To see the other types of publications on this topic, follow the link: Tcp-udp.

Journal articles on the topic 'Tcp-udp'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Tcp-udp.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mzrieb, Hossam. "Performance Evaluation of UDP, DCCP and TCP in Congested Wired Networks." International Journal of Information Systems and Social Change 10, no. 3 (July 2019): 24–32. http://dx.doi.org/10.4018/ijissc.2019070103.

Full text
Abstract:
Communication through the internet is one of the dominant methods of exchanging information. TCP and UDP are the transport layer protocols responsible for transit of nearly all Internet communications. Due to the growth of real-time audio and video applications, UDP is being used more frequently as a transport protocol, but unlike TCP, UDP has no mechanism for congestion control leading to wasted bandwidth and poor performance, so the DCCP protocol has appeared as a replacement for UDP. In this article, the author performs some simulations using NS2 for Drop Tail and RED queuing models to evaluate the performance of TCP, UDP, DCCP CCID2, and DCCP CCID3 protocols in congested wired networks. The performance metrics used are throughput, end to end delay, number of sent and lost packets. The obtained results show that the DCCP CCID2 performs the best throughput with the minimum of delay as compared to UDP, TCP, and DCCP CCID3.
APA, Harvard, Vancouver, ISO, and other styles
2

Domańska, J., A. Domański, T. Czachórski, and J. Klamka. "Fluid flow approximation of time-limited TCP/UDP/XCP streams." Bulletin of the Polish Academy of Sciences Technical Sciences 62, no. 2 (June 1, 2014): 217–25. http://dx.doi.org/10.2478/bpasts-2014-0021.

Full text
Abstract:
Abstract This article presents the use of fluid flow approximation to model interactions between a set of TCP, UDP and XCP flows in the environment of IP routers using AQM (Active Queue Management) algorithms to control traffic congestion. In contrast to other works, independent UDP and TCP streams are considered and the model allows to start and end data transmissions in TCP, UDP and XCP streams at any time moment. It incorporates several Active Queue Management mechanisms: RED, NLRED, CHOKe.
APA, Harvard, Vancouver, ISO, and other styles
3

Jing, Yuanwei, Zanhua Li, and Georgi Dimirovski. "Minimax based congestion control for TCP network systems with UDP flows." MATEC Web of Conferences 210 (2018): 03005. http://dx.doi.org/10.1051/matecconf/201821003005.

Full text
Abstract:
The congestion control problem for TCP network systems with UDP flows is considered. A nonlinear TCP network model with strict-feedback structure is established. The unknown UDP flow is considered as the disturbance to the system, and the maximum UDP flow is calculated by using the minimax approach. And then, a congestion control algorithm is proposed by using backstepping approach. Further, a state-feedback congestion controller is presented to make the TCP networks asymptotically stable. The simulation results show the superiority and feasibility of the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhu, Na Fei, Yue Zhou, Wei Wang, and Li Lou. "Analysis of the Technologies for Host and Port Scanning." Advanced Materials Research 989-994 (July 2014): 4286–89. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4286.

Full text
Abstract:
Host scanning and port scanning are the basis for attacking information system. The technologies commonly used in these scans can be classified as ICMP scanning, TCP scanning and UDP scanning. We analyze these technologies and make comparisons among them. Totally, ICMP are mainly used to discover the host, while the TCP and UDP are mainly for port scanning, except for ACK. At the same time, using certain special TCP datagram such as SYN packets and ACK packets, and UDP datagram, we can make a host scanning in a secret manner.
APA, Harvard, Vancouver, ISO, and other styles
5

Marek, Dariusz, Adam Domański, Joanna Domańska, Jakub Szyguła, Tadeusz Czachórski, and Jerzy Klamka. "Diffusion Model of a Non-Integer Order PIγ Controller with TCP/UDP Streams." Entropy 23, no. 5 (May 16, 2021): 619. http://dx.doi.org/10.3390/e23050619.

Full text
Abstract:
In this article, a way to employ the diffusion approximation to model interplay between TCP and UDP flows is presented. In order to control traffic congestion, an environment of IP routers applying AQM (Active Queue Management) algorithms has been introduced. Furthermore, the impact of the fractional controller PIγ and its parameters on the transport protocols is investigated. The controller has been elaborated in accordance with the control theory. The TCP and UDP flows are transmitted simultaneously and are mutually independent. Only the TCP is controlled by the AQM algorithm. Our diffusion model allows a single TCP or UDP flow to start or end at any time, which distinguishes it from those previously described in the literature.
APA, Harvard, Vancouver, ISO, and other styles
6

Suherman, S., Naemah Mubarakah, and Marwan Al-Akaidi. "Minimizing Energy Consumption on Mobile Phone by Rearranging Transport Protocol Load." International Journal of Engineering & Technology 7, no. 3.2 (June 20, 2018): 713. http://dx.doi.org/10.14419/ijet.v7i3.2.15350.

Full text
Abstract:
There are two transport layer protocols that have been used in the internet protocol (IP) networks: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both protocols have been utilized for video streaming applications. This paper examines energy consumed by a mobile device when TCP or UDP employed by the application within it for streaming a video file. A transport protocol load management is proposed to reduce the mobile device energy consumptions. The experiments were conducted in the 802.11 environment. The results show that the proposed method is able to minimize mobile device energy consumptions up to 10.7% and 3.34% for both TCP and UDP protocols.
APA, Harvard, Vancouver, ISO, and other styles
7

Iryani, Nanda, Afifah Dwi Ramadhani, and Mayang Karmila Sari. "Analisis Performansi Routing OSPF menggunakan RYU Controller dan POX Controller pada Software Defined Networking." Jurnal Telekomunikasi dan Komputer 11, no. 1 (April 1, 2021): 73. http://dx.doi.org/10.22441/incomtech.v11i1.10187.

Full text
Abstract:
Software Defined Networking (SDN) adalah teknologi baru yang dikembangkan untuk mengatasi masalah kompleksitas konfigurasi jaringan dengan pengelolaan lebih terpusat karena memisahkan antara control plane dan data plane. Penelitian ini menganalisis perbandingan performansi SDN menggunakan ryu controller dan pox controller. Protocol yang digunakan adalah protocol TCP dan UDP sedangkan routingnya menggunakan OSPF. Penerapan algoritma dijkstra dari perutean OSPF ke topologi fat tree pada SDN akan diukur unjuk kerjanya berdasarkan parameter Quality of Service yaitu delay, jitter, dan packet loss pada skenario tanpa background traffic. Transmisi data menggunakan traffic protocol TCP dengan RYU controller dan protokol UDP lebih baik karena memiliki delay sebesar 49.44% dan delay yang lebih stabil sebesar 0.01 %. Jitter yang dihasilkan adalah 27.59% lebih baik daripada POX controller sebesar 72.41% dan untuk protokol UDP menggunakan POX controller 99.97% sedangkan traffic protocol UDP menggunakan RYU controller lebih baik sebesar 0.03%. Packet loss dari kedua controller didapatkan hasil protokol TCP sangat bagus sebesar 0% sedangkan protokol UDP menggunakan POX controller 83.13%, menggunakan RYU controller 16.87%.
APA, Harvard, Vancouver, ISO, and other styles
8

Surimi, La, and Reza Pulungan. "Analisis Kualitas VoIP pada SCTP Menggunakan ECN dan AQM." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 9, no. 2 (July 31, 2015): 121. http://dx.doi.org/10.22146/ijccs.7541.

Full text
Abstract:
AbstrakVoIP merupakan aplikasi real time yang kualitasnya sangat tergantung pada delay dan jitter, yang mana hal ini sulit dipenuhi oleh protokol yang bersifat reliable dan memiliki congestion control seperti TCP. Di sisi lain penggunaan UDP yang tidak memiliki congestion control menyebabkan peluang terjadinya congestion pada jaringan sangat besar. Penggunaan SCTP sebagai protokol alternatif juga belum mampu mengakomodasi kekurangan TCP dan UDP. Beberapa hasil penelitian menunjukkan perlu adanya perbaikan ataupun modifikasi pada mekanisme congestion control yang dimiliki oleh SCTP. Penggunaan mekanisme ECN dan AQM pada beberapa penelitian menunjukkan bahwa kedua mekanisme ini dapat menurunkan delay dan jitter. Penelitian ini melakukan pengujian terhadap kualitas VoIP di atas SCTP yang menggunakan ECN dan AVQ pada network simulator NS2. Hasil simulasi menunjukkan bahwa penggunaan mekanisme ECN dan AVQ pada protokol SCTP menghasilkan kualitas VoIP yang lebih baik pada kondisi jaringan yang tidak ideal (high Latency low Bandwidth dan low Latency low Bandwidth dari pada penggunaan protokol SCTP tanpa menggunakan mekanisme ECN dan AVQ. Penelitian ini juga melakukan perbandingan nilai MOS panggilan VoIP SCTP yang menggunakan ECN dan AVQ dengan nilai MOS panggilan VoIP yang menggunakan protokol TCP dan UDP. Hasilnya SCTP dengan ECN dan AVQ mengungguli TCP namun belum dapat mengungguli UDP. Kata kunci— VoIP, SCTP, ECN, AQM,AVQ. AbstractVoIP is the real time applications that are highly dependent on the quality of delay and jitter, which it is difficult to be met by protocol that has reliable data transfer feature and congestion control such as TCP. On the other hand the use of UDP that has no congestion control make chance of causing congestion in the network is very large. The use of SCTP as an alternative protocol was also not able to accommodate the weaknesses of TCP and UDP. Some research shows that repairs or modifications to the SCTP congestion control mechanism is needed.The Use of ECN and AQM in some studies show that these two mechanisms can reduce delay and jitter. This study tested the quality of VoIP over SCTP with ECN and AVQ, in NS2. Simulations carried out by independent replication technique, and the results showed that ECN and AVQ can increase the value of MOS VoIP calls significantly in non ideal network scenarios. This study also did comparison of SCTP MOS that uses ECN and AVQ with MOS values VoIP using TCP and UDP. The result showed that SCTP with ECN and AVQ outperform TCP but can not surpass UDP yet. Keywords— VoIP, SCTP, ECN, AQM,AVQ.
APA, Harvard, Vancouver, ISO, and other styles
9

Jeong, S. H., H. Owen, J. Copeland, and J. Sokol. "QoS support for UDP/TCP based networks." Computer Communications 24, no. 1 (January 2001): 64–77. http://dx.doi.org/10.1016/s0140-3664(00)00290-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ban, Tae-Hak, Chu Xun, Chang-Su Kim, and Hoekyung Jung. "ADAPTIVE STREAMING SYSTEM USING TCP AND UDP." Far East Journal of Electronics and Communications 16, no. 4 (December 15, 2016): 839–46. http://dx.doi.org/10.17654/ec016040839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Nuiaa, Riyadh Rahef, Selvakumar Manickam, and Ali Hakem Alsaeedi. "Distributed reflection denial of service attack: A critical review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (December 1, 2021): 5327. http://dx.doi.org/10.11591/ijece.v11i6.pp5327-5341.

Full text
Abstract:
As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
12

Silva, Pedro Henrique, and Nilton Alves. "IPERF tool: generation and evaluation of TCP and UDP data traffic." Notas técnicas 4, no. 2 (April 2014): 1–13. http://dx.doi.org/10.7437/nt2236-7640/2014.02.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Wang, Jianyi. "The Performance and Future of QUIC Protocol in the Modern Internet." Network and Communication Technologies 6, no. 1 (July 7, 2021): 28. http://dx.doi.org/10.5539/nct.v6n1p28.

Full text
Abstract:
Quick UDP Internet Connections (QUIC) protocol is a potential replacement for the TCP protocol to transport HTTP encrypted traffic. It is based on UDP and offers flexibility, speed, and low latency. The performance of QUIC is related to the everyday web browsing experience. QUIC is famous for its Forward Error Correction (Luyi, Jinyi, & Xiaohua, 2012) and congestion control (Hari, Hariharan, & Srinivasan, 1999) algorithm that improves user browsing delay by reducing the time spent on loss recovery (Jörg, Ernst, & Don, 1998). This paper will compare QUIC with other protocols such as HTTP/2 over TCP, WebSocket, and TCP fast open in terms of latency reduction and loss recovery to determine the role of each protocol in the modern internet. Furthermore, this paper will propose potential further improvements to the QUIC protocol by studying other protocols.
APA, Harvard, Vancouver, ISO, and other styles
14

Rajkumar, K., and P. Swaminathan. "Combining TCP and UDP for Secure Data Transfer." Indian Journal of Science and Technology 8, S9 (May 10, 2015): 285. http://dx.doi.org/10.17485/ijst/2015/v8is9/65569.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Liu, Feng, Zhi-Hong Guan, and Hua O. Wang. "Controlling bifurcations and chaos in TCP–UDP–RED." Nonlinear Analysis: Real World Applications 11, no. 3 (June 2010): 1491–501. http://dx.doi.org/10.1016/j.nonrwa.2009.03.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

CHAE, H. S. "Congestion Control for Mixed TCP and UDP Traffic." IEICE Transactions on Communications E88-B, no. 10 (October 1, 2005): 4097–101. http://dx.doi.org/10.1093/ietcom/e88-b.10.4097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Bukohwo M., Esiefarienrhe. "QoS performance analysis of bit rate video streaming in next generation networks using TCP, UDP and a TCP+UDP hybrid." South African Journal of Information and Communication, no. 18 (2016): 0. http://dx.doi.org/10.23962/10539/21759.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Xu, Tao, Zhi Hua Hu, Jian Jun Wang, and Hai Hui Song. "Smart Home Design Based on Wireless Transmission Technology." Applied Mechanics and Materials 291-294 (February 2013): 2132–36. http://dx.doi.org/10.4028/www.scientific.net/amm.291-294.2132.

Full text
Abstract:
In this article, a design of smart home control system which based on wireless transmission technology was presented. Through WIFI and 3G technology, users can monitor the equipments of their homes in everywhere. With WIFI’s ADHOC characteristics, equipments can be added or reduced easily. The high data transmission speed capability of WIFI and 3G makes the video monitor become possible. Both UDP and TCP protocol are used, thereinto, the UDP protocol is used to transmit video data, while the TCP protocol is used to transmit the data with security requirements. In order to save cost, Lwip protocol stack have been used to implement the requirements of this design.
APA, Harvard, Vancouver, ISO, and other styles
19

NUGROHO, KUKUH, and DHIMAS PRABOWO SETYANUGROHO. "Analisis Kinerja RouteFlow pada Jaringan SDN (Software Defined Network ) menggunakan Topologi Full-Mesh." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 7, no. 3 (September 30, 2019): 585. http://dx.doi.org/10.26760/elkomika.v7i3.585.

Full text
Abstract:
ABSTRAKPerangkat controller dalam jaringan SDN berfungsi untuk memberikan informasi tabel flow ke perangkat switch sebagai acuan dalam menentukan informasi rute. Kecepatan dalam memproses permintaan tabel flow yang dilakukan oleh perangkat switch tergantung dari pemilihan jenis controller yang digunakan. Terdapat beberapa jenis controller yang bisa digunakan untuk mengatur aliran trafik data dalam jaringan SDN. Pada penelitian ini akan digunakan jenis controller RouteFlow dengan menggunakan algoritma routing Djikstra. Jaringan uji menggunakan topologi Full-Mesh yang menyediakan koneksi penuh ke semua switch, dimana terdapat dua protokol layer transport yang digunakan untuk mengirimkan data dalam jaringan SDN yaitu TCP dan UDP. Hasil pengukuran kualitas jaringan menunjukkan bahwa penggunaan protokol UDP menghasilkan nilai delay, jitter, dan throughput yang lebih baik dibandingkan dengan TCP. Waktu konvergensi jaringan yang dihasilkan sebesar 12,18 ms ketika ukuran data yang dipertukarkan sebesar 64 Byte.Kata kunci: Controller, Full-Mesh, RouteFlow, Software Defined Network ABSTRACTThe controller device in the SDN network is applied to provide flow table information for all switches as a reference in determining route information. The speed in processing the flow table requests that are made by the switches depends on the choice of the type of controller used. There are several types of controllers that can be used to manage the data traffic flow in the SDN network. This research utilizes the RouteFlow controller and the Djikstra routing algorithm. The test network applies the Full-Mesh topology that provides fully connections to all switches, wherein two transport protocols are used to transmit data in SDN networks, i.e., TCP and UDP. The results of network performance measurements show that the use of the UDP obtains better values in delay, jitter, and throughput than TCP. The network convergence time is 12.18 ms when the size of data exchanged is set to 64 Bytes.Keywords: Controller, Full-Mesh, RouteFlow, Software Defined Network
APA, Harvard, Vancouver, ISO, and other styles
20

Bujari, Armir, Andrea Marin, Claudio E. Palazzi, and Sabina Rossi. "Smart-RED: A Novel Congestion Control Mechanism for High Throughput and Low Queuing Delay." Wireless Communications and Mobile Computing 2019 (April 4, 2019): 1–10. http://dx.doi.org/10.1155/2019/6941248.

Full text
Abstract:
We consider the scenario in which several TCP connections share the same access point (AP) and a congestion avoidance/control mechanism is adopted with the aim of assigning the available bandwidth to the clients with a certain fairness. When UDP traffic with real-time requirements is present, the problem becomes even more challenging. Very well-known congestion avoidance mechanisms are the Random Early Detection (RED) and the Explicit Congestion Notification (ECN). More recently, the Smart Access Point with Limited Advertised Window (SAP-LAW) has been proposed. Its main idea is that of computing the maximum TCP rate for each connection at the bottleneck, taking into account the UDP traffic to keep a low queue size combined with a reasonable bandwidth utilization. In this paper, we propose a new congestion control mechanism, namely, Smart-RED, inspired by SAP-LAW heuristic formula. We study its performance by using mean field models and compare the behaviours of ECN/RED, SAP-LAW, and Smart-RED under different scenarios. We show that while Smart-RED maintains some of the desirable properties of the SAP-LAW, it solves the problems it may have in case of bursty UDP traffic or TCP connections with very different needs of bandwidth.
APA, Harvard, Vancouver, ISO, and other styles
21

Karolak, Juliusz, and Andrzej Kochan. "An application of TCP and UDP protocols in the connection of railway traffic control systems." WUT Journal of Transportation Engineering 126 (September 1, 2019): 49–59. http://dx.doi.org/10.5604/01.3001.0013.6396.

Full text
Abstract:
The article presents the possible implementation of the interface between computer devices: TCP and UDP protocols of one of the layers of the TCP / IP model, along with their features. Responses to errors were distinguished. Then an example of cooperation between two actual rail traffic control systems and other examples was presented, supplementing them with the proposed classification of connections. Systems are also presented, inside which network connections using TCP and IP protocols are used. The influence of the indicated damages on the substantive work of the connection was also presented.
APA, Harvard, Vancouver, ISO, and other styles
22

Mekkakia, Z. M., S. Selka, and A. Benyettou. "Behavior of TCP and UDP Flows with Differentiated Services." Journal of Applied Sciences 4, no. 1 (December 15, 2003): 24–27. http://dx.doi.org/10.3923/jas.2004.24.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Wei, Lan, and John Heidemann. "Does Anycast Hang Up on You (UDP and TCP)?" IEEE Transactions on Network and Service Management 15, no. 2 (June 2018): 707–17. http://dx.doi.org/10.1109/tnsm.2018.2804884.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Wheeb, Ali Hussein. "Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow in Wired Networks." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 6 (December 1, 2017): 3552. http://dx.doi.org/10.11591/ijece.v7i6.pp3552-3557.

Full text
Abstract:
<p>The demand for internet applications has increased rapidly. Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task Force (IETF). In this paper, we evaluate the performance of UDP, DCCP, SCTP and TFRC protocols for different traffic flows: data transmission, video traffic, and VOIP in wired networks. The performance criteria used for this evaluation include throughput, end to end delay, and packet loss rate. Well-known network simulator NS-2 used to implement the UDP, DCCP, SCTP, and TFRC protocols performance comparison. Based on the simulation results, the performance throughput of SCTP and TFRC is better than UDP. Moreover, DCCP performance is superior SCTP and TFRC in term of end-to-end delay.</p>
APA, Harvard, Vancouver, ISO, and other styles
25

Razi, Fakhrur, Ipan Suandi, and Fahmi Fahmi. "Energy Consumption Optimization by Increasing The Processor Speed of Moving Communication Devices in Transport Layer Protocol." Jurnal Litek : Jurnal Listrik Telekomunikasi Elektronika 16, no. 2 (September 1, 2019): 30. http://dx.doi.org/10.30811/litek.v16i2.1316.

Full text
Abstract:
The energy efficiency of mobile devices becomes very important, considering the development of mobile device technology starting to lead to smaller dimensions and with the higher processor speed of these mobile devices. Various studies have been conducted to grow energy-aware in hardware, middleware and application software. The step of optimizing energy consumption can be done at various layers of mobile communication network architecture. This study focuses on examining the energy consumption of mobile devices in the transport layer protocol, where the processor speed of the mobile devices used in this experiment is higher than the processor speed used in similar studies. The mobile device processor in this study has a speed of 1.5 GHz with 1 GHz RAM capacity. While in similar studies that have been carried out, mobile device processors have a speed of 369 MHz with a RAM capacity of less than 0.5 GHz. This study conducted an experiment in transmitting mobile data using TCP and UDP protocols. Because the video requires intensive delivery, so the video is the traffic that is being reviewed. Energy consumption is measured based on the amount of energy per transmission and the amount of energy per package. To complete the analysis, it can be seen the strengths and weaknesses of each protocol in the transport layer protocol, in this case the TCP and UDP protocols, also evaluated the network performance parameters such as delay and packet loss. The results showed that the UDP protocol consumes less energy and transmission delay compared to the TCP protocol. However, only about 22% of data packages can be transmitted. Therefore, the UDP protocol is only effective if the bit rate of data transmitted is close to the network speed. Conversely, despite consuming more energy and delay, the TCP protocol is able to transmit nearly 96% of data packets. On the other hand, when compared to mobile devices that have lower processor speeds, the mobile devices in this study consume more energy to transmit video data. However, transmission delay and packet loss can be suppressed. Thus, mobile devices that have higher processor speeds are able to optimize the energy consumed to improve transmission quality.Key words: energy consumption, processor, delay, packet loss, transport layer protocol
APA, Harvard, Vancouver, ISO, and other styles
26

Shah, Asghar Ali, Yaser Danial Khan, and Muhammad Adeel Ashraf. "Attacks Analysis of TCP And UDP Of UNCW-NB15 Dataset." VAWKUM Transactions on Computer Sciences 15, no. 3 (November 4, 2018): 143. http://dx.doi.org/10.21015/vtcs.v15i3.528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Larmo, Anna, Antti Ratilainen, and Juha Saarinen. "Impact of CoAP and MQTT on NB-IoT System Performance." Sensors 19, no. 1 (December 20, 2018): 7. http://dx.doi.org/10.3390/s19010007.

Full text
Abstract:
The IoT protocols used for data transfer in the application layer, namely the Constraint Application Protocol (CoAP) and Message Queue Telemetry Transport (MQTT) have dependencies to the transport layer. The choice of transport, Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), on the other hand, has an impact on the Internet of Things (IoT) application level performance, especially over a wireless medium. Furthermore, we touch upon the impact of different security solutions. The motivation of this work is to look at the impact of the protocol stack on performance over a narrowband IoT (NB-IoT) link. The use case studied is infrequent small reports sent from the sensor device to a central cloud storage over a last mile radio access link. We find that while CoAP/UDP based transport performs consistently better both in terms of latency, coverage, and system capacity, MQTT/TCP also works when the system is less loaded.
APA, Harvard, Vancouver, ISO, and other styles
28

Sutawijaya, Bayu, Achmad Basuki, and Fitra Abdurrachman Bachtiar. "Analisis Kinerja Algoritme TCP Congestion Control Berdasarkan Single dan Multiple Flow pada Multi-Path Routing." Jurnal Teknologi Informasi dan Ilmu Komputer 7, no. 5 (October 8, 2020): 961. http://dx.doi.org/10.25126/jtiik.2020752402.

Full text
Abstract:
<p class="Abstrak">Teknik <em>multi-path routing</em> merupakan solusi efektif untuk menambah kapasitas <em>bandwidth</em> jaringan. Namun, TCP menggunakan <em>multiple paths</em> sama dengan di <em>single path</em>. Penelitian ini melakukan analisis kinerja algoritme TCP <em>congestion control</em> Reno, BIC, CUBIC, dan BBR pada <em>multi-path routing</em> dengan setiap <em>multiple</em> <em>paths</em> menggunakan <em>cost</em> yang sama. Analisis yang dilakukan meliputi perbandingan antara <em>single path routing</em> dengan <em>multi-path routing</em>, <em>single flow</em>, dan <em>multiple flow</em>. Analisis <em>single flow</em> meliputi <em>link delay</em> dan <em>loss rate</em>. Sedangkan analisis <em>multiple flow</em> meliputi <em>inter </em>TCP<em> protocol fairness</em> dan <em>fairness</em> antara TCP dengan UDP. Semua evaluasi dilakukan berdasarkan emulasi pada VirtualBox. Berdasarkan hasil emulasi, <em>multi-path routing</em> dapat berdampak pada <em>packet reordering</em>, tetapi tidak mengakibatkan penurunan rata-rata <em>throughput</em> yang signifikan. Pada <em>single</em> <em>flow</em>, BBR merupakan algoritme TCP <em>congestion control</em> terbaik pada <em>multi-path routing</em>. Namun, pada <em>multiple flow</em>, CUBIC merupakan algoritme TCP <em>congestion control</em> terbaik pada <em>multi-path routing</em>. Pada evaluasi <em>link delay</em>, rata-rata RTT BBR lebih rendah hingga 58 ms dibandingkan dengan Reno, BIC, dan CUBIC. Sedangkan pada evaluasi <em>loss rate</em>, rata-rata <em>throughput</em> BBR lebih tinggi hingga 12 Mbps dibandingkan dengan Reno, BIC, dan CUBIC. Pada evaluasi <em>inter</em> TCP <em>protocol fairness</em> dan <em>fairness</em> antara TCP dengan UDP, <em>fairness</em> CUBIC paling mendekati 1 dibandingkan dengan Reno, BIC, dan BBR.</p><p class="Abstrak"> </p><p class="Abstrak"><em><strong>Abstract</strong></em></p><p class="Abstract"><em>The multi-path routing technique is an effective solution to increase network bandwidth capacity. However, TCP uses multiple paths similar to a single path. This study analyzes the performance of TCP congestion control algorithms Reno, BIC, CUBIC, and BBR on multi-path routing with each multiple paths using the same cost. The analysis includes a comparison between single path routing and multi-path routing, single flow, and multiple flows. In a single flow, the analysis includes link delay and loss rate. Whereas in multiple flows, the analysis includes inter TCP protocol fairness and fairness between TCP and UDP. All evaluations are based on emulation in VirtualBox. Based on the results from emulation, multi-path routing can have an impact on packet reordering but does not result in a significant degrade in average throughput. In a single flow, BBR is the best TCP congestion control algorithm on multi-path routing. However, in multiple flows, CUBIC is the best TCP congestion control algorithm on multi-path routing. In the link delay evaluations, the average RTT on BBR up to 58 ms lower than Reno, BIC, and CUBIC. Whereas in the loss rate evaluations, the average throughput on BBR up to 12 Mbps higher than Reno, BIC, and CUBIC. In the evaluation of inter TCP protocol fairness and fairness between TCP and UDP, fairness on CUBIC is closest to 1 than Reno, BIC, and BBR.</em></p><p class="Abstrak"><em><strong><br /></strong></em></p>
APA, Harvard, Vancouver, ISO, and other styles
29

Bubak, Marian, Dariusz Żbik, Dick van Albada, Kamil Iskra, and Peter Sloot. "Portable Library of Migratable Sockets." Scientific Programming 9, no. 4 (2001): 211–22. http://dx.doi.org/10.1155/2001/126087.

Full text
Abstract:
Efficient load balancing is essential for parallel distributed computing. Many parallel computing environments use TCP or UDP through the socket interface as a communication mechanism. This paper presents the design and development of a prototype implementation of a network interface that can preserve communication between processes during process migration. This new communication library is a substitution for the well-known socket interface. It is implemented in user — space; it is portable, and no modifications of user applications are required. TCP/IP is applied for internal communication, which guarantees relatively high performance and portability.
APA, Harvard, Vancouver, ISO, and other styles
30

Kang, Lei Lei, Xiang Yang Xu, and Chen Long Kang. "Design of Satellite Emergency Communication Protocol Based on UDP." Applied Mechanics and Materials 427-429 (September 2013): 664–67. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.664.

Full text
Abstract:
This paper mainly Study the satellite emergency communication characteristics of reliable data transfer protocol, combined with the UDP protocol and the TCP protocol of the advantages and disadvantages. The article puts forward an improved expanded with reissue of double reliable D-RCUDP protocol. This paper introduces the application background, the hierarchical structure, the core mechanism, application platform and experimental results.
APA, Harvard, Vancouver, ISO, and other styles
31

Tu, Jin Lu, and Yi Guo. "Design of Economized Power Controller Based on Ethernet and Embedded Technology." Advanced Materials Research 986-987 (July 2014): 1888–91. http://dx.doi.org/10.4028/www.scientific.net/amr.986-987.1888.

Full text
Abstract:
Embedded remote economized power controller based on Ethernetadopts uses the embedded technology to realize intelligent control. It cuts the TCP/IP protocol and realizes point-to-point communication through UDP hole punching technology.It goes beyond the LAN limit and follows the principle of energy conservation.This economized power controller has very high practical value.
APA, Harvard, Vancouver, ISO, and other styles
32

Faizah, Nurul, Siti Ummi Masruroh, and Ivan Gustra Manca Armenia. "Performance Comparison of AODV and AOMDV Protocol Routing with TCP and UDP on Mobile Ad-Hoc Network (Manet) Using Malicious Node (Blackhole Attack)." MULTINETICS 5, no. 2 (November 29, 2019): 21–29. http://dx.doi.org/10.32722/multinetics.v5i2.1447.

Full text
Abstract:
Transmission package delivery can be a problem of routes on the network, one of them is the Wireless network. Mobile Ad-Hoc Network (MANET) topology is often used on Wireless networks. The existence of a malicious node is a threat to MANET. Package delivery uses AODV and AOMDV Protocol Routing in TCP and UDP packet transmission. This study uses a simulation method using NS2, NAM and AWK. The Quality of Service (QoS) parameters used are throughput, packet loss, and jitter. Simulations are carried out using malicious nodes, the results on the AOMDV TCP graph have the highest input values and the best packets but are difficult to minimize energy, while for the TCP jitter values graph is best because it has a flow control function that can adjust the trajectory. The results in AOMDV TCP have the highest input value and the best packet loss but it is difficult to minimize energy, while for TCP value jitters it is best because it has a flow control function that can adjust the trajectory
APA, Harvard, Vancouver, ISO, and other styles
33

Hussien, Anas Ali, and Safa Ihsan Matloob. "The Comparative Study Some of Reactive and Proactive Routing Protocols in the Wireless Sensor Network." Journal of University of Babylon for Engineering Sciences 26, no. 4 (February 20, 2018): 195–207. http://dx.doi.org/10.29196/jub.v26i4.798.

Full text
Abstract:
The wireless sensor network (WSN) consists mostly of a large number of nodes in a large area where not all nodes are directly connected. The applications of comprise a wide variety of scenarios.The mobile nodes are free to move because this network has selfــstructured topology. Routing protocols are responsible for detecting and maintaining paths in the network, and it classified into reactive (OnـــDemand), proactive (Table driven), and hybrid. In this paper represents a performance study of some WSN routing protocols: the Dynamic Source Routing (DSR), Ad hoc On-Demand Distance Vector (AODV), and Destination-Sequenced Distance-Vector (DSDV). The comparison made according to important metrics like packet delivery ratio (PDR), total packets dropped, Average end-to-end delay (Avg EED), and normalized routing load under the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) traffic connection and with varying number of nodes, pause time; and varying speed. In this work used (NSــ2.35) that installed on (Ubuntu 14.04) operating system to implementing the scenario. Conclude that the DSR has better performance in TCP connection; while the DSDV has better performance in UDP protocol.
APA, Harvard, Vancouver, ISO, and other styles
34

Abduladheem Kamil, Wisam, Shahrudin Awang Nor, and Raaid Alubady. "Performance Evaluation of TCP, UDP and DCCP Traffic Over 4G Network." Research Journal of Applied Sciences, Engineering and Technology 11, no. 10 (December 5, 2015): 1048–57. http://dx.doi.org/10.19026/rjaset.11.2118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Khan, Tarannum, and Sachin Upadhyay. "MAC Implemented using TCP, UDP and HTTP Protocols in Congestion Control." IJARCCE 6, no. 6 (June 30, 2017): 264–69. http://dx.doi.org/10.17148/ijarcce.2017.6646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Rajaboina, RajaSekhar, P. Chenna Reddy, Raja Ashok Kumar, and Nangil Venkatramana. "Performance comparison of TCP, UDP and TFRC in static wireless environment." International Journal of Information and Computer Security 8, no. 2 (2016): 158. http://dx.doi.org/10.1504/ijics.2016.078125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ban, Tae-Hak, Sang-No Park, and Hoe-Kyung Jung. "A Study on Adaptive System for Streaming Using TCP and UDP." International Journal of Multimedia and Ubiquitous Engineering 10, no. 1 (January 31, 2015): 1–10. http://dx.doi.org/10.14257/ijmue.2015.10.1.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Cole, R. G. "Precedence-enabled per-hop behaviour: impact on TCP and UDP flows." IET Communications 3, no. 6 (2009): 920. http://dx.doi.org/10.1049/iet-com.2008.0069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Kadhum, Mohammed M., and Hossam S. Hassanein. "Congestion-aware TCP-friendly system for multimedia transmission based on UDP." Cluster Computing 18, no. 2 (March 24, 2015): 693–705. http://dx.doi.org/10.1007/s10586-015-0446-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

He, Jingyi, and S. H. Gary Chan. "TCP and UDP performance for Internet over optical packet-switched networks." Computer Networks 45, no. 4 (July 2004): 505–21. http://dx.doi.org/10.1016/j.comnet.2004.02.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Szilágyi, Szabolcs, Ferenc Fejes, and Róbert Katona. "Throughput Performance Comparison of MPT-GRE and MPTCP in the Fast Ethernet IPv4/IPv6 Environment." Journal of Telecommunications and Information Technology 2 (June 29, 2018): 53–59. http://dx.doi.org/10.26636/jtit.2018.122817.

Full text
Abstract:
This paper presents the MPT-GRE software, a novel multipath communication technology founded on the Generic Routing Encapsulation (GRE) protocol in UDP tunneling RFC specification. It enables the creation of a GRE protocolbased UDP tunnel built on several communication channels. On the other hand, MPTCP is one of the most typical representatives among multipath communication technologies, basing its operation on the utilization of TCP subflows. The authors compare the path-aggregation capabilities of these two technologies using four Fast Ethernet channels. The tests were carried out with the iperf3 network bandwidth measurement tool, and while transferring data using the FTP protocol over both IPv4 and IPv6.
APA, Harvard, Vancouver, ISO, and other styles
42

Kim, J. Y. "A TCP/IP-based remote control system for yard cranes in a port container terminal." Robotica 24, no. 5 (February 17, 2006): 613–20. http://dx.doi.org/10.1017/s0263574706002694.

Full text
Abstract:
If one operator in a remote operating room can operate 4 ∼ 5 cranes remotely, which are yard cranes for container loading/unloading in a port container terminal, the port loading/unloading efficiency will dramatically be improved through productivity increase, cost reduction, and so on. This study presents a remote crane control system for container loading/unloading yard cranes of port container terminals. First, a wireless web-based video and audio transmission system to transmit the images and the sounds of a craneyard is designed by using 3 web cameras and a microphone. Next, a TCP/IP-based remote crane control system is presented on the basis of the delay performance simulations of TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) for real-time remote control. The simulation results show that TCP is more advantageous for remote crane control on a local network.
APA, Harvard, Vancouver, ISO, and other styles
43

Lopes, Raul H. C., Virginia N. L. Franqueira, and Duncan Rand. "Integration and Evaluation of QUIC and TCP-BBR in longhaul Science Data Transfers." EPJ Web of Conferences 214 (2019): 08026. http://dx.doi.org/10.1051/epjconf/201921408026.

Full text
Abstract:
Two recent and promising additions to the internet protocols are TCP-BBR and QUIC. BBR defines a congestion policy that promises a better control in TCP bottlenecks on long haul transfers and can also be used in the QUIC protocol. TCP-BBR is implemented in the Linux kernels above 4.9. It has been shown, however, to demand careful fine tuning in the interaction, for example, with the Linux Fair Queue. QUIC, on the other hand, replaces HTTP and TLS with a protocol on the top of UDP and thin layer to serve HTTP. It has been reported to account today for 7% of Google’s traffic. It has not been used in server-to-server transfers even if its creators see that as a real possibility. Our work evaluates the applicability and tuning of TCP-BBR and QUIC for data science transfers. We describe the deployment and performance evaluation of TCP-BBR and comparison with CUBIC and H-TCP in transfers through the TEIN link to Singaren (Singapore). Also described is the deployment and initial evaluation of a QUIC server. We argue that QUIC might be a perfect match in security and connectivity to base services that are today performed by the Xroot redirectors.
APA, Harvard, Vancouver, ISO, and other styles
44

Kazbaev, A. V., E. E. Kitaeva, and E. V. Gerasimova. "ANALYSIS OF PROVIDING OF INFORMATION EXCHANGE ON SHORTWAVE AND ULTRASHORT WAVE CHANNELS." Issues of radio electronics, no. 12 (December 20, 2018): 14–19. http://dx.doi.org/10.21778/2218-5453-2018-12-14-19.

Full text
Abstract:
The analysis of a possibility of use of two main transport protocols is carried out: Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) for the organization of information exchange for short-wave (SW) and ultrashort-wave (USW) communication channels. Research of dependence of time of delivery of UDP packets of the different size on data transmission rate and value of losses in SW and USW communication systems is conducted. On the basis of data retrieved correlation of time of finishing the guaranteed message and flow capacity of noisy low‑speed communication channels is calculated and constructed, and also influence of quantity of the lost packets for the period of delivery of one message is investigated. During the analysis of transfer of the message with the guaranteed delivery several methods of the organization of information exchange with use of the UDP protocol were considered.
APA, Harvard, Vancouver, ISO, and other styles
45

Alexis Fidele, Kagiraneza, Suryono, and Wahyul Amien Syafei. "Denial of Service (DoS) attack identification and analyse using sniffing technique in the network environment." E3S Web of Conferences 202 (2020): 15003. http://dx.doi.org/10.1051/e3sconf/202020215003.

Full text
Abstract:
Network-based intruders such as (DoS) attacks have become one of the most significant internet interruptions. Some operations that rely on the internet, such as banking transactions, education, trade marketing, and social networking, have become the primary targets. The attacker is trying to surround and making it difficult for the system to defend. The research's objective is to recognize the characteristics and level of DoS attacks. In understanding the behavior of intruders against a target web server, Wireshark was used in all traffic networks—capturing the traffic in a networked environment. In this research, the user identifies the attack levels (TCP SYN, UDP, and HTTP protocol), ranging from low (Q1), medium (Q2), and high (Q4) attacks. The approach is to simulate the TCP, HTTP, and UDP flood attacks and analyze the attacks' effects on the network environment. In this work, normal scenarios and pattern attacks were compared. In this case, the intruder floods unwanted packets to the victim with a massive number of request packets; the SYN from the corresponding SYN-ACK replies are not achieved. This paper will identify the DoS attacks level and analyze the behavior of traffics.
APA, Harvard, Vancouver, ISO, and other styles
46

Khairi, Mutaz Hamed Hussien, Sharifah H. S. Ariffin, N. M. Abdul Latiff, Kamaludin Mohamad Yusof, M. K. Hassan, and Mohammad Rava. "The impact of firewall on TCP and UDP throughput in an openflow software defined network." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 1 (October 1, 2020): 256. http://dx.doi.org/10.11591/ijeecs.v20.i1.pp256-263.

Full text
Abstract:
Software Defined Networking (SDN) is an emerging networking paradigm that provides more flexibility and adaptability in terms of network definition and control. However, SDN is a logically centralized technology. Therefor the control plane (i.e. controller) scalability in SDN in particular, is also one of the problems that needs further focus. OpenFlow is one of the protocol standards in SDN, which allow the separation of the controller from the forwarding plane. The control plane has an SDN embedded firewall and is able to enforce and monitor the network activity. This firewall can be used to control the throughput. However, it may affect SDN performance. In this paper, throughput will be used as a performance metric to evaluate and assess the firewall impact on two protocols; Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) that passes through the forwarding planes. The evaluations have been verified through simulating the SDN OpenFlow network using MININET. The results show that an implementation of firewall module in SDN creates a significant 36% average drop for TCP and 87% average drop for UDP in the bandwidth which eventually affect the quality of the network and applications.
APA, Harvard, Vancouver, ISO, and other styles
47

Nazilah, Desy Damasari. "Design and Implementation of Video Conference Protocols on Families of Prisoners in Prisons Using Smartphones." Jurnal Jartel: Jurnal Jaringan Telekomunikasi 4, no. 1 (May 1, 2017): 62–68. http://dx.doi.org/10.33795/jartel.v4i1.195.

Full text
Abstract:
The development of communication technology today has had a major impact and changes to the processdelivery of information. Video Conference is a method of conveying information which is quite attractive for distance communication far. In this study, the application of the video conference application is used as a prototype to support the facility in the Correctional Institution. The tools and materials used in the research include web servers, users(Android), Raspberry Pi, webcam, and monitor. The software application used in the research, namely,Dreamweaver is used for web design, webRTC for video conferencing protocol and Wireshark forcapture network traffic during videoconverence access, so that it can be known QOS parameters (delay, throughput, and packet loss) are generated. Based on the tests that were carried out during the video conference process, the results were obtainedcapture from several application protocols that support video conferencing, namely TCP, UDP, and STUN. . PackageThe best loss is the TCP protocol, which is 0%, the best delay is the UDP protocol with an average delay27.06 ms, the best throughput is obtained on the STUN protocol with an average throughput of 5.273 Mbit / s
APA, Harvard, Vancouver, ISO, and other styles
48

Awang Nor, Shahrudin, Raaid Alubady, and Wisam Abduladeem Kamil. "Simulated performance of TCP, SCTP, DCCP and UDP protocols over 4G network." Procedia Computer Science 111 (2017): 2–7. http://dx.doi.org/10.1016/j.procs.2017.06.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Go, Yunmin, Hyunmin Noh, Jeung Won Choi, Kyungwoo Kim, Kihun Kim, Jongman Lee, Hyun Park, and Hwangjun Song. "Energy-efficient Video Streaming System with TCP/UDP over Heterogeneous Wireless Networks." Journal of KIISE 47, no. 11 (November 30, 2020): 1092–100. http://dx.doi.org/10.5626/jok.2020.47.11.1092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Brooks, Richard R., Christopher Griffin, and T. Alan Payne. "A cellular automata model can quickly approximate UDP and TCP network traffic." Complexity 9, no. 3 (January 2004): 32–40. http://dx.doi.org/10.1002/cplx.10119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography