Spelling suggestions: "subject:"bnetwork aprotocol"" "subject:"bnetwork 2protocol""
11 |
Secure Instant Messaging : the Jabber protocolAlmanei, Saleh 03 June 2003 (has links)
Instant Messaging (IM) has grown rapidly among network users. It has even
become a very important tool for the industry around the world. It is used in scheduling
meetings, exchanging business information and clients information, and so on. Instant
Messaging has been developed by private sectors or providers such as America Online
Instant Messenger (AIM), MSN, and Yahoo; however, in 1998 a new protocol has seen
the light as an open source Instant Messaging protocol and had the name of Jabber and
thanks to Jeremie Miller the founder of the Jabber protocol.
The project gathered wide public attention when it was discussed on the popular
developer discussion website Slashdot in January 1999. In May 2000, the core Jabber
protocols were released as open source reference server and it have not been changed to
this day. Jabber uses client-server architecture, not a direct peer-to-peer architecture
as some other messaging systems do. It is actually an Extensible Markup Language
(XML) messaging protocol. It relies on XML document format in every aspect of the
communication. [1]
Jabber Protocol have gone a long way to be one of the most attractive protocol
because of its open source and extensibility. Anyone can build or extend the jabber
protocol functionality without actually modifying the core protocol and still maintain
interoperability with other IM clients such as Yahoo and MSN. Moreover, as the usage of
Jabber Instant Messaging technology increases, the need for information protection in the
Jabber messaging medium also increases. This thesis will explore the Jabber protocol
and the ability to secure a Jabber based communication over the network using third
party cryptographic libraries. / Graduation date: 2003
|
12 |
TCP-Carson a loss-event based adaptive AIMD algorithm for long-lived flows.Kannan, Hariharan. January 2002 (has links)
Thesis (M.S.)--Worcester Polytechnic Institute. / Keywords: Loss; TFRC; AIMD; TCP. Includes bibliographical references (p. 147-155).
|
13 |
Secure wireless handoff /Nafarrete, Romelo B. Valverde, Lionel J. January 2003 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2003. / Thesis advisor(s): George W. Dinolt, Gurminder Singh. Includes bibliographical references (p. 75-78). Also available online.
|
14 |
A quantitative study of musical instrument digital interface (MIDI) over Internet Protocol (IP) protocolsWilliams, James Pate, January 2005 (has links) (PDF)
Thesis (Ph.D.)--Auburn University, 2005. / Abstract. Vita. Includes bibliographic references (ℓ. 98-99)
|
15 |
Enhanced mechanisms for explicit congestion notification in TCP/IP networks /Akujobi, Frank January 1900 (has links)
Thesis (M.App.Sc.) - Carleton University, 2003. / Includes bibliographical references (p. 90-92). Also available in electronic format on the Internet.
|
16 |
Hybrid token-CDMA MAC protocol for wireless networks /Liu, Yi-Sheng. January 2009 (has links)
Thesis (Ph.D.)-University of KwaZulu-Natal, Durban, 2009. / Full text also available online. Scroll down for electronic link.
|
17 |
Network tomography based on flow level measurementsArifler, Dogu. Evans, Brian L. De Veciana, Gustavo A., January 2004 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2004. / Supervisors: Brian L. Evans and Gustavo de Veciana. Vita. Includes bibliographical references.
|
18 |
Reliable content delivery using persistent data sessions in a highly mobile environmentPantoleon, Periklis K. 03 1900 (has links)
Approved for public release; distribution is unlimited / Special Forces are crucial in specific military operations. They usually operate in hostile territory where communications are difficult to establish and preserve, since the operations are often carried out in a remote environment and the communications need to be highly mobile. The delivery of information about the geographical parameters of the area can be crucial for the completion of their mission. But in that highly mobile environment, the connectivity of the established wireless networks (LANs) can be unstable and intermittently unavailable. Existing content transfer protocols are not adaptive to volatile network connectivity. If a physical connection is lost, any information or part of a file already retrieved is discarded and the same information must be retransmitted again after the reestablishment of the lost session. The intention of this Thesis is to develop a protocol in the application layer that preserves the already transmitted part of the file, and when the session is reestablished, the information server can continue sending the rest of the file to the requesting host. Further, if the same content is available from another server through a better route, the new server should be able to continue to serve the content, starting from where the session with the previous server ended. / Lieutenant, Hellenic Navy
|
19 |
API development for persistent data sessions support /Pailom, Chayutra. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2005. / Thesis Advisor(s): Su Wen, Arijit Das. Includes bibliographical references (p. 149 p.). Also available online.
|
20 |
Transparent TCP-to-SCTP translation shim layerBickhart, Ryan W. January 2005 (has links)
Thesis (M.S.)--University of Delaware, 2005. / Principal faculty adviser: Paul D. Amer, Dept. of Computer & Information Sciences. Includes bibliographical references.
|
Page generated in 0.0348 seconds