The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Radio frequency identification (RFID) uses wireless local area network technology, which limits its scope of application. And the data security isn't well protected because of the limited hardware resource of cheap electronic tag. In this paper, we realize the combination of TCP/IP and RFID technology by the Ethernet interface of SAMSysMP9320 reader/writer. This is accomplished by assigning IP address...
With the development of the wireless communications technology and the multimedia technology, the wireless internet multimedia transport of real-time becomes an important applications field. We will meet a problem that the distinguish of the status of package loss is not very good which will affect the QoS when we transport multimedia data in wireless internet. Based on this problem the article comes...
Mobile IPv6 (MIPv6) is the current standard for end host mobility management in the Internet. In order to provide location management, MIPv6 operates in two different modes while the mobile node (MN) is away from its home. In the first mode, the MN incoming packets are tunneled to the MN current location via the home network. In the second mode, the traffic is exchanged directly between the MN and...
The web is a crucial source of information nowadays. At the same time, web applications become more and more complex. Therefore, a spontaneous increase in the number of visitors, e.g., based on news reports or events, easily brings a web server in an overload situation. In contrast to the classical model of distributed denial of service (DDoS) attacks, such a so-called flash effect situation is not...
In new generation cellular networks, opportunistic schedulers take advantage from the delay-tolerance of data applications to ensure that transmission occurs when radio channel conditions are most favourable. “Proportional Fair” (PF) is a well-known opportunistic scheduler that provides a good compromise between fairness and efficiency when transmitting long flows. Unfortunately, the PF algorithm...
This paper aims to develop the system of powerful computer laboratory class by simulation the ideal learning procedure, teachers and their students can keep in touch with each other in 2-way and immediately communication on Internet. This system can enhance the learning of computer laboratory class powerfully in 3 aspects: controlling, teaching, and evaluating on computer network technology with client/server...
Mobile IPv6 allows mobile nodes to remain reachable while moving around in the Internet. In Mobile IPv6, each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet. While situated away from its home, a mobile node is also associated with a care-of address, which provides information about the mobile node's current location. This chapter...
In this paper, dynamics of the delayed Internet TCP-RED congestion control model is considered employing the analysis software of the delayed dynamical systems-DDE-BIFTOOL. The transmission delay τ1 can make it subject to Hopf and Fold bifurcation, thus the averaged queue length and arrival rate would be the approximately constant or vary periodically. The important effects of the transmission delay...
This paper introduces the design and implementation of HTTP proxy server based on real-time link. The real-time link packages UPLink and PSLink into a link. The UPLink is the link between user and proxy server, and PSLink is the link between proxy server, and target server. These two links exist and close together, and it can solve the problem of link's closed incompletion. This approach can reduce...
HTTP (hypertext transfer protocol) is a stateless protocol widely used in Internet World Wide Web. The idea behind a stateless design is to simplify the server conception because there is no need to dynamically allocate storage to deal with conversations in progress. If a client dies in mid-transaction, no part of the system needs to be responsible for cleaning the present state of the server. However,...
Day by day popularity of wireless devices used to access the Internet is increasing. It indicates that in the near future TCP protocol will be frequently used over the wireless links. The wireless links characteristics are significantly different from characteristics of wired links. TCP (Transport Control Protocol) is basically designed for wired network. One of the main reasons for TCP's degraded...
The file download process over Internet is usually slow. This paper presents design and simulation of a distributed and co-ordinated file transfer protocol for the Internet applications. Presented approach, known as hybrid parallelized file transport protocol (HPFTP), consist of a centralized server that distributes the download process across multiple file servers based on QoS parameters as available...
The poor performance of TCP, designed about 30 years ago, over high bandwidth-delay product connections has attracted much attention in the past few years. Some research work attempt to solve this problem by using innovative window estimations. The bursty nature of packet transmission has compounded the challenges in the problem. In this paper, we propose a new transmission protocol - Fairness Control...
The number of wireless Internet service users that use wireless LAN or satellite links has increased. The broadband satellite Internet services have especially attracted attention because of its characteristics such as global coverage and robustness. TCP (transmission control protocol) is used by many typical applications over satellite Internet. However, a typical TCP (such as TCP-NewReno) which...
A mobile and wide area deployable wireless sensor system, including hardware and software, is developed to enhance the mobility, deployment and capability of wireless sensors for networked services. Due to the dual-layer dual-directional wireless communication capability of a novel WAN-SAN coherent architecture and the removal of fix-installed gateway, all sensor nodes are remotely controllable and...
Convex optimization has been widely used to model bandwidth allocation policies among TCP flows in the Internet. When the offered load is less than capacity, stochastic stability of networks using such policies has been established for exponentially distributed file sizes. The problem has remained open for general file size distributions, which is very relevant as it is well known that Internet file...
We propose an improved model for TCP flow level congestion performance. Conventional fluid approximation models yield incorrect results for TCP congestion at the flow level due to throughput overestimation. We introduce a more accurate model incorporating some of the packet level burstiness, by approximating TCP sources as on-off fluid sources. Our model is largely based on the work of D. Anick, D...
Nowadays, the requirement of Internet is increasing in more and more heterogeneous scenarios; especially in mobile platforms, such as Planes, trains and buses. NEMOWG (network mobility workging group) a new working group in IETF (Internet Engineering Task Force) is formed to provide mechanisms to manage the mobility of a network as a whole, enabling that network to change its point of attachment to...
Scanning tools are commonly used by intruders for identifying vulnerable hosts and applications in a network. So from security perspective, to identify the attack in its initial stage and to minimize the impact of attack, it is important to detect scanning activities in a network. We have mainly considered TCP flow because most of the Internet application uses it as a transport protocol. Traditionally,...
IP address shortage over IPv4 is a big problem now, therefore the more massive deployment of NAT equipments is coming. One of the urgent problems for P2P is that how can each peer behind NAT find others and can establish direct connection to others. This paper discusses a TCP-based traversal model on the foundation of existing traversal methods having been analyzed, designs and presents the details...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.