Skip to main content
Over the years, the Internet has been enhanced with new accessible correspondence advancements, for both fixed and versatile organizations and gadgets, showing a significant development in terms of execution, with consistently expanding... more
Objective is to Use Packet Tracer to build the lab schematic as shown above. Scenario This topology represents a more complex routed network, ideal for summarizing all of the lab exercises for the module.
VMware guest machines are able to communicate with their host using a special kind of sockets called " vsockets ". These sockets can be used even if the typical TCP/IP network protocols are not available at the guest. Since " vsockets "... more
Recently, Long-Term Evolution (LTE) is the result of ongoing work by the Third Generation Partnership Project (3GPP) toward Fourth Generation (4G) systems. LTE will be used for mobile, fixed and portable wireless broadband access, and... more
—Denial of Service (DoS) or Distributed Denial of Service (DDoS) is a powerful attack which prevents the system from providing services to its legitimate users. Several approaches exist to filter network-level attacks, but... more
Cette application consiste à réaliser un programme informatique qui contrôler un moteur pas-à-pas sur un CAN bus au travers un réseau Ethernet. Pour ce faire, nous avons décidé que l'application qui envoi et reçoit les messages sur le bus... more
The TCP/IP protocol suite is known to be lacking security in many aspects, which may allow an attacker to leverage them using some techniques in the form of covert communications. Secret messages could be embedded into one of the TCP/IP... more
TCP over wireless networks
International Organization for Standardization (ISO) membuat suatu arsitektur komunikasi yang dikenal sebagai Open System Interconnection (OSI) model yang mendefinisikan standar untuk menghubungkan komputer-komputer dari vendor-vendor... more
The TCP/IP protocol suite was created as an internetworking solution with little or no regard to security aspects. The development of TCP/IP protocol suite was focused on the creating a communication protocol standard that can... more
Many previous studies have shown that traditional TCP slow-start algorithm suffers performance degradation in high-speed and long-delay networks. This paper presents a sender-side enhancement, which makes use of TCP Vegas... more
This report describes the experiments performed for the project assigned in the Advanced Networking course during the 2011-2012 academic year. Our aim was to conduct some tests, in different scenarios, of the TCP Westwood+ congestion... more
Sot gjithnje e me shume kemi nje zhvillim te teknologjise e cila eshte ne funksion te permiresimit te kualitetit te jetes te njerezve ane e mbane botes. Dhe megjithese jemi nje shtet i ri, dhe ne fazat e hershme te zhvillimit konsideroj... more
Em uma rede IP, antes que os dispositivos possam se comunicar, eles precisam ter seus próprios endereços IP. Há duas maneiras de configurar um endereço IP em um dispositivo:  Atribuir estaticamente um endereço IP. Isso significa,... more
There is a slight difference between Computer Science (CS) and Computer Engineering research. The fundamental knowledge underlying computing research is from philosophy. Philosophical research is characterized by abstract academic... more
Recent advancements in the field of Internet of Things (IoT) have turned this area in one of the most promising research topics to bring innovative and useful technologies in the future. Solutions for a low-cost and efficient Home... more
Manual Linux, Configuration LAN, TCP/IP
The number of edge devices has been increasing exponentially since the advent of computing devices, this has been accelerated by the gaining popularity and accessibility provided by networks mainly the Internet, the development and... more
Qu'est ce que TCP/IP ? TCP/IP est un ensemble de protocoles routables (i. e on peut faire passer des paquets d'un segment à un autre), standards, pour les réseaux d'entreprises. Tous les systèmes d'exploitation prennent en charge TCP/IP... more
The term 'Information Technology' evolved in the 1970s and if we consider a medium or large company providing goods or services, its information technology department will be responsible for storing, protecting, processing, retrieving and... more
Para se falar das portas primeiro tem que se falar da camada de transporte porque a função da camada de transporte é o de fornecer comunicação lógica entre processos de aplicação em diferentes hospedeiros. Os protocolos de transporte são... more
Since the Internet of Things (IoT) is gaining acceptance worldwide, manufacturers have proposed cheap modules and development boards for its implementation. Even if those devices have been in the markets for some years, just a few studies... more
This paper is about an RFID based smart gate entry control system (GECS) which is developed for the employees of an organization to supervise and record their entry related activity. Entire system is developed with low frequency RFID... more
Port Scanning is a method which is used in the vulnerability Detection of a host Machine. Port scanning is a phase in footprinting and scanning; this comes in reconnaissance which is considered as the first stage of a computer attack.... more
Pengertian Umum
Jaringan komputer adalah hubungan dua atau lebih computer yang memungkinkan komputer dalam
jaringan untuk saling berbagi data dan sumber daya.
Yapay Sinir Ağlarının, DDos benzeri saldırıların engellenmesinde kullanması, farklı iki senoryaya göre karşılaştırılmasının incelenmesi.