Skip to search formSkip to main contentSkip to account menu

Iperf3

Iperf is a commonly used network testing tool that can create Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) data streams and… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Smart cities require intelligent transportation systems where the communication is based on edge/fog/cloud computing. The… 
2018
2018
Mission critical applications depends on the communication among other systems and/or users and thus, the traffic/flows generated… 
2017
2017
The Raspberry Pi has become one of the most popular devices used in the internet of things studies because of its flexibility and… 
2017
2017
Wide area sensor networks have numerous agricultural, industrial, scientific, medical, and military applications. For many years… 
2015
2015
Cloud Computing is a rapidly growing branch of distributed computing. There have been many proposed open source cloud… 
2014
2014
This work demonstrates the use of Transport Control Protocol (TCP) and User Datagram Protocol (UDP) data traffic measurement and… 
2014
2014
...................................................................................................................................... iv Table of Contents ...................................................................................................................... v List of Figures ........................................................................................................................... xi Chapter 1. Introduction ......................................................................................................... 1 1.1 Problem Statement .................................................................................................... 2 1.2 Contribution ................................................................................................................ 3 1.3 Thesis Organization .................................................................................................. 4 Chapter 2. Background .......................................................................................................... 6 2.1 Origins of SCADA ........................................................................................................ 7 2.2 SCADA Architecture ................................................................................................... 8 2.2.1 Control Center ................................................................................................................................... 8 2.2.2 Operator Interface ........................................................................................................................ 10 2.2.3 Field Devices ................................................................................................................................... 10 2.3 Wide-­‐Area SCADA Networks ............................................................................... 11 2.3.1 Wired Communications .............................................................................................................. 11 2.3.2 Wireless Communications ......................................................................................................... 11 2.4 Common SCADA Communication Protocols ................................................... 12 2.4.1 Modbus Protocol ............................................................................................................................ 12 2.4.2 DNP3 Protocol ................................................................................................................................ 13 2.5 SCADA Convergence ............................................................................................... 14 Chapter 3. SCADA and Security ........................................................................................ 16 3.1 Current State of SCADA Security ........................................................................ 16 3.1.1 The Importance of SCADA Security ....................................................................................... 17 3.1.2 SCADA Security Incidents .......................................................................................................... 18 3.1.3 SCADA Security Standards ........................................................................................................ 19 3.1.3.1 NIST System Protection Profile .......................................................................... 20 3.1.3.2 ISA-­‐SP99 ....................................................................................................................... 20 3.1.3.3 AGA-­‐12 Documents .................................................................................................. 20 
2013
2013
Abstract : In disadvantaged grids, communication resources are scarce and variable. Thus, it is important that middleware and… 
2009
2009
This paper examines a WiMedia UWB product by performing comprehensive throughput measurements and a path loss and link budget… 
2008
2008
Network performance measurement and prediction is one of the most prominent and indispensable components in distributed computing…