The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Companies increasingly rely on Internet for effective and efficient business communication. As Information Technology (IT) provides the infrastructure backbone for business activities, a corporate network connects the company to Internet and enables it to perform its activities globally. The corporate carries data packets generated by the users' while performing their business tasks. Traditionally,...
The secure sum protocol is a well-known protocol for computing the sum of private inputs from distributed entities such that the inputs remain private. In this paper we present protocols for computing reputation in a privacy preserving manner that are inspired by the secure sum protocol. We provide a protocol that is secure under the semi-honest adversarial model as well as one that is secure under...
The amount of information in real-time video monitoring is very large. So, the disk space is used largely, and the network congestion is easy to caused. In order to reduce the network congestion, save storage space, take out noneffective information in video, video key-frames are extracted in sending end and video is resumed in receiving end. A real-time video monitoring system is implemented. A kind...
The importance of automated negotiation has increased in recent years, because the growing interest in many fields. The aim of such interactions is to reach agreements through exchanging the offers and counteroffers. From these historical offers, mining methods pays special attention for two issues, first because its ability discover and extract knowledge about the opponent preferences, second, its...
The BitTorrent protocol is by far the most popular protocol for offline peer-to-peer video distribution on the Internet. BitTorrent has previously been extended to support the streaming of recorded video, that is, Video-on-Demand (VoD). In this paper, we take this support for video streaming a step further by presenting extensions to BitTorrent for supporting live video streaming, which we have implemented...
TCP now is widely used in Transmission Control Protocol; however, in the wireless network environment, TCP congestion control typically has some defects such as high-error rate, long-latency, low-bandwidth and frequent-movement, etc. In the wireless network, the implementation difficulty of congestion control mechanism is the degree of congestion, which is not only relevant to the length of the queue,...
In this paper, the performance of IPv4 and IPv6 are compared using Windows Vista and the TCP throughput results are compared with Windows XP. The results indicated that Windows Vista can provide higher bandwidth than XP for both IPv4 and IPv6. Windows vista performs comparatively better on IPv4 than IPv6.
In this paper, an effective solution for video-on-demand (VoD) streaming services based on BitTorrent mechanism is present. In this solution, several modifications have been incorporated into BitTorrent to support high quality streaming content delivery. First, pieces are selected based on the double windows algorithm instead of the rarest-first policy. Second, some neighbor peers are selected based...
This paper identifies new class of network steganography methods that utilize mechanisms for handling oversized IP packets: IP fragmentation, PMTUD (path MTU discovery) and PLPMTUD (packetization layer path MTU discovery). In particular, for these mechanisms we propose two new steganographic methods and three extensions of existing ones. We present how mentioned mechanisms can be used to enable hidden...
The popularity of video websites shows an enormous need for video sharing from individuals. We believe that P2P dissemination services, which leverage users' upload bandwidths, will become pervasive to enable high-quality video multicasting. Though several P2P systems were proposed, we argue that a next-generation one should minimize its peer lag so that concurrent subscribers can enjoy the same home-run...
Scalability and high degree of playing continuity are key points to large-scale application of video-on-demand system. This paper presents a peer-to-peer (P2P) video-on-demand system CPVoD based on a cylindrical structure. It can enhance the efficiency of finding data by combining the accuracy and efficiency of DHT and the simplicity and practicability of Gossip protocol. A data scheduling strategy...
With the rapid advance of computer and network technology, more and more applications are deployed in the customer-side network. These applications require different quality of service (QoS), but have to share a few bandwidth limited Internet connections. Owing to the IP network's best-effort delivery mechanism, the QoS requirements are hard to be satisfied. There have been plenty of QoS solutions...
This paper studied on data processing in cooperative software under P2P pattern. It introduced the concrete improvement scheme on data transmission considering the problems of GK-Star model. Transformed the push data model into push-pull model which improved the performance obviously.
The TCP protocol has been selected as the transport layer protocol of the ATN/IPS. However, there are multiple known deficiencies of the protocol when operating over ldquolong thin networksrdquo. In this paper we discuss several well-known TCP optimization techniques and their application to aeronautical data traffic. The performance of TCP is evaluated and analyzed in a simulated environment based...
Massively Multiplayer Online Games and Virtual Worlds are among the most popular applications on the Internet. As player numbers increase, the limits of the currently dominant client/server architecture are becoming obvious. To overcome those limits, the research community has developed protocols for these so-called Distributed Networked Virtual Environments (DVEs) based on peer-to-peer technologies...
During the last few years, BitTorrent has become a popular way of transferring large files over the Internet. However, the original out-of-order nature of the BitTorrent protocol has made it difficult to enable playback of media files which have not yet been fully transferred. In this paper we propose a new BitTorrent piece selection method to enable simultaneous playback of the transferred media...
The user interaction (UI) function is enhanced to the IMS service architecture by defining the data model between the UI client and the UI server, introducing the user behavior trace function (UBTF), enhancing the interface between a CSCF and a PDFE. Unlike traditional services such as Call Forwarding, Ring Back Tone, etc., which are based on an end user status and/or a pre-provisioned user profile,...
Research into the performance issues of TCP over wireless networks has been the focus of much attention in recent years. In this paper, based on TCP Reno, an improved TCP congestion control algorithm named TCP-RQB is proposed in mixed wired/wireless networks. To apply the algorithm into a TCP enhancement scheme, the ratio of the number of queuing packets to the buffer size in bottleneck link is estimated...
Adapting router buffer sizing rules and TCP's congestion control to Gbit/s link speeds has been the subject of many studies and proposals. In a previous work (Hassayoun and Ros, 2008), we found that high-speed versions of TCP may be prone to strong packet-loss synchronization between flows. Given that synchronized losses may lead to oscillatory behavior in router queues, a relatively large amount...
The Network Centric Operations Industry Consortium (NCOIC) provides guidance for network centric operations (NCO) interoperable systems. The NCO interoperability framework (NIF) [1] provides an organizational construct and repository for enabling this guidance. NIF is a framework that assists industry to design interoperable systems. NIF is based upon standards, including patterns, principles, and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.