Journal articles on the topic 'TCP/IP (Computer network protocol) Computer network protocols. Computer algorithms'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 25 journal articles for your research on the topic 'TCP/IP (Computer network protocol) Computer network protocols. Computer algorithms.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

YIMING, ALIMUJIANG, and TOSHIO EISAKA. "A SWITCHED ETHERNET PROTOCOL FOR HARD REAL-TIME EMBEDDED SYSTEM APPLICATIONS." Journal of Interconnection Networks 06, no. 03 (2005): 345–60. http://dx.doi.org/10.1142/s0219265905001460.

Full text
Abstract:
This paper presents a protocol to support hard real-time traffic of end-to-end communication over non real-time LAN technology. The network is set up with nodes and switches, and real-time communication is handled by software (protocol) added between the Ethernet protocols and the TCP/IP suite. The proposed protocol establishes a virtual circuit based on admission control and manages hard real-time traffic to bypass the TCP/IP stack. This makes considerably reduce the dwell time in the nodes, and increase the achievable data frame rate. After the bypassing, traffic schedule is performed accord
APA, Harvard, Vancouver, ISO, and other styles
2

Reddy, N. Ramanjaneya, Chenna Reddy Pakanati, and M. Padmavathamma. "An Enhanced Queue Management Scheme for Eradicating Congestion of TFRC over Wired Environment." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 3 (2017): 1347. http://dx.doi.org/10.11591/ijece.v7i3.pp1347-1354.

Full text
Abstract:
<p class="Abstract">To accomplish increasing real time requirements, user applications have to send different kinds of data with different speeds over the internet. To effectuate the aims of the computer networks, several protocols have been added to TCP/IP protocol suite. Transport layer has to implement emerging techniques to transfer huge amount of data like multimedia streaming. To transmit multimedia applications, one of the suitable congestion control mechanisms in transport layer is TCP Friendly Rate Control Protocol (TFRC). It controls congestion based on its equation. To get mor
APA, Harvard, Vancouver, ISO, and other styles
3

Grimmell, William C., and Nageswara S. V. Rao. "On Source-Based Route Computation for Quickest Paths under Dynamic Bandwidth Constraints." International Journal of Foundations of Computer Science 14, no. 03 (2003): 503–23. http://dx.doi.org/10.1142/s0129054103001868.

Full text
Abstract:
Routing in the newer generation of network transmission methods may be performed at various levels of the IP stack such as datagram, TCP stream, and application levels. It is important in the use of these methods to compute the routes that minimize the end-to-end delays for the specific routing mechanism. We formulate an abstract network path computation problem, the dynamic quickest path problem, to encompass a number of message forwarding mechanisms including circuit switching, Internet Protocol, and their variations. This problem deals with the transmission of a message from a source to a d
APA, Harvard, Vancouver, ISO, and other styles
4

Mudassir, Mumajjed Ul, and M. Iram Baig. "MFVL HCCA: A Modified Fast-Vegas-LIA Hybrid Congestion Control Algorithm for MPTCP Traffic Flows in Multihomed Smart Gas IoT Networks." Electronics 10, no. 6 (2021): 711. http://dx.doi.org/10.3390/electronics10060711.

Full text
Abstract:
Multihomed smart gas meters are Internet of Things (IoT) devices that transmit information wirelessly to a cloud or remote database via multiple network paths. The information is utilized by the smart gas grid for accurate load forecasting and several other important tasks. With the rapid growth in such smart IoT networks and data rates, reliable transport layer protocols with efficient congestion control algorithms are required. The small Transmission Control Protocol/Internet Protocol (TCP/IP) stacks designed for IoT devices still lack efficient congestion control schemes. Multipath transmis
APA, Harvard, Vancouver, ISO, and other styles
5

Rajamanickam, Vani, Ushabhanu Nageswaran, and Sangeetha Marikkannan. "Fast Motion Estimation Algorithm using Hybrid Search Patterns for Video Streaming Application." International Journal of Computers Communications & Control 12, no. 5 (2017): 715. http://dx.doi.org/10.15837/ijccc.2017.5.2975.

Full text
Abstract:
The objective of the paper is to develop new block matching Motion Estimation (ME) algorithm using hybrid search patterns along the direction of best match. The search efficiency for sequences with fast motions and high resolutions is improved by proposing New Cross Diagonal-Hexagon Search (NCDHS) algorithm which involves a novel multi half-hexagon grid global search pattern and a cross diagonal-hexagon local search pattern. The new search pattern enables the proposed algorithm to perform better search using 9.068 search points on an average, to obtain optimal motion vector with slight improve
APA, Harvard, Vancouver, ISO, and other styles
6

Si, Haiping, Changxia Sun, Baogang Chen, Lei Shi, and Hongbo Qiao. "Analysis of Socket Communication Technology Based on Machine Learning Algorithms Under TCP/IP Protocol in Network Virtual Laboratory System." IEEE Access 7 (2019): 80453–64. http://dx.doi.org/10.1109/access.2019.2923052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hu, Yao, Ting Peng, and Lianming Zhang. "Software-Defined Congestion Control Algorithm for IP Networks." Scientific Programming 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/3579540.

Full text
Abstract:
The rapid evolution of computer networks, increase in the number of Internet users, and popularity of multimedia applications have exacerbated the congestion control problem. Congestion control is a key factor in ensuring network stability and robustness. When the underlying network and flow information are unknown, the transmission control protocol (TCP) must increase or reduce the size of the congestion window to adjust to the changes of traffic in the Internet Protocol (IP) network. However, it is possible that a software-defined approach can relieve the network congestion problem more effi
APA, Harvard, Vancouver, ISO, and other styles
8

Arnaudov, Rumen, and Ivo Dochev. "Functional generator controlled by internet." Facta universitatis - series: Electronics and Energetics 16, no. 1 (2003): 93–102. http://dx.doi.org/10.2298/fuee0301093a.

Full text
Abstract:
This paper presents a functional generator controlled by Internet. We describe a computer-system architecture, a block diagram of generator and working algorithms. The remote control is realized by computer networks and using the TCP/IP protocols. For that purpose is used "Customer-Server" architecture. The software algorithms is based on Linux operating system Apache web server, MySql database, HTML and PHP languages.
APA, Harvard, Vancouver, ISO, and other styles
9

Prabadevi, B., and N. Jeyanthi. "Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks." Cybernetics and Information Technologies 17, no. 4 (2017): 69–86. http://dx.doi.org/10.1515/cait-2017-0042.

Full text
Abstract:
AbstractThe bridge protocol (Address Resolution Protocol) ARP, integrating Ethernet (Layer 2) and IP protocol (Layer 3) plays a vital role in TCP/IP communication since ARP packet is the first packet generated during any TCP/IP communications and they are the first traffic from the host. In the large data center, as the size of the broadcast domain (i.e., number of hosts on the network) increases consequently the broadcast traffic from the communication protocols like ARP also increases. This paper addresses the problem faced by Layer 2 protocols like insecured communication, scalability issue
APA, Harvard, Vancouver, ISO, and other styles
10

Nour, Boubakr, Hakima Khelifi, Rasheed Hussain, Spyridon Mastorakis, and Hassine Moungla. "Access Control Mechanisms in Named Data Networks." ACM Computing Surveys 54, no. 3 (2021): 1–35. http://dx.doi.org/10.1145/3442150.

Full text
Abstract:
Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean-slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the ent
APA, Harvard, Vancouver, ISO, and other styles
11

Anderson, Daniel K., and W. Michael Reed. "The Effects of Internet Instruction, Prior Computer Experience, and Learning Style on Teachers' Internet Attitudes and Knowledge." Journal of Educational Computing Research 19, no. 3 (1998): 227–46. http://dx.doi.org/10.2190/8wx1-5q3j-p3bw-jd61.

Full text
Abstract:
What is now called the Internet started out as a small number of federally funded Department of Defense (Advanced Research Project Agency, or ARPA) supercomputers networked together to share information. In order to guarantee data transmission between these nodes, this network (ARPANET) shared a common set of protocols that was designed to allow for high speed and reliable transfer. This protocol suite is TCP/IP (Transmission Control Protocol/Internet Protocol). Most microcomputers now have a TCP/IP implementation available (e.g., MacTCP) and can, therefore, join the millions of computers that
APA, Harvard, Vancouver, ISO, and other styles
12

Zheng, Yani, Gaurav Dhiman, Ashutosh Sharma, Amit Sharma, and Mohd Asif Shah. "An IoT-Based Water Level Detection System Enabling Fuzzy Logic Control and Optical Fiber Sensor." Security and Communication Networks 2021 (August 27, 2021): 1–11. http://dx.doi.org/10.1155/2021/4229013.

Full text
Abstract:
The usage of wireless sensors has become widespread for the collection of data for various Internet of Things (IoT) products. Specific wireless sensors use optical fiber technology as transmission media and lightwave signals as carriers, showing the advantages of antielectromagnetic interference, high sensitivity, and strong reliability. Hence, their application in IoT systems becomes a research hotspot. In this article, multiple optical fiber sensors are constructed as an IoT detection system, and a Transmission Control Protocol (TCP)/Internet Protocol (IP) communication stack is used for the
APA, Harvard, Vancouver, ISO, and other styles
13

Xu, Yong, Hong Ni, and Xiaoyong Zhu. "An Effective Transmission Scheme Based on Early Congestion Detection for Information-Centric Network." Electronics 10, no. 18 (2021): 2205. http://dx.doi.org/10.3390/electronics10182205.

Full text
Abstract:
As one of the candidates for future network architecture, Information-Centric Networking (ICN) has revolutionized the manner of content retrieval by transforming the communication mode from host-centric to information-centric. Unlike a traditional TCP/IP network, ICN uses a location-independent name to identify content and takes a receiver-driven model to retrieve the content. Moreover, ICN routers not only perform a forwarding function but also act as content providers due to pervasive in-network caching. The network traffic is more complicated and routers are more prone to congestion. These
APA, Harvard, Vancouver, ISO, and other styles
14

Baigorria, Luis A., José F. Postigo, Vicente A. Mut, and Ricardo O. Carelli. "Telecontrol system based on the Smith predictor using the TCP/IP protocol." Robotica 21, no. 3 (2003): 303–12. http://dx.doi.org/10.1017/s0263574702004812.

Full text
Abstract:
In this paper, development and implementation are presented of a client software package for remote process control. The proposed software is based on a client-server model under an Intranet architecture. The architecture is proposed for a telecontrol system of a real process, which includes the possibility of integrating I/O devices with data networks based on open protocols such as TCP/IP. This protocol allows the implementation of control systems using a low-cost alternative. Also, the Smith predictor is revised for remote control applications over an Ethernet network. Some experiences on a
APA, Harvard, Vancouver, ISO, and other styles
15

Zain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.

Full text
Abstract:
In recent times, secure communication protocols over web such as HTTPS (Hypertext Transfer Protocol Secure) are being widely used instead of plain web communication protocols like HTTP (Hypertext Transfer Protocol). HTTPS provides end-to-end encryption between the user and service. Nowadays, organizations use network firewalls and/or intrusion detection and prevention systems (IDPS) to analyze the network traffic to detect and protect against attacks and vulnerabilities. Depending on the size of organization, these devices may differ in their capabilities. Simple network intrusion detection sy
APA, Harvard, Vancouver, ISO, and other styles
16

Gao, Zhenyu, Jian Cao, Wei Wang, Huayun Zhang, and Zengrong Xu. "Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time." Security and Communication Networks 2021 (September 13, 2021): 1–11. http://dx.doi.org/10.1155/2021/4587862.

Full text
Abstract:
Industry 4.0 focuses on continuous interconnection services, allowing for the continuous and uninterrupted exchange of signals or information between related parties. The application of messaging protocols for transferring data to remote locations must meet specific specifications such as asynchronous communication, compact messaging, operating in conditions of unstable connection of the transmission line of data, limited network bandwidth operation, support multilevel Quality of Service (QoS), and easy integration of new devices. The Message Queue Telemetry Transport (MQTT) protocol is used i
APA, Harvard, Vancouver, ISO, and other styles
17

Akbar, Sabriansyah Rizqika, Maystya Tri Handono, and Achmad Basuki. "Design of Pervasive Discovery, Service and Control for Smart Home Appliances: An Integration of Raspberry Pi, UPnP Protocols and Xbee." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (2017): 1012. http://dx.doi.org/10.11591/ijece.v7i2.pp1012-1022.

Full text
Abstract:
Pervasive technology is an important feature in smart home appliances control. With pervasive technology, the user is able to discover and control every device and each service without initialization configuration and setup. Since single-board computer often used in smart home appliances, combining pervasive technology and microcomputer/single-board computer will be important to be applied and make a possibility to create a smart home system based on the requirement of it users that will be beneficial for the smart home users and the developers. This paper proposed a design of pervasive discov
APA, Harvard, Vancouver, ISO, and other styles
18

Neelakantan, N. Pratik, and C. Nagesh. "Role of Feature Selection in Intrusion Detection Systems for 802.11 Networks." International Journal of Smart Sensor and Adhoc Network., October 2011, 98–101. http://dx.doi.org/10.47893/ijssan.2011.1030.

Full text
Abstract:
Intrusion Detection Systems are important for protecting network and its resources from illegal penetration. For 802.11network, the features used for training and testing the intrusion detection systems consist of basic information related to the TCP/IP header, with no considerable attention to the features associated with lower level protocol frames. The resulting detectors were efficient and accurate in detecting network attacks at the network and transport layers, but unfortunately, not capable of detecting 802.11-specific attacks such as de authentication attacks or MAC layer DoS attack. I
APA, Harvard, Vancouver, ISO, and other styles
19

khaing, Ei Ei, Mya Thet Khaing, Akari Myint Soe, and Shwe Sin Myat Than. "Implementation of Network Address Translation Using TCP/IP Model In Internet Communication System." International Journal of Scientific Research in Science, Engineering and Technology, June 6, 2020, 447–53. http://dx.doi.org/10.32628/ijsrset207385.

Full text
Abstract:
Nowadays, many people will be used internet that for their work, communication, education, economic and organization necessary that is used today. Network address translation (NAT) is a method of remapping an IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device. A network is a system of hardware and software, put together for the purpose of communication and resource sharing. A network includes transmission hardware devise to interconnect transmission media and to control transmissions and s
APA, Harvard, Vancouver, ISO, and other styles
20

Shim, Kyu-Seok, Ilkwon Sohn, Eunjoo Lee, Woojin Seok, and Wonhyuk Lee. "Enhance the ICS Network Security Using the Whitelist-based Network Monitoring Through Protocol Analysis." Journal of Web Engineering, February 17, 2021. http://dx.doi.org/10.13052/jwe1540-9589.2011.

Full text
Abstract:
In our present technological age, most manual and semi-automated tasks are being automated for efficient productivity or convenience. In particular, industrial sites are rapidly being automated to increase productivity and improve work efficiency. However, while networks are increasingly deployed as an integral part of the automation of industrial processes, there are also many resultant dangers such as security threats, malfunctions, and interruption of industrial processes. In particular, while the security of business networks is reinforced and their information is not easily accessible, in
APA, Harvard, Vancouver, ISO, and other styles
21

Putra, Rian Rahmanda, and Fery Antony. "Sistem Computer Vision Pengenalan Pola Angka dan Operator Matematika Pada Permainan Kartu Angka Berbasis Jaringan Syaraf Tiruan Perceptron." Jurnal Ilmiah Informatika Global 9, no. 1 (2018). http://dx.doi.org/10.36982/jig.v9i1.441.

Full text
Abstract:
<p align="center"><strong><em>Abstract <br /></em></strong></p><p><em>Computer vision is an image processing by a computer to obtain information from image captured through the camera generally used in real-time application. This paper reports on the results of research conducted on computer vision system designed to be able to recognize the image number (0-9) and mathematical operators (addition (+) and subtraction (-)) in a card number figures. Computer vision system designed in this study consists of a camera on the android phone that us
APA, Harvard, Vancouver, ISO, and other styles
22

Ramalingam, Senthil Prabu, and Prabhakar Karthikeyan Shanmugam. "A Comprehensive Review on Wired and Wireless Communication Technologies and its Challenges in Smart Residential Buildings." Recent Advances in Computer Science and Communications 14 (January 19, 2021). http://dx.doi.org/10.2174/2666255814666210119142742.

Full text
Abstract:
Background: The smart grid communication network is constructed with three tiers namely, Home Area Networks (HANs), Neighborhood Area Networks (NANs) and Wide Area Networks (WANs). These networks function with various communication protocols like table protocol, on-demand protocol, Wi-Fi, Zigbee, Z-Wave, Wi-MAX, GSM, LTE, Cognitive Radio Networks. The network interconnection is heterogonous and all appliances have to communicate through the IP gateways. A large amount of data is collected from various sensors placed in different locations. The analytics on large data- “big data” is essential b
APA, Harvard, Vancouver, ISO, and other styles
23

Al-Drees, Mohammed, Marwah M. Almasri, Mousa Al-Akhras, and Mohammed Alawairdhi. "Building a DNS Tunneling Dataset." International Journal of Sensors, Wireless Communications and Control 10 (November 24, 2020). http://dx.doi.org/10.2174/2210327910999201124205758.

Full text
Abstract:
Background:: Domain Name System (DNS) is considered the phone book of the Internet. Its main goal is to translate a domain name to an IP address that the computer can understand. However, DNS can be vulnerable to various kinds of attacks, such as DNS poisoning attacks and DNS tunneling attacks. Objective:: The main objective of this paper is to allow researchers to identify DNS tunnel traffic using machine-learning algorithms. Training machine-learning algorithms to detect DNS tunnel traffic and determine which protocol was used will help the community to speed up the process of detecting such
APA, Harvard, Vancouver, ISO, and other styles
24

McGuire, Mark. "Ordered Communities." M/C Journal 7, no. 6 (2005). http://dx.doi.org/10.5204/mcj.2474.

Full text
Abstract:

 
 
 A rhetoric of freedom characterises much of the literature dealing with online communities: freedom from fixed identity and appearance, from the confines of geographic space, and from control. The prevailing view, a combination of futurism and utopianism, is that the lack of order in cyberspace enables the creation of social spaces that will enhance personal freedom and advance the common good. Sherry Turkle argues that computer-mediated communication allows us to create a new form of community, in which identity is multiple and fluid (15-17). Marcos Novak celebrates the p
APA, Harvard, Vancouver, ISO, and other styles
25

Maddox, Alexia, and Luke J. Heemsbergen. "Digging in Crypto-Communities’ Future-Making." M/C Journal 24, no. 2 (2021). http://dx.doi.org/10.5204/mcj.2755.

Full text
Abstract:
Introduction This article situates the dark as a liminal and creative space of experimentation where tensions are generative and people tinker with emerging technologies to create alternative futures. Darkness need not mean chaos and fear of violence – it can mean privacy and protection. We define dark as an experimental space based upon uncertainties rather than computational knowns (Bridle) and then demonstrate via a case study of cryptocurrencies the contribution of dark and liminal social spaces to future(s)-making. Cryptocurrencies are digital cash systems that use decentralised (peer-to-
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!