The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When speaking about high speed transfer, generally one thinks of 1-10 Gbps throughput. At the same time in case of a low performance device, 10-20 Mibps is also considered as high speed. The present case discusses the MOD5270 Ethernet module by Netburner Inc. for the 147,5 MHz processor of which it was a challenge to achieve this speed. The plan was to achieve 48 Mibps, however, according to the manufacturer...
Network Management Protocol based on SNMP has get wide application in TCP/IP. MIB is the common interface among functions of network management subsystem, and it is the key of implementing network management. This paper discusses the structure of MIB, the syntax of ASN.1 and the performance of MIB.
The railway signaling system is a safety related system composed of several sub-systems which have to exchange information with each other. As the communication system may be subjected to intentional or unintentional external attacks, the application of specific safety techniques is necessary. In this paper, a safety protocol is designed. Compared with the general TCP/IP protocol, a safety layer,...
Currently embedded remote monitoring technology step into a rapidly developing period. With the advancement of related technology, low cost remote monitoring system which is web-based, powerful and reliable at the same time will become the mainstream. Under this background, this paper presents a lightweight embedded remote monitoring system. The owerall system established a LAN using zensys's Z-WAVE...
With the development of the wireless communications technology and the multimedia technology, the wireless internet multimedia transport of real-time becomes an important applications field. We will meet a problem that the distinguish of the status of package loss is not very good which will affect the QoS when we transport multimedia data in wireless internet. Based on this problem the article comes...
Mobile IPv6 (MIPv6) is the current standard for end host mobility management in the Internet. In order to provide location management, MIPv6 operates in two different modes while the mobile node (MN) is away from its home. In the first mode, the MN incoming packets are tunneled to the MN current location via the home network. In the second mode, the traffic is exchanged directly between the MN and...
The web is a crucial source of information nowadays. At the same time, web applications become more and more complex. Therefore, a spontaneous increase in the number of visitors, e.g., based on news reports or events, easily brings a web server in an overload situation. In contrast to the classical model of distributed denial of service (DDoS) attacks, such a so-called flash effect situation is not...
While Performance Enhancement Proxy (PEP) is a promising solution for TCP's performance issues over satellite links, it has a serious constraint in terms of a translation table limit of 500 entries that proved to be detrimental when a large number of TCP sessions need to be maintained between endpoints. We experienced one of these cases in Saudi Aramco where web-based drilling applications were establishing...
VLBI (Very Long Baseline Interferometry), which combine many telescopes by the technical of interferometry, can achieve the effect of a large telescope observations. With the development of high-speed network, telescopes achieve real-time observation by network connection, which is called e-VLBI. In this paper, the network connectivity of radio telescope in China and Europe for e-VLBI is briefly described...
Mobile IPv6 allows mobile nodes to remain reachable while moving around in the Internet. In Mobile IPv6, each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet. While situated away from its home, a mobile node is also associated with a care-of address, which provides information about the mobile node's current location. This chapter...
Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HP-UX or Sun Solaris. It is also supported in Cisco network devices operating system (Cisco IOS) and may be used in Windows....
This paper presents experimental results of the implementation of network steganography method called RSTEG (Retransmission Steganography). The main idea of RSTEG is to not acknowledge a successfully received packet to intentionally invoke retransmission. The retransmitted packet carries a steganogram instead of user data in the payload field. RSTEG can be applied to many network protocols that utilize...
Covert channels are used for transmitting secret information, which can penetrate the existing security equipments and bring potential dangers up to the information security. So, it's very essential to develop the correspondent detection algorithms. In the paper, the potential redundancies in TCP protocol are analyzed, and the covert channel algorithms are divided into several kinds according to TCP...
In this paper, cooperative transmission protocols are proposed for wireless broadcast channels, a fundamental building block of wireless communication networks. The concepts of cognitive radio and precoding have been introduced to broadcast channels in order to improve system performance. Information theoretic metrics, such as outage probability and diversity-multiplexing tradeoff, are developed to...
High speed satellite communication networks are emerging as part of the future global wireless communication systems. However, existing transmission control protocols for satellite networks do not provide satisfactory performance over high speed satellite links due to their inefficient congestion avoidance algorithms. This paper identifies the reason for low throughput of a widely used protocol space...
HTTP (hypertext transfer protocol) is a stateless protocol widely used in Internet World Wide Web. The idea behind a stateless design is to simplify the server conception because there is no need to dynamically allocate storage to deal with conversations in progress. If a client dies in mid-transaction, no part of the system needs to be responsible for cleaning the present state of the server. However,...
Firewalls and detection systems have been used for preventing and detecting attacks by a wide variety of mechanisms. A problem has arisen where users and applications can circumvent security policies because of the particularities in the TCP/IP protocol, the ability to obfuscate the data payload, tunnel protocols, and covertly simulate a permitted communication. It has been shown that unusual traffic...
Day by day popularity of wireless devices used to access the Internet is increasing. It indicates that in the near future TCP protocol will be frequently used over the wireless links. The wireless links characteristics are significantly different from characteristics of wired links. TCP (Transport Control Protocol) is basically designed for wired network. One of the main reasons for TCP's degraded...
The file download process over Internet is usually slow. This paper presents design and simulation of a distributed and co-ordinated file transfer protocol for the Internet applications. Presented approach, known as hybrid parallelized file transport protocol (HPFTP), consist of a centralized server that distributes the download process across multiple file servers based on QoS parameters as available...
Underwater wireless sensor networks (UWSNs) are prone to message loss due to their poor link condition with high bit error rate (BER). Retransmission-based mechanisms such as ARQ can be used for the reliability, however, they are not suitable for UWSNs due to the inherent long propagation delay of UWSNs. Therefore, a forward error correction (FEC) mechanism might be an alternative in order to guarantee...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.