Academic literature on the topic 'Computer network protocols – Standards – Research'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer network protocols – Standards – Research.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer network protocols – Standards – Research"

1

Lundar, Johan Andre, Tor-Morten Grønli, and Gheorghita Ghinea. "Performance Evaluation of a Modern Web Architecture." International Journal of Information Technology and Web Engineering 8, no. 1 (January 2013): 36–50. http://dx.doi.org/10.4018/jitwe.2013010103.

Full text
Abstract:
The past decade has marked a shift in Web development as users have become accustomed to Web applications with dynamic content and enhanced user experience. Different languages and technologies have been utilised to make way for such applications, gradually stretching existing standards and protocols to its limits. The field of Web development has been characterized by a lack of coherent architectural concepts, partly due to the absences of standard protocols that support modern communication styles. As a result of this, systems specifically designed for real-time data delivery have been required and realised with proprietary technology in the industry, consequently violating established software engineering principles such as modularity, consistency and simplicity. This paper explores how current Web technologies support the requirements of modern Web applications. A prototype application was developed in the last phase to demonstrate the efficacy of combining the WebSocket protocol and API together with the use of JavaScript as exclusive programming language at the client and server. Based on the findings of the research carried out it appears that the use of protocols and standards such as WebSocket, WebSocket API and Server-Sent Events caters for higher network performance, increased flexibility and standards compliance.
APA, Harvard, Vancouver, ISO, and other styles
2

Garg, Puneet, Ashutosh Dixit, Preeti Sethi, and Plácido Rogerio Pinheiro. "Impact of Node Density on the QoS Parameters of Routing Protocols in Opportunistic Networks for Smart Spaces." Mobile Information Systems 2020 (August 1, 2020): 1–18. http://dx.doi.org/10.1155/2020/8868842.

Full text
Abstract:
The need and importance of Smart Spaces have been potentially realized by the researchers due to its applicability in the current lifestyle. Opportunistic network, a successor of mobile ad hoc networks and a budding technology of network, is a best-suited technology for implementing Smart Spaces due to its wide range of applications in real-life scenarios ranging from building smart cities to interplanetary communication. There are numerous routing protocols which are available in opportunistic network, each having their pros and cons; however, no research till the time of listing has been done which can quantitatively demonstrate the maximum performance of these protocols and standardize the comparison of opportunistic routing protocols which has been a major cause of ambiguous performance evaluation studies. The work here presents a categorical view of the opportunistic routing protocol family and thereby compares and contrasts the various simulators suited for their simulation. Thereafter, the most popular protocols (selecting at least one protocol from each category) are compared based on node density on as many as 8 standard performance metrics using ONE simulator to observe their scalability, realism, and comparability. The work concludes by presenting the merits and demerits of each of the protocols discussed as well as specifying the best routing protocol among all the available protocols for Smart Spaces with maximum output. It is believed that the results achieved by the implemented methodology will help future researchers to choose appropriate routing protocol to delve into their research under different scenarios.
APA, Harvard, Vancouver, ISO, and other styles
3

Yun, Jung Mee, and Dae Hwan Kim. "A Study on the Convergence Adaptor Using Plug Computer." Advanced Materials Research 462 (February 2012): 348–52. http://dx.doi.org/10.4028/www.scientific.net/amr.462.348.

Full text
Abstract:
Recent studies have shown that the Internet-related energy consumption represents a significant, and increasing, part of the overall energy consumption of our society. Therefore, it is extremely important to look for energy-efficient Internet applications and protocols. For EPON, research on the development of protocols for higher energy efficiency at the PHY/MAC layers and the enactment of standards, and the improvement of energy efficiency of EPON devices is being conducted, while for networking equipment such as routers and switches and IDCs, research on saving the energy consumed by devices and the management of energy efficiency using power monitoring, cooling devices and metering technologies is being conducted. Against this backdrop, this study is aimed to develop methodology for the improvement of network energy efficiency in existing home/ small and medium-sized office network environments and to develop, test and evaluate an energy saving prototype for Convergence Adaptor
APA, Harvard, Vancouver, ISO, and other styles
4

Arokkiam, Jerome A., Pedro Alvarez, Xiuchao Wu, Kenneth N. Brown, Cormac J. Sreenan, Marco Ruffini, Nicola Marchetti, Linda Doyle, and David Payne. "Design, implementation, and evaluation of an XG-PON module for the ns-3 network simulator." SIMULATION 93, no. 5 (January 26, 2017): 409–26. http://dx.doi.org/10.1177/0037549716682093.

Full text
Abstract:
10-gigabit-capable Passive Optical Network (XG-PON), one of the latest standards of optical access networks, is regarded as one of the key technologies for future Internet access networks. This paper presents the design and evaluation of our XG-PON module for the ns-3 network simulator. This module is designed and implemented with the aim to provide a standards-compliant, configurable, and extensible module that can simulate XG-PON with reasonable speed and support a wide range of research topics. These include analyzing and improving the performance of XG-PON, studying the interactions between XG-PON and the upper-layer protocols, and investigating its integration with various wireless networks. In this paper, we discuss its design principles, describe the implementation details, and present an extensive evaluation on both functionality and performance.
APA, Harvard, Vancouver, ISO, and other styles
5

Tightiz, Lilia, and Hyosik Yang. "A Comprehensive Review on IoT Protocols’ Features in Smart Grid Communication." Energies 13, no. 11 (June 1, 2020): 2762. http://dx.doi.org/10.3390/en13112762.

Full text
Abstract:
Since the smart grid deals with a large mass of data and critical missions, it requires ubiquitous, reliable, and real-time communication. The Internet of Things (IoT) technology, which has the potential of connecting all objects over the globe through the Internet, excels in providing robust information transmission infrastructure in the smart grid. There are a multitude of possible protocols, standards, and configurations for communication in the smart grid. A commonly applied communication standard IEC 61850 recommends the use of Manufacturing Message Specification (MMS) protocol for communication in Local Area Network (LAN) and eXtensible Messaging and Presence Protocol (XMPP) in Wide Area Network (WAN). However, a plethora of research on this topic compares the behavior of other IoT protocols and standard recommendations in the smart grid. On the other hand, the sky-rocketing penetration of Renewable Energy Sources (RES), especially in the form of micro grid, transformed the central control structure of the smart grid into a distributed style called Multi-Agent Systems (MAS). This new approach defined new communication requirements and more particular IoT protocol characteristic requirements. However, a limited number of the existing studies have considered IoT protocol characteristic requirements of the smart grid and its new control structures. In this paper, we initially investigate the communication requirements of the smart grid and introduce all IoT protocols and their specifications. We analyze IoT protocol characteristics and performances in the smart grid through literature review based on the smart grid communication requirements. In this approach, we highlight weak points of these practices making them fail to acquire the holistic guidelines in utilizing proper IoT protocol that can meet the smart grid environment interaction requirements. Using the existing facilities, the public Internet, we follow the arrangement of cost-effective high penetration communication requirements for new structures of the smart grid, i.e., the MAS and multi-micro grid. In this case, we consider IoT protocol Quality of Services (QoS) requirements, especially in the case of security and reliability, to satisfy stakeholders, namely utilities and prosumers. Addressing effective elements in applying IoT in the smart grid’s future trends is another contribution to this paper.
APA, Harvard, Vancouver, ISO, and other styles
6

Velterop, Jan, and Erik Schultes. "An Academic Publishers’ GO FAIR Implementation Network (APIN)." Information Services & Use 40, no. 4 (January 6, 2021): 333–41. http://dx.doi.org/10.3233/isu-200102.

Full text
Abstract:
Presented here is a proposal for the academic publishing industry to get actively involved in the formulation of protocols and standards that make published scientific research material machine-readable in order to facilitate data to be findable, accessible, interoperable, and re-usable (FAIR). Given the importance of traditional journal publications in scholarly communication worldwide, active involvement of academic publishers in advancing the more routine creation and reuse of FAIR data is highly desired.
APA, Harvard, Vancouver, ISO, and other styles
7

Permatasari, Ulfa Septilia, and Indrastanti Ratna Widiasari. "Analisis Routing Protokol Optimized Link State Routing (OLSR) Pada Raspberry Pi." AITI 16, no. 2 (June 17, 2020): 151–64. http://dx.doi.org/10.24246/aiti.v16i2.151-164.

Full text
Abstract:
Optimized Link State Routing (OLSR)is one of the two standard for mesh networks. OLSR is a link state routing protocol, which use hallo message and topology control (TC) to determine the link state information across the mobile ad-hoc network. OLSR is widely used in the wireless mesh network. Raspberry Pi is a mini computer which can be used as a node router to replace the function of a router in a wireless mesh network. In this research, Raspberry Pi is used as a router nodes to determine the performance of routing protocol OLSR. The parameters used to measure its performance is self-configure time, self-healing and bandwidth usage. The test results showed that the use of routing protocols OLSR on the Raspberry Pi in a wireless mesh network proved able to repair itself if there is a problem on the network since it has ability to self-configure and self-healing.
APA, Harvard, Vancouver, ISO, and other styles
8

Rezaei, Fahimeh, Michael Hempel, and Hamid Sharif. "A Survey of Recent Trends in Wireless Communication Standards, Routing Protocols, and Energy Harvesting Techniques in E-Health Applications." International Journal of E-Health and Medical Communications 6, no. 1 (January 2015): 1–21. http://dx.doi.org/10.4018/ijehmc.2015010101.

Full text
Abstract:
One of the most rapidly growing technology areas is the advances in sensing, networking, and miniaturization in medical domain, which enables innovative new applications. This is especially apparent in e-Health and telemedicine. There is an enormous demand for innovation in wireless sensor networking, body area networks, network security and routing, and many other areas, attracting the attention of numerous researchers. With all the advances it can be challenging to identify trends and areas with opportunities for research engagement. In this paper, the authors therefore review the state-of-the-art in wireless communication used in telemedicine and e-Health applications – ranging from the Wide Area Networks to Body Area Networks – and discuss the studies and literature that employ these technologies for e-Health applications. Moreover, recent routing protocols and techniques that are used for Body Area Networks are investigated. One key challenge for e-Health applications, particularly for mobile or patient-worn devices, is energy consumption and supply. One possible solution is found in energy harvesting, and our survey encompasses current challenges and accomplishments in its application to e-Health and discuss various promising techniques.
APA, Harvard, Vancouver, ISO, and other styles
9

G. Hamid, Harth, and Zainab T. Alisa. "A survey on IoT application layer protocols." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (March 10, 2021): 1663. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1663-1672.

Full text
Abstract:
<span>The constant evolution in internet technology has made. The internet of things (IoT) to be the center of research fields in computer engineering. This review paper discusses the choice of an application layer protocol in an IoT system integration so first, the paper briefly defines the potential protocols. After that, it opens up a comparison between these protocols according to how they manage their overhead and messages which affects traffic management and thus starts the discussion. The main contribution of this work is the simplification of comparison between session layer protocols in the benefit of IoT applications exclusively. IoT system Standards and platforms are being improved constantly. IoT enables application devices to connect and coordinate their tacks, such applications like healthcare, smart home, and industrial automation. Several protocols have been discussed to provide effective communication for resource-limited devices. However, their traffic management is still a field for researches, to find the optimal protocol choice for different situations. The review collects the results of other works that experimentally compared application layer protocols in the IoT environment and presents the graphical and tabular compression. Finally, the conclusion summarize the choice in different applications.</span>
APA, Harvard, Vancouver, ISO, and other styles
10

Asemi, Asefeh, and Fezzeh Ebrahimi. "A Thematic Analysis of the Articles on the Internet of Things in the Web of Science With HAC Approach." International Journal of Distributed Systems and Technologies 11, no. 2 (April 2020): 1–17. http://dx.doi.org/10.4018/ijdst.2020040101.

Full text
Abstract:
This research was carried out using the bibliometric method to thematically analyze the articles on IoT in the Web of Science with Hierarchical Agglomerative Clustering approach. First, the descriptors of the related articles published from 2002 to 2016 were extracted from WoS, by conducting a keyword search using the “Internet of Things” keyword. Data analysis and clustering were carried out in SPSS, UCINET, and PreMap. The analysis results revealed that the scientific literature published on IoT during the period had grown exponentially, with an approximately 48% growth rate in the last two years of the study period (i.e. 2015 and 2016). After analyzing the themes of the documents, the resulting concepts were classified into twelve clusters. The twelve main clusters included: Privacy and Security, Authentication and Identification, Computing, Standards and Protocols, IoT as a component, Big Data, Architecture, Applied New Techniques in IoT, Application, Connection and Communication Tools, Wireless Network Protocols, and Wireless Sensor Networks.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer network protocols – Standards – Research"

1

Dibley, James. "An investigation of the XMOS XSl architecture as a platform for development of audio control standards." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011789.

Full text
Abstract:
This thesis investigates the feasiblity of using a new microcontroller architecture, the XMOS XS1, in the research and development of control standards for audio distribution networks. This investigation is conducted in the context of an emerging audio distribution network standard, Ethernet Audio/Video Bridging (`Ethernet AVB'), and an emerging audio control standard, AES-64. The thesis describes these emerging standards, the XMOS XS1 architecture (including its associated programming language, XC), and the open-source implementation of an Ethernet AVB streaming audio device based on the XMOS XS1 architecture. It is shown how the XMOS XS1 architecture and its associated features, focusing on the XC language's mechanisms for concurrency, event-driven programming, and integration of C software modules, enable a powerful implementation of the AES-64 control standard. Feasibility is demonstrated by the implementation of an AES-64 protocol stack and its integration into an XMOS XS1-based Ethernet AVB streaming audio device, providing control of Ethernet AVB features and audio hardware, as well as implementations of advanced AES-64 control mechanisms. It is demonstrated that the XMOS XS1 architecture is a compelling platform for the development of audio control standards, and has enabled the implementation of AES-64 connection management and control over standards-compliant Ethernet AVB streaming audio devices where no such implementation previously existed. The research additionally describes a linear design method for applications based on the XMOS XS1 architecture, and provides a baseline implementation reference for the AES-64 control standard where none previously existed.
APA, Harvard, Vancouver, ISO, and other styles
2

Kheirkhah, Sabetghadam Morteza. "MMPTCP : a novel transport protocol for data centre networks." Thesis, University of Sussex, 2016. http://sro.sussex.ac.uk/id/eprint/61781/.

Full text
Abstract:
Modern data centres provide large aggregate capacity in the backbone of networks so that servers can theoretically communicate with each other at their maximum rates. However, the Transport Control Protocol (TCP) cannot efficiently use this large capacity even if Equal-Cost Multi-Path (ECMP) routing is enabled to exploit the existence of parallel paths. MultiPath TCP (MPTCP) can effectively use the network resources of such topologies by performing fast distributed load balancing. MPTCP is an appealing technique for data centres that are very dynamic in nature. However, it is ill-suited for handling short flows since it increases their flow completion time. To mitigate these problems, we propose Maximum MultiPath TCP (MMPTCP), a novel transport protocol for modern data centres. Unlike MPTCP, it provides high performance for all network flows. It also decreases the bursty nature of data centres, which is essentially rooted in traffic patterns of short flows. MMPTCP achieves these nice features by randomising a flow's packets via all parallel paths to a destination during the initial phase of data transmission until a certain amount of data is delivered. It then switches to MPTCP with several subflows in which data transmission is governed by MPTCP congestion control. In this way, short flows are delivered very fast via the initial phase only, and long flows are delivered by MPTCP with several subflows. We evaluate MMPTCP in a FatTree topology under various network conditions. We found that MMPTCP decreases the loss rate of all the links throughout the network and helps competing flows to achieve a better performance. Unlike MPTCP with a fixed number of subflows, MMPTCP offers high burst tolerance and low-latency for short flows while it maintains high overall network utilisation. MMPTCP is incrementally deployable in existing data centres because it does not require any modification to the network and application layers.
APA, Harvard, Vancouver, ISO, and other styles
3

Naicken, Stephen Murugapa. "Trusted content-based publish/subscribe trees." Thesis, University of Sussex, 2012. http://sro.sussex.ac.uk/id/eprint/38598/.

Full text
Abstract:
Publish/Subscribe systems hold strong assumptions of the expected behaviour of clients and routers, as it is assumed they all abide by the matching and routing protocols. Assumptions of implicit trust between the components of the publish/subscribe infrastructure are acceptable where the underlying event distribution service is under the control of a single or multiple co-operating administrative entities and contracts between clients and these authorities exist, however there are application contexts where these presumptions do not hold. In such environments, such as ad hoc networks, there is the possibility of selfish and malicious behaviour that can lead to disruption of the routing and matching algorithms. The most commonly researched approach to security in publish/subscribe systems is role-based access control (RBAC). RBAC is suitable for ensuring confidentiality, but due to the assumption of strong identities associated with well defined roles and the absence of monitoring systems to allow for adaptable policies in response to the changing behaviour of clients, it is not appropriate for environments where: identities can not be assigned to roles in the absence of a trusted administrative entity; long-lived identities of entities do not exist; and where the threat model consists of highly adaptable malicious and selfish entities. Motivated by recent work in the application of trust and reputation to Peer-to-Peer networks, where past behaviour is used to generate trust opinions that inform future transactions, we propose an approach where the publish/subscribe infrastructure is constructed and re-configured with respect to the trust preferences of clients and routers. In this thesis, we show how Publish/Subscribe trees (PSTs) can be constructed with respect to the trust preferences of publishers and subscribers, and the overhead costs of event dissemination. Using social welfare theory, it is shown that individual trust preferences over clients and routers, which are informed by a variety of trust sources, can be aggregated to give a social preference over the set of feasible PSTs. By combining this and the existing work on PST overheads, the Maximum Trust PST with Overhead Budget problem is defined and is shown to be in NP-complete. An exhaustive search algorithm is proposed that is shown to be suitable only for very small problem sizes. To improve scalability, a faster tabu search algorithm is presented, which is shown to scale to larger problem instances and gives good approximations of the optimal solutions. The research contributions of this work are: the use of social welfare theory to provide a mechanism to establish the trustworthiness of PSTs; the finding that individual trust is not interpersonal comparable as is considered to be the case in much of the trust literature; the Maximum Trust PST with Overhead Budget problem; and algorithms to solve this problem.
APA, Harvard, Vancouver, ISO, and other styles
4

Kant, Tanya. "Making it personal : web users and algorithmic personalisation." Thesis, University of Sussex, 2016. http://sro.sussex.ac.uk/id/eprint/65082/.

Full text
Abstract:
This thesis investigates how web users negotiate and engage with contemporary algorithmic personalisation practices; that is, practices which seek to infer (via data tracking mechanisms and other algorithmic means) a user's habits, preferences or identity categorisations in order to ‘make personal' some component of that user's web experience. Drawing on thirty-six semi-structured interviews, I employ a qualitative methodology that seeks to bridge the gap between critical theorisations of algorithmic personalisation and the negotiations of web users themselves who encounter algorithmic personalisation in everyday life. To do this I focus on three sites of investigation. I first examine privacy tool Ghostery and the ways in which Ghostery users' negotiate their positions as data-tracked subjects, especially in relation to privacy, knowledge and their sense of self. I then investigate Facebook's autoposting apps as examples of algorithmic personalisation that act on the user's behalf, and draw on the accounts of Facebook app users to explore themes such as identity performance, autonomous control and algorithmic governance. Finally I examine users' engagement with the ‘predictive powers' (Google Now, 2014) of the personalisation app Google Now, specifically in regards to notions of user trust, expectation and speculation. My critical enquiries produced a number of themes that tie this thesis together. Central were: the epistemic uncertainties that emerged as trust and anxiety in participant responses; the implications for a performative understanding of selfhood when algorithmic personalisation intervenes in user self-articulation; the (asymmetrical) data-for-services exchange which web users must negotiate with commercial data trackers; and the struggle for autonomy between user and system that algorithmic personalisation creates. The thesis also argues that algorithmic personalisation demands that web users' identities be constituted as both a stable and fixable ‘single identity', but also as recursively reworkable, dividualised and endlessly expressable entities.
APA, Harvard, Vancouver, ISO, and other styles
5

Cheong, Chi Po. "Participant Domain Name Token Profile for security enhancements supporting service oriented architecture." Thesis, University of Sussex, 2014. http://sro.sussex.ac.uk/id/eprint/49364/.

Full text
Abstract:
This research proposes a new secure token profile for improving the existing Web Services security standards. It provides a new authentication mechanism. This additional level of security is important for the Service-Oriented Architecture (SOA), which is an architectural style that uses a set of principles and design rules to shape interacting applications and maintain interoperability. Currently, the market push is towards SOA, which provides several advantages, for instance: integration with heterogeneous systems, services reuse, standardization of data exchange, etc. Web Services is one of the technologies to implement SOA and it can be implemented using Simple Object Access Protocol (SOAP). A SOAP-based Web Service relies on XML for its message format and common application layer protocols for message negotiation and transmission. However, it is a security challenge when a message is transmitted over the network, especially on the Internet. The Organization for Advancement of Structured Information Standards (OASIS) announced a set of Web Services Security standards that focus on two major areas. “Who” can use the Web Service and “What” are the permissions. However, the location or domain of the message sender is not authenticated. Therefore, a new secure token profile called: Participant Domain Name Token Profile (PDNT) is created to tackle this issue. The PDNT provides a new security feature, which the existing token profiles do not address. Location-based authentication is achieved if adopting the PDNT when using Web Services. In the performance evaluation, PDNT is demonstrated to be significantly faster than other secure token profiles. The processing overhead of using the PDNT with other secure token profiles is very small given the additional security provided. Therefore all the participants can acquire the benefits of increased security and performance at low cost.
APA, Harvard, Vancouver, ISO, and other styles
6

Tsietsi, Mosiuoa Jeremia. "Prototyping a peer-to-peer session initiation protocol user agent." Thesis, Rhodes University, 2008. http://hdl.handle.net/10962/d1006603.

Full text
Abstract:
The Session Initiation Protocol (SIP) has in recent years become a popular protocol for the exchange of text, voice and video over IP networks. This thesis proposes the use of a class of structured peer to peer protocols - commonly known as Distributed Hash Tables (DHTs) - to provide a SIP overlay with services such as end-point location management and message relay, in the absence of traditional, centralised resources such as SIP proxies and registrars. A peer-to-peer layer named OverCord, which allows the interaction with any specific DHT protocol via the use of appropriate plug-ins, was designed, implemented and tested. This layer was then incorporated into a SIP user agent distributed by NIST (National Institute of Standards and Technology, USA). The modified user agent is capable of reliably establishing text, audio and video communication with similarly modified agents (peers) as well as conventional, centralized SIP overlays.
APA, Harvard, Vancouver, ISO, and other styles
7

McLean, Angus L. M. Thom III. "Real-time distributed simulation analysis : an application of temporal database and simulation systems research." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/9124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tsai, Shang-Yuan. "Device profiling analysis in Device-Aware Network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FTsai.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, December 2004.
Thesis advisor(s): Singh Gurminder, John Gibson. Includes bibliographical references (p. 65-66). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
9

Foulkes, Philip James. "An investigation into the control of audio streaming across networks having diverse quality of service mechanisms." Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1004865.

Full text
Abstract:
The transmission of realtime audio data across digital networks is subject to strict quality of service requirements. These networks need to be able to guarantee network resources (e.g., bandwidth), ensure timely and deterministic data delivery, and provide time synchronisation mechanisms to ensure successful transmission of this data. Two open standards-based networking technologies, namely IEEE 1394 and the recently standardised Ethernet AVB, provide distinct methods for achieving these goals. Audio devices that are compatible with IEEE 1394 networks exist, and audio devices that are compatible with Ethernet AVB networks are starting to come onto the market. There is a need for mechanisms to provide compatibility between the audio devices that reside on these disparate networks such that existing IEEE 1394 audio devices are able to communicate with Ethernet AVB audio devices, and vice versa. The audio devices that reside on these networks may be remotely controlled by a diverse set of incompatible command and control protocols. It is desirable to have a common network-neutral method of control over the various parameters of the devices that reside on these networks. As part of this study, two Ethernet AVB systems were developed. One system acts as an Ethernet AVB audio endpoint device and another system acts as an audio gateway between IEEE 1394 and Ethernet AVB networks. These systems, along with existing IEEE 1394 audio devices, were used to demonstrate the ability to transfer audio data between the networking technologies. Each of the devices is remotely controllable via a network neutral command and control protocol, XFN. The IEEE 1394 and Ethernet AVB devices are used to demonstrate the use of the XFN protocol to allow for network neutral connection management to take place between IEEE 1394 and Ethernet AVB networks. User control over these diverse devices is achieved via the use of a graphical patchbay application, which aims to provide a consistent user interface to a diverse range of devices.
APA, Harvard, Vancouver, ISO, and other styles
10

Mascarenhas, da Veiga Alves Manoel Eduardo. "Characterisation of end-to-end performance for web-based file server respositories." Title page, contents and abstract only, 2001. http://web4.library.adelaide.edu.au/theses/09ENS/09ensm395.pdf.

Full text
Abstract:
Bibliography: leaves 128-135. Investigates the behaviour of TCP bulk file transfer application sessions in a broadband access environment. Introduces some concepts for evaluating network behaviour: a path instability parameter for analyzing different TCP connections; a minimum RTT delay and a minimum typical path for estimating path characteristics between a client and application servers.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer network protocols – Standards – Research"

1

Moen, William E. The Government Information Locator Service (GILS): Expanding research and development on the ANSI/NISO Z39.50 information retrieval standard : final report of the cooperative research study between the School of Information Studies, Syracuse University, and the United States Geological Survey. Bethesda, MD: NISO Press, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Naik, Dilip C. Internet standards and protocols. Redmond, Wash: Microsoft Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Black, Uyless. Network management standards: The OSI, SNMP, andCMOL protocols. New York: McGraw-Hill, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Network management standards: The OSI, SNMP, and CMOL protocols. New York: McGraw-Hill, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Loshin, Peter. Essential Ethernet standards: RFCs and protocols made practical. New York: John Wiley & Sons, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Black, Uyless. Physical layer interfaces and protocols. 2nd ed. Los Alamitos, Calif: IEEE Computer Society Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Black, Uyless D. Physical layer interfaces and protocols. 2nd ed. Los Alamitos, Calif: IEEE Computer Society Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Physical level interfaces and protocols. Washington, D.C: Computer Society Press, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Spohn, Darren L. Data network design. New York: McGraw-Hill, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tina, Brown, and Grau Scott, eds. Data network design. 3rd ed. New York: McGraw-Hill, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer network protocols – Standards – Research"

1

Uhlig, Ronald P. "Message Handling System Standards and Office Applications." In Computer Network Architectures and Protocols, 399–414. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kleinschmidt, João Henrique, and Walter Cunha Borelli. "Enabling Technologies for Pervasive Computing." In Human Computer Interaction, 1037–43. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-87828-991-9.ch064.

Full text
Abstract:
Bluetooth (Bluetooth SIG, 2004) and ZigBee (ZigBee Alliance, 2004) are short-range radio technologies designed for wireless personal area networks (WPANs), where the devices must have low power consumption and require little infrastructure to operate, or none at all. These devices will enable many applications of mobile and pervasive computing. Bluetooth is the IEEE 802.15.1 (2002) standard and focuses on cable replacement for consumer devices and voice applications for medium data rate networks. ZigBee is the IEEE 802.15.4 (2003) standard for low data rate networks for sensors and control devices. The IEEE defines only the physical (PHY) and medium access control (MAC) layers of the standards (Baker, 2005). Both standards have alliances formed by different companies that develop the specifications for the other layers, such as network, link, security, and application. Although designed for different applications, there exists some overlap among these technologies, which are both competitive and complementary. This article makes a comparison of the two standards, addressing the differences, similarities, and coexistence issues. Some research challenges are described, such as quality of service, security, energy-saving methods and protocols for network formation, routing, and scheduling.
APA, Harvard, Vancouver, ISO, and other styles
3

Clayton, John F. "Education, the Internet, and the World Wide Web." In Encyclopedia of Human Computer Interaction, 175–78. IGI Global, 2006. http://dx.doi.org/10.4018/978-1-59140-562-7.ch028.

Full text
Abstract:
The development of the Internet has a relatively brief and well-documented history (Cerf, 2001; Griffiths, 2001; Leiner et al., 2000; Tyson, 2002). The initial concept was first mooted in the early 1960s. American computer specialists visualized the creation of a globally interconnected set of computers through which everyone quickly could access data and programs from any node, or place, in the world. In the early 1970s, a research project initiated by the United States Department of Defense investigated techniques and technologies to interlink packet networks of various kinds. This was called the Internetting project, and the system of connected networks that emerged from the project was known as the Internet. The initial networks created were purpose-built (i.e., they were intended for and largely restricted to closed specialist communities of research scholars). However, other scholars, other government departments, and the commercial sector realized the system of protocols developed during this research (Transmission Control Protocol [TCP] and Internet Protocol [IP], collectively known as the TCP/IP Protocol Suite) had the potential to revolutionize data and program sharing in all parts of the community. A flurry of activity, beginning with the National Science Foundation (NSF) network NSFNET in 1986, over the last two decades of the 20th century created the Internet as we know it today. In essence, the Internet is a collection of computers joined together with cables and connectors following standard communication protocols.
APA, Harvard, Vancouver, ISO, and other styles
4

Khan, Bilal Muhammad, and Rabia Bilal. "Cross-Layer Cooperative Protocol for Industrial Wireless Sensor Network." In Handbook of Research on Recent Developments in Intelligent Communication Application, 218–41. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1785-6.ch008.

Full text
Abstract:
Robustness and reliability are two essential network parameters to be given priority in Industrial Wireless Sensor Network. But at the same time it is difficult to achieve gain in these performance metrics. Since in industries these networks are used for monitoring, control and automation processes, therefore, it also requires robust communication with minimum delay. Considering the need of high QoS in Industrial WSN, protocols and standards were developed to fulfil the requirement of reliable data communication in harsh environment. In year 2007, HART community designed a Wireless HART standard for efficient industrial communication. This standard gain high reputation soon after its implementation and still being used as a universal solution for industries. In 2009, another standard ISA100.11a was developed, it also gives promised results but fails to eliminate WHART. Both these standards are still competing in industry and the results of these standards are more reliable in comparison to other wireless industrial protocols that exists.
APA, Harvard, Vancouver, ISO, and other styles
5

Saleem, Yasir, and Farrukh Salim. "Transport Layer for Cognitive Radio Sensor Networks." In Standards and Standardization, 361–86. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8111-8.ch018.

Full text
Abstract:
The transport layer is responsible for reliable and energy-efficient delivery of packets from source to destination. Since Cognitive Radio Sensor Network (CRSN) is an emerging technology, there is a need to develop efficient transport layer protocols for it. Therefore, the main goal of this chapter is to provide design guidelines and highlight design issues and challenges of transport protocols for cognitive radio sensor networks. In this chapter, the authors provide a foundation for development of new transport protocols for cognitive radio sensor networks by presenting characteristics and major existing schemes of traditional transport protocols. Additionally, they provide design guidelines and challenges for the development of transport protocols for cognitive radio sensor networks including a guideline on simulation ground for transport protocols. In summary, this chapter is an initial step towards new directions of research and development of transport protocols for cognitive radio sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
6

G., Devika, Ramesh D., and Asha Gowda Karegowda. "A Study on Energy-Efficient Wireless Sensor Network Protocols." In Advances in Computer and Electrical Engineering, 158–227. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1626-3.ch007.

Full text
Abstract:
Many original ideologies are being applied as solutions to the problems of wireless sensor networks with the rigorous experimentation and advancement in technology and research. This chapter reviews various energy-efficient routing algorithms, classifying them based on methodology applied. The classification is based on design approach used to solve the basic problem arising in construction of transmission path between source and base station (BS) with minimum energy consumption. The pros and cons of routing algorithms for WSN are analyzed. The parameters to be considered in evaluation of all routing protocols are summarized.
APA, Harvard, Vancouver, ISO, and other styles
7

Zelewski, Stephan, Adina Silvia Bruns, and Martin Kowalski. "Ontologies for Guaranteeing the Interoperability in e-Business." In Handbook of Research on E-Business Standards and Protocols, 154–84. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0146-8.ch008.

Full text
Abstract:
For e-business, the computer-based processing of value-creation, especially for knowledge-intensive business processes, plays a prominent role with the help of modern information and communication techniques. At least since the further development of the classical Internet for the Semantic Web, the content-based knowledge processing and knowledge transfer have gained more importance. In this chapter it is shown that ontologies represent an auspicious instrument to ensure the interoperability of information and communication systems that have to work together on the work-sharing development of knowledge-intensive business processes. Ontologies become important when agents with heterogeneous knowledge backgrounds co-operate on such business processes. Firstly, the complex and often ill-considered use of the definition of ontology will be discussed critically and its meaning specified. Thereupon it will be shown (with the help of two application areas) how ontologies can be used effectively to support knowledge-intensive business processes in e-business. On the one hand, the chapter is concerned with the management of knowledge of competences, which agents have to have a command of for successful process execution. On the other hand, it is about the management of know-how, which has already been collected from completed projects and should be reused in new projects.
APA, Harvard, Vancouver, ISO, and other styles
8

Saini, Poonam, and Awadhesh Kumar Singh. "Security in Ad Hoc Network and Computing Paradigms." In Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, 96–125. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0105-3.ch005.

Full text
Abstract:
Resource sharing is the most attractive feature of distributed computing. Information is also a kind of resource. The portable computing devices and wireless networks are playing a dominant role in enhancing the information sharing and thus in the advent of many new variants of distributed computing viz. ubiquitous, grid, cloud, pervasive and mobile. However, the open and distributed nature of Mobile Ad Hoc Networks (MANETs), Vehicular Ad Hoc Networks (VANETs) and cloud computing systems, pose a threat to information that may be coupled from one user (or program) to another. The chapter illustrates the general characteristics of ad hoc networks and computing models that make obligatory to design secure protocols in such environments. Further, we present a generic classification of various threats and attacks. In the end, we describe the security in MANETs, VANETs and cloud computing. The chapter concludes with a description of tools that are popularly used to analyze and access the performance of various security protocols.
APA, Harvard, Vancouver, ISO, and other styles
9

Meghanathan, Natarajan. "Network Security." In Network Security Technologies, 174–203. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4789-3.ch011.

Full text
Abstract:
The focus of this chapter is two-fold: It first presents the classical network attacks (such as Session Hijacking, Man-in-the-Middle attack, DNS attacks, Distributed Denial of Service attacks, and other miscellaneous attacks), which have exploited the various vulnerabilities of computer networks in the past, and reviews the solutions that have been implemented since then to mitigate or reduce the chances of these attacks. The authors then present the different network security controls, including the protocols and standards (such as IPSec, Kerberos, Secure Shell, Transport Layer Security, Virtual Private Networks, Firewalls, and S/MIME) that have been adopted in modern day computer networks to control the incidence of attacks in modern day computer networks.
APA, Harvard, Vancouver, ISO, and other styles
10

Badra, Mohamad, and Artur Hecker. "Security in WLAN." In Handbook of Research on Wireless Security, 695–709. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch043.

Full text
Abstract:
The great promise of wireless LAN will never be realized unless there is an appropriate security level. From this point of view, various security protocols have been proposed to handle wireless local-area network (WLAN) security problems that are mostly due to the lack of physical protection in WLAN or because of the transmission on the radio link. The purpose of this chapter is (1) to provide the reader with a sample background in WLAN technologies and standards, (2) to give the reader a solid grounding in common security concepts and technologies, and (3) to identify the threats and vulnerabilities of WLAN communications.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer network protocols – Standards – Research"

1

Nezhad, Vahid Majid, and Bager Zarei. "Four Modified Routing Protocols for Increasing Lifetime of Sensor Network." In 2010 Second International Conference on Computer Research and Development. IEEE, 2010. http://dx.doi.org/10.1109/iccrd.2010.142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Keahey, Kate, Joe Mambretti, Paul Ruth, and Dan Stanzione. "Chameleon: A Large-Scale, Deeply Reconfigurable Testbed for Computer Science Research." In 2019 IEEE 27th International Conference on Network Protocols (ICNP). IEEE, 2019. http://dx.doi.org/10.1109/icnp.2019.8888067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wei Yang, Guang-ming Yang, Tian-han Gao, Xiao-meng Shen, Zhi-liang Zhu, and Zhen-hua Tan. "Research application of task-driven method in teaching of network protocols." In 2010 2nd International Conference on Education Technology and Computer (ICETC). IEEE, 2010. http://dx.doi.org/10.1109/icetc.2010.5529219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jardim-Goncalves, Ricardo, Carlos Agostinho, Pedro Malo, and Adolfo Steiger-Garcao. "AP236-XML: A Framework for Integration and Harmonization of STEP Application Protocols." In ASME 2005 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/detc2005-85581.

Full text
Abstract:
Today, organizations have to deal with the integration of applications across company borders, and must support collaboration of business processes between organizations in networked environments that are seamless, flexible and interoperable. This characteristic of horizontality, where one application embraces more than one domain of activity, is frequently found and raises the need for integration and cooperation between multiple standard application protocols and business objects. However, a standard for data representation cannot cove the whole range of activities one application needs to handle. This paper contributes by proposing a framework that supports interoperability in distributed heterogeneous networked environments, assisting in the integration of reference models described following dissimilar methodologies. This framework assists in the automatic mapping between ISO10303 STEP, UML and XML models. The proposed work results from research developed and validated in the scope of the IMS SMART-fm project (www.smart-fm.funstep.org, www.ims.org), involving partners from USA, Europe, Canada and Australia, using emerging approaches for modeling and technology.
APA, Harvard, Vancouver, ISO, and other styles
5

Jardim-Gonc¸alves, Ricardo, Se´rgio Onofre, Carlos Agostinho, and Adolfo Steiger-Garc¸a˜o. "Conformance Testing for XML-Based STEP Conceptual Models." In ASME 2006 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2006. http://dx.doi.org/10.1115/detc2006-99580.

Full text
Abstract:
ISO10303 STEP has been acknowledged by most of the industrial companies as the most important family of standards for the integration and exchange of product data under the manufacturing domain. The incremental use of XML as an effective format for STEP data exchange has increased the number of implementations of Application Protocols in global networked business environments, where organizations are willing to establish collaborative business practices integrating product data and business information. STEP defines a conformance testing methodology that, although developed for the validation of product data, can be extended to application in these hybrid industrial business environments. This paper proposes an innovative XML-based framework to implement it. The results have been validated under a real industrial scenario in the scope of an international research project.
APA, Harvard, Vancouver, ISO, and other styles
6

Weixiang, Xu, and Jia Lin. "Research on the mobility issue of cloud workloads based on open source standards." In 2013 3rd International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2013. http://dx.doi.org/10.1109/iccsnt.2013.6967230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

J. Grahn, Kaj, Göran Pulkkis, and Jean-Sebastien Guillard. "Security of Mobile and Wireless Networks." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2491.

Full text
Abstract:
This paper gives a topical overview of wireless network security aspects. Security measures taken depend on the different protocols, standards, techniques and systems available. A brief introduction to security protocols, standards and corresponding technologies is given. The essay will concentrate on 2G, 2.5G, 3G and wireless local area networks. Standards, like WAP, IEEE 802.11, HomeRF, HIPERLAN/2, IPSec and Bluetooth, are included. A local area network, MediaPoli, has been implemented to work as a testbed for new innovations, products and services. The development environment is based on this high-capacity wired/wireless broadband network. Key research areas, actual projects and offered services are discussed. All activities aim at the future information society.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography