Academic literature on the topic 'Transmission Control Protocol/Internet Protocol (TCI/IP)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Transmission Control Protocol/Internet Protocol (TCI/IP).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Transmission Control Protocol/Internet Protocol (TCI/IP)"

1

Anderson, Daniel K., and W. Michael Reed. "The Effects of Internet Instruction, Prior Computer Experience, and Learning Style on Teachers' Internet Attitudes and Knowledge." Journal of Educational Computing Research 19, no. 3 (October 1998): 227–46. http://dx.doi.org/10.2190/8wx1-5q3j-p3bw-jd61.

Full text
Abstract:
What is now called the Internet started out as a small number of federally funded Department of Defense (Advanced Research Project Agency, or ARPA) supercomputers networked together to share information. In order to guarantee data transmission between these nodes, this network (ARPANET) shared a common set of protocols that was designed to allow for high speed and reliable transfer. This protocol suite is TCP/IP (Transmission Control Protocol/Internet Protocol). Most microcomputers now have a TCP/IP implementation available (e.g., MacTCP) and can, therefore, join the millions of computers that have access to the plethora of resources on the Internet. The Internet is not a static set of nodes, not a limited number of library holdings, not a one-directional paradigm of data transmission. Rather, it is a vibrant and absorbing setting that can foster new learning environments, or enrage educators with its diverse commands, lack of direction, and tenuous consistency.
APA, Harvard, Vancouver, ISO, and other styles
2

Faridah, Faridah. "DESAIN VOIP SERVER MENGGUNAKAN 3CXPHONE SYSTEM DAN SOFTPHONE PADA KANTOR PDAM KABUPATEN KEPULAUAN SELAYAR." ILTEK : Jurnal Teknologi 12, no. 01 (April 11, 2017): 1702–5. http://dx.doi.org/10.47398/iltek.v12i01.398.

Full text
Abstract:
TCP/IP (Transmission Control Protocol/Internet Protocol) merupakan Protokol yang dapat dikoneksikan dalam jaringan data diberbagai komputer di dunia. Dalam penerapannya protocol ini dapat dipakai untuk keperluan perangkat lunak (software) pada system operasi, sehingga banyak yang memanfaatkan dan mengembangkan untuk dapat mengirim pesan suara. Teknologi VoIP (Voice over Internet Protocol) adalah salahsatu solusinya. Implementasi VoIP dapat dilakukan dengan merancang suatu jaringan nirkabel, menggunakan software 3CX Phone System dan IP PBX yang dibuat khusus untuk system operasi Windows dengan menggunakan protocol standar SIP. Dimana dalam pengeturan dan penggunaanya jauh lebih mudah. Teknologi ini mamp umengubah suara analog menjadi paket data kemudian melalui jaringan data public internet maupun private internet paket data tersebut dilewatkan, sehingga komunikasi dapat berjalan. Dengan adanya VoIP biaya komunikasi dapat dikurangi sehingga dapat mereduksi biaya percakapan bahkansecara gratis.
APA, Harvard, Vancouver, ISO, and other styles
3

Hu, Yao, Ting Peng, and Lianming Zhang. "Software-Defined Congestion Control Algorithm for IP Networks." Scientific Programming 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/3579540.

Full text
Abstract:
The rapid evolution of computer networks, increase in the number of Internet users, and popularity of multimedia applications have exacerbated the congestion control problem. Congestion control is a key factor in ensuring network stability and robustness. When the underlying network and flow information are unknown, the transmission control protocol (TCP) must increase or reduce the size of the congestion window to adjust to the changes of traffic in the Internet Protocol (IP) network. However, it is possible that a software-defined approach can relieve the network congestion problem more efficiently. This approach has the characteristic of centralized control and can obtain a global topology for unified network management. In this paper, we propose a software-defined congestion control (SDCC) algorithm for an IP network. We consider the difference between TCP and the user datagram protocol (UDP) and propose a new method to judge node congestion. We initially apply the congestion control mechanism in the congested nodes and then optimize the link utilization to control network congestion.
APA, Harvard, Vancouver, ISO, and other styles
4

Díaz-Cacho Medina, Miguel, Emma Delgado Romero, and Antonio Barreiro Blas. "Control/Network Codesign Basics for IP-Based Shared Networks." Mathematical Problems in Engineering 2011 (2011): 1–23. http://dx.doi.org/10.1155/2011/239512.

Full text
Abstract:
Network and control relationship is an essential aspect in the design of networked control systems (NCSs). The design parameters are mainly centered in the transmission rate and in the packet structure, and some studies have been made to determine how transmission rate affects the network delay and consequently the stability of the control. In Internet, these analysis are mathematically complex due to the large number of different potential scenarios. Using empirical methods, this work deduces that the transmission scheduling problem of an NCS can be solved by designing an appropriate transport protocol, taken into account high and periodic sampling rates. The transport protocol features are determined by simulation, using a new test platform based on the NS2 network simulation suite, to develop control/network codesign solutions. Conclusions of this paper are that the transport features are packet-loss-based flow control, best effort, and fairness, supplemented by a packet priority scheme.
APA, Harvard, Vancouver, ISO, and other styles
5

Papp, Istvan, Roman Pavlovic, and Marija Antic. "WISE: MQTT-based Protocol for IP Device Provisioning and Abstraction in IoT Solutions." Elektronika ir Elektrotechnika 27, no. 2 (April 29, 2021): 86–95. http://dx.doi.org/10.5755/j02.eie.28826.

Full text
Abstract:
Although numerous consumer devices use Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack to connect and communicate over the Internet, their integration into a single Internet of Things (IoT) solution represents a challenge, primarily due to the lack of the standardized interoperability framework on the application layer. Devices produced by different manufacturers cannot operate together out of the box, thus raising the cost of system setup and maintenance. In this paper, a novel protocol is proposed that aims to bridge this gap. It is based on Message Queuing Telemetry Transport (MQTT) protocol and allows the seamless integration of different kinds of IP devices into the connected system. The proposed protocol is complete as it covers the aspects of device discovery and association in the IoT network. It provides mechanisms for IoT network maintenance and defines the abstract device model and communication patterns to enable system-wide device interoperability. The other goal of the protocol is to be portable to resource-constrained platforms. To validate the proposed protocol, it was integrated into the existing smart home hub, and for testing and validation purposes, prototype devices were developed.
APA, Harvard, Vancouver, ISO, and other styles
6

KRISTIANA, LISA, and MUHAMMAD RAFLY. "Implementasi Single-Hop Wireless Sensor Network pada Lintasan Mobil Remote Control." MIND Journal 7, no. 1 (June 29, 2022): 72–86. http://dx.doi.org/10.26760/mindjournal.v7i1.72-86.

Full text
Abstract:
ABSTRAKPenerapan teknologi dalam sistem pemantauan dapat mengatasi kelemahan pada pemantauan secara manual. Untuk meningkatkan kualitas pemantauan, diperlukan suatu sistem yang dapat memantau mobil remote control yang berada di lintasan. Wireless Sensor Network (WSN) merupakan teknologi yang dapat meningkatkan efisiensi pemantauan secara otomatis pada area tertentu. WSN pada lintasan menerapkan sistem komunikasi Single-Hop. Sistem Single-Hop menggunakan sensor node (obstacle infrared) untuk mendeteksi mobil di area lintasan, lalu dikirim langsung oleh sink node ke server dengan menggunakan ESP8266-01. Arsitektur WSN menggunakan Topologi Point to Point terhubung langsung antara sensor node dengan Access Point. Metode pengiriman Single-Hop menggunakan Transmission Control Protocol/Internet Protocol (TCP/IP). Hasil pengujian TCP/IP berdasarkan jarak baca sensor menggunakan parameter Quality of Service (QoS) meliputi parameter Delay, Jitter, Throughput, Packet loss, menghasilkan delay, jitter dan throughput yang sangat baik dan stabil, dan paket loss 0%. Kemudian TCP/IP menguji tingkat akurasi pengiriman data ke server sebanyak 400 kali menghasilkan tingkat akurasi 100%.Kata kunci: lintasan mobil remote control, single-hop wireless sensor network ABSTRACTApplication of technology in monitoring system can overcome weaknesses in manual monitoring. To improve quality of monitoring, need system that can monitor remote control cars on track. Wireless Sensor Network (WSN) is technology that can increase monitoring efficiency automatically in certain areas. WSN on track implements Single-Hop communication system. Single-Hop system uses sensor node (obstacle infrared) to detect cars in the track area, then sent directly by sink node to server using ESP8266-01. WSN architecture uses Point to Point topology connected directly between sensor nodes and Access Point. Single-Hop delivery method uses Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP test results based on sensor reading distance using Quality of Service (QoS) parameters including Delay, Jitter, Throughput, Packet loss parameters, resulting in excellent and stable delay, jitter and throughput, and 0% packet loss. Then TCP/IP tests the accuracy of sending data to server 400 times resulting in an accuracy rate of 100%.Keywords: remote control car track, single-hop wireless sensor network
APA, Harvard, Vancouver, ISO, and other styles
7

Romero Torres, Alberto de Jesús. "Challenges in security and privacy in wireless communications." Revista de Jóvenes Investigadores Ad Valorem 4, no. 2 (December 15, 2021): 74–81. http://dx.doi.org/10.32997/rjia-vol.4-num.2-2021-3701.

Full text
Abstract:
This Research Review Paper highlights some of the main concepts of Wireless Communication including Network Security, Privacy, and Transmission Control Protocol/Internet Protocol (TCP/IP). In equal manner, it illustrates the organizational importance to establish more effective policies to counterattack and prevent cyber-attacks and reduce cyber threats. Therefore, avoiding the financial cost occasioned by hackers and the physical harm that could be cause to an individual by the sensitive data shared via technological devices to the internet without permission.
APA, Harvard, Vancouver, ISO, and other styles
8

Abood, Amany Mohammad, Maysam Sameer Hussein, Zainab G. Faisal, and Zainab H. Tawfiq. "Design and simulation of video monitoring structure over TCP/IP system using MATLAB." Indonesian Journal of Electrical Engineering and Computer Science 24, no. 3 (December 1, 2021): 1840. http://dx.doi.org/10.11591/ijeecs.v24.i3.pp1840-1845.

Full text
Abstract:
Video monitoring systems are undergoing an evolution from conventional analog to digital clarification to provide better rate and security over internet protocols. In addition, analog surveillance becomes insufficient to face enormous demand of security of system contains more than hundreds of camera often deployed in hotels environments far away from room control. This paper presents the design and simulation of a video monitoring scheme in excess of a transmission control protocol/internet protocol (TCP/IP) system using MATLAB. Sophisticated cameras could record directly high-definition digital videos based on digital technology which simply communicate the control room relaying on ordinary internet protocol infrastructure networks. This technology provides a flexible network interface over a wide variety of heterogeneous technology networks. Though, the acceptance of IP designed for video monitoring pretense severe difficulties in terms of power processing, system dependability, required bandwidth, and security of networks. The advantage of IP based video monitoring system has been investigated over conventional analog systems and the challenges of the method are described. The open research issues are still requiring a final solution to permits complete abandon against conventional technology of analog methods. In conclusion, the method to tackle the purpose of video monitoring in actual operation is proposed and verified properly by means of model simulation.
APA, Harvard, Vancouver, ISO, and other styles
9

Suherman, S., Naemah Mubarakah, and Marwan Al-Akaidi. "Minimizing Energy Consumption on Mobile Phone by Rearranging Transport Protocol Load." International Journal of Engineering & Technology 7, no. 3.2 (June 20, 2018): 713. http://dx.doi.org/10.14419/ijet.v7i3.2.15350.

Full text
Abstract:
There are two transport layer protocols that have been used in the internet protocol (IP) networks: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both protocols have been utilized for video streaming applications. This paper examines energy consumed by a mobile device when TCP or UDP employed by the application within it for streaming a video file. A transport protocol load management is proposed to reduce the mobile device energy consumptions. The experiments were conducted in the 802.11 environment. The results show that the proposed method is able to minimize mobile device energy consumptions up to 10.7% and 3.34% for both TCP and UDP protocols.
APA, Harvard, Vancouver, ISO, and other styles
10

Alhasnawi, Bilal Naji, Basil H. Jasim, Bishoy E. Sedhom, Eklas Hossain, and Josep M. Guerrero. "A New Decentralized Control Strategy of Microgrids in the Internet of Energy Paradigm." Energies 14, no. 8 (April 14, 2021): 2183. http://dx.doi.org/10.3390/en14082183.

Full text
Abstract:
The Energy Internet paradigm is the evolution of the Internet of Things concept in the power system. Microgrids (MGs), as the essential element in an Energy Internet, are expected to be controlled in a corporative and flexible manner. This paper proposes a novel decentralized robust control strategy for multi-agent systems (MASs) governed MGs in future Energy Internet. The proposed controller is based on a consensus algorithm applied with the connected distributed generators (DGs) in the MGs in the energy internet paradigm. The proposed controller’s objectives are the frequency/voltage regulation and proportional reactive/active power-sharing for the hybrid DGs connected MGs. A proposed two-level communication system is implemented to explain the data exchange between the MG system and the cloud server. The local communication level utilizes the transmission control protocol (TCP)/ internet protocol (IP) and the message queuing telemetry transport (MQTT) is used as the protocol for the global communication level. The proposed control strategy has been verified using a hypothetical hybrid DGs connected MG such as photovoltaic or wind turbines in MATLAB Simulink environment. Several scenarios based on the system load types are implemented using residential buildings and small commercial outlets. The simulation results have verified the feasibility and effectiveness of the introduced strategy for the MGs’ various operating conditions.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Transmission Control Protocol/Internet Protocol (TCI/IP)"

1

Eikenberg, Bruce R. "Internetworking with Internet Protocol (IP) and Transmission Control Protocol (TCP) within the Military." Thesis, Monterey, California: Naval Postgraduate School, 1990. http://hdl.handle.net/10945/43854.

Full text
Abstract:
Approved for public release; distribution is unlimited.
The backbone of the internetworking technology widely used by the military, as well as many civilian installations, is commonly referred to as TCP/IP. Transmission Control Protocol (TCP) and Internet Protocol (IP) are the two standard communication protocols from which TCP/IP receives its name. By utilizing TCP/IP, the majority of technical issues of interconnecting various computer technologies have become transparent to the user. This thesis conducts an in depth study of many aspects of the TCP/IP technology. Based upon descriptions provided, flowcharts detailing the series of procedures of numerous functions of both TCP and IP are created. Additionally, inefficient TCP/IP functions are discussed and possible solutions to the inefficiencies are provided.
APA, Harvard, Vancouver, ISO, and other styles
2

Grebe, David L. "PROTOCOL LAYERING." International Foundation for Telemetering, 2002. http://hdl.handle.net/10150/607490.

Full text
Abstract:
International Telemetering Conference Proceedings / October 21, 2002 / Town & Country Hotel and Conference Center, San Diego, California
The advent of COTS based network-centric data systems brings a whole new vocabulary into the realm of instrumentation. The Communications and computer industries have developed networks to a high level and they continue to evolve. One of the basic techniques that has proven itself useful with this technology is the use of a “layered architecture.” This paper is an attempt to discuss the basic ideas behind this concept and to give some understanding of the vocabulary that has grown up with it.
APA, Harvard, Vancouver, ISO, and other styles
3

Santi, Juliana de 1982. "Gerenciamento ativo de filas para o protocolo "High Speed Transmission Control Protocol" em redes com produto banda-atraso elevado." [s.n.], 2008. http://repositorio.unicamp.br/jspui/handle/REPOSIP/276151.

Full text
Abstract:
Orientador: Nelson Luis Saldanha da Fonseca
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-13T10:35:13Z (GMT). No. of bitstreams: 1 Santi_Julianade_M.pdf: 1658984 bytes, checksum: 8a9f078587406a06815484e4fe057f7d (MD5) Previous issue date: 2008
Resumo: A utilização eficiente da banda passante em redes de alta velocidade e grandes atrasos, denominadas redes com produto banda-atraso elevado (PBA), tornou-se um grande desafio. Isto ocorre devido aos ajustes do protocolo Transmission Control Protocol (TCP). O High Speed TCP (HSTCP), uma variante do TCP para redes com PBA elevado, emprega ajustes mais agressivos permitindo, assim, que a utilização da banda seja escalável. As políticas de Gerenciamento Ativo de Filas ou Active Queue Management (AQM), monitoram o nível de ocupação das filas nos roteadores e notificam o congestionamento incipiente aos emissores TCP através do descarte/marcação de pacotes. O sistema de controle de congestionamento apresenta natureza de retroalimentação, na qual a taxa de transmissão dos nós fontes é ajustada em função do nível de ocupação da fila. Os controladores AQM determinam a probabilidade de descarte/marcação para maximizar a vazão e minimizar perdas, garantindo, assim, a estabilidade do tamanho da fila independentemente das variações das condições da rede. Neste trabalho, define-se a política de gerenciamento ativo de filas HSTCP-H2 para redes com PBA elevado que utilizam o protocolo HSTCP. Para a derivação de HSTCP­H2: são utilizadas técnicas de Teoria de Controle Ótimo. A principal característica desta política é considerar o atraso do sistema o que permite melhor utilização dos recursos disponíveis. A estabilidade e os objetivos de desempenho do sistema são expressos e solu­cionados através de Desigualdades Matriciais Lineares, permitindo que os parâmetros do controlador possam ser calculados através da solução de um problema convexo simples. Diferentes controladores foram derivados considerando-se diferentes objetivos de de­sempenho, os quais consideram as características de redes com produto banda-atraso elevado. Através de simulações, os desempenhos dos controladores derivados são avalia­dos e a eficácia do controlador que apresentou o melhor desempenho foi comparado com o desempenho da política de AQM RED. São considerados cenários com enlace gargalo único e com múltiplos gargalos.
Abstract: The efficient utilization of bandwidth in high speed and large delay networks, called high bandwidth-delay product networks (BDP), has become a major challenge. This is due to adjustments of the Transmission Control Protocol (TCP). The High Speed TCP HSTCP): a TCP variant to high BDP networks, employs more aggressive adjustments, allowing scalable bandwidth utilization. The Active Queue Management (AQM) policies monitor the queue length in the routers and notify incipient congestion to TCP source by marking or dropping packets. The congestion control system presents intrinsic feedback nature, where the transmission rates of the sources are adjusted according to the level of congestion inferred by the queue occupancy. The AQM controllers determine the dropping marking probability values to maximize throughput and minimize losses, giving guarantees to stabilize the queue length independent of network conditions. In this work, it is defined HSTCP-H2, an active queue management policy to high BDP networks, which adopt the HSTCP as their transport protocol. Optimal control theory is used to conceive HSTCP-H2. The novelty of the proposed approach lies in consider the delay of the system which allows better use of available resources. Furthermore, in the proposed approach, stability and performance objectives are completely expressed as Linear Matrix Inequalities (LMIs), thus requiring the solution of a single convex problem for the computation of the controller parameters. Different controllers are derived considering different design goals, which take into ac­count the characteristics of the high bandwidth-delay product networks. The performance produced by different optimal controllers was investigated. The efficacy of the control­ler with the best performance was then compared to the performance of RED policy. The simulation experiments were carried out using topologies with single and multiple bottleneck.
Mestrado
Redes de Computadores
Mestre em Ciência da Computação
APA, Harvard, Vancouver, ISO, and other styles
4

Elza, Dethe. "Browser evolution document access on the World Wide Web." Ohio : Ohio University, 1998. http://www.ohiolink.edu/etd/view.cgi?ohiou1176833339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Grigorescu, Eduard. "Reducing internet latency for thin-stream applications over reliable transport with active queue management." Thesis, University of Aberdeen, 2018. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=236098.

Full text
Abstract:
An increasing number of network applications use reliable transport protocols. Applications with constant data transmission recover from loss without major performance disruption, however, applications that send data sporadically, in small packets, also called thin-streams, experience frequently high latencies due to 'Bufferbloat', that reduce the application performance. Active Queue Management mechanisms were proposed to dynamically manage the queues in routers by dropping packets early and reduce these, hence reducing latency. While their deployment to the internet remains an open issue, the proper investigation into how their functioning mechanism impacts latency is the main focus of this work and research questions have been devised to investigate the AQM impact on latency. A range of AQM mechanisms has been evaluated by the research, exploring performance of the methods for latency sensitive network applications. This has explored new single queue AQM mechanisms such as Controlled Delay (CODEL) and Proportional Integral Enhanced (PIE) and Adaptive RED (ARED). The evaluation has shown great improvements in queuing latency when AQM are used over a range of network scenarios. Scheduling AQM algorithms such as FlowQueue CODEL (FQ-CODEL) isolates traffic and minimises the impact of Bufferbloat on flows. The core components of FQ-CODEL, still widely misunderstood at the time of its inception, have been explained in depth by this study and their contribution to reducing latency have been evaluated. The results show significant reductions in queuing latency for thin streams using FQ-CODEL. When TCP is used for thin streams, high application latencies can arise when there are retransmissions, for example after dropping packets by an AQM mechanism. This delay is a result of TCP's loss-based congestion control mechanism that controls sender transmission rate following packet loss. ECN, a marking sender-side improvement to TCP reduces applicationlayer latency without disrupting the overall network performance. The thesis evaluated the benefit of using ECN using a wide range of experiments. The findings show that FQ-CODEL with ECN provides a substantial reduction of application latency compared to a drop-based AQM. Moreover, this study recommends the combination of FQ-CODEL with other mechanisms, to reduce application latency. Mechanisms such as ABE, have been shown to increase aggregate throughput and reduce application latency for thin-stream applications.
APA, Harvard, Vancouver, ISO, and other styles
6

Janošík, Martin. "Návrh virtuální lokální počítačové sítě pro edukativní účely." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217529.

Full text
Abstract:
The master’s thesis focuses on the virtual local computer network for laboratory usage. It aims to propose and realize proper network connection in order to monitor expected data flow. Thanks to the network analysers (software ClearSight and hardware NetTool Series II) it plans to pursue in detail the used transmission protocols of TCP/IP layers. The most decisive feature happens to be the right choice of appropriate network components and their precise configuration. Consequently, the thesis formulates a proposal of a laboratory task for the needs of students, which is also closely related to the actual problems. The assignment of the task will serve the teachers as a test pattern for measurement. The results elaborated in the form of the model protocol should enable later comparison of the recorded data. Another part of the diploma thesis is the working-out of well arranged manuals for the network analysers involved.
APA, Harvard, Vancouver, ISO, and other styles
7

Ashley, Paul. "Security technologies for intranet computing." Thesis, Queensland University of Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Viéron, Jérôme. "Codage scalable et contrôle de congestion pour transmission vidéo sur réseaux hétérogène." Rennes 1, 2003. https://hal.archives-ouvertes.fr/tel-01131930.

Full text
Abstract:
L'objectif de cette thèse concerne l'étude de nouveaux modèles de représentation scalable à grain fin de signaux vidéo et de techniques de contrôle de congestion associées pour la transmission sur des réseaux de paquets hétérogènes aux caractéristiques variant dans le temps, tels que l'Internet. Nous proposons un algorithme de régulation de débit point-à-point couplant un protocole de contrôle de congestion TCP-compatible avec un modèle de régulation global intégrant les modèles de délais et de buffers de la source. Nous décrivons un nouvel algorithme de contrôle de débit TCP-compatible hybride orienté émetteur-récepteur, prenant en compte les caractéristiques débit-distorsion de la source, pour la transmission multicast de vidéo en couches. Nous proposons enfin l'architecture complète d'un nouvel algorithme de compression vidéo bas débit finement scalable, basé sur l'utilisation d'une décomposition ondelettes compensée en mouvement, dans les dimensions spatiale et temporelle.
APA, Harvard, Vancouver, ISO, and other styles
9

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
APA, Harvard, Vancouver, ISO, and other styles
10

Olayinka, Vincent Folajimi, and Вінсент Фолажімі Олайіка. "Deploying IPv6 based network for TopCorn Bank (Nigeria)." Master's thesis, 2017. http://elartu.tntu.edu.ua/handle/lib/24135.

Full text
Abstract:
Master’s thesis is devoted to the development of deploying IPv6 . In the thesis presented a structure of deploying IPv6, that inludes designing IPv6 addresses, pinging the network environment, topological schema, physical and logical topology. As a result, the goal of planning and deploying IPv6 for TopCorn bank was established, successful test results how communication with both the main and branch office. IPv6 must therefore be applied as an important subject to the goal of any banking sector, because it creates for future expansion of any organization. That is the major reason why deploying IPv6 rather than its older version is very important for any organization sector and that why i chose to deploy it into TopCorn Bank
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Transmission Control Protocol/Internet Protocol (TCI/IP)"

1

1968-, Rovithakis George A., ed. End to end adaptive congestion control in TCP/IP networks. Boca Raton, FL: Taylor & Francis, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Learning, Thomson Delmar. Networks Fundamental Video 3 - The Transmission Control Protocol/Internet Protocol (TCP/IP) Stack (Networks Fundamental Video). Delmar Learning, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pillay, Harish. An implementation of the Department of Defense's transmission control protocol internet protocol (TCP/IP) for the Microsoft OS/2 operating system. 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Houmkozlis, Christos N., and George A. Rovithakis. End-To-End Adaptive Congestion Control in TCP/IP Networks. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Houmkozlis, Christos N., and George A. Rovithakis. End-To-End Adaptive Congestion Control in TCP/IP Networks. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Houmkozlis, Christos N., and George A. Rovithakis. End-To-End Adaptive Congestion Control in TCP/IP Networks. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Houmkozlis, Christos N. End to End Adaptive Congestion Control in TCP/IP Networks. Taylor & Francis Group, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Houmkozlis, Christos N., and George A. Rovithakis. End-To-End Adaptive Congestion Control in TCP/IP Networks. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Houmkozlis, Christos N., and George A. Rovithakis. End-To-End Adaptive Congestion Control in TCP/IP Networks. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Data Communications and Networking (McGraw-Hill Forouzan Networking). McGraw-Hill Higher Education, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Transmission Control Protocol/Internet Protocol (TCI/IP)"

1

Buchanan, William. "Transmission Control Protocol (TCP) and Internet Protocol (IP)." In Mastering the Internet, 33–48. London: Macmillan Education UK, 1997. http://dx.doi.org/10.1007/978-1-349-14456-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Buchanan, William J. "Transmission Control Protocol (TCP) and Internet Protocol (IP)." In Advanced Data Communications and Networks, 231–48. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4419-8670-2_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Buchanan, Bill. "Transmission Control Protocol (TCP) and Internet Protocol (IP)." In Handbook of Data Communications and Networks, 195–210. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-1-4757-0905-6_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Buchanan, William. "Transmission Control Protocol (TCP) and Internet Protocol (IP)." In Mastering Global Information Systems, 213–24. London: Macmillan Education UK, 1997. http://dx.doi.org/10.1007/978-1-349-14411-2_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Buchanan, W. "Transmission Control Protocol (TCP) and Internet Protocol (IP)." In Applied Data Communications and Networks, 87–109. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-1-4613-1207-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hunt, Ray. "Transmission Control Protocol/Internet Protocol (TCP/IP)." In Encyclopedia of Information Systems, 489–510. Elsevier, 2003. http://dx.doi.org/10.1016/b0-12-227240-4/00187-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Networking Fundamentals." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 106–18. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch004.

Full text
Abstract:
This chapter introduces to basics of computer networking and associated widely used essential networking communication protocols. The chapter provides the comparison of OSI and TCP model along with details of internet layer protocols including internet protocol (IP), IP addressing schemes, internet control messaging protocol (ICMP), etc. Next, the chapter discusses transport layer protocols transmission control protocol (TCP) and user datagram protocol (UDP) in detail. Application layer protocols including dynamic host control protocol (DHCP), secure shell (SSH), file transfer protocol (FTP), trivial FTP (TFTP), simple network management protocol (SNMP), hyper text transfer protocol secure (HTTPS), network time protocol (NTP), domain name system (DNS), and simple mail transfer protocol (SMTP) are also explained in this chapter. One just cannot attack a networking protocol without knowing how it works. Having a solid introduction about computer networking and network protocols is fundamental in the ethical hacking world. This chapter quickly revisits all essential concepts related to computer networking.
APA, Harvard, Vancouver, ISO, and other styles
8

Chodorek, Agnieszka. "TCP and TCP-Friendly Protocols." In Encyclopedia of Internet Technologies and Applications, 612–18. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59140-993-9.ch086.

Full text
Abstract:
One of the most popular transport protocols—Transmission Control Protocol (TCP)—has a long history. The first document describing TCP protocol in early stages was published in 1974. Since then, TCP specification was changed several times, and finally in 1981 was standardised by RFC 793 (Postel, 1981). Two years later TCP, together with Internet Protocol (IP), became the official protocol suite of the Internet. In the same year the first widely available implementation of TCP in the 4.2 BSD operating system was built.
APA, Harvard, Vancouver, ISO, and other styles
9

Jones, Stephan S., Ronald J. Kovac, and Frank M. Groom. "The Language of the Internet: Transmission Control Protocol/Internet Protocol (TCP/IP)." In Introduction to COMMUNICATIONS TECHNOLOGIES, 131–49. CRC Press, 2015. http://dx.doi.org/10.1201/b18803-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Clayton, John F. "Education, the Internet, and the World Wide Web." In Encyclopedia of Human Computer Interaction, 175–78. IGI Global, 2006. http://dx.doi.org/10.4018/978-1-59140-562-7.ch028.

Full text
Abstract:
The development of the Internet has a relatively brief and well-documented history (Cerf, 2001; Griffiths, 2001; Leiner et al., 2000; Tyson, 2002). The initial concept was first mooted in the early 1960s. American computer specialists visualized the creation of a globally interconnected set of computers through which everyone quickly could access data and programs from any node, or place, in the world. In the early 1970s, a research project initiated by the United States Department of Defense investigated techniques and technologies to interlink packet networks of various kinds. This was called the Internetting project, and the system of connected networks that emerged from the project was known as the Internet. The initial networks created were purpose-built (i.e., they were intended for and largely restricted to closed specialist communities of research scholars). However, other scholars, other government departments, and the commercial sector realized the system of protocols developed during this research (Transmission Control Protocol [TCP] and Internet Protocol [IP], collectively known as the TCP/IP Protocol Suite) had the potential to revolutionize data and program sharing in all parts of the community. A flurry of activity, beginning with the National Science Foundation (NSF) network NSFNET in 1986, over the last two decades of the 20th century created the Internet as we know it today. In essence, the Internet is a collection of computers joined together with cables and connectors following standard communication protocols.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Transmission Control Protocol/Internet Protocol (TCI/IP)"

1

Lima Filho, Djalma A., and José A. Suruagy Monteiro. "Estudo comparativo do desempenho da transferência de dados nas arquiteturas RINA e TCP/IP." In XVI Workshop em Desempenho de Sistemas Computacionais e de Comunicação. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/wperformance.2017.3353.

Full text
Abstract:
A arquitetura atual da Internet apresenta limitações que interferem no seu desenvolvimento. Devido ao crescimento acentuado de novas demandas de aplicações, o modelo TCP/IP (Transmission Control Protocol / Internet Protocol) apresenta limitações tornando-o complexo. A Arquitetura Recursiva Interredes (RINA) é uma proposta de arquitetura para a Internet do futuro baseada na comunicação entre processos que propõe soluções para resolver as principais limitações na estrutura da Internet convencional. Este artigo apresenta um estudo comparativo do desempenho da transferência de dados nas arquiteturas RINA e TCP/IP. Os resultados obtidos levam à conclusão de que a arquitetura RINA apresenta um desempenho melhor em relação à arquitetura TCP/IP quando os atrasos de propagação são insuficientes para interferir na transmissão dos dados. Além do mais, através da análise exploratória dos dados, quando observados grandes atrasos, RINA, através dos mecanismos de controle, resolve com mais eficácia o problema do congestionamento devido à sua natureza recursiva em relação ao modelo TCP/IP.
APA, Harvard, Vancouver, ISO, and other styles
2

Mok, Swee M. "Development of a Web-Based Controller for Remote Sensing and Control of Manufacturing Processes." In ASME 1998 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1998. http://dx.doi.org/10.1115/detc98/cie-5526.

Full text
Abstract:
Abstract This paper introduces the concept of a networked controller that leverages the capability of web services. By doing so, it enables the implementation of a large set of factory monitoring and control equipment that is cost effective and manageable. By using the factory local area network for communication, and industrial computers based on standard hardware and software as the controller platform, cost is minimized. A networked solution based on Transmission Control Protocol / Internet Protocol (TCP/IP) allows the controller to communicate with factory engineers through their desktop computers as efficiently as it can with other computers. Engineers can set up each unit for its intended function by installing the appropriate sensors. Java applet technology is employed for remote setup and control. Controller requirements such as remote configuration, client processing, and data presentation are presented. A method for overcoming real time issues is proposed using a client/server design. A prototype was built to demonstrate some of the concepts. Discussions are then made on possible future work using a Finite State Machine design methodology to improve overall system reliability.
APA, Harvard, Vancouver, ISO, and other styles
3

Tarca, Radu, Mihai Cornea, Ioan Tarca, and Tiberiu Vesselenyi. "Designing a Networked Telerobotic System Using Internet." In ASME 2012 11th Biennial Conference on Engineering Systems Design and Analysis. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/esda2012-82883.

Full text
Abstract:
Experimentation is a very important part of education in engineering including mechatronics engineering, which is a relatively new field, combining three engineering disciplines: mechanical engineering, electrical engineering and software engineering. The equipments needed for experiments in mechatronics are usually expensive. A solution to make these expensive equipments achievable is to share them with other universities or research centers from different locations in the world. The goal of our team is to build a networked telerobot system so that the Internet users, especially researchers and students, can be able to control an autonomous robot able to explore a dynamic environment remotely from their home and share the robot system with the department. The particularity of the environment, in this case, is that the experiment uses grid lines painted on the floor, for robot navigation purpose. The system which is still under development will be able to increase the number of robots. The communication software technologies are based on PHP. A specific protocol over IP was designed for communication between the server and clients. The aim of this project is oriented toward providing a telerobot system with a high degree of local intelligence in order to overcome restricted bandwidth and transmission delay of the network.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography