نتایج جستجو برای: transport protocol

تعداد نتایج: 514843  

Journal: :RFC 2009
Brian Adamson Carsten Bormann Mark Handley Joseph P. Macker

This document describes the messages and procedures of the NegativeACKnowledgment (NACK) Oriented Reliable Multicast (NORM) protocol. This protocol can provide end-to-end reliable transport of bulk data objects or streams over generic IP multicast routing and forwarding services. NORM uses a selective, negative acknowledgment mechanism for transport reliability and offers additional protocol me...

2007
Dmitrij Lagutin

Induced traffic: Ad hoc wireless networks use multi-hop radio relaying, and a link-level transmission affects neighbor nodes of both sender and receiver of the link. This induced traffic affects throughput of the transport layer protocol. Induced throughput unfairness: Some MAC protocols, like IEEE 802.11 DCF, may add throughput unfairness to the transport layer. A transport layer protocol need...

2000
M. Krueger R. Haagens C. Sapuntzakis M. Bakke

The IP Storage Working group is chartered with developing a protocol to transport the Small Computer Systems Interface (SCSI) protocol over the internet. The iSCSI protocol will define a mapping of SCSI transport protocol over TCP/IP so that SCSI storage controllers (principally disk and tape arrays and libraries) can be attached to IP networks, notably Gigabit Ethernet (GbE) and 10 Gigabit Eth...

2009
Allaa Kamil Gavin Lowe

We adapt the Strand Spaces model to reason abstractly about layered security protocols, where an Application Layer protocol is layered on top of a secure transport protocol. The model abstracts away from the implementation of the secure transport protocol and just captures the properties that it provides to the Application Layer. We illustrate the usefulness of the model by using it to verify a...

Journal: :CoRR 2017
P. M. Duong T. T. Hoang T. Q. Vinh

In this paper, we introduce a novel approach in controlling robot systems over the Internet. The Real-time Transport Protocol (RTP) is used as the communication protocol instead of traditionally using TCP and UDP. The theoretic analyses, the simulation studies and the experimental implementation have been performed to evaluate the feasibility and effectiveness of the proposed approach for pract...

1996
W. Timothy Strayer

Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the foc...

2007
Ling Xiang Michael G. Kay John Telford

A public logistics network (PLN) is proposed as an alternate network to private logistics networks for the ground transport of parcels. In a PLN, a pricing protocol is used to coordinate the operation of the network. The goal of the proposed protocol is to match the load that values transport the highest with the truck that can provide that service at the least cost. This protocol has been impl...

2005
Haowei Bai Shaojian Fu Mohammed Atiquzzaman HAOWEI BAI SHAOJIAN FU MOHAMMED ATIQUZZAMAN

In this chapter, we discuss the transport layer design issues in a mobile wireless networks. The focus will be put on two transport protocols: Transmission Control Protocol (TCP) and Stream Control Transmission Protocol (SCTP). TCP is the dominant transport protocol currently used for most Internet services such as Web browsing, file transfer, remote login etc. SCTP is a recently developed prot...

2006

The future of Internet transport is unreliable: fast-growing applications like streaming media and telephony prefer timeliness to reliability, and thus prefer UDP to TCP. Unfortunately, UDP lacks congestion control, so these applications are unsafe for use on underprovisioned best-effort networks unless they implement congestion control themselves—a difficult task. They might, however, happily ...

2003
Parveen Patel David Wetherall Jay Lepreau Andrew Whitaker

This paper argues that transport protocols such as TCP provide a rare domain in which protocol extensibility by untrusted parties is both valuable and practical. TCP continues to be refined despite more than two decades of progress, and the difficulties due to deployment delays and backwards-compatibility are well-known. Remote extensibility, by which a host can ship the transport protocol code...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید