User Datagram Protocol—UDP

2018 ◽  
pp. 839-848
2020 ◽  
Author(s):  
T. Vedavathi ◽  
R Karthick ◽  
Senthamil Selvan Raja ◽  
Meenalochini P

Author(s):  
Aleksander Malinowski ◽  
Bogdan Wilamowski

2017 ◽  
Vol 9 (1-4) ◽  
Author(s):  
Athirah Rosli ◽  
Abidah Mat Taib ◽  
Wan Nor Ashiqin Wan Ali

Escalation of Internet-of-Thing (IoT) may cause internet users being exposed to IPv6 security issues. End-to-end connection feature in IPv6 can be misused by attackers to flood targeted host. Using User Datagram Protocol (UDP), attackers can certainly congest the network by injecting UDP packets during network communication. This will introduce risk if there is no precaution step taken. Enhanced risk assessment equation can be adopted to mitigate the perils. Thus, this paper presents the use of enhanced risk assessment equation to identify risk value that is caused by UDP flooding attack. The attack was simulated using OMNeT++ simulation software. The inputs that were considered in the enhanced equation are based on the features of the tested network scenarios. The obtained risk value can be used in determining appropriate mitigation techniques that help the organization in maintaining and strengthening their network. It also offers organization to secure their network resources and assets. Furthermore, this paper also reveals that the enhanced risk assessment equation is flexible to be used in any situation. Hereafter, more IPv6 based protocols will be tested to measure the capability of using the enhanced equation. 


Author(s):  
Norita Md Norwawi ◽  
Osman Ghazali ◽  
Munadil K. Faaeq ◽  
Mohammad M. Rasheed

2020 ◽  
Vol 16 (1) ◽  
pp. 19-24
Author(s):  
Pether V B Romony ◽  
Lanny Sitanayah ◽  
Junaidy B Sanger

Asap rokok adalah salah satu asap beracun yang berbahaya bagi kesehatan manusia dari sisi biologis maupun sisi kimiawi. Pada penelitian ini, penulis mengimplementasikansebuah sistem deteksi asap rokok berbasis The Internet of Things menggunakan sensor MQ135, Arduino board dan NodeMCU. Kemudian, penulis melakukan perbandingan Quality of Service dari dua protokol komunikasi data, yaitu Transmission Control Protocol dan User Datagram Protocol pada sistem tersebut. Parameter Quality of Service yang dibandingkan saat proses pengiriman data adalah delay dan data loss. Untuk setiap protokol, simulasi dilakukan selama 1 jam dengan pengiriman data setiap 5 detik, 10 detik, sampai 1 menit. Hasil yang diperoleh adalah data loss dengan Transmission Control Protocol lebih rendah dari pada data loss dengan User Datagram Protocol, sedangkan delay dengan User Datagram Protocol lebih rendah dari pada delay dengan Transmission Control Protocol.


Author(s):  
Rihab Kouki ◽  
Alexandre Boe ◽  
Thomas Vantroys ◽  
Faouzi Bouani

This article investigates the problem of data-driven cooperative tracking for a class of multi-agent linear systems under imperfect wireless communication. An autonomous Internet of Things predictive control application is designed to drive a robot with one wheel. The proposed methodology has been developed using Revolutionary Internet of Things Operating System running on STM32 and radio frequency communication shields over the User Datagram Protocol. To evaluate the performance of the predictive control algorithm, the User Datagram Protocol has been used due to the high number of packet losses in the communication channel. A robust analysis of Internet of Things technology among agents, combined with a network predictive control strategy against packet loss, limited bandwidth and attack links is carried out. The main feature of this methodology is that it is possible to achieve consensus monitoring and stability of closed-loop control systems. The efficiency of the proposed design approach is demonstrated by several experimental scenarios.


Sign in / Sign up

Export Citation Format

Share Document