scholarly journals Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols

2021 ◽  
Author(s):  
G. Fairhurst ◽  
C. Perkins

2020 ◽  
Author(s):  
wulan sipahutar

Software Component is a computer application that is useful for carrying out a desired job. This application is needed as a liaison between the brain (brainware) with hardware (hardware). Software also means a computer program that serves to perform special tasks, such as making documents, manipulating photos, making financial reports, or designing a house. Software can be divided into two, namely: System Operation. Software that functions to connect between users and computers, for example Windows 7, Windows 8, Linux, and Windows 10. Application. Software that can be applied to meet user needs. System network adapter drivers, network operations, and network protocols. As for examples of software in online communication, as follows. skype, hangout, web conference, whatsapp, Microsoft excel, video and audio, earlerning





2010 ◽  
Vol 44-47 ◽  
pp. 997-1001
Author(s):  
Zhu Ge Bin ◽  
Yu Cheng ◽  
Wei Ming Wang

The messages in the Fp reference point of ForCES protocol can be divided into two kinds: control messages and redirect messages. According to this division, the control message channel was used to transmit control messages and the redirect message channel was used to transmit redirect messages. In this paper, we use different transport protocols to transmit control messages and redirect messages. Then test and analyze the TML based on different transport protocol to verify the correctness of the designs.



Author(s):  
Elise Henry ◽  
Angelo Furno ◽  
Nour-Eddin El Faouzi

Transport networks are essential for societies. Their proper operation has to be preserved to face any perturbation or disruption. It is therefore of paramount importance that the modeling and quantification of the resilience of such networks are addressed to ensure an acceptable level of service even in the presence of disruptions. The paper aims at characterizing network resilience through weighted degree centrality. To do so, a real dataset issued from probe vehicle data is used to weight the graph by the traffic load. In particular, a set of disrupted situations retrieved from the study dataset is analyzed to quantify the impact on network operations. Results demonstrate the ability of the proposed metrics to capture traffic dynamics as well as their utility for quantifying the resilience of the network. The proposed methodology combines different metrics from the complex networks theory (i.e., heterogeneity, density, and symmetry) computed on temporal and weighted graphs. Time-varying traffic conditions and disruptions are analyzed by providing relevant insights on the network states via three-dimensional maps.





Sign in / Sign up

Export Citation Format

Share Document