itp.
17

Bellovin, S. M. "Security problems in the TCP/IP protocol suite". ACM SIGCOMM Computer Communication Review 19, nr 2 (kwiecień 1989): 32–48. http://dx.doi.org/10.1145/378444.378449.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Liu, Zeying, Pengshuai Cui, Yongji Dong, Lei Xue i Yuxiang Hu. "MultiSec: A Multi-Protocol Security Forwarding Mechanism Based on Programmable Data Plane". Electronics 11, nr 15 (30.07.2022): 2389. http://dx.doi.org/10.3390/electronics11152389.

Pełny tekst źródła
Streszczenie:
With the development of network technology, various network protocols different from TCP/IP have emerged. The heterogeneous integrated network has been proposed to realize the interconnection between heterogeneous networks running different protocols. However, current protocol conversion mechanisms often can only handle a few pre-defined protocols and do not support the flexible expansion of new protocols, which cannot meet the needs of the efficient convergence of different heterogeneous networks. Addirionally, due to the lack of security mechanisms, data in the core network is confronted with the risk of stealing and tampering. Our aim is to provide a protocol-extensible protocol conversion and secure transmission integration mechanism, MultiSec, for heterogeneous converged networks. First, based on the programmable data plane, the parser is reconfigured to realize multi-protocol parsing. Furthermore, the encryption mechanism implemented in the P4 extern is proposed and unified to the data plane together with the protocol conversion mechanism. Finally, the MultiSec prototype is implemented on a programmable software switch and accelerated by a dedicated encryption card. Experiments show that MultiSec successfully realizes multi-protocol conversion and data encryption, and the system performance is significantly improved with the help of an encryption card.
Style APA, Harvard, Vancouver, ISO itp.
19

Chen, Xinhua, i Ya-ni Sun. "Computer Network Simulation Modeling Based on Object Oriented Petri Net". International Journal of Online Engineering (iJOE) 12, nr 02 (29.02.2016): 25. http://dx.doi.org/10.3991/ijoe.v12i02.5039.

Pełny tekst źródła
Streszczenie:
This paper first briefly introduces the Petri net, and then studied in detail according to the selected object-oriented Petri net modeling method. This paper improve the object-oriented Petri net modeling method, and study the modeling and operation steps in details. Finally this paper build a computer network TCP/IP protocol model based on the object oriented Petri net. The model prove to be a good simulation to the computer network and the improved modeling method is also a valid method for further object oriented Petri net modeling.
Style APA, Harvard, Vancouver, ISO itp.
20

Cui, Jian Tao. "Design and Implementation of Computer Network Monitoring Software". Applied Mechanics and Materials 686 (październik 2014): 201–4. http://dx.doi.org/10.4028/www.scientific.net/amm.686.201.

Pełny tekst źródła
Streszczenie:
This paper mainly studies the key technologies of network real-time monitoring system based on Client/Server, and implementation of a real-time monitoring system based on CS/ mode. Using the network communication technology, Winsock technology, TCP/IP protocol, image compression and transmission technology, the process of communication technology and object oriented software technology to realize the main frame module, the system include network monitoring data initialization module, data transmission module, image coding and decoding module, its advantage is to make full use of the existing network resources, the highest price, with real-time information control and real-time control as the center, timely delivery and management of information.
Style APA, Harvard, Vancouver, ISO itp.
21

Karolak, Juliusz, i Andrzej Kochan. "An application of TCP and UDP protocols in the connection of railway traffic control systems". WUT Journal of Transportation Engineering 126 (1.09.2019): 49–59. http://dx.doi.org/10.5604/01.3001.0013.6396.

Pełny tekst źródła
Streszczenie:
The article presents the possible implementation of the interface between computer devices: TCP and UDP protocols of one of the layers of the TCP / IP model, along with their features. Responses to errors were distinguished. Then an example of cooperation between two actual rail traffic control systems and other examples was presented, supplementing them with the proposed classification of connections. Systems are also presented, inside which network connections using TCP and IP protocols are used. The influence of the indicated damages on the substantive work of the connection was also presented.
Style APA, Harvard, Vancouver, ISO itp.
22

King, A., i R. Hunt. "Protocols and architecture for managing TCP/IP network infrastructures". Computer Communications 23, nr 16 (wrzesień 2000): 1558–72. http://dx.doi.org/10.1016/s0140-3664(00)00214-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Żal, Mariusz, Marek Michalski i Piotr Zwierzykowski. "Implementation of a Lossless Moving Target Defense Mechanism". Electronics 13, nr 5 (28.02.2024): 918. http://dx.doi.org/10.3390/electronics13050918.

