Showing 61 - 80 results of 93 for search '"User Datagram Protocol"', query time: 0.09s Refine Results
  1. 61

    Generation and collection of data for normal and conflicting flows in software defined network flow table by Khairi, Mutaz Hamed Hussien, S. Ariffin, Sharifah H., Abdul Latiff, N. M., Mohamad Yusof, Kamaludin

    Published 2021
    “…In this article, throughput is used as a performance metric to evaluate the impact of flow conflict on two protocols, transmission control protocol (TCP) and the user datagram protocol (UDP). During the simulation of the SDN OpenFlow network, the metrics are tested using MININET. …”
    Get full text
    Article
  2. 62

    Improving network performance by enabling explicit congestion notification (ECN) in SCTP control chunks by Mohamad Tahir, Hatim, Md Said, Abas, Elhalabi, Mohammed J. M., Puteh, Nurnasran, Othman, Azliza, Muhd Zain, Nurzaid, Md Dahalin, Zulkhairi, Ismail, Muhammad Hafiz, Mohd Zaini, Khuzairi, Hussin, Mohd Zabidin

    Published 2011
    “…The need for a reliable transmission protocol that can cover the Transport Control Protocol (TCP) and User Datagram Protocol (UDP) has prompted the Internet Engineering Task Force (IETF) to define a new protocol called the Stream Control Transmission Protocol (SCTP).This paper proposes adding Explicit Congestion Notification (ECN) mechanism into SCTP chunks (INIT chunk, and INIT-ACK chunk) to reduce the delay of transferring important data during congestion as compared with the TCP and UDP protocols.This paper also discusses the details of adding ECN, and the reason for choosing Random Early Detection (RED). …”
    Book Section
  3. 63

    Intelligent throughput stabilizer for UDP-based rate-control communication system by Michiko Harayama, Noboru Miyagawa

    Published 2021-09-01
    “…We have studied a user datagram protocol (UDP) based rate-control communication system called the simultaneous multipath communication system (SMPC), which measures throughput by a group of packets at the destination node and feeds it back to the source node continuously. …”
    Get full text
    Article
  4. 64

    Processor-in-the-Loop Architecture Design and Experimental Validation for an Autonomous Racing Vehicle by Eugenio Tramacere, Sara Luciani, Stefano Feraco, Angelo Bonfitto, Nicola Amati

    Published 2021-08-01
    “…Both PIL architectures exploit User Datagram Protocol (UDP) protocol to properly communicate with a personal computer. …”
    Get full text
    Article
  5. 65

    Performance evaluation of communication networks for networked microgrids by Ola Ali, Ahmed Aghmadi, Osama A. Mohammed

    Published 2024-06-01
    “…Through the real-time simulation, the performance of the proposed communication network model was evaluated by employing two transmission protocols, User Datagram Protocol (UDP) and Transmission Control Protocol (TCP), to facilitate the data exchange between the MGCC and the local controllers in each MG while operating under different traffic loads. …”
    Get full text
    Article
  6. 66

    Counteracting UDP Flooding Attacks in SDN by Yung-Hao Tung, Hung-Chuan Wei, Yen-Wu Ti, Yao-Tung Tsou, Neetesh Saxena, Chia-Mu Yu

    Published 2020-08-01
    “…In particular, user-datagram-protocol (UDP) flooding attacks can be easily launched and cause serious packet-transmission delays, controller-performance loss, and even network shutdown. …”
    Get full text
    Article
  7. 67

    Simulation of Vehicular Bots-Based DDoS Attacks in Connected Vehicles Networks by Siti Fatimah Abdul Razak, Ku Yee Fang, Noor Hisham Kamis, Anang Hudaya Muhammad Amin, Sumendra Yogarayan

    Published 2023-12-01
    “…The compromised nodes are known as botnets, which will constantly flood the target nodes with User Datagram Protocol (UDP) packets, disrupting the target nodes data flow and operation. …”
    Get full text
    Article
  8. 68

    Drone Elevation Control Based on Python-Unity Integrated Framework for Reinforcement Learning Applications by Mahmoud Abdelkader Bashery Abbass, Hyun-Soo Kang

    Published 2023-03-01
    “…This paper presents an integrated RL framework, based on Python–Unity interaction, to demonstrate the ability to create a new RL platform tool, based on making a stable user datagram protocol (UDP) communication between the RL agent algorithm (developed using the Python programing language as a server), and the simulation environment (created using the Unity simulation software as a client). …”
    Get full text
    Article
  9. 69

    Machine Learning Approach Equipped with Neighbourhood Component Analysis for DDoS Attack Detection in Software-Defined Networking by Özgür Tonkal, Hüseyin Polat, Erdal Başaran, Zafer Cömert, Ramazan Kocaoğlu

    Published 2021-05-01
    “…The dataset consists of Transmission Control Protocol (TCP), User Datagram Protocol (UDP), and Internet Control Message Protocol (ICMP) normal and attack traffics. …”
    Get full text
    Article
  10. 70

    Improving the Effciency of a Decentralized Tasking Algorithm for UAV Teams with Asynchronous Communications by Johnson, Luke B., Ponda, Sameera S., Choi, Han-lim, How, Jonathan P.

