نتایج جستجو برای: packet modification

تعداد نتایج: 169396  

Journal: :RFC 2009
Aleksandar Kuzmanovic Amit Mondal Sally Floyd K. K. Ramakrishnan

The proposal in this document is Experimental. While it may be deployed in the current Internet, it does not represent a consensus that this is the best possible mechanism for the use of Explicit Congestion Notification (ECN) in TCP SYN/ACK packets. This document describes an optional, experimental modification to RFC 3168 to allow TCP SYN/ACK packets to be ECN-Capable. For TCP, RFC 3168 specif...

2004
Christian Kreibich

We present a framework for inspection, visualization, and modification of tcpdump packet trace files. The system is modularized into components for distinct application purposes, readily extensible, and capable of handling trace files of arbitrary size and content. We include experiences of using the system in several real-world scenarios.

2009
A. Kuzmanovic A. Mondal

The proposal in this document is Experimental. While it may be deployed in the current Internet, it does not represent a consensus that this is the best possible mechanism for the use of Explicit Congestion Notification (ECN) in TCP SYN/ACK packets. This document describes an optional, experimental modification to RFC 3168 to allow TCP SYN/ACK packets to be ECN-Capable. For TCP, RFC 3168 specif...

2009
A. Kuzmanovic A. Mondal

The proposal in this document is experimental. While it may be deployed in the current Internet, it does not represent a consensus that this is the best possible mechanism for the use of ECN in TCP SYN/ACK packets. This draft describes an optional, experimental modification to RFC 3168 to allow TCP SYN/ACK packets to be ECN-Capable. For TCP, RFC 3168 only specifies setting an ECN-Capable codepo...

2015
C. A. B. K. A. F. O. D. Festus A.

The major principle of multicast communication is that each data packet sent from one source must reach all the receivers exactly as it originates from the source without any modification on the way. For information to be authentic there is the need to ensure that the information is from where they claim to come from and that security requirements are put in place. In multicast applications, wh...

2004
Georg Carle

ATM Forum Technical Committee ATMF 95-1438 **************************************************************************************** Title: Reliable Multicast Service Needs Cell-Level FEC Scheme **************************************************************************************** Abstract: A number of protocol architectures for the provision of scalable reliable multicast services over the In...

Journal: :Informatica, Lith. Acad. Sci. 2004
Vytautas Perlibakas

In this article we propose a novel Wavelet Packet Decomposition (WPD)-based modification of the classical Principal Component Analysis (PCA)-based face recognition method. The proposed modification allows to use PCA-based face recognition with a large number of training images and perform training much faster than using the traditional PCA-based method. The proposed method was tested with a dat...

2001
Francesco Palmieri Dario Petriccione

We propose an algorithm to compute a modification of the classical discrete Karhunen-Loeve Transform (KLT) useful when some of the coefficients are randomly unavailable for reconstruction. Such a scheme can provide Multiple Description Coding (MDC) for signals and images transported by lossy packet links. The modification of the KLT is based on a “correlating” block that, from knowledge of the ...

Journal: :International Journal of Sensor Networks 2021

Industrial control systems (ICSs) are more vulnerable to cyber threats owing their network connectivity. The intrusion detection system(IDS) has been deployed detect sophisticated cyber-attack but the existing IDS uses packet header information for traffic flow detection. is inefficient deformation; therefore, we propose adoption of payload in respond a variety attacks and high performance. Our...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علم و صنعت ایران 1379

پروژه حاضر در راستای فراهم آوردن بستری مناسب جهت بکارگیری کامپیوترها در انجام عملیات کنترل سوئیچینگ و مدیریت شبکه در مرکز تلفن ده هزار شماره ای ساخته شده در مرکز تحقیقات مخابرات ایران است . با استفاده از قدرت پردازش بالای کامپیوترهای امروزی امکان توسعه ظرفیت این مرکز تلفن نیز به سهولت فراهم می شود. در ادامه این مقدمه در فصل اول اجزای یک شبکه ارتباط داده معرفی می گردد و نقش و جایگاه متمرکزکننده ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید