The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multi-homing is a new feature of SCTP not existed in UDP or TCP. It allows multiple IP addresses to be attached to a single connection to improve stability of data transfer. It significantly enhances reliability and redundancy of transport layer in several levels - from multiple physical network interface cards to complete different logical end-to-end paths. Recently, SCTP protocol was officially...
Parallel download protocols that establish multiple TCP connections to distributed replica servers have the potential to reduce file download time and to achieve a server-side load balancing. Unfortunately, parallel download protocols are also inherently unfair towards single-flow downloads and may even starve them. This paper presents TCP-ROME, a parallel download protocol that allows a dynamic mitigation...
Today's laptops and mobile terminals are equipped with several network interfaces belonging to different access technologies. Users can benefit from multi-homing to access network services anywhere, at any time and from any network. Multipath TCP (MPTCP) is a modified version of Transmission Control Protocol (TCP) which allows a TCP connection to simultaneously send data over multiple paths. One of...
Recently the security in vehicular ad hoc networks (VANETs) draws attention because of increasing vehicular applications. One of the main challenges of secured communication in VANET is multicast source authentication which essentially guarantees that the received data in communication is genuinely sent from the source and not modified by impersonators. Although much research has been focused on message...
In general, the Stream Control Transmission Protocol (SCTP) delays the sending of acknowledgments. For specific cases, this results in non-optimal protocol behavior. Therefore, the protocol specification defines several exceptions that allow the receiver of an SCTP packet containing user data to send the corresponding acknowledgment without delaying it. However, all these exceptions only take the...
Quality of Service (QoS) is still one of the major challenges for emerging services based on the Real-Time Transport Protocol (RTP) to deliver multimedia content. In the context of the Internet Protocol Television (IPTV) services, the synchronization of multimedia components plays an important role. In order to synchronize audio and video components of multimedia content, RTP timestamps have to be...
Delay/disruption tolerant networking (DTN) has recently been proposed as a very effective solution to cope with the problems posed by challenged networks (long delays, disruptions, absence of end-to-end connectivity, etc.). In order to assess DTN performance in such scenarios, it is essential to be able to rely on specific evaluation tools. In this paper we present DTNperf_2, which is a client-server...
Most of existing transfer protocols performs poorly for transferring bulk data over fast long distance network. A key reason is the congestion control algorithm. This paper designs a novel congestion control algorithm, namely congestion detection and rate adaptation (CDRA) algorithm, which adjusts sending rate according to the congestion level of terminal in order to maximize transfer performance...
Computer network is an important phenomenon for digital information world. Computer network having the various problem due to more demand such as congestion control security, reliability, scalability, fairness etc. Multicast service helps computer network to flow information from one end to another end. In this paper, we provide BDQP approach to minimize the congestion control. NS-2 result shows,...
This paper shows the network-level view of the behaviour of two popular and deployed anonymity systems; Tor and JAP (AN.ON). The analysis uses the fact that both of them depend on TCP (transmission control protocol) and shows cases when network conditions may affect the systemspsila operations. The main topics are: on-off traffic, difference in available bandwidth between peers, and usage of the window...
The Radio Link Control (RLC) protocol, used in Universal Mobile Telecommunication System (UMTS) networks, is one of the most advanced and complex link layer protocols. Among its notable features are the absence of retransmission timers, which makes it tolerant to contention for the link, and the ability to abandon persistently lost frames, which makes it suitable for reliable transport layers. In...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.