37 results on '"UDP"'
Search Results
2. Tele-Trafficking of Virtual Data Storage Obtained from Smart Grid by Replicated Gluster in Syntose Environment.
- Author
-
Hashmi, Waqas, Atiq, Shahid, Hussain, Muhammad Majid, and Javed, Khurram
- Subjects
- *
GENERAL Packet Radio Service , *SMART meters , *LOAD flow analysis (Electric power systems) , *TCP/IP , *AMBIENT intelligence , *ENERGY consumption , *GRIDS (Cartography) , *DATA warehousing - Abstract
One of the most important developments in the energy industry is the evolution of smart grids, which record minute details of voltage levels, energy usage, and other critical electrical variables through General Packet Radio Service (GPRS)-enabled meters. This phenomenon creates an extensive dataset for the optimization of the grid system. However, the minute-by-minute energy details recorded by GPRS meters are challenging to store and manage in physical storage resources (old techniques lead to a memory shortage). This study investigates using the distributed file system, replicated Gluster, as a reliable storage option for handling and protecting the enormous volumes of data produced by smart grid components. This study performs two essential tasks. (1) The storage of virtual data received from GPRS meters and load flow analysis of SynerGee Electric 4.0 software from the smart grid (we have extracted electrical data from 16 outgoing feeders, distributed lines, in this manuscript). (2) Tele-trafficking is performed to check the performance of replicated Gluster (RG) for virtual data (electrical data received from the smart grid) storage in terms of User Datagram Protocol (UDP), Transmission Control Protocol (TCP), data flow, and jitter delays. This storage technique provides more opportuni11ty to analyze and perform smart techniques efficiently for future requirement, analysis, and load estimation in smart grids compared to traditional storage methods. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Case Study on Server–Client Protocols of Industrial Controllers
- Author
-
Ramesh, H., Xavier, S. Arockia Edwin, Kumar, R. Pradheep, Fusic, S. Julius, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Rawat, Sanyog, editor, Kumar, Arvind, editor, Kumar, Pramod, editor, and Anguera, Jaume, editor
- Published
- 2022
- Full Text
- View/download PDF
4. M2M Communication Protocols
- Author
-
Chakravarthi, Veena S. and Chakravarthi, Veena S.
- Published
- 2021
- Full Text
- View/download PDF
5. Providing Communication Between the Microcontroller and a Personal Computer Using the Wiznet W5500 Network Controller
- Author
-
Zhmud, V., Nezvanov, A., Trubin, V., Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zhang, Junjie James, Series Editor, Radionov, Andrey A., editor, and Gasiyarov, Vadim R., editor
- Published
- 2021
- Full Text
- View/download PDF
6. Traditional vs. Modern Data Paths: A Comprehensive Survey.
- Author
-
Barghash, Ahmad, Hammad, Lina, and Gharaibeh, Ammar
- Subjects
TCP/IP ,INTERNET access - Abstract
Recently, many new network paths have been introduced while old paths are still in use. The trade-offs remain vague and should be further addressed. Since last decade, the Internet is playing a major role in people's lives, and the demand on the Internet in all fields has increased rapidly. In order to get a fast and secure connection to the Internet, the networks providing the service should get faster and more reliable. Many network data paths have been proposed in order to achieve the previous objectives since the 1970s. It started with the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) and later followed by several more modern paths including Quick UDP Internet Connections (QUIC), remote direct memory access (RDMA), and the Data Plane Development Kit (DPDK). This raised the question on which data path should be adopted and based on which features. In this work, we try to answer this question using different perspectives such as the protocol techniques, latency and congestion control, head of line blocking, the achieved throughput, middleboxes consideration, loss recovery mechanisms, developer productivity, host resources utilization and targeted application. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
7. A BBR-based congestion control for delay-sensitive real-time applications.
- Author
-
Najmuddin, Sayed, Asim, Muhammad, Munir, Kashif, Baker, Thar, Guo, Zehua, and Ranjan, Rajiv
- Subjects
- *
REAL-time control , *TCP/IP , *INTERNET telephony , *BOTTLENECKS (Manufacturing) - Abstract
The current User Datagram Protocol (UDP) causes unfairness and bufferbloats to delay sensitive applications due to the uncontrolled congestion and monopolization of available bandwidth.This causes call drops and frequent communication/connection loss in delay sensitive applications such as VoIP. We present a Responsive Control Protocol using Bottleneck Bandwidth and Round trip propagation time (RCP-BBR) as an alternate solution to UDP. RCP-BBR achieves low latency, high throughput, and low call drops ratio by efficiently customizing Transmission Control Protocol (TCP) Bottleneck Bandwidth and Round-trip propagation time (TCP-BBR) congestion control. We conducted comprehensive experiments, and the results show that proposed protocol achieves better throughput over UDP in stable networks. Moreover, in unstable and long-distanced networks, RCP-BBR achieved smaller queues in deep buffers and lower delays as compared to UDP, which performed poorly by keeping delays above the call drop threshold. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
