Academic literature on the topic 'Internet Protocol (Computer network protocol)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Internet Protocol (Computer network protocol).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Internet Protocol (Computer network protocol)"

1

Keller, Ariane, Daniel Borkmann, Stephan Neuhaus, and Markus Happe. "Self-Awareness in Computer Networks." International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.

Full text
Abstract:
The Internet architecture works well for a wide variety of communication scenarios. However, its flexibility is limited because it was initially designed to provide communication links between a few static nodes in a homogeneous network and did not attempt to solve the challenges of today’s dynamic network environments. Although the Internet has evolved to a global system of interconnected computer networks, which links together billions of heterogeneous compute nodes, its static architecture remained more or less the same. Nowadays the diversity in networked devices, communication requirements, and network conditions vary heavily, which makes it difficult for a static set of protocols to provide the required functionality. Therefore, we propose a self-aware network architecture in which protocol stacks can be built dynamically. Those protocol stacks can be optimized continuously during communication according to the current requirements. For this network architecture we propose an FPGA-based execution environment called EmbedNet that allows for a dynamic mapping of network protocols to either hardware or software. We show that our architecture can reduce the communication overhead significantly by adapting the protocol stack and that the dynamic hardware/software mapping of protocols considerably reduces the CPU load introduced by packet processing.
APA, Harvard, Vancouver, ISO, and other styles
2

Mardedi, Lalu Zazuli Azhar, and Khairan Marzuki. "Network Rancang Bangun Jaringan Komputer LAN Berdasarkan Perbandingan Kinerja Routing Protokol EIGRP dan Routing Protokol OSPF." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 18, no. 2 (May 29, 2019): 202–10. http://dx.doi.org/10.30812/matrik.v18i2.372.

Full text
Abstract:
Nowadays computer networks are growing rapidly and internet usage is increasing everyday. The need to design an internet network cannot be separated from the routing protocol which functions to integrate all computers with the highest flexibility. Routing is one part that provides effective performance in the network. In comparing the performance of EIGRP and OSPF routing protocols, the implementation of EIGRP and OSPF must be implemented when building a network, so administrators easily know the difference in the performance values of the two routing protocols. The discussion in this study is to compare the performance of the EIGRP routing protocol and OSPF routing protocol that is on the network using the hybird topology. Overcoming problems with high-scale network access, we will analyze and compare performance between EIGRP routing protocol and OSPF routing protocol. In obtaining the value and to verify the results of the implementation, the simulation software uses a Packet Tracer simulator.
APA, Harvard, Vancouver, ISO, and other styles
3

Mutombo, Vially Kazadi, Seungyeon Lee, Jusuk Lee, and Jiman Hong. "EER-RL: Energy-Efficient Routing Based on Reinforcement Learning." Mobile Information Systems 2021 (April 19, 2021): 1–12. http://dx.doi.org/10.1155/2021/5589145.

Full text
Abstract:
Wireless sensor devices are the backbone of the Internet of things (IoT), enabling real-world objects and human beings to be connected to the Internet and interact with each other to improve citizens’ living conditions. However, IoT devices are memory and power-constrained and do not allow high computational applications, whereas the routing task is what makes an object to be part of an IoT network despite of being a high power-consuming task. Therefore, energy efficiency is a crucial factor to consider when designing a routing protocol for IoT wireless networks. In this paper, we propose EER-RL, an energy-efficient routing protocol based on reinforcement learning. Reinforcement learning (RL) allows devices to adapt to network changes, such as mobility and energy level, and improve routing decisions. The performance of the proposed protocol is compared with other existing energy-efficient routing protocols, and the results show that the proposed protocol performs better in terms of energy efficiency and network lifetime and scalability.
APA, Harvard, Vancouver, ISO, and other styles
4

Majid, Nuur Wachid Abdul, and Syifaul Fuada. "RIP VS. OSPF ROUTING PROTOCOLS: WHICH ONE IS THE BEST FOR A REAL-TIME COMPUTER NETWORK?" Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 11, no. 1 (April 30, 2020): 249–56. http://dx.doi.org/10.24176/simet.v11i1.3796.