    Published 2013
    “…A real-time soft- ware implementation using multiple PCs communicating through the user datagram protocol (UDP) validates the proposed algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 71

    Elderly assisted living system by Yeo, Kai Sen

    Published 2014
    “…MATLAB will interact with VPython through the User Datagram Protocol (UDP) socket. The data points that are the coordinates of the position of the tag will be sent over by MATLAB to VPython. …”
    Get full text
    Final Year Project (FYP)
  12. 72

    An optimized aggregate marker algorithm for bandwidth fairness improvement in classifying traffic networks by Al-Kharasani, Ameen Mohammed Abdulkarem, Othman, Mohamed, Abdullah, Azizol, Kweh, Yeah Lun

    Published 2016
    “…This is achieved through separating marker TCP and User Datagram Protocol (UDP) and extending the marking probability for injecting more green and yellow traffic into the network. …”
    Get full text
    Article
  13. 73

    Protecting DNS from reflection amplification attacks using distributed defense scheme by Ahmed, Dana Hasan

    Published 2017
    “…It relies on User Datagram Protocol (UDP) to transport its data and uses IP in the network layer protocol. …”
    Get full text
    Thesis
  14. 74

    Efficient authentication mechanism for defending against reflection-based attacks on domain name system by Hasan, Dana, Hama Amin, Rebeen R., Hussin, Masnida

    Published 2020
    “…It mostly depends on the User Datagram Protocol (UDP) as the transport protocol, which is a connectionless protocol with no built-in authentication mechanism. …”
    Get full text
    Article
  15. 75

    Transport protocol performance for multi-hop transmission in wireless sensor network (WSN) by Yunus, F., Ariffin, S. H. S., Yusof, S. K. B. S., Ismail, N. S. N., Fisal, N.

    Published 2014
    “…The analysis result highlights the comparison of standard transport protocols, namely User Datagram Protocol (UDP), Transport Control Protocol (TCP), and Stream Control Transmission Protocol (SCTP). …”
    Book Section
  16. 76

    Enhancing DCCP congestion control mechanism for long delay link by Awang Nor, Shahrudin, Hassan, Suhaidi, Ghazali, Osman, Omar, Mohd. Hasbullah

    Published 2012
    “…Most of the multimedia applications use the User Datagram Protocol (UDP) as a transport layer protocol because it is suitable for the delivery of multimedia data over the Internet.However, the use of UDP could endanger the stability of the network because there is no congestion control applied.To a certain extent, the network can collapse if too many applications deliberately use this protocol.Subsequently, instead of using the UDP, the applications have choices to use the Datagram Congestion Control Protocol (DCCP), which has a built-in congestion control that can provide a better network.Nevertheless, the congestion control mechanism in the Congestion Control Identifier (CCID)-2 TCP-like can cause problems when delivering multimedia data over a long delay link.To alleviate the problems, such as longer time taken for achieving maximum throughput, and throughput fluctuation during a congestion avoidance phase, two approaches have been used, i.e. setting of an appropriate slow-start threshold value and adjusting congestion window during a congestion avoidance phase.…”
    Get full text
    Conference or Workshop Item
  17. 77

    Performance evaluation of TCP, UDP and DCCP traffic over 4G network by Kamil, Wisam Abduladheem, Awang Nor, Shahrudin, Alubady, Raaid

    Published 2015
    “…Among the reasons are that the 4G’s transfer rate is higher and it supports all multimedia functions.Besides, its’ supports for wide geographical locus makes wireless technology gets more advanced.The essential goal of 4G is to enable voice-based communication being implemented endlessly.This study tries to evaluate if the old protocols suit with this new technology.And which one has the best performance and which one has the greatest effect on throughput, delay and packet loss.The aforementioned questions are crucial in the performance evaluation of the most famous protocols (particularly User Datagram Protocol (UDP), Transmission Control Protocol (TCP) and Datagram Congestion Control Protocol (DCCP)) within the 4G environment.Through the Network Simulation-3 (NS3), the performance of transporting video stream including throughput, delay, packet loss and packet delivery ratio are analyzed at the base station through UDP, TCP and DCCP protocols over 4G’s Long Term Evaluation (LTE) technology.The results show that DCCP has better throughput and lesser delay, but at the same time it has more packet loss than UDP and TCP. …”
    Get full text
    Article
  18. 78

    Evaluation Method of Datagram Congestion Control Protocol Over 4G Networks (S/O 12730) by Awang Nor, Shahrudin, Hassan, Suhaidi, Omar, Mohd Hasbullah, Katuk, Norliza, Che Mohamed Arif, Ahmad Suki

    Published 2021
    “…DCCP can be considered as a new transport protocol, which is delay-sensitive and error-insensitive, and like User Datagram Protocol (UDP), it is suitable as a transport protocol for multimedia data such as audio and video. …”
    Get full text
    Monograph
  19. 79

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Monograph
  20. 80

    Efficient Authentication Mechanism For Defending Against Reflection-Based Attacks on Domain Name System by Dana Hasan, Rebeen R. Hama Amin, Masnida Hussin

    Published 2020-06-01
    “…It mostly depends on the User Datagram Protocol (UDP) as the transport protocol, which is a connectionless protocol with no built-in authentication mechanism. …”
    Get full text
    Article