• No results found

TCP/UDP

Survey on Transport Layer Protocols: TCP & UDP

Survey on Transport Layer Protocols: TCP & UDP

... and UDP). TCP provides a reliable mechanism to transfer the data which results in increase of ...delay. UDP does not provide any congestion control mechanism but provides less delay as compared to ...

6

Proxy Server for Hybrid TCP/IP and UDP

Proxy Server for Hybrid TCP/IP and UDP

... use UDP for the short conversation, connectionless host-to-host communication, minimal overhead, and it is ...used TCP for sequenced, in-order, error-free packet delivery by using a sliding window flow ...

5

Performance evaluation of TCP, UDP, AND SCTP in Manets

Performance evaluation of TCP, UDP, AND SCTP in Manets

... TCP protocols transmit data from a source to a destination only through a dedicated path and hence when congestion occurs the probability of data loss is high. In the UDP, packets may get lost as it is a ...

6

Effect of Encryption Delay on TCP and UDP Transport Layer Protocols in Software Defined Networks (SDN)

Effect of Encryption Delay on TCP and UDP Transport Layer Protocols in Software Defined Networks (SDN)

... over TCP and UDP transport layer protocols under SDN network ...of TCP with encryption is increases in both cases such as HTTP and FTP traffic ...of UDP with encryption is decreases in both ...

11

Performance of tcp and udp protocols for secure multipath aco  communication in manet

Performance of tcp and udp protocols for secure multipath aco communication in manet

... of UDP packet end due to absence of any Acknowledgement (ACK) packet. UDP packets PDF are separately measured in this analysis because the combination of both is always provide better results due to ...

5

Comparative Study and Simulation of TCP and UDP Traffic over Hybrid Network with Mobile IP

Comparative Study and Simulation of TCP and UDP Traffic over Hybrid Network with Mobile IP

... data. UDP is different in many ways with TCP. As TCP is connection oriented protocol where it set up a connection first then transfer data and the it terminate the connection, but in UDP there ...

5

Performance Analysis of UDP/CBR &TCP/FTP Traffic Under Reactive and Proactive Routing Protocols in VANET

Performance Analysis of UDP/CBR &TCP/FTP Traffic Under Reactive and Proactive Routing Protocols in VANET

... In this paper, the two traffic scenarios are compared i.e. TCP/FTP and UDP/CBR. To find the appropriate traffic type from these two available different traffics types in a network in city scenario, ...

10

Energy Based Performance analysis of AODV Routing Protocol under TCP and UDP Environments

Energy Based Performance analysis of AODV Routing Protocol under TCP and UDP Environments

... To find the pros and cons of routing protocols in simple and complex networks, simulation is used. For real time applications, simulation helps us to visualize the performance of routing protocols and complex networks. ...

5

TCP and UDP Fairness in Vehicular Ad hoc Networks

TCP and UDP Fairness in Vehicular Ad hoc Networks

... in UDP traffic because of full queues and dropped ...of UDP traffic into ...the UDP traffic, TCP receives more chance to access the network and sending ...the UDP traffic is stored in ...

8

lec-14 (TCP , UDP)

lec-14 (TCP , UDP)

... ↗ ACK: (Acknowledgment Bit) When set to 1, indicates that this segment is carrying an acknowledgment and the value of the acknowledgment number field is valid and carrying the next sequence expected from the destination ...

26

Proportional Cram of Congestion ControlTechnique in High Fastness Network

Proportional Cram of Congestion ControlTechnique in High Fastness Network

... In computer networking, Transport Layer provides end-toendcommunication services. When data transmitted, thetransport layer gets data from Application layer and dividesthem into several data packets. In this section, ...

13

Grandstream Networks, Inc. HT– 502 Dual FXS Port Analog Telephone Adaptor HT–502 User Manual www.grandstream.com

Grandstream Networks, Inc. HT– 502 Dual FXS Port Analog Telephone Adaptor HT–502 User Manual www.grandstream.com

... Port Forwarding Forwards a matching (TCP/UDP) port to a specific LAN IP address with a specific (TCP/UDP) port. In addition to the Basic Settings configuration page, end users also hav[r] ...

35

Cocktail method for BitTorrent traffic identification in real time

Cocktail method for BitTorrent traffic identification in real time

... To identify the traffic of P2P applications, the simplest method is port-mapping on transport-layer. However, it becomes less accurate and ineffective, since P2P applications do not rely on those well-known ports ...

11

Security and Performance Trade-offs for Data Distribution Service in Flying Ad-Hoc Networks

Security and Performance Trade-offs for Data Distribution Service in Flying Ad-Hoc Networks

... It shares Transport protocols Not Specified TCP, UDP UDP Operating systems APIs Windows, Linux, Solaris, MacOS Linux, RIOT-OS, Contiki Windows, Linux C++ Linux, Windows, AIX, Solaris, RT[r] ...

6

Experimental Evaluation of Juniper Network's Netscreen 5GT Security Device against Layer4 Flood Attacks

Experimental Evaluation of Juniper Network's Netscreen 5GT Security Device against Layer4 Flood Attacks

... unlike TCP traffic, the Web-servers do not re- ceive a lot of UDP ...During UDP flood attacks, a flood of UDP packets are sent to the victim computers either on specified ports or on random ...

9

Performance Analysis of HSPA Technology for Networked Control System Application

Performance Analysis of HSPA Technology for Networked Control System Application

... was UDP (User Datagram Protocol). Unlike TCP (Transmission Control Protocol), UDP is sending every single data packet in one time, without resending and notification when data packet has ...arrived. ...

11

An Internet Traffic Identification Approach Based on GA and PSO-SVM

An Internet Traffic Identification Approach Based on GA and PSO-SVM

... classifying TCP traffic flows, while having no use for UDP ...using UDP protocol for transmission nowadays, such as P2P ...classify UDP traffic ...both TCP and UDP ...

11

Collaborative Framework for High Performance P2P based Data Transfer in Scientific Computing

Collaborative Framework for High Performance P2P based Data Transfer in Scientific Computing

... Utilizing other high-performance low-level TCP or UDP based data transfer protocols in data layer Improving existing P2P technique Certification handling service for different certificat[r] ...

57

Network Security using Firewall and Cryptographic Authentication

Network Security using Firewall and Cryptographic Authentication

... the TCP or UDP header to transmit information from the client to the server, whereas its successor Single packet authorization (SPA) scheme uses messages to be sent over any IP protocol; not just those that ...

7

A Survey on Routing Protocols of MANETs using Mobility Models for Multimedia Applications

A Survey on Routing Protocols of MANETs using Mobility Models for Multimedia Applications

... Singh et al. describe the User datagram protocol (UDP) and transmission control protocol (TCP) are two popular transport layer protocols in infrastructure networks [15]. The behavior of these transport ...

9

Show all 850 documents...

Related subjects