Full text
Abstract:
The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached. In this short article, we discuss the comparison of two popular routing protocols, i.e., Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) using two network simulators, i.e., Graphical Network Simulator-3 (GNS3) and Enterprise Network Simulation Platform (ENSP). Both of OSPF and RIP routing protocols can be used in the same topology and have differences in the connection time required to connect communication between routers. Thru GNS3 and ENSP, we obtained the comparison result at ideal condition; we found that the OSPF routing protocol (83 ms) has a faster time or efficient in connection than RIP (177 ms). Besides, we found that compared to GNS3 network simulators (329 ms), the ENSP has a relatively more rapid average time (94 ms). This work suggests that a Huawei router with ENSP is faster than a Cisco router which is used by GNS3. Hopefully, this information can be refereed by internet network administrators to build real-time computer networks.
APA, Harvard, Vancouver, ISO, and other styles
5

Anderson, Daniel K., and W. Michael Reed. "The Effects of Internet Instruction, Prior Computer Experience, and Learning Style on Teachers' Internet Attitudes and Knowledge." Journal of Educational Computing Research 19, no. 3 (October 1998): 227–46. http://dx.doi.org/10.2190/8wx1-5q3j-p3bw-jd61.

Full text
Abstract:
What is now called the Internet started out as a small number of federally funded Department of Defense (Advanced Research Project Agency, or ARPA) supercomputers networked together to share information. In order to guarantee data transmission between these nodes, this network (ARPANET) shared a common set of protocols that was designed to allow for high speed and reliable transfer. This protocol suite is TCP/IP (Transmission Control Protocol/Internet Protocol). Most microcomputers now have a TCP/IP implementation available (e.g., MacTCP) and can, therefore, join the millions of computers that have access to the plethora of resources on the Internet. The Internet is not a static set of nodes, not a limited number of library holdings, not a one-directional paradigm of data transmission. Rather, it is a vibrant and absorbing setting that can foster new learning environments, or enrage educators with its diverse commands, lack of direction, and tenuous consistency.
APA, Harvard, Vancouver, ISO, and other styles
6

Sija, Baraka D., Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, and Myung-Sup Kim. "A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View." Security and Communication Networks 2018 (2018): 1–17. http://dx.doi.org/10.1155/2018/8370341.

Full text
Abstract:
A network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented protocols is essential for security purposes, network policy implementation, and management of network resources. This paper reviews and analyzes a total of 39 approaches, methods, and tools towards Protocol Reverse Engineering (PRE) and classifies them into four divisions, approaches that reverse engineer protocol finite state machines, protocol formats, and both protocol finite state machines and protocol formats to approaches that focus directly on neither reverse engineering protocol formats nor protocol finite state machines. The efficiency of all approaches’ outputs based on their selected inputs is analyzed in general along with appropriate reverse engineering inputs format. Additionally, we present discussion and extended classification in terms of automated to manual approaches, known and novel categories of reverse engineered protocols, and a literature of reverse engineered protocols in relation to the seven layers’ OSI (Open Systems Interconnection) model.
APA, Harvard, Vancouver, ISO, and other styles
7

KOVACIK, Cyril Filip, and Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK." Acta Electrotechnica et Informatica 1335-8243, no. 1338-3957 (June 9, 2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.

Full text
Abstract:
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end devices, determination of the operational properties of this implementation, and their comparison in different conditions. VoIP traffic is compared at different bandwidths and implemented by different configurations of IP protocols. By investigated implementations of IP protocols are meant IPv4, IPv6, and IPv4 protocol with applied NAT. As part of the application of various IP protocols is also compared VoIP communication with a video stream on a local basis. The conclusion of the paper is devoted to the graphical evaluation of these observations and to draw conclusions based on them.
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Yichuan, Han Yu, Xinhong Hei, Binbin Bai, and Wenjiang Ji. "From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT." Security and Communication Networks 2021 (August 2, 2021): 1–13. http://dx.doi.org/10.1155/2021/9179286.