Pełny tekst źródła
Streszczenie:
The contemporary world, dominated by information technologt (IT), necessitates sophisticated protection mechanisms against attacks that pose significant threats to individuals, companies, and governments alike. The unpredictability of human behavior, coupled with the scattered development of applications and devices, complicates supply chain maintenance, making it impossible to develop a system entirely immune to cyberattacks. Effective execution of many attack types hinges on prior network reconnaissance. Thus, hindering effective reconnaissance serves as a countermeasure to attacks. This paper introduces a solution within the moving target defense (MTD) strategies, focusing on the mutation of Internet protocol (IP) addresses in both edge and core network switches. The idea of complicating reconnaissance by continually changing IP addresses has been suggested in numerous studies. Nonetheless, previously proposed solutions have adversely impacted the quality of service (QoS) levels. Implementing these mechanisms could interrupt Transmission Control Protocol (TCP) connections and result in data losses. The IP address mutation algorithms presented in this study were designed to be fully transparent to transport layer protocols, thereby preserving the QoS for users without degradation. In this study, we leveraged the benefits of software-defined networking (SDN) and the Programming-Protocol-Ondependent Packet Processors (P4) language, which specifies packet processing methodologies in the data plane. Employing both SDN and P4 enables a dynamic customization of network device functionalities to meet network users’ specific requirements, a feat unachievable with conventional computer networks. This approach not only enhances the adaptability of network configurations but also significantly increases the efficiency and effectiveness of network management and operation.
Style APA, Harvard, Vancouver, ISO itp.
24

Miswar, Nur, Herman Herman i Imam Riadi. "COMPARING THE PERFORMANCE OF OSPF AND OSPF-MPLS ROUTING PROTOCOL IN FORWARDING TCP AND UDP PACKET". Jurnal Teknik Informatika (Jutif) 4, nr 5 (12.11.2023): 1237–47. http://dx.doi.org/10.52436/1.jutif.2023.4.5.1456.

Pełny tekst źródła
Streszczenie:
Routing is an important process in computer networks, which involves selecting a path for packet data. The routing mechanism is governed by protocols at layer three of the OSI model or layer two of the TCP/IP model. Routing can be static or dynamic, with dynamic routing algorithms automatically determining the best path in the network. One commonly used dynamic routing protocol is Open Shortest Path First (OSPF), which automatically selects the optimal route for data packets based on received network topology information. The need for more advanced and scalable routing solutions led to the development of Multi-Protocol Label Switching (MPLS), introducing the concept of label switching for faster and more efficient data forwarding. This research aims to analyze the performance of OSPF and OSPF MPLS routing scenarios regarding TCP and UDP services. Through evaluation of Quality of Service (QoS) parameters, including throughput, packet loss, delay, and jitter. This study simulates the network using GNS3 software, with TCP and UDP services transmitted for durations of 15, 30, and 60 seconds. The results showed performance for both scenarios with an average index value of 3.75, indicating "good" network performance according to TIPHON standards across all measurement sessions. Although MPLS OSPF showed slightly lower throughput compared to non-MPLS OSPF, both scenarios showed very low packet loss, low delay, and stable jitter. The evaluation also highlights that the use of OSPF MPLS for UDP services reduces the time delay. Both non-MPLS OSPF and MPLS OSPF effectively support TCP and UDP services, with MPLS OSPF showing advantages in certain QoS parameters, especially for UDP services.
Style APA, Harvard, Vancouver, ISO itp.
25

Phoomikiattisak, Ditchaphong, i Saleem N. Bhatti. "End-To-End Mobility for the Internet Using ILNP". Wireless Communications and Mobile Computing 2019 (16.04.2019): 1–29. http://dx.doi.org/10.1155/2019/7464179.

Pełny tekst źródła
Streszczenie:
As the use of mobile devices and methods of wireless connectivity continue to increase, seamless mobility becomes more desirable and important. The current IETF Mobile IP standard relies on additional network entities for mobility management, can have poor performance, and has seen little deployment in real networks. We present a host-based mobility solution with a true end-to-end architecture using the Identifier-Locator Network Protocol (ILNP). We show how the TCP code in the Linux kernel can be extended allowing legacy TCP applications that use the standard C sockets API to operate over ILNP without requiring changes or recompilation. Our direct testbed performance comparison shows that ILNP provides better host mobility support than Mobile IPv6 in terms of session continuity, packet loss, and handoff delay for TCP.
Style APA, Harvard, Vancouver, ISO itp.
26

Lee Chee Hang, Lee Chee Hang, Yu-Beng Leau Lee Chee Hang, Yong Jin Park Yu-Beng Leau, Zhiwei Yan Yong Jin Park i Supriyanto Praptodiyono Zhiwei Yan. "Protocol and Evaluation of Network Mobility with Producer Nodes in Named Data Networking". 網際網路技術學刊 23, nr 3 (maj 2022): 459–66. http://dx.doi.org/10.53106/160792642022052303004.

