Academic literature on the topic 'TCP/IP (Computer network protocol) Integrated services digital networks Computer networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'TCP/IP (Computer network protocol) Integrated services digital networks Computer networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "TCP/IP (Computer network protocol) Integrated services digital networks Computer networks"

1

Zain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.

Full text
Abstract:
In recent times, secure communication protocols over web such as HTTPS (Hypertext Transfer Protocol Secure) are being widely used instead of plain web communication protocols like HTTP (Hypertext Transfer Protocol). HTTPS provides end-to-end encryption between the user and service. Nowadays, organizations use network firewalls and/or intrusion detection and prevention systems (IDPS) to analyze the network traffic to detect and protect against attacks and vulnerabilities. Depending on the size of organization, these devices may differ in their capabilities. Simple network intrusion detection sy
APA, Harvard, Vancouver, ISO, and other styles
2

Gao, Zhenyu, Jian Cao, Wei Wang, Huayun Zhang, and Zengrong Xu. "Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time." Security and Communication Networks 2021 (September 13, 2021): 1–11. http://dx.doi.org/10.1155/2021/4587862.

Full text
Abstract:
Industry 4.0 focuses on continuous interconnection services, allowing for the continuous and uninterrupted exchange of signals or information between related parties. The application of messaging protocols for transferring data to remote locations must meet specific specifications such as asynchronous communication, compact messaging, operating in conditions of unstable connection of the transmission line of data, limited network bandwidth operation, support multilevel Quality of Service (QoS), and easy integration of new devices. The Message Queue Telemetry Transport (MQTT) protocol is used i
APA, Harvard, Vancouver, ISO, and other styles
3

Azrour, Mourade, Jamal Mabrouki, and Rajasekhar Chaganti. "New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT." Security and Communication Networks 2021 (May 7, 2021): 1–12. http://dx.doi.org/10.1155/2021/5546334.

Full text
Abstract:
Recently, Internet of Things and cloud computing are known to be emerged technologies in digital evolution. The first one is a large network used to interconnect embedded devices, while the second one refers to the possibility of offering infrastructure that can be used from anywhere and anytime. Due to their ability to provide remote services, IoT and cloud computing are actually integrated in various areas especially in the healthcare domain. However, the user private data such as health data must be secured by enhancing the authentication methods. Recently, Sharma and Kalra projected an aut
APA, Harvard, Vancouver, ISO, and other styles
4

Awotunde, Joseph Bamidele, Chinmay Chakraborty, and Abidemi Emmanuel Adeniyi. "Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection." Wireless Communications and Mobile Computing 2021 (September 2, 2021): 1–17. http://dx.doi.org/10.1155/2021/7154587.

Full text
Abstract:
The Industrial Internet of Things (IIoT) is a recent research area that links digital equipment and services to physical systems. The IIoT has been used to generate large quantities of data from multiple sensors, and the device has encountered several issues. The IIoT has faced various forms of cyberattacks that jeopardize its capacity to supply organizations with seamless operations. Such risks result in financial and reputational damages for businesses, as well as the theft of sensitive information. Hence, several Network Intrusion Detection Systems (NIDSs) have been developed to fight and p
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Qing Xue, and Long Hua Mu. "Analysis of Security of SCADA System." Applied Mechanics and Materials 568-570 (June 2014): 1417–21. http://dx.doi.org/10.4028/www.scientific.net/amm.568-570.1417.

Full text
Abstract:
SCADA (Supervisory Control and Data Acquisition) is an important concern about national security of our country and its security professionals. During those early days, a so called "security by obscurity" helped provide a palpable layer of cyber security and defense and a general feeling of immunity kinds of security problems that have started emerging networks to emerge in the mid 1980's, starting with the known Morris Worm. However, with the global standardization of TCP/IP protocol, and for the past 20 years, with the migration of autonomous systems SCADA interconnected power grids, securit
APA, Harvard, Vancouver, ISO, and other styles
6

McGuire, Mark. "Ordered Communities." M/C Journal 7, no. 6 (2005). http://dx.doi.org/10.5204/mcj.2474.

Full text
Abstract:

 
 
 A rhetoric of freedom characterises much of the literature dealing with online communities: freedom from fixed identity and appearance, from the confines of geographic space, and from control. The prevailing view, a combination of futurism and utopianism, is that the lack of order in cyberspace enables the creation of social spaces that will enhance personal freedom and advance the common good. Sherry Turkle argues that computer-mediated communication allows us to create a new form of community, in which identity is multiple and fluid (15-17). Marcos Novak celebrates the p
APA, Harvard, Vancouver, ISO, and other styles
7

Goggin, Gerard. "Broadband." M/C Journal 6, no. 4 (2003). http://dx.doi.org/10.5204/mcj.2219.

