To see the other types of publications on this topic, follow the link: HTTP protocols.

Journal articles on the topic 'HTTP protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'HTTP protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Peixoto, João Alvarez, André Borin Soares, and Vitor Macedo Ochôa. "Internet das Coisas Industrial: um ensaio de protocolos IoT para manufatura industrial." Revista Eletrônica Científica da UERGS 8, no. 3 (2022): 178–87. http://dx.doi.org/10.21674/2448-0479.83.178-187.

Full text
Abstract:
Em meio às mudanças no mercado de bens e consumo, provocadas pela transformação digital, exige-se que as máquinas de manufaturas sejam mais interativas entre si e com os painéis de monitoramento em nuvem. As conexões via internet das coisas (IoT) promovem este grau de interação e mobilidade desejados. Contudo, o ambiente industrial reivindica melhor confiabilidade e segurança, visto que a Internet das Coisas Industrial (IIoT) apresenta-se com protocolos e plataformas para este fim. Portanto, conhecer as características de protocolos e plataformas, ante a manufatura, adquire importância. O obje
APA, Harvard, Vancouver, ISO, and other styles
2

Afonso, João, Cédric Caffy, Mihai Patrascoiu, et al. "An HTTP REST API for Tape-backed Storage." EPJ Web of Conferences 295 (2024): 01008. http://dx.doi.org/10.1051/epjconf/202429501008.

Full text
Abstract:
The goal of the HTTP REST API for Tape project is to provide a simple, minimalistic and uniform interface to manage data transfers between Storage Endpoints (SEs) where the source file is on tape. The project is a collaboration between the developers of WLCG storage systems (EOS+CTA, dCache, StoRM) and data transfer clients (gfal2, FTS). For some years, HTTP has been growing in popularity as the preferred data transfer protocol between many WLCG SEs. However — unlike other protocols such as XRootD and SRM — HTTP does not include a method to stage files from tape to disk prior to transfer, forc
APA, Harvard, Vancouver, ISO, and other styles
3

Dinesha, H. A1, and K. Agrawal2 Vinod. "Development of Secure Cloud Transmission Protocol (SECTP) Engineering Phases : Multilevel Security & Cryptography." International Journal on Cryptography and Information Security (IJCIS) 5, no. 3/4 (2015): 33–52. https://doi.org/10.5281/zenodo.1255890.

Full text
Abstract:
ABSTRACT Cloud computing technology provides various internet-based services. Many cloud computing vendors are offering cloud services through their own service mechanism. These mechanisms consist of various service parameters such as authentication, security, performance, availability, etc. Customer can access these cloud services through web browsers using http protocols. Each protocol has its own way of achieving the request-response services, authentication, confidentiality and etc. Cloud computing is an internet-based technology, which provides Infrastructure, Storage, Platform services o
APA, Harvard, Vancouver, ISO, and other styles
4

Murali, Krishna M., R. Mudimela Prasantha, and Praveen Kumar Pitcheri. "Performance Analysis of Ripv2, OSPF and EIGRP Protocols using Cisco Packet Tracer Simulator 7.2." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 864–69. https://doi.org/10.35940/ijeat.C5337.029320.

Full text
Abstract:
Figured out in modern massive networks there are existing of many independent system, vibrant transmitting procedures implemented regularly than the different kinds of fixed routing protocol, by the application of various new sorts of directing procedures can efficiently services the contemporary large system in the networking. The contemporary design of different transmitting convention protocols must be taken into considerations of current and as well as services need to be applied in the future by considering this for today’s scenario witnessing a great development adjustment in the w
APA, Harvard, Vancouver, ISO, and other styles
5

Kurniawan, Denny, Muhammad Ashar, and Harits Ar Rosyid. "Hybrid NarrowBand-internet of things protocol for real time data optimization." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 2827. http://dx.doi.org/10.11591/ijece.v13i3.pp2827-2836.

Full text
Abstract:
The level of dependence on data communication in the modern era is increasing exponentially. The internet of things (IoT) plays a very important role in the advancement of the industrial revolution 4.0 that utilizes data communication systems. IoT deployments require data communication protocols, such as hypertext transfer protocol (HTTP), and message queuing telemetry transport (MQTT) as well as network communication protocols (wireless) to meet the network needs of devices with limited resources. Optimization of data communication in IoT is needed to maintain the quality of sending and recei
APA, Harvard, Vancouver, ISO, and other styles
6

Denny, Kurniawan, Ashar Muhammad, and Ar Rosyid Harits. "10.11591/ijece.v13i3.pp2827-2836." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 2827–36. https://doi.org/10.11591/ijece.v13i3.pp2827-2836.

Full text
Abstract:
The level of dependence on data communication in the modern era is increasing exponentially. The internet of things (IoT) plays a very important role in the advancement of the industrial revolution 4.0 that utilizes data communication systems. IoT deployments require data communication protocols, such as hypertext transfer protocol (HTTP), and message queuing telemetry transport (MQTT) as well as network communication protocols (wireless) to meet the network needs of devices with limited resources. Optimization of data communication in IoT is needed to maintain the quality of sending and recei
APA, Harvard, Vancouver, ISO, and other styles
7

Kurniawan, I. Kadek Yogi, I. Gede Andika, I. Gede Made Yudi Antara, I. Gusti Made Ngurah Desnanjaya, and Anak Agung Gde Ekayana. "Analisis Quality of Service Protokol MQTT, HTTP, dan CoAP dalam Pengiriman Data ke Thingsboard." INFORMAL: Informatics Journal 9, no. 1 (2024): 49. http://dx.doi.org/10.19184/isj.v9i1.43986.

Full text
Abstract:
The Internet of Things allows a sensor node to collect data from a place and send it to the Internet of Things platform. In its application, the Internet of Things has several protocols for sending data such as Message Queue Telemetry Transport (MQTT), Hyper Text Transport Protocol (HTTP), and Constrained Application Protocol (CoAP). These three protocols have their own characteristics and differences. For this reason, it is necessary to analyze the performance of these three protocols. This research focuses on analyzing the comparison of the Quality of Service of these three protocols in term
APA, Harvard, Vancouver, ISO, and other styles
8

Irintchev, Mihail D. "Extending Object-Oriented Network Protocols via alternative Transportation Bindings (Web Services over XMPP)." Serdica Journal of Computing 5, no. 1 (2011): 15–38. http://dx.doi.org/10.55630/sjc.2011.5.15-38.

Full text
Abstract:
Distributed and/or composite web applications are driven by intercommunication via web services, which employ application-level protocols, such as SOAP. However, these protocols usually rely on the classic HTTP for transportation. HTTP is quite efficient for what it does — delivering web page content, but has never been intended to carry complex web service oriented communication. Today there exist modern protocols that are much better fit for the job. Such a candidate is XMPP. It is an XML-based, asynchronous, open protocol that has built-in security and authentication mechanisms and utilizes
APA, Harvard, Vancouver, ISO, and other styles
9

Alshagri, Aljuhara, and Abdulmohsen Mutairi. "Evaluation of Modern Internet Transport Protocols over GEO Satellite Links." Network 3, no. 3 (2023): 451–68. http://dx.doi.org/10.3390/network3030019.

Full text
Abstract:
New versions of HTTP protocols have been developed to overcome many of the limitations of the original HTTP/1.1 protocol and its underlying transport mechanism over TCP. In this paper, we investigated the performance of modern Internet protocols such as HTTP/2 over TCP and HTTP/3 over QUIC in high-latency satellite links. The goal was to uncover the interaction of the new features of HTTP such as parallel streams and optimized security handshake with modern congestion control algorithms such as CUBIC and BBR over high-latency links. An experimental satellite network emulation testbed was devel
APA, Harvard, Vancouver, ISO, and other styles
10

Akbar, Nur Arifin, Andi Sunyoto, M. Rudyanto Arief, and Wahyu Caesarendra. "REDUCING OVERHEAD OF SELF-STABILIZING BYZANTINE AGREEMENT PROTOCOLS FOR BLOCKCHAIN USING HTTP/3 PROTOCOL: A PERSPECTIVE VIEW." SINERGI 25, no. 3 (2021): 381. http://dx.doi.org/10.22441/sinergi.2021.3.015.

Full text
Abstract:
Today, there is a tendency to reduce the dependence on local computation in favor of cloud computing. However, this inadvertently increases the reliance upon distributed fault-tolerant systems. In a condition that forced to work together, these systems often need to reach an agreement on some state or task, and possibly even in the presence of some misbehaving Byzantine nodes. Although non-trivial, Byzantine Agreement (BA) protocols now exist that are resilient to these types of faults. However, there is still a risk for inconsistencies in the application state in practice, even if a BA protoc
APA, Harvard, Vancouver, ISO, and other styles
11

Amirkhanov, Bauyrzhan, Gulshat Amirkhanova, Murat Kunelbayev, Saltanat Adilzhanova, and Miras Tokhtassyn. "Evaluating HTTP, MQTT over TCP and MQTT over WEBSOCKET for digital twin applications: A comparative analysis on latency, stability, and integration." International Journal of Innovative Research and Scientific Studies 8, no. 1 (2025): 679–94. https://doi.org/10.53894/ijirss.v8i1.4414.

Full text
Abstract:
This study aims to identify the most suitable IoT communication protocol for a digital twin architecture, focusing on meeting the demands of real-time data transmission with stability and security. The research methodology involves a comparative performance analysis of MQTT over TCP, MQTT over WebSocket, and HTTP protocols, evaluating their latency, connectivity stability, and IoT application feasibility using an ESP32 microcontroller and DHT22 sensor setup. The experimental results demonstrate that MQTT over TCP achieves the lowest average latency at 290.5 ms, while MQTT over WebSocket exhibi
APA, Harvard, Vancouver, ISO, and other styles
12

Malakhov, S. V., D. O. Yakupov, R. D. Lyashchenko, I. I. Morozov, and B. D. Brovikov. "EXPERIMENTAL STUDY OF THE PERFORMANCE OF HTTP PROTOCOL VERSIONS." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 243 (September 2024): 32–39. https://doi.org/10.14489/vkit.2024.09.pp.032-039.

Full text
Abstract:
The performance of different versions of HTTP protocol (HTTP/1, HTTP/2 and HTTP/3) based on real website data was studied and compared. The main objective of the study was to analyze several key aspects of each protocol in order to identify their features, advantages and disadvantages. Web page load time is an important metric affecting user experience. A faster page load time provides a more positive user interaction with the website. The number of HTTP requests required to load a page has an impact on data transfer performance. Fewer requests can improve the performance of a website. The amo
APA, Harvard, Vancouver, ISO, and other styles
13

Taha, Miran, and Aree Ali. "Redirection and Protocol Mechanisms in Content Delivery Network-Edge Servers for Adaptive Video Streaming." Applied Sciences 13, no. 9 (2023): 5386. http://dx.doi.org/10.3390/app13095386.

Full text
Abstract:
Redirection and protocol techniques are key components of the infrastructure for Content Delivery Networks (CDNs) that aid in the delivery of Multimedia Internet services to end-consumers. Redirection methods are used to route the user’s request to the nearest edge server, minimizing distance, improving delivery times, and lowering latency. Protocol mechanisms, such as HTTP Live Streaming (HLS), Dynamic Adaptive Streaming over HTTP (DASH), and Real-Time Messaging Protocol (RTMP), are used to deliver adaptive video streaming. These protocols are designed to transfer the adaptive streaming and p
APA, Harvard, Vancouver, ISO, and other styles
14

Wang, Jianyi. "The Performance and Future of QUIC Protocol in the Modern Internet." Network and Communication Technologies 6, no. 1 (2021): 28. http://dx.doi.org/10.5539/nct.v6n1p28.

Full text
Abstract:
Quick UDP Internet Connections (QUIC) protocol is a potential replacement for the TCP protocol to transport HTTP encrypted traffic. It is based on UDP and offers flexibility, speed, and low latency. The performance of QUIC is related to the everyday web browsing experience. QUIC is famous for its Forward Error Correction (Luyi, Jinyi, & Xiaohua, 2012) and congestion control (Hari, Hariharan, & Srinivasan, 1999) algorithm that improves user browsing delay by reducing the time spent on loss recovery (Jörg, Ernst, & Don, 1998). This paper will compare QUIC with ot
APA, Harvard, Vancouver, ISO, and other styles
15

Shykhmat, A., and V. Veres. "SELECTION OF PROTOCOLS FOR DATA TRANSMISSION FROM INTERNET OF THINGS DEVICES TO CLOUD PROVIDERS." Computer systems and network 5, no. 1 (2023): 149–59. http://dx.doi.org/10.23939/csn2023.01.149.

Full text
Abstract:
The Internet of Things (IoT) enables the creation of networks between devices, people, applications, and the Internet, creating new ecosystems with higher productivity, better energy efficiency, and higher profitability. Nodes in these networks must have the ability to communicate and exchange data, which requires the use of data transfer protocols. However, choosing the right protocol for a specific use case is not always straightforward. This paper provides an overview of two existing data transfer protocols, MQTT and HTTP, compares the amount of tariffed traffic generated by each protocol,
APA, Harvard, Vancouver, ISO, and other styles
16

Tran, Chanh Minh, Tho Nguyen Duc, Phan Xuan Tan, and Eiji Kamioka. "An Experimental Study of the Server-based Unfairness Solutions for the Cross-Protocol Scenario of Adaptive Streaming over HTTP/3 and HTTP/2." Baghdad Science Journal 18, no. 4(Suppl.) (2021): 1441. http://dx.doi.org/10.21123/bsj.2021.18.4(suppl.).1441.

Full text
Abstract:
Since the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely
APA, Harvard, Vancouver, ISO, and other styles
17

Riska, Riska, and Hendri Alamsyah. "Analisis Perbandingan Protokol Transport Pada Video Streaming di Jaringan Lokal (LAN) Menggunakan Videolan Client." JURNAL MEDIA INFORMATIKA BUDIDARMA 3, no. 2 (2019): 126. http://dx.doi.org/10.30865/mib.v3i2.1110.

Full text
Abstract:
The use of video streaming on computer networks uses the method of delivering multimedia content in the form of streaming that can be done with several transport protocols such as RTP, RTSP, and HTTP. The protocol has its own character and of course also has its own quality comparison. Therefore, this study will compare the quality of each of these protocols. The assessment criteria to be carried out in this study are the value of throughput, delay and jitter. Streaming video will be done with the VLC application and measuring the quality of services using the Wireshark application. From the r
APA, Harvard, Vancouver, ISO, and other styles
18

Jin, Longxing, Zijun Liu, Fuquan Huang, Zizhao Lin, and Ming Li. "Covert Channel Construction Method Based on HTTP Composite Protocols." Journal of Electrical and Computer Engineering 2022 (May 9, 2022): 1–7. http://dx.doi.org/10.1155/2022/2257524.

Full text
Abstract:
Aiming at the problems of low concealment of existing storage-type covert channels, high bit error rate, and low transmission rate of time-type covert channels, this paper proposes a method of constructing covert channels based on HTTP protocol combination. The method simulates browser application to send HTTP requests, dynamically distributes HTTP requests to different browsers, embeds hidden information by mathematical combination, and dynamically adjusts access objects, data packet time interval, and data packet length, thus improving the concealment of the channel. At the same time, the ch
APA, Harvard, Vancouver, ISO, and other styles
19

Heidemann, J., K. Obraczka, and J. Touch. "Modeling the performance of HTTP over several transport protocols." IEEE/ACM Transactions on Networking 5, no. 5 (1997): 616–30. http://dx.doi.org/10.1109/90.649564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Susanto, Andy, and Wahyu Kusuma Raharja. "Simulation and Analysis of Network Security Performance Using Attack Vector Method for Public Wifi Communication." IJICS (International Journal of Informatics and Computer Science) 5, no. 1 (2021): 7. http://dx.doi.org/10.30865/ijics.v5i1.2764.

Full text
Abstract:
The use of wifi networks in public spaces has a risk of robbery of user access data in cyberspace, such as banking transactions, social media and other online access. The threat of Man In The Middle Attack (MITM) attacks is carried out on public wifi networks to gain access to user information by illegal means. The attack vector simulation process is carried out on the site access exampleriset.com/dvwa/login.php. ARP Poisoning attack with Ettercap device performs interception and manipulation which provides 08: 00: 27: 25: 22: 99 MAC address information to the target. Session Hijacking attack
APA, Harvard, Vancouver, ISO, and other styles
21

Murthy, Anusha A., Prathima Mabel John, and Rama Mohan Babu Kasturi Nagappasetty. "Hypertext transfer protocol performance analysis in traditional and software defined networks during Slowloris attack." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4268. http://dx.doi.org/10.11591/ijece.v13i4.pp4268-4279.

Full text
Abstract:
<p>The extensive use of the internet has resulted in novel technologies and protocol improvisation. Hypertext transfer protocol/1.1 (HTTP/1.1) is widely adapted on the internet. However, HTTP/2 is found to be more efficient over transport control protocol (TCP). The HTTP/2 protocol can withstand the payload overhead when compared to HTTP/1.1 by multiplexing multiple requests. However, both the protocols are highly susceptible to application-level denial of service (DoS) attacks. In this research, a slow-rate DoS attack called Slowloris is detected over Apache2 servers enabled with both v
APA, Harvard, Vancouver, ISO, and other styles
22

Anusha, A. Murthy, Mabel John Prathima, and Mohan Babu Kasturi Nagappasetty Rama. "Hypertext transfer protocol performance analysis in traditional and software defined networks during Slowloris attack." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4268–79. https://doi.org/10.11591/ijece.v13i4.pp4268-4279.

Full text
Abstract:
The extensive use of the internet has resulted in novel technologies and protocol improvisation. Hypertext transfer protocol/1.1 (HTTP/1.1) is widely adapted on the internet. However, HTTP/2 is found to be more efficient over transport control protocol (TCP). The HTTP/2 protocol can withstand the payload overhead when compared to HTTP/1.1 by multiplexing multiple requests. However, both the protocols are highly susceptible to applicationlevel denial of service (DoS) attacks. In this research, a slow-rate DoS attack called Slowloris is detected over Apache2 servers enabled with both versions of
APA, Harvard, Vancouver, ISO, and other styles
23

Samaan, Sama Salam. "Performance Evaluation of RIPng, EIGRPv6 and OSPFv3 for Real Time Applications." Journal of Engineering 24, no. 1 (2018): 111–22. http://dx.doi.org/10.31026/j.eng.2018.01.08.