Pełny tekst źródła
Streszczenie:
<p>The drawbacks of the current TCP/IP suits have been pointed out. However, Named Data Networking (NDN) has some limitations, the most notable of which is producer and network mobility. Mainly, producer mobility in moving networks receives scant attention. There are numerous issues that the NDN must address before it can be used by the public, one of which is mobility. In NDN, consumer mobility is naturally supported, but producer mobility is not. The latter is researched a lot, but few results have been reported regarding network mobility with producers. In this paper, two approaches will be focused on: the Hybrid Network Mobility (Hybrid NeMo) approach and the Network Mobility (NeMoI). These two approaches are being compared because they both employed similar techniques for managing network mobility. Furthermore, they will be compared using the same topology to allow more accurate comparisons of their signalling cost and data delivery cost.</p> <p>&nbsp;</p>
Style APA, Harvard, Vancouver, ISO itp.
27

Hossain, Ziaul, i Gorry Fairhurst. "Enhancing HTTP Web Protocol Performance with Updated Transport Layer Techniques". International journal of Computer Networks & Communications 15, nr 04 (27.07.2023): 1–17. http://dx.doi.org/10.5121/ijcnc.2023.15401.

Pełny tekst źródła
Streszczenie:
Popular Internet applications such as web browsing, and web video download use HTTP protocol as application over the standard Transport Control Protocol (TCP). Traditional TCP behavior is unsuitable for this style of application because their transmission rate and traffic pattern are different from conventional bulk transfer applications. Previous works have analyzed the interaction of these applications with the congestion control algorithms in TCP and the proposed Congestion Window Validation (CWV) as a solution. However, this method was incomplete and has been shown to present drawbacks. This paper focuses on the ‘newCWV’ which was designed to address these drawbacks. NewCWV provides a practical mechanism to estimate the available path capacity and suggests a more appropriate congestion control behavior. This paper describes how this algorithm was implemented in the Linux TCP/IP stack and tested by experiments, where results indicate that, with newCWV, the browsing can get 50% faster in an uncongested network.
Style APA, Harvard, Vancouver, ISO itp.
28

Aebersold, Stefan A., Mobayode O. Akinsolu, Shafiul Monir i Martyn L. Jones. "Ubiquitous Control of a CNC Machine: Proof of Concept for Industrial IoT Applications". Information 12, nr 12 (20.12.2021): 529. http://dx.doi.org/10.3390/info12120529.

Pełny tekst źródła
Streszczenie:
In this paper, an integrated system to control and manage a state-of-the-art industrial computer numerical control (CNC) machine (Studer S33) using a commercially available tablet (Samsung Galaxy Tablet S2) is presented as a proof of concept (PoC) for the ubiquitous control of industrial machines. As a PoC, the proposed system provides useful insights to support the further development of full-fledged systems for Industrial Internet of Things (IIoT) applications. The proposed system allows for the quasi-decentralisation of the control architecture of conventional programmable logic controller (PLC)-based industrial control systems (ICSs) through data and information exchange over the transmission control protocol and the internet protocol (TCP/IP) suite using multiple agents. Based on the TCP/IP suite, a network device (Samsung Galaxy Tablet S2) and a process field net (PROFINET) device (Siemens Simatic S7-1200) are interfaced using a single-board computer (Raspberry Pi 4). An override system mainly comprising emergency stop and acknowledge buttons is also configured using the single-board computer. The input signals from the override system are transmitted to the PROFINET device (i.e., the industrial control unit (ICU)) over TCP/IP. A fully functional working prototype is realised as a PoC for an integrated system designated for the wireless and ubiquitous control of the CNC machine. The working prototype as an entity mainly comprises a mobile (handheld) touch-sensitive human-machine interface (HMI), a shielded single-board computer, and an override system, all fitted into a compact case with physical dimensions of 300 mm by 180 mm by 175 mm. To avert potential cyber attacks or threats to a reasonable extent and to guarantee the security of the PoC, a multi-factor authentication (MFA) including an administrative password and an IP address is implemented to control the access to the web-based ubiquitous HMI proffered by the PoC.
Style APA, Harvard, Vancouver, ISO itp.
29

Devi, A. Indira, i N. Arthi. "Alternate Path Selection in IP Networks using Bandwidth Optimization". International Journal of Advance Research and Innovation 3, nr 1 (2015): 43–47. http://dx.doi.org/10.51976/ijari.311507.

Pełny tekst źródła
Streszczenie:
Computer communication has been going through major changes throughout the last decades. Since TCP/IP was a protocol designed for wired networks, wireless transmission poses unique challenges to the well-defined and rigid protocol stack. Routing in ISP environment is challenging the clear path when the IP link was failure. In this paper, a Cross-layer approach is used to minimize routing disruption in IP networks. A model called probabilistically correlated failure (PCF) model was developed to quantify the impact of IP link failure on the reliability of backup paths. In PCF model, an algorithm is used to choose multiple reliable backup paths to protect each IP link. When an IP link fails, its traffic is split onto multiple backup paths to ensure that the rerouted traffic load on each IP link does not exceed the usable bandwidth. To evaluate this issue, the system has to be developed with real ISP service in particular network topology support. Entire path is initially used to select specific path, then backed up path are reused and tested by splitting entire bandwidth based on usage. The probability result will ensure the reliability and dedicated path of data transfer purpose. This kind of approach resolve the issue rose at high end data transaction application like VOIP, Video streaming etc.
Style APA, Harvard, Vancouver, ISO itp.
30

Mazzon, E. "Review: A Guide to the TCP/IP Protocol Suite". Computer Bulletin 42, nr 6 (1.11.2000): 31. http://dx.doi.org/10.1093/combul/42.6.31.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Akyildiz, I. F., i J. Fang. "TCP-Peachtree: A Multicast Transport Protocol for Satellite IP Networks". IEEE Journal on Selected Areas in Communications 22, nr 2 (luty 2004): 388–400. http://dx.doi.org/10.1109/jsac.2003.819991.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Kim, J. Y. "A TCP/IP-based remote control system for yard cranes in a port container terminal". Robotica 24, nr 5 (17.02.2006): 613–20. http://dx.doi.org/10.1017/s0263574706002694.

Pełny tekst źródła
Streszczenie:
If one operator in a remote operating room can operate 4 ∼ 5 cranes remotely, which are yard cranes for container loading/unloading in a port container terminal, the port loading/unloading efficiency will dramatically be improved through productivity increase, cost reduction, and so on. This study presents a remote crane control system for container loading/unloading yard cranes of port container terminals. First, a wireless web-based video and audio transmission system to transmit the images and the sounds of a craneyard is designed by using 3 web cameras and a microphone. Next, a TCP/IP-based remote crane control system is presented on the basis of the delay performance simulations of TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) for real-time remote control. The simulation results show that TCP is more advantageous for remote crane control on a local network.
Style APA, Harvard, Vancouver, ISO itp.
33

Zúquete, André, i Carlos Frade. "A new location layer for the TCP/IP protocol stack". ACM SIGCOMM Computer Communication Review 42, nr 2 (29.03.2012): 16–27. http://dx.doi.org/10.1145/2185376.2185379.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Kent, S. "Comments on “security problems in the TCP/IP protocol suite”". ACM SIGCOMM Computer Communication Review 19, nr 3 (lipiec 1989): 10–19. http://dx.doi.org/10.1145/74674.74675.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

AL-aswad, Muthanna Mohammad, i KHALIL ALWAJEH. "Performance Evaluation of Storage Area Network(SAN)With internet Small Computer System Interface (iSCSI)For Local System PC". Algerian Journal of Signals and Systems 5, nr 3 (15.09.2020): 167–78. http://dx.doi.org/10.51485/ajss.v5i3.113.

Pełny tekst źródła
Streszczenie:
SCSI is a newly emerging protocol with the goal of implementing the Storage Area Network (SAN) technology over TCP/IP,where enables to access to remote data that in attached storage disks storages - Direct Attached Storage(DAS) over IP-networked. Also it's brings economy and convenience whereas it also raises performance and reliability issues. This paper investigates about possibility , using storage technology of the SANs, and iSCSI-SAN protocol,in local system PC, to improve access to attached storage disks storages in local system, with using iSCSI-SANs as virtual storage, is rather than DAS storage in local system of PC. Explicates after experiment procedure is that improving throughput of iSCSI-SANs was better than attached storage disks storages - DAS in local system . This means is that it can use iSCSI-SANs in local system of PC as attache storage disks storages as DAS , without cost , high performance, and easy control.
Style APA, Harvard, Vancouver, ISO itp.
36

Ayu tiara sunja, Sunja, i Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya". International Journal Cister 1, nr 02 (1.08.2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.

Pełny tekst źródła
Streszczenie:
The Internet is a global network of world computers, large and very broad where every computer is connected to each other from country to country around the world and contains various kinds of information [1]. The internet itself comes from the word interconnection networking which means the connection of many computer networks of various types and types, using communication types such as telephone, satellite, and others. In managing computer network integration using TCP or IP protocols. Local Area Network (LAN) consists of several computers connected in a network. In this network, each computer can access data from other computers. computers that are connected in a LAN can run hardware such as other computer printers, send data to other computer owners or play games together. The number of computers connected to the LAN is relatively small, such as home computers, internet cafes, schools and several other computers that are in one building. In this study, the researcher used a quantitative method approach to analyze the use of information and communication technology in the construction of a LAN network in the SMK Negeri 1 BMR school.
Style APA, Harvard, Vancouver, ISO itp.
37

Zhang, Xiao. "Intranet Web System, a Simple Solution to Companywide Information-on-demand". Proceedings, annual meeting, Electron Microscopy Society of America 54 (11.08.1996): 404–5. http://dx.doi.org/10.1017/s0424820100164489.

Pełny tekst źródła
Streszczenie:
Intranet, a private corporate network that mirrors the internet Web structure, is the new internal communication technology being embraced by more than 50% of large US companies. Within the intranet, computers using Web-server software store and manage documents built on the Web’s hypertext markup language (HTML) format. This emerging technology allows disparate computer systems within companies to “speak” to one another using the Internet’s TCP/IP protocol. A “fire wall” allows internal users Internet access, but denies external intruders intranet access. As industrial microscopists, how can we take advantage of this new technology? This paper is a preliminary summary of our recent progress in building an intranet Web system among GE microscopy labs. Applications and future development are also discussed.The intranet Web system is an inexpensive yet powerful alternative to other forms of internal communication. It can greatly improve communications, unlock hidden information, and transform an organization. The intranet microscopy Web system was built on the existing GE corporate-wide Ethernet link running Internet’s TCP/IP protocol (Fig. 1). Netscape Navigator was selected as the Web browser. Web’s HTML documentation was generated by using Microsoft® Internet Assistant software. Each microscopy lab has its own home page. The microscopy Web system is also an integrated part of GE Plastics analytical technology Web system.
Style APA, Harvard, Vancouver, ISO itp.
38

Masri, Aladdin, i Muhannad Al-Jabi. "Toward IoT fog computing-enabled system energy consumption modeling and optimization by adaptive TCP/IP protocol". PeerJ Computer Science 7 (5.08.2021): e653. http://dx.doi.org/10.7717/peerj-cs.653.

Pełny tekst źródła
Streszczenie:
Nowadays, due to the fast-growing wireless technologies and delay-sensitive applications, Internet of things (IoT) and fog computing will assemble the paradigm Fog of IoT. Since the spread of fog computing, the optimum design of networking and computing resources over the wireless access network would play a vital role in the empower of computing-intensive and delay-sensitive applications under the extent of the energy-limited wireless Fog of IoT. Such applications consume considarable amount of energy when sending and receiving data. Although there many approaches to attain energy efficiency already exist, few of them address the TCP protocol or the MTU size. In this work, we present an effective model to reduce energy consumption. Initially, we measured the consumed energy based on the actual parameters and real traffic for different values of MTU. After that, the work is generalized to estimate the energy consumption for the whole network for different values of its parameters. The experiments were made on different devices and by using different techniques. The results show clearly an inverse proportional relationship between the MTU size and the amount of the consumed energy. The results are promising and can be merged with the existing work to get the optimal solution to reduce the energy consumption in IoT and wireless networks.
Style APA, Harvard, Vancouver, ISO itp.
39

Ji, Jing, Miao Yu, Xin An i Yun He Zhang. "The Study on the Communication of the Double-Robot Polishing System by the C/S Mode". Advanced Materials Research 524-527 (maj 2012): 3778–81. http://dx.doi.org/10.4028/www.scientific.net/amr.524-527.3778.

Pełny tekst źródła
Streszczenie:
This paper compiles the program to control the double- robot polishing system remotely by the interface-socket of the network programming in the VC++6.0 language environment and realizes the application of the dual- robot system network. It adopts TCP/IP protocol as the communication protocol between the serial robots by the C/S mode of dual robot polishing system. The mode of the hand shake is carried out for the polishing experiments between the arm of two serial robots and communication of the binocular camera successfully. The experiment shows that the communication protocol can enforce communication of the computer between the dual-robot. It can achieve the stablity and higher instantaneity. It has met the communication needs of the double- robot.
Style APA, Harvard, Vancouver, ISO itp.
40

Riki, Riki, Aditiya Hermawan i Yusuf Kurnia. "Voice Over Internet Protocol Based Communication Design (VoIP) With 3CXSystemPhone On Android Smartphone". bit-Tech 1, nr 1 (30.08.2018): 1–8. http://dx.doi.org/10.32877/bt.v1i1.2.

Pełny tekst źródła
Streszczenie:
TCP\IP protocol can be connected to various computer data networks in the world. This protocol increasingly exists and is needed so that many parties develop it to vote through this protocol. Voice Over Internet Protocol technology is the answer to that desire. This technology is able to convert analog voice (human voice) into data packets then through public internet data networks and private intranet data packets are passed, so that communication can occur. With VoIP communication costs can be reduced so that it can reduce investment costs and conversations (cost saving) or even up to 100% free. VoIP implementation can be done by designing a wireless VoIP network (cable) using 3CXSystemPhone software as a PBX. In this scientific work the software used is 3CXSystemPhone 11.0, where SIP is a VoIP server which is a freeware software, in its application only requires one PC server and several PC clients (2 for example) that are connected to each other
Style APA, Harvard, Vancouver, ISO itp.
41

Putra, Dwi Prastantio. "ANALISIS KEAMANAN VOICE OVER INTERNET PROTOCOL (VOIP) OVER VIRTUAL PRIVATE NETWORK (VPN)". Jurnal Informatika dan Rekayasa Perangkat Lunak 2, nr 3 (20.10.2021): 324–33. http://dx.doi.org/10.33365/jatika.v2i3.1232.

Pełny tekst źródła
Streszczenie:
This research was conducted on the basis of the influence of security systems that play a role in encrypting data on VoIP communication systems, with the security technology of PPTP VPN computer networks with the system passing data in a virtual private ip or as a tunnel for secure data transmission media. The results obtained from security analysis for the implementation of security methods on PPTP VPNs, then the data to help developers in terms of building a secure VoIP communication system. Basiclly ZRTP uses the Diffie-Hellman key exchange as a key exchange of communication between clients, which is the key for communication between clients using hashes from Diffie-Hellman and is done peer-to-peer through the VOIP RTP package, while the Point-to-Point Tunneling Protocol (PPTP) is a network protocol that allows the secure transmission of data from the remote client to the server by creating a virtual private network (VPN) through a network of data. TCP/IP or UDP is dedicated to encryption and creates RTP tunnel transport on VoIP communication systems. VoIP communication system research is conducted using 2 security methods, namely VoIP VPN PPTP, VoIP ZRTP, with the aim to find out the results of VoIP communication testing using PPTP and ZRTP VPN security methods if an attack occurs during VoIP communication
Style APA, Harvard, Vancouver, ISO itp.
42

Ni, Zhihui, Jiali You i Yang Li. "An ICN-Based On-Path Computing Resource Scheduling Architecture with User Preference Awareness for Computing Network". Electronics 13, nr 5 (29.02.2024): 933. http://dx.doi.org/10.3390/electronics13050933.

Pełny tekst źródła
Streszczenie:
The Computing Network is an emerging network paradigm that aims to realize computing resource scheduling through the intrinsic capabilities of the network. However, existing resource scheduling architectures based on conventional TCP/IP networks for the Computing Network suffer from deficiencies in routing flexibility and a lack of user preference awareness, while Information-Centric Networking (ICN) holds the potential to address these issues. ICN inherently supports dynamic routing in scenarios such as multi-homing and mobility due to its routing mechanism that is based on content names rather than host addresses, and it is further enhanced by the integration with Software-Defined Networking (SDN) technologies, which facilitate convenient network-layer route readdressing, thus offering a conducive environment for flexible routing scheduling. Furthermore, ICN introduces novel routing protocols that, compared with the more rigid protocol designs in conventional TCP/IP networks, offer greater flexibility in field usage. This flexibility allows for the incorporation of customized fields, such as “preference”, enabling the perception of user preferences within the network. Therefore, this paper proposes a novel ICN-based on-path computing resource scheduling architecture named IPCRSA. Within this architecture, an original design for computing resource request packet format is developed based on the IPv6 extension header. Additionally, preference-based computing resource scheduling strategies are incorporated, which employ the technique for order preference by similarity to ideal solution (TOPSIS) combined with the entropy weight method, to comprehensively evaluate computing resource nodes and use a roulette-selection algorithm to accomplish the probability selection of destination nodes. Experimental results indicate that, in comparison to alternative scheduling schemes, IPCRSA exhibits significant advantages in enhancing scheduling flexibility, improving scheduling success rates, and catering to diverse user requirements.
Style APA, Harvard, Vancouver, ISO itp.
43

Park, Jaehyun, i Youngchan Yoon. "An extended TCP/IP protocol for real-time local area networks". Control Engineering Practice 6, nr 1 (styczeń 1998): 111–18. http://dx.doi.org/10.1016/s0967-0661(97)10049-1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Bęben, Andrzej, Wojciech Burakowski i Piotr Pyda. "A comparison of ATM and IP QoS network capabilities for handling LAN traffic with QoS differentiation". Journal of Telecommunications and Information Technology, nr 4 (30.12.2003): 25–31. http://dx.doi.org/10.26636/jtit.2003.4.204.

Pełny tekst źródła
Streszczenie:
Now, a network operator must choose between two packet switched technologies for providing QoS in WAN networks, which are ATM and IP QoS [3, 4, 9]. As ATM has reached the maturity with capabilities for offering a number of different network services (i.e. CBR, VBR, ABR, UBR, GFR), the IP QoS with network services like expedited forwarding, assured forwarding, etc. is still at developing phase but nevertheless is commonly regarded as capable to guarantee in near future similar QoS level as ATM. This paper tries to compare the efficiency of the mentioned technologies (in case of IP QoS network the AQUILA network concept [1, 2] is investigated) for handling traffic generated by LANs with QoS differentiation. This is extremely required since the applications running in LAN differ in QoS requirements and emitted traffic profiles (streaming, elastic). Therefore, a classification process of outgoing LAN traffic into predefined sub-streams should be performed at the entry point to WAN network (edge ATM switch or IP router). Furthermore, particular sub-streams are submitted to adequate WAN network service, available in ATM or IP QoS. The paper presents the experimental results, measured in the test bed, corresponding to QoS level and QoS differentiation provided by ATM and IP QoS core. For this purpose, a set of representative applications currently available to a LAN user was selected demanding from the core different QoS level. They correspond to streaming applications like VoIP with QoS objectives represented mainly by packet delay characteristics and elastic applications controlled by TCP protocol with minimum guaranteed throughput/goodput as target.
Style APA, Harvard, Vancouver, ISO itp.
45

Minhas, Tayyeba, Shawal Khan, Farrukh Arslan, Anum Ali, Aamir Hussain i Jehad Ali. "A Versatile Resilience Packet Ring Protocol Model for Homogeneous Networks". Applied Sciences 13, nr 8 (7.04.2023): 4660. http://dx.doi.org/10.3390/app13084660.

Pełny tekst źródła
Streszczenie:
Optimizing routes and paths improves network performance. Due to the encapsulation and tunneling of the packets, mobile IP-based communication contributes to packet drops or significant delays between the sender and receiver. Packet loss during handoff reduces TCP throughput as well. One solution is to use the IEEE 802.11 Medium Access Control (MAC) protocol and TCP or UDP models to increase routing protocol performance. In the linkage of homogeneous networks, it is challenging to determine route failure. In addition, the 802.11 MAC also uses a link connection. As a result, re-covering the entire route path takes a longer time. Thus, improving wired and wireless mobile node communication and handover is both challenging and critical. To overcome this challenge, we propose to use the Versatile Resilience Packet Ring protocol (VRPR)-based model. In this paper, we propose a novel VRPR-based network model that allows uninterrupted communication in both wired and wireless media. VRPR is used in the network layer to avoid buffer overflow and client mobility. Our new model also identifies the cause of the route failure, whether it is due to client mobility (handover), due to link breakage (channel degradation), or due to buffer overflow. We evaluate our network model based on three performance factors, namely, the delay, packet, and packet loss, and compared it between wired and wireless media. Our Enhanced-VRPR-based network model outperforms the current VRPR wired and wireless network models. We validate our model through OMNet++ simulations.
Style APA, Harvard, Vancouver, ISO itp.
46

O Holubnychyi, Dmitro, i Vasily Kotsyuba. "Applying technologies of monitoring and condition analysis of IP-networks based on the use of the SNMP protocol". Bulletin of Kharkov National Automobile and Highway University, nr 96 (24.05.2022): 14. http://dx.doi.org/10.30977/bul.2219-5548.2022.96.0.14.

Pełny tekst źródła
Streszczenie:
Problem. Monitoring, security, condition analysis and control of telecommunications networks remains the most important part of system and network administration. Monitoring systems controls the network in an automated mode, and complex decisions based on the prepared information of the network monitoring system are made by the network administrator. Goal. The purpose of the work is to analyze the principles of applying technologies, programs and protocols that allow you to manage equipment and maintain reliable operation of the computer network. To consider features of functioning, the systems of monitoring of the network equipment are built on the basis of UDP/TCP architecture on application of the network protocol of control and management of SNMP. Methodology. Analytical methods of studying technologies of principles and approaches to network monitoring and management are used. The structure and components of SNMP are shown, the architecture and scheme of operation of SNMP v3 kernel and the detailed description of its work are resulted. Results. The analysis of modern methods of monitoring and control of network equipment is given, the advantages and disadvantages of the main technologies of monitoring and diagnosing the equipment of IP networks are shown. It is substantiated that the most effective and reliable tool that allows you to perform tasks on the management of IP network devices is the SNMP protocol. Originality. The monitoring system allows you to provide a set of solutions that maintain automatic monitoring of networks implemented on the basis of different technologies (data and speech, video), providing different services and built on equipment from different manufacturers. Practical value. The structure and components of SNMP are shown, the architecture and scheme of operation of SNMP v3 kernel and the detailed description of its work are resulted. Algorithms for practical SNMP configuration in Windows are presented, SNMP agent, trap and security data settings, configuring SNMP on Linux, SNMP settings in CentOS 7 and Debian 10
Style APA, Harvard, Vancouver, ISO itp.
47

Smith, F. Donelson, Félix Hernández Campos, Kevin Jeffay i David Ott. "What TCP/IP protocol headers can tell us about the web". ACM SIGMETRICS Performance Evaluation Review 29, nr 1 (czerwiec 2001): 245–56. http://dx.doi.org/10.1145/384268.378789.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Giuliano, Romeo, Alessandro Vizzarri, Antonino Calderone i Franco Mazzenga. "Communication Transport Protocol Strategies for Rail Applications". Applied Sciences 12, nr 6 (16.03.2022): 3013. http://dx.doi.org/10.3390/app12063013.