Full text
Abstract:
Internet of Things (IoT) is the development and extension of computer, Internet, and mobile communication network and other related technologies, and in the new era of development, it increasingly shows its important role. To play the role of the Internet of Things, it is especially important to strengthen the network communication information security system construction, which is an important foundation for the Internet of Things business relying on Internet technology. Therefore, the communication protocol between IoT devices is a point that cannot be ignored, especially in recent years; the emergence of a large number of botnet and malicious communication has seriously threatened the communication security between connected devices. Therefore, it is necessary to identify these unknown protocols by reverse analysis. Although the development of protocol analysis technology has been quite mature, it is impossible to identify and analyze the unknown protocols of pure bitstreams with zero a priori knowledge using existing protocol analysis tools. In this paper, we make improvements to the existing protocol analysis algorithm, summarize and learn from the experience and knowledge of our predecessors, improve the algorithm ideas based on the Apriori algorithm idea, and perform feature string finding under the idea of composite features of CFI (Combined Frequent Items) algorithm. The advantages of existing algorithm ideas are combined together to finally propose a more efficient OFS (Optimal Feature Strings) algorithm with better performance in the face of bitstream protocol feature extraction problems.
APA, Harvard, Vancouver, ISO, and other styles
9

Khalid, Madiha, Umar Mujahid, and Muhammad Najam-ul-Islam. "Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks." International Journal of Distributed Sensor Networks 14, no. 8 (August 2018): 155014771879512. http://dx.doi.org/10.1177/1550147718795120.

Full text
Abstract:
Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with the rest of the world. The radio frequency identification system is used as node identification mechanism in the Internet of Thing networks. Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. To reduce the overall cost of radio frequency identification enabled Internet of Thing network security, the researchers use simple bitwise logical operations such as XOR, AND, OR, and Rot and have proposed many ultralightweight mutual authentication protocols. However, almost all the previously proposed protocols were later found to be vulnerable against several attack models. Recently, a new ultralightweight mutual authentication protocol has been proposed which involves only XOR and Rotation functions in its design and claimed to be robust against all possible attack models. In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. We have exploited weak structure of the protocol messages and proposed three attacks against the said protocol: one desynchronization and two full disclosure attacks.
APA, Harvard, Vancouver, ISO, and other styles
10

Omer Farooq, Muhammad. "RIoT: A Routing Protocol for the Internet of Things†." Computer Journal 63, no. 6 (March 17, 2020): 958–73. http://dx.doi.org/10.1093/comjnl/bxaa012.

Full text
Abstract:
Abstract The routing protocol for low-power and lossy networks (RPL) is a standard routing framework for Internet of Things (IoT). It supports multipoint-to-point (MP-to-P), point-to-point (P-to-P) and point-to-multipoint (P-to-MP) communications. It is known that RPL’s control overhead can result in the protocol’s poor performance in P-to-P and P-to-MP communications especially in its non-storing mode of operation. Here, we present a routing protocol for the Internet of Things (RIoT) that supports MP-to-P, P-to-P and P-to-MP communications. The protocol can construct P-to-P and P-to-MP routes with relatively lower control overhead. Another salient feature of RIoT is that it supports multiple gateways in the same network with an aim to reduce memory requirement for storing a forwarding table. Furthermore, RIoT is also capable of handling mobility-based IoT use cases. To facilitate communication among nodes connected to different gateways in the same network, here we also present an inter-gateway communication mechanism. We implemented RIoT in the Contiki operating system, and it is extensively evaluated using emulation and real testbed-based experiments. We analyzed the impact of the number of gateways, radio duty cycling (RDC) and mobility on the routing protocols’ performance. Our results demonstrate that either with or without RDC RIoT demonstrates statistically significantly better packet delivery ratio, per-packet end-to-end delay and control overhead compared to the RPL-based protocol. RIoT’s multi-gateway communication architecture substantially reduces the memory requirement to store a forwarding table. Our results also demonstrate that multiple gateways in a network reduce the network partitioning problem in mobile scenarios. Hence, RIoT also demonstrates better performance in mobile scenarios compared to the RPL-based protocol.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Internet Protocol (Computer network protocol)"

1

Mustell, Eliot John. "Internet Protocol Version 6: The Next Generation?" [Milwaukee, Wis.] : e-Publications@Marquette, 2009. http://epublications.marquette.edu/theses_open/23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Savage, Stefan R. "Protocol design in an uncooperative Internet /." Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/6995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ahmed, Mahad A. (Mahad Mohamed) 1973 Carleton University Dissertation Engineering Systems and Computer. "Performance analysis and improvement of the Open Shortest Path First routing protocol." Ottawa.:, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Williams, James Pate. "A quantitative study of musical instrument digital interface (MIDI) over Internet Protocol (IP) protocols." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Fall/Dissertation/WILLIAMS_JAMES_14.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dechjaroen, Chaiporn. "Performance evaluation of Voice over Internet Protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Dec%5FDechjaroen.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tian, Jun. "A speed adaptive mobile Internet protocol over wireless local area network." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0012700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Grobler, Reinette. "Signalling and scheduling for efficient bulk data transfer in circuit-switched networks." Pretoria : [s.n.], 2006. http://upetd.up.ac.za/thesis/available/etd-05312006-114524/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Felczak, Michael. "(Re)Designing the Internet: a critical constructivist analysis of the next generation Internet Protocol /." Burnaby B.C. : Simon Fraser University, 2005. http://ir.lib.sfu.ca/handle/1892/2132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nemani, Srinivasa Sankar Carlisle W. Homer. "Investigation of EtherYatri's compatibility with IPV6." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Summer/Theses/NEMANI_SRINIVASA_48.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yu, Shui, and mikewood@deakin edu au. "Anycast services and its applications." Deakin University. School of Information Technology, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20051208.112407.

Full text
Abstract:
Anycast in next generation Internet Protocol is a hot topic in the research of computer networks. It has promising potentials and also many challenges, such as architecture, routing, Quality-of-Service, anycast in ad hoc networks, application-layer anycast, etc. In this thesis, we tackle some important topics among them. The thesis at first presents an introduction about anycast, followed by the related work. Then, as our major contributions, a number of challenging issues are addressed in the following chapters. We tackled the anycast routing problem by proposing a requirement based probing algorithm at application layer for anycast routing. Compared with the existing periodical based probing routing algorithm, the proposed routing algorithm improves the performance in terms of delay. We addressed the reliable service problem by the design of a twin server model for the anycast servers, providing a transparent and reliable service for all anycast queries. We addressed the load balance problem of anycast servers by proposing new job deviation strategies, to provide a similar Quality-of-Service to all clients of anycast servers. We applied the mesh routing methodology in the anycast routing in ad hoc networking environment, which provides a reliable routing service and uses much less network resources. We combined the anycast protocol and the multicast protocol to provide a bidirectional service, and applied the service to Web-based database applications, achieving a better query efficiency and data synchronization. Finally, we proposed a new Internet based service, minicast, as the combination of the anycast and multicast protocols. Such a service has potential applications in information retrieval, parallel computing, cache queries, etc. We show that the minicast service consumes less network resources while providing the same services. The last chapter of the thesis presents the conclusions and discusses the future work.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Internet Protocol (Computer network protocol)"

1

OSPF: Anatomy of an Internet routing protocol. Reading, Mass: Addison-Wesley, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Elissa, Keeler, ed. Internet direct: Connecting through SLIP and PPP. New York: MIS:Press, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

IPv6--the new Internet protocol. 2nd ed. Upper Saddle River, NJ: Prentice Hall PTR, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Huitema, Christian. IPv6--the new Internet protocol. Upper Saddle River, N.J: Prentice Hall PTR, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Perea, Rogelio Martínez. Internet multimedia communications using SIP: A modern approach including Java practice. Amsterdam: Elsevier/Morgan Kaufmann, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

The simple book: An introduction to internet management. 2nd ed. Englewood Cliffs, N.J: PTR Prentice Hall, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

1968-, Sladden Darryl, and Zakaria Swapan, A. T. M., 1970-, eds. SIP trunking. Indianapolis, Ind: Cisco Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Miller, Mark A. Internet Technologies Handbook. New York: John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mobile IP the Internet unplugged. Upper Saddle River, N.J: PTR Prentice Hall, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Miller, Stewart S. IPv6: The next generation internet protocol. Boston: Digital Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Internet Protocol (Computer network protocol)"

1

Zeadally, Sherali, and Farhan Siddiqui. "Voice Over Internet Protocol." In Handbook of Computer Networks, 468–87. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118256114.ch31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Howser, Gerry. "Route Interchange Protocol." In Computer Networks and the Internet, 245–69. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Howser, Gerry. "Hyper Text Transfer Protocol: TheWeb." In Computer Networks and the Internet, 375–83. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Howser, Gerry. "Simple Mail Transfer Protocol: Email." In Computer Networks and the Internet, 385–417. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ar-Reyouchi, El Miloud, Yousra Lamrani, Imane Benchaib, Salma Rattal, and Kamal Ghoumid. "NCBP: Network Coding Based Protocol for Recovering Lost Packets in the Internet of Things." In Communications in Computer and Information Science, 38–49. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61143-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wu, Hao, Hengliang Tang, and Lan Dong. "A Novel Routing Protocol Based on Mobile Social Networks and Internet of Vehicles." In Lecture Notes in Computer Science, 1–10. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11167-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ueno, Hidetoshi, Norihiro Ishikawa, Hideharu Suzuki, Hiromitsu Sumino, and Osamu Takahashi. "Performance Evaluation on WAP and Internet Protocol over 3G Wireless Networks." In NETWORKING 2002: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications, 527–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-47906-6_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yuan, Weihai, and Yaping Li. "Study on the Safety Technology of Internet Protocol Television Based on Tri-Networks Integration." In Computer Science for Environmental Engineering and EcoInformatics, 60–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22691-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Weik, Martin H. "protocol/Internet Protocol." In Computer Science and Communications Dictionary, 1362. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_14998.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jerbi, Wassim, Abderrahmen Guermazi, and Hafedh Trabelsi. "Crypto-ECC: A Rapid Secure Protocol for Large-Scale Wireless Sensor Networks Deployed in Internet of Things." In Theory and Applications of Dependable Computer Systems, 293–303. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-48256-5_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Internet Protocol (Computer network protocol)"

1

Parakh, A., and S. Kak. "Internet Voting Protocol Based on Implicit Data Security." In 17th International Conference on Computer Communications and Networks 2008. IEEE, 2008. http://dx.doi.org/10.1109/icccn.2008.ecp.140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tody Ariefianto, W., Yudha Purwanto, and Hendra Wiratama. "Storage Area Network based-on Internet Small Computer Standard Interface optimization using Internet Protocol Multipathing." In 2013 International Conference of Information and Communication Technology (ICoICT). IEEE, 2013. http://dx.doi.org/10.1109/icoict.2013.6574590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Thamthawornsakul, Parinya, and Suvepon Sittichivapak. "A design of self-authenticated Internet Protocol for Network Access Control." In 2016 13th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON). IEEE, 2016. http://dx.doi.org/10.1109/ecticon.2016.7561273.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Oppermann, Felix Jonathan, Carlo Alberto Boano, Marco Antonio Zuniga, and Kay Romer. "Automatic protocol configuration for dependable internet of things applications." In 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops). IEEE, 2015. http://dx.doi.org/10.1109/lcnw.2015.7365923.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Islam, Salekul, and J. Atwood. "The Internet Group Management Protocol with Access Control (IGMP-AC)." In 2006 31st IEEE Conference on Local Computer Networks. IEEE, 2006. http://dx.doi.org/10.1109/lcn.2006.322142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Li, and Lina Gong. "Design of real-time voice over internet protocol system under bandwidth network." In 2017 5TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2017). Author(s), 2017. http://dx.doi.org/10.1063/1.4981622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Peng, Wei, Song Liu, Kunlun Peng, Jin Wang, and Jin Liang. "A secure publish/subscribe protocol for Internet of Things using identity-based cryptography." In 2016 5th International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2016. http://dx.doi.org/10.1109/iccsnt.2016.8070234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fesehaye, Debessay. "Emulating TCP (A Reliable Internet Protocol) Using a Fixed Point Algorithm." In 2006 31st IEEE Conference on Local Computer Networks. IEEE, 2006. http://dx.doi.org/10.1109/lcn.2006.322085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nagayama, Ryunosuke, Ryohei Banno, and Kazuyuki Shudo. "Identifying Impacts of Protocol and Internet Development on the Bitcoin Network." In 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2020. http://dx.doi.org/10.1109/iscc50000.2020.9219639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zeng, Bin, and Rui Wang. "A novel lookup and routing protocol based on CAN for structured P2P network." In 2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI). IEEE, 2016. http://dx.doi.org/10.1109/cci.2016.7778866.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Internet Protocol (Computer network protocol)"

1

Hardwick, K., and J. Lekashman. Internet Protocol on Network System's HYPERchannel: Protocol Specification. RFC Editor, February 1988. http://dx.doi.org/10.17487/rfc1044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nakamoto, G., R. Durst, C. Growney, J. Andresen, J. Ma, N. Trivedi, R. Quang, and D. Pisano. Identity-Based Internet Protocol Network. Fort Belvoir, VA: Defense Technical Information Center, April 2012. http://dx.doi.org/10.21236/ada562144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mills, D. L. Internet Time Synchronization: The Network Time Protocol. RFC Editor, October 1989. http://dx.doi.org/10.17487/rfc1129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Allende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.

Full text
Abstract:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH, will be no longer secure. Quantum computers will be able to break them within a short period of time. Similarly, Grover's algorithm concedes a quadratic advantage for mining blocks in certain consensus protocols such as proof of work. Today, there are hundreds of billions of dollars denominated in cryptocurrencies that rely on blockchain ledgers as well as the thousands of blockchain-based applications storing value in blockchain networks. Cryptocurrencies and blockchain-based applications require solutions that guarantee quantum resistance in order to preserve the integrity of data and assets in their public and immutable ledgers. We have designed and developed a layer-two solution to secure the exchange of information between blockchain nodes over the internet and introduced a second signature in transactions using post-quantum keys. Our versatile solution can be applied to any blockchain network. In our implementation, quantum entropy was provided via the IronBridge Platform from CQC and we used LACChain Besu as the blockchain network.
APA, Harvard, Vancouver, ISO, and other styles
5

Chadalapaka, M., J. Satran, K. Meth, and D. Black. Internet Small Computer System Interface (iSCSI) Protocol (Consolidated). RFC Editor, April 2014. http://dx.doi.org/10.17487/rfc7143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mills, D. L. Measured performance of the Network Time Protocol in the Internet system. RFC Editor, October 1989. http://dx.doi.org/10.17487/rfc1128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kazovsky, Leonid G., Ian White, Matt Rogge, Kapil Shrikhande, and Erie Hu. Internet Protocol-Hybrid Opto-Electronic Ring Network (IP-HORNET): A Novel Internet Protocol-Over-Wavelength Division Multiplexing (IP-Over-WDM) Multiple-Access Metropolitan Area Network (MAN). Fort Belvoir, VA: Defense Technical Information Center, April 2003. http://dx.doi.org/10.21236/ada415560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sarkar, P., D. Missimer, and C. Sapuntzakis. Bootstrapping Clients using the Internet Small Computer System Interface (iSCSI) Protocol. RFC Editor, September 2005. http://dx.doi.org/10.17487/rfc4173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cleveland, William S., Hui Chen, Bowei Xi, and Jin Cao. Internet Protocol (IP) Network Measurement, Characterization, Modeling, and Control for Self-Managed Networks. Fort Belvoir, VA: Defense Technical Information Center, September 2005. http://dx.doi.org/10.21236/ada439560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Krueger, M., and R. Haagens. Small Computer Systems Interface protocol over the Internet (iSCSI) Requirements and Design Considerations. RFC Editor, July 2002. http://dx.doi.org/10.17487/rfc3347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography