• No results found

Internet network management protocol

OSI Systems Management, Internet SNMP and ODP/OMG CORBA as Technologies for Telecommunications Network Management

OSI Systems Management, Internet SNMP and ODP/OMG CORBA as Technologies for Telecommunications Network Management

... SNMP protocol limits the maximum Protocol Data Unit (PDU) or packet size, so it might not be possible to pass values for all the row objects! SNMPv2 remedies this defect and uses an elaborate interaction ...

35

A Pervasive Computing Model of Internet of Things based on Computing Area Network

A Pervasive Computing Model of Internet of Things based on Computing Area Network

... a management server is needed, and the server aims to describe the device ability in ...device management server has the following function: ability to collect, verify information automation, ...

8

An access control management protocol for Internet of things devices

An access control management protocol for Internet of things devices

... The Internet of Things (IoT) allows people and things to be connected anytime, anyplace, with anything and anyone, ideally using any path or network and any ...The Internet of Things offers the ...

11

A Study of Web-Based SNMP Network Management. with a Simple Java Applet Network Monitoring Tool

A Study of Web-Based SNMP Network Management. with a Simple Java Applet Network Monitoring Tool

... of network activity or dynamically presenting device ...other management tools offer Web access using passive HTML and VRML with CGI, through ...time management functions through a Web ...Java ...

40

Proposing the Secure Stream Control Transfer Protocol / Internet Protocol Stack (SSCTP/IP) for an Improved Internet Design

Proposing the Secure Stream Control Transfer Protocol / Internet Protocol Stack (SSCTP/IP) for an Improved Internet Design

...  With support of the multihoming feature of the SCTP, each connected device will have two or more points of connection, with a primary and alternate path. The SCTP allows mainstreaming and unordered data transfer, which ...

6

Security White Paper for KYOCERA MFPs and Printers

Security White Paper for KYOCERA MFPs and Printers

... Wi-Fi Direct devices can connect to each other without having to go through an access point. That is, you don’t need to use your router. This is because Wi-Fi Direct devices establish their own ad-hoc networks as and ...

25

Evaluating the performance of network traffic for providing real time applications in an Internet Protocol network and Multi Protocol Label Switching Network

Evaluating the performance of network traffic for providing real time applications in an Internet Protocol network and Multi Protocol Label Switching Network

... Reservation Protocol (RRP) and Path selection based on Available Bandwidth Estimation (ABE) to securely manage traffic from the source to Multi console MPLS VPN cloud ...

5

NetFlow Feature Card II

NetFlow Feature Card II

... a network is the ability to set up access lists to filter—or to altogether prevent—traffic between members of different ...traffic management—a key requirement when deploying Layer 3 switching is to provide ...

5

Securing the IP Multimedia Subsystem with IPsec and HTTP Digest

Securing the IP Multimedia Subsystem with IPsec and HTTP Digest

... When using digest access authentication the client and the server have a shared secret (e.g., a password), which is exchanged using an out-of-band mechanism. When a server at a given domain receives a request from a ...

12

A Cryptographic Protocol to Protect MPLS Labels

A Cryptographic Protocol to Protect MPLS Labels

... MPLS network is "trusted and provided in a secure ...encryption protocol that includes key distribution, authentication for the IP header, and authentication and encryption for the IP ...

6

Voice over Internet Protocol

Voice over Internet Protocol

... IP network, like the Internet, without any alteration to the intermediate network ...the Network Layer, thus it has no effect at higher levels to all ...

12

DC mod-1.pdf

DC mod-1.pdf

... In the past, all hosts in a network were connected through a common cable, which meant that a packet sent from one host to another was received by all hosts. The intended recipient kept the packet; the others ...

42

How To Understand The Network Protocol Of A Network (Netware) 2.5 (Networchestra) 2 (Netwire) 2) (Netrocessor) 2-Way (Networking) 2,5 (Network)

How To Understand The Network Protocol Of A Network (Netware) 2.5 (Networchestra) 2 (Netwire) 2) (Netrocessor) 2-Way (Networking) 2,5 (Network)

... ____ 3. You are a software developer. You have the task of creating an application that provides guaranteed delivery of information between end system applications. What layer of the Open Systems Interconnection (OSI) ...

16

Monitoring Cisco IOS Firewall Inspection Activity with Multi- Router Traffic Grapher (MRTG)

Monitoring Cisco IOS Firewall Inspection Activity with Multi- Router Traffic Grapher (MRTG)

... Simple Network Management Protocol (SNMP) interface to monitor various firewall counters by network-management utilities such as Ipswitch’s What’s Up Gold, Solarwinds Orion, and the ...

5

Voice Quality for Internet Protocol Based on Neural Network Model

Voice Quality for Internet Protocol Based on Neural Network Model

... Packet Loss : During transmission of packets in IP networks, queues might over- flow in network nodes between sender and receiver, resulting in the loss of pack- ets. Retransmission mechanisms can be applied in ...

8

A Wireless Internet of Things Architecture Based on Mobile Internet

A Wireless Internet of Things Architecture Based on Mobile Internet

... for Internet of things is designed ...of Internet of things and achieve data acquisition ...the Internet of things server platform and complete the information through browser and remote client ...

8

Analysis for Internet Protocol (IP) and Ad hoc Network Routing

Analysis for Internet Protocol (IP) and Ad hoc Network Routing

... communication network. Different protocol performs differently in different scenario according to their specialty and ...single protocol that performs well in accepting different challenges and ...

5

Extensions to an Internet signaling protocol to support telecommunication services

Extensions to an Internet signaling protocol to support telecommunication services

... the Internet and the cellular PSTN at the services ...the Internet and 2.5G endpoints which can connect to the Internet (GPRS, 1xRTT), but because the data connection and its signaling is distinct ...

5

QoS Issues in Implications of Voice over Venerable Networks

QoS Issues in Implications of Voice over Venerable Networks

... the internet more and more voice data sent over the wireless networks like voice over internet network, voice over ATM, voice over frame relay and voice over ...wireless network for real time ...

9

PERFORMANCE OF 4G TECHNOLOGY USING VARIOUS ROUTING PROTOCOLS IN MOBILE NETWORK

PERFORMANCE OF 4G TECHNOLOGY USING VARIOUS ROUTING PROTOCOLS IN MOBILE NETWORK

... sensor network using 4G technology which is important to improve the performance of the wireless sensor network as effective and ...for network architecture of future 4G mobile networks, including ...

11

Show all 10000 documents...

Related subjects