Search
Search Results
-
Protokolle: UDP/IP
Dieses Kapitel stellt das Protokoll UDP/IP vor und zeigt dessen Verwendung in Java -
UDP-Konzepte und -Protokollmechanismen
UDP ist im Gegensatz zu TCP ein Transportprotokoll für die verbindungslose und ungesicherte Kommunikation. Wenn es also für eine Anwendung akzeptabel... -
TCP, UDP und QUIC Internals Protokolle und Programmierung
Das Lehrbuch vermittelt praxisbezogen wichtige Grundkonzepte der Datenkommunikation mit einem Fokus auf den wichtigsten Transportprotokollen des...
-
Programmierung von TCP- und UDP-Anwendungen
Viele Kommunikationsanwendungen werden heute auf Basis der Socket API entwickelt. Höhere Kommunikationsmechanismen wie Remote Procedure Call (RPC),... -
UDP/IP Clients, Servers, and Concepts
In this video we will begin using Sockets by demonstrating how to create a Client / Server IPC mechanism using UDP/IP. Your first IPC mission is to... -
Kommunikation mit UDP
Das User Datagram Protocol (UDP) stellt grundlegende Funktionen zur Verfügung, um mit geringem Aufwand Daten zwischen kommunizierenden Prozessen... -
QUIC – UDP-Based Multiplexed and Secure Transport
Die Initiative für die Entwicklung von QUIC ging von Google aus. Das Unternehmen entwickelte im Jahr 2012 das Protokoll mit der Bezeichnung „Quick... -
Post-quantum DNSSEC over UDP via QNAME-Based Fragmentation
In a typical network, any DNS message exceeding the recommended size of 1232 bytes would 1) either be fragmented into several UDP/IP packets 2) or... -
UDP State Manipulation: Description of a Packet Filtering Vulnerability in Stateful Firewalls
Firewalls are essential components for security enforcement in a network, as they are the first layer of protection from unwanted traffic and... -
Performance of UDP in Comparison with TCP in Vehicular Communication Networks
If the physical medium is error-prone, the congestion control mechanisms implemented by using transmission control protocol (TCP) might generate some... -
Optimizing WiMAX Network Performance with IP Security: An Evaluation of TCP and UDP Applications
This paper evaluates the performance of Internet Protocol Security (IPSec) in the TCP layer for the WiMAX network. The demand for security in data... -
UDP oder wenn es besonders schnell gehen muss
Für den normalen Datenverkehr im Netz ist Sorgfalt oberstes Gebot. Modernes Streaming ist dafür aber zu ungeduldig. Hier schlägt die Stunde von UDP. -
A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries
Distributed Reflective Denial of Service (DRDoS) attacks exploit Internet facing devices with the purpose to involve them in DoS incidents. In turn,... -
Molecular docking and dynamic simulation of UDP-N-acetylenolpyruvoylglucosamine reductase (MurB) obtained from Mycobacterium tuberculosis using in silico approach
The UDP-N-acetylenolpyruvoylglucosamine reductase (MurB) catalyzes the final steps of the UDP-N-acetylmuramic acid (UDPMurNAc) formation in the...
-
UDP Protocol
This chapter is very short because UDP is quite simple. The differences between TCP and UDP are emphasised. The environments where the protocol UDP... -
A secure architecture for TCP/UDP-based cloud communications
Cloud communication is an intrinsic aspect of cloud architecture. It is an internet-based communication that enables access to millions of cloud...
-
FastUDP: a highly scalable user-level UDP framework in multi-core systems for fast packet I/O
Nowadays, many applications, e.g., network routers, distributed data process engines, firewall, need to transfer packets at linear rate. With the...
-
Experimental study of QoE improvements towards adaptive HD video streaming using flexible dual TCP-UDP streaming protocol
The Flexible Dual TCP-UDP Streaming Protocol (FDSP) combines the reliability of TCP with the low latency of UDP, thus providing transport layer...
-
TurboTLS: TLS Connection Establishment with 1 Less Round Trip
We show how to establish TLS connections using one less round trip. In our approach, which we call TurboTLS, the initial client-to-server and... -
DNS-Morph: UDP-Based Bootstrapping Protocol for Tor
Tor is a popular system for anonymous communication and censorship circumvention on the web, this puts Tor as a target for attacks by organizations...