Information technology. Telecommunications and information exchange between systems. Use of OSI applications over the internet transmission control protocol (TCP)

2015 ◽  
2020 ◽  
Vol 16 (1) ◽  
pp. 19-24
Author(s):  
Pether V B Romony ◽  
Lanny Sitanayah ◽  
Junaidy B Sanger

Asap rokok adalah salah satu asap beracun yang berbahaya bagi kesehatan manusia dari sisi biologis maupun sisi kimiawi. Pada penelitian ini, penulis mengimplementasikansebuah sistem deteksi asap rokok berbasis The Internet of Things menggunakan sensor MQ135, Arduino board dan NodeMCU. Kemudian, penulis melakukan perbandingan Quality of Service dari dua protokol komunikasi data, yaitu Transmission Control Protocol dan User Datagram Protocol pada sistem tersebut. Parameter Quality of Service yang dibandingkan saat proses pengiriman data adalah delay dan data loss. Untuk setiap protokol, simulasi dilakukan selama 1 jam dengan pengiriman data setiap 5 detik, 10 detik, sampai 1 menit. Hasil yang diperoleh adalah data loss dengan Transmission Control Protocol lebih rendah dari pada data loss dengan User Datagram Protocol, sedangkan delay dengan User Datagram Protocol lebih rendah dari pada delay dengan Transmission Control Protocol.


Author(s):  
Suherman Suherman ◽  
Deddy Dikmawanto ◽  
Syafruddin Hasan ◽  
Marwan Al-Akaidi

<span>Transmission control protocol provides reliable communication between two or more parties. Each transmitted packet is acknowledged to make sure successful deliveries. Transport layer security protocols send security information exchange as TCP loads. As results, the handshaking stage experiences longer delay as TCP acknowledgement process has already been delay prone. Furthermore, the security message transfers may have their own risks as they are not well protected yet. This paper proposes TCP-embedded three pass protocol for dynamic key exchange. The key exchange is embedded into TCP headers so that transmission delay is reduced, and message transfer is secured. The proposed protocol was assessed on self network by using socket programming in lossless environment. The assessments showed that the proposed protocol reduced three-pass protocol message transfer delay up to 25.8% on lossless channel. The assessment on security also showed that TCP-embedded three pass protocol successfully secured each transmitted TCP load using a unique key; that is much securer than the compared method.</span>


2006 ◽  
Vol 38 (4) ◽  
pp. 1132-1154
Author(s):  
Teunis J. Ott

The ‘square root formula’ in the Internet transmission control protocol (TCP) states that if the probability p of packet loss becomes small and there is independence between packets, then the stationary distribution of the congestion window W is such that the distribution of W√p is almost independent of p and is completely characterizable. This paper gives an elementary proof of the convergence of the stationary distributions for a much wider class of processes that includes classical TCP as well as T. Kelly's ‘scalable TCP’. This paper also gives stochastic dominance results that translate to a rate of convergence.


Author(s):  
Agnieszka Chodorek

One of the most popular transport protocols—Transmission Control Protocol (TCP)—has a long history. The first document describing TCP protocol in early stages was published in 1974. Since then, TCP specification was changed several times, and finally in 1981 was standardised by RFC 793 (Postel, 1981). Two years later TCP, together with Internet Protocol (IP), became the official protocol suite of the Internet. In the same year the first widely available implementation of TCP in the 4.2 BSD operating system was built.


Sign in / Sign up

Export Citation Format

Share Document