-
1
Reliable User Datagram Protocol as a Solution to Latencies in Network Games
Published 2018-11-01“…Thus, the reliable user datagram protocol (RUDP)-based communication system design has been considered in this research instead of transmission control protocol (TCP) or user datagram protocol (UDP)-based systems. …”
Get full text
Article -
2
Performance Comparison of Transmission Control Protocol and User Datagram Protocol over Wireless Networks
Published 2015“…This study measures the performance of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) over WiFi. Various network-related issues such as packet loss, error control, and reliability are measured. …”
Get full text
Conference or Workshop Item -
3
Comparison study of transmission control protocol and user datagram protocol behavior over multi-protocol label switching networks in case of failures.
Published 2009“…Approach: For that reason, many studies have been conducted to keep the high reliability and survivability of the MPLS networks. Unlike User Datagram Protocol (UDP), Transmission Control Protocol does not perform well in case of like-failure of MPLS networks because of its inability to distinguish packet loss due to link-failure. …”
Get full text
Article -
4
Design and implementation of gigabit ethernet transmission system based on Zynq-7000
Published 2021-02-01Subjects: Get full text
Article -
5
Preliminary Results of the Optimized Network Interface for Long Distance Haptic Teleoperation
Published 2023-04-01Subjects: Get full text
Article -
6
Retracted: Anomaly detection with ensemble empirical mode decomposition and approximate entropy for quick user datagram protocol internet connection‐based distributed Blockchain systems
Published 2023-08-01“…Abstract Retraction: [Yuanlong Cao, Keyang Gu, Junyi Wu, Xiang Zou, Lei Tao, Xin Huang, Changgen Jiang, Anomaly detection with ensemble empirical mode decomposition and approximate entropy for quick user datagram protocol internet connection‐based distributed Blockchain systems, IET Software 2023 (https://doi.org/10.1049/sfw2.12096)]. …”
Get full text
Article -
7
Enabling Reliable UAV Control by Utilizing Multiple Protocols and Paths for Transmitting Duplicated Control Packets
Published 2021-05-01Subjects: Get full text
Article -
8
Design and Implementation of Software-Based Simulator for Performance Evaluation of Transmission Protocol
Published 2014-03-01“…It enabled transmission control protocol (TCP) and user datagram protocol (UDP) transmission and reception regardless of the number of times of transmission and reception. …”
Get full text
Article -
9
Real Time Network FileS Transfer Protocol (RTFTP)
Published 2013-02-01“…The suggested system depends on the network main component (socket) and uses the User Datagram Protocol (UDP) internet protocol. The system has the ability to gather information through special channel (port) about the used directory. …”
Get full text
Article -
10
Integer codes correcting single errors and double adjacent errors
Published 2023-10-01“…Abstract The user datagram protocol is the most widely used protocol for streaming multimedia data over the Internet. …”
Get full text
Article -
11
Cooperative Obstacle Avoidance for Multiple UAVs Using Spline_VO Method
Published 2022-03-01“…In the proposed algorithm, the useful information of UAVs is screened out by a Heartbeat information filtering mechanism and fused by the user datagram protocol (UDP) communication method, which improves communication performance among UAVs. …”
Get full text
Article -
12
Metode-Metode Optimasi Memcached sebagai NoSQL Key-value Memory Cache
Published 2019-08-01“…Some methods that can be used are clustering are; Memory partitioning, Graphic Processor Unit hash, User Datagram Protocol (UDP) transmission, Solid State Drive Hybird Memory and Memcached Hadoop distributed File System (HDFS) Keywords : memcached, optimization, web-app, overhead, latency…”
Get full text
Article -
13
Impact of CoAP and MQTT on NB-IoT System Performance
Published 2018-12-01“…The choice of transport, Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), on the other hand, has an impact on the Internet of Things (IoT) application level performance, especially over a wireless medium. …”
Get full text
Article -
14
FA-AODV: Flooding Attacks Detection Based Ad Hoc On-Demand Distance Vector Routing Protocol for VANET
Published 2022-12-01“…A malicious node could penetrate into the IP addresses on a Flood Attack based User Datagram Protocol (UDP) to breakdown the data communication between two vehicles. …”
Get full text
Article -
15
Network anomaly detection using deep learning techniques
Published 2022-06-01“…The authors' approach divides network traffic data into transmission control protocol (TCP), user datagram protocol (UDP), and OTHER protocol categories in the first phase, then each category is treated independently. …”
Get full text
Article -
16
Development of an intrusion detection system and the deployment of a honey net
Published 2020“…In this project, Snort will be configured to detect floods of transmission control protocol and user datagram protocol requests. The accurate logging and detection of these distributed denial of service attacks launched by a Low Orbit Ion Cannon will implicate the successful application of Snort. …”
Get full text
Final Year Project (FYP) -
17
The Illustrated network : How TCP/IP Works in a Modern Network /
Published 2017“…Part I: Networking basics --Protocols and layers --TCP/IP protocols and devices --Network link technologies --Packet optical networks and forward error correction --Part II: Core protocols --IPv4 and IPv6 addressing --Address resolution protocol --IPv4 and IPv6 headers --Internet control message protocol --Routing --Forwarding IP Packets --User datagram protocol --Transmission control protocol --Multiplexing and sockets --Part III: Routing and routing protocols --Routing and peering --IGPs: RIP, OSPF, and IS-IS --Border gateway protocol --Expanded uses for BGP --Multicast --Part IV: Switching to VPNs --MPLS and IP switching --MPLS-based virtual private networks --EVPN and VXLAN --Part V: Application level --Dynamic host configuration protocol --The domain name system --File transfer protocol --SMTP and email --Hypertext transfer protocol --Securing sockets with SSL --Part VI: Network management --Simple network management protocol --Cloud, SDN, and NFV --Part VII: Security --Secure shell (remote access) --Network address translation --Firewalls --IP security --Part VIII: Media --Voice over internet protocol…”
-
18
Performance Analysis Of TCP And UDP Over Mobile Ad Hoc Network
Published 2016-07-01“…Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). The work analyzes various parameters such as bandwidth, throughput, jitter and out of order delivery etc. …”
Get full text
Article -
19
Enhancing River Monitoring Embedded System using Time Redundancy Fault Tolerance to Resolve Transient Sensor Fault
Published 2023-04-01“…At the river monitoring point, data is sent using the UDP (User Datagram Protocol) protocol that previous studies have used. …”
Get full text
Article -
20
Development of an Adaptive File Transfer Protocol (AFTP )
Published 2011-08-01“…This paper is concerned on the User Datagram Protocol (UDP). The UDP is mainly used to transfer messages. …”
Get full text
Article