Showing 1 - 20 results of 93 for search '"User Datagram Protocol"', query time: 2.21s Refine Results
  1. 1

    Reliable User Datagram Protocol as a Solution to Latencies in Network Games by Jun-Ho Huh

    Published 2018-11-01
    “…Thus, the reliable user datagram protocol (RUDP)-based communication system design has been considered in this research instead of transmission control protocol (TCP) or user datagram protocol (UDP)-based systems. …”
    Get full text
    Article
  2. 2

    Performance Comparison of Transmission Control Protocol and User Datagram Protocol over Wireless Networks by Mohammed Hasan, Ali, Mohamad Fadli, Zolkipli, Aws Naser, Jaber

    Published 2015
    “…This study measures the performance of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) over WiFi. Various network-related issues such as packet loss, error control, and reliability are measured. …”
    Get full text
    Conference or Workshop Item
  3. 3

    Comparison study of transmission control protocol and user datagram protocol behavior over multi-protocol label switching networks in case of failures. by Al-Radaei, Taha Ahmed, Ahmad Zulkarnain, Zuriati

    Published 2009
    “…Approach: For that reason, many studies have been conducted to keep the high reliability and survivability of the MPLS networks. Unlike User Datagram Protocol (UDP), Transmission Control Protocol does not perform well in case of like-failure of MPLS networks because of its inability to distinguish packet loss due to link-failure. …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Retracted: Anomaly detection with ensemble empirical mode decomposition and approximate entropy for quick user datagram protocol internet connection‐based distributed Blockchain systems by Yuanlong Cao, Keyang Gu, Junyi Wu, Xiang Zou, Lei Tao, Xin Huang, Changgen Jiang

    Published 2023-08-01
    “…Abstract Retraction: [Yuanlong Cao, Keyang Gu, Junyi Wu, Xiang Zou, Lei Tao, Xin Huang, Changgen Jiang, Anomaly detection with ensemble empirical mode decomposition and approximate entropy for quick user datagram protocol internet connection‐based distributed Blockchain systems, IET Software 2023 (https://doi.org/10.1049/sfw2.12096)]. …”
    Get full text
    Article
  7. 7
  8. 8

    Design and Implementation of Software-Based Simulator for Performance Evaluation of Transmission Protocol by Chang-Su Kim, Jong-Il Park, Hoe-Kyung Jung

    Published 2014-03-01
    “…It enabled transmission control protocol (TCP) and user datagram protocol (UDP) transmission and reception regardless of the number of times of transmission and reception. …”
    Get full text
    Article
  9. 9

    Real Time Network FileS Transfer Protocol (RTFTP) by Alaa Noori Mazher

    Published 2013-02-01
    “…The suggested system depends on the network main component (socket) and uses the User Datagram Protocol (UDP) internet protocol. The system has the ability to gather information through special channel (port) about the used directory. …”
    Get full text
    Article
  10. 10

    Integer codes correcting single errors and double adjacent errors by Miljan Miletic, Aleksandar Radonjic

    Published 2023-10-01
    “…Abstract The user datagram protocol is the most widely used protocol for streaming multimedia data over the Internet. …”
    Get full text
    Article
  11. 11

    Cooperative Obstacle Avoidance for Multiple UAVs Using Spline_VO Method by Mingzhu Peng, Wei Meng

    Published 2022-03-01
    “…In the proposed algorithm, the useful information of UAVs is screened out by a Heartbeat information filtering mechanism and fused by the user datagram protocol (UDP) communication method, which improves communication performance among UAVs. …”
    Get full text
    Article
  12. 12

    Metode-Metode Optimasi Memcached sebagai NoSQL Key-value Memory Cache by Mandahadi Kusuma

    Published 2019-08-01
    “…Some methods that can be used are clustering are; Memory partitioning, Graphic Processor Unit hash, User Datagram Protocol (UDP) transmission, Solid State Drive Hybird Memory and Memcached Hadoop distributed File System (HDFS) Keywords : memcached, optimization, web-app, overhead, latency…”
    Get full text
    Article
  13. 13

    Impact of CoAP and MQTT on NB-IoT System Performance by Anna Larmo, Antti Ratilainen, Juha Saarinen

    Published 2018-12-01
    “…The choice of transport, Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), on the other hand, has an impact on the Internet of Things (IoT) application level performance, especially over a wireless medium. …”
    Get full text
    Article
  14. 14

    FA-AODV: Flooding Attacks Detection Based Ad Hoc On-Demand Distance Vector Routing Protocol for VANET by Cemal Koçak, Buğra Alp Tosunoglu

    Published 2022-12-01
    “…A malicious node could penetrate into the IP addresses on a Flood Attack based User Datagram Protocol (UDP) to breakdown the data communication between two vehicles. …”
    Get full text
    Article
  15. 15

    Network anomaly detection using deep learning techniques by Mohammad Kazim Hooshmand, Doreswamy Hosahalli

    Published 2022-06-01
    “…The authors' approach divides network traffic data into transmission control protocol (TCP), user datagram protocol (UDP), and OTHER protocol categories in the first phase, then each category is treated independently. …”
    Get full text
    Article
  16. 16

    Development of an intrusion detection system and the deployment of a honey net by Liow, Fann Yee

    Published 2020
    “…In this project, Snort will be configured to detect floods of transmission control protocol and user datagram protocol requests. The accurate logging and detection of these distributed denial of service attacks launched by a Low Orbit Ion Cannon will implicate the successful application of Snort. …”
    Get full text
    Final Year Project (FYP)
  17. 17

    The Illustrated network : How TCP/IP Works in a Modern Network / by Goralski, Walter, author

    Published 2017
    “…Part I: Networking basics --Protocols and layers --TCP/IP protocols and devices --Network link technologies --Packet optical networks and forward error correction --Part II: Core protocols --IPv4 and IPv6 addressing --Address resolution protocol --IPv4 and IPv6 headers --Internet control message protocol --Routing --Forwarding IP Packets --User datagram protocol --Transmission control protocol --Multiplexing and sockets --Part III: Routing and routing protocols --Routing and peering --IGPs: RIP, OSPF, and IS-IS --Border gateway protocol --Expanded uses for BGP --Multicast --Part IV: Switching to VPNs --MPLS and IP switching --MPLS-based virtual private networks --EVPN and VXLAN --Part V: Application level --Dynamic host configuration protocol --The domain name system --File transfer protocol --SMTP and email --Hypertext transfer protocol --Securing sockets with SSL --Part VI: Network management --Simple network management protocol --Cloud, SDN, and NFV --Part VII: Security --Secure shell (remote access) --Network address translation --Firewalls --IP security --Part VIII: Media --Voice over internet protocol…”
  18. 18

    Performance Analysis Of TCP And UDP Over Mobile Ad Hoc Network by Kashif Laeeq, Noman Islam, Jalal Bhayo

    Published 2016-07-01
    “…Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). The work analyzes various parameters such as bandwidth, throughput, jitter and out of order delivery etc. …”
    Get full text
    Article
  19. 19

    Enhancing River Monitoring Embedded System using Time Redundancy Fault Tolerance to Resolve Transient Sensor Fault by Mochammad Hannats Hanafi Ichsan, Muhammad Adinura Julian Habibie, Wijaya Kurniawan

    Published 2023-04-01
    “…At the river monitoring point, data is sent using the UDP (User Datagram Protocol) protocol that previous studies have used. …”
    Get full text
    Article
  20. 20

    Development of an Adaptive File Transfer Protocol (AFTP ) by Alaa Noori Mazher, Alyaa Hussain Ali, Taif Sami Hassan

    Published 2011-08-01
    “…This paper is concerned on the User Datagram Protocol (UDP). The UDP is mainly used to transfer messages. …”
    Get full text
    Article