http protocol
Recently Published Documents


TOTAL DOCUMENTS

60
(FIVE YEARS 26)

H-INDEX

5
(FIVE YEARS 0)

2021 ◽  
Vol 6 (2) ◽  
pp. 71-80
Author(s):  
Hairatunnisa Hairatunnisa ◽  
Hapsoro Agung Nugroho ◽  
Relly Margiono

One of the determinants of the quality of magnetic data is continuous data, so we need a data transmission system that can continuously transmit observational data. In this research, a magnetometer communication system design was carried out with the concept of the Internet of Things (IoT) using the MQTT and HTTP protocol, where measurement data in the form of the x-axis, y-axis, z-axis, horizontal components, and total magnetic field components are displayed on the dashboard in real time and continuously. Testing the performance of sending data is done using the Wireshark, it is known that the MQTT protocol has a better delivery quality compared to the HTPP protocol with an average delay value of 0.0120 seconds, an average value of packet length of 54 bytes and a packet loss value of 0.11%, while the HTTP protocol has an average delay value of 0.0257 seconds, an average packet length value of 268.1 bytes and a packet loss value of 0.5%.


Author(s):  
Sanna Tariq

Abstract: Transformers are the main building block in a power system. Any damages in transformers adversely affects the balance of a power system. The damages are mainly occurring due to overloading and inefficient cooling. The main objective of the project is real time monitoring of the health conditions of the distribution transformer. . The parameters such as temperature, current, voltage, oil temperature, oil height, transformer temperature etc. of a transformer are monitored, processed and recorded in the servers.. The recorded data can be send using Wi-Fi module and accessed from anywhere around the world using IOT technology using HTTP protocol. This helps in identifying without human dependency. This helps in identifying and solving a problem before a failure without human dependency. The system also includes the thermal over load and automatic shut down protection of transformer. Keywords: Realtime Monitoring, Health condition, Wi-Fi module, IOT Technology, HTTP protocol.


Minerva ◽  
2021 ◽  
Vol 2 (6) ◽  
pp. 23-31
Author(s):  
Moreno Almanza Olmedo

This paper was designed with the intention of analyzing the vulnerability of e-commerce web sites. We are going to describe the transmission of data in clear text without encryption by hypertext transfer protocol (HTTP), reason why we argue that by means of a sniffer technique this information can be captured and this way violating customer privacy information.


Author(s):  
Hamza Zemrane ◽  
Youssef Baddi ◽  
Abderrahim Hasbi

The world knows a constant development of technology applied in different sectors of activities: health, factories, homes, transportation, and others, one of the big axes that take a lot of attention today is the drone’s field. To communicate information a fleet of drones can use different communication architectures: centralized communication architecture, satellite communication architecture, cellular network communication architecture and a specific AdHoc communication architecture called the UAANET drones architecture. In our work we focused specifically on the routing of information inside the UAANET where we analyze and compare the performances of the reactive protocol AODV and the proactive protocol OLSR, when the UAANET use an applications based on the HTTP protocol, the FTP protocol, the database queries, voice application, and video conferencing application.


2021 ◽  
Vol 19 ◽  
pp. 67-74
Author(s):  
Wojciech Łasocha ◽  
Marcin Badurowicz

The aim of the author of this article is analyze the performance of WebSocket and HTTP protocol and their comparison. For this purpose, was used equipment working in a local network consisting of server, two client computers, switch and self-created research web application. Using a test application was measured time of data transfer between clients and server as well server and clients. The tests included transmission 100-character texts in specified number of copies considering speed of hardware (laptops) and software (web browsers). Additionally, was investigated the impact of overhead and TLS encryption to performance. The obtained results have illustrated in the form of charts, discussed and appropriate conclusions drawn.


2021 ◽  
Author(s):  
Adam Serbinski

In this work, two enhancements are presented to improve the performance of complete web page delivery. The first enhancement is the addition of disk to memory prefetching in Apache HTTP Server. This results in the number of files served from the web server cache to increase by 27%. The second enhancement is an addition to the HTTP protocol, allowing for server to client prefetching. Server to client prefetching eliminates the need for the web client to request the embedded objects of web pages. This modification results in page load times reduced to as low as 24.5% of the non-prefetching page load times.


2021 ◽  
Author(s):  
Adam Serbinski

In this work, two enhancements are presented to improve the performance of complete web page delivery. The first enhancement is the addition of disk to memory prefetching in Apache HTTP Server. This results in the number of files served from the web server cache to increase by 27%. The second enhancement is an addition to the HTTP protocol, allowing for server to client prefetching. Server to client prefetching eliminates the need for the web client to request the embedded objects of web pages. This modification results in page load times reduced to as low as 24.5% of the non-prefetching page load times.


2021 ◽  
Vol 2 (1) ◽  
pp. 7-11
Author(s):  
Deddy Prayama ◽  
Yuhefizar ◽  
Amelia Yolanda

In particular, the method used in this research is a case study where previously the p3m.pnp.ac.id website still uses the http protocol. However http protocol does not have a method of securing data in its communication. The final result of this research is the design and implementation of the https protocol for data communication security that occurs between visitors and the p3m.pnp.ac.id website. The https protocol that has been implemented is tested to ensure the data traffic on the p3m.pnp.ac.id website is guaranteed to be safe and protected from possible piracy and data theft.  


Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 507
Author(s):  
Piotr Białczak ◽  
Wojciech Mazurczyk

Malicious software utilizes HTTP protocol for communication purposes, creating network traffic that is hard to identify as it blends into the traffic generated by benign applications. To this aim, fingerprinting tools have been developed to help track and identify such traffic by providing a short representation of malicious HTTP requests. However, currently existing tools do not analyze all information included in the HTTP message or analyze it insufficiently. To address these issues, we propose Hfinger, a novel malware HTTP request fingerprinting tool. It extracts information from the parts of the request such as URI, protocol information, headers, and payload, providing a concise request representation that preserves the extracted information in a form interpretable by a human analyst. For the developed solution, we have performed an extensive experimental evaluation using real-world data sets and we also compared Hfinger with the most related and popular existing tools such as FATT, Mercury, and p0f. The conducted effectiveness analysis reveals that on average only 1.85% of requests fingerprinted by Hfinger collide between malware families, what is 8–34 times lower than existing tools. Moreover, unlike these tools, in default mode, Hfinger does not introduce collisions between malware and benign applications and achieves it by increasing the number of fingerprints by at most 3 times. As a result, Hfinger can effectively track and hunt malware by providing more unique fingerprints than other standard tools.


Sign in / Sign up

Export Citation Format

Share Document