Academic literature on the topic 'TCP/IP (Computer network protocol) Computer network protocols. Computer algorithms'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'TCP/IP (Computer network protocol) Computer network protocols. Computer algorithms.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "TCP/IP (Computer network protocol) Computer network protocols. Computer algorithms"

1

YIMING, ALIMUJIANG, and TOSHIO EISAKA. "A SWITCHED ETHERNET PROTOCOL FOR HARD REAL-TIME EMBEDDED SYSTEM APPLICATIONS." Journal of Interconnection Networks 06, no. 03 (September 2005): 345–60. http://dx.doi.org/10.1142/s0219265905001460.

Full text
Abstract:
This paper presents a protocol to support hard real-time traffic of end-to-end communication over non real-time LAN technology. The network is set up with nodes and switches, and real-time communication is handled by software (protocol) added between the Ethernet protocols and the TCP/IP suite. The proposed protocol establishes a virtual circuit based on admission control and manages hard real-time traffic to bypass the TCP/IP stack. This makes considerably reduce the dwell time in the nodes, and increase the achievable data frame rate. After the bypassing, traffic schedule is performed according to dynamic-priority EDF algorithm. The work does not need any modifications in the Ethernet hardware and coexists with TCP/IP suites, and then the LAN with the protocol can be connected to any existing Ethernet networks. It can be adopted in industrial hard real-time applications such as embedded systems, distributed control systems, parallel signal processing and robotics. We have performed some experiments to evaluate the protocol. Compared to some conventional hard real-time network protocols, the proposed one has better real-time performances and meets the requirements of reliability for hard real-time systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Reddy, N. Ramanjaneya, Chenna Reddy Pakanati, and M. Padmavathamma. "An Enhanced Queue Management Scheme for Eradicating Congestion of TFRC over Wired Environment." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 3 (June 1, 2017): 1347. http://dx.doi.org/10.11591/ijece.v7i3.pp1347-1354.

Full text
Abstract:
<p class="Abstract">To accomplish increasing real time requirements, user applications have to send different kinds of data with different speeds over the internet. To effectuate the aims of the computer networks, several protocols have been added to TCP/IP protocol suite. Transport layer has to implement emerging techniques to transfer huge amount of data like multimedia streaming. To transmit multimedia applications, one of the suitable congestion control mechanisms in transport layer is TCP Friendly Rate Control Protocol (TFRC). It controls congestion based on its equation. To get more smoothed throughput, intermediate nodes (like Routers. etc.) have to use suitable procedures in all real time situations. To eradicate the level of congestion in the network, we introduce enhanced Holt-Winters equations to RED queue management algorithm and applied to TFRC. The simulation results have shown that this strategy reduces packet loss and increases throughput.</p>
APA, Harvard, Vancouver, ISO, and other styles
3

Grimmell, William C., and Nageswara S. V. Rao. "On Source-Based Route Computation for Quickest Paths under Dynamic Bandwidth Constraints." International Journal of Foundations of Computer Science 14, no. 03 (June 2003): 503–23. http://dx.doi.org/10.1142/s0129054103001868.

Full text
Abstract:
Routing in the newer generation of network transmission methods may be performed at various levels of the IP stack such as datagram, TCP stream, and application levels. It is important in the use of these methods to compute the routes that minimize the end-to-end delays for the specific routing mechanism. We formulate an abstract network path computation problem, the dynamic quickest path problem, to encompass a number of message forwarding mechanisms including circuit switching, Internet Protocol, and their variations. This problem deals with the transmission of a message from a source to a destination with the minimum end-to-end delay over a network with propagation delays and dynamic bandwidth constraints on the links. The available bandwidth for each link is specified as a piecewise constant function. We present for each message forwarding mechanism or mode an algorithm to compute a path with the minimum end-to-end delay for a given message size. Our algorithms with suitable network restrictions have polynomial time complexity in the size of the network and total number of segments in the bandwidth list.
APA, Harvard, Vancouver, ISO, and other styles
4

Mudassir, Mumajjed Ul, and M. Iram Baig. "MFVL HCCA: A Modified Fast-Vegas-LIA Hybrid Congestion Control Algorithm for MPTCP Traffic Flows in Multihomed Smart Gas IoT Networks." Electronics 10, no. 6 (March 18, 2021): 711. http://dx.doi.org/10.3390/electronics10060711.

Full text
Abstract:
Multihomed smart gas meters are Internet of Things (IoT) devices that transmit information wirelessly to a cloud or remote database via multiple network paths. The information is utilized by the smart gas grid for accurate load forecasting and several other important tasks. With the rapid growth in such smart IoT networks and data rates, reliable transport layer protocols with efficient congestion control algorithms are required. The small Transmission Control Protocol/Internet Protocol (TCP/IP) stacks designed for IoT devices still lack efficient congestion control schemes. Multipath transmission control protocol (MPTCP) based congestion control algorithms are among the recent research topics. Many coupled and uncoupled congestion control algorithms have been proposed by researchers. The default congestion control algorithm for MPTCP is coupled congestion control by using the linked-increases algorithm (LIA). In battery powered smart meters, packet retransmissions consume extra power and low goodput results in poor system performance. In this study, we propose a modified Fast-Vegas-LIA hybrid congestion control algorithm (MFVL HCCA) for MPTCP by considering the requirements of a smart gas grid. Our novel algorithm operates in uncoupled congestion control mode as long as there is no shared bottleneck and switches to coupled congestion control mode otherwise. We have presented the details of our proposed model and compared the simulation results with the default coupled congestion control for MPTCP. Our proposed algorithm in uncoupled mode shows a decrease in packet loss up to 50% and increase in average goodput up to 30%.
APA, Harvard, Vancouver, ISO, and other styles
5

Rajamanickam, Vani, Ushabhanu Nageswaran, and Sangeetha Marikkannan. "Fast Motion Estimation Algorithm using Hybrid Search Patterns for Video Streaming Application." International Journal of Computers Communications & Control 12, no. 5 (September 10, 2017): 715. http://dx.doi.org/10.15837/ijccc.2017.5.2975.

Full text
Abstract:
The objective of the paper is to develop new block matching Motion Estimation (ME) algorithm using hybrid search patterns along the direction of best match. The search efficiency for sequences with fast motions and high resolutions is improved by proposing New Cross Diagonal-Hexagon Search (NCDHS) algorithm which involves a novel multi half-hexagon grid global search pattern and a cross diagonal-hexagon local search pattern. The new search pattern enables the proposed algorithm to perform better search using 9.068 search points on an average, to obtain optimal motion vector with slight improvement in quality. This inturn reduces ME Time upto 50.11%, 47.12%, 32.99% and 43.28% on average when compared to the existing Diamond Search (DS), Hexagon Search (HS), New Cross Hexagon Search (NHEXS) and Enhanced Diamond Search (EDS) algorithms respectively. The novelty of the algorithm is further achieved by applying the algorithm proposed for live streaming application. The NCDHS algorithm is run on two MATLAB sessions on the same computer by establishing the connection using Transmission Control Protocol (TCP) /Internet Protocol (IP) network. The ME Time obtained is 14.5986 seconds for a block size 16x16, is less when compared to existing algorithms and that makes the NCDHS algorithm suitable for real time streaming application.
APA, Harvard, Vancouver, ISO, and other styles
6

Si, Haiping, Changxia Sun, Baogang Chen, Lei Shi, and Hongbo Qiao. "Analysis of Socket Communication Technology Based on Machine Learning Algorithms Under TCP/IP Protocol in Network Virtual Laboratory System." IEEE Access 7 (2019): 80453–64. http://dx.doi.org/10.1109/access.2019.2923052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hu, Yao, Ting Peng, and Lianming Zhang. "Software-Defined Congestion Control Algorithm for IP Networks." Scientific Programming 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/3579540.

Full text
Abstract:
The rapid evolution of computer networks, increase in the number of Internet users, and popularity of multimedia applications have exacerbated the congestion control problem. Congestion control is a key factor in ensuring network stability and robustness. When the underlying network and flow information are unknown, the transmission control protocol (TCP) must increase or reduce the size of the congestion window to adjust to the changes of traffic in the Internet Protocol (IP) network. However, it is possible that a software-defined approach can relieve the network congestion problem more efficiently. This approach has the characteristic of centralized control and can obtain a global topology for unified network management. In this paper, we propose a software-defined congestion control (SDCC) algorithm for an IP network. We consider the difference between TCP and the user datagram protocol (UDP) and propose a new method to judge node congestion. We initially apply the congestion control mechanism in the congested nodes and then optimize the link utilization to control network congestion.
APA, Harvard, Vancouver, ISO, and other styles
8

Arnaudov, Rumen, and Ivo Dochev. "Functional generator controlled by internet." Facta universitatis - series: Electronics and Energetics 16, no. 1 (2003): 93–102. http://dx.doi.org/10.2298/fuee0301093a.

Full text
Abstract:
This paper presents a functional generator controlled by Internet. We describe a computer-system architecture, a block diagram of generator and working algorithms. The remote control is realized by computer networks and using the TCP/IP protocols. For that purpose is used "Customer-Server" architecture. The software algorithms is based on Linux operating system Apache web server, MySql database, HTML and PHP languages.
APA, Harvard, Vancouver, ISO, and other styles
9

Prabadevi, B., and N. Jeyanthi. "Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks." Cybernetics and Information Technologies 17, no. 4 (November 27, 2017): 69–86. http://dx.doi.org/10.1515/cait-2017-0042.

Full text
Abstract:
AbstractThe bridge protocol (Address Resolution Protocol) ARP, integrating Ethernet (Layer 2) and IP protocol (Layer 3) plays a vital role in TCP/IP communication since ARP packet is the first packet generated during any TCP/IP communications and they are the first traffic from the host. In the large data center, as the size of the broadcast domain (i.e., number of hosts on the network) increases consequently the broadcast traffic from the communication protocols like ARP also increases. This paper addresses the problem faced by Layer 2 protocols like insecured communication, scalability issues and VM migration issues. The proposed system addresses these issues by introducing two new types of messaging with traditional ARP and also combat the ARP Cache poisoning attacks like host impersonation, MITM, Distributed DoS by making ARP stateful. The components of the proposed methodology first start the process by decoding the packets, updates the invalid entry made by the user with Timestamp feature and messages being introduced. The system has been implemented and compared with various existing solutions.
APA, Harvard, Vancouver, ISO, and other styles
10

Nour, Boubakr, Hakima Khelifi, Rasheed Hussain, Spyridon Mastorakis, and Hassine Moungla. "Access Control Mechanisms in Named Data Networks." ACM Computing Surveys 54, no. 3 (June 2021): 1–35. http://dx.doi.org/10.1145/3442150.

Full text
Abstract:
Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean-slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the entities that can access the content. In TCP/IP-based AC systems, due to the client-server communication model, the servers control which client can access a particular content. In contrast, ICN-based networks use content names to drive communication and decouple the content from its original location. This phenomenon leads to the loss of control over the content, causing different challenges for the realization of efficient AC mechanisms. To date, considerable efforts have been made to develop various AC mechanisms in NDN. In this article, we provide a detailed and comprehensive survey of the AC mechanisms in NDN. We follow a holistic approach towards AC in NDN where we first summarize the ICN paradigm, describe the changes from channel-based security to content-based security, and highlight different cryptographic algorithms and security protocols in NDN. We then classify the existing AC mechanisms into two main categories: Encryption-based AC and Encryption-independent AC . Each category has different classes based on the working principle of AC (e.g., Attribute-based AC, Name-based AC, Identity-based AC). Finally, we present the lessons learned from the existing AC mechanisms and identify the challenges of NDN-based AC at large, highlighting future research directions for the community.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "TCP/IP (Computer network protocol) Computer network protocols. Computer algorithms"

1

Wu, Chen. "A new TCP protocol based on end-to-end available bandwidth measurement /." View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202005%20WU.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ahmed, Mahad A. (Mahad Mohamed) 1973 Carleton University Dissertation Engineering Systems and Computer. "Performance analysis and improvement of the Open Shortest Path First routing protocol." Ottawa.:, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jourjon, Guillaume Electrical Engineering &amp Telecommunications Faculty of Engineering UNSW. "Towards a versatile transport protocol." Awarded by:University of New South Wales. Electrical Engineering & Telecommunications, 2008. http://handle.unsw.edu.au/1959.4/41480.

Full text
Abstract:
This thesis presents three main contributions that aim to improve the transport layer of the current networking architecture. The transport layer is nowadays dominated by the use of TCP and its congestion control. Recently new congestion control mechanisms have been proposed. Among them, TCP Friendly Hate Control (TFRC) appears to be one of the most complete. Nevertheless this congestion control mechanism, as with TCP, does not take into account either the evolution of the network in terms of Quality of Service and mobility or the evolution of the applications. The first contribution of this thesis is a specialisation of TFRC congestion control to provide a QoS-aware Transport Protocol specifically designed to operate over QoS-enabled networks with bandwidth guarantee mechanisms. This protocol combines a QoS-aware congestion control, which takes into account network-level bandwidth reservations, with full ordered reliability mechanism to provide a transport service similar to TCP. As a result, we obtain the guaranteed throughput at the application level where TCP fails. This protocol is t he first transport protocol compliant with bandwidth guaranteed networks. At the same time the set of network services expands, new technologies have been proposed and deployed at the physical layer. These new technologies are mainly characterised by communications done without wire constraint and the mobility of the end-systems. Furthermore, these technologies are usually deployed on entities where the CPU power and memory storage are limited. The second contribution of this thesis is therefore to propose an adaptation of TFHC to these entities. This is accomplished with the proposition of a new sender-based version of TFHC. This version has been implemented, evaluated and its numerous contributions and advantages compare to usual TFHC version have been demonstrated. Finally, we proposed an optimisation of actual implementations of TFHC. This optimisation first consists in the proposition of an algorithm based on a numerical analysis of the equation used in TFHC and the use of the Newton's algorithm. We furthermore give a first step, with the introduction of a new framework for TFRC, in order to better understand TFHC behaviour and to optimise the computation of the packet loss rate according to loss probability distributions.
APA, Harvard, Vancouver, ISO, and other styles
4

Kassa, Debassey Fesehaye. "Analytic models of TCP performance." Thesis, Stellenbosch : University of Stellenbosch, 2011. http://hdl.handle.net/10019.1/16608.

Full text
Abstract:
Thesis (MSc)--University of Stellenbosch, 2005.
ENGLISH ABSTRACT: The majority of tra c on the Internet uses the Transmission Control Protocol (TCP) as a transport layer protocol for the end-to-end control of information transfer. Measurement, simulation and analytical models are the techniques and tools that can be used to understand and investigate the Internet and its performance. Measurements can only be used to explore existing network scenario or otherwise become costly and in exible with the growth and complexity of the Internet. Simulation models do not scale with the growth of network capacities and the number of users. Computationally e cient analytical models are therefore important tools for investigating, designing, dimensioning and planning IP (Internet Protocol) networks. Existing analytical models of TCP performance are either too simple to capture the internal dynamics of TCP or are too complex to be used to analyze realistic network topologies with several bottleneck links. The literature shows that the xed point algorithm (FPA) is a very useful way of solving analytical models of Internet performance. This thesis presents fast and accurate analytical models of TCP performance with the FPA used to solve them. Apart from what is observed in experimental literature, no comprehensive proof of the convergence and uniqueness of the FPA is given. In this thesis we show how the FPA of analytical models of reliable Internet protocols such as TCP converges to a unique xed point. The thesis speci es the conditions necessary in order to use the FPA for solving analytical models of reliable Internet protocols. We also develop a general implementation algorithm of the FPA of analytical models of TCP performance for realistic and arbitrary network topologies involving heterogenous TCP connections crossing many bottleneck links. The models presented in this thesis give Internet performance metrics, assuming that only basic network parameters such as the network topology, the number of TCP connections, link capacity, distance between network nodes and router bu er sizes are known. To obtain the performance metrics, TCP and network sub{models are used. A closed network of :=G=1 queues is used to develop each TCP sub-model where each queue represents a state of a TCP connection. An M=M=1=K queue is used for each network sub{model which represents the output interface of an IP router with a bu er capacity of K 􀀀��������1 packets. The two sub-models are iteratively solved. We also give closed form expressions for important TCP performance values and distributions. We show how the geometric, bounded geometric and truncated geometric distributions can be used to model reliable protocols such as TCP. We give models of the congestion window cwnd size distribution by conditioning on the slow start threshold ssthresh distribution and vice-versa. We also present models of the probabilities of TCP timeout and triple duplicate ACK receptions. Numerical results based on comparisons against ns2 simulations show that our models are more accurate, simpler and computationally more e cient than another well known TCP model. Our models can therefore be used to rapidly analyze network topologies with several bottlenecks and obtain detailed performance metrics.
AFRIKAANSE OPSOMMING: Die meerderheid van die verkeer op die Internet gebruik die Transmission Control Protocol (TCP) as `n vervoer laag protokol vir die einde-tot-einde kontrole van inligting oordrag. Meting, simulasie en analitiese modelle is die tegnieke en gereedskap wat gebruik kan word om die Internet te ondersoek en verstaan. Meting kan slegs gebruik word om bestaande netwerke scenarios te verken. Meting is duur en onbuigsaam met die groei en samegesteldheid van die Internet. Simulasie modelle skaal nie met die groei van netwerk kapasiteit en gebruikers nie. Analitiese modelle wat berekening e ektief is is dus nodige gereedskap vir die ondersoek, ontwerp, afmeting en beplanning van IP (Internet Protocol) netwerke. Bestaande analitiese TCP modelle is of te eenvoudig om die interne dinamiek van die TCP saam te vat of hulle is te ingewikkeld om realistiese netwerk topologie met heelwat bottelnek skakels te analiseer. Literatuur toon dat die xed point algorithm (FPA) baie handig is vir die oplos van analitiese modelle van Internet verrigting. In hierdie tesis word vinnige en akkurate analitiese modelle van TCP verrigting opgelos deur FPA weergegee. Buiten wat deur eksperimentele literatuur aangedui word is daar geen omvattende bewyse van die konvergensie en uniekheid van die FPA nie. In hierdie tesis word aangedui hoe die FPA van analitiese modelle van betroubare Internet protokolle soos die TCP konvergeer na `n unieke vaste punt. Hierdie tesis spesi seer die voorwaardes benodig om die FPA te gebruik vir die oplos van analitiese modelle van realistiese Internet protokolle. `n Algemene uitvoer algoritme van die FPA van analitiese modelle van TCP vir realistiese en arbitr^ere netwerk topogra e insluitende heterogene TCP konneksies oor baie bottelnek skakels is ontwikkel. Die model in hierdie tesis gee Internet verrigting metodes met die aanname dat slegs basiese netwerk parameters soos netwerk topologie, die aantal TCP konneksies, die konneksie kapasiteit, afstand tussen netwerk nodusse en die roete bu er grotes bekend is. Om die verrigting metodes te verkry, word TCP en netwerk sub-modelle gebruik. `n Geslote netwerk van :=G=1 rye is gebruik om elke TCP sub-model, waar elke ry 'n toestand van `n TCP konneksie voorstel, te ontwikkel. `n M=M=1=K ry is gebruik vir elke netwerk sub-model wat die uitset koppelvlak van `n IP roetemaker met `n bu er kapasiteit van K 􀀀������� 1 pakkies voorstel. Die twee submodelle word iteratief opgelos. Geslote vorm uitdrukkings vir belangrike TCP verrigting waardes en verspreidings word gegee. Daar word getoon hoe geometriese, begrensde geometriese en geknotte geometriese verspreidings gebruik kan word om betroubare protokolle soos die TCP te modelleer. Modelle van die kongestie venster cwnd grootte verspreiding word gegee deur die kondisionering van die stadige aanvang drempel ssthresh verspreiding en andersom. Modelle van die voorspelling van TCP tyduit en trippel duplikaat ACK resepsie word weergegee. Numeriese resultate gebaseer op vergelykings met ns2 simulasies wys dat ons modelle meer akkuraat, eenvoudiger en berekeningsgewys meer e ektief is as ander wel bekende TCP modelle. Ons modelle kan dus gebruik word vir vinnig analise van netwerk topologie met verskeie bottelnekke en om gedetailleerde verrigting metodes te bekom.
APA, Harvard, Vancouver, ISO, and other styles
5

Uppal, Amit. "Increasing the efficiency of network interface card." Master's thesis, Mississippi State : Mississippi State University, 2007. http://library.msstate.edu/etd/show.asp?etd=etd-10282007-162402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nabas, Kleber Kendy Horikawa. "Proposta de um modelo para análise de desempenho do escalonador WFQ alimentado com tráfego LRD." Universidade Tecnológica Federal do Paraná, 2009. http://repositorio.utfpr.edu.br/jspui/handle/1/123.

Full text
Abstract:
Técnicas de gerenciamento de filas e descarte de pacotes são empregadas pelos escalonadores de pacotes presentes nos roteadores internos de uma rede de telecomunicações. Devido às características auto-similares do tráfego presente nas redes, o desenvolvimento de modelos para análise de desempenho de protocolos e de elementos de rede é enormemente dificultado. Tais características auto-similares são oriundas da ação dos protocolos predominantes nas redes em questão, e dos mecanismos fim-a-fim de controle de congestionamento existentes, determinantes no comportamento do fluxo de informações entre diferentes camadas na hierarquia de protocolos TCP/IP. Esta tese tem como objetivo principal propor modelos analíticos de baixo esforço computacional que permitam fazer uma análise de desempenho de um nó de rede (podendo este nó ser do tipo: DiffServ, IntServ, IP, Multi Protocol Label Switching, entre outros) com o escalonador WFQ. O tráfego considerado é do tipo TCP, devido ao fato que este protocolo é o mais utilizado na Internet atualmente, apresentando, portanto, características auto-similares. Foram desenvolvidos modelos para o escalonador WFQ quando o mesmo é alimentado com tráfego Poissoniano e tráfego do tipo auto-similar. O primeiro modelo está baseado em uma cadeia de Markov bidimensional para representar o comportamento do escalonador WFQ alimentado por dois fluxos de prioridades diferentes. O segundo modelo faz uso de duas filas separadas com taxas de serviço ajustadas de modo a simular o comportamento do escalonador WFQ. As filas são do tipo M[X]/M/1/B para levar em conta o comportamento auto-similar do tráfego. Como resultado, mostra-se que o segundo modelo é capaz de estimar as métricas de desempenho, com erro aceitável, dentro de uma faixa adequada de valores dos parâmetros do sistema, conforme demonstra a validação de resultados conduzido com uso do software NS-2.
Internal routers of telecommunication networks employ a variety of queue management and packet discarding techniques. The development of models for analyzing performance of different protocols and devices is made difficult by the self-similar nature of network traffic. Traffic self-similarity stems from the action of predominant protocols and end-to-end congestion control systems, which are key factors in determining the behavior of data flow between layers of the TCP/IP protocol stack. This thesis proposes analytical models that allow for the evaluation of a (DiffServ, IntServ, IP, Multi Protocol Label Switching etc.) network node's performance at a low computational cost. Only TCP traffic is considered, since it accounts for most of current Internet traffic and therefore exhibits self-similar characteristics. Models were developed for the WFQ scheduler with Poisson and self-similar traffic inputs. The former is based on a bi-dimensional Markov chain representing the behavior of the WFQ scheduler with two input flows with different priorities. The latter consists in two separate queues whose service rates are tuned so as to simulate the behavior of a WFQ scheduler. M[X]/M/1/B queues are used to account for the self-similar nature of traffic. As a result, it is shown that the second model accurately estimates performance metrics for certain ranges of parameter values, as confirmed by NS-2 simulations.
APA, Harvard, Vancouver, ISO, and other styles
7

Kannan, Hariharan. "TCP-Carson a loss-event based adaptive AIMD algorithm for long-lived flows." Link to electronic thesis, 2002. http://www.wpi.edu/Pubs/ETD/Available/etd-0513102-135155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nematbakhsh, Mohammadali. "TCP/IP PROTOCOL BOARD USING SINGLE CHIP PROCESSOR." Thesis, The University of Arizona, 1985. http://hdl.handle.net/10150/275389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mustell, Eliot John. "Internet Protocol Version 6: The Next Generation?" [Milwaukee, Wis.] : e-Publications@Marquette, 2009. http://epublications.marquette.edu/theses_open/23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Williams, James Pate. "A quantitative study of musical instrument digital interface (MIDI) over Internet Protocol (IP) protocols." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Fall/Dissertation/WILLIAMS_JAMES_14.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "TCP/IP (Computer network protocol) Computer network protocols. Computer algorithms"

1

Hunt, Craig. TCP/IP Network Administration. Sebastopol, CA: O’Reilly Media, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hunt, Craig. TCP/IP Network Administration. Sebastopol, CA: O’Reilly Media, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hunt, Craig. TCP/IP Network Administration. Edited by Mike Loukides and Debra Cameron. 3rd ed. Beijing: O’Reilly Media, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

TCP/IP Network Administration. 3rd ed. Sebastopol, CA: O'Reilly & Associates, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hunt, Craig. TCP/IP Network Administration. 3rd ed. Sebastopol, CA: O’Reilly Media, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Loukides, Mike, and Gigi Estabrook, eds. TCP/IP Network Administration. 2nd ed. Beijing: O’Reilly Media, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Loukides, Mike, ed. TCP/IP: Network Administration. Sebastopol, CA: O’Reilly Media, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cameron, Deb, ed. TCP/IP Network Administration. Beijing: O’Reilly Media, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

TCP/IP applications and protocols. Charleston, S.C: Computer Technology Research Corp., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1971-, Jinmei Tatuya, and Shima Keiichi 1970-, eds. IPv6 advanced protocols implementation. Boston: Morgan Kaufmann Publishers, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "TCP/IP (Computer network protocol) Computer network protocols. Computer algorithms"

1

Clayton, John F. "Education, the Internet, and the World Wide Web." In Encyclopedia of Human Computer Interaction, 175–78. IGI Global, 2006. http://dx.doi.org/10.4018/978-1-59140-562-7.ch028.

Full text
Abstract:
The development of the Internet has a relatively brief and well-documented history (Cerf, 2001; Griffiths, 2001; Leiner et al., 2000; Tyson, 2002). The initial concept was first mooted in the early 1960s. American computer specialists visualized the creation of a globally interconnected set of computers through which everyone quickly could access data and programs from any node, or place, in the world. In the early 1970s, a research project initiated by the United States Department of Defense investigated techniques and technologies to interlink packet networks of various kinds. This was called the Internetting project, and the system of connected networks that emerged from the project was known as the Internet. The initial networks created were purpose-built (i.e., they were intended for and largely restricted to closed specialist communities of research scholars). However, other scholars, other government departments, and the commercial sector realized the system of protocols developed during this research (Transmission Control Protocol [TCP] and Internet Protocol [IP], collectively known as the TCP/IP Protocol Suite) had the potential to revolutionize data and program sharing in all parts of the community. A flurry of activity, beginning with the National Science Foundation (NSF) network NSFNET in 1986, over the last two decades of the 20th century created the Internet as we know it today. In essence, the Internet is a collection of computers joined together with cables and connectors following standard communication protocols.
APA, Harvard, Vancouver, ISO, and other styles
2

"Networking Fundamentals." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 106–18. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch004.

Full text
Abstract:
This chapter introduces to basics of computer networking and associated widely used essential networking communication protocols. The chapter provides the comparison of OSI and TCP model along with details of internet layer protocols including internet protocol (IP), IP addressing schemes, internet control messaging protocol (ICMP), etc. Next, the chapter discusses transport layer protocols transmission control protocol (TCP) and user datagram protocol (UDP) in detail. Application layer protocols including dynamic host control protocol (DHCP), secure shell (SSH), file transfer protocol (FTP), trivial FTP (TFTP), simple network management protocol (SNMP), hyper text transfer protocol secure (HTTPS), network time protocol (NTP), domain name system (DNS), and simple mail transfer protocol (SMTP) are also explained in this chapter. One just cannot attack a networking protocol without knowing how it works. Having a solid introduction about computer networking and network protocols is fundamental in the ethical hacking world. This chapter quickly revisits all essential concepts related to computer networking.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "TCP/IP (Computer network protocol) Computer network protocols. Computer algorithms"

1

Oluwatope, Ayodeji, Biodun Obabire, G. Adesola Aderounmu, and Matthew Adigun. "End-to-End Performance Evaluation of Selected TCP Variants across a Hybrid Wireless Network." In InSITE 2006: Informing Science + IT Education Conference. Informing Science Institute, 2006. http://dx.doi.org/10.28945/3022.

Full text
Abstract:
Reliable transport protocols such as TCP are tuned to perform well in traditional networks where packet losses occur mostly because of congestion. TCP is intended for use as a highly reliable end-to-end transport protocol for transporting applications such as World-Wide Web (WWW) between hosts in packet-switched computer communication networks. TCP was originally designed for wired links where the error rate is really low and actually assumed that packet losses are due to congestion in the network. However, the increasing popularity of wireless networks indicates that wireless links will play more important role in future internetworks but TCP performance in such networks suffers from significant throughput degradation and very high interactive delays. TCP responds to all losses by invoking congestion control and avoidance algorithms, resulting in degraded end-to-end performance in wireless and lossy systems. Thus, in a bid to show and determine the possibility of adapting TCP protocol for optimal performance on the wireless link, this paper reviews and models the behaviors of TCP variants with a view to evaluate the end-to-end performance analysis of TCP versions: TCP Reno, TCP SACK and TCP Westwood (TCPW), which are designed to improve the performance of TCP in lossy networks. A wireless network model was developed using NS-2 network simulator which and the model was simulated. The results were analyzed in MATLAB 6.5 using throughput as a metric for comparison. The overall results indicate that TCP Westwood (TCPW) demonstrates better performance indices over other versions in a hybrid wireless network environment.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography