Search
Search Results
-
Development and performance evaluation of EQUIC protocol
In this paper, we have proposed a modification in existing QUIC protocol named Enhanced QUIC (EQUIC) to control the congestion in the network when...
-
A Study on MQTT Protocol Architecture and Security Aspects Within IoT Paradigm
In the Internet of Things (IoT) paradigm, boundless solutions have been designed and implemented to do effective and secure communication among it’s... -
Protocol Security in 6th Generation (6G) Networks
6th generation networks are expected to be there most probably in year 2030. It is believed that their existence will enable the technology of... -
An Improved Light Weight Countermeasure Scheme to Efficiently Mitigate TCP Attacks in SDN
The design of Software Defined Networking (SDN) will enable the flexible control of network traffic and handle the large amount of data traffic on... -
Exploiting Vulnerabilities in the SCADA Modbus Protocol: An ICT-Reliant Perspective
Industrial plants like power, gas, water, and transport are controlled remotely and managed by a protocol like Modbus-TCP which has a significant... -
Angriffe auf TCP/IP-Netzwerkprotokolle
Dieses Kapitel befasst sich mit Angriffen auf die Netzwerkprotokolle der verschiedenen Schichten des TCP/IP-Modells. Beginnend mit der... -
Movie Synchronization System Using Web Socket Based Protocol
On a global scale, the Web is a platform that allows universal reach via a variety of communication channels. Whenever there is a newly developed... -
Teaching of TCP Fundamental Operations Using a Digital Tool
Today, digital tools play an important role in education. These tools are a support to strengthen the knowledge of students while for teachers it can... -
4D-MAP: Multipath Adaptive Packet Scheduling for Live Streaming over QUIC
In recent years, live streaming has become a popular application, which uses TCP as its primary transport protocol. Quick UDP Internet Connections...
-
CPSOCKS: Cross-Platform Privacy Overlay Adapter Based on SOCKSv5 Protocol
In figures, the cybersecurity landscape is one of the most across-the-border impactable trends in the last years, especially after the begging of the... -
Evaluation of the Angara Interconnect Prototype TCP/IP Software Stack: Implementation, Basic Tests and BeeGFS Benchmarks
In the paper, we present a prototype implementation of the TCP/IP software stack over the Angara high performance interconnect. Our approach is to... -
Gria: an efficient deterministic concurrency control protocol
Deterministic databases are able to reduce coordination costs in a replication. This property has fostered a significant interest in the design of...
-
A secure architecture for TCP/UDP-based cloud communications
Cloud communication is an intrinsic aspect of cloud architecture. It is an internet-based communication that enables access to millions of cloud...
-
An intelligent long-lived TCP based on real-time traffic regulation
Transmission control protocol (TCP) transaction is one of the chief protocols of Internet protocols. It is divided into two categories of data flow....
-
A novel scheduling algorithm development and analysis for heterogeneous IoT protocol control system to achieve SCADA optimization: a next generation post covid solution
In this paper, a new intelligent message scheduling algorithm is designed for complex Internet of Things (IoT) systems where machine to machine (M2M)...
-
A new DEVS-based network simulator for online routing protocol education
Simulation continues to be highly attractive and indispensable for studying networked systems. There remains the need for simulators that can support...
-
Netzwerkkommunikation
Für die Kommunikation in Rechnernetzen auf der Basis des Protokolls TCP/IP (Transmission Control Protocol/Internet Protocol) stellt das Paket... -
An application layer technique to overcome TCP incast in data center network using delayed server response
Applications running in data center networks exhibits barrier-synchronized many-to-one communication pattern. Under this pattern, multiple workers...
-
An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations
Owing to the emergence and rapid advances of new-generation information and digitalization technologies, the concept of model-driven digital twin has...
-
Design and Analysis of Energy Efficient Service Discovery Routing Protocol in MANETs
Wireless sensor network (WSN) enables physical environment tracking and creation of timely action based on sensor data. The primary goal of this type...