8. Wearable IoT EKG Signal Data Synchronization via UDP.
- Author
-
Bănuleasa, Sabin, Munteanu Jr., Radu, Rusu, Alexandru, and Bâlc, Claudiu
- Subjects
DATA integrity ,WIDE area networks ,TCP/IP ,INTERNET of things ,ELECTROCARDIOGRAPHY ,SYNCHRONIZATION software - Abstract
IoT wearable devices that leverage the LPWAN (Low Power Wide Area Network) connectivity, in particular the NB-IoT (Narrow Band IoT) technology, commonly rely on UDP (User Datagram Protocol) packets to communicate with the endpoint to collect data. Its advantage is that of minimal bandwidth usage but its drawback is the lack of acknowledgements by the endpoint. One option is to use TCP (Transmission Control Protocol) or implement a custom acknowledgement protocol at a superior level in the network stack. This paper presents the implementation and testing of a simple and lightweight software synchronization layer on top of the UDP protocol, for the transmission of live EKG signal data, with verification of data integrity and the detection of sampling points loss. [ABSTRACT FROM AUTHOR]
- Published
- 2020
9. Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm
- Author
-
Aroosh Amjad, Tahir Alyas, Umer Farooq, and Muhammad Tariq
- Subjects
cloud computing ,ddos ,vulnerability ,sql injection ,mitigation ,tcp/ip ,udp ,icmp packets ,malicious ,exploit ,Management information systems ,T58.6-58.62 - Abstract
Cloud computing, with its staggering and on-demand services had revamped the technology so far. Cloudconsumers are freely to use the applications and software on the premises of Pay-as-you go concept. This concept decreased the cost and make the services less expensive and more reliable. One of the most important characteristic of cloud structure is on demand self-service. Cloud computing applications can be accessed anywhere at any time with much less cost. As cloud provide its consumers with its tremendous on demand services, besides this it is surviving from the excruciating security issues that are discourteous towards the cloud. There are, as many different attacks that results in making the servers down. One of the most hazardous attack is DDoS. This paper hiloghted the DDoS attack and its prevention technique which results in making the server side less vulnerable. The scenario includes, a transmission of million and trillion of packets in the form of DDoS at cloud-based websites, thus making it differentiated though different hosts. Making use of operating systems such as ParrotSec to make the attack possible. Last step includes detection and prevention through the most effective algorithms namely, Naïve Bayes and Random forest. This paper also focused the categories of attacks on cloud computing.
- Published
- 2019
- Full Text
- View/download PDF
10. Symmetric Measure of Network Traffic using Packet Ratio and Packet Symmetry.
- Author
-
Devi, B.S. Kiruthika, Dudeja, K., John, A.V., Marcin, K., and Subbulakshmi, T.
- Subjects
TCP/IP ,DENIAL of service attacks ,SYMMETRY ,TRAFFIC flow - Abstract
Flood attacks on a network occur when attackers send a very high volume of traffic to a system. This leads to an exhaustion of resources of the targeted system. Such a system or infrastructure under attack won't be able to cope up with the services it needs to provide due to capacity overload. These types of attacks are also called as Denial of Service (DoS) attacks. As it is essential for companies and organizations to provide high speed and high-quality services the network in which it operates needs to be secured against DoS attacks. As it is said prevention is better than cure, it is always better to detect an attack in the preliminary stages itself and deny an attacker any opportunity to continue the assault on the system. There are various kinds of DoS attacks, in this study the focus is on three kinds of attacks and its detection ICMP flood attack, UDP flood attack and TCP SYN flood attack. The detection mechanism employed is based on packet symmetry which can be used in to monitor the data flow in a network and detect any malicious anomalies in the network traffic at any instant. The experimental results, show that the packet symmetry is a reliable metric to detect attacks on the network by checking the data flow in the ICMP, UDP and TCP layers. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
11. Application of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) in Teleconference System.
- Author
-
Taye Oladele, ARO, Saheed Adekunle, ADEKEYE, Hakeem Babalola, AKANDE, and Bukola Omolara, FUNSO
- Subjects
TCP/IP ,TELECONFERENCING ,COMPUTER network protocols ,QUALITY of service ,TASK analysis ,TELECOMMUNICATION - Abstract
Teleconferencing is the act of meeting and exchanging information through a telecommunication medium. In teleconferencing system, network engineers are faced with different challenges like best protocols requirements; impact of Quality of Service (QoS) to be used to meet up with the latest network protocols and appliances in the design of teleconference system. This paper presented a comparative analysis on two network protocols in a teleconference system, Transmission Control Protocol (TCP) versus a User Datagram Protocol (UDP) was evaluated and compared applying Optimized Network Engineering Tools (OPNET) simulator. The experimental result showed differences in number of videoconference sessions, with few Packet Per Seconds (PPS) recorded in both the UDP and TCP, thereby reflecting the correctness of this comparative evaluation task. [ABSTRACT FROM AUTHOR]
- Published
- 2019
12. Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm.
- Author
-
Amjad, Aroosh, Alyas, Tahir, Farooq, Umer, and Tariq, Muhammad Arslan
- Subjects
DENIAL of service attacks ,CLOUD computing ,MACHINE learning ,NAIVE Bayes classification ,RANDOM forest algorithms - Abstract
Cloud computing, with its staggering and on-demand services had revamped the technology so far. Cloud consumers are freely to use the applications and software on the premises of Pay-as-you go concept. This concept decreased the cost and make the services less expensive and more reliable. One of the most important characteristic of cloud structure is on demand self-service. Cloud computing applications can be accessed anywhere at any time with much less cost. As cloud provide its consumers with its tremendous on demand services, besides this it is surviving from the excruciating security issues that are discourteous towards the cloud. There are, as many different attacks that results in making the servers down. One of the most hazardous attack is DDoS. This paper hiloghted the DDoS attack and its prevention technique which results in making the server side less vulnerable. The scenario includes, a transmission of million and trillion of packets in the form of DDoS at cloud-based websites, thus making it differentiated though different hosts. Making use of operating systems such as ParrotSec to make the attack possible. Last step includes detection and prevention through the most effective algorithms namely, Naive Bayes and Random forest. This paper also focused the categories of attacks on cloud computing. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
13. Evaluation of Protocols and Algorithms for Improving the Performance of TCP over Wireless/Wired Network
- Author
-
Vasanthi, V., Ajith Singh, N., Romen Kumar, M., Hemalatha, M., Das, Vinu V, editor, and Thankachan, Nessy, editor
- Published
- 2011
- Full Text
- View/download PDF
14. The Impact of Ingress Packet Size on the Performance of TCP and UDP in Survivable Networks.
- Author
-
Saini, Himanshi and Garg, Amit Kumar
- Subjects
TCP/IP ,BANDWIDTHS ,WIRELESS communications ,SOFTWARE measurement ,TELECOMMUNICATION - Abstract
Survivability is an issue of great concern in high speed networks. Optical Packet Switching (OPS) is an established technique in the area of survivable high speed future networks. In this paper, network performance is evaluated in response to ingress packet size variation. The performance is evaluated for both protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Analysis is performed on mesh networks for different ingress packet size. Response of both transport layer protocols has been observed under single link failure. Network throughput with TCP is higher as compared to throughput with UDP. Network throughput is highest at 500 byte packet size, which is less than the configured Maximum Segment Size (MSS) of transport layer protocols. [ABSTRACT FROM AUTHOR]
- Published
- 2018
15. UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO using LabVIEW.
- Author
-
Kurniawan, Wijaya, Ichsan, Mochammad Hannats Hanafi, and Akbar, Sabriansyah Rizqika
- Subjects
HOME automation ,UBIQUITOUS computing ,TCP/IP ,BIG data - Abstract
Smart Home concept is to connect several devices to perform control and the device to be controlled to help any human needs. So it should have one device being Host and several devices being Client. The environment in this case is a home that there is too much technology that planted technologies that has much influence at human activities is called pervasive computing. The device communication should be has a protocol, at the research used UDP protocol because it doesn't need to negotiate before performing communication like a TCP. With UDP behavior did not use to validate at every send or deliver data because at Smart Home environment doesn't need a large or big data being processed. LabView used at this research based on previous research, but MyRIO has used this research to perform Client and Host performed by PC. So it can measure how usable the design that created. This research proves that LabView and MyRIO successfully implemented with the design that created to perform Pervasive Computing for Smart Home environment. Functional testing scenario conducted by every condition that on system environment, based on design all testing scenario successfully and working as well as expected. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
16. Design and Implement Chat Program Using TCP/IP.
- Author
-
Ahmed, Mohammed A., Rafea, Sara Ammar, Falah, Lara Moufaq, and Abd Ullah, Liqaa Samir
- Subjects
TCP/IP ,FILE transfer (Computer science) ,PROBLEM solving ,JAVA programming language ,COMPUTER network protocols - Abstract
LAN Chat Messenger using TCP/IP offers reliability, security and zero cost communication among staff members of a company. As well, this study offers file transfer. It helps to solve the communication problems that related to time and cost. The proposed protocol facilitates information exchange among individuals by providing many communication options. It is a standalone application using JAVA as the programming language and tested at LANs of our institute (college's Labs networks). [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
17. Fixed-point analysis of a network of routers with persistent TCP/UDP flows and class-based weighted fair queuing.
- Author
-
Tunc, Caglar and Akar, Nail
- Subjects
TCP/IP ,FIXED point theory ,NETWORK routers ,QUEUING theory ,INTERNET - Abstract
Fixed-point models have already been successfully used to analytically study networks consisting of persistent TCP flows only, or mixed TCP/UDP flows with a single queue per link and differentiated buffer management for these two types of flows. In the current study, we propose a nested fixed-point analytical method to obtain the throughput of persistent TCP and UDP flows in a network of routers supporting class-based weighted fair queuing allowing the use of separate queues for each class. In particular, we study the case of two classes where one of the classes uses drop-tail queue management and is intended for only UDP traffic. The other class targeting TCP, but also allowing UDP traffic for the purpose of generality, is assumed to employ active queue management. The effectiveness of the proposed analytical method is validated in terms of accuracy using ns-3 simulations and the required computational effort. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
18. Latency Analysis for M2M and Online Gaming Traffic in an HSPA Network.
- Author
-
POPOVIĆ, MILICA, DRAJIĆ, DEJAN, SVOBODA, PHILIPP, NIKAEIN, NAVID, KAČO, SRAĐAN, and LANER, MARKUS
- Subjects
TCP/IP ,COMPUTER network protocols ,VIDEO games ,FIREWALLS (Computer security) ,FILE Transfer Protocol (Computer network protocol) - Abstract
This paper analyzes latency in a High-Speed Packet Access network appropriately resourced for emulated Machine-to-Machine and Online Gaming traffic. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are used for conveying application data and the measurement results from the end-user perspective are compared. In TCP case, traffic traces were recorded in two points of the core network as well (Gn interface and the firewall), and the overall delay is dissected to portions belonging to different parts of the network (access, core, backbone). The diversity of the traffic patterns used made it possible to draw conclusions concerning selectivity of certain parts of the network towards different traffic patterns, indicating the direction of future research on reducing latency for subject emerging application domains in legacy networks. [ABSTRACT FROM AUTHOR]
- Published
- 2016
19. PC 시리얼통신 기반의 이더넷 네트워크 융복합 구성 기술 성능 향상에 관한 연구
- Author
-
진현수
- Abstract
This paper suggest remote control technic using TCP/IP protocol network after UART serial communication implemented through RS-232 cable to ethernet module. This is multidisplinary signal technique which is PC signal is converted to internet communication signal. Ethernet module is WIZ1000SR. This is gate module which convert RS-232 protocol to TCP/IP protocol. This module convert serial data transmitted serial device to TCP/IP type data, in contrast TCP/IP data received through network converted to serial data transmitted to serial device. This paper propose t [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
20. Congestion-aware TCP-friendly system for multimedia transmission based on UDP.
- Author
-
Kadhum, Mohammed and Hassanein, Hossam
- Subjects
- *
TCP/IP , *INTERNET protocols , *HTTP (Computer network protocol) , *BANDWIDTHS , *MULTIMEDIA systems , *OSI (Computer network standard) - Abstract
Although most of the data traffic in Internet is HTTP-based, multimedia applications will soon dominate a large percentage of the traffic. These applications require satisfactory level of bandwidth as they normally have large datasets. Under the limitation of network bandwidth, multimedia traffic may become a source for congestion; particularly when UDP is used due to the absence of flow control or congestion control mechanisms in this protocol. Avoiding congestion can be done if arrival rate to gateways is maintained close to outgoing link capacity while maintain small queue lengths at the routers. This guarantees the availability of buffer capacity for successful buffering and consequent forwarding in case of temporary traffic upsurges which could otherwise cause buffer overflows and packet loss. This research work introduces a congestion-aware and friendly UDP-based multimedia system which can help to lessening congestion occurrence and improve network performance, principally in real-time environments. The evaluation results show that the proposed system helps in controlling congestion, reducing packet loss, increasing throughput, and providing improved network utilization. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
21. Спосіб передачі даних на основі протоколу UDP
- Author
-
Боярінова, Юлія Євгенівна
- Subjects
мережева модель ,JSON ,OSI ,UDP ,C# ,network model ,TCP/IP ,raw socket - Abstract
Кваліфікаційна робота включає пояснювальну записку (50 с., 20 рис., 9 таблиць). Дипломний проєкт присвячений дослідженню передачі даних у мережі, зокрема на основі протоколу UDP. Розглядається як повідомлення доставляється з однієї комп’ютерної системи в іншу, та яка роль транспортного рівня в цьому процесі. Досліджено способи створення власних протоколів транспортного рівня або модифікація вже існуючих. Розроблене програмне забезпечення використовує сирі сокети (англ. raw sockets) для написання імплементації нового протоколу, який оптимізує транспортування певного формату даних, а саме – JSON. Для імплементації було обрано мову програмування C#, фреймворк для роботи з форматом даних JSON Json.NET та вбудована бібліотека для роботи з сокетами. Результатом роботи над дипломним проєктом є API для надсилання на отримання повідомлень у форматі JSON. The qualification work includes an explanatory note (50 p, 20 figures, 9 tables). The diploma project is devoted to the investigation of data transmission in the network, in particular based on the UDP protocol. It examines how a message is delivered from one computer system to another, and what is the role of the transport layer in this process. Methods for creating your own transport layer protocols or modifying existing ones have been investigated. The developed software uses Raw sockets to write the implementation of a new protocol that optimizes the transport of a specific data format, namely JSON. For implementation, the C # programming language, a framework for working with the JSON Json.NET data format and a built-in library for working with sockets were chosen. The result of the work on the diploma project is the API for sending and receive messages in a JSON format.
- Published
- 2021
22. Securing VoIP in SIP Mobile Network.
- Author
-
Zaid Salah Munef and Al-Hamami, Alaa Hussein
- Subjects
MOBILE communication system security ,INTERNET telephony ,INFORMATION technology ,SESSION Initiation Protocol (Computer network protocol) ,BIT rate ,TCP/IP - Abstract
Lately, the development and progress have become significant in the field of information technology, especially in the field of data transmission via internet. One kind of the data transfer is voice. This part of the development in the field of mobile devices, which is possibility supplying the device by internet service .These developments in the field of technology are concurring many problems, where it had a direct impact on this development and the turnout by the users. [ABSTRACT FROM AUTHOR]
- Published
- 2015
23. Fluid flow approximation of time-limited TCP/UDP/XCP streams.
- Author
-
Domańska, J., Domański, A., Czachórski, T., and Klamka, J.
- Subjects
- *
FLUID flow , *APPROXIMATION theory , *TCP/IP , *INTERNET protocols , *DATA transmission systems , *MATHEMATICAL models - Abstract
This article presents the use of fluid flow approximation to model interactions between a set of TCP, UDP and XCP flows in the environment of IP routers using AQM (Active Queue Management) algorithms to control traffic congestion. In contrast to other works, independent UDP and TCP streams are considered and the model allows to start and end data transmissions in TCP, UDP and XCP streams at any time moment. It incorporates several Active Queue Management mechanisms: RED, NLRED, CHOKe. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
24. Surveying Port Scans and Their Detection Methodologies.
- Author
-
Bhuyan, Monowar H., Bhattacharyya, D.K., and Kalita, J.K.
- Subjects
- *
COMPUTER operating systems , *PORTS (Electronic computer system) , *SCANNING systems , *COMPUTER network security , *TCP/IP , *INTERNET - Abstract
Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port scans of Internet protocol addresses to find vulnerable hosts to compromise. However, it is also useful for system administrators and other network defenders to detect port scans as possible preliminaries to more serious attacks. It is a very difficult task to recognize instances of malicious port scanning. In general, a port scan may be an instance of a scan by attackers or an instance of a scan by network defenders. In this survey, we present research and development trends in this area. Our presentation includes a discussion of common port scan attacks. We provide a comparison of port scan methods based on type, mode of detection, mechanism used for detection and other characteristics. This survey also reports on the available data sets and evaluation criteria for port scan detection approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
25. Performance Metrics for IEEE 802.21 Media Independent Handover (MIH) Signaling.
- Author
-
Griffith, David, Rouil, Richard, and Golmie, Nada
- Subjects
ROAMING (Telecommunication) ,CELL phones ,INTERNET protocols ,TCP/IP ,TEXT messages ,MATHEMATICAL models - Abstract
The IEEE 802.21 Media Independent Handover (MIH) working group is developing a set of mechanisms to facilitate migration of mobile users between access networks that use different link-layer technologies. Among these are mobility managers that create and process signaling messages to facilitate handovers. The MIH signaling architecture being developed in the Internet Engineering Task Force (IETF) allows any transport layer protocol to carry MIH messages. The IETF has considered using the unreliable but lightweight transport available with the User Datagram Protocol (UDP) as well as the reliable stream-oriented transport with congestion control offered by the Transmission Control Protocol (TCP). In this paper we develop mathematical models that result in expressions for the characteristic function of the time required to complete exchanges of an arbitrary number of MIH signaling messages between a mobile node (MN) and a remote mobility manager (MM). Our models also provide expressions for the average amount of overhead associated with MIH message exchanges due to retransmissions either by the MIH signaling entities or by the transport-layer protocol. In addition, we provide simulation results that confirm the results from the mathematical model and illustrate the effect of varying transport parameters such as the TCP maximum retransmission timeout. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
26. A Solution for Improving Communication in Desktop Grid Systems.
- Author
-
Constantinescu, Zoran and Vladoiu, Monica
- Subjects
- *
TCP/IP , *COMPUTER network protocols , *INTERNET domain naming system , *DATA transmission systems , *COMPUTER networks , *FRAME relay (Data transmission) , *NETWORK File System (Computer network protocol) , *INFORMATION networks , *ELECTRONIC data processing - Abstract
In this paper we present our solution for improving the quality of communication in our particular desktop grid system, QADPZ, which consists of a dual communication mechanism. Thus, in order to improve the efficiency of communication, QADPZ support two different protocols (UDP and TCP/IP). To deal with the unreliability of UDP, an additional, more reliable level of communication has been added to the system, which works similarly with the real life postal service, delivering and receiving high-level message and implements a reliable, confirmation-based message exchange protocol. We point out that an unreliable transport mechanism that deals with packet loss gracefully and does not exhibit extreme losses can compete well with other more reliable transport protocols. [ABSTRACT FROM AUTHOR]
- Published
- 2009
27. Throughput Analysis and Measurements in IEEE 802.11 WLANs with TCP and UDP Traffic Flows.
- Author
-
Bruno, Raffaele, Conti, Marco, and Gregori, Enrico
- Subjects
IEEE 802.11 (Standard) ,WIRELESS LANs ,MARKOV processes ,COMPUTER network protocols ,TCP/IP ,WORKLOAD of computer networks - Abstract
There is a vast literature on the throughput analysis of the IEEE 802.11 media access control (MAC) protocol. However, very little has been done on investigating the interplay between the cotlisioc avoidance mechanisms of the 802.11 MAC protocol and the dynamics of upper layer transpod protocols. In this paper, we tackle this issue from an analytical, simulative, and experimental perspective. Specifically, we develop Markov chain models to compute the distribution of the number of active stations in an 802.11 wireless local area network (WLAN) when long-lived Transmission Control Protocol (TCP) connections compete with finite-loed User Datagram Protocol (UDP) flows. By embedding these distributions in the MAC protocol modeling, we derive approximate but accurate expressions of the TCP and UDP throughput. We validate the model accuracy through performance tests carried out in a real WLAN for a wide range of configurations. Our analytical model and the supporting experimental outcomes show that 1) the total TCP throughput is basically independent of the number of open TCP connections and the aggregate TCP traffic can be equivalently modeled as two saturated flows and 2) in the saturated regime, n UDP flows obtain about n times the aggregate throughput achieved by the TCP flows, which is independent of the overall number of persistent TCP connections. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
28. A proposal of traffic control mechanism in PON based access system.
- Author
-
Iwata, Toshiyuki, Nakanishi, Yasuhiko, and Maeda, Yoichi
- Subjects
- *
BANDWIDTHS , *TCP/IP , *COMPUTER network protocols , *COMPUTER networks , *STANDARDS , *BROADBAND communication systems - Abstract
We propose a bandwidth control method to increase or decrease the entire assigned upstream bandwidth by monitoring the queue length in order to prevent a drop in the throughput and an increase in the delay time when congestion is produced by the traffic generated by multiple users in a passive optical network (PON)-type optical access system for economically providing wideband multimedia services. The ability of the proposed method to avoid congestion, improve the Transmission Control Protocol (TCP) throughput, reduce the delays, and assure fairness between the TCP and User Datagram Protocol (UDP) traffic is demonstrated in computer simulations by applying the proposed method to the Broadband-PON (B-PON) system which complies with the ITU-T standard. © 2007 Wiley Periodicals, Inc. Electron Comm Jpn Pt 2, 90(7): 41– 55, 2007; Published online in Wiley InterScience (
www.interscience.wiley.com ). DOI 10.1002/ecjb.20374 [ABSTRACT FROM AUTHOR]- Published
- 2007
- Full Text
- View/download PDF
29. Optimization of SIP Session Setup Delay for VoIP in 3G Wireless Networks.
- Author
-
Fathi, Hanane, Chakraborty, Shyam S., and Prasad, Ramjee
- Subjects
WIRELESS communications ,DIGITAL communications ,TCP/IP ,INTERNET protocols ,INTERNET telephony ,DATA transmission systems ,COMPUTER network resources ,INTERNET industry ,MOBILE communication systems - Abstract
Wireless networks beyond 2G aim at supporting real-time applications such as VolP. Before a user can start a VolP session, the end-user terminal has to establish the session using signaling protocols such as H.323 and session initiation protocol (SIP) in order to negotiate media parameters. The time interval to perform the session setup is called the session setup time. It can be affected by the quality of the wireless link, measured in terms of frame error rate (FER), which can result in retransmissions of packets lost and can lengthen the session setup time. Therefore, such protocols should have a session setup time optimized against loss. One way to do so is by choosing the appropriate retransmission timer and the underlying protocols. In this paper, we focus on SIP session setup delay and propose optimizing it using an adaptive retransmission timer. We also evaluate SIP session setup performances with various underlying protocols (transport control protocol (TCP), user datagram protocol (UDP), radio link protocols (RLPs)) as a function of the FER. For 19.2 Kbps channel, the SIP session setup time can be up to 6.12s with UDP and 7s with TCP when the FER is up to 10 percent. The use of RLP (1,2, 3) and RLP (1, 1, 1, 1, 1, 1) puts the session setup time down to 3.4s under UDP and 4s under TCP for the same FER and the same channel bandwidth. We also compare SIP and H.323 performances using an adaptive retransmission timer: SIP outperforms H.323, especially for a FER higher than 2 percent. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
30. Herramienta de análisis de rendimiento de una red
- Author
-
Húmera Pulido, Ricardo and March Hermo, Maria Isabel
- Subjects
Ethernet ,redes ,networks ,sniffer ,Ordinadors, Xarxes d' -- TFG ,UDP ,TCP/IP ,Computer networks -- TFG ,Ordenadores, Redes de -- TFG ,Python ,xarxes - Abstract
¿Es óptimo el rendimiento de nuestra red?, ¿podemos aumentar el rendimiento?, ¿qué tipo de tráfico fluye por nuestra red? Estas son preguntas en la que todo administrador de redes tendría que hacerse todos los días, aunque la sensación que tenga él y sus usuarios sea la inexistencia de problemas. Para obtener respuestas a estas preguntas es necesario el uso de herramientas de análisis de red, que nos arrojan resultados de sus análisis para que los administradores de redes puedan sacar conclusiones y actuar respeto a estas. Este Trabajo Fin de Grado (TFG) describe el desarrollo de creación de una herramienta de análisis de rendimiento de una red ethernet, con la que se pretende que un usuario pueda conocer el comportamiento de una red y ayudarle a sacar conclusiones de su tráfico. Este análisis se basa en la "escucha" de la red donde está conectado y su posterior clasificación del tráfico de los protocolos utilizados en cada capa del modelo TCP/IP. Además, también presenta el análisis de conversaciones entre equipos pertenecientes a la red tanto en capa física como de red. También se ha realizado un módulo de estadísticas donde se presentan los datos recogidos en gráficas para un mejor análisis por parte del usuario. El proyecto está compuesto por tres bloques. El primero consiste en un breve estudio del modelo TCP/IP y más concretamente como se estructura los datos. El segundo es la fase de análisis y diseño de la aplicación. El último bloque describe la implementación de la herramienta. És òptim el rendiment de la nostra xarxa?, podem augmentar el rendiment?, quin tipus de trànsit flueix per la nostra xarxa? Aquestes són preguntes en la qual tot administrador de xarxes hauria de fer-se tots els dies, encara que la sensació que tingui ell i els seus usuaris sigui la inexistència de problemes. Per a obtenir respostes a aquestes preguntes és necessari l'ús d'eines d'anàlisis de xarxa, que ens llancen resultats de les seves anàlisis perquè els administradors de xarxes puguin treure conclusions i actuar respecte a aquestes. Aquest Treball Fi de Grau (TFG) descriu el desenvolupament de creació d'una eina d'anàlisi de rendiment d'una xarxa ethernet, amb la qual es pretén que un usuari pugui conèixer el comportament d'una xarxa i ajudar-lo a treure conclusions del seu trànsit. Aquesta anàlisi es basa en l'"escolta" de la xarxa on està connectat i la seva posterior classificació del trànsit dels protocols utilitzats en cada capa del model TCP/IP. A més, també presenta l'anàlisi de converses entre equips pertanyents a la xarxa tant en capa física com de xarxa. També s'ha realitzat un mòdul d'estadístiques on es presenten les dades recollides en gràfiques per a una millor anàlisi per part de l'usuari. El projecte està compost per tres blocs. El primer consisteix en un breu estudi del model TCP/IP i més concretament com s'estructura les dades. El segon és la fase d'anàlisi i disseny de l'aplicació. L'últim bloc descriu la implementació de l'eina. Is our network performance optimal?, can we increase performance?, what kind of traffic flows our network? These are questions that every network administratos should ask himself every day, although the feeling that he and his users have is there are no problems. To obtain answers to these questions, it is necessary to use network analysis tools, which give us results of theis analysis so that network administrator can draw conclusions and act on them. This end-of.degrade project (TFG) describes the development of a performance analysis tool for an ethernet network, which is intended to enable a user o know the behaviour of a network and help him or her draw conclusions from his traffic. This analysis is based on the "listening" of the network where it is connected and subsequent classification of the traffic in the protocols used in each layer of the TCP/IP model. In addition, it also presents the analysis of conversations beetween computer belonging to the network at both the physical and network layers. A statistics module has also been created where the data collected is presented in graphs for better analysis by the user.The project is composed of three blocks. The first consists of a brief study of the TCP/IP model and more specifically how the data is structured. The second is the analysis and design phase of the application. The last block describes the development of the tool.
- Published
- 2020
31. Adaptation and integration of TCP / IP stack in an ERIKA environment based on Aurix platform
- Author
-
Babić, Josip and Herceg, Marijan
- Subjects
TECHNICAL SCIENCES. Electrical Engineering. Electronics ,TEHNIČKE ZNANOSTI. Elektrotehnika. Elektronika ,TC297 ,poslužitelj ,server ,RTOS ,ERIKA ,Infineon ,UDP ,TCP/IP ,Aurix ,lwIP - Abstract
Diplomski rad opisuje integraciju sustava koji za rezultat ima funkcionalnost UDP poslužitelja. Na početku su objašnjeni osnovni pojmovi vezani za TCP/IP stog, a zatim su opisane komponente korištene za izradu sustava. Nakon što su dana potrebna objašnjenja, opisan je postupak spajanja cijelog sustava i implementacije algoritma kako bi se dobila tražena funkcionalnost. Na dobivenom sustavu izvršena su testiranja u cilju mjerenja pouzdanosti i performansi, te je na osnovu dobivenih rezultata moguće odrediti korisnost i primjenu sustava This master thesis describes the integration process of the system which is used as UDP server. At the beginning, some of the basic terms about TCP/IP suite were explained, along with the explanation of components used for the system integration. After the required explanation has been given, the process of system integration has been described, along with the algorithm implementation. Integrated system has been used for performance and reliability measurements, which has provided the answers about the utility and the application of the system
- Published
- 2017
32. Metoda za povezivanje mernog sistema i računarapomoću konverzije podataka iz I2S u TCP/IP protokol
- Author
-
Sakal, Tibor, Dobrilović, Dalibor, Ivković, Miodrag, Trpovski, Željen, Brtka, Vladimir, and Stojanov, Željko
- Subjects
Communication protocols ,Komunikacioni protokoli, konvertor protokola, I2S,UDP, TCP/IP, ugrađeni sistemi, prenos podataka u realnom vremenu ,ugrađeni sistemi ,I2S ,Komunikacioni protokoli ,embedded systems ,Communication protocols, protocol converter, I2S,UDP, TCP/IP, embedded systems, real time data transfer ,konvertor protokola ,protocol converter ,UDP ,TCP/IP ,prenos podataka u realnom vremenu ,real time data transfer - Abstract
Ova doktorska disertacija predstavlja istraživački rad sproveden sa ciljem da reši problem koji se odnosi na realizaciju povezivanja laboratorijskog, medicinskog mernog uređaja sa personalnim računarom. Rezultat istraživačkog rada je opšta metoda koja obezbeđuje efikasnu konverziju podataka I2S protokola u TCP/IP protokol., This doctoral thesis presents the research work carried out in order to solve a practical problem, the realization of a connection between a medical measuring device and a personal computer. The result of the research is a general method that provides efficient data conversion from the I2S protocol to the TCP/IP protocol.
- Published
- 2017
33. Interprocess communication in embedded Linux environments
- Author
-
Jakopec, Stephanie and Pribanić, Tomislav
- Subjects
TEHNIČKE ZNANOSTI. Računarstvo ,međuprocesna komunikacija ,Erlang ,vrata ,port ,red ,red poruka ,shared memory ,TECHNICAL SCIENCES. Computing ,virtualna mašina ,Erlport ,dijeljena memorija ,utičnica ,UDP ,lubuntu ,socket ,Linux ,TEHNIČKE ZNANOSTI. Elektrotehnika ,Ubuntu ,Zmq ,interprocess communication ,message queue ,pipe ,TECHNICAL SCIENCES. Electrical Engineering ,queue ,Rabbitmq ,virtual machine ,cjevovod ,TCP ,TCP/IP ,Python - Abstract
U ovom radu proučava se međuprocesna komunikacija u Linux ugradbenim sustavima putem utičnica i redova. Kao jezici za komunikaciju izabrani su Python i Erlang. Za demonstraciju komunikacije odabran je scenarij gdje se iz Python programa šalje zatjev za izračunom faktorijela svakog poslanog broja. Erlang strana komunikacije prima poruku, obrađuje zahtjev i šalje rezultat Python procesu. Proučavale su se dvije implementacije komunikacije putem redova, a to su Zmq, Rabbitmq, te dvije implementacije pomoću utičnica, Erlport i ugrađeni moduli za komunikaciju UDPom. Testiranje se provodilo na dva računala trideset puta za svaki način komunikacije. Testiranjem zadatka može se vidjeti da za ovu vrstu problema moduli za komunikaciju UDPom, Zmq i Rabbitmq daju slično vrijeme izvođenja, dok je Erlport evidentno sporiji. This paper examines the interprocess communication in Linux embedded systems through sockets and queues. Python and Erlang were selected as languages for communication. To demonstrate the communication a scenario was chosen where Python program sends a request for the calculation of the factorial. Erlang side of communication receives the message, processes the request and sends the result to the Python process. We studied two implementations of communication using queues: Zmq, Rabbitmq, and two implementations using sockets: Erlport and embedded modules for communication with UDP protocol. Testing was conducted on two computers thirty times for each mode of communication. Testing results show that for this kind of problem modules for communication with UDP protocol, Zmq and Rabbitmq provide similar runtime, while Erlport is evidently slower.
- Published
- 2016
34. Increasing Throughput and QoS in a HIPERLAN/2 System with Co-channel Interference
- Author
-
Rapp, Jürgen
- Published
- 2002
- Full Text
- View/download PDF
35. Tirer les ficelles de l'architecture TCP/IP avec Marionnet
- Author
-
Butelle, Franck, Loddo, Jean-Vincent, and Butelle, Franck
- Subjects
STP ,[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,simulation ,Virtualisation ,réseau ,SNAT ,didacticiel ,ARP ,DNAT ,IP ,pédagogie ,VLAN ,OSI ,TCP ,UDP ,TCP/IP ,protocole ,802.1Q - Abstract
Marionnet est un logiciel permettant de définir, configurer, exécuter et contrôler un réseau virtuel constitué d'ordinateurs utilisant le système d'exploitation GNU/Linux, de concentrateurs, de commutateurs, et de routeurs. Avec Marionnet, il est possible d'expérimenter la mise en oeuvre complète d'un réseau local : le projet, le câblage, le lancement, la configuration, l'administration, l'étude de protocoles et le test de services ou d'applications. Il permet de pratiquer, analyser et contrôler les différentes couches réseaux qui constituent l'architecture DoD (TCP/IP) : depuis le niveau physique jusqu'au niveau application. Adopté dans une structure universitaire, Marionnet permet de réduire l'utilisation des vraies salles de " TP réseau ", constituées d'équipements souvent onéreux et difficiles à maintenir en parfait état de marche. Il permet aussi aux étudiants de travailler à distance ou dans les salles informatiques ordinaires en accès libre.
- Published
- 2011
36. Analysis on distribution of real-time GNSS data over IP networks
- Author
-
Yan, Thomas Surya Sanjaya
- Subjects
GNSS ,RTK ,GPS ,NTRIP ,UDP ,RTCM ,TCP/IP - Abstract
This thesis examines the current implementations for the distribution of real-time GNSS data over IP networks such as the public Internet, focusing on two essential components of the system, data format and transport protocol. The provision of a suitable data format will allow users to take full advantage of the real-time GNSS data distribution system. Types of GNSS supported, message sizes, data rates, data precision levels, hardware and software support and possible future developments are investigated. An analysis is carried out on commonly known GNSS data formats, highlighting the most suitable standard for each evaluation criterion. A similar investigation is carried out on the transport protocols. An analysis is conducted on various design aspects of NTRIP and RT-IGS protocols, covering factors such as data latency, integrity, firewalls and proxy server compatibility and scalability. The analysis also covers the design aspects of the new draft Version 2 of NTRIP. The latter parts of this thesis report on the experiment results aimed at providing assessment of the current level of implementation of NTRIP. Data latency and integrity using NTRIP over the Internet are examined. Their impacts on users applications as the quality of real-time kinematic positioning is assessed. The results show that the performance of the system satisfies the rigorous requirement of the end-user application. The draft version of the new NTRIP indicates that UDP will be also supported. A similar investigation is carried out, providing the first experiment results on the new option. Tests using similar metrics, data latency and integrity, were carried out to verify the inherent differences between TCP and UDP. It was ascertained that, in most cases, UDP does offer improvement in terms of reduced latency over TCP. However this improvement is not significant enough to affect the performance of users applications tested. Compatibility tests were also carried out and the test results show that the new option experiences some compatibility issues with firewalls and wireless networks.
- Published
- 2008
- Full Text
- View/download PDF
37. ATMモウ ニ オケル マルチメディア コウセイ シュホウ ノ テイアン
- Subjects
プロトコルオーバヘッド ,ATM ,UDP ,TCP/IP ,マルチメディア通信 - Published
- 1995
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.