"OSI protocols" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 13 of 50 - About 500 Essays
  • Powerful Essays

    AEROMAN: A Novel Architecture to Evaluate Routing Protocols for Multi-hop Ad-hoc Networks Lan Tien Nguyen School of Information Science Japan Advanced Institute of Science and Technology Email: lannt@jaist.ac.jp Razvan Beuran Hokuriku Research Center National Institute of Information and Communications Technology Email: razvan@nict.go.jp Yoichi Shinoda School of Information Science Japan Advanced Institute of Science and Technology Email: shinoda@jaist.ac.jp Abstract—In this paper‚ we

    Premium Wireless networking Routing protocol Computer network

    • 5810 Words
    • 24 Pages
    Powerful Essays
  • Powerful Essays

    Simulation & Performance Evaluation of AODV Protocol with QoS (Quality of Service) Prof. N. A. Dawande Associate Professor Dr. D Y Patil College of Engineering Talegaon‚ Pune‚ India profdawande@yahoo.com Dr. P. M. Patil Principal & Professor RMD Sinhgad College of Engineering WarjeMalwadi‚ Pune-58 pmpatil@gmail.com Abstract: Ad hoc mobile networking is a current active research area. They can be used in agriculture for monitoring and control of environmental parameters in the form

    Premium Routing Computer network Routing protocol

    • 4228 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    CHAPTER TWO LITERATURE REVIEW ON VoIP 2.0 Background of VoIP The first implementation of transmitting voice over the network was in 1973 through Network Voice Protocol (NVP) which was invented for Advanced Research Projects Agency Network (ARPANET). In 1990’s‚ there were a lot of VoIP applications that faced the problem of incompatibility due to fundamental differences between different vendors. Therefore‚ standards‚ specifications and interoperability guidelines were founded in May 1996 to standardize

    Premium Internet Protocol Telephone Internet

    • 3452 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Development of dynamic routing protocols is a huge challenge in the design of Ad hoc networks which can proficiently find routes among. These protocols are classified into hybrid‚ pro-active and reactive routing protocols [3] and the identification of the most appropriate routing protocol to be used depends on various facts which are scalability‚ traffic and mobility models and quality of service. The CBR (Constant Bit Rate) and TCP (Transmission Control Protocol) are mobility and traffic models

    Premium Transmission Control Protocol Routing

    • 8219 Words
    • 33 Pages
    Powerful Essays
  • Satisfactory Essays

    Protocol numbers are used to configure firewalls‚ routers‚ and proxy servers. In Internet Protocol version 4 (IPv4‚ Request for Comments [RFC] 791I)‚ the protocol number can be found in the Protocol field of an IP header.ICMP Echos are used mostly for troubleshooting. When there are 2 hosts which have communication problems‚ a few simple ICMP Echo requests will show if the 2 hosts have their TCP/IP stacks configured correctly and if there are any problems with the routes packets are taking in order

    Premium

    • 433 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Dq 1 and 2 Week 4

    • 1894 Words
    • 8 Pages

    understand that the OSI model is broken down into seven layers and each layer has a job to do I was wondering which of these layers would be most important in developing security protocols for my company? Since no one else answered this one I thought I would take a stab at what I would say to my “potential client” if I was asked this very legitimate question during my hypothetical meeting. Here goes: When it comes to developing security protocols for your organization the OSI model will play a

    Premium OSI model IP address OSI protocols

    • 1894 Words
    • 8 Pages
    Good Essays
  • Good Essays

    7 Layers of the Osi Model

    • 767 Words
    • 4 Pages

    The Seven Layers of the OSI Model Kevin Ludwig Bryant and Stratton College TECH 140 Khaled Sabha 12.08.2009 There are seven layers in the OSI model. Each layer has a function or purpose that is used to set up a network. The International Organization for Standardization began to develop the OSI framework in 1984. The purpose was to have each layer interact with the layer directly beneath it. The layers are starting from the top: Application‚ Presentation‚ Session‚ Transport‚ Network

    Premium Management Marketing Strategic management

    • 767 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Network Analysis and Design Lab 2 Packet Tracer Protocol Visualization with Packet Tracer Learning Objectives: 1. 2. 3. Explore Packet Tracer Real-Time Mode and Simulation Mode Explore logical workspace To become familiar with building topologies in Packet Tracer Step 1: Draw the following topology (make sure you are in Real-Time Mode) Figure 1 Step 2: Configure IP Addresses and Subnet Masks on the hosts. Use the following information to configure IP addresses‚ subnet masks and DNS Server

    Premium IP address Web server Dynamic Host Configuration Protocol

    • 1500 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Assessment Worksheet Decoding an FTP Protocol Session for Forensic Evidence Cybercrime Forensics Course Name and Number: _____________________________________________________ Sara Komisarz Student Name: ________________________________________________________________ Abena Shaw Instructor Name: ______________________________________________________________ 01/18/2015 Lab Due Date: ________________________________________________________________ Overview In this lab‚ you used two very powerful forensic

    Free File Transfer Protocol Internet

    • 381 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Firewalls

    • 964 Words
    • 4 Pages

    packet filtering firewall makes decisions about which network traffic to allow by examining information in the IP packet header such as source and destination addresses‚ ports‚ and service protocols. A packet filtering firewall: * Uses access control lists (ACLs) or filter rules to control traffic. * Operates at OSI layer 3 (Network layer). * Offers high performance because it only examines addressing information in the packet header. * Can be implemented using features that are included in

    Premium OSI model IP address OSI protocols

    • 964 Words
    • 4 Pages
    Good Essays
Page 1 10 11 12 13 14 15 16 17 50