Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,553 papers from all fields of science
Search
Sign In
Create Free Account
Iperf3
Iperf is a commonly used network testing tool that can create Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) data streams and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Bandwidth management
Client (computing)
Cygwin
Datagram
Expand
Broader (1)
Network performance
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Automatic Deployment of a Network Overlay in an Intelligent Transportation System: Docker and Open Baton Approach
R. Onet
,
Robert W. Burian
,
Cristina-Maria Campeanu
,
I. Ivanciu
,
Daniel Zinca
,
V. Dobrota
International Conference on Networking in…
2019
Corpus ID: 208280726
Smart cities require intelligent transportation systems where the communication is based on edge/fog/cloud computing. The…
Expand
2018
2018
Multi-path Routing for Mission Critical Applications in Software-Defined Networks
Ramon Carreras Ramirez
,
Quoc-Tuan Vien
,
R. Trestian
,
L. Mostarda
,
P. Shah
International Conference on Industrial Networks…
2018
Corpus ID: 67931118
Mission critical applications depends on the communication among other systems and/or users and thus, the traffic/flows generated…
Expand
2017
2017
Throughput evaluation of Raspberry Pi devices on multihop and multiflow Wireless Sensor Network scenarios
M. Gragasin
,
M. P. A. Talplacido
,
Nemesio A. Macabale
International Conference on Signals and Systems…
2017
Corpus ID: 6548913
The Raspberry Pi has become one of the most popular devices used in the internet of things studies because of its flexibility and…
Expand
2017
2017
PERFORMANCE OF IEEE 802.11S FOR WIRELESS MESH TELEMETRY NETWORKS
Nathan D. Price
,
A. M. Chandran
2017
Corpus ID: 54705210
Wide area sensor networks have numerous agricultural, industrial, scientific, medical, and military applications. For many years…
Expand
2015
2015
Performance Metrics of Local Cloud Computing Architectures
Travis Brummett
,
Pezhman Sheinidashtegol
,
Debadrita Sarkar
,
Jeffrey M. Galloway
IEEE 2nd International Conference on Cyber…
2015
Corpus ID: 7483453
Cloud Computing is a rapidly growing branch of distributed computing. There have been many proposed open source cloud…
Expand
2014
2014
IPERF tool: generation and evaluation of TCP and UDP data traffic
P. Silva
,
Nilton Alves
2014
Corpus ID: 62478773
This work demonstrates the use of Transport Control Protocol (TCP) and User Datagram Protocol (UDP) data traffic measurement and…
Expand
2014
2014
Using detection in depth to counter SCADA-specific advanced persistent threats
Garrett Hayes
2014
Corpus ID: 133929052
...................................................................................................................................... iv Table of Contents ...................................................................................................................... v List of Figures ........................................................................................................................... xi Chapter 1. Introduction ......................................................................................................... 1 1.1 Problem Statement .................................................................................................... 2 1.2 Contribution ................................................................................................................ 3 1.3 Thesis Organization .................................................................................................. 4 Chapter 2. Background .......................................................................................................... 6 2.1 Origins of SCADA ........................................................................................................ 7 2.2 SCADA Architecture ................................................................................................... 8 2.2.1 Control Center ................................................................................................................................... 8 2.2.2 Operator Interface ........................................................................................................................ 10 2.2.3 Field Devices ................................................................................................................................... 10 2.3 Wide-‐Area SCADA Networks ............................................................................... 11 2.3.1 Wired Communications .............................................................................................................. 11 2.3.2 Wireless Communications ......................................................................................................... 11 2.4 Common SCADA Communication Protocols ................................................... 12 2.4.1 Modbus Protocol ............................................................................................................................ 12 2.4.2 DNP3 Protocol ................................................................................................................................ 13 2.5 SCADA Convergence ............................................................................................... 14 Chapter 3. SCADA and Security ........................................................................................ 16 3.1 Current State of SCADA Security ........................................................................ 16 3.1.1 The Importance of SCADA Security ....................................................................................... 17 3.1.2 SCADA Security Incidents .......................................................................................................... 18 3.1.3 SCADA Security Standards ........................................................................................................ 19 3.1.3.1 NIST System Protection Profile .......................................................................... 20 3.1.3.2 ISA-‐SP99 ....................................................................................................................... 20 3.1.3.3 AGA-‐12 Documents .................................................................................................. 20
2013
2013
Monitoring in Disadvantaged Grids
T. H. Bloebaum
,
F. T. Johnsen
,
Gunnar Salberg
2013
Corpus ID: 56138299
Abstract : In disadvantaged grids, communication resources are scarce and variable. Thus, it is important that middleware and…
Expand
2009
2009
Link Budget Analysis and Throughput Measurement for Multi-Antennas WiMedia UWB Systems
Lebing Liu
,
Xiaodai Dong
,
Zhuangzhuang Tian
,
Adam Schwartz
IEEE 70th Vehicular Technology Conference Fall
2009
Corpus ID: 36140691
This paper examines a WiMedia UWB product by performing comprehensive throughput measurements and a path loss and link budget…
Expand
2008
2008
Which network measurement tool is right for you? a multidimensional comparison study
E. Yildirim
,
I. Suslu
,
T. Kosar
IEEE/ACM International Conference on Grid…
2008
Corpus ID: 7425879
Network performance measurement and prediction is one of the most prominent and indispensable components in distributed computing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required