Search


PDF Archive search engine
Last database update: 16 October at 16:50 - Around 76000 files indexed.


Show results per page

Results for «packets»:


Total: 200 results - 0.049 seconds

1569926793 100%

Due to sparse deployments, some nodes are likely to become bottlenecks of the network because they have to forward packets of many other nodes.

https://www.pdf-archive.com/2014/12/27/1569926793/

27/12/2014 www.pdf-archive.com

Atmel-Kontiki 97%

(2) With a 802.15.4 USB Stick and a software called Wireless Protocol Analyzer it is possible to sniff the packets in a specific channel (in this case, channel 25 was used) RPL Collect:

https://www.pdf-archive.com/2011/09/08/atmel-kontiki/

08/09/2011 www.pdf-archive.com

p2 1-1 97%

After receiving three data packets, a node will calculate the link breakage time and compare it with a fixed threshold.

https://www.pdf-archive.com/2017/03/21/p2-1-1/

21/03/2017 www.pdf-archive.com

test 95%

Raise two main advantages of packet switching, compared to message switching 1) Possibility to breaking long messages into multiple packet 2) Packets can be delivered and reassembled at destination 2.

https://www.pdf-archive.com/2017/12/19/test/

19/12/2017 www.pdf-archive.com

Taming Asymmetric Network Delays 93%

For example, authenticated sequence numbers can guard against malicious dropping of packets, and signed messages or message digests can ensure the integrity of the message content.

https://www.pdf-archive.com/2017/12/16/taming-asymmetric-network-delays/

16/12/2017 www.pdf-archive.com

Thread Usage of 6LoWPAN white paper v2 public 93%

To satisfy these requirements, the 6LoWPAN adaptation layer employs several different techniques such as packet fragmentation and header compression (for the IPv6 header and transport headers such as UDP (User Datagram Protocol)) to ensure the successful delivery and reception of IPv6 packets coming to and from devices in the home.

https://www.pdf-archive.com/2015/11/18/thread-usage-of-6lowpan-white-paper-v2-public/

18/11/2015 www.pdf-archive.com

IHMSC.2017.132 93%

These data packets do not have obvious features and firewalls cannot decrypt these data, which result in that firewalls cannot detect and interfere these data.

https://www.pdf-archive.com/2017/10/11/ihmsc-2017-132/

11/10/2017 www.pdf-archive.com

Homework6-7-8 90%

a) What address does a source host need to send and receive IP Packets?

https://www.pdf-archive.com/2017/04/25/homework6-7-8/

25/04/2017 www.pdf-archive.com

SNORT-Presentation-Ariful 88%

■ Port Mirroring – A network traffic monitoring method that involves a switch sending copies of all network packets seen on one port to another port, where said packet can be analyzed Purpose/Background ■ “An Introduction to Applying Network Intrusion Detection for Industrial Control Systems” ■ A primer on intrusion detection ■ Methods commonly used by hackers to get through networks ■ How to tell if a network’s security has been compromised ■ How to properly segment networks and deploy an intrusion detection system (IDS) ■ Mitigate advanced persistent threats (APTs) Snort Primer ■ Okay we will be next talking about the background talk on how Snort works and show a demonstration of it working.

https://www.pdf-archive.com/2017/04/07/snort-presentation-ariful/

07/04/2017 www.pdf-archive.com

Thread Border Router white paper v2 public 88%

• Outgoing packets from the Thread Network interface will be forwarded to the exterior interface(s).

https://www.pdf-archive.com/2015/11/18/thread-border-router-white-paper-v2-public/

18/11/2015 www.pdf-archive.com

Jan28 87%

Sale of Red Packets Sale of Red Packets Sale of Red Packets not a part of any small group Bible study?

https://www.pdf-archive.com/2018/01/24/jan28/

24/01/2018 www.pdf-archive.com

SecureWinsock 85%

Shawn Andrews (BSc hon.) saportfolio.ca Introduction This report details cryptography techniques that can be used in winsock application with wincrypt to perform secure message communication between winsock applications running in untrusted network while preventing man-in-the-middle attacks and forgery of packets.

https://www.pdf-archive.com/2016/01/02/securewinsock/

02/01/2016 www.pdf-archive.com

China s Maxim Leave No Access Point Unexploited 83%

How to Hijack the Net Successfully hijacking the net requires understanding how to manipulate key structures in contractual and regulatory agreements about who moves information packets to whom across the internet.

https://www.pdf-archive.com/2019/12/26/china-s-maxim---leave-no-access-point-unexploited/

26/12/2019 www.pdf-archive.com

FAQ July 2014 82%

Why are some packets larger than parcels?

https://www.pdf-archive.com/2016/09/20/faq-july-2014/

20/09/2016 www.pdf-archive.com

Richardson Scholarship 2017 80%

Deadline All application packets must be postmarked by Friday, April 15, 2017.

https://www.pdf-archive.com/2017/03/19/richardson-scholarship-2017/

19/03/2017 www.pdf-archive.com

HBCU Scholarship 2017 80%

Deadline All application packets must be postmarked by Friday, April 15, 2017.

https://www.pdf-archive.com/2017/03/19/hbcu-scholarship-2017/

19/03/2017 www.pdf-archive.com

Wyatt Scholarship 2017 80%

Deadline All application packets must be postmarked by Friday, April 15, 2017.

https://www.pdf-archive.com/2017/03/19/wyatt-scholarship-2017/

19/03/2017 www.pdf-archive.com