scholarly journals Implementation of Quick UDP Internet Connections

2020 ◽  
Vol 9 (01) ◽  
pp. 24921-24924
Author(s):  
Minakshi Roy ◽  
Shamsh Ahsan ◽  
Gaurav Kumar ◽  
Ajay Vimal

With the advent of the Internet growth worldwide, we need to have a protocol which is faster and provides a better support for the following problems: Faster Connection Establishment Time Good Congestion Control Connection Migration Good Error Correction One of the key aspects taken under consideration was current scenario of connection establishment time whenever a website is requested and poor video buffering over existing Internet Connections. The prime objective is to create a proxy server which routes the incoming connection requests to QUIC supported libraries if the client supports QUIC. If the client does not support QUIC then it routes the incoming request to existing web server which can then handle the request using TCP.  After creation of the proxy server a website has to be created using which we can test various aspects of the QUIC protocol. Keyword: Quick, Protocol, UDP, Network

1999 ◽  
Vol 12 (4) ◽  
pp. 368-369
Author(s):  
Bruce C. Carlstedt

Access to the Internet provides us with an incredible amount of information about the rheumatic diseases. There are numerous arthritis organizations, professional associations, educational institutions, research and professional journals and patients with Web sites devoted to the rheumatic diseases. Some are reviewed and listed here.


Author(s):  
Rohitkumar Rudrappa Wagdarikar ◽  
Sandhya P

<p>A WS provides the communication between heterogeneous systems. While performing this operation, we need to focus on QoS of consumer, provider and registry directory. There will be some parameters like WS selection, prediction and rank these are parameters need to consider while QoS implementation in web services. While performing integration in web services we need to focus on QoS requirements regarding server and network performance. Performance of WS is related to locations i.e the network distance and the Internet connections between consumer and provider. There will be more QoS approach which works on consumers collected QoS data, based on this data system can predict the QoS of WS. Throughput and response time are the QoS of WS. In this paper, we have proposed parallel XML parser, by which we can parse UDDI, WSDL and SOAP XML files parallel by which it will improve the response time and throughput of WS.</p>


Author(s):  
Ibrahim Mahmood Ibrahim ◽  
Siddeeq Y. Ameen ◽  
Hajar Maseeh Yasin ◽  
Naaman Omar ◽  
Shakir Fattah Kak ◽  
...  

Today, web services rapidly increased and are accessed by many users, leading to massive traffic on the Internet. Hence, the web server suffers from this problem, and it becomes challenging to manage the total traffic with growing users. It will be overloaded and show response time and bottleneck, so this massive traffic must be shared among several servers. Therefore, the load balancing technologies and server clusters are potent methods for dealing with server bottlenecks. Load balancing techniques distribute the load among servers in the cluster so that it balances all web servers. The motivation of this paper is to give an overview of the several load balancing techniques used to enhance the efficiency of web servers in terms of response time, throughput, and resource utilization. Different algorithms are addressed by researchers and get good results like the pending job, and IP hash algorithms achieve better performance.


Author(s):  
Lilia Ervina Jeronimo Guterres ◽  
Ahmad Ashari

The current technology is changing rapidly, with the significant growth of the internet technology, cyber threats are becoming challenging for IT professionals in the companies and organisations to guard their system. Especially when all the hacking tools and instructions are freely available on the Internet for beginners to learn how to hack such as stealing data and information. Tic Timor IP is one of the organisations involved and engaged in the data center operation. It often gets attacks from the outside networks. A network traffic monitoring system is fundamental to detect any unknown activities happening within a network. Port scanning is one of the first methods commonly used to attack a network by utilizing several free applications such as Angry IP Scan, Nmap and Low Orbit Ion Cannon (LOIC).  On the other hand, the snort-based Intrusion Detection System (IDS) can be used to detect such attacks that occur within the network perimeter including on the web server. Based on the research result, snort has the ability to detect various types of attack including port scanning attacks and multiple snort rules can be accurately set to protect the network from any unknown threats.  


Author(s):  
Mitsutaka Kimura ◽  
Mitsuhiro Imaizumi ◽  
Takahito Araki

Code error correction methods have been important techniques at a radio environment and video stream transmission. In general, when a server transmits some data packets to a client, the server resends the only loss packets. But in this method, a delay occurs in a transmission. In order to prevent the transmission delay, the loss packets are restored by the error correction packet on a client side. The code error correction method is called Hybrid Automatic Repeat reQuest (ARQ) and has been researched. On the other hand, congestion control schemes have been important techniques at a data communication. Some packet losses are generated by network congestion. In order to prevent some packet losses, the congestion control performs by prolonging packet transmission intervals, which is called High-performance and Flexible Protocol (HpFP). In this paper, we present a stochastic model of congestion control based on packet transmission interval with Hybrid ARQ for data transmission. That is, if the packet loss occurs, the data packet received in error is restored by the error correction packet. Moreover, if errors occur in data packets, the congestion control performs by prolonging packet transmission intervals. The mean time until packet transmissions succeed is derived analytically, and a window size which maximizes the quantity of packets per unit of time until the transmission succeeds is discussed.


Author(s):  
Ajay Kumar ◽  

Access to the internet is fast becoming a basic right given the plethora of information available on the net these days. In the current scenario, the issue of internet shutdown has become an important concern in India. Internet shutdown affects people socially, psychologically and economically. On one hand, many democratic countries of the world are discussing about digital freedom and human rights, while on the other hand, some countries including India are continuously practicing Internet shutdowns in different parts of their countries. India has become the top country of the world in terms of the numbers of Internet shutdowns. The Internet has become such a prominent source of information for all of us that when Internet connectivity is suspended, many people are affected as they depend on the Internet services for various purposes. Internet shutdown is not only harmful to democracy and governance but also to the economy of the country. Internet shutdowns are direct violations of digital freedom and human rights. The main objective of this paper is to argue that access to internet is a basic right and highlight the problem of Internet shutdown in India and its adverse impact on the lives of Indians. In addition, this paper attempts to highlight a brief history of Internet shutdowns in India. The paper shows how frequent clampdowns on internet affects the economy, as has been the case of Union Territory of Jammu & Kashmir thereby highlighting the case for internet freedom for the survival of the economy especially in Digital India.


2020 ◽  
Vol 7 (1) ◽  
pp. 22-28
Author(s):  
Vladimir Eliseev ◽  
Anastasiya Gurina

  Abstract— The paper investigates the causes of widespread use by cybercriminals of the Internet of Things for organizing network attacks and other illegal use. An analysis of existing approaches and technologies for protecting networked computer devices is presented, as well as the main factors that prevent their use in the world of Internet of Things. An approach is suggested that ensures the integration of protective mechanisms directly into the composition of Things. Various variants of technology implementation are considered. Key aspects and potential ways of implementing the proposed approach are noted.Tóm tắt— Bài báo nghiên cứu về các phương thức được tội phạm mạng sử dụng rộng rãi trong Internet vạn vật (IoT), để tổ chức các tấn công mạng và các hành vi bất hợp pháp khác. Bài báo phân tích các phương pháp và công nghệ hiện có để bảo vệ các thiết bị kết nối mạng, cũng như các yếu tố chính để ngăn chặn việc sử dụng chúng trong IoT. Cách tiếp cận được đề xuất là đảm bảo việc tích hợp các cơ chế bảo vệ trực tiếp vào cấu trúc của IoT. Bài báo cũng xem xét các biến thể khác của việc thực hiện công nghệ này. Từ đó, đưa ra lưu ý về các khía cạnh chính và cách thức cài đặt tiềm năng để thực hiện phương pháp được đề xuất. 


Author(s):  
Kenneth R. Walsh

Norwel Equipment Co. Limited Partnership (L.P.) is a Louisiana business retailer of construction equipment specializing in John Deere heavy-equipment and has secured exclusive John Deere rights for most of the State of Louisiana. Founded in 1972, Norwel is the sixth largest John Deere construction equipment dealer in the United States. This case illustrates business and technology issues facing Norwel. In mid-1999, the October 1st deadline for John Deeres requirement to communicate by e-mail was approaching and the response time of the Norwels primary computers system, an AS/400, was increasing to the point where users were not satisfied with performance. Also users were requesting new computing services such as e-mail, document sharing, and Internet access. For example, the Parts Operations Manger suggested selling parts online and the Manager of the Used Equipment Division suggest supporting the sales staff through Internet connections. Managing Partner, Richard Hevey decided an upgrade to the networks and a connection to the Internet were needed. He is faced with both short-term and long-term decisions about Norwels infrastructure.


Author(s):  
Noor Nahar Begum ◽  
Md Masudul Hassan

The rapid expansion of the internet provides the world great achievements both in social and economic life. E-commerce has become one of the serenest ways of doing business and has a persuasive impact on the economy. It is the set of transactions that have been conducted through internet connections and computer networks. This chapter aims to look at the cross-border e-commerce payments. Specially, the chapter has focused on the trends in e-commerce payments, methods of online payments, effects of cross-border e-commerce, factors affecting cross-border e-commerce payments, friction of cross-border e-commerce system, drivers and impediments of cross-border e-commerce, growth of cross-border e-commerce in emerging markets. Moreover, this chapter shows how information has become the blood of e-commerce. It has extensive effects on the economy, society, and indeed national security.


Sign in / Sign up

Export Citation Format

Share Document