Academic literature on the topic 'User Datagram Protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'User Datagram Protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "User Datagram Protocol"

1

Partridge, C., and S. Pink. "A faster UDP (user datagram protocol)." IEEE/ACM Transactions on Networking 1, no. 4 (1993): 429–40. http://dx.doi.org/10.1109/90.251895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Romony, Pether V. B., Lanny Sitanayah, and Junaidy B. Sanger. "PERBANDINGAN QUALITY OF SERVICE PROTOKOL KOMUNIKASI DATA PADA SISTEM DETEKSI ASAP ROKOK BERBASIS INTERNET OF THINGS." Jurnal Ilmiah Realtech 16, no. 1 (2020): 19–24. http://dx.doi.org/10.52159/realtech.v16i1.129.

Full text
Abstract:
Asap rokok adalah salah satu asap beracun yang berbahaya bagi kesehatan manusia dari sisi biologis maupun sisi kimiawi. Pada penelitian ini, penulis mengimplementasikansebuah sistem deteksi asap rokok berbasis The Internet of Things menggunakan sensor MQ135, Arduino board dan NodeMCU. Kemudian, penulis melakukan perbandingan Quality of Service dari dua protokol komunikasi data, yaitu Transmission Control Protocol dan User Datagram Protocol pada sistem tersebut. Parameter Quality of Service yang dibandingkan saat proses pengiriman data adalah delay dan data loss. Untuk setiap protokol, simulasi
APA, Harvard, Vancouver, ISO, and other styles
3

Thuneibat, Saed, and Buthayna Al Sharaa. "Dynamic source routing protocol with transmission control and user datagram protocols." Indonesian Journal of Electrical Engineering and Computer Science 30, no. 1 (2023): 137. http://dx.doi.org/10.11591/ijeecs.v30.i1.pp137-143.

Full text
Abstract:
Dynamic source routing protocol (DSR) is a common routing protocol in wireless network without infrastructure, called ad-hoc network, DSR used just above internet protocol (IP) at the network layer. The upper transport layer provides reliability by transmission control protocol (TCP) and user datagram protocol (UDP). The choice between DSR/TCP and DSR/UDP is an actual issue for network designers and engineers. The question arises: which one provides better quality of service (QoS) parameters, less delay and jitter, greater throughput, and data rates. This paper focuses on the study and analysi
APA, Harvard, Vancouver, ISO, and other styles
4

Saed, Thuneibat, and Al Sharaa Buthayna. "Dynamic source routing protocol with transmission control and user datagram protocols." Dynamic source routing protocol with transmission control and user datagram protocols 30, no. 1 (2023): 137–43. https://doi.org/10.11591/ijeecs.v30.i1.pp137-143.

Full text
Abstract:
Dynamic source routing protocol (DSR) is a common routing protocol in wireless network without infrastructure, called ad-hoc network, DSR used just above internet protocol (IP) at the network layer. The upper transport layer provides reliability by transmission control protocol (TCP) and user datagram protocol (UDP). The choice between DSR/TCP and DSR/UDP is an actual issue for network designers and engineers. The question arises: which one provides better quality of service (QoS) parameters, less delay and jitter, greater throughput, and data rates. This paper focuses on the study and analysi
APA, Harvard, Vancouver, ISO, and other styles
5

Rasheed, Mohammad M., Norita Md Norwawi, Osman Ghazali, and Munadil K. Faaeq. "Detection algorithm for internet worms scanning that used user datagram protocol." International Journal of Information and Computer Security 11, no. 1 (2019): 17. http://dx.doi.org/10.1504/ijics.2019.096847.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Norwawi, Norita Md, Osman Ghazali, Munadil K. Faaeq, and Mohammad M. Rasheed. "Detection Algorithm for Internet Worms Scanning that Used User Datagram Protocol." International Journal of Information and Computer Security 11, no. 1 (2019): 1. http://dx.doi.org/10.1504/ijics.2019.10016150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Slobodin, R. S., K. S. Vorobjev, E. V. Taldykin, and E. V. Nepochatych. "A METHOD OF IMPLEMENTING COMPENSATION FOR LOST PACKETS IN USER DATAGRAM PROTOCOL." Proceedings of the Southwest State University 21, no. 4 (2017): 45–51. http://dx.doi.org/10.21869/2223-1560-2017-21-4-45-51.

Full text
Abstract:
The article describes the existing methods of compensation for packet loss that have been patented. A brief analysis of these methods have been carried out and the disadvantages in the algorithms of their functioning have been revealed, which can lead to damage of video and audio streams. The article proposes a method of compensation for packet loss with retransmission of lost data in user datagram protocol. The flowchart diagrams of the receiver and transmitter and algorithms of their operation are described. The article demonstrates the advantages of the proposed method of data retransmissio
APA, Harvard, Vancouver, ISO, and other styles
8

Suherman, S., Naemah Mubarakah, and Marwan Al-Akaidi. "Minimizing Energy Consumption on Mobile Phone by Rearranging Transport Protocol Load." International Journal of Engineering & Technology 7, no. 3.2 (2018): 713. http://dx.doi.org/10.14419/ijet.v7i3.2.15350.

Full text
Abstract:
There are two transport layer protocols that have been used in the internet protocol (IP) networks: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both protocols have been utilized for video streaming applications. This paper examines energy consumed by a mobile device when TCP or UDP employed by the application within it for streaming a video file. A transport protocol load management is proposed to reduce the mobile device energy consumptions. The experiments were conducted in the 802.11 environment. The results show that the proposed method is able to minimize mobile
APA, Harvard, Vancouver, ISO, and other styles
9

Qonita Auliani, Zada Aulia Munawarah, Muhammad Rizki, Riyan Aditya, and Didik Aribowo. "Simulasi Protokol TCP-UDP Pada Jaringan Topologi Bus Menggunakan Simulasi Cisco Packet Tracer." Venus: Jurnal Publikasi Rumpun Ilmu Teknik 2, no. 3 (2024): 190–97. http://dx.doi.org/10.61132/venus.v2i3.330.

Full text
Abstract:
In this digital era, network speed is very important, because nowadays many people use the internet as a companion in various events. Data communication is one of the means to allow several devices to communicate with each other. To simplify and speed up network usage, the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) protocols are used as the transport layer during data transfer. In running this simulation using the Cisco Packet Tracer simulation application using bus topology as the topology type.
APA, Harvard, Vancouver, ISO, and other styles
10

Garcia, Nuno M., Fabio Gil, Barbara Matos, Coulibaly Yahaya, Nuno Pombo, and Rossitza Ivanova Goleva. "Keyed User Datagram Protocol: Concepts and Operation of an Almost Reliable Connectionless Transport Protocol." IEEE Access 7 (2019): 18951–63. http://dx.doi.org/10.1109/access.2018.2886707.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "User Datagram Protocol"

1

Thammadi, Abhilash. "Reliable user datagram protocol (RUDP)." Kansas State University, 2011. http://hdl.handle.net/2097/11984.

Full text
Abstract:
Master of Science<br>Department of Computing and Information Sciences<br>Gurdip Singh<br>As the network bandwidth and delay increase, TCP becomes inefficient. Data intensive applications over high-speed networks need new transport protocol to support them. This project describes a general purpose high performance data transfer protocol as an application level solution. The protocol Reliable UDP-based data transfer works above UDP with reliability. Reliable Data Transfer protocol provides reliability to applications using the Sliding Window protocol (Selective Repeat). UDP uses a simple transm
APA, Harvard, Vancouver, ISO, and other styles
2

Cox, Spencer L. "User Datagram Protocol with Congestion Control." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1250.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Grebe, David L. "PROTOCOL LAYERING." International Foundation for Telemetering, 2002. http://hdl.handle.net/10150/607490.

Full text
Abstract:
International Telemetering Conference Proceedings / October 21, 2002 / Town & Country Hotel and Conference Center, San Diego, California<br>The advent of COTS based network-centric data systems brings a whole new vocabulary into the realm of instrumentation. The Communications and computer industries have developed networks to a high level and they continue to evolve. One of the basic techniques that has proven itself useful with this technology is the use of a “layered architecture.” This paper is an attempt to discuss the basic ideas behind this concept and to give some understanding of the
APA, Harvard, Vancouver, ISO, and other styles
4

Diehl, Michael, Steven Kuipers, Jason Swain, and Tab Wilcox. "Using Chapter 10 User Datagram Protocol (UDP) Streaming and Ethernet Technologies to Support Ground-Based Aircraft Testing." International Foundation for Telemetering, 2013. http://hdl.handle.net/10150/579683.

Full text
Abstract:
ITC/USA 2013 Conference Proceedings / The Forty-Ninth Annual International Telemetering Conference and Technical Exhibition / October 21-24, 2013 / Bally's Hotel & Convention Center, Las Vegas, NV<br>During a recent U.S. Army Yuma Proving Ground (YPG) ground test, an unexpected change in test location resulted in the implementation of an innovative ad hoc network solution to complete the planned test matrix. The original plan was to use an aircraft ground test facility; however, safety requirements resulted in the aircraft being placed 50 meters away from the facility. This distance was too gr
APA, Harvard, Vancouver, ISO, and other styles
5

Cuevas, Vannesa, Michael Diehl, and Tab Wilcox. "INSTRUMENTING AN ETHERNET AVIONICS BUS FOR APACHE TESTING." International Foundation for Telemetering, 2017. http://hdl.handle.net/10150/626967.

Full text
Abstract:
Last year, the U.S. Army Yuma Proving Ground (YPG) faced a short suspense requirement to instrument an Apache's Ethernet bus. YPG was able to implement an effective method to satisfy this requirement; however, more capable and effective methodologies could not be developed and utilized due to time constraints. While continuing to support ongoing Apache testing, YPG is working to implement more efficient methods to capture and utilize the Ethernet data. This paper will discuss YPG’s initial implementation and the follow-on efforts being pursued.
APA, Harvard, Vancouver, ISO, and other styles
6

Diehl, Michael, Steven Kuipers, Jason Swain, Ryan Tiaden, Wil Nelson, and Tab Wilcos. "Video Bus Integrated Telemetry System." International Foundation for Telemetering, 2014. http://hdl.handle.net/10150/577481.

Full text
Abstract:
ITC/USA 2014 Conference Proceedings / The Fiftieth Annual International Telemetering Conference and Technical Exhibition / October 20-23, 2014 / Town and Country Resort & Convention Center, San Diego, CA<br>Yuma Proving Ground (YPG) personnel developed the Video Bus Integrated Telemetry System (VBITS) for air delivery testing at YPG. The system consists of a common rack for mounting both video and telemetry equipment, which makes installation easier and more time efficient. Prior to the one-rack concept, the video, TSPI, and telemetry were all installed as separate entities competing for space
APA, Harvard, Vancouver, ISO, and other styles
7

Muharish, Essa Yahya M. "PACKET FILTER APPROACH TO DETECT DENIAL OF SERVICE ATTACKS." CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/342.

Full text
Abstract:
Denial of service attacks (DoS) are a common threat to many online services. These attacks aim to overcome the availability of an online service with massive traffic from multiple sources. By spoofing legitimate users, an attacker floods a target system with a high quantity of packets or connections to crash its network resources, bandwidth, equipment, or servers. Packet filtering methods are the most known way to prevent these attacks via identifying and blocking the spoofed attack from reaching its target. In this project, the extent of the DoS attacks problem and attempts to prevent it are
APA, Harvard, Vancouver, ISO, and other styles
8

Becher, Mike. "Entwicklung des Kommunikationsteilsystems für ein objektorientiertes, verteiltes Betriebssystem." Master's thesis, Universitätsbibliothek Chemnitz, 1998. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199801481.

Full text
Abstract:
Thema dieser Arbeit ist die Entwicklung eines Kommunikationsteilsystems fuer das Experimentiersystem CHEOPS zur Ermoeglichung einer Interobjektkommunika- tion zwischen Objekten auf dem gleichen bzw. verschiedenen Systemen. Ausgangspunkte stellen dabei eine verfuegbare Implementation eines Ethernet- Treibers der Kartenfamilie WD80x3 fuer MS-DOS, eine geforderte Kommunikations- moeglichkeit mit UNIX-Prozessen sowie die dort benutzbaren Protokoll-Familien dar. Die Arbeit beschaeftigt sich mit der Analyse und Konzipierung des Ethernet- Treibers sowie der Internet-Protokoll-Familie fuer CHEOP
APA, Harvard, Vancouver, ISO, and other styles
9

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciar
APA, Harvard, Vancouver, ISO, and other styles
10

"Entwicklung des Kommunikationsteilsystems für ein objektorientiertes, verteiltes Betriebssystem." Master's thesis, siehe Literaturverzeichnis, 1998. https://monarch.qucosa.de/id/qucosa%3A17525.

Full text
Abstract:
Thema dieser Arbeit ist die Entwicklung eines Kommunikationsteilsystems fuer das Experimentiersystem CHEOPS zur Ermoeglichung einer Interobjektkommunika- tion zwischen Objekten auf dem gleichen bzw. verschiedenen Systemen. Ausgangspunkte stellen dabei eine verfuegbare Implementation eines Ethernet- Treibers der Kartenfamilie WD80x3 fuer MS-DOS, eine geforderte Kommunikations- moeglichkeit mit UNIX-Prozessen sowie die dort benutzbaren Protokoll-Familien dar. Die Arbeit beschaeftigt sich mit der Analyse und Konzipierung des Ethernet- Treibers sowie der Internet-Protokoll-Familie fuer CHEOP
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "User Datagram Protocol"

1

T. Unix System V Release 3.2 Network Programmer's Guide. Prentice Hall, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Unix System V/386 Release 3.2 Network Programmer's Guide, Issue 47. Prentice Hall, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "User Datagram Protocol"

1

Weik, Martin H. "User Datagram Protocol." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_20573.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Issariyakul, Teerawat, and Ekram Hossain. "Transport Control Protocols Part 1: An Overview and User Datagram Protocol Implementation." In Introduction to Network Simulator NS2. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4614-1406-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Loshin, Pete. "User Datagram Protocol." In TCP/IP Clearly Explained. Elsevier, 2003. http://dx.doi.org/10.1016/b978-155860782-8/50020-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Goralski, Walter. "User Datagram Protocol." In The Illustrated Network. Elsevier, 2017. http://dx.doi.org/10.1016/b978-0-12-811027-0.00011-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Goralski, Walter. "User Datagram Protocol." In The Illustrated Network. Elsevier, 2009. http://dx.doi.org/10.1016/b978-0-12-374541-5.50016-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Malinowski, Aleksander, and Bogdan Wilamowski. "The User Datagram Protocol." In Industrial Electronics. CRC Press, 2004. http://dx.doi.org/10.1201/9781420036336.ch17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Malinowski, Aleksander, and Bogdan Wilamowski. "User Datagram Protocol—UDP." In Electrical Engineering Handbook. CRC Press, 2011. http://dx.doi.org/10.1201/b10603-65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"User Datagram Protocol—UDP." In Industrial Communication Systems. CRC Press, 2018. http://dx.doi.org/10.1201/9781315218434-71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"Networking Fundamentals." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch004.

Full text
Abstract:
This chapter introduces to basics of computer networking and associated widely used essential networking communication protocols. The chapter provides the comparison of OSI and TCP model along with details of internet layer protocols including internet protocol (IP), IP addressing schemes, internet control messaging protocol (ICMP), etc. Next, the chapter discusses transport layer protocols transmission control protocol (TCP) and user datagram protocol (UDP) in detail. Application layer protocols including dynamic host control protocol (DHCP), secure shell (SSH), file transfer protocol (FTP),
APA, Harvard, Vancouver, ISO, and other styles
10

"Comparison With Other Systems." In Smart Grid Test Bed Using OPNET and Power Line Communication. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2776-3.ch006.

Full text
Abstract:
This chapter compares the system explained throughout this book with other systems expressed in other research. ‘The Trend on the Smart Grid Systems in the Republic of Korea' shows a normal system in Smart Grid Test Bed in Jeju-island, and the author distinguishes this approach with that of a new proposed method using RUDP (Reliable User Datagram Protocol).
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "User Datagram Protocol"

1

Romadhon, Faizal Wahyu, Muhammad Azza Ulin Nuha, Yusuf Adiprawira, and Riri Fitri Sari. "Comparative Analysis of HAProxy and Nginx Load Balancers in Mitigating User Datagram Protocol (UDP) Flood Attacks." In 2024 12th International Conference on Information and Communication Technology (ICoICT). IEEE, 2024. http://dx.doi.org/10.1109/icoict61617.2024.10698656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tuong Le, Giri Kuthethoor, Chokchai Hansupichon, et al. "Reliable User Datagram Protocol for airborne network." In MILCOM 2009 - 2009 IEEE Military Communications Conference. IEEE, 2009. http://dx.doi.org/10.1109/milcom.2009.5380007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zaidi, Sofiane, Salim Bitam, and Abdelhamid Mellouk. "Enhanced user datagram protocol for video streaming in VANET." In ICC 2017 - 2017 IEEE International Conference on Communications. IEEE, 2017. http://dx.doi.org/10.1109/icc.2017.7997020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kadhum, Mohammed M., and Hossam S. Hassanein. "Responsive user datagram protocol-based system for multimedia transmission." In ICC 2014 - 2014 IEEE International Conference on Communications. IEEE, 2014. http://dx.doi.org/10.1109/icc.2014.6883580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shahin Mahdizadeh Aghdam, Mohammad Khansari, Hamid R. Rabiee, and Mostafa Salehi. "UDDP: A User Datagram Dispatcher Protocol for Wireless Multimedia Sensor Networks." In 2012 IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 2012. http://dx.doi.org/10.1109/ccnc.2012.6181161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pilli, Ratnababu, T. Rajkumar, K. N. Shreenath, K. R. Prasanna Kumar, P. Joel Josephson, and Bhasker Pant. "Wireless Level Monitoring of Interfacing Two-Tank System through User Datagram Protocol." In 2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE, 2023. http://dx.doi.org/10.1109/icicacs57338.2023.10099621.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rai, Shubham, Abhishek Kaushal, and Anuj Kumar Sharma. "A robust leader-follower multi-robot system using user datagram protocol communication." In 4TH SYMPOSIUM ON INDUSTRIAL SCIENCE AND TECHNOLOGY (SISTEC2022). AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0182873.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Yuanlong, Chengdong Wu, Xintong Zhang, Bingyang Li, and Yunzhou Zhang. "An embedded wireless transmission system based on the extended user datagram protocol (EUDP)." In 2010 2nd International Conference on Future Computer and Communication. IEEE, 2010. http://dx.doi.org/10.1109/icfcc.2010.5497447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gupta, Abhishek, Om Jee Pandey, Mahendra Shukla, Anjali Dadhich, Anup Ingle, and Vishal Ambhore. "Intelligent Perpetual Echo Attack Detection on User Datagram Protocol Port 7 Using Ant Colony Optimization." In 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies (ICESC). IEEE, 2014. http://dx.doi.org/10.1109/icesc.2014.82.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Briones Delgado, Alan, Ramon Martín de Pozuelo, Guiomar Corral Torruella, Agustín Zaballos Diego, and Guillermo Dobao Lázaro. "Mecanismos de nivel de transporte para la optimización de envíos sobre Long Fat Networks." In XIII Jornadas de Ingenieria Telematica - JITEL2017. Universitat Politècnica València, 2017. http://dx.doi.org/10.4995/jitel2017.2017.6514.

Full text
Abstract:
Este artículo investiga los mecanismos de diferentes protocolos de transporte en transferencias sobre redes de alta capacidad y alto retardo, conocidas como Long Fat Networks (LFNs) para un envío eficiente de los datos. Transport Control Protocol (TCP) presenta limitaciones de rendimiento y flexibilidad. En la literatura se pueden encontrar diferentes propuestas de variantes del comportamiento de TCP, protocolos como Stream Control Transmission Protocol (STCP) o soluciones que proporcionan una comunicación confiable y mecanismos de control de congestión sobre User Datagram Protocol (UDP). En e
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "User Datagram Protocol"

1

Degermark, M., and S. Pink. The Lightweight User Datagram Protocol (UDP-Lite). Edited by G. Fairhurst. RFC Editor, 2004. http://dx.doi.org/10.17487/rfc3828.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fenner, B., and J. Flick. Management Information Base for the User Datagram Protocol (UDP). RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

McCloghrie, K., ed. SNMPv2 Management Information Base for the User Datagram Protocol using SMIv2. RFC Editor, 1996. http://dx.doi.org/10.17487/rfc2013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Daniele, M. IP Version 6 Management Information Base for the User Datagram Protocol. RFC Editor, 1998. http://dx.doi.org/10.17487/rfc2454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pelletier, G. RObust Header Compression (ROHC): Profiles for User Datagram Protocol (UDP) Lite. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rosenberg, J., J. Weinberger, C. Huitema, and R. Mahy. STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs). RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fairhurst, G., and T. Jones. Transport Features of the User Datagram Protocol (UDP) and Lightweight UDP (UDP-Lite). RFC Editor, 2018. http://dx.doi.org/10.17487/rfc8304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Renard, Kenneth D., and James R. Adametz. High-Bandwidth Tactical-Network Data Analysis in a High-Performance-Computing (HPC) Environment: Transport Protocol (Transmission Control Protocol/User Datagram Protocol [TCP/UDP]) Analysis. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ada621268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!