Full text
Abstract:
Connecting I’ve moved house on the weekend, closer to the centre of an Australian capital city. I had recently signed up for broadband, with a major Australian Internet company (my first contact, cf. Turner). Now I am the proud owner of a larger modem than I have ever owned: a white cable modem. I gaze out into our new street: two thick black cables cosseted in silver wire. I am relieved. My new home is located in one of those streets, double-cabled by Telstra and Optus in the data-rush of the mid-1990s. Otherwise, I’d be moth-balling the cable modem, and the thrill of my data percolating down
APA, Harvard, Vancouver, ISO, and other styles
8

Pham, Linh Manh, and Xuan Tung Hoang. "An Elasticity Framework for Distributed Message Queuing Telemetry Transport Brokers." VNU Journal of Science: Computer Science and Communication Engineering 37, no. 1 (2021). http://dx.doi.org/10.25073/2588-1086/vnucsce.267.

Full text
Abstract:
Internet of Things (IoT) applications are increasingly making impact in all areas of humanlife. Day by day, its chatty embedded devices have been generating tons of data requiring effectivenetwork infrastructure. To deliver millions of IoT messages back and fort with as few faults aspossible, participation of communication protocols like MQTT is a must. Lightweight blueprintand friendly battery are just two of many advantages of this protocol making it become a dominantin IoT world. In real application scenarios, distributed MQTT solutions are usually required sincecentralized MQTT approach is
APA, Harvard, Vancouver, ISO, and other styles
9

Cinque, Toija. "A Study in Anxiety of the Dark." M/C Journal 24, no. 2 (2021). http://dx.doi.org/10.5204/mcj.2759.

Full text
Abstract:
Introduction This article is a study in anxiety with regard to social online spaces (SOS) conceived of as dark. There are two possible ways to define ‘dark’ in this context. The first is that communication is dark because it either has limited distribution, is not open to all users (closed groups are a case example) or hidden. The second definition, linked as a result of the first, is the way that communication via these means is interpreted and understood. Dark social spaces disrupt the accepted top-down flow by the ‘gazing elite’ (data aggregators including social media), but anxious users m
APA, Harvard, Vancouver, ISO, and other styles
10

Maddox, Alexia, and Luke J. Heemsbergen. "Digging in Crypto-Communities’ Future-Making." M/C Journal 24, no. 2 (2021). http://dx.doi.org/10.5204/mcj.2755.

Full text
Abstract:
Introduction This article situates the dark as a liminal and creative space of experimentation where tensions are generative and people tinker with emerging technologies to create alternative futures. Darkness need not mean chaos and fear of violence – it can mean privacy and protection. We define dark as an experimental space based upon uncertainties rather than computational knowns (Bridle) and then demonstrate via a case study of cryptocurrencies the contribution of dark and liminal social spaces to future(s)-making. Cryptocurrencies are digital cash systems that use decentralised (peer-to-
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "TCP/IP (Computer network protocol) Integrated services digital networks Computer networks"

1

Silveira, Loreno Menezes da 1952. "Conceito e dimensionamento de recursos de voz e sinalização em redes de nova geração." [s.n.], 2015. http://repositorio.unicamp.br/jspui/handle/REPOSIP/259657.

Full text
Abstract:
Orientador: Michel Daoud Yacoub<br>Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação<br>Made available in DSpace on 2018-08-27T09:49:57Z (GMT). No. of bitstreams: 1 Silveira_LorenoMenezesda_M.pdf: 2626161 bytes, checksum: b80454b10dc90baf554cb0f37c6ba67e (MD5) Previous issue date: 2015<br>Resumo: Esta dissertação apresenta uma visão da evolução das redes de telecomunicações objetivando o atendimento dos parâmetros da Qualidade de Serviço de redes IP aos requisitos de qualidade de voz das redes telefônicas de circuitos comutados. Gera
APA, Harvard, Vancouver, ISO, and other styles
2

Samiuddin, Asim. "IPAM : a web-based IP/DNS management system /." free to MU campus, to others for purchase, 2004. http://wwwlib.umi.com/cr/mo/fullcit?p1422961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Doble, James Carleton University Dissertation Engineering Electrical. "Distribution of protocol functions in an interworking-based ISDN switching node implementation." Ottawa, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Opie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.

Full text
Abstract:
Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. Of all the limitations that these networks had, the ability of malicious attacks to cripple communication was not a crucial one. This situation has changed radically now that real-time communication and data have merged to share the same network. The objective of this project is to investigate the securing of softswitches with functionality similar to Private Branch Exchanges (PBX) from malicious attacks. The focus of the project will be a practical investigation of how to secure ILANGA, an ASTER
APA, Harvard, Vancouver, ISO, and other styles
5

Hachfi, Fakhreddine Mohamed. "Future of asynchronous transfer mode networking." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2639.

Full text
Abstract:
The growth of Asynchronous Transfer Mode (ATM) was considered to be the ideal carrier of the high bandwidth applications like video on demand and multimedia e-learning. ATM emerged commercially in the beginning of the 1990's. It was designed to provide a different quality of service at a speed up 100 Gbps for both real time and non real time application. The turn of the 90's saw a variety of technologies being developed. This project analyzes these technologies, compares them to the Asynchronous Transfer Mode and assesses the future of ATM.
APA, Harvard, Vancouver, ISO, and other styles
6

Spencer, Logan Lemuella C. "Changing from the silo model to the horizontal layers model in public policy regulations : the implications and potential for the telecommunications industry /." Thesis, Available online, Georgia Institute of Technology, 2005, 2005. http://etd.gatech.edu/theses/available/etd-11282005-192311/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Enhancement of ISDN user-network interface signalling protocol for the inclusion of basic local area network property." Chinese University of Hong Kong, 1993. http://library.cuhk.edu.hk/record=b5887820.

Full text
Abstract:
by Cheung Kam Wah.<br>Thesis (M.Phil.)--Chinese University of Hong Kong, 1993.<br>Includes bibliographical references (leaves 62-63).<br>Chapter Chapter 1. --- Introduction --- p.1<br>Chapter Chapter 2. --- ISDN Architecture --- p.4<br>Chapter 2.1 --- ISDN Definition --- p.4<br>Chapter 2.2 --- Channel Structure --- p.6<br>Chapter 2.3 --- Wiring Configuration of ISDN User-Network Interface --- p.6<br>Chapter 2.4 --- ISDN Signalling Protocol at S/T Interface --- p.7<br>Chapter Chapter 3. --- ISDN Signalling Protocol Enhancement --- p.8<br>Chapter 3.1 --- ISDN Basic Rate Access Configurati
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "TCP/IP (Computer network protocol) Integrated services digital networks Computer networks"

1

Chris, Hobbs, and Turton Brian, eds. ATM and Internet protocol: A convergence of technologies. Arnold, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Emma, Minoli, ed. Delivering voice over IP networks. 2nd ed. Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Emma, Minoli, ed. Delivering voice over IP networks. John Wiley, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Minoli, Daniel. Delivering Voice over IP Networks. John Wiley & Sons, Ltd., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Held, Gilbert. Voice over data networks. McGraw-Hill, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ouakil, Laurent. Téléphonie sur IP. Eyrolles, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Held, Gilbert. Voice & data internetworking. McGraw-Hill, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Held, Gilbert. Voice and data internetworking. McGraw-Hill, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Held, Gilbert. Voice and data internetworking. McGraw-Hill, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Faynberg, Igor, Lawrence Gabuzda, and Hui-Lan Lu. Converged Networks and Services: Internetworking IP and the PSTN. John Wiley & Sons, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "TCP/IP (Computer network protocol) Integrated services digital networks Computer networks"

1

Mogollon, Manuel. "Information Assurance." In Cryptography and Security Services. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-837-6.ch002.

Full text
Abstract:
The TCP/IP protocol is becoming the world standard for network and computer communications. The number of TCP/IP applications on the Internet and in corporate networks is continually growing, with a resulting increase in network vulnerability. When data communications security is discussed in this text, it refers to communications security for the TCP/IP protocol and to the security mechanisms implemented at the different layers of the TCP/IP stack protocol. This chapter also describes, in a general way, which security mechanisms are used for specific security services.
APA, Harvard, Vancouver, ISO, and other styles
2

Rajagopal, Dr. "Internet, Reengineering and Technology Applications in Retailing." In Business Information Systems. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-969-9.ch082.

Full text
Abstract:
The rapid growth in computer technology and commercial needs have allowed significant changes in the information management systems. There emerged in early nineties many commercial network backbones to link with the NSFnet to provide market information to the business firms. The Internet today is a combination of NSFnet and commercially available backbone services disseminating information on the decentralized networks all over the world. It is estimated that there are over 30,000 computer networks connecting over 2 million computers with each other on the Web. In view of the increasing use of electronic information sources through the networks the Transmission Control Protocol/Internet Protocol (TCP/IP) has been designed and made essential for each user networks to abide with the protocol standards which enables the data transfer and retrieval at source.
APA, Harvard, Vancouver, ISO, and other styles
3

O’Hara, Kieron. "Preliminary Concepts." In Four Internets. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197523681.003.0001.

Full text
Abstract:
This chapter presents some of the basic concepts required to describe the Internet. The Internet has to meet functional specifications, but it also needs to work as a data transportation network. The concept of a network is introduced, because the Internet is a network of computer networks, controlled by the Internet Protocol Suite TCP/IP. The value of a network increases as the number of members, and the number of connections between them, increase, and a network is more efficient at communication than a hierarchy. Metcalfe’s Law, quantifying positive network effects, is introduced. Fragmentation is defined as incompatibility of technical standards across different parts of the Internet. The Internet transports data, defined as uninterpreted symbols, which is contrasted with information, defined as interpreted data. Finally, digital modernity is introduced as the evolution of modernity driven by networks and data, disrupting offline norms, processes, and institutions.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!