Showing 201 - 220 results of 248 for search '"Transmission Control Protocol"', query time: 0.15s Refine Results
  1. 201

    Machine Learning Approach Equipped with Neighbourhood Component Analysis for DDoS Attack Detection in Software-Defined Networking by Özgür Tonkal, Hüseyin Polat, Erdal Başaran, Zafer Cömert, Ramazan Kocaoğlu

    Published 2021-05-01
    “…The dataset consists of Transmission Control Protocol (TCP), User Datagram Protocol (UDP), and Internet Control Message Protocol (ICMP) normal and attack traffics. …”
    Get full text
    Article
  2. 202

    Performance evaluation of route optimization management of producer mobility in information-centric networking by Xian, Wee Low, Leau, Yu-Beng, Zhiwei Yan, Yong, Jin Park, Mohammed Anba

    Published 2022
    “…This architecture is expected to solve many issues that are currently faced by transmission control protocol/internet protocol (TCP/IP) architecture, such as scalability, robustness, mobility, security, and etcetera. …”
    Get full text
    Get full text
    Article
  3. 203

    An optimized aggregate marker algorithm for bandwidth fairness improvement in classifying traffic networks by Al-Kharasani, Ameen Mohammed Abdulkarem, Othman, Mohamed, Abdullah, Azizol, Kweh, Yeah Lun

    Published 2016
    “…Additionally, the assured service is designed for applications relying on the Transmission Control Protocol (TCP). This article analyses and evaluates a new time sliding window traffic marker algorithm called the Optimized time sliding window Three Colour Marker (OtswTCM). …”
    Get full text
    Article
  4. 204

    Performance evaluation of TCP, UDP and DCCP traffic over 4G network by Kamil, Wisam Abduladheem, Awang Nor, Shahrudin, Alubady, Raaid

    Published 2015
    “…Among the reasons are that the 4G’s transfer rate is higher and it supports all multimedia functions.Besides, its’ supports for wide geographical locus makes wireless technology gets more advanced.The essential goal of 4G is to enable voice-based communication being implemented endlessly.This study tries to evaluate if the old protocols suit with this new technology.And which one has the best performance and which one has the greatest effect on throughput, delay and packet loss.The aforementioned questions are crucial in the performance evaluation of the most famous protocols (particularly User Datagram Protocol (UDP), Transmission Control Protocol (TCP) and Datagram Congestion Control Protocol (DCCP)) within the 4G environment.Through the Network Simulation-3 (NS3), the performance of transporting video stream including throughput, delay, packet loss and packet delivery ratio are analyzed at the base station through UDP, TCP and DCCP protocols over 4G’s Long Term Evaluation (LTE) technology.The results show that DCCP has better throughput and lesser delay, but at the same time it has more packet loss than UDP and TCP. …”
    Get full text
    Article
  5. 205

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Monograph
  6. 206

    A Multifunctional Smart Meter Using ANN-PSO Flux Estimation and Harmonic Active Compensation with Fuzzy Voltage Regulation by Edson A. Batista, Moacyr A. G. de Brito, João C. Siqueira, Jeandro C. Dias, Raphael C. Gomez, Maurilio F. R. Catharino, Matheus B. Gomes

    Published 2021-06-01
    “…This paper aims to present the analysis and development of a complete electronic smart meter that is able to perform four-quadrant measurements, act as a three-phase shunt active power filter (APF), and control three-phase induction motors by stator flux estimation. A transmission control protocol together with Internet protocol (TCP/IP) communication protocol for the remote access of measurement data is embedded into the application to securely transmit reliable information. …”
    Get full text
    Article
  7. 207

    Intelligent Multi-Path TCP Congestion Control for video streaming in Internet of Deep Space Things communication by Taeyun Ha, Arooj Masood, Woongsoo Na, Sungrae Cho

    Published 2023-10-01
    “…Ensuring reliable communications in IoDST requires Transmission Control Protocol (TCP) layer functionalities. However, current TCP Congestion Control (CC) protocols provide poor performance in IoDST communications primarily owing to the dependence on pre-defined rules to determine the transmission rate in a single path TCP flow. …”
    Get full text
    Article
  8. 208

    Design of a Novel Telerehabilitation System with a Force-Sensing Mechanism by Songyuan Zhang, Shuxiang Guo, Baofeng Gao, Hideyuki Hirata, Hidenori Ishihara

    Published 2015-05-01
    “…Finally, we successfully performed a system performance test for passive training with transmission control protocol/internet protocol communication.…”
    Get full text
    Article
  9. 209

    A Complete Affordable Control System for Remote Astronomical Observing Accompanied by an Intelligent Controller by Mohamed Ismail, S. H. Elbanna, Mahmoud A. El-Dabah, Farag Elnagahy

    Published 2022-01-01
    “…This integrated control system is based on embedded systems, internet of things (IoT) technology, row packets communication procedure, and the Transmission Control Protocol (TCP) based on the Internet Protocol (IP). …”
    Get full text
    Article
  10. 210

    Interest flooding attack mitigation in a vehicular named data network by Muhammad Abdullah, Imran Raza, Tanveer Zia, Syed Asad Hussain

    Published 2021-04-01
    “…Contrary to the conventional transmission control protocol/internet protocol (TCP/IP) communication model, VNDN follows a data‐centric approach where the user is interested in ‘WHAT’ instead of ‘WHERE’. …”
    Get full text
    Article
  11. 211

    Designing a Smart Gateway for Data Fusion Implementation in a Distributed Electronic System Used in Automotive Industry by Mircea Rîșteiu, Remus Dobra, Alexandru Avram, Florin Samoilă, Georgeta Buică, Renato Rizzo, Dan Doru Micu

    Published 2021-06-01
    “…The embedded programming solutions offered us safe, reliable, and flexible data packet management results on both communication systems (Transmission Control Protocol/Internet Provider (TCP/IP) and Controller Area Network (CAN) Bus) on the Electronic Control Unit (ECU) tested for diesel, high-pressure common rail engines. …”
    Get full text
    Article
  12. 212

    Performance Analysis of a Novel TCP Protocol Algorithm Adapted to Wireless Networks by Gonzalo Olmedo, Román Lara-Cueva, Diego Martínez, Celso de Almeida

    Published 2020-06-01
    “…One of these protocols is Transmission Control Protocol (TCP), which controls the transmission bit rate in function of network congestion. …”
    Get full text
    Article
  13. 213

    A Comprehensive Overview of TCP Congestion Control in 5G Networks: Research Challenges and Future Perspectives by Josip Lorincz, Zvonimir Klarin, Julije Ožegović

    Published 2021-06-01
    “…In today’s data networks, the main protocol used to ensure reliable communications is the transmission control protocol (TCP). The TCP performance is largely determined by the used congestion control (CC) algorithm. …”
    Get full text
    Article
  14. 214

    BA-MPCUBIC: Bottleneck-Aware Multipath CUBIC for Multipath-TCP by Imtiaz Mahmud, Tabassum Lubna, Geon-Hwan Kim, You-Ze Cho

    Published 2021-09-01
    “…The Congestion Control Algorithm (CCA) in the Multipath Transmission Control Protocol (MPTCP) is fundamental to controlling the flow of data through multiple subflows (SF) simultaneously. …”
    Get full text
    Article
  15. 215

    Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking by Muteeb Bin Muzammil, Muhammad Bilal, Sahar Ajmal, Sandile C. Shongwe, Yazeed Y. Ghadi

    Published 2024-01-01
    “…The second addresses the sorts of attacks used by Man-In-The-Middle attacks and session hijacking on Transmission Control Protocol / Internet Protocol (TCP/IP). This demonstrates that Man-In-The-Middle attacks invade all layers and session hijacking attacks on only two, that is, the application and network layer. …”
    Get full text
    Article
  16. 216

    Multipath Transport Analysis Over Cellular and LEO Access for Aerial Vehicles by Aygun Baltaci, Kaushik Chavali, Mike Kosek, Nitinder Mohan, Dominic A. Schupke, Jorg Ott

    Published 2023-01-01
    “…In this work, we investigate the MP communications performance of cellular and Low-Earth-Orbit (LEO) satellite links with respect to the Quality-of-Service (QoS) requirements of RP operations. Using MP-Transmission Control Protocol (MPTCP) and MP-Datagram Congestion Control Protocol (MP-DCCP), we evaluate various transport layer configurations to efficiently orchestrate both links and to support the application requirements. …”
    Get full text
    Article
  17. 217

    Learning-Based Adaptive Sliding-Window RLNC for High Bandwidth-Delay Product Networks by Shahzad, Rashid Ali, Amir Haider, Hyung Seok Kim

    Published 2023-01-01
    “…In high bandwidth-delay product networks, however, the issue of integrating RLNC with transmission control protocol (TCP) flow and congestion control poses a significant challenge. …”
    Get full text
    Article
  18. 218

    تحسين جودة الخدمة لتطبيقات الزمن الحقيقي وغير الحقيقي عبر شبكة الانترنت by محمد حجازية

    Published 2018-01-01
    “…تُصنف الخدمات التي يطلبها المستخدمون عبر شبكة الانترنت إلى نوعين أساسيين، خدمات تعمل بالزمن الحقيقي مثل تطبيقات الفيديو والصوت بالزمن الحقيقي وهي تستخدم بروتوكول (UDP (Unit Datagram Protocol، وخدمات أخرى تعمل بالزمن غير الحقيقي مثل تطبيقات تصفح الويب (HTTP (Hiyber Text Transfer Protocol ونقل الملفات FTP (File Transfer Protocol) وتستخدم بروتوكول TCP( Transmission Control Protocol). يتم في هذا البحث دراسة وتحليل الخوارزميات التي تحسن جودة الخدمة لمختلف هذه التطبيقات، فمن أجل تطبيقات الزمن الحقيقي يتم استخدام قواعد الرتل التي تعطي أفضلية لهذه الخدمات وتحقق أقل تأخير زمني، أما من أجل تطبيقات الزمني غير الحقيقي فيتم دراسة خوارزميات التحكم بالازدحام التي تحقق أفضل أداء لعملية النقل الموثوق بوجود الازدحام عبر شبكة الانترنت. …”
    Get full text
    Article
  19. 219

    WPFD: Active User-Side Detection of Evil Twins by Fu-Hau Hsu, Min-Hao Wu, Yan-Ling Hwang, Chia-Hao Lee, Chuan-Sheng Wang, Ting-Cheng Chang

    Published 2022-08-01
    “…The packet forwarding behavior generated by the evil twin and the TCP/IP (Transmission Control Protocol/Internet Protocol) protocol are both used by the WPFD. …”
    Get full text
    Article
  20. 220

    RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks by Zakwan AlArnaout, Nour Mostafa, Samer Alabed, Wael Hosny Fouad Aly, Ahmed Shdefat

    Published 2022-12-01
    “…This type of attack uses spoofed Internet Protocol (IP) addresses for SYN packets by exploiting the weakness in Transmission Control Protocol (TCP) 3-Way handshake used by the TCP/IP suite of protocols, which make the web servers unreachable for legitimate users or even worse, it might lead to server crash. …”
    Get full text
    Article