Full text
Abstract:
In this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including: network convergence duration, Http P
APA, Harvard, Vancouver, ISO, and other styles
24

Sari, Aisah Nur Endah. "Smart Monitoring System Room Temperature Server Based on Iot Using Http Communication Protocol Method at Xyz University." Informatics Management, Engineering and Information System Journal 3, no. 1 (2025): 66–88. https://doi.org/10.56447/imeisj.v3i1.432.

Full text
Abstract:
XYZ University, which relies on servers for administrative and academic functions, continues to employ manual temperature monitoring through physical site visits to the server locations. This method presents a risk of delayed response to temperature fluctuations, which could lead to operational issues and data loss. This project aims to establish a real-time temperature monitoring system for server rooms, utilizing IoT and employing the HTTP protocol for communication. The evaluation concentrates on assessing the latency of the HTTP protocol and the dimensions of data packets to verify the sys
APA, Harvard, Vancouver, ISO, and other styles
25

Susanto, Eko Heri, Yohanes Dwi Cahyono, and Riyant Budi S. "IMPROVING END-TO-END ENCRYPTION SECURITY ON HTTP USING A GREGORIAN DAN JAVANESE CALENDAR-BASED KEY GENERATOR." International Journal of Computer Science and Information Technology 2, no. 1 (2025): 21–27. https://doi.org/10.36040/ijcomit.v2i1.12872.

Full text
Abstract:
This research investigates an end-to-end encryption method with a dynamic key generator based on the conversion of the Gregorian calendar to the Javanese calendar to improve the security of the Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure (HTTPS) protocols, which remain vulnerable to attacks. The research generates unique asymmetric keys down to the millisecond level without affecting the speed of the web server. However, this method has a downside: the data size (transfer size) doubles because the ciphertext encoding still uses hexadecimal
APA, Harvard, Vancouver, ISO, and other styles
26

Lee, Y. J. "Mean Response Time Approximation for HTTP Transactions over Transport Protocols." International Journal of Computer Network and Information Security 7, no. 1 (2014): 24–30. http://dx.doi.org/10.5815/ijcnis.2015.01.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Computer Engineering, Journal of Electrical and. "Retracted: Covert Channel Construction Method Based on HTTP Composite Protocols." Journal of Electrical and Computer Engineering 2023 (December 20, 2023): 1. http://dx.doi.org/10.1155/2023/9864520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Bayu Suputra, I. Made Ramanda, I. Kadek Andy Asmarajaya, and I. Kadek Noppi Adi Jaya. "Analisis Perbandingan Keamanan Data pada Website Repository UNHI dan Website SRUTI UNHI Terhadap Sniffing Process Menggunakan Aplikasi Wireshark." RESI : Jurnal Riset Sistem Informasi 3, no. 2 (2025): 254–65. https://doi.org/10.32795/resi.v3i2.6377.

Full text
Abstract:
The rapid development of information technology has increased the risk of data security in computer networks, especially through information sniffing. Universitas Hindu Indonesia (UNHI) has two web platforms, Repository UNHI and SRUTI UNHI, which use different protocols (HTTP and HTTPS). This research analyzes and compares data security on both websites against sniffing attacks using the Wireshark application and provides insights into the vulnerabilities of the HTTP protocol and the advantages of the HTTPS protocol. This research uses a descriptive method with a qualitative approach applied t
APA, Harvard, Vancouver, ISO, and other styles
29

Dunbar, DeJean, Patrick Hill, and Yu-Ju Lin. "Survey of United States Related Domains: Secure Network Protocol Analysis." International Journal of Network Security & Its Applications 14, no. 5 (2022): 25–38. http://dx.doi.org/10.5121/ijnsa.2022.14503.

Full text
Abstract:
Over time, the HTTP Protocol has undergone significant evolution. HTTP was the internet's foundation for data communication. When network security threats became prevalent, HTTPS became a widely accepted technology for assisting in a domain defense. HTTPS supported two security protocols: secure socket layer (SSL) and transport layer security (TLS). Additionally, the HTTP Strict Transport Security (HSTS) protocol was included to strengthen the HTTPS protocol. Numerous cyber-attacks occurred in the United States, and many of these attacks could have been avoided simply by implementing domains w
APA, Harvard, Vancouver, ISO, and other styles
30

DeJean, Dunbar, Hill Patrick, and Lin Yu-Ju. "SURVEY OF UNITED STATES RELATED DOMAINS: SECURE NETWORK PROTOCOL ANALYSIS." International Journal of Network Security & Its Applications (IJNSA) 14, no. 5 (2022): 25–38. https://doi.org/10.5281/zenodo.7196824.

