• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 13,271
Next 10 →

Security Problems in the TCP/IP Protocol Suite

by S. M. Bellovin , 1989
"... ..."
Abstract - Cited by 338 (15 self) - Add to MetaCart
Abstract not found

Covert Channels in TCP/IP Protocol Stack

by Boris Panajotov, Aleksandra Mileva , 2013
"... We give a survey of different techniques for hiding data in several protocols from the TCP/IP protocol stack. Techniques are organized according to affected layer and protocol. For every covert channel its data bandwidth is given. ..."
Abstract - Add to MetaCart
We give a survey of different techniques for hiding data in several protocols from the TCP/IP protocol stack. Techniques are organized according to affected layer and protocol. For every covert channel its data bandwidth is given.

Security Model for TCP/IP Protocol Suite

by M. Anand Kumar, Dr. S. Karthikeyan
"... Abstract—the Internet has instantly evolved into a vast global network in the growing technology. TCP/IP Protocol Suite is the basic requirement for today’s Internet. Internet usage continues to increase exponentially. So network security becomes a growing problem. Even though IPv6 comes with build ..."
Abstract - Add to MetaCart
Abstract—the Internet has instantly evolved into a vast global network in the growing technology. TCP/IP Protocol Suite is the basic requirement for today’s Internet. Internet usage continues to increase exponentially. So network security becomes a growing problem. Even though IPv6 comes with build

II. THE STRUCTURE OF THE LINUX TCP/IP PROTOCOL

by unknown authors
"... wide range of hardware, etc. It is popular because of its open source code and free available applications. The kernel of Linux supports a lot of CPU platforms, and it is a real multitask OS that provides virtual memory protection, demand loading and powerful network function. The network function i ..."
Abstract - Add to MetaCart
of documents introducing and analyzing the Linux kernel such as [4], [10], but the deep analysis of the TCP/IP protocol of Linux is still not available. This paper mainly focuses on the analysis and evaluation of the TCP/IP protocol stack of Linux. In the second part, the structure of the TCP/IP protocol

TYPES OF ADDRESSES AND LEVELS OF USE IN THE TCP/IP PROTOCOL STACK

by Gencho Stoitsov
"... Abstract. The publication comments on certain moments of the method of teaching the types of addresses and their use in the TCP/IP protocol stack. ..."
Abstract - Add to MetaCart
Abstract. The publication comments on certain moments of the method of teaching the types of addresses and their use in the TCP/IP protocol stack.

A Parallel TCP/IP Protocol Implementation

by Paul Mackerras, David Sitsky
"... . With the ever-increasing network data rates available, the throughput achieved on a connection over a fast network using a transport protocol such as TCP/ IP can easily be limited by the speed of the processor used to implement the transport protocol, rather than the network data rate. Distributin ..."
Abstract - Add to MetaCart
. With the ever-increasing network data rates available, the throughput achieved on a connection over a fast network using a transport protocol such as TCP/ IP can easily be limited by the speed of the processor used to implement the transport protocol, rather than the network data rate

The Design and Implement of TCP/IP Protocol Cluster on AVR Singlechip

by Rong Pan, Hai Zhao, Jialiang Wang, Dan Liu, Penghua Cai , 2010
"... With the rapid development of the embedded technology, research and implement of the Internet of things will be a new technology revolution, yet the implement of the Internet of things is on the base of the communication between the things. For this reason, realizing the function of communication be ..."
Abstract - Add to MetaCart
between singlechip is particularly important. Based on the characteristics of the embedded microcontroller, we analyzed the traditional PC TCP/IP protocol, and appropri-ately tailored TCP/IP protocol cluster on the basis of the characteristics of embedded singlechip. At last, we realized the reduced TCP/IP

Realization of TCP/IP Protocol Based on µC/OS-II System

by Feng Dong, Qian Wang
"... Abstract—The introduction of real-time operating system in embedded TCP/IP protocol stack, to support embedded devices access the network, become an important research direction in the field of embedded. Introduced the structure of the open source real-time operating system µC/OS-Ⅱ and method of tra ..."
Abstract - Add to MetaCart
Abstract—The introduction of real-time operating system in embedded TCP/IP protocol stack, to support embedded devices access the network, become an important research direction in the field of embedded. Introduced the structure of the open source real-time operating system µC/OS-Ⅱ and method

Security Problems and Their Defenses in TCP/IP Protocol Suite

by Karnati Hemanth, Talluri Ravikiran, Maddipati Venkat Naveen, Thumati Ravi
"... Protocol (TCP/IP) is combination of different protocols at various layers.TCP/IP is the basic communication language or protocol of the Internet and private networks either an intranet or an extranet. The TCP/IP suite has many design weaknesses so far as security and privacy are concerned. Some of t ..."
Abstract - Add to MetaCart
Protocol (TCP/IP) is combination of different protocols at various layers.TCP/IP is the basic communication language or protocol of the Internet and private networks either an intranet or an extranet. The TCP/IP suite has many design weaknesses so far as security and privacy are concerned. Some

Analysis and evaluation of the TCP/IP protocol stack of LINUX

by Guo Chuanxiong, Zheng Shaoren - In Proceedings of ICCT 2000 , 2000
"... Abstract-With the rapid progress of high-speed network technology, the communication speed between hosts will reach giga bls. So i t is important to investigate the traditional TCPllP protocol stack to find out whether i t is suitable for high-speed communication and can provide QoS or not. Based on ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
, the time consuming of each layer and the queuing of the IP layer a t high speed are tested. Our experiments show that the throughput of TCP/IP stack of LINUX can reach 360MbitIs a t the sending side and ISOMbit/s when the localhost device is used at bi-direction, the protocol stack can be improved
Next 10 →
Results 1 - 10 of 13,271
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University