A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Multicast Internet protocol
2000
Computer Communications
Addresses 224.0.0.1 to 224.0.0.255 are reserved for the use of routing protocols and other low-level topology discovery or maintenance protocols. ...
Multicast groups Almost all the IPv4 based multicast protocols use the so called "Host Group Model" [7] as their multicast service ...
We then identified their problems and propose a new multicast protocol, called Multicast Internet Protocol (MIP), which is both scalable and flexible. ...
doi:10.1016/s0140-3664(00)00167-5
fatcat:ngg5rzlwz5banclhclpokgktjq
User-level network interface protocols
1998
Computer
The last issues we focus on are reliability and multicast, which in modern networks can be supported both on the host processor and the network interface. ...
In most cases, these protocols require that all network access be through the operating system, which adds significant overhead to both the transmission path (typically a system call and data copy) and ...
We thank Andrew Chien and Scott Pakin for making the FM software available and Mario Lauria and Matt Buchanan for their suggestion to use write combining on the Pentium Pro. ...
doi:10.1109/2.730737
fatcat:5462f3ahlbbwxclhscvdxrnxgq
Internetwork Protocol Approaches
1980
IRE Transactions on Communications Systems
To provide these services either new end-toend service protocols must be defined or the service protocols of the individual networks must be made to intenvork. ...
The models for interconnection of networks and the role of internetwork protocols are discussed. ...
This inherent unreliability in the IP level allows it to be simple and requires the end-to-end use of a reliable protocol. ...
doi:10.1109/tcom.1980.1094705
fatcat:wrbgxtlon5hjzkmkky6yr6blyi
Internetwork Protocol Approaches
[chapter]
1982
Computer Network Architectures and Protocols
To provide these services either new end-toend service protocols must be defined or the service protocols of the individual networks must be made to intenvork. ...
The models for interconnection of networks and the role of internetwork protocols are discussed. ...
This inherent unreliability in the IP level allows it to be simple and requires the end-to-end use of a reliable protocol. ...
doi:10.1007/978-1-4615-6698-4_18
fatcat:e2ma5hyfazfzjkx7ifzfap546m
Network Protocols
1981
ACM Computing Surveys
Dunng the last ten years, many computer networks have been designed, implemented, and put into service in the United States, Canada, Europe, Japan, and elsewhere. ...
Numerous examples are gwen to illustrate the principles. ...
ACKNOWLEDGMENTS I would hke to thank Yogen Dalai, Adele Goldberg, and an anonymous, but arhstic, technical editor for their numerous and helpful comments. ...
doi:10.1145/356859.356864
fatcat:ahux5nnv5ffblmudxaacvzre5u
Reliable New Transport Protocol
2013
IOSR Journal of Engineering
We need a new protocol which is expected to be easily deployed and easily integrated with the applications, in addition to utilizing the bandwidth efficiently and fairly. ...
The optimal values vary on specific networks and end hosts and are hard to tune. In addition, parallel TCP inherits the RTT fairness problem of TCP. ...
OBJECTIVES I would like to design and implement a NTP, which recognized and addressed numerous research problems in data transport protocols. ...
doi:10.9790/3021-031025659
fatcat:fdfwysbh4ne77dp2gc6hhzyh4a
The design philosophy of the DARPA internet protocols
1988
Symposium proceedings on Communications architectures and protocols - SIGCOMM '88
This idea was not well received at the time, as it seemed much too ad hoc, and only one host seemed to have this problem.' ...
This section is of necessity incomplete; a The originaI ARPANET host-to host protocol provided flow control based on both bytes and packets. ...
doi:10.1145/52324.52336
dblp:conf/sigcomm/Clark88
fatcat:ws6q2lc2d5bg3hggkgqirdsxom
The transfer protocols
1998
IEEE Internet Computing
News Transfer Protocol for pushing e-mail, HyperText Transfer Protocol for pulling Web pages, and a host of other specialpurpose schemes, from Finger to Network File System. ...
pathnames on a host; and SMTP and NNTP refer to messages by their globally unique RFC-822 msgids. ...
doi:10.1109/4236.670688
fatcat:f23mzjvvefen7mqcjsttyl47di
Hybrid wireless network protocols
2003
IEEE Transactions on Vehicular Technology
The hybrid protocols are more flexible, reliable, and have better performance than the traditional wireless network protocols. ...
In this paper, we propose hybrid wireless network protocols to combine the advantages of BS-oriented and ad hoc wireless networks. ...
The proposed method is called "hybrid wireless network protocols." A two-hop direct transmission allows for more flexibility and reliability. ...
doi:10.1109/tvt.2002.807126
fatcat:5rge7p6gbfcjpadr3fu7fhq5eq
Simulating Multicast Transport Protocols in Estelle
[chapter]
2000
IFIP Advances in Information and Communication Technology
In this example, the current network configuration shows host 1 bound to SAP[I], host 20 bound to SAP[20] and host 50 bound to SAP [50] . ...
USE OF THE IPN MODULE TO SIMULATE THE RMTP-II PROTOCOL The IPN module has been developed within a project to formally specify and validate the Reliable Multicast Transport Protocol-II (RMTP-II) [12] . ...
doi:10.1007/978-0-387-35533-7_13
fatcat:zf3bwnu5cjfbda3i3udp5s7twq
Protocols for Packet Quantum Network Intercommunication
[article]
2021
arXiv
pre-print
To handle the packet loss problem in transport, we propose a quantum retransmission protocol based on the recursive use of a quantum secret sharing scheme. ...
However, classical network mechanisms, especially those related to error control and reliable connection, implicitly assume that information can be duplicated, which is not true in the quantum world due ...
The next step is to study techniques for congestion avoidance and control of quantum network protocols. ...
arXiv:1903.10685v3
fatcat:fa5bvzuvivgrll2lrsngxl545q
A Comparative Review Of Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6)
English
2014
International Journal of Computer Trends and Technology
English
In this paper, we will discuss the evolution of Internet Protocol version 4 (IPv4), its features, issues and limitations and how Internet Protocol version 6 (IPv6) tends to solve some of these issues including ...
Many computers and devices are becoming more connected to the internet in recent years; the use of the Internet Protocol (IP) has made the connectivity and identification of these devices possible in large ...
Several techniques being used to maintain interconnectivity between the two protocols will allow these protocols to coexist without issues as more companies migrate to the new protocol. ...
doi:10.14445/22312803/ijctt-v13p103
fatcat:ch6gier52jdj5cwykg2wvobuze
A Reliable Subcasting Protocol for Wireless Environments
[chapter]
2000
Lecture Notes in Computer Science
This paper presents an end-to-end reliable multicast protocol for use in environments with wireless access. ...
The Internet Group Management Protocol (IGMP) is used manage group membership whereas the IETF's Mobile IP offers support to user mobility and a care-of address (temporary IP address). ...
Commonly used reliable protocols include the scalable reliable multicast (SRM) [2] and the reliable multicast transport protocol (RMTP) [3] . ...
doi:10.1007/3-540-45494-2_14
fatcat:rujxzhbuandtvbkhxjnhrqcyea
hypertext transfer protocol
[chapter]
2000
Computer Science and Communications Dictionary
Solutions such as cryptographic techniques to mitigate the security and access control problems are used. Various methods for security are presented in this paper. ...
Users are outsourcing their sensitive data to cloud providers because of this data security and access control is one of the most challenging ongoing research work in cloud computing. ...
Proposed a modified Diffie -Hellman key exchange protocol between cloud service provider and the user for secretly sharing a symmetric key for secure data access that alleviates the problem of key distribution ...
doi:10.1007/1-4020-0613-6_8552
fatcat:ahoradplh5g37mbwuxpype6zai
Hypertext Transfer Protocol
[chapter]
2013
Encyclopedia of Systems Biology
Solutions such as cryptographic techniques to mitigate the security and access control problems are used. Various methods for security are presented in this paper. ...
Users are outsourcing their sensitive data to cloud providers because of this data security and access control is one of the most challenging ongoing research work in cloud computing. ...
Proposed a modified Diffie -Hellman key exchange protocol between cloud service provider and the user for secretly sharing a symmetric key for secure data access that alleviates the problem of key distribution ...
doi:10.1007/978-1-4419-9863-7_100652
fatcat:3zweulizxnhe7ljo5vwmsnqy6m
« Previous
Showing results 1 — 15 out of 116,351 results