Full text
Abstract:
Over time, the HTTP Protocol has undergone significant evolution. HTTP was the internet's foundation for data communication. When network security threats became prevalent, HTTPS became a widely accepted technology for assisting in a domain defense. HTTPS supported two security protocols: secure socket layer (SSL) and transport layer security (TLS). Additionally, the HTTP Strict Transport Security (HSTS) protocol was included to strengthen the HTTPS protocol. Numerous cyber-attacks occurred in the United States, and many of these attacks could have been avoided simply by implementing domai
APA, Harvard, Vancouver, ISO, and other styles
31

Mwewa, Webby, and Smart C. Lubobya. "Performance Evaluation of Routing Protocols in Enterprise Networks." American Journal of Computing and Engineering 5, no. 1 (2022): 24–35. http://dx.doi.org/10.47672/ajce.953.

Full text
Abstract:
This paper evaluates the performance of routing protocols such as OSPF, EIGRP and IS-IS in an enterprise network. Routing protocols are rules that govern the best route to transfer data between various nodes in networks. These rules are used in the transmission of information from the transmitting end to the receiving end. Routing protocol's main responsibility lies in determining the best way routers communicate with each other in order to forward any kind of network traffic using the optimal path. The evaluation of routing protocols was achieved by measuring packet end-to-end delay, packet d
APA, Harvard, Vancouver, ISO, and other styles
32

Peacock, Sylvia E. "Politics, Public Goods, and Corporate Nudging in the HTTP/2 Standardization Process." SAGE Open 10, no. 4 (2020): 215824402097161. http://dx.doi.org/10.1177/2158244020971611.

Full text
Abstract:
The goal is to map out some policy problems attached to using a club good approach instead of a public good approach to manage our internet protocols, specifically the HTTP (Hypertext Transfer Protocol). Behavioral and information economics theory are used to evaluate the standardization process of our current generation HTTP/2 (2.0). The HTTP update under scrutiny is a recently released HTTP/2 version based on Google’s SPDY, which introduces several company-specific and best practice applications, side by side. A content analysis of email discussions extracted from a publicly accessible IETF
APA, Harvard, Vancouver, ISO, and other styles
33

Rahul, A., B. Suresh kumar, and S. K. Prashanth. "Detection of Intruders and Flooding in VoIP using IDS, Jacobson Fast and Hellinger Distance Algorithms." American Journal of Advanced Computing 1, no. 1 (2020): 1–6. http://dx.doi.org/10.15864/ajac.1106.

Full text
Abstract:
VoIP services are becoming increasingly a big competition to existing telephony services (PSTN). Hence, the need arises to protect VoIP services from all kinds of attacks that target network bandwidth, server capacity or server architectural constrains. SIP Protocol is used for VoIP connection establishment. It works based on either TCP or UDP Protocols. This protocol structure is almost as same as HTTP Protocol, i.e. for every request there will be some response, even though the request is invalid. HTTP Protocol is prone to flooding attacks, like SYN-Flood attack. Because of Session Initiatio
APA, Harvard, Vancouver, ISO, and other styles
34

Silva, André Luis de Souza, and Regina Célia Marques Freitas Silva. "PROTOCOLO HTTP X PROTOCOLO HTTPS." Nucleus 6, no. 1 (2009): 85–92. http://dx.doi.org/10.3738/1982.2278.146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Khan, Tarannum, and Sachin Upadhyay. "MAC Implemented using TCP, UDP and HTTP Protocols in Congestion Control." IJARCCE 6, no. 6 (2017): 264–69. http://dx.doi.org/10.17148/ijarcce.2017.6646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

SUSANA, RATNA, ANGGA NUGRAHA, and DECY NATALIANA. "Perancangan dan Realisasi Web-Based Data Logging System menggunakan ATmega16 melalui Hypertext Transfer Protocol (HTTP)." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 3, no. 1 (2015): 1. http://dx.doi.org/10.26760/elkomika.v3i1.1.

Full text
Abstract:
ABSTRAKHypertext Transfer Protocol (HTTP) merupakan protokol jaringan pada lapisan aplikasi TCP/IP yang menjadi dasar komunikasi pada World Wide Web (WWW). Penelitian ini merancang dan merealisasikan web-based data logging system yang bertujuan untuk memperkenalkan aturan HTTP, sehingga perangkat elektronik dapat berkomunikasi dengan website secara langsung. Sistem dirancang dengan dua sub sistem utama yaitu website data logger dan website. Data logger direalisasikan menggunakan ATMega16 yang diintegrasikan dengan sumber data analog dan digital, RTC serta modem GSM. Data logger berfungsi sebag
APA, Harvard, Vancouver, ISO, and other styles
37

Nugraha, Irvan Rizki, Widhy Hayuhardhika Nugraha Putra, and Eko Setiawan. "A Comparative Study of HTTP and MQTT for IoT Applications in Hydroponics." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 8, no. 1 (2024): 119–26. http://dx.doi.org/10.29207/resti.v8i1.5561.

Full text
Abstract:
Hydroponics is based on nutrients in water. It must be regularly monitored to prevent plant defects. The Internet of Things has become a solution for remote hydroponic monitoring and is currently being tested on Kelompok Wanita Tani (KWT) Yuan Hidroponik. This system will send data every minute, and each data has a possibility of loss in transmission. There is a chance that this system will be implemented in other hydroponic organizations. As more devices are involved, it will impact server resources. This research will compare message queue telemetry transport (MQTT) and hypertext transfer pr
APA, Harvard, Vancouver, ISO, and other styles
38

Slameto, Andika Agus, and Rahmat Hidayat. "Comparative Analysis of PPPOE and SSTP Performance in Microtic(Analisis Perbandingan Kinerja PPPOE dan SSTP Pada Mikrotik)." Jurnal KomtekInfo 6, no. 2 (2019): 107–16. http://dx.doi.org/10.35134/komtekinfo.v6i2.49.

Full text
Abstract:
Tunneling is the process of packaging data sent by other protocols in a network. Point to point over Ethernet (PPPOE) andSecure Socket Tunneling Protocol (SSTP) are protocols that function or are designed to carry out tunneling processes. Datasecurity in this case is a top priority, with the encapsulation and authentication process making tunnels one of the many waysto secure data in a network. Besides security, network performance is something that must be considered in providing goodservices. In the process of testing the performance of PPPOE and SSTP using the Quality of Service method, it
APA, Harvard, Vancouver, ISO, and other styles
39

Abdulhameed, N. Hameed, Abdulghani Alabady Salah, and A. Thanoon Mohammad. "Performance analysis and evaluation of distance vector and link state routing protocols over a large area networks." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 20, no. 6 (2022): 1189–99. https://doi.org/10.12928/telkomnika.v20i6.22211.

Full text
Abstract:
Routing protocols are extremely important incredibly significant in data communication and computer networks. The high performance, reliability, stability, and security of the networks depend primarily on choosing the best type of dynamic routing protocol. In this paper, we evaluate and investigate the network performance for routing information protocol (RIP), enhanced interior gateway routing protocol (EIGRP), open shortest path first (OSPF), and intermediate system-to-intermediate system (IS-IS) routing protocols with three different scenarios of routes failure using the optimized network e
APA, Harvard, Vancouver, ISO, and other styles
40

Mamlook, Rustom, Omer F. Khan, and Thabit Sultan Mohammed. "Bridging for cross protocol talk in IOT devices using windows communication foundation." International Journal of Engineering & Technology 7, no. 3.29 (2018): 196. http://dx.doi.org/10.14419/ijet.v7i3.29.18794.

Full text
Abstract:
In the Internet of Things (IoT), multiple communication protocols are used to connect the smart device. Wi-Fi, Xbee, ZigBee, Bluetooth, and LoRaWAN are some of the communication channels utilized for connectivity by devices using some IoT platform.In order to enable the development of smart services for IoT platforms, there are solutions by different vendors to connect between IoT devices. For example, multiple IoT platforms are available in the market namely IoTivity platform developed by Open Connectivity Foundation (OCF), AllJoyn platform from All Seen Alliance, Weave made by Google, and Ho
APA, Harvard, Vancouver, ISO, and other styles
41

Klotz, Alain. "Protocols for Robotic Telescope Networks." Advances in Astronomy 2010 (2010): 1–8. http://dx.doi.org/10.1155/2010/496765.

Full text
Abstract:
Autonomous robotic observatories can use modern communications to receive pertinent information from institutes that generate events to observe (e.g., supernovae, near-earth asteroids, gravitational lensings, and gamma-ray bursts). This paper is addressed to astronomers who are not specialists in computer science. We give explanations of some basic and advanced protocols to receive events and how to implement them in a robotic observatory software. We describe messages such as GCN notices, VOEvents or RTML, and protocols such as CGI, HTTP, SOAP, RSS, and XMPP.
APA, Harvard, Vancouver, ISO, and other styles
42

Welzl, Michael, Stephan Oepen, Cezary Jaskula, Carsten Griwodz, and Safiqul Islam. "Collaboration in the IETF." ACM SIGCOMM Computer Communication Review 51, no. 3 (2021): 29–32. http://dx.doi.org/10.1145/3477482.3477488.

Full text
Abstract:
RFC 9000, published in May 2021, marks an important milestone for the Internet's standardization body, the Internet Engineering Task Force (IETF): finally, the specification of the QUIC protocol is available. QUIC is the result of a five-year effort - and it is also the second of two major protocols (the first being SPDY, which later became HTTP/2) that Google LLC first deployed, and then brought to the IETF for standardization. This begs the question: when big players follow such a "shoot first, discuss later" approach, is IETF collaboration still "real", or is the IETF now being (mis-)used t
APA, Harvard, Vancouver, ISO, and other styles
43

Shradha Kohli. "Data Stream Protocols for Real-Time Messaging : Optimizing Performance and Reliability." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 5 (2024): 355–68. http://dx.doi.org/10.32628/cseit241051058.

Full text
Abstract:
This article explores the design and implementation of data stream protocols for real-time messaging, focusing on key aspects that contribute to their performance and reliability. It examines protocol architectures, data formatting and serialization techniques, error handling mechanisms, and quality of service features. The article compares popular protocols such as WebSocket and MQTT, discusses performance optimization techniques, and addresses security considerations. Emerging trends like WebTransport, HTTP/3, and edge computing integration are also explored, highlighting their potential to
APA, Harvard, Vancouver, ISO, and other styles
44

Rasooli, Abdul Qadeer, Khan Mohammad Habibi, and Sahnosh Rahguzar. "INTEGRATION OF APPLICATION LAYER SERVICES WITH CENTRAL AUTHENTICATION SERVER IN EXAMPLE OF HTTP AND FTP RESTRICTION." ZONAsi: Jurnal Sistem Informasi 4, no. 1 (2022): 1–17. http://dx.doi.org/10.31849/zn.v4i1.8668.

Full text
Abstract:
Nowadays it is very important to have an authenticated and secure network. hackers are always one step further and try to steal credentials or doing malicious actions. Many organizations implement strong authentication systems for taking drastic security measures to prevent threats and vulnerabilities. This paper describes integration of application layer services with central authentication server called Lightweight Directory Access Protocol(LDAP), it covers detailed mechanism to control and restrict any software application or network services which may implement and require central authenti
APA, Harvard, Vancouver, ISO, and other styles
45

Bernabeu, Gerard, Francisco Martinez, Esther Acción, et al. "Experiences with http/WebDAV protocols for data access in high throughput computing." Journal of Physics: Conference Series 331, no. 7 (2011): 072003. http://dx.doi.org/10.1088/1742-6596/331/7/072003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Netto, Joao Evangelista, Edesio Hernane Paulicena, Rafael Amorim Silva, and Alessandro Anzaloni. "Analysis of Energy Consumption Using HTTP and FTP Protocols Over IEEE 802.11." IEEE Latin America Transactions 12, no. 4 (2014): 668–74. http://dx.doi.org/10.1109/tla.2014.6868868.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

da Cruz, Mauro A. A., Joel J. P. C. Rodrigues, Pascal Lorenz, Petar Solic, Jalal Al-Muhtadi, and Victor Hugo C. Albuquerque. "A proposal for bridging application layer protocols to HTTP on IoT solutions." Future Generation Computer Systems 97 (August 2019): 145–52. http://dx.doi.org/10.1016/j.future.2019.02.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Nobelis, N., K. Boudaoud, C. Delettre, and M. Riveill. "Designing Security Properties-Centric Communication Protocols using a Component-Based Approach." International Journal of Distributed Systems and Technologies 3, no. 1 (2012): 1–16. http://dx.doi.org/10.4018/jdst.2012010101.

Full text
Abstract:
Numerous communication protocols have been designed offering a set of security properties through the use of cryptographic tools to secure electronic document transfer. However, there is no clear match between the tools used and security properties they offer. To solve this problem, the authors propose to use a component-based approach; more specifically the authors introduce the notion of high-level security component where each component provides an atomic security property. This approach will facilitate the design of new protocols that fulfill any specific set of security properties by asse
APA, Harvard, Vancouver, ISO, and other styles
49

Smith, Jean-Pierre, Prateek Mittal, and Adrian Perrig. "Website Fingerprinting in the Age of QUIC." Proceedings on Privacy Enhancing Technologies 2021, no. 2 (2021): 48–69. http://dx.doi.org/10.2478/popets-2021-0017.

Full text
Abstract:
Abstract With the meteoric rise of the QUIC protocol, the supremacy of TCP as the de facto transport protocol underlying web traffic will soon cease. HTTP/3, the next version of the HTTP protocol, will not support TCP. Current website-fingerprinting literature has ignored the introduction of this new protocol to all modern browsers. In this work, we investigate whether classifiers trained in the TCP setting generalise to QUIC traces, whether QUIC is inherently more difficult to fingerprint than TCP, how feature importance changes between these protocols, and how to jointly classify QUIC and TC
APA, Harvard, Vancouver, ISO, and other styles
50

KULA, Hülya, and Zeynep GÜNAY UÇMAK. "Feline fibroepithelial hyperplasia and current treatment protocols." Journal of Istanbul Veterinary Sciences 6, no. 1 (2022): 18–25. http://dx.doi.org/10.30704/http-www-jivs-net.1031677.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!