The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nearly 50% of the energy overhead in today's datacenters comes from host-to-host data transfers, which largely depend on the transport layer performance. Multipath TCP (MPTCP) has recently been suggested as a promising transport protocol to improve datacenter network throughput, yet it also increases the host CPU power consumption. It remains unclear whether datacenters can indeed benefit from using...
In the design of mobile phone monitoring system, the balance of real-time video playback fluency and clarity is the key of the design work. For this problem, the designer can use image data compression international standard, such as MPEG standards, and real-time transport protocol RTP to reallize real-time video data transmission on GPRS, but the final result is extremely poor. On the basis of introducing...
The web service technologies enable us to develop the web community to provide corresponding services for users. In this paper, we proposes a new structure of distributed mobile society, and explicit it from three architectural cornerstone: naming, routing and transport. The INS naming and routing mechanism enables users to manage and access nodes in the network easily and effectively. The structured...
For TCP/IP Agreement has certain security bugs, the hacker catches the opportunity to attack the Network. On the basis of the analysis of the TCP/IP Agreement's vulnerability, the article has further analyzed the vulnerability of the Transport Layer Agreement, and discussed the security and the promotion method of TCP/IP Agreement's transport layer.
Both power and performance are important issues in today's datacenters. It is hard to achieve optimization in both aspects on shared infrastructures due to system dynamics. Previous work mostly emphasized on either aspect or relied on models that were trained off-line for specific workload. In this paper, we present vPnP, a feedback control-based coordination system that provides guarantees on a service...
SCTP (Stream Control Transport Protocol) is a latest transport protocol, which is mainly used to transport PSTN coder over IP network. Transport performance of SCTP, TCP and UDP will be compared in generic network. These findings suggest that transport performance of SCTP is greatly inferior to one of TCP and UDP. Relationship between number of SCTP stream and transport performance of SCTP are discussed...
Aiming at the shortage of existing DDoS attacks defense system, this paper puts forward an effective approach against DDoS attacks based on the three-way handshake process, and the key point lies in discarding the aggressive first handshake requests which consume a lot of system resources; thus it ensures that the new normal network request can be dealt with. An efficient defense system against DDoS...
3G mobile communication networks such as UMTS provide wide area Web access. However, Web latency is usually beyond users' tolerable waiting time even in wired networks. In UMTS networks, mainly due to large RTTs and limitations of existing HTTP, Web latency increases dramatically. In this paper, we introduce a Web acceleration scheme, proxy-based object packaging and compression (POPC), for reducing...
A defense system against UDP flooding attack with artificial immune detection was put forward, and four sections detection with weight was proposed based on considering the uncontinuity of IP address. Eigenvalue matching was introduced based on analyzing the r-continuous bits matching rule. Using the new matching rule the negative selection algorithm was improved both in detector generation and "black...
Eigenvalue matching was introduced based on analyzing the continuous bits matching rule. Using the new matching rule the negative selection algorithm was improved both in detector generation and "black hole" detection. A defense system against SYN Flooding attack with immune detection was put forward, and four sections detection with weight was proposed based on considering the uncontinuity...
Wireless networks have increased in popularity in recent years, and is now seen as a critical technology in any network infrastructure. Wireless communication is convenient and plays a prominent role in networking, however security and performance is a major concern. In this research, performance of wireless IEEE802.11n is evaluated on two operating systems, namely Windows Vista and Windows Server...
Context-awareness is increasingly becoming an important capability in devices for ubiquitous computing environments. These devices use on-board sensors and history of user interaction to collect data that are used to adapt their behavior to suit with the current environment. There is a need to support real-time software in ubiquitous computing environments, especially in reactive systems, such as...
In order to generate self-similar network traffics, researchers designed network traffic simulation system using sequential methods to generate network traffics with self-similar property on a short time scale. But there is one difficulty in how the simulation system can generate network traffics with high accuracy on a much larger time scale. So, in this paper, we present an architecture design for...
The server cluster technology become more and more prevalent in the enterprise level applications, failure detection is one of the key technologies which can ensure the server cluster continue providing services. This paper introduced several types of the server cluster failure, and its design objects; we then analyzed the existed detection mechanisms, and get rid of the traditional detection enhancement...
This paper introduces a two-layer UDP datagram-based network communication framework for developing online mobile games. The communication mechanism consists of a physical layer and a data-link layer with a unified interface. A standalone two-player mobile game, such as a chess game and the like, can be easily plugged on to the communication framework to become a corresponding online version.
The key contribution of the work herein described is an integrated network service architecture for airborne networks (ANs), wherein a set of robust and auto-configurable network service mechanisms are designed to handle network dynamics and bandwidth constraints in AN environments. Instead of covering all possible network services, address configuration and name resolution are addressed in this paper...
Applications over HTTP are expected to play its persistently important role in the future heterogeneous networks. The purpose of this study is to analyze emerging characteristics of HTTP traffic which has dramatically changed both in payload and transfer method in the past few years. Beginning with a discussion of well-known models in literature, we emphasize on their applicability in the future networks...
According to the security features of WiMAX-based wireless communication network, a fresh new wireless communication authentication protocol called WCAP was advanced and designed adopting the dual-key authentication scheme based on trusted third party; its security was analyzed by two means of technical realization and formal analysis; the protocol was implemented by devising an integrated security...
WiMax (World Interoperability for Microwave Access) technology is the hotspot of wireless access technologies and attracts much attention. WiMax technology provides a wireless access method for users and do not constrained by physical position and cable restriction. A communication platform was designed under the protocol WiMax. The platform contains client (Vehicles) and server (Base stations). The...
FTPGrid incorporates traditional FTP system with grid technology to implement large-scale resource sharing with high performance and reliability. FTP servers that geographically neighbor with each other form communities, which in turn constitute the FTPGrid. In this paper, we propose a resource merging mechanism to establish a well-organized resource directory in each community by merging duplicated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.