To see the other types of publications on this topic, follow the link: Packet trace.

Journal articles on the topic 'Packet trace'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Packet trace.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yang, Ming, and Nikolaos Bourbakis. "ANALYSIS, MODELING AND SIMULATION OF NETWORK TRACES FOR VIDEO TRANSMISSION OVER IP NETWORKS." Journal of Integrated Design and Process Science: Transactions of the SDPS, Official Journal of the Society for Design and Process Science 13, no. 1 (2009): 15–32. http://dx.doi.org/10.3233/jid-2009-13102.

Full text
Abstract:
In the best-effort IP network, quality of service (QoS) cannot be guaranteed, and thus packets could possibly be delayed or lost. Packet delay/loss will inevitably degrade the perceptual quality of real-time multimedia-over-IP service, such as Voice-over-IP (VoIP), Video-on-Demand (VoD), etc. In general, packet loss/delay exhibits temporal dependence. In order to efficiently conduct error recovery/concealment and improve the perceptual quality of the transmitted multimedia contents, packet loss/delay has to be precisely modeled. Different mathematical models, such as Bernoulli Model, Gilbert M
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Ming Hour. "Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/239280.

Full text
Abstract:
Traceback schemes have been proposed to trace the sources of attacks that usually hide by spoofing their IP addresses. Among these methods, schemes using packet logging can achieve single-packet traceback. But packet logging demands high storage on routers and therefore makes IP traceback impractical. For lower storage requirement, packet logging and packet marking are fused to make hybrid single-packet IP traceback. Despite such attempts, their storage still increases with packet numbers. That is why RIHT bounds its storage with path numbers to guarantee low storage. RIHT uses IP header’s ID
APA, Harvard, Vancouver, ISO, and other styles
3

ARYANTA, DWI, and BAYU AGUNG PRANATA. "Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 2, no. 2 (2014): 85. http://dx.doi.org/10.26760/elkomika.v2i2.85.

Full text
Abstract:
ABSTRAKOSPF (Open Shortest Path First) dan EIGRP (Enhanced Interior Gateway Routing Protocol) adalah dua routing protokol yang banyak digunakan dalam jaringan komputer. Perbedaan karakteristik antar routing protokol menimbulkan masalah dalam pengiriman paket data. Teknik redistribution adalah solusi untuk melakukan komunikasi antar routing protokol. Dengan menggunakan software Cisco Packet Tracer 5.3 pada penelitian ini dibuat simulasi OSPF dan EIGRP yang dihubungkan oleh teknik redistribution, kemudian dibandingkan kualitasnya dengan single routing protokol EIGRP dan OSPF. Parameter pengujian
APA, Harvard, Vancouver, ISO, and other styles
4

Pang, Ruoming, Mark Allman, Vern Paxson, and Jason Lee. "The devil and packet trace anonymization." ACM SIGCOMM Computer Communication Review 36, no. 1 (2006): 29–38. http://dx.doi.org/10.1145/1111322.1111330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dennis, Simone, and Helen Alexiou. "(Re)making smoking: Of packets and practice." Journal of Material Culture 23, no. 4 (2018): 459–71. http://dx.doi.org/10.1177/1359183518799537.

Full text
Abstract:
Taking as foundational the well-established anthropological idea that material things can be determinative of expectations and practice, the authors advance the notion that packets are constitutive of smoking in the era of smokefree legislation. Adorned with warnings, graphic messaging and particular colouration, they say that packets do not simply respond to the ‘problem’ of smoking; they are actively involved in remaking it anew, in, with and for the smokefree context, in which smoking is purposefully denormalized. Focusing in the main on the graphic images that ‘plain’ packets bear, they tr
APA, Harvard, Vancouver, ISO, and other styles
6

ARYANTA, DWI, ARSYAD RAMADHAN DARLIS, and DIMAS PRIYAMBODHO. "Analisis Kinerja EIGRP dan OSPF pada Topologi Ring dan Mesh." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 2, no. 1 (2014): 53. http://dx.doi.org/10.26760/elkomika.v2i1.53.

Full text
Abstract:
ABSTRAKEIGRP (Enhanced Interior Gateway Routing Protocol) dan OSPF (Open Shortest Path Fisrt) adalah routing protokol yang banyak digunakan pada suatu jaringan komputer. EIGRP hanya dapat digunakan pada perangkat Merk CISCO, sedangkan OSPF dapat digunakan pada semua merk jaringan. Pada penelitian ini dibandingkan delay dan rute dari kedua routing protokol yang diimplementasikan pada topologi Ring dan Mesh. Cisco Packet Tracer 5.3 digunakan untuk mensimulasikan kedua routing protokol ini. Skenario pertama adalah perancangan jaringan kemudian dilakukan pengujian waktu delay 100 kali dalam 5 kasu
APA, Harvard, Vancouver, ISO, and other styles
7

Paxson, Vern. "Automated packet trace analysis of TCP implementations." ACM SIGCOMM Computer Communication Review 27, no. 4 (1997): 167–79. http://dx.doi.org/10.1145/263109.263160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Et. al., Dr B. Shadaksharappa,. "Attack Prediction By Using Greedy Algorithm For Diminishing The Drop And Delay In Wireless Sensor Networks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 1072–82. http://dx.doi.org/10.17762/turcomat.v12i6.2425.

