An image transport protocol for the Internet

Author(s):  
S. Raman ◽  
H. Balakrishnan ◽  
M. Srinivasan
Author(s):  
Dávid Tegze ◽  
Gábor Hosszú

This article presents the comparison of different transport level congestion control schemes, including variants of the TCP (Postel, 1981). The protocol mechanisms, implemented in various protocols are hard to investigate in a uniform manner (Hosszú, 2005); therefore, the simulator SimCast (Simulator for multicast) is developed for traffic analysis of the unicast (one-to-one communication) and multicast (one-to-many communication) streams. In this article, the TCP and other transport protocol mechanisms will be compared using the SimCast simulator (Orosz & Tegze, 2001). The simulated results are presented through examples.


Author(s):  
Tim Gerhard ◽  
Dennis Schwerdel ◽  
Paul Müller

AbstractThe Internet is a successful network that connects people all over the world. However, it has some fundamental architectural problems which require application developers and service providers to spend a tremendous effort in combating these. Examples for these efforts are content delivery networks or mobile TCP. Thus, it can be said that the Internet is currently not fulfilling the requirements on the global network anymore. The Internet of the future, or its replacement, must solve these problems.There are multiple clean-slate approaches for information-centric networking. However, they are inherently incompatible to the Internet or applications building on it.This work presents a novel resource transport protocol that is optimized for detection by software-defined networks and may be re-routed to in-network processors. Furthermore, it is shown how this protocol can be used to support concepts of ICN even in today’s Internet. Moreover, the resource format that is used in this work is independent from the underlying network, resulting in possible reuse in other networks as well. Applications and protocols building on this resource format can thus easily be re-used in clean-slate networks like NDN.


Author(s):  
Saranya K S

A growing demand for integrated smarter and faster techniques to make work easier and productive leads to the advancement of technologies. This paper entitled “AN IOT BASED WEATHER MONITOR SYSTEM FOR DRYING CLOTHES” proposes a smart way of monitoring the area where we dry out our clothes and upload the data over IoT. This proposed module consists of an IoT based framework that effectively observes the change in weather using sensors, Application that displays weather parameters such as temperature, humidity and clothes moisture obtained from the sensors to cloud by implementing message queuing telemetry transport protocol. The proposed system is portable, affordable and the data can be accessed at any instant. The Internet of Things is implemented to make informed decisions and to optimize the experience of the residents by providing them with real time data and sending customized alert notifications via software application to the right person. The clients can subscribe to the application and get the updates from the implemented system in their smartphone.


2002 ◽  
Vol 10 (3) ◽  
pp. 297-307 ◽  
Author(s):  
S. Raman ◽  
H. Balakrishnan ◽  
M. Srinivasan

Abakós ◽  
2020 ◽  
Vol 8 (2) ◽  
pp. 29-41
Author(s):  
Elias P. Duarte Jr. ◽  
Kleber V. Cardoso ◽  
Micael O.M.C. de Mello ◽  
João G.G. Borges

NAT traversal techniques allow processes with private, non-routable IP addresses to communicate with other processes outside the network secured limits. Techniques such as UDP Hole Punching have been standardized by the IETF, and using tunnels based on those techniques it is easy to allow application processes on top of any transport protocol, including TCP, to both start and receive packets from the Internet across NAT devices. However, as a side effect those techniques also freely proceed through firewalls. In this work we describe how it is possible to configure any server running on any port (no firewall configuration required) to establish connections initiated at arbitrary Internet clients, making unauthorized services easily available. We also show that the process is lightweight, in particular after the initial setup is concluded, thus virtually supporting any type of unauthorized applications.


2020 ◽  
Vol 153 ◽  
pp. 102-116 ◽  
Author(s):  
Bhisham Sharma ◽  
Gautam Srivastava ◽  
Jerry Chun-Wei Lin

Author(s):  
Hossam Mzrieb

Communication through the internet is one of the dominant methods of exchanging information. TCP and UDP are the transport layer protocols responsible for transit of nearly all Internet communications. Due to the growth of real-time audio and video applications, UDP is being used more frequently as a transport protocol, but unlike TCP, UDP has no mechanism for congestion control leading to wasted bandwidth and poor performance, so the DCCP protocol has appeared as a replacement for UDP. In this article, the author performs some simulations using NS2 for Drop Tail and RED queuing models to evaluate the performance of TCP, UDP, DCCP CCID2, and DCCP CCID3 protocols in congested wired networks. The performance metrics used are throughput, end to end delay, number of sent and lost packets. The obtained results show that the DCCP CCID2 performs the best throughput with the minimum of delay as compared to UDP, TCP, and DCCP CCID3.


2021 ◽  
Vol 13 (2) ◽  
pp. 83-95
Author(s):  
Matheus Ferraz Silveira ◽  
André L. S. Gradvohl

The Internet of Things aims to assign computational processing and connection to simple objects on a network tocollect data and then perform analysis. Due to its easy use, simplified implementation has several informationsecurity problems. This article presents attack procedures in an IoT environment using the Message QueueTelemetry Transport protocol. For attack procedures, we use the Low Orbit Ion Cannon and Wireshark programs,compromising the integrity, confidentiality, and availability of data and network connection. After carrying outthe attack procedures, we implemented security methods on the network, such as data encryption and firewall toprotect data integrity and prevent network connection attacks


Sign in / Sign up

Export Citation Format

Share Document