Pełny tekst źródła
Streszczenie:
Current technologies for managing rail traffic such as the Global System for Mobile communications for Railway (GSM-R) will be no longer be available within the upcoming years. The European Shift2Rail Joint Undertaking (S2R-JU) proposed the Adaptable Communication System (ACS) to overcome this problem. In this work, we model the ACS by abstracting it at the Internet Protocol (IP) level, using tunnels for datagrams’ transmission as a communication bearer is available along the rail. Then, to evaluate its performance, an ACS emulator has been implemented. The core part of it is a Tunnel Manager which can establish pseudo-virtual circuits through multi-bearer tunnels, forcing datagrams on a service-basis to follow specific paths between gateways (i.e., from on-board to a train to the network-side rail control center and vice versa). The Tunnel Manager can properly select a given tunnel/bearer for sending messages (and duplicating them on redundant paths) of critical rail applications for train traffic management, relying on tunnels based on either connection-oriented protocol (i.e., the Transport Control Protocol, TCP), connectionless protocol (i.e., the User Datagram Protocol, UDP) or a mix of them. In this paper, we investigate the best solutions in terms of transport protocols for implementing tunnels through the bearers. Results are based on two main use cases: i. the position report/movement authority messages for the European Rail Traffic Management System (ERMTS) and ii. the critical file transmission, considering either TCP or UDP as tunnel transport protocol. For the first rail application, one UDP bearer can be selected only if the end-to-end channel delay is lower than 100 ms and the experienced packet loss is lower than 4% in the whole crossed network. Two UDP bearers, one TCP bearer or two mixed UDP/TCP bearers should be selected in case the channel delay is greater than 300 ms and the experienced packet loss is greater than 15%. Considering the critical file transfer in the rail scenario, TCP should be selected with two bearers to have a throughput greater than 50 Mbit/s even for a packet loss of 1%.
Style APA, Harvard, Vancouver, ISO itp.
49

Kumar, Vipin. "Consumers Attitude towards Various Internet Service Providers". International Journal of Advance Research and Innovation 3, nr 1 (2015): 324–29. http://dx.doi.org/10.51976/ijari.311550.

Pełny tekst źródła
Streszczenie:
The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. The objective of the study is to analyze the consumers' attitude towards various internet service providers. The study is based on the primary data i.e. collected through field survey by well–structured questionnaire. For the study, 100 respondents have been taken from the Sirsa district. The data was analyzed by using various statistical techniques and tools such as Percentages, Frequency and Mean. The present article discusses the findings achieved through the study.
Style APA, Harvard, Vancouver, ISO itp.
50

Abdullah, Nor Paezah, Murizah Kassim, Sayang Mohd Deni i Yusnani Mohd Yussoff. "Descriptive analysis of wide area network flow control internet traffic on Metro-E 100 Mbps campus network". Bulletin of Electrical Engineering and Informatics 13, nr 4 (1.08.2024): 2738–49. http://dx.doi.org/10.11591/eei.v13i4.7044.

Pełny tekst źródła
Streszczenie:
QoS in computer networking is the capability to provide better service to network traffic over various technologies such as ethernet and IP networks. This paper presents a descriptive analysis of WAN flow control and internet traffic on a Metro-E campus network. Issues on network congestion and delay in network QoS where internet traffic is gradually increasing, resulting in bursts of network capacity that affect network QoS. The method implies 12 months data collection and analysis on protocol, bytes and packets inbound and correlation between parameters on the Metro-E 100 Mbps campus network. The result presents heavy-tailed distributions on an inbound packet kurtosis value of 347 and an outbound packet kurtosis value of 780. Bytes outbound and inbound are skewed at 122 and right at 17 respectively. The average amount of data inbound and outbound is 458.5 MB and 34.8 MB. Protocol 6 TCP presents the highest amount of -traffic and a weak positive correlation at 0.104 exists between the inbound and outbound packets and bytes on the network. The correlation coefficient's 95% confidence interval ranges between 0.096 and 0.111. This research is significant in the future deployment of traffic scheduling, policing, and shaping algorithms for QoS bandwidth management on the WAN Metro-E campus network.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii