Spelling suggestions: "subject:"pcp/ip (computer network protocol)"" "subject:"pucp/ip (computer network protocol)""
51 |
An application for real-time control over the TCP/UDP/IP/ Ethernet protocol /Al-Hawari, Tarek Hamdan. January 2005 (has links)
Thesis (Ph. D.)--Lehigh University, 2005. / Includes vita. Includes bibliographical references (leaves 111-117).
|
52 |
A new TCP protocol based on end-to-end available bandwidth measurement /Wu, Chen. January 2005 (has links)
Thesis (M.Phil.)--Hong Kong University of Science and Technology, 2005. / Includes bibliographical references (leaves 86-90). Also available in electronic version.
|
53 |
TCP adaptation schemes in heterogeneous and ad hoc wireless networksLi, Zhi, January 2005 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2005. / Title proper from title frame. Also available in printed format.
|
54 |
An evaluation of realistic TCP traffic in satellite networksNarasimhan, Priya. January 2002 (has links)
Thesis (M.S.)--Ohio University, August, 2002. / Title from PDF t.p.
|
55 |
Multimedia streaming using multiple TCP connections /Tullimalli, Sunand. January 1900 (has links)
Thesis (M.S.)--Oregon State University, 2007. / Printout. Includes bibliographical references (leaves 62-63). Also available on the World Wide Web.
|
56 |
Modeling and analysis of stochastic self-similar processes and TCP/IP congestion control in high-speed computer communication networks /Alazemi, Hamed M. K. January 2000 (has links)
Thesis (Ph. D.)--University of Washington, 2000. / Vita. Includes bibliographical references (leaves 111-119).
|
57 |
Portable TCP/IP server designJolliffe, Robert Mark 25 August 2009 (has links)
There are a number of known architectural patterns for TCP/IP server design. I present a survey of design choices based on some of the most common of these patterns. I have demonstrated, with working code samples, that most of these architectural patterns are readily portable between UNIX and Windows NT platforms without necessarily incurring significant performance penalties. / Computing / M. Sc. (Computer Science)
|
58 |
Techniques and countermeasures of TCP/IP OS fingerprinting on Linux SystemsStopforth, Riaan. January 2007 (has links)
Port scanning is the first activity an attacker pursues when attempting to compromise a target system on a network. The aim is to gather information that will result in identifying one or more vulnerabilities in that system. For example, network ports that are open can reveal which applications and services are running on the system. How a port responds when probed with data can reveal which protocol the port utilises and can also reveal which implementation of that protocol is being employed. One of the most valuable pieces of information to be gained via scanning and probing techniques is the operating system that is installed on the target. This technique is called operating system fingerprinting. The purpose of this research is to alert computer users of the dangers of port scanning, probing, and operating system fingerprinting by exposing these techniques and advising the users on which preventative countermeasures to take against them. Analysis is performed on the Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Protocol (IPv4 and IPv6), and the Internet Control Message Protocol (ICMPv4 and ICMPv6). All the software used in this project is free and open source. The operating system used for testing is Linux (2.4 and 2.6 kernels). Scanning, probing, and detection techniques are investigated in the context of the Network Mapper and Xprobe2 tools. / Thesis (M.Sc. - Computer)-University of KwaZulu-Natal, Durban, 2007.
|
59 |
Reliable video transmission over internet.January 2000 (has links)
by Sze Ho Pong. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2000. / Includes bibliographical references (leaves 50-[53]). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Related Work --- p.3 / Chapter 1.2 --- Contributions of the Thesis --- p.3 / Chapter 1.3 --- Organization of the Thesis --- p.4 / Chapter 2 --- Background --- p.5 / Chapter 2.1 --- Best-effort Internet - The Lossy Network --- p.5 / Chapter 2.2 --- Effects of Packet Loss on Streamed Video --- p.7 / Chapter 2.3 --- Loss Recovery Schemes in Video Streaming --- p.8 / Chapter 3 --- Comparison of Two Packet-Loss Detection Schemes --- p.10 / Chapter 3.1 --- Gap Detection (GD) --- p.12 / Chapter 3.2 --- Time-Out (TO) Detection --- p.14 / Chapter 3.3 --- Mathematical Comparison --- p.17 / Chapter 4 --- The Combined Loss-Detection Algorithm --- p.21 / Chapter 4.1 --- System Architecture --- p.22 / Chapter 4.2 --- Loss Detection and Recovery --- p.23 / Chapter 4.2.1 --- Detecting Data Packet Losses Transmitted for First Time --- p.24 / Chapter 4.2.2 --- Detecting Losses of Retransmitted Packet --- p.28 / Chapter 4.3 --- Buffering Techniques --- p.32 / Chapter 4.3.1 --- Determining Packet-Loss Rate in Presentation --- p.33 / Chapter 4.4 --- Mapping Packet-Loss Rate to Degradation of Video Quality --- p.38 / Chapter 5 --- Experimental Results and Analysis --- p.40 / Chapter 5.1 --- Experimental Setup --- p.40 / Chapter 5.2 --- Small Delay Jitter Environment --- p.42 / Chapter 5.3 --- Large Delay Jitter Environment --- p.44 / Chapter 5.3.1 --- Using Low Bit-Rate Stream --- p.44 / Chapter 5.3.2 --- Using High Bit-Rate Stream --- p.44 / Chapter 6 --- Conclusions and Future Work --- p.47 / Chapter 6.1 --- Conclusions --- p.47 / Chapter 6.2 --- Future Work --- p.49 / Bibliography --- p.50
|
60 |
An asynchronous time division multiplexing scheme for voice over IP.January 2000 (has links)
by Yip Chung Sun Danny. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2000. / Includes bibliographical references (leaves 52-54). / Abstracts in English and Chinese. / Chapter Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Motivation --- p.1 / Chapter 1.2 --- Organization of Thesis --- p.5 / Chapter Chapter 2 --- Background --- p.6 / Chapter 2.1 --- Speech Codec --- p.6 / Chapter 2.2 --- RTP/UDP/IP Header Compression --- p.7 / Chapter 2.2.1 --- Real-Time Transport Protocol --- p.7 / Chapter 2.2.2 --- RTP/UDP/IP Header Compression --- p.8 / Chapter Chapter 3 --- Scenario and Assumptions --- p.10 / Chapter Chapter 4 --- Asynchronous Time Division Multiplexing Scheme --- p.14 / Chapter 4.1 --- Basic Idea --- p.14 / Chapter 4.1.1 --- Bandwidth Efficiency Improvement --- p.16 / Chapter 4.1.2 --- Delay Reduction --- p.18 / Chapter 4.2 --- Header Compression --- p.19 / Chapter 4.2.1 --- Header Compression Process --- p.21 / Chapter 4.2.2 --- Context Mapping Table --- p.23 / Chapter 4.3 --- Protocol --- p.28 / Chapter 4.3.1 --- UNCOMPRESSED_RTP Mini-Header --- p.30 / Chapter 4.3.2 --- SYNCHRONIZATION Mini-header --- p.31 / Chapter 4.3.3 --- COMPRESSED´ؤRTP Mini-header --- p.32 / Chapter 4.4 --- Connection Establishment --- p.33 / Chapter 4.4.1 --- Addressing Phase --- p.34 / Chapter 4.4.2 --- Connection Phase --- p.36 / Chapter 4.5 --- Software Implementation --- p.38 / Chapter Chapter 5 --- Simulation Results --- p.39 / Chapter 5.1 --- Simulation Model --- p.39 / Chapter 5.2 --- Voice Source Model --- p.41 / Chapter 5.3 --- Simulation Results --- p.43 / Chapter 5.3.1 --- Network Utilization and Delay Performance --- p.43 / Chapter 5.3.2 --- Number of Supported Connections --- p.45 / Chapter Chapter 6 --- Conclusion and Future Work --- p.49 / Bibliography --- p.52
|
Page generated in 0.1177 seconds