1990
DOI: 10.1016/0140-3664(90)90004-z
|View full text |Cite
|
Sign up to set email alerts
|

Protocol analyser for the monitoring and analysis of OSI networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

1990
1990
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…In the world of the Internet, the Internet Protocol (IP) and the Transmission Control Protocol (TCP) are some of the most important protocols for data broadcast. Other protocols linked with these are the Post Office Protocol (POP), Simple Mail Transfer Protocol (SMTP), and Hypertext Transfer Protocol (HTTP) [12]. In communication both analog and digital are very important during file transfer and internet access.…”
Section: Communication and Network Protocolsmentioning
confidence: 99%
“…In the world of the Internet, the Internet Protocol (IP) and the Transmission Control Protocol (TCP) are some of the most important protocols for data broadcast. Other protocols linked with these are the Post Office Protocol (POP), Simple Mail Transfer Protocol (SMTP), and Hypertext Transfer Protocol (HTTP) [12]. In communication both analog and digital are very important during file transfer and internet access.…”
Section: Communication and Network Protocolsmentioning
confidence: 99%
“…ARQ and FEC are two main error control approaches often used. Generally speaking considering the way retransmission takes place, there are three types of ARQ protocols, namely, stop-and-wait (S-W), go-back-n , and selective repeat [1] [2].…”
Section: Error Control Schemesmentioning
confidence: 99%
“…There are two key error control strategies in WSN for maintaining reliable communication over noisy channels. The first one is Forward Error Correction (FEC) [1], which relies on transmission of redundant data to allow the receiver node to reconstruct the original messages. The second strategy is Automatic Repeat Request (ARQ) [2], in which high-rate detection codes are normally used and a transmission is requested if the received data is found to be erroneous.…”
Section: Introductionmentioning
confidence: 99%
“…Reliable data dissemination is traditionally guaranteed by applying error control protocols. The main shortcoming of these approaches is that they very often introduce energy or/and delay overheads as they add redundancy to the packets (Forward Error Correction) or to the transmission (retransmission based approaches) [1].…”
Section: Introductionmentioning
confidence: 99%