Sort by
  1. Language:All
  2. Category:TCP/IP
  3. Time:ALL
  4. View:300—500 times
Remove all
Language More Hide
Category More Hide

TCP-based hospital Queuing procedure

Based on asynchronous TCP, in which multiple threads, compressed within both client-and server-side source code, can be used for simple examples reference...

Serial debugging assistant VC program

Is serial debugging assistant more programs ... Has a lot of features, easy to add new functionality, you are welcome to download. Don't know to everyone whether it is useful....

Generic Stream encapsulation

When a network device sends a message, the message will take the form of a packet. Each OSI model layer adds a header to the packet. The packet is then covered with some information directing it onward to a destination Analogous to the address on a letter in which the actual message is carried in...

secure and reliable data transmission in Wireless Sensor Network

Message Authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs).Propose a scalable authentication scheme based on EllipticCurve Cryptography (ECC).While enabling intermediate nodes authentication, proposed...

AODV Implementations

Please note: All through all source codes are free for anyone for downloading, we do need this mechanism (points) to encourage people to share out more source code projects so that everyone can get more valuable codes eventually. We are putting a lot of effort on maintaining all the codes for you. W...

Tic-Tac-Toe with chat capability using TCP/IP protocol

Tic-tac-toe is a game for two players, X and O, who take turns marking the spaces in a 3×3 grid. but i used 13x13 grid. The player who succeeds in placing five respective marks in a horizontal, vertical, or diagonal row wins the game. me....

An Intrusion-Detection Model Based IN php

As the Internet services spread all over the world,many kinds and a large number of security threats are increasing. Therefore, intrusion detection systems, which can effectively detect intrusion accesses, have attracted attention. This paper describes a novel fuzzy class-associationrule mining...


10m/100m/1000m source full version, and achieved under the three models of the Mac,Verilog code, and reference documentation!...

UDP file transfer

This program using UDP theory for file transfer, the file is divided into blocks 256B, in order to ensure data transmission order, synchronizing using a custom Windows message, that is, each accepted one piece of data to give a message, law was sent after the message data is sent....


  802.1d spanning tree (STP) standard designs, and believe that it could resume in about 1 minute after the failure, this kind of performance is adequate. Into the LAN environment as the third Exchange, bridges began to compete with routing solution, the latter open shortest path routing protoc...


Don't have an account? Register now
Need any help?
Mail to:


CodeForge Chinese Version
CodeForge English Version

Where are you going?

^_^"Oops ...

Sorry!This guy is mysterious, its blog hasn't been opened, try another, please!

Warm tip!

CodeForge to FavoriteFavorite by Ctrl+D