Showing 341 - 360 results of 809 for search '"Internet Protocol"', query time: 0.17s Refine Results
  1. 341

    Analiza protokola kvaliteta usluga telekomunikacionih mreža / Analysis of quality of service protocols in telecommunication networks by Milojko Jevtović

    Published 2003-05-01
    “…Protokoli kvaliteta usluga (Quality of Service - QoS) sadašnjih i budućih telekomunikacionih mreža razvijeni su, pored ostalog, sa ciljem da podrže različite klase usluga (Class of Service - CoS) komunikaciju u realnom vremenu, kao i prenos multimedijalnih poruka preko paketskih IP (Internet Protocol) mreža. U raduje dat pregled karakteristika tih protokola i ocena njihovih konkretnih mogućnosti u obezbeđenju kvaliteta usluga unutar sistema ('s vrha do dna', tj. vertikalno u OSI arhitekturi) kao i 'horizontalno' odnosno s kraja na kraj veze, tj. između izvora i odredišta. / Today's and future telecommunication networks must enable transmission throughout heterogeneous environment, using different Quality of Service protocols, Quality of Service protocols use a variety of complementary mechanisms to enable deterministic end-to-end different data delivery. …”
    Get full text
    Article
  2. 342

    Mathematical Bottom-to-Up Approach in Video Quality Estimation Based on PHY and MAC Parameters by Nermin Goran, Mesud Hadzialic

    Published 2017-01-01
    “…Verification of the model was checked by experimental method with consideration of Internet protocol television (IPTV) service delivery in Digital Subscriber Line network.…”
    Get full text
    Article
  3. 343

    Simulation-based optimization of signaling procedures in IP multimedia subsystem by Jasmina Barakovic Husic, Alisa Hidic, Mesud Hadzialic, Sabina Barakovic

    “…This paper presents a simulation-based optimization of signaling procedures in Internet protocol Multimedia Subsystem (IMS). The aim is to improve the performance of signaling procedures by applying an algorithm for Session Initiation Protocol (SIP) message classification and prioritization that is proposed in our previous work. …”
    Get full text
    Article
  4. 344

    Security Concerns in MMO Games—Analysis of a Potent Application Layer DDoS Threat by Nikola Gavrić, Živko Bojović

    Published 2022-10-01
    “…The application layer in the Internet protocol suite offers a significant degree of freedom regarding the orchestration of distributed denial-of-service attacks due to many different and unstandardized protocols. …”
    Get full text
    Article
  5. 345

    A Review on Hot-IP Finding Methods and Its Application in Early DDoS Target Detection by Xuan Dau Hoang, Hong Ky Pham

    Published 2016-10-01
    “…On the high-speed connections of the Internet or computer networks, the IP (Internet Protocol) packet traffic passing through the network is extremely high, and that makes it difficult for network monitoring and attack detection applications. …”
    Get full text
    Article
  6. 346

    ESSE: Efficient Secure Session Establishment for Internet-Integrated Wireless Sensor Networks by Namhi Kang, Jiye Park, Hyeokjin Kwon, Souhwan Jung

    Published 2015-08-01
    “…The dramatically increasing number of connected things based on Internet protocol is leading to a new concept called the Internet of Things (IoT). …”
    Get full text
    Article
  7. 347

    A Design for an Internet Router with a Digital Optical Data Plane by Joe Touch, Joseph Bannister, Stephen Suryaputra, Alan E. Willner

    Published 2017-02-01
    “…This paper presents a complete design for an optical Internet router based on the component steps required for Internet protocol (IP) packet forwarding. Implementations of hop count decrement and header matching are integrated with a simulation-based approach to variable-length packet traffic merging that avoids recirculation, demonstrating an approach for an all-optical data plane. …”
    Get full text
    Article
  8. 348

    Building Model for the University of Mosul Computer Network Using OPNET Simulator by Modhar Modhar A. Hammoudi

    Published 2013-04-01
    “…These applications were FTP (File Transfer Protocol), HTTP (Hyper Text Transfer Protocol) and VoIP (Voice over Internet Protocol). The results showed that the proposed model had a positive efficiency on designing and managing the targeted network and can be used to view the data flow in it. …”
    Get full text
    Article
  9. 349

    Solving MTU Mismatch and Broadcast Overhead of NDN over Link-layer Networks by Thongchai Chuachan, Karim Djemame, Somnuk Puangpronpitag

    Published 2020-03-01
    “…In particular, NDN over link-layer networks would cut off the overheads of Transmission Control Protocol/Internet Protocol (TCP/IP), and enhance the efficiency of data distribution. …”
    Get full text
    Article
  10. 350

    Technology that Touches Lives: Teleconsultation to Benefit Persons with Upper Limb Loss by Lynsay R. Whelan, Nathan Wagner

    Published 2011-12-01
    “… This article describes how expert prosthetists and occupational therapists at Touch Bionics, a manufacturer of advanced upper limb prosthetic devices, employ Voice over the Internet Protocol (VoIP) videoconferencing software telehealth technologies to engage in remote consultation with users of prosthetic devices and/or their local practitioners. …”
    Get full text
    Article
  11. 351

    An Appropriate Traffic Routing Scheme for Node-to-Node Communications in LEO Satellite Network Using Hybrid Mesh Topology by Natiq Abdullah Ali Al-Shammary

    Published 2008-06-01
    “…Some of themare based on the Internet Protocol (IP), the Asynchronous Transfer Mode (ATM) switching,and the Routing Sets (RS).This paper will introduce an improving for the new packet routing mechanism overinter-connected satellite networks that is the Minimum Flow Maximum Residual (MFMR)algorithm that will be based on RS concept and will give simulation results of a certainscenario. …”
    Get full text
    Article
  12. 352

    Nonlinear remote monitoring system of manipulator based on network communication technology by Liu Qing, Peng Liye, Shang Kang

    Published 2023-01-01
    “…In this article, in the Visual C++ environment, the transmission control protocol/internet protocol technology is used to build a remote monitoring system for the robotic arm, and it mainly realizes the function of the robotic arm running according to the trajectory in the remote. …”
    Get full text
    Article
  13. 353

    CONGESTION CONTROL PADA JARINGAN KOMPUTER BERBASIS MULTI PROTOCOL LABEL SWITCHING (MPLS) by Ida Nurhaida, Ichsan Ichsan

    Published 2020-04-01
    “…Nilai-nilai yang didapatkan dari paramater tersebut kemudian dibandingkan dengan standar dari Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) dengan tujuan untuk mengetahui kualitas layanan pengiriman data pada jaringan MPLS ketika terjadi network congestion di lintasanya. …”
    Get full text
    Article
  14. 354

    An Optimal Rejuvenation Strategy for Increasing Service Reliability of a VOIP System with Multiple Components by Vandana Gupta, Rahul Kumar

    Published 2017-12-01
    “…In this day and age Voice over Internet Protocol (VoIP) has turned out to be a revolutionary technology in the field of telecommunication. …”
    Get full text
    Article
  15. 355

    An Early Fire Detection Algorithm Using IP Cameras by Hector Perez-Meana, Gabriel Sanchez-Perez, Luis Rojas-Cardenas, Karina Toscano-Medina, Leonardo Millan-Garcia, Mariko Nakano

    Published 2012-05-01
    “…In this paper we propose an algorithm to detect the presence of smoke using video sequences captured by Internet Protocol (IP) cameras, in which important features of smoke, such as color, motion and growth properties are employed. …”
    Get full text
    Article
  16. 356

    Encryption VoIP based on Generated Biometric Key for RC4 Algorithm by Raya W. Abd Aljabar, Nidaa F. Hassan

    Published 2021-03-01
    “…Voice over Internet Protocol (VoIP) calls are susceptible to interfere at many points by many attackers, thus encryption considered an important part in keeping VoIP. …”
    Get full text
    Article
  17. 357

    The role of National Strategies in maintaining Competitive Edge in Information and Communication Technologies by Ciprian Popoviciu, Patrick Grossetete

    Published 2006-12-01
    “…This paper examines the economical impact of IPv6, Internet Protocol's next generation. Technically, IPv6 represents an upgrade, an evolution that offers the resources necessary for deeper and wider market penetration of the IP technology, to support the needs of a global economy, to build new products and new services. …”
    Get full text
    Article
  18. 358

    Mechanism to prevent the abuse of IPv6 fragmentation in OpenFlow networks. by Ayman Al-Ani, Mohammed Anbar, Shams A Laghari, Ahmed K Al-Ani

    Published 2020-01-01
    “…However, the firewall provided by OpenFlow suffers from Internet protocol version 6 (IPv6) fragmentation, which can be used to bypass the OpenFlow firewall. …”
    Get full text
    Article
  19. 359

    Variability and Performance of Short to Long-Range Single Baseline RTK GNSS Positioning in Indonesia by Gumilar Irwan, Bramanto Brian, Rahman Fuad F., Hermawan I Made D. A.

    Published 2019-01-01
    “…This method uses Ultra High Frequency (UHF) radio to transmit the correction data, however, due to gain and power issues, Networked Transport of RTCM via Internet Protocol (RTCM) is used to transmit the correction data for a longer baseline. …”
    Get full text
    Article
  20. 360

    Application of Grounded Theory in Determining Required Elements for IPv6 Risk Assessment Equation by Rosli Athirah, Mat Taib Abidah, Wan Ali Wan Nor Ashiqin, Hamid Ros Syamsul

    Published 2018-01-01
    “…The deployment of Internet Protocol version 6 (IPv6) has raised security concerns among the network administrators. …”
    Get full text
    Article