TITLE

Demystifying Data Transport

PUB. DATE
February 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Feb2006, Vol. 43 Issue 2, p46
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports focuses on Transmission Control Protocol/Internet Protocol (TCP/IP), the most common protocol for transmitting all types of data on computer networks in the U.S. It acts as a carrier for many other protocols. Its use in network security video is the basis for enabling images to be sent over the network and the Internet.
ACCESSION #
19982036

 

Related Articles

  • A GROUP KEY MANAGEMENT APPROACH FOR MULTICAST CRYPTOSYSTEMS. SARADHI, M.V. VIJAYA; KRISHNA, BH. RAVI // Journal of Theoretical & Applied Information Technology;2010, Vol. 12 Issue 1/2, p104 

    The security in the multicast communication in the large groups is the major obstacles for effectively controlling access to the transmitting data. The IP Multicast itself does not provide any specific mechanisms to control the intruders in the group communication. Group key management is mainly...

  • A multicast of thousands. Wilkinson, Scott // Electronic Musician;Feb98, Vol. 14 Issue 2, p40 

    Discusses nature of data transfer via the Transmission Control Protocol (TCP) as one of the main obstacles to high-quality and real-time streaming of audio and video on the Internet. Information on Internet Protocol (IP) multicasting; Purpose of the TCP; Examples of real-time protocols.

  • IP switching battle heats up. Lawson, Stephen // InfoWorld;12/23/96-12/30/96, Vol. 18/19 Issue 52/53, p39 

    Reports on a session at an Internet Engineering Task Force (IETF) meeting regarding the competition among internetworking vendors that impacts IS purchase decisions on combined routing/switching technology. Vendors' suggestions on a standard for IP switching; Delay in the adoption of Ipsilon...

  • Design for Remote Monitoring System of Digital Radio and Television Transmitter. DANG Hongshe; WANG Gang; ZHANG Ying // Applied Mechanics & Materials;2014, Issue 543-547, p908 

    In order to achieve the remote monitoring of transmitter running status, a transmitter architecture of remote monitoring system based on a three-layer C/S architecture is proposed, and the overall design of the system is presented. Compared with the traditional two layers structure, the function...

  • A Simulation Study of Scalable TCP and HighSpeed TCP in Geostationary Satellite Networks. Giovanni Giambene; Daniele Miorandi // Telecommunication Systems;Dec2005, Vol. 30 Issue 4, p297 

    This paper investigates the performance of two TCP enhancements (i.e., Scalable TCP and HighSpeed TCP), recently proposed for high-speed backbone networks with a very large bandwidth-delay product, in a geostationary satellite environment. Both persistent and elastic traffic patterns are...

  • Comparative Study of Different Adaptive Window Protocols. A. Kherani; B. Prabhu; K. Avrachenkov; E. Altman // Telecommunication Systems;Dec2005, Vol. 30 Issue 4, p321 

    We study an Adaptive Window Protocol (AWP) with general increase and decrease profiles in the presence of window dependent random losses. We derive a steady-state Kolmogorov equation, and then obtain its solution in analytic form for particular TCP versions proposed for high speed networks, such...

  • All Network Traffic is Headed Over IP. Gibson, Stan // PC Week;11/02/98, Vol. 15 Issue 44, p100 

    Comments on the importance of transmission control protocol/Internet protocol (TCP/IP) in the transmission of data. The increased expectations, which are being placed on TCP/IP, including virtual private networks (VPN); Why corporate networks are likely to move toward IP; Quality issues that...

  • TCP Variants and Network Parameters: A Comprehensive Performance Analysis. Islam, Shohidul; Kashem, M. A.; Sadid, W. H.; Rahman, M. A.; Islam, M. N.; Anam, S. // International MultiConference of Engineers & Computer Scientists;2009, p351 

    Transmission Control Protocol (TCP) includes eleven variants-Tahoe, FullTcp, TCP/Asym, Reno, Reno/Asym, Newreno, Newreno/Asym, Sack1, Fack, Vegas and VegasRBP as source and five-TCPSink, TCPSink/Asym, Sack1, DelAck and Sack1/DelAck as destination, implemented in Network Simulator (NS-2)....

  • CER/TER - THE NEW METRIC FOR TCP CONNECTION ROBUSTNESS EVALUATION AND COMPARISON. VONDROUS, Ondrej; MACEJKO, Peter; KOCUR, Zbynek // Advances in Electrical & Electronic Engineering;Dec2015, Vol. 13 Issue 5, p529 

    This article presents new metric for TCP connection robustness evaluation and comparison. This metric is focused on TCP connection and transmission continuity rather then on maximal throughput or minimal RTT. This metric is developed especially for evaluation of narrow band networks. That is why...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics