• No results found

packet data protocol address

Multicast Data Transmission Using Distance Vector Multicast Routing Protocol

Multicast Data Transmission Using Distance Vector Multicast Routing Protocol

... single packet is transmitted by the source which is then replicated at forks in multicast delivery ...multicast address is assigned to a set of ...group address and determine which outgoing node ...

6

Network Packet Sniffer with Proxy Detection Service

Network Packet Sniffer with Proxy Detection Service

... sharing data, information or resources.The data which is travelling across a network is not a continuous stream of data in fact it is in a form of ...a packet carries maximum of 1500 bytes at ...

8

Implementation of Robust Router Design for Area Critical Applications

Implementation of Robust Router Design for Area Critical Applications

... a packet base protocol. Router drives the incoming packet which comes from the enter port to output ports based on the address contained in the ...the packet enters. It has three amount ...

7

Development of Network Protocol Resolver Based on Wireshark

Development of Network Protocol Resolver Based on Wireshark

... HTTP packet parsing process in detail [2]. First, the data frame is obtained from Ethernet card, and the source/destination MAC address of the packet can be ...IP protocol parsers are ...

5

A Survey on VoIP Attack Detection by using Honeypot

A Survey on VoIP Attack Detection by using Honeypot

... the protocol stack transmission control protocol / subject return too specific attacks targeted at voice protocols like SIP (Session Initiation Protocol), IAX (Intra-Asterisk Exchange) and RTP ...

7

Design and Verification of Asynchronous Five Port Router for Network on Chip

Design and Verification of Asynchronous Five Port Router for Network on Chip

... The challenge of the confirmative an oversized style is growing exponentially. There’s a necessity to outline new strategies that creates practical verification straightforward. Many ways within the recent years are ...

5

Performance Comparison of AODV/DSR On-Demand Routing Protocols for Ad Hoc Networks

Performance Comparison of AODV/DSR On-Demand Routing Protocols for Ad Hoc Networks

... routing protocol (DSR) is an on- demand, source routing protocol, whereby all the routing information is maintained at mobile ...The protocol is composed of the two main mechanisms of "Route ...

11

dtj v03 03 1991 pdf

dtj v03 03 1991 pdf

... ensure data availability and ...redundant data on separate storage devices where most appropriate w ithin the system, thus dramatically increasing the availabi lity po ten­ tial of VAXcluster ...

95

Energy Efficient Reconfigurable MAC Protocol for Underwater Acoustic Sensor Network

Energy Efficient Reconfigurable MAC Protocol for Underwater Acoustic Sensor Network

... that protocol, the medium access channel allocation problem had been constructed as a spatial-temporal conflict graph (ST-CG) that was constituted of conflict delays among the transmission ...

91

DESIGN OF EFFICIENT CACHING ALGORITHMS FOR PEER TO PEER NETWORKS TO REDUCE 
TRAFFIC IN INTERNET

DESIGN OF EFFICIENT CACHING ALGORITHMS FOR PEER TO PEER NETWORKS TO REDUCE TRAFFIC IN INTERNET

... expose packet collision and signal propagation, (ii) node mobility creates dynamic topology, (iii) limited battery life of mobile devices, (iv) hidden and exposed terminal problems occur when signals of two nodes ...

11

TO COMPARE THE PERFORMANCE OF TORA AND DSR BASED ON THE SIZE OF THE NETWORK

TO COMPARE THE PERFORMANCE OF TORA AND DSR BASED ON THE SIZE OF THE NETWORK

... The lack of a backbone infrastructure [5,6] coupled with the fact that mobile Ad Hoc networks change their topology frequently and without prior notice makes packet routing in ad-hoc networks a challenging task. ...

11

Cloud-Enabled Health Care Automation Gateway With Support Over IPv4 And Virtual IPv6

Cloud-Enabled Health Care Automation Gateway With Support Over IPv4 And Virtual IPv6

... receive data, voice and video data grams or packets over the ...Internet Protocol Version 4 (IPv4) is version four of the Internet Protocol, which is the basis of TCP/IP pro- ...IPv4 ...

7

Different Solutions to Routing Attacks in MANET

Different Solutions to Routing Attacks in MANET

... Mobile Adhoc Networks and their security is very important aspect if considered the functionality of networks. MANET more often suffers from the security issues because of its features like dynamic topology change as ...

7

Hadoop Technology for Flow Analysis of the Internet Traffic

Hadoop Technology for Flow Analysis of the Internet Traffic

... IP address, destination IP address, source destination port address, type of the ...port address will be got together and input from same source IP address and destination IP will be ...

5

VANETs: A Survey on Routing Protocols and Issues

VANETs: A Survey on Routing Protocols and Issues

... (TORA) Protocol: TORA [1] is a distributed routing ...This protocol reduces the communication overhead to adapt with frequent network changes and does not include implementation of shortest path algorithm ...

9

Agent based Dynamic Analytical Hierarchy          Routing Protocol for Vehicular Ad hoc Networks

Agent based Dynamic Analytical Hierarchy Routing Protocol for Vehicular Ad hoc Networks

... Jacquet at al. [10] proposed a proactive, pure link state routing protocol which is best suited for large and dense networks. The basic idea was to form a cluster and to select Multi-point relays (MPRs). The main ...

8

Performance Analysis of HSPA Technology for Networked Control System Application

Performance Analysis of HSPA Technology for Networked Control System Application

... So far, all of the results do not provide the information of delay and dropout on cellular networks for NCS application purposes. It’s due to the experiment that has been done for data communication analysis only. ...

11

Security Enhancement Mechanism of Modbus TCP Protocol

Security Enhancement Mechanism of Modbus TCP Protocol

... secure data transmission and feasibility of the scheme of Modbus TCP ...Modbus protocol itself and designs a Security Enhancement protocol, Modbus-E ...The protocol can resist replay attack, ...

8

TUKAB: An Efficient NAT Traversal Scheme on Security of VoIP Network System Based on Session Initiation Protocol

TUKAB: An Efficient NAT Traversal Scheme on Security of VoIP Network System Based on Session Initiation Protocol

... Network Address Translation or Basic NAT is a method by which IP addresses are mapped from one group to another, transpar- ent to end users Network Address Translation ( NAT ) is being used by many service ...

10

DETECTION ENVIRONMENT FORMATION METHOD FOR ANOMALY DETECTION SYSTEMS

DETECTION ENVIRONMENT FORMATION METHOD FOR ANOMALY DETECTION SYSTEMS

... represents data in preferred ...of Address Resolution Protocol Spoofing attack are; ARPwatch, XARP, Static ARP Table, ARPAlert, wireshark and ARPon ...

11

Show all 10000 documents...

Related subjects