Academic literature on the topic 'File Transfer Protocol (Computer network protocol)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'File Transfer Protocol (Computer network protocol).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "File Transfer Protocol (Computer network protocol)"

1

Tambunan, Alexander Theo Philus, Adi Prijuna Lubis, and Syartika Anggraini. "Perancangan Sistem Keamanan File Transfer Protocol Dengan Secure Socket Layer Pada Server Centos 7." J-Com (Journal of Computer) 1, no. 2 (2021): 95–102. http://dx.doi.org/10.33330/j-com.v2i1.1206.

Full text
Abstract:
Abstract: An advancement in communication technology currently has an influence on developments in data management in the joints of life, making the need for a media center something a must in digital archive storage. Data will not always be stored in personal computers, but it would be better if there was a centralized data container to be a solution in storage media, in order to prevent data loss or data backup. The term network (network) is used when there are at least two or more devices that are connected to one another. To carry out data exchange in this network, a protocol is used that specifies how data is exchanged, and one of the most widely used protocols is the File Transfer Protocol (FTP). FTP is generally useful as a means of exchanging files or data in a network. The FTP protocol is not secure enough, because when data transfer there is no security to protect it. Therefore the FTP protocol is necessary for additional security, by implementing the SSL security protocol or Secure Socket Layer Security protecting the FTP protocol during data transfer. SSL certificates are used for the purpose of handling the security of data packets transmitted over the network system. When SSL is activated, the server and client when the connection occurs will be encrypted so that the data cannot be seen by others. Keywords: FTP; Network; Server; SSL Abstrak: Suatu Kemajuan teknologi komunikasi saat ini memiliki pengaruh terhadap perkembangan didalam pengelolaan data didalam sendi kehidupan, membuat kebutuhan akan media center menjadi sesuatu yang harus dalam penyimpanan arsip digital. Data tidak selamanya akan tersimpan di dalam personal computer saja tetapi akan lebih baik jika ada wadah data terpusat menjadi solusi dalam media penyimpanan, agar menjaga dari kehilangan data atau cadangan data. Istilah jaringan (network) dipakai apabila terdapat minimal dua atau lebih perangkat yang terhubungkan satu dengan yang lainnya. Untuk melaksanakn pertukaran data didalam jaringan ini, digunakan protocol yang menspesifikasikan bagaimana data dipertukarkan, dan salah satu protocol yang banyak digunakan adalah File Transfer Protocol (FTP). FTP umumnya bermanfaat sebagai sarana pertukaran file atau data dalam suatu network. Protokol FTP tidaklah cukup aman, dikarenakan ketika transfer data tidak ada keamanan untuk melindunginya. Maka dari itu protokol FTP perlu untuk penambahan keamanan, dengan menerapkan protokol keamanan SSL atau Secure Socket Layer Security melindungi protokol FTP pada saat transfer data. Sertifikat SSL dimanfaatkan untuk keperluan menangani keamanan paket data yang ditransmisikan melalui sistem jaringan. Ketika SSL diakatifkan, maka server dan client ketika terjadi koneksi akan ter enkripsi sehingga data yang ada tidak dapat untuk dilihat oleh orang lain. Kata kunci: FTP;Network; Server; SSL
APA, Harvard, Vancouver, ISO, and other styles
2

Rahim, Robbi, Solly Aryza, Pristisal Wibowo, et al. "Prototype File Transfer Protocol Application for LAN and Wi-Fi Communication." International Journal of Engineering & Technology 7, no. 2.13 (2018): 345. http://dx.doi.org/10.14419/ijet.v7i2.13.16917.

Full text
Abstract:
FTP (File Transfer Protocol) is one of the earliest Internet protocols developed. An FTP server can be accessed by using a URI (Universal Resource Identifier), using FTP file exchange between client and server is easier to do because the communication is done directly without going through an intermediary, for communication using FTP need to be designed an application that allows communication between the client and server directly without using the browser, for it is designed an FTP application using programming language in this case is Borland Delphi programming language, the ease of sending files between computers based on IP is a value added from the FTP application that is designed because most existing FTP applications can only send files between the server and the client in the internet network means that online must not be local area network or wide area network.
APA, Harvard, Vancouver, ISO, and other styles
3

Daka, J. S. J., and A. J. Waters. "A high performance broadcast file transfer protocol." ACM SIGCOMM Computer Communication Review 18, no. 4 (1988): 274–81. http://dx.doi.org/10.1145/52325.52352.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hammoudi, Modhar A. "Building Model for the University of Mosul Computer Network Using OPNET Simulator." Tikrit Journal of Engineering Sciences 18, no. 2 (2011): 34–44. http://dx.doi.org/10.25130/tjes.18.2.04.

Full text
Abstract:
This paper aims at establishing a model in OPNET (Optimized Network Engineering Tool) simulator for the University of Mosul computer network. The proposed network model was made up of two routers (Cisco 2600), core switch (Cisco6509), two servers, ip 32 cloud and 37 VLANs. These VLANs were connected to the core switch using fiber optic cables (1000BaseX). Three applications were added to test the network model. These applications were FTP (File Transfer Protocol), HTTP (Hyper Text Transfer Protocol) and VoIP (Voice over Internet Protocol). The results showed that the proposed model had a positive efficiency on designing and managing the targeted network and can be used to view the data flow in it. Also, the simulation results showed that the maximum number of VoIP service users could be raised up to 5000 users when working under IP Telephony. This means that the ability to utilize VoIP service in this network can be maintained and is better when subjected to IP telephony scheme
APA, Harvard, Vancouver, ISO, and other styles
5

Arman, Molavi. "Rancang Bangun Pengamanan FTP Server dengan Menggunakan Secure Sockets Layer." JURNAL INTEGRASI 9, no. 1 (2017): 16. http://dx.doi.org/10.30871/ji.v9i1.272.

Full text
Abstract:
Teknologi informasi yang berkembang pesat didalam kehidupan manusia, membuat kebutuhan akan sistem penyimpanan data terpusat menjadi sesuatu yang penting dalam penyimpanan arsip digital. Data tidak hanya disimpan dalam sebuah personal computer desktop tetapi media penyimpanan data terpusat menjadi alternatif dalam media penyimpanan, guna menjaga dari kehilangan data atau backup data.
 Teknologi jaringan (network) komputer merupakan solusi yang dapat dimanfaatkan untuk memenuhi penyimpanan data. Jaringan komputer merupakan kumpulan beberapa komputer dan perangkat jaringan lain yang saling terhubung melalui media perantara.
 FTP (File Tranfer Protocol) umumnya berfungsi sebagai media tukar menukar file atau data dalam suatu network yang menggunakan koneksi TCP. Protokol FTP tidak cukup aman dikarenakan pada saat autentifikasi output karakter berupa plaintext dan disaat transfer data tidak ada enkripsi untuk melindungi. Protokol FTP butuh penambahan keamanan, dengan menggunakan protokol TLS (Transport Layer Security) dan Auth SSL untuk mengamankan protokol FTP pada saat autentikasi dan proses transfer data.
 Manajemen user dan kuota dalam penggunaan FTP dikombinasikan dengan database, untuk memudahkan memasukkan data kedalam database ditambahkan script PHP yang nantinya berbentuk interface web.
 Proses memasukkan user, kuota , password dan field lainnya kedalam database serta soal keamanan autentikasi login dan transfer data, maka dengan penjelasan diatas tema yang dipilih adalah pengamanan FTP server dengan menggunakan Secure Sockets Layer (SSL).
APA, Harvard, Vancouver, ISO, and other styles
6

Singh, Drishti, Ria Singh, Aryan Gupta, and Ambika Vishal Pawar. "Message queue telemetry transport and lightweight machine-to-machine comparison based on performance efficiency under various scenarios." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 6 (2022): 6293. http://dx.doi.org/10.11591/ijece.v12i6.pp6293-6302.

Full text
Abstract:
<span>Internet of things (IoT) is been advancing over a long period of time in many aspects. For data transfer between IoT devices in a wireless sensor network, various IoT protocols are proposed. Among them, the most widely used are constrained application protocol (CoAP) and message queue telemetry transport (MQTT). Overcoming the limitations of CoAP, lightweight machine-to-machine (LwM2M) framework was designed above CoAP. Recent statistics show that LwM2M and MQTT are the widely used, but LwM2M is still less used than MQTT. Our paper is aimed at comparing both MQTT and LwM2M on the basis of performance efficiency, which will be achieved by sending same file through both protocols to the server. Performance efficiency will be calculated in two scenarios, i) when the client makes a connection with the server i.e., while initial connection and ii) while sending data file to server i.e., while data transfer. Both the protocols will be tested on the number of packets sent and the variability of packet size throughout the session. Experimental results indicated that LwM2M outperformed MQTT in both above scenarios by almost 69%. Therefore, we concluded by stating that LwM2M is best choice over MQTT, but MQTT can still be used in some situations if necessary.</span>
APA, Harvard, Vancouver, ISO, and other styles
7

Giuliano, Romeo, Alessandro Vizzarri, Antonino Calderone, and Franco Mazzenga. "Communication Transport Protocol Strategies for Rail Applications." Applied Sciences 12, no. 6 (2022): 3013. http://dx.doi.org/10.3390/app12063013.

Full text
Abstract:
Current technologies for managing rail traffic such as the Global System for Mobile communications for Railway (GSM-R) will be no longer be available within the upcoming years. The European Shift2Rail Joint Undertaking (S2R-JU) proposed the Adaptable Communication System (ACS) to overcome this problem. In this work, we model the ACS by abstracting it at the Internet Protocol (IP) level, using tunnels for datagrams’ transmission as a communication bearer is available along the rail. Then, to evaluate its performance, an ACS emulator has been implemented. The core part of it is a Tunnel Manager which can establish pseudo-virtual circuits through multi-bearer tunnels, forcing datagrams on a service-basis to follow specific paths between gateways (i.e., from on-board to a train to the network-side rail control center and vice versa). The Tunnel Manager can properly select a given tunnel/bearer for sending messages (and duplicating them on redundant paths) of critical rail applications for train traffic management, relying on tunnels based on either connection-oriented protocol (i.e., the Transport Control Protocol, TCP), connectionless protocol (i.e., the User Datagram Protocol, UDP) or a mix of them. In this paper, we investigate the best solutions in terms of transport protocols for implementing tunnels through the bearers. Results are based on two main use cases: i. the position report/movement authority messages for the European Rail Traffic Management System (ERMTS) and ii. the critical file transmission, considering either TCP or UDP as tunnel transport protocol. For the first rail application, one UDP bearer can be selected only if the end-to-end channel delay is lower than 100 ms and the experienced packet loss is lower than 4% in the whole crossed network. Two UDP bearers, one TCP bearer or two mixed UDP/TCP bearers should be selected in case the channel delay is greater than 300 ms and the experienced packet loss is greater than 15%. Considering the critical file transfer in the rail scenario, TCP should be selected with two bearers to have a throughput greater than 50 Mbit/s even for a packet loss of 1%.
APA, Harvard, Vancouver, ISO, and other styles
8

Fan, Chun-I., Arijit Karati, and Pei-Shan Yang. "Reliable file transfer protocol with producer anonymity for Named Data Networking." Journal of Information Security and Applications 59 (June 2021): 102851. http://dx.doi.org/10.1016/j.jisa.2021.102851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Weingart, Troy, Douglas C. Sicker, and Dirk Grunwald. "Identifying Opportunities for Exploiting Cross-Layer Interactions in Adaptive Wireless Systems." Advances in Multimedia 2007 (2007): 1–11. http://dx.doi.org/10.1155/2007/49604.

Full text
Abstract:
The flexibility of cognitive and software-defined radio heralds an opportunity for researchers to reexamine how network protocol layers operate with respect to providing quality of service aware transmission among wireless nodes. This opportunity is enhanced by the continued development of spectrally responsive devices—ones that can detect and respond to changes in the radio frequency environment. Present wireless network protocols define reliability and other performance-related tasks narrowly within layers. For example, the frame size employed on 802.11 can substantially influence the throughput, delay, and jitter experienced by an application, but there is no simple way to adapt this parameter. Furthermore, while the data link layer of 802.11 provides error detection capabilities across a link, it does not specify additional features, such as forward error correction schemes, nor does it provide a means for throttling retransmissions at the transport layer (currently, the data link and transport layer can function counterproductively with respect to reliability). This paper presents an analysis of the interaction of physical, data link, and network layer parameters with respect to throughput, bit error rate, delay, and jitter. The goal of this analysis is to identify opportunities where system designers might exploit cross-layer interactions to improve the performance of Voice over IP (VoIP), instant messaging (IM), and file transfer applications.
APA, Harvard, Vancouver, ISO, and other styles
10

Alawi, Mahmoud, Raed Alsaqour, Maha Abdelhaq, et al. "Adaptive QoS-Aware Multi-Metrics Gateway Selection Scheme for Heterogenous Vehicular Network." Systems 10, no. 5 (2022): 142. http://dx.doi.org/10.3390/systems10050142.

Full text
Abstract:
A heterogeneous vehicular network (HetVNET) is a promising network architecture that combines multiple network technologies such as IEEE 802.11p, dedicated short-range communication (DSRC), and third/fourth generation cellular networks (3G/4G). In this network area, vehicle users can use wireless fidelity access points (Wi-Fi APs) to offload 4G long-term evolution (4G-LTE) networks. However, when using Wi-Fi APs, the vehicles must organize themselves and select an appropriate mobile gateway (MGW) to communicate to the cellular infrastructure. Researchers are facing the problem of selecting the best MGW vehicle to aggregate vehicle traffic and reduce LTE load in HetVNETs when the Wi-Fi APs are unavailable for offloading. The selection process utilizes extra network overhead and complexity due to the frequent formation of clusters in this highly dynamic environment. In this study, we proposed a non-cluster adaptive QoS-aware gateway selection (AQAGS) scheme that autonomously picks a limited number of vehicles to act as LTE gateways based on the LTE network’s load status and vehicular ad hoc network (VANET) application’s QoS requirements. The present AQAGS scheme focuses on highway scenarios. The proposed scheme was evaluated using simulation of Urban mobility (SUMO) and network simulator version 2 (NS2) simulators and benchmarked with the clustered and non-clustered schemes. A comparison was made based on the end-to-end delay, throughput, control packet overhead (CPO), and packet delivery ratio (PDR) performance metrics over Voice over Internet Protocol (VoIP) and File Transfer Protocol (FTP) applications. Using VoIP, the AQAGS scheme achieved a 26.7% higher PDR compared with the other schemes.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "File Transfer Protocol (Computer network protocol)"

1

Mascarenhas, da Veiga Alves Manoel Eduardo. "Characterisation of end-to-end performance for web-based file server respositories." Title page, contents and abstract only, 2001. http://web4.library.adelaide.edu.au/theses/09ENS/09ensm395.pdf.

Full text
Abstract:
Bibliography: leaves 128-135. Investigates the behaviour of TCP bulk file transfer application sessions in a broadband access environment. Introduces some concepts for evaluating network behaviour: a path instability parameter for analyzing different TCP connections; a minimum RTT delay and a minimum typical path for estimating path characteristics between a client and application servers.
APA, Harvard, Vancouver, ISO, and other styles
2

Pantoleon, Periklis K. "Reliable content delivery using persistent data sessions in a highly mobile environment." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FPantoleon.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Grobler, Reinette. "Signalling and scheduling for efficient bulk data transfer in circuit-switched networks." Pretoria : [s.n.], 2006. http://upetd.up.ac.za/thesis/available/etd-05312006-114524/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Goh, Mei Jean. "On implementing the ISO File Transfer, Access and Management protocol for a UNIX 4.2 BSD environment." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26263.

Full text
Abstract:
Different computer systems have their own ways of representing, storing and managing files. One approach to facilitate file transfers among systems in a heterogeneous networked environment is for each system to locally map files for transfer onto a virtual filestore (VFS). Conceptually, a virtual filestore provides a universal model for describing files and how they can be manipulated. The ISO File Transfer, Access and Management (FTAM) protocol offers one such virtual filestore model. This thesis reports on the prototype implementation of a useful subset of the ISO FTAM protocol for the UNIX 4.2 BSD¹ file system. We call this implementation ubcFTAM. UNIX files, ordinarily regarded as unstructured, can be endowed with some internal structure thereby allowing the transfer of selective portions of a file. Furthermore, the implementation offers several file attributes not supported by UNIX. ubcFTAM runs on several Sun Workstations² interconnected by a 10 Mbps Ethernet. Some performance data of ubcFTAM are also presented. This thesis also identifies several aspects of the specifications that are ambiguous or that are inadequate, warranting further studies. Resolutions for these issues are discussed. We hope this experience will be useful to others planning to implement FTAM for UNIX systems. ¹UNIX is a registered trademark of American Telephone and Telegraph Bell Laboratories. BSD denotes Berkeley Standard Distribution ²SUN Workstation is a trademark of Sun Microsystems, Inc.<br>Science, Faculty of<br>Computer Science, Department of<br>Graduate
APA, Harvard, Vancouver, ISO, and other styles
5

Pailom, Chayutra. "API development for persistent data sessions support." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FPailom.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chung, Jae Won. "Congestion control for streaming media." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-081805-084831/.

Full text
Abstract:
Dissertation (Ph.D.) -- Worcester Polytechnic Institute.<br>Keywords: streaming media; streaming transport protocol; active queue management (AQM); Internet congestion control. Includes bibliographical references (p. 236-248).
APA, Harvard, Vancouver, ISO, and other styles
7

Allman, Mark. "Improving TCP performance over satellite channels." Ohio : Ohio University, 1997. http://www.ohiolink.edu/etd/view.cgi?ohiou1177615641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hachfi, Fakhreddine Mohamed. "Future of asynchronous transfer mode networking." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2639.

Full text
Abstract:
The growth of Asynchronous Transfer Mode (ATM) was considered to be the ideal carrier of the high bandwidth applications like video on demand and multimedia e-learning. ATM emerged commercially in the beginning of the 1990's. It was designed to provide a different quality of service at a speed up 100 Gbps for both real time and non real time application. The turn of the 90's saw a variety of technologies being developed. This project analyzes these technologies, compares them to the Asynchronous Transfer Mode and assesses the future of ATM.
APA, Harvard, Vancouver, ISO, and other styles
9

Pelletier, Larry Edward. "Description of a file access protocol for computer networks." Thesis, Kansas State University, 1985. http://hdl.handle.net/2097/9870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Patel, Sameer H. "Design of the Network Multimedia File System protocol : a protocol for remote access of networked multimedia files /." Thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-07292009-090502/.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "File Transfer Protocol (Computer network protocol)"

1

Cruz, Frank Da. Kermit, a file transfer protocol. Digital Press, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Loshin, Peter. Big book of Internet file transfer RFCs. Morgan Kaufmann, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

The working programmer's guide to serial protocols. Coriolis Group Books, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Robison, David F. W. All about Internet FTP plus: Learning and teaching to transfer files on the Internet. Library Solutions Press, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gardner, James. A DOS user's guide to the Internet: E-mail, netnews, and file transfer with UUCP. PTR Prentice Hall, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Markovitz, Paul. Guidelines for the evaluation of file transfer, access, and management implementations. U.S. Dept. of Commerce, National Institute of Standards and Technology, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Markovitz, Paul. Guidelines for the evaluation of file transfer, access, and management implementations. U.S. Dept. of Commerce, National Institute of Standards and Technology, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Government open systems interconnection profile users' guide, version 2. U.S. Dept. of Commerce, National Institute of Standards and Technology, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Robison, David F. W. All about Internet FTP: Learning and teaching to transfer files on the Internet. Library Solutions Press, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Using IBM microcomputers: WordPerfect 5.0, Lotus 1-2-3, dBASE III PLUS and IV, and file transfer. 3rd ed. Mitchell Pub., 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "File Transfer Protocol (Computer network protocol)"

1

Fan, Hsiang-Shian, Cheng-Hsing Yang, and Chi-Yao Weng. "Secure File Transfer Protocol for Named Data Networks Supporting Homomorphic Computations." In Communications in Computer and Information Science. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9190-3_63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weik, Martin H. "File Transfer Protocol." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_7145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Meghanathan, Natarajan, and Bhadrachalam Chitturi. "A Secure Session Transfer Protocol for Downloading a Large File across a Cluster of Servers in the Presence of Network Congestion." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27299-8_58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jestratjew, Arkadiusz, and Andrzej Kwiecień. "Using HTTP as Field Network Transfer Protocol." In Computer Networks. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21771-5_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shah, Nadir, and Depie Qian. "A New Cross-Layer Unstructured P2P File Sharing Protocol over Mobile Ad Hoc Network." In Advances in Computer Science and Information Technology. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13577-4_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Manzanares-Lopez, Pilar, Juan Carlos Sanchez-Aarnoutse, Josemaria Malgosa-Sanahuja, and Joan Garcia-Haro. "Analysis and Performance Evaluation of a Multicast File Transfer Solution for Congested Asymmetric Networks." In NETWORKING 2006. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11753810_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Networking Fundamentals." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch004.

Full text
Abstract:
This chapter introduces to basics of computer networking and associated widely used essential networking communication protocols. The chapter provides the comparison of OSI and TCP model along with details of internet layer protocols including internet protocol (IP), IP addressing schemes, internet control messaging protocol (ICMP), etc. Next, the chapter discusses transport layer protocols transmission control protocol (TCP) and user datagram protocol (UDP) in detail. Application layer protocols including dynamic host control protocol (DHCP), secure shell (SSH), file transfer protocol (FTP), trivial FTP (TFTP), simple network management protocol (SNMP), hyper text transfer protocol secure (HTTPS), network time protocol (NTP), domain name system (DNS), and simple mail transfer protocol (SMTP) are also explained in this chapter. One just cannot attack a networking protocol without knowing how it works. Having a solid introduction about computer networking and network protocols is fundamental in the ethical hacking world. This chapter quickly revisits all essential concepts related to computer networking.
APA, Harvard, Vancouver, ISO, and other styles
8

Al-Bahadili, Hussein, and Haitham Y. Adarbah. "Modeling of TCP Reno with Packet-Loss and Long Delay Cycles." In Simulation in Computer Network Design and Modeling. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0191-8.ch012.

Full text
Abstract:
The Transport Control Protocol (TCP) is the dominant transport layer protocol in the Internet Protocol (IP) suite, as it carries a significant amount of the Internet traffic, such as Web browsing, file transfer, e-mail, and remote access. Therefore, huge efforts have been devoted by researchers to develop suitable models that can help with evaluating its performance in various network environments. Some of these models are based on analytical or simulation approaches. This chapter presents a description, derivation, implementation, and comparison of two well-known analytical models, namely, the PFTK and PLLDC models. The first one is a relatively simple model for predicting the performance of the TCP protocol, while the second model is a comprehensive and realistic analytical model. The two models are based on the TCP Reno flavor, as it is one of the most popular implementations on the Internet. These two models were implemented in a user-friendly TCP Performance Evaluation Package (TCP-PEP). The TCP-PEP was used to investigate the effect of packet-loss and long delay cycles on the TCP performance, measured in terms of sending rate, throughput, and utilization factor. The results obtained from the PFTK and PLLDC models were compared with those obtained from equivalent simulations carried-out on the widely used NS-2 network simulator. The PLLDC model provides more accurate results (closer to the NS-2 results) than the PFTK model.
APA, Harvard, Vancouver, ISO, and other styles
9

Goralski, Walter. "File Transfer Protocol." In The Illustrated Network. Elsevier, 2009. http://dx.doi.org/10.1016/b978-0-12-374541-5.50028-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Goralski, Walter. "File Transfer Protocol." In The Illustrated Network. Elsevier, 2017. http://dx.doi.org/10.1016/b978-0-12-811027-0.00024-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "File Transfer Protocol (Computer network protocol)"

1

MOHANTY, AMIYA RANJAN, and RANJAN SASTI CHARAN PAL. "A CYBER-PHYSICAL SYSTEM BASED REAL-TIME FAULT DIAGNOSIS OF INDUCTION MOTORS." In Structural Health Monitoring 2021. Destech Publications, Inc., 2022. http://dx.doi.org/10.12783/shm2021/36275.

Full text
Abstract:
Induction motors are one of the major electrical prime movers in industrial sectors. Since these motors are operated continuously, they are subjected to wear and tear which lead to faults at a later stage in its life. These faults which arise can be classified into 5 major categories i.e., broken rotor bars, stator winding faults, air-gap eccentricity, bearing faults, and torque fluctuations. A failure in induction motors leads to machine downtime, increased maintenance costs, and puts the lives of the plant personnel at risk, thus leading to undesirable consequences. Hence, uninterrupted operation of the machine is the need of the hour for which real-time condition-based monitoring of induction motors needs to be implemented. Industries are making an attempt to tap into the technology that involves around cyber-physical systems (CPS) and access real-time information regarding the motor health condition. The present article explores the CPS structure for real-time fault identification so that appropriate action can be taken by plant personnel. The CPS technology is a modular framework, which consists of a current sensor that transmits data to a remote minicomputer (e.g., Intel NUC kit) or a microcontroller (e.g., Raspberry Pi) by processing it through a data acquisition (DAQ) system across a wireless network. Since the range of defect frequencies for fault diagnosis in these induction motors is 5 kHz, Nyquist sampling frequency (𝐹𝑠) for data acquisition should at least be 10 kHz. It is to be noted that a microcontroller can be of low cost; however, maintaining 𝐹𝑠 more than 500 Hz tends to cause random jitters at the core of the operating system (OS). As a result, the signal-to-noise ratio (SNR) is compromised in microcontrollers leading to incorrect post-processing of the current time-stamp data for motor fault diagnosis. Hence, in the present article, a minicomputer is used for data acquisition of current time data at 𝐹𝑠 of 10 kHz and infer the motor health status by investigating the current spectrum. The information of motor health condition is stored in comma-separated values (CSV) file, which is further transferred over Google Cloud Storage (GCS) via hypertext transfer protocol (HTTP) with transport-layer security (TLS) encryption. HTTP converts the CSV data file into binary format and maintains the record of meta-data of the files. Meta-data essentially keeps track of when the file was created in the remote minicomputer. Additionally, in order to ensure a high data transfer rate at a given instant of time, the HTTP file transfer protocol divides the actual data into small chunks that are subjected to parallel composite uploads. When the data is collected in the computer at the receiver’s end i.e., the plant personnel in the present case, the data is recreated back to the original CSV file. As a result, the concerned plant personnel has complete information about the specific motor which has started failing and prevents any major breakdown of the machine. Thus, the fault detection of the motors at the incipient stage through CPS technology helps in developing an effective process that aids in the smooth functioning of the machines.
APA, Harvard, Vancouver, ISO, and other styles
2

Montanari, Tony. "The Internet and the Citrus Industry." In ASME 1997 Citrus Engineering Conference. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/cec1997-4306.

Full text
Abstract:
The Internet is a worldwide connection of thousands of computer networks. All of them speak the same language, TCP/IP, the standard protocol. The Internet allows people with access to these networks to share information and knowledge. Resources available on the Internet are chat groups, e-mail, newsgroups, file transfers, and the World Wide Web. The Internet has no centralized authority and it is uncensored. The Internet belongs to everyone and to no one. Paper published with permission.
APA, Harvard, Vancouver, ISO, and other styles
3

Jia, Junmin, and Chun Meng. "A Cluster-Based Peer-to-Peer File Sharing Protocol for Mobile Ad Hoc Networks." In 2009 International Symposium on Computer Network and Multimedia Technology (CNMT 2009). IEEE, 2009. http://dx.doi.org/10.1109/cnmt.2009.5374744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Qing, Yonghui Ju, and Chang Zhao. "Classification of Discrete Sequential Protocol Messages Based on LSTM Network and Transfer Learning." In 2020 5th International Conference on Computer and Communication Systems (ICCCS). IEEE, 2020. http://dx.doi.org/10.1109/icccs49078.2020.9118435.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kaixi Zhou, Yue Gong, and Xiaoqiang Di. "Analysis on node-by-node delay performance of CCSDS File Delivery Protocol based on the stochastic network calculus." In 2015 4th International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2015. http://dx.doi.org/10.1109/iccsnt.2015.7490957.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hirose, Jin, Ken-ichi Baba, and Hirotake Abe. "A Protocol-Aware Network Control Method for Large-Scale Data Transfer in Long-Distance Broadband Networks." In 2011 20th International Conference on Computer Communications and Networks - ICCCN 2011. IEEE, 2011. http://dx.doi.org/10.1109/icccn.2011.6005762.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Noviani, Fitri, Deris Stiawan, Sri Desy Siswanti, et al. "Analysis of custody transfer on moving bundle protocol of wireless router in delay tolerant network (DTN)." In 2017 4th International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE). IEEE, 2017. http://dx.doi.org/10.1109/icitacee.2017.8257674.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!