Full text
Abstract:
The essential constraint of the internet is that forwarding the data packets of data among the restricted and trustworthy data nodes. If the receiver node is attacker node then it'll drop the data rather than forwarding the data to ensuing neighbor node. Therefore, efficient and secure data transmission is extremely necessary within the network data transmission. Each router node within the network can accept the data packets up to its buffer size only. Once the queue value reached the buffer threshold value then congestion can occur at the node. Once congestion happens then it would lose the
APA, Harvard, Vancouver, ISO, and other styles
9

Memon, Mudasar Latif, Mukesh Kumar Maheshwari, Navrati Saxena, Abhishek Roy, and Dong Ryeol Shin. "Artificial Intelligence-Based Discontinuous Reception for Energy Saving in 5G Networks." Electronics 8, no. 7 (2019): 778. http://dx.doi.org/10.3390/electronics8070778.

Full text
Abstract:
5G is expected to deal with high data rates for different types of wireless traffic. To enable high data rates, 5G employs beam searching operation to align the best beam pairs. Beam searching operation along with high order modulation techniques in 5G, exhausts the battery power of user equipment (UE). LTE network uses discontinuous reception (DRX) with fixed sleep cycles to save UE energy. LTE-DRX in current form cannot work in 5G network, as it does not consider multiple beam communication and the length of sleep cycle is fixed. On the other hand, artificial intelligence (AI) has a tendency
APA, Harvard, Vancouver, ISO, and other styles
10

Spiekermann, Daniel, and Jörg Keller. "Requirements for Crafting Virtual Network Packet Captures." Journal of Cybersecurity and Privacy 2, no. 3 (2022): 516–26. http://dx.doi.org/10.3390/jcp2030026.

Full text
Abstract:
Currently, network environments are complex infrastructures with different levels of security, isolation and permissions. The management of these networks is a complex task, faced with different issues such as adversarial attacks, user demands, virtualisation layers, secure access and performance optimisation. In addition to this, forensic readiness is a demanded target. To cover all these aspects, network packet captures are used to train new staff, evaluate new security features and improve existing implementations. Because of this, realistic network packet captures are needed that cover all
APA, Harvard, Vancouver, ISO, and other styles
11

Liu, X., J. Xu, J. Yue, and S. L. Vadas. "Numerical modeling study of the momentum deposition of small amplitude gravity waves in the thermosphere." Annales Geophysicae 31, no. 1 (2013): 1–14. http://dx.doi.org/10.5194/angeo-31-1-2013.

Full text
Abstract:
Abstract. We study the momentum deposition in the thermosphere from the dissipation of small amplitude gravity waves (GWs) within a wave packet using a fully nonlinear two-dimensional compressible numerical model. The model solves the nonlinear propagation and dissipation of a GW packet from the stratosphere into the thermosphere with realistic molecular viscosity and thermal diffusivity for various Prandtl numbers. The numerical simulations are performed for GW packets with initial vertical wavelengths (λz) ranging from 5 to 50 km. We show that λz decreases in time as a GW packet dissipates i
APA, Harvard, Vancouver, ISO, and other styles
12

Bhuvaneshwari, P., and T. R. Jaya Chandra Lekha. "Design of Advanced High Performance Bus Tracer in System on Chip Using Matrix Based Compression for Low Power Applications." Journal of Computational and Theoretical Nanoscience 17, no. 4 (2020): 1852–56. http://dx.doi.org/10.1166/jctn.2020.8453.

Full text
Abstract:
This project proposes multilayer advanced high-performance bus architecture for low power applications. The proposed AHB architecture consists of the bus arbiter and the bus tracer (A.R.M.A., 1999. Specification (Rev 2.0) ARM IHI0011A). The bus arbiter, which is self motivated selects the input packet based on the control signals of the incoming packet. So that arbitration leads to a maximum performance. The On-Chip bus is an important system-on-chip infrastructure that connects major hardware components. Monitoring the on-chip bus signals is crucial to the SoC debugging and performance analys
APA, Harvard, Vancouver, ISO, and other styles
13

D., D., D. .., and B. Samitha. "Efficacious Framework for The Detection of Link Flooding Attack in Mobile Ad Hoc Network." International Journal of Wireless and Ad Hoc Communication 9, no. 1 (2025): 61–65. https://doi.org/10.54216/ijwac.090105.

Full text
Abstract:
A novel honey pot deception trace back model, or honey pot IDS, is offered. The system is located on the server, which is the site of network intrusion deceptions. From there, it keeps an eye on all incoming traffic and uses nodes that carry out network weight age studies to continuously weigh the data. For every client connected to the server, it serves as a construct to look at the packet analysis and transmission path to which the IP processed the intrusion detection system. This LF-IDS detects intrusions using both anomaly-based and rule-based intrusion detection methods. By gathering and
APA, Harvard, Vancouver, ISO, and other styles
14

K.S, Poornima, and Nandhni J.P. "Enhanced RRED to Counter LDoS Attacks." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 08 (2013): 252–55. https://doi.org/10.5281/zenodo.14613317.

Full text
Abstract:
This paper provides an enhancement technique and algorithm to the Robust RED packet dropping algorithm in order to intelligently make packet drops and also to trace the IP addresses on a rough approximate of the creators of the low rate DoS attack. This technique also reduces the time complexity of the algorithm. 
APA, Harvard, Vancouver, ISO, and other styles
15

Lan, Haoliang, Jie Xu, Qun Wang, and Wei Ding. "Packet Loss Measurement Based on Sampled Flow." Symmetry 13, no. 11 (2021): 2149. http://dx.doi.org/10.3390/sym13112149.

Full text
Abstract:
This paper is devoted to further strengthening, in the current asymmetric information environment, the informed level of operators about network performance. Specifically, in view of the burst and perishability of a packet loss event, to better meet the real-time requirements of current high-speed backbone performance monitoring, a model for Packet Loss Measurement at the access network boundary Based on Sampled Flow (PLMBSF) is presented in this paper under the premise of both cost and real-time. The model overcomes problems such as the inability of previous estimation to distinguish between
APA, Harvard, Vancouver, ISO, and other styles
16

Jiang, Xi, Shinan Liu, Aaron Gember-Jacobson, et al. "NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 1 (2024): 1–32. http://dx.doi.org/10.1145/3639037.

Full text
Abstract:
Datasets of labeled network traces are essential for a multitude of machine learning (ML) tasks in networking, yet their availability is hindered by privacy and maintenance concerns, such as data staleness. To overcome this limitation, synthetic network traces can often augment existing datasets. Unfortunately, current synthetic trace generation methods, which typically produce only aggregated flow statistics or a few selected packet attributes, do not always suffice, especially when model training relies on having features that are only available from packet traces. This shortfall manifests i
APA, Harvard, Vancouver, ISO, and other styles
17

Jiang, Xi, Shinan Liu, Aaron Gember-Jacobson, et al. "NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation." ACM SIGMETRICS Performance Evaluation Review 52, no. 1 (2024): 85–86. http://dx.doi.org/10.1145/3673660.3655071.

Full text
Abstract:
Datasets of labeled network traces are essential for a multitude of machine learning (ML) tasks in networking, yet their availability is hindered by privacy and maintenance concerns, such as data staleness. To overcome this limitation, synthetic network traces can often augment existing datasets. Unfortunately, current synthetic trace generation methods, which typically produce only aggregated flow statistics or a few selected packet attributes, do not always suffice, especially when model training relies on having features that are only available from packet traces. This shortfall manifests i
APA, Harvard, Vancouver, ISO, and other styles
18

Chen, Jian, Siyu Kuai, Guoliang Chen, Lihua Yu, and Qiwen Zhan. "Dynamical Modulation of Transverse Orbital Angular Momentum in Highly Confined Spatiotemporal Optical Vortex." Photonics 10, no. 2 (2023): 148. http://dx.doi.org/10.3390/photonics10020148.

Full text
Abstract:
Spatiotemporal optical vortices (STOVs) have attracted numerous attention from researchers in recent years due to their intriguing characteristics with transverse orbital angular momentum (OAM) in the spatiotemporal domain. In this work, we numerically analyze the tightly focusing characteristics of higher-order STOVs and present a method to dynamically modulate the transverse OAM in highly confined STOVs. Richards–Wolf vectorial diffraction theory was employed to simulate the three-dimensional spatiotemporal distribution of the focused STOV corresponding to the incident wave packet of topolog
APA, Harvard, Vancouver, ISO, and other styles
19

Ma, Naji, and Ming Diao. "CoFi: Coding-Assisted File Distribution over a Wireless LAN." Symmetry 11, no. 1 (2019): 71. http://dx.doi.org/10.3390/sym11010071.

Full text
Abstract:
The wireless channel is volatile in nature, due to various signal attenuation factors including path-loss, shadowing, and multipath fading. Existing media access control (MAC) protocols, such as the widely adopted 802.11 wireless fidelity (Wi-Fi) family, advocate masking harsh channel conditions with persistent retransmission and backoff, in order to provide a packet-level best-effort service. However, the asymmetry of the network environment of client nodes in space is not fully considered in the method, which leads to the decline of the transmission efficiency of the good ones. In this paper
APA, Harvard, Vancouver, ISO, and other styles
20

Roughan, Matt. "Public review for the devil and packet trace anonymization." ACM SIGCOMM Computer Communication Review 36, no. 1 (2006): 27–28. http://dx.doi.org/10.1145/1111322.1111329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Yatskih, Alex, Yuri Yermolaev, Aleksandr Kosinov, and Nikolay Semionov. "Wave Packet Excitation and its Development in Supersonic Boundary Layer." Siberian Journal of Physics 8, no. 2 (2013): 70–78. http://dx.doi.org/10.54362/1818-7919-2013-8-2-70-78.

Full text
Abstract:
A method of exciting of artificial disturbances localized in space and time (wave packets) in a supersonic boundary layer is developed. Experimental investigations are carried out in the low noise supersonic wind tunnel T-325 at Mach M = 2. A model of a flat steel plate with a sharp leading edge is used. Measurements of mean flow and fluctuations are performed by using a constant temperature anemometer. To generate controlled fluctuations the short time surface glow discharge is used. Measurements of controlled disturbances are synchronized in time with glow discharge ignition. To increase the
APA, Harvard, Vancouver, ISO, and other styles
22

Mustapha, Oba Zubair, Muhammad Ali, Yim Fun Hu, and Raed A. Abd-Alhameed. "Service-aware LSP selection with fuzzy based packet scheduling scheme for non-real time traffics." International Journal of Informatics and Communication Technology (IJ-ICT) 10, no. 2 (2021): 126. http://dx.doi.org/10.11591/ijict.v10i2.pp126-139.

Full text
Abstract:
An essential solution is available in Multi-protocol label switching (MPLS), which solve the problems faced by present-day networks: speed, scalability, quality-of-service (QoS) management, and traffic engineering. This paper is an extension of work on Fuzzy based Packet Scheduling Algorithm (FPSA) combined with Packets Processing Algorithm (PPA) in an Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) networks. This will make provision for an intelligent service to the Label Switched Path (LSP) in MPLS networks. Several research work have been proposed on the MPLS Traffic Engineering.
APA, Harvard, Vancouver, ISO, and other styles
23

Karande, Shirish S., Kiran Misra, and Hayder Radha. "Survival of the Fittest: An Active Queue Management Technique for Noisy Packet Flows." Advances in Multimedia 2007 (2007): 1–10. http://dx.doi.org/10.1155/2007/64695.

Full text
Abstract:
We present a novel active queue management (AQM) technique to demonstrate the efficacy of practically harnessing the predictive utility of SSR indications for improved video communication. We consider a network within which corrupted packets are relayed over multiple hops, but a certain percentage of packets needs to be dropped at an intermediate node due to congestion. We propose an AQM technique,survival of the fittest(SOTF), to be employed at the relay node, within which we use packet state information, available from SSR indications and checksums, to drop packets with the highest corruptio
APA, Harvard, Vancouver, ISO, and other styles
24

Alyami, Mnassar, Abdulmajeed Alghamdi, Mohammed A. Alkhowaiter, Cliff Zou, and Yan Solihin. "Random Segmentation: New Traffic Obfuscation against Packet-Size-Based Side-Channel Attacks." Electronics 12, no. 18 (2023): 3816. http://dx.doi.org/10.3390/electronics12183816.

Full text
Abstract:
Despite encryption, the packet size is still visible, enabling observers to infer private information in the Internet of Things (IoT) environment (e.g., IoT device identification). Packet padding obfuscates packet-length characteristics with a high data overhead because it relies on adding noise to the data. This paper proposes a more data-efficient approach that randomizes packet sizes without adding noise. We achieve this by splitting large TCP segments into random-sized chunks; hence, the packet length distribution is obfuscated without adding noise data. Our client–server implementation us
APA, Harvard, Vancouver, ISO, and other styles
25

Obeidat, Ibrahim, Ala Mughaid, and Shadi Alzoubi. "A Secure Encrypted Protocol for Clients' Handshaking in the Same Network." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 05 (2019): 47. http://dx.doi.org/10.3991/ijim.v13i05.9845.

Full text
Abstract:
<p><strong>Abstract</strong></p><p><strong> </strong></p><p>Users in the same network can trace the data being transmitted amongst users and other users to the internet using many available online tools such as packet sniffers and many packets capturing tools, the need to make the data resistible to be read comes obvious. The proposed solution is to encrypt the data using inscription algorithm. In this paper, we propose a solution to protect Network Clients from other Clients in the same network.</p>
APA, Harvard, Vancouver, ISO, and other styles
26

Ibrahim, Idris Skloul, Peter J. B. King, and Hans-Wolfgang Loidl. "NsGTFA: A GUI Tool to Easily Measure Network Performance through the Ns2 Trace File." Journal of Intelligent Systems 24, no. 4 (2015): 467–77. http://dx.doi.org/10.1515/jisys-2014-0153.

Full text
Abstract:
AbstractNs2 is an open-source communications network simulator primarily used in research and teaching. Ns2 provides substantial support for simulation of TCP, routing, and multicast protocols over wired and wireless networks. Although Ns2 is a widely used powerful simulator, it lacks a way to measure networks that are used to assess reliability and performance metrics (e.g., the number of packets transferred from source to destination, delay in packets, packet loss, etc.) and it does not analyse the trace files it produces. The data obtained from the simulations are not straightforward to ana
APA, Harvard, Vancouver, ISO, and other styles
27

Dong, Wei. "IPMT, an IPv6 Packet Manipulation Tool: Design Considerations and Applications." Applied Mechanics and Materials 543-547 (March 2014): 3040–43. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3040.

Full text
Abstract:
To facilitate research into IPv6 protocol, we propose IPMT in this paper, an IPv6 packet manipulation tool that allows rapid encode and decapsulation of IPv6 frames. IPMT offers capabilities of IPv6 packet manipulation, such as packet encapsulation, packet decapsulation, and packet trace. We mainly focus on IPv6 protocols because most popular network tools that are currently used don't support IPv6. We describe the main features of IPMT and demonstrate how the IPMT programming class enables users to easily develop portable IPv6 packet analysis tools without needing to consider the details of t
APA, Harvard, Vancouver, ISO, and other styles
28

Miyim, Abubakar Muhammad. "Techniques for Throughput Enhancement in Wireless Networks." Journal of Communications Technology, Electronics and Computer Science 4 (February 16, 2016): 1. http://dx.doi.org/10.22385/jctecs.v4i0.11.

Full text
Abstract:
In wireless systems, unnecessary signal degradation are caused by spurious timeouts from highly variable round-trip times (RTTs) for transmission control protocol (TCP). This paper proposes two methods of improving TCP throughput in wireless networks. Selecting a threshold higher than standard for retransmission timeout (RTO) and use of select-N-repeat (SNR) and trace-N-retransmit (TNR) as retransmission policies upon packet timeout are the two techniques adopted in this study. Simulations reveals that the former method helps reduce timeouts and provides relative throughput gain in a simulated
APA, Harvard, Vancouver, ISO, and other styles
29

AlArnaout, Zakwan, Nour Mostafa, Samer Alabed, Wael Hosny Fouad Aly, and Ahmed Shdefat. "RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks." Sensors 23, no. 1 (2022): 102. http://dx.doi.org/10.3390/s23010102.

Full text
Abstract:
In the recent past, Distributed Denial of Service (DDoS) attacks have become more abundant and present one of the most serious security threats. In a DDoS attack, the attacker controls a botnet of daemons residing in vulnerable hosts that send a significant amount of traffic to flood the victim or the network infrastructure. In this paper, a common type of DDoS attacks known as “TCP SYN-Flood” is studied. This type of attack uses spoofed Internet Protocol (IP) addresses for SYN packets by exploiting the weakness in Transmission Control Protocol (TCP) 3-Way handshake used by the TCP/IP suite of
APA, Harvard, Vancouver, ISO, and other styles
30

Ohkuwa, Y., and T. Kitazoe. "Wave Packet in Quantum Cosmology and Definition of Semiclassical Time." International Journal of Modern Physics A 12, no. 05 (1997): 859–71. http://dx.doi.org/10.1142/s0217751x97000657.

Full text
Abstract:
We consider a quantum cosmology with a massless background scalar field ϕB and adopt a wave packet as the wave function. This wave packet is a superposition of the WKB form wave functions, each of which has a definite momentum of the scalar field ϕB. In this model it is shown that to trace the formalism of the WKB time is seriously difficult without introducing a complex value for a time. We define a semiclassical real time variable TP from the phase of the wave packet and calculate it explicitly. We find that, when a quantum matter field ϕQ is coupled to the system, an approximate Schrödinger
APA, Harvard, Vancouver, ISO, and other styles
31

Rusek, Krzysztof, Lucjan Janowski, and Zdzisław Papir. "Transient and stationary characteristics of a packet buffer modelled as an MAP/SM/1/b system." International Journal of Applied Mathematics and Computer Science 24, no. 2 (2014): 429–42. http://dx.doi.org/10.2478/amcs-2014-0033.

Full text
Abstract:
Abstract A packet buffer limited to a fixed number of packets (regardless of their lengths) is considered. The buffer is described as a finite FIFO queuing system fed by a Markovian Arrival Process (MAP) with service times forming a Semi-Markov (SM) process (MAP /SM /1/b in Kendall’s notation). Such assumptions allow us to obtain new analytical results for the queuing characteristics of the buffer. In the paper, the following are considered: the time to fill the buffer, the local loss intensity, the loss ratio, and the total number of losses in a given time interval. Predictions of the proposed m
APA, Harvard, Vancouver, ISO, and other styles
32

Mohammed, Alenezi, and J. Reed Martin. "TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS." International Journal of Network Security & Its Applications (IJNSA) 5, no. 2 (2013): 131–42. https://doi.org/10.5281/zenodo.4011669.

Full text
Abstract:
Denial of service (DoS) is a significant security threat in open networks such as the Internet. The existing limitations of the Internet protocols and the common availability tools make a DoS attack both effective and easy to launch. There are many different forms of DoS attack and the attack size could be amplified from a single attacker to a distributed attack such as a distributed denial of service (DDoS). IP traceback is one important tool proposed as part of DoS mitigation and a number of traceback techniques have been proposed including probabilistic packet marking (PPM). PPM is a promis
APA, Harvard, Vancouver, ISO, and other styles
33

Tanveer Baig, Z., and Chandrasekar Shastry. "Smart Hybridized Routing Protocol for Animal Monitoring and Tracking Applications." Scalable Computing: Practice and Experience 23, no. 4 (2022): 339–49. http://dx.doi.org/10.12694/scpe.v23i4.2040.

Full text
Abstract:
Wireless sensor networks (WSN) have been exploited for {countless} application domains, most notably the surveillance of environments and habitats, which has already become a critical mission. As a result, WSNs have been implemented to monitor animal care and track their health status. However, excessive energy utilization and communication traffic on packet transmissions lead to system deterioration, especially whenever perceived information captured in the monitoring area is transferred to the access point over multiple dynamic sinks. Further to manage the energy and data transmission issue,
APA, Harvard, Vancouver, ISO, and other styles
34

Sarkar, Shambhu. "Challenges for Implementing Pharmaceuticals Drugs Traceability in Developing Countries." International Journal of Research Publications 103, no. 1 (2022): 760–66. https://doi.org/10.47119/IJRP1001031620223477.

Full text
Abstract:
The purpose of this paper is to focus on the challenges for the implementing digital traceability of pharmaceuticals drugs in developing countries. The digital traceability of pharmaceutical drugs has been proving a very impactful process to minimize the risk of counterfeit and illicit drugs in the market. Developed countries like Unites States of America in 2018, and Europe in 2019, made unique identifier with 2D barcode mandatory in each drugs packet. Unique identifier on each packets provide provision of digital traceability since drug manufacturers encode them and keep the data in their re
APA, Harvard, Vancouver, ISO, and other styles
35

Lin, Yi-Bing. "Parallel trace-driven simulation for packet loss in finite-buffered voice multiplexers." Parallel Computing 19, no. 2 (1993): 219–28. http://dx.doi.org/10.1016/0167-8191(93)90051-l.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Lin, Yi-Bing. "Parallel trace-driven simulation of packet-switched multiplexer under priority scheduling policy." Information Processing Letters 47, no. 4 (1993): 197–201. http://dx.doi.org/10.1016/0020-0190(93)90032-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Peng, Han Chuan, Li Feng Sha, Qiang Gan, and Yu Wei. "Combining adaptive sigmoid packet and trace neural network for fast invariance-learning." Electronics Letters 34, no. 9 (1998): 898. http://dx.doi.org/10.1049/el:19980667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Marciniak, Marian. "Towards broadband global optical and wireless networking." Journal of Telecommunications and Information Technology, no. 3 (September 30, 2004): 1–6. http://dx.doi.org/10.26636/jtit.2004.3.249.

Full text
Abstract:
This paper presents a novel, non-conventional approach to the future optical and wireless hybrid transport network, capable of supporting dominant kinds of traffic, i.e., voice/real time, wireless and packet data traffic in a single transport network. The proposed model combines different technologies as connection and connectionless networks, optical cable and wireless (microwave/millimetre wave or optical wireless), being suitable for a variety of purposes and services in order to achieve global broadband networking features. Our new networking model contains an extension to wireless world i
APA, Harvard, Vancouver, ISO, and other styles
39

RAHMIATI, PAULINE, DWI ARYANTA, and TAUFIQ AGUNG PRIYADI. "Perancangan dan Analisis Perbandingan Implementasi OSPF pada Jaringan IPv4 dan IPv6." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 2, no. 1 (2014): 40. http://dx.doi.org/10.26760/elkomika.v2i1.40.

Full text
Abstract:
ABSTRAKOSPF (Open Shortest Path First) adalah suatu routing protokol bersifat terbuka dan didukung oleh berbagai perangkat network. IPv4 telah mencapai batas maksimum dalam jumlah alamat sehingga IPv6 merupakan solusi dalam hal tersebut. Seperti IPv4, IPv6 juga sudah mulai diimplementasikan untuk routing protokol OSPF, oleh karena itu pada penelitian ini akan dirancang suatu routing protokol OSPF IPv6 dan sebagai bahan perbandingan akan dibandingkan dengan OSPF IPv4. Software Cisco Packet Tracer 5.3 digunakan untuk mensimulasikan perancangan jaringan yang dibuat. Pada penelitian ini akan diban
APA, Harvard, Vancouver, ISO, and other styles
40

SAHNI, SARTAJ, and KUN SUK KIM. "EFFICIENT DYNAMIC LOOKUP FOR BURSTY ACCESS PATTERNS." International Journal of Foundations of Computer Science 15, no. 04 (2004): 567–91. http://dx.doi.org/10.1142/s0129054104002625.

Full text
Abstract:
Internet (IP) packet forwarding is typically done by finding the longest prefix in a router table that matches the packet's destination address. Although significant effort has been devoted to the development of data structures for static and dynamic router-tables for random packet-access-patterns, considerably less effort has been expended in the development of such structures for bursty access-patterns (i.e., streams of packets in which destination addresses repeat frequently within localized windows of packets). In this paper, we first formulate a variant, ACRBT (alternative collection of r
APA, Harvard, Vancouver, ISO, and other styles
41

Mishra, Abhishek kumar, Sara Ayoubi, Giulio Grassi, and Renata Teixeira. "NemFi." ACM SIGCOMM Computer Communication Review 51, no. 3 (2021): 2–8. http://dx.doi.org/10.1145/3477482.3477484.

Full text
Abstract:
This paper presents NemFi: a trace-driven WiFi emulator. NemFi is a record-and-replay emulator that captures traces representing real WiFi conditions, and later replay these traces to reproduce the same conditions. In this paper, we demonstrate that the state-of-the-art emulator that was developed for cellular links cannot emulate WiFi conditions. We identify the three key differences that must be addressed to enable accurate WiFi record-and-replay: WiFi packet losses, medium-access control, and frame aggregation. We then extend the existing cellular network emulator to support WiFi record-and
APA, Harvard, Vancouver, ISO, and other styles
42

S. Raj, Jennifer, and Abul Basar. "QOS OPTIMIZATION OF ENERGY EFFICIENT ROUTING IN IOT WIRELESS SENSOR NETWORKS." Journal of ISMAC 01, no. 01 (2019): 12–23. http://dx.doi.org/10.36548/jismac.2019.1.002.

Full text
Abstract:
The internet of things is a group of connected computing, digital and mechanical machines with the capability of being identified by other devices that are internet enabled. The wireless sensor networks is a gathering of sovereign sensing elements in combination with actuating, computing, communicating and energy storing devices to keep track of the continuous physical world changes. These clique of independent sensors that commune wirelessly incurring advantages such as low cost, limited power consumption, high scalability with adaptableness to hostile and harsh environments afford them to be
APA, Harvard, Vancouver, ISO, and other styles
43

Galiana-Merino, J. J., S. Parolai, and J. Rosa-Herranz. "Seismic wave characterization using complex trace analysis in the stationary wavelet packet domain." Soil Dynamics and Earthquake Engineering 31, no. 11 (2011): 1565–78. http://dx.doi.org/10.1016/j.soildyn.2011.06.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Kumar, Subodha, and Georgia Perakis. "A Brief History of the Internet and the World Wide Web." Management and Business Review 2, no. 1 (2022): 67–72. http://dx.doi.org/10.1177/2694105820220201001.

Full text
Abstract:
How did a scientific movement invent the Internet and how did that invention grow into a tool that is difficult to envision living without, particularly during the current pandemic? Subodha Kumar and Georgia Perakis describe how it all began with Leonard Kleinrock’s invention of packet switching technology and the creation of ARPANET in 1969. They then trace how Berners-Lee conceptualized the World Wide Web as an easy-to-use global system for sharing information.
APA, Harvard, Vancouver, ISO, and other styles
45

Jan, Naveed, Ali Al-Bayatti, Naseer Alalwan, and Ahmed Alzahrani. "An Enhanced Source Location Privacy based on Data Dissemination in Wireless Sensor Networks (DeLP)." Sensors 19, no. 9 (2019): 2050. http://dx.doi.org/10.3390/s19092050.

Full text
Abstract:
Wireless Sensor Network is a network of large number of nodes with limited power and computational capabilities. It has the potential of event monitoring in unattended locations where there is a chance of unauthorized access. The work that is presented here identifies and addresses the problem of eavesdropping in the exposed environment of the sensor network, which makes it easy for the adversary to trace the packets to find the originator source node, hence compromising the contextual privacy. Our scheme provides an enhanced three-level security system for source location privacy. The base st
APA, Harvard, Vancouver, ISO, and other styles
46

Zhao, Ning, Xue Li, Mei Yang, and Xin Ting Huang. "Vehicular Ad-Hoc Network and Routing Design." Applied Mechanics and Materials 641-642 (September 2014): 829–32. http://dx.doi.org/10.4028/www.scientific.net/amm.641-642.829.

Full text
Abstract:
To analyze vehicular Ad-Hoc network routing performance, the GPSR routing performance is studied using network simulation software NS2 compared with traffic simulation software VanetMobiSim. 100 nodes communicated with each other was stimulated by adding routing protocol into NS2, building the environment of simulation, setting simulation parameters and writing TCL script. The data packet delivery path was examined by trace files and GPSR routing performance was concluded through Gawk. The average end-to-end transmission delay trends to increase and the average delivery rate trends to drop whe
APA, Harvard, Vancouver, ISO, and other styles
47

Peng, Guang-Qian, Guangtao Xue, and Yi-Chao Chen. "Network Measurement and Performance Analysis at Server Side." Future Internet 10, no. 7 (2018): 67. http://dx.doi.org/10.3390/fi10070067.

Full text
Abstract:
Network performance diagnostics is an important topic that has been studied since the Internet was invented. However, it remains a challenging task, while the network evolves and becomes more and more complicated over time. One of the main challenges is that all network components (e.g., senders, receivers, and relay nodes) make decision based only on local information and they are all likely to be performance bottlenecks. Although Software Defined Networking (SDN) proposes to embrace a centralize network intelligence for a better control, the cost to collect complete network states in packet
APA, Harvard, Vancouver, ISO, and other styles
48

Chilwan, Shihab. "Dataset for DoS Detection Dataset: A Benchmark for AI-Driven Intrusion Detection and DoS Attack Analysis." Science Management Design Journal 2, no. 2 (2024): 22–28. https://doi.org/10.70295/smdj.2412023.

Full text
Abstract:
The "DOS ATTACK" dataset, which consists of network traffic data specially prepared to support the research effort into finding the possibility to trace DoS attacks using artificial intelligence and machine learning-based techniques, has more than 820,000 entries. Labeled instances of attack and normal traffic represent this dataset, which are highly useful for training and evaluation of intrusion detection systems. Some of the notable features include source and destination IP addresses, protocol type, packet size, and TCP-specific flags like SYN and ACK, which are actually quite crucial to o
APA, Harvard, Vancouver, ISO, and other styles
49

Margam Suthar. "Development of Modified Random Waypoint Mobility Model of Routing Protocol for the Mobile ad-hoc Network." Power System Technology 48, no. 1 (2024): 2131–46. http://dx.doi.org/10.52783/pst.483.

Full text
Abstract:
Mobility models are used to evaluate the network protocols of the ad hoc network using the simulation. The random waypoint model is a model for mobility that is usually used for the performance evaluation of ad-hoc mobile networks. Mobile nodes have dynamic mobility in the ad hoc network, so the mobility model plays an important role to evaluate the protocol performance. In this article, we developed modify random waypoint mobility (MRWM) model based on a random waypoint for the mobile ad hoc network. In this article, the comparative analysis of modifying random waypoint mobility and random wa
APA, Harvard, Vancouver, ISO, and other styles
50

Chiesa, Marco, and Fábio L. Verdi. "Network Monitoring on Multi-Pipe Switches." Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, no. 1 (2023): 1–31. http://dx.doi.org/10.1145/3579321.

Full text
Abstract:
Programmable switches have been widely used to design network monitoring solutions that operate in the fast data-plane level, e.g., detecting heavy hitters, super-spreaders, computing flow size distributions and their entropy. Many existing works on networking monitoring assume switches deploy a single memory that is accessible by each processed packet. However, high-speed ASIC switches increasingly deploymultiple independent pipes, each equipped with its own independent memory thatcannot be accessed by other pipes. In this work, we initiate the study of deploying existing heavy-hitter data-pl
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!