Academic literature on the topic 'TCP/IP (Computer network protocol) Data transmission systems. File Transfer Protocol (Computer network protocol)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'TCP/IP (Computer network protocol) Data transmission systems. File Transfer Protocol (Computer network protocol).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "TCP/IP (Computer network protocol) Data transmission systems. File Transfer Protocol (Computer network protocol)"

1

Anderson, Daniel K., and W. Michael Reed. "The Effects of Internet Instruction, Prior Computer Experience, and Learning Style on Teachers' Internet Attitudes and Knowledge." Journal of Educational Computing Research 19, no. 3 (October 1998): 227–46. http://dx.doi.org/10.2190/8wx1-5q3j-p3bw-jd61.

Full text
Abstract:
What is now called the Internet started out as a small number of federally funded Department of Defense (Advanced Research Project Agency, or ARPA) supercomputers networked together to share information. In order to guarantee data transmission between these nodes, this network (ARPANET) shared a common set of protocols that was designed to allow for high speed and reliable transfer. This protocol suite is TCP/IP (Transmission Control Protocol/Internet Protocol). Most microcomputers now have a TCP/IP implementation available (e.g., MacTCP) and can, therefore, join the millions of computers that have access to the plethora of resources on the Internet. The Internet is not a static set of nodes, not a limited number of library holdings, not a one-directional paradigm of data transmission. Rather, it is a vibrant and absorbing setting that can foster new learning environments, or enrage educators with its diverse commands, lack of direction, and tenuous consistency.
APA, Harvard, Vancouver, ISO, and other styles
2

Zheng, Yani, Gaurav Dhiman, Ashutosh Sharma, Amit Sharma, and Mohd Asif Shah. "An IoT-Based Water Level Detection System Enabling Fuzzy Logic Control and Optical Fiber Sensor." Security and Communication Networks 2021 (August 27, 2021): 1–11. http://dx.doi.org/10.1155/2021/4229013.

Full text
Abstract:
The usage of wireless sensors has become widespread for the collection of data for various Internet of Things (IoT) products. Specific wireless sensors use optical fiber technology as transmission media and lightwave signals as carriers, showing the advantages of antielectromagnetic interference, high sensitivity, and strong reliability. Hence, their application in IoT systems becomes a research hotspot. In this article, multiple optical fiber sensors are constructed as an IoT detection system, and a Transmission Control Protocol (TCP)/Internet Protocol (IP) communication stack is used for the sensor module. Furthermore, design of gateway module, data server, and monitoring module is established in order to run the data server in the Windows system and communicate across the network segments. Furthermore, the optical fiber sensor is connected to the development board with WiFi, meanwhile considering the optical fiber wireless network’s congestion problem. The fuzzy logic concept is introduced from the perspective of cache occupancy, and a fiber sensor’s network congestion control algorithm is proposed. In the experiment, the IoT detection system with multiple optical fiber sensors is used for water level detection, and the sensor’s real-time data detected by the User Interface (UI) are consistent with the feedback results. The proposed method is also compared with the SenTCP algorithm and the CODA algorithm, and it was observed that the proposed network congestion control algorithm based on the fuzzy logic can improve network throughput and reduce the network data packet loss.
APA, Harvard, Vancouver, ISO, and other styles
3

Weingart, Troy, Douglas C. Sicker, and Dirk Grunwald. "Identifying Opportunities for Exploiting Cross-Layer Interactions in Adaptive Wireless Systems." Advances in Multimedia 2007 (2007): 1–11. http://dx.doi.org/10.1155/2007/49604.

Full text
Abstract:
The flexibility of cognitive and software-defined radio heralds an opportunity for researchers to reexamine how network protocol layers operate with respect to providing quality of service aware transmission among wireless nodes. This opportunity is enhanced by the continued development of spectrally responsive devices—ones that can detect and respond to changes in the radio frequency environment. Present wireless network protocols define reliability and other performance-related tasks narrowly within layers. For example, the frame size employed on 802.11 can substantially influence the throughput, delay, and jitter experienced by an application, but there is no simple way to adapt this parameter. Furthermore, while the data link layer of 802.11 provides error detection capabilities across a link, it does not specify additional features, such as forward error correction schemes, nor does it provide a means for throttling retransmissions at the transport layer (currently, the data link and transport layer can function counterproductively with respect to reliability). This paper presents an analysis of the interaction of physical, data link, and network layer parameters with respect to throughput, bit error rate, delay, and jitter. The goal of this analysis is to identify opportunities where system designers might exploit cross-layer interactions to improve the performance of Voice over IP (VoIP), instant messaging (IM), and file transfer applications.
APA, Harvard, Vancouver, ISO, and other styles
4

Gao, Zhenyu, Jian Cao, Wei Wang, Huayun Zhang, and Zengrong Xu. "Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time." Security and Communication Networks 2021 (September 13, 2021): 1–11. http://dx.doi.org/10.1155/2021/4587862.

Full text
Abstract:
Industry 4.0 focuses on continuous interconnection services, allowing for the continuous and uninterrupted exchange of signals or information between related parties. The application of messaging protocols for transferring data to remote locations must meet specific specifications such as asynchronous communication, compact messaging, operating in conditions of unstable connection of the transmission line of data, limited network bandwidth operation, support multilevel Quality of Service (QoS), and easy integration of new devices. The Message Queue Telemetry Transport (MQTT) protocol is used in software applications that require asynchronous communication. It is a light and simplified protocol based on publish-subscribe messaging and is placed functionally over the TCP/IP protocol. It is designed to minimize the required communication bandwidth and system requirements increasing reliability and probability of successful message transmission, making it ideal for use in Machine-to-Machine (M2M) communication or networks where bandwidth is limited, delays are long, coverage is not reliable, and energy consumption should be as low as possible. Despite the fact that the advantage that MQTT offers its way of operating does not provide a serious level of security in how to achieve its interconnection, as it does not require protocol dependence on one intermediate third entity, the interface is dependent on each application. This paper presents an innovative real-time anomaly detection system to detect MQTT-based attacks in cyber-physical systems. This is an online-semisupervised learning neural system based on a small number of sampled patterns that identify crowd anomalies in the MQTT protocol related to specialized attacks to undermine cyber-physical systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Danmanee, Tanapoom, Kulit Na Nakorn, and Kultida Rojviboonchai. "CU-MAC: A Duty-Cycle MAC Protocol for Internet of Things in Wireless Sensor Networks." ECTI Transactions on Electrical Engineering, Electronics, and Communications 16, no. 2 (April 9, 2018): 30–43. http://dx.doi.org/10.37936/ecti-eec.2018162.171332.

Full text
Abstract:
Nowadays “Internet of Things” or IoT becomes the most popular technology in the Internet system. Types of devices and sensors have been connected as a network of devices and sensors. While a wireless sensor network is a traditional network of sensors that can be considered as a beginning point of IoT systems. Currently, these sensor data are not only exchanged within a local network but also are delivered to other devices in the Internet. Consequently, well-known organizations such as IEEE, IETF, ITU-T and ISO/IET are trying to set standards for wireless sensor devices in IoT systems. The recommended standard utilizes many of internet stack standards such as CoAP, UDP and IP. However, the traditional design of WSNs is to avoid using internet protocol in the system to reduce transmission overhead and power consumption due to resource limitation. Fortunately, the current technology in both hardware and software allow the internet standard to sufficiently operate in a small sensor. In this paper, we propose a MAC protocol named CU-MAC to efficiently support IoT standard that need request-respond communication or bi-direction communication. CU-MAC uses multi-channel communication to perform continuous and bi-directional data transfer at low duty-cycle. It also has a mechanism to overcome the hidden terminal problem. We evaluated the performance of CU-MAC on both simulation and real testbed based on Contiki OS. The result shows that CU-MAC outperforms other existing MAC protocols in term of packet delivery ratio at 98.7% and requires lower duty-cycle than others to operate in the high traffic environment.
APA, Harvard, Vancouver, ISO, and other styles
6

Mudassir, Mumajjed Ul, and M. Iram Baig. "MFVL HCCA: A Modified Fast-Vegas-LIA Hybrid Congestion Control Algorithm for MPTCP Traffic Flows in Multihomed Smart Gas IoT Networks." Electronics 10, no. 6 (March 18, 2021): 711. http://dx.doi.org/10.3390/electronics10060711.

Full text
Abstract:
Multihomed smart gas meters are Internet of Things (IoT) devices that transmit information wirelessly to a cloud or remote database via multiple network paths. The information is utilized by the smart gas grid for accurate load forecasting and several other important tasks. With the rapid growth in such smart IoT networks and data rates, reliable transport layer protocols with efficient congestion control algorithms are required. The small Transmission Control Protocol/Internet Protocol (TCP/IP) stacks designed for IoT devices still lack efficient congestion control schemes. Multipath transmission control protocol (MPTCP) based congestion control algorithms are among the recent research topics. Many coupled and uncoupled congestion control algorithms have been proposed by researchers. The default congestion control algorithm for MPTCP is coupled congestion control by using the linked-increases algorithm (LIA). In battery powered smart meters, packet retransmissions consume extra power and low goodput results in poor system performance. In this study, we propose a modified Fast-Vegas-LIA hybrid congestion control algorithm (MFVL HCCA) for MPTCP by considering the requirements of a smart gas grid. Our novel algorithm operates in uncoupled congestion control mode as long as there is no shared bottleneck and switches to coupled congestion control mode otherwise. We have presented the details of our proposed model and compared the simulation results with the default coupled congestion control for MPTCP. Our proposed algorithm in uncoupled mode shows a decrease in packet loss up to 50% and increase in average goodput up to 30%.
APA, Harvard, Vancouver, ISO, and other styles
7

STATSENKO, Volodymyr, Oleksandr BURMISTENKOV, Tetiana BILA, Dmytro STATSENKO, and Oleksandr PANASIUK. "DEVELOPMENT OF CENTRALIZED COMPUTER DATA COLLECTION SYSTEM FROM ANALOG SENSORS." HERALD OF KHMELNYTSKYI NATIONAL UNIVERSITY 297, no. 3 (July 2, 2021): 46–50. http://dx.doi.org/10.31891/2307-5732-2021-297-3-46-50.

Full text
Abstract:
The article presents the architecture and operation principles of the system for collecting and analyzing information from strain gauges. These systems are used to determine the equipment performance for transporting a variety of materials. In particular, they are used to control the movement of bulk materials mixtures components. For such technological processes, it is fundamentally important to ensure constant flows intensity. The paper identifies three variants of sensor connection schemes, analyzes their advantages and disadvantages. It is established that the structure “one ADC – several sensors” allows to reduce equipment costs and at the same time to provide the minimum parameters influence of a transmission line on a useful sensor signal. The “one-to-one” scheme provides the connection of each sensor to its own ADC. “Circuit with multiplexer” allows to increase the number of sensors connected to one ADC. It is established that the best option in terms of reducing the interference effects on the analog signal and the cost of creating a system is the scheme “one ADC – several sensors”. The algorithm of information transfer from ADC to microcontroller (MC) is analysed. It is calculated that HX711 ADC chips provide the maximum data rate of 18.5 values/s. It is proposed to transfer data between the MC and the server using the TCP protocol because it avoids data loss and provides the necessary data transfer speed. The structure and formats of data that are transmitted from the mass sensor to the ADC, microcontroller, web server and database are proposed. The main speed, design parameters, advantages and disadvantages of wired and wireless data network between MK and the server are determined. Recommendations for the design of such a network depending on the characteristics of the premises in which the data collection system will be used have been developed.
APA, Harvard, Vancouver, ISO, and other styles
8

Pan, Wansu, Haibo Tan, Xiru Li, and Xiaofeng Li. "Improved RTT Fairness of BBR Congestion Control Algorithm Based on Adaptive Congestion Window." Electronics 10, no. 5 (March 6, 2021): 615. http://dx.doi.org/10.3390/electronics10050615.

Full text
Abstract:
To alleviate the lower performance of Transmission Control Protocol (TCP) congestion control over complex network, especially the high latency and packet loss scenario, Google proposed the Bottleneck Bandwidth and Round-trip propagation time (BBR) congestion control algorithm. In contrast with other TCP congestion control algorithms, BBR adjusted transfer data by maximizing delivery rate and minimizing delay. However, some evaluation experiments have shown that the persistent queues formation and retransmissions in the bottleneck can lead to serious fairness issues between BBR flows with different round-trip times (RTTs). They pointed out that small RTT differences cause unfairness in the throughput of BBR flows and flows with longer RTT can obtain higher bandwidth when competing with the shorter RTT flows. In order to solve this fairness problem, an adaptive congestion window of BBR is proposed, which adjusts the congestion window gain of each BBR flow in network load. The proposed algorithms alleviate the RTT fairness issue by controlling the upper limit of congestion window according to the delivery rate and queue status. In the Network Simulator 3 (NS3) simulation experiment, it shows that the adaptive congestion window of BBR (BBR-ACW) congestion control algorithm improves the fairness by more than 50% and reduces the queuing delay by 54%, compared with that of the original BBR in different buffer sizes.
APA, Harvard, Vancouver, ISO, and other styles
9

Ermakov, A. V., and L. I. Suchkova. "Development of algorithms of self-organizing network for reliable data exchange between autonomous robots." Dependability 20, no. 2 (June 8, 2020): 35–42. http://dx.doi.org/10.21683/1729-2646-2020-20-2-35-42.

Full text
Abstract:
Factors affecting the reliability of data transmission in networks with nodes with periodic availability were considered. The principles of data transfer between robots are described; the need for global connectivity of communications within an autonomous system is shown, since the non-availability of information on the intentions of other robots reduces the effectiveness of the robotics system as a whole and affects the fault tolerance of a team of independent actors performing distributed activities. It is shown that the existing solutions to the problem of data exchange based on general-purpose IP networks have drawbacks; therefore, as the basis for organizing autonomous robot networks, we used developments in the domain of topological models of communication systems allowing us to build self-organizing computer networks. The requirements for the designed network for reliable message transfer between autonomous robots are listed, the option of organizing reliable message delivery using overlay networks, which expand the functionality of underlying networks, is selected. An overview of existing popular controlled and non-controlled overlay networks is given; their applicability for communication within a team of autonomous robots is evaluated. The features and specifics of data transfer in a team of autonomous robots are listed. The algorithms and architecture of the overlay self-organizing network were described by means of generally accepted methods of constructing decentralized networks with zero configurations. As a result of the work, general principles of operation of the designed network were proposed, the message structure for the delivery algorithm was described; two independent data streams were created, i.e. service and payload; an algorithm for sending messages between network nodes and an algorithm for collecting and synchronizing the global network status were developed. In order to increase the dependability and fault tolerance of the network, it is proposed to store the global network status at each node. The principles of operation of a distributed storage are described. For the purpose of notification on changes in the global status of the network, it is proposed to use an additional data stream for intra-network service messages. A flood routing algorithm was developed to reduce delays and speed up the synchronization of the global status of a network and consistency maintenance. It is proposed to provide network connectivity using the HELLO protocol to establish and maintain adjacency relations between network nodes. The paper provides examples of adding and removing network nodes, examines possible scalability problems of the developed overlay network and methods for solving them. It confirms the criteria and indicators for achieving the effect of self-organization of nodes in the network. The designed network is compared with existing alternatives. For the developed algorithms, examples of latency estimates in message delivery are given. The theoretical limitations of the overlay network in the presence of intentional and unintentional defects are indicated; an example of restoring the network after a failure is set forth.
APA, Harvard, Vancouver, ISO, and other styles
10

Shim, Kyu-Seok, Ilkwon Sohn, Eunjoo Lee, Woojin Seok, and Wonhyuk Lee. "Enhance the ICS Network Security Using the Whitelist-based Network Monitoring Through Protocol Analysis." Journal of Web Engineering, February 17, 2021. http://dx.doi.org/10.13052/jwe1540-9589.2011.

Full text
Abstract:
In our present technological age, most manual and semi-automated tasks are being automated for efficient productivity or convenience. In particular, industrial sites are rapidly being automated to increase productivity and improve work efficiency. However, while networks are increasingly deployed as an integral part of the automation of industrial processes, there are also many resultant dangers such as security threats, malfunctions, and interruption of industrial processes. In particular, while the security of business networks is reinforced and their information is not easily accessible, intruders are now targeting industrial networks whose security is relatively poor, wherein attacks could directly lead to physical damage. Therefore, numerous studies have been conducted to counter security threats through network traffic monitoring, and to minimize physical loss through the detection of malfunctions. In the case of industrial processes, such as in nuclear facilities and petroleum facilities, thorough monitoring is required as security issues can lead to significant danger to humans and damage to property. Most network traffic in industrial facilities uses proprietary protocols for efficient data transmission, and these protocols are kept confidential because of intellectual property and security reasons. Protocol reverse engineering is a preparatory step to monitor network traffic and achieve more accurate traffic analysis. The field extraction method proposed in this study is a method for identifying the structure of proprietary protocols used in industrial sites. From the extracted fields, the structure of commands and protocols used in the industrial environment can be derived. To evaluate the feasibility of the proposed concept, an experiment was conducted using the Modbus/TCP protocol and Ethernet/IP protocol used in actual industrial sites, and an additional experiment was conducted to examine the results of the analysis of conventional protocols using the file transfer protocol.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "TCP/IP (Computer network protocol) Data transmission systems. File Transfer Protocol (Computer network protocol)"

1

Pailom, Chayutra. "API development for persistent data sessions support." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FPailom.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Allman, Mark. "Improving TCP performance over satellite channels." Ohio : Ohio University, 1997. http://www.ohiolink.edu/etd/view.cgi?ohiou1177615641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mascarenhas, da Veiga Alves Manoel Eduardo. "Characterisation of end-to-end performance for web-based file server respositories." Title page, contents and abstract only, 2001. http://web4.library.adelaide.edu.au/theses/09ENS/09ensm395.pdf.

Full text
Abstract:
Bibliography: leaves 128-135. Investigates the behaviour of TCP bulk file transfer application sessions in a broadband access environment. Introduces some concepts for evaluating network behaviour: a path instability parameter for analyzing different TCP connections; a minimum RTT delay and a minimum typical path for estimating path characteristics between a client and application servers.
APA, Harvard, Vancouver, ISO, and other styles
4

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
APA, Harvard, Vancouver, ISO, and other styles
5

Eddy, Wesley M. "Improving Transport Control Protocol Performance With Path Error Rate Information." Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1087844627.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Grigorescu, Eduard. "Reducing internet latency for thin-stream applications over reliable transport with active queue management." Thesis, University of Aberdeen, 2018. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=236098.

Full text
Abstract:
An increasing number of network applications use reliable transport protocols. Applications with constant data transmission recover from loss without major performance disruption, however, applications that send data sporadically, in small packets, also called thin-streams, experience frequently high latencies due to 'Bufferbloat', that reduce the application performance. Active Queue Management mechanisms were proposed to dynamically manage the queues in routers by dropping packets early and reduce these, hence reducing latency. While their deployment to the internet remains an open issue, the proper investigation into how their functioning mechanism impacts latency is the main focus of this work and research questions have been devised to investigate the AQM impact on latency. A range of AQM mechanisms has been evaluated by the research, exploring performance of the methods for latency sensitive network applications. This has explored new single queue AQM mechanisms such as Controlled Delay (CODEL) and Proportional Integral Enhanced (PIE) and Adaptive RED (ARED). The evaluation has shown great improvements in queuing latency when AQM are used over a range of network scenarios. Scheduling AQM algorithms such as FlowQueue CODEL (FQ-CODEL) isolates traffic and minimises the impact of Bufferbloat on flows. The core components of FQ-CODEL, still widely misunderstood at the time of its inception, have been explained in depth by this study and their contribution to reducing latency have been evaluated. The results show significant reductions in queuing latency for thin streams using FQ-CODEL. When TCP is used for thin streams, high application latencies can arise when there are retransmissions, for example after dropping packets by an AQM mechanism. This delay is a result of TCP's loss-based congestion control mechanism that controls sender transmission rate following packet loss. ECN, a marking sender-side improvement to TCP reduces applicationlayer latency without disrupting the overall network performance. The thesis evaluated the benefit of using ECN using a wide range of experiments. The findings show that FQ-CODEL with ECN provides a substantial reduction of application latency compared to a drop-based AQM. Moreover, this study recommends the combination of FQ-CODEL with other mechanisms, to reduce application latency. Mechanisms such as ABE, have been shown to increase aggregate throughput and reduce application latency for thin-stream applications.
APA, Harvard, Vancouver, ISO, and other styles
7

Hachfi, Fakhreddine Mohamed. "Future of asynchronous transfer mode networking." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2639.

Full text
Abstract:
The growth of Asynchronous Transfer Mode (ATM) was considered to be the ideal carrier of the high bandwidth applications like video on demand and multimedia e-learning. ATM emerged commercially in the beginning of the 1990's. It was designed to provide a different quality of service at a speed up 100 Gbps for both real time and non real time application. The turn of the 90's saw a variety of technologies being developed. This project analyzes these technologies, compares them to the Asynchronous Transfer Mode and assesses the future of ATM.
APA, Harvard, Vancouver, ISO, and other styles
8

Grobler, Reinette. "Signalling and scheduling for efficient bulk data transfer in circuit-switched networks." Diss., 2001. http://hdl.handle.net/2263/25154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Han, Bing. "Formal specification of the TCP service and verification of TCP connection management." 2004. http://arrow.unisa.edu.au:8081/1959.8/24965.

Full text
Abstract:
Using the approach of Coloured Petri nets (CPNs) and automata theory, this thesis shows how to formalise the service provided by the Transmission Control Protocol (TCP) and verify TCP Connection Management, an essential part of TCP. Most of the previous work on modelling and analysing TCP Connection Management is based on early versions of TCP, which are different from the current TCP specification. Also the scope is mainly confined to the connection establishment procedure, while the release procedure is either simplified or omitted from investigation. This thesis extends prior work by verifying a detailed model of TCP Connection Management. In defining the TCP service, the set of service primitives and their sequencing constraints are specified at each service access point.
thesis (PhDComputerSystemsEng)--University of South Australia, 2004.
APA, Harvard, Vancouver, ISO, and other styles
10

Walingo, Tom. "Performance of the transmission control protocol (TCP) over wireless with quality of service." Thesis, 2001. http://hdl.handle.net/10413/5267.

Full text
Abstract:
The Transmission Control Protocol (TCP) is the most widely used transport protocol in the Internet. TCP is a reliable transport protocol that is tuned to perform well in wired networks where packet losses are mainly due to congestion. Wireless channels are characterized by losses due to transmission errors and handoffs. TCP interprets these losses as congestion and invokes congestion control mechanisms resulting in degradation of performance. TCP is usually layered over the Internet protocol (lP) at the network layer. JP is not reliable and does not provide for any Quality of Service (QoS). The Internet Engineering Task Force (IETF) has provided two techniques for providing QoS in the Internet. These include Integrated Services (lntServ) and Differentiated Services (DiffServ). IntServ provides flow based quality of service and thus it is not scalable on connections with large flows. DiffServ has grown in popularity since it is scalable. A packet in a DiffServ domain is classified into a class of service according to its contract profile and treated differently by its class. To provide end-to-end QoS there is a strong interaction between the transport protocol and the network protocol. In this dissertation we consider the performance of the TCP over a wireless channel. We study whether the current TCP protocols can deliver the desired quality of service faced with the challenges they have on wireless channel. The dissertation discusses the methods of providing for QoS in the Internet. We derive an analytical model for TCP protocol. It is extended to cater for the wireless channel and then further differentiated services. The model is shown to be accurate when compared to simulation. We then conclude by deducing to what degree you can provide the desired QoS with TCP on a wireless channel.
Thesis (M.Sc.Eng.)-University of Natal, Durban, 2001.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "TCP/IP (Computer network protocol) Data transmission systems. File Transfer Protocol (Computer network protocol)"

1

The simple book: An introduction to management of TCP/IP-based internets. Englewood Cliffs, N.J: Prentice Hall, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rose, Marshall T. The Simple book: An introduction to management of TCP/IP based internets. Englewood Cliffs, N.J: Prentice Hall International, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lee, Thomas. Microsoft windows 2000 TCP/IP: Protocol and services, technical references. Redmond, Wash: Microsoft Press, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Emma, Minoli, ed. Delivering voice over IP networks. 2nd ed. New York: Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Emma, Minoli, ed. Delivering voice over IP networks. New York: John Wiley, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Minoli, Daniel. Delivering Voice over IP Networks. New York: John Wiley & Sons, Ltd., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Markovitz, Paul. Guidelines for the evaluation of file transfer, access, and management implementations. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Markovitz, Paul. Guidelines for the evaluation of file transfer, access, and management implementations. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Held, Gilbert. Voice over data networks. New York: McGraw-Hill, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sudheer, D. An X-400 application level gateway between TCP/IP and OSI protocols. Bangalore: Dept. of Electrical Communication Engineering, Indian Institute of Science, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "TCP/IP (Computer network protocol) Data transmission systems. File Transfer Protocol (Computer network protocol)"

1

"Networking Fundamentals." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 106–18. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch004.

Full text
Abstract:
This chapter introduces to basics of computer networking and associated widely used essential networking communication protocols. The chapter provides the comparison of OSI and TCP model along with details of internet layer protocols including internet protocol (IP), IP addressing schemes, internet control messaging protocol (ICMP), etc. Next, the chapter discusses transport layer protocols transmission control protocol (TCP) and user datagram protocol (UDP) in detail. Application layer protocols including dynamic host control protocol (DHCP), secure shell (SSH), file transfer protocol (FTP), trivial FTP (TFTP), simple network management protocol (SNMP), hyper text transfer protocol secure (HTTPS), network time protocol (NTP), domain name system (DNS), and simple mail transfer protocol (SMTP) are also explained in this chapter. One just cannot attack a networking protocol without knowing how it works. Having a solid introduction about computer networking and network protocols is fundamental in the ethical hacking world. This chapter quickly revisits all essential concepts related to computer networking.
APA, Harvard, Vancouver, ISO, and other styles
2

Rajagopal, Dr. "Internet, Reengineering and Technology Applications in Retailing." In Business Information Systems, 1324–42. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-969-9.ch082.

Full text
Abstract:
The rapid growth in computer technology and commercial needs have allowed significant changes in the information management systems. There emerged in early nineties many commercial network backbones to link with the NSFnet to provide market information to the business firms. The Internet today is a combination of NSFnet and commercially available backbone services disseminating information on the decentralized networks all over the world. It is estimated that there are over 30,000 computer networks connecting over 2 million computers with each other on the Web. In view of the increasing use of electronic information sources through the networks the Transmission Control Protocol/Internet Protocol (TCP/IP) has been designed and made essential for each user networks to abide with the protocol standards which enables the data transfer and retrieval at source.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography