Filters








116,351 Hits in 5.3 sec

Multicast Internet protocol

X.-K Wang, R.H Deng, F Bao
2000 Computer Communications  
Addresses 224.0.0.1 to 224.0.0.255 are reserved for the use of routing protocols and other low-level topology discovery or maintenance protocols.  ...  Multicast groups Almost all the IPv4 based multicast protocols use the so called "Host Group Model" [7] as their multicast service  ...  We then identified their problems and propose a new multicast protocol, called Multicast Internet Protocol (MIP), which is both scalable and flexible.  ... 
doi:10.1016/s0140-3664(00)00167-5 fatcat:ngg5rzlwz5banclhclpokgktjq

User-level network interface protocols

R.A.F. Bhoedjang, T. Ruhl, H.E. Bal
1998 Computer  
The last issues we focus on are reliability and multicast, which in modern networks can be supported both on the host processor and the network interface.  ...  In most cases, these protocols require that all network access be through the operating system, which adds significant overhead to both the transmission path (typically a system call and data copy) and  ...  We thank Andrew Chien and Scott Pakin for making the FM software available and Mario Lauria and Matt Buchanan for their suggestion to use write combining on the Pentium Pro.  ... 
doi:10.1109/2.730737 fatcat:5462f3ahlbbwxclhscvdxrnxgq

Internetwork Protocol Approaches

J. Postel
1980 IRE Transactions on Communications Systems  
To provide these services either new end-toend service protocols must be defined or the service protocols of the individual networks must be made to intenvork.  ...  The models for interconnection of networks and the role of internetwork protocols are discussed.  ...  This inherent unreliability in the IP level allows it to be simple and requires the end-to-end use of a reliable protocol.  ... 
doi:10.1109/tcom.1980.1094705 fatcat:wrbgxtlon5hjzkmkky6yr6blyi

Internetwork Protocol Approaches [chapter]

Jonathan B. Postel
1982 Computer Network Architectures and Protocols  
To provide these services either new end-toend service protocols must be defined or the service protocols of the individual networks must be made to intenvork.  ...  The models for interconnection of networks and the role of internetwork protocols are discussed.  ...  This inherent unreliability in the IP level allows it to be simple and requires the end-to-end use of a reliable protocol.  ... 
doi:10.1007/978-1-4615-6698-4_18 fatcat:e2ma5hyfazfzjkx7ifzfap546m

Network Protocols

Andrew S. Tanenbaum
1981 ACM Computing Surveys  
Dunng the last ten years, many computer networks have been designed, implemented, and put into service in the United States, Canada, Europe, Japan, and elsewhere.  ...  Numerous examples are gwen to illustrate the principles.  ...  ACKNOWLEDGMENTS I would hke to thank Yogen Dalai, Adele Goldberg, and an anonymous, but arhstic, technical editor for their numerous and helpful comments.  ... 
doi:10.1145/356859.356864 fatcat:ahux5nnv5ffblmudxaacvzre5u

Reliable New Transport Protocol

Firas Sabah Alturaihe
2013 IOSR Journal of Engineering  
We need a new protocol which is expected to be easily deployed and easily integrated with the applications, in addition to utilizing the bandwidth efficiently and fairly.  ...  The optimal values vary on specific networks and end hosts and are hard to tune. In addition, parallel TCP inherits the RTT fairness problem of TCP.  ...  OBJECTIVES I would like to design and implement a NTP, which recognized and addressed numerous research problems in data transport protocols.  ... 
doi:10.9790/3021-031025659 fatcat:fdfwysbh4ne77dp2gc6hhzyh4a

The design philosophy of the DARPA internet protocols

D. Clark
1988 Symposium proceedings on Communications architectures and protocols - SIGCOMM '88  
This idea was not well received at the time, as it seemed much too ad hoc, and only one host seemed to have this problem.'  ...  This section is of necessity incomplete; a The originaI ARPANET host-to host protocol provided flow control based on both bytes and packets.  ... 
doi:10.1145/52324.52336 dblp:conf/sigcomm/Clark88 fatcat:ws6q2lc2d5bg3hggkgqirdsxom

The transfer protocols

R. Khare
1998 IEEE Internet Computing  
News Transfer Protocol for pushing e-mail, HyperText Transfer Protocol for pulling Web pages, and a host of other specialpurpose schemes, from Finger to Network File System.  ...  pathnames on a host; and SMTP and NNTP refer to messages by their globally unique RFC-822 msgids.  ... 
doi:10.1109/4236.670688 fatcat:f23mzjvvefen7mqcjsttyl47di

Hybrid wireless network protocols

Ruay-Shiung Chang, Wei-Yeh Chen, Yean-Fu Wen
2003 IEEE Transactions on Vehicular Technology  
The hybrid protocols are more flexible, reliable, and have better performance than the traditional wireless network protocols.  ...  In this paper, we propose hybrid wireless network protocols to combine the advantages of BS-oriented and ad hoc wireless networks.  ...  The proposed method is called "hybrid wireless network protocols." A two-hop direct transmission allows for more flexibility and reliability.  ... 
doi:10.1109/tvt.2002.807126 fatcat:5rge7p6gbfcjpadr3fu7fhq5eq

Simulating Multicast Transport Protocols in Estelle [chapter]

Justin Templemore-Finlayson, Eugen Borcoci
2000 IFIP Advances in Information and Communication Technology  
In this example, the current network configuration shows host 1 bound to SAP[I], host 20 bound to SAP[20] and host 50 bound to SAP [50] .  ...  USE OF THE IPN MODULE TO SIMULATE THE RMTP-II PROTOCOL The IPN module has been developed within a project to formally specify and validate the Reliable Multicast Transport Protocol-II (RMTP-II) [12] .  ... 
doi:10.1007/978-0-387-35533-7_13 fatcat:zf3bwnu5cjfbda3i3udp5s7twq

Protocols for Packet Quantum Network Intercommunication [article]

Nengkun Yu, Ching-Yi Lai, Li Zhou
2021 arXiv   pre-print
To handle the packet loss problem in transport, we propose a quantum retransmission protocol based on the recursive use of a quantum secret sharing scheme.  ...  However, classical network mechanisms, especially those related to error control and reliable connection, implicitly assume that information can be duplicated, which is not true in the quantum world due  ...  The next step is to study techniques for congestion avoidance and control of quantum network protocols.  ... 
arXiv:1903.10685v3 fatcat:fa5bvzuvivgrll2lrsngxl545q

A Comparative Review Of Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6)
English

Olabenjo Babatunde, Omar Al-Debagy
2014 International Journal of Computer Trends and Technology  
In this paper, we will discuss the evolution of Internet Protocol version 4 (IPv4), its features, issues and limitations and how Internet Protocol version 6 (IPv6) tends to solve some of these issues including  ...  Many computers and devices are becoming more connected to the internet in recent years; the use of the Internet Protocol (IP) has made the connectivity and identification of these devices possible in large  ...  Several techniques being used to maintain interconnectivity between the two protocols will allow these protocols to coexist without issues as more companies migrate to the new protocol.  ... 
doi:10.14445/22312803/ijctt-v13p103 fatcat:ch6gier52jdj5cwykg2wvobuze

A Reliable Subcasting Protocol for Wireless Environments [chapter]

Djamel H. Sadok, Carlos de M. Cordeiro, Judith Kelner
2000 Lecture Notes in Computer Science  
This paper presents an end-to-end reliable multicast protocol for use in environments with wireless access.  ...  The Internet Group Management Protocol (IGMP) is used manage group membership whereas the IETF's Mobile IP offers support to user mobility and a care-of address (temporary IP address).  ...  Commonly used reliable protocols include the scalable reliable multicast (SRM) [2] and the reliable multicast transport protocol (RMTP) [3] .  ... 
doi:10.1007/3-540-45494-2_14 fatcat:rujxzhbuandtvbkhxjnhrqcyea

hypertext transfer protocol [chapter]

Martin H. Weik
2000 Computer Science and Communications Dictionary  
Solutions such as cryptographic techniques to mitigate the security and access control problems are used. Various methods for security are presented in this paper.  ...  Users are outsourcing their sensitive data to cloud providers because of this data security and access control is one of the most challenging ongoing research work in cloud computing.  ...  Proposed a modified Diffie -Hellman key exchange protocol between cloud service provider and the user for secretly sharing a symmetric key for secure data access that alleviates the problem of key distribution  ... 
doi:10.1007/1-4020-0613-6_8552 fatcat:ahoradplh5g37mbwuxpype6zai

Hypertext Transfer Protocol [chapter]

2013 Encyclopedia of Systems Biology  
Solutions such as cryptographic techniques to mitigate the security and access control problems are used. Various methods for security are presented in this paper.  ...  Users are outsourcing their sensitive data to cloud providers because of this data security and access control is one of the most challenging ongoing research work in cloud computing.  ...  Proposed a modified Diffie -Hellman key exchange protocol between cloud service provider and the user for secretly sharing a symmetric key for secure data access that alleviates the problem of key distribution  ... 
doi:10.1007/978-1-4419-9863-7_100652 fatcat:3zweulizxnhe7ljo5vwmsnqy6m
« Previous Showing results 1 — 15 out of 116,351 results