The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many Internet of Things (IoT) applications benefit greatly from low-power long-range connectivity. A promising technology to achieve the low-power and long-range requirements is seen in LoRaWAN, a media access control (MAC) protocol maintained by the LoRa Alliance and leveraging Semtech's patented LoRa radio modulation technology. LoRaWAN provides three different device classes (A, B and C), which...
EtherCAT is one of the real-time Ethernet protocols widely employed in industrial controls. However, its wireless extension is not straightforward due to the unique on-the-fly bus access method based on summation-frame. This paper explores the possibilities of interconnecting EtherCAT with wireless standards such as IEEE 802.11 and 802.15.4. The gateway design is presented and event-driven interconnection...
HF and VHF radios retain considerable operational benefits for disaster communications. In particular, they can be the only available communications channel into a disaster zone, and are capable of communications over tens to thousands of kilometers. However, their bandwidth is extremely limited, as low as 1 bit/second, which has previously limited their utility as a backbone for public telecommunications...
Current networks are multi-service packet-switched environments, very often based on Internet Protocol, where the provision of good quality services is a great challenge. The most popular service, offered by almost every network, is voice transmission. As a real-time service, it places high demands on bandwidth and delay. The paper describes selected network dimensioning problems for the voice over...
The Multi-Path Transmission Control Protocol (MPTCP) is the new concurrent multi-path transfer extension for the widely-deployed Transmission Control Protocol (TCP). Of course, having multiple and possibly highly dissimilar paths for transmission is a challenge for the management of the send and receive buffers, since optimal throughput is desired with a reasonable allocation of the limited memory...
In mixed-critical networks is very important to provide appropriate mechanisms which prevent lost of data during communication, especially if that are high-priority frames. As a basis for analysis, in this paper we observed principles of multy-priority based traffic integration in TTEthernet networks that can be configured as strictly deterministic, or mixed-critical. It is analyzed influence of the...
Thin-client computing is being adopted by many industries to bring services to users through a unique platform over wide area networks (WAN). To improve thin-client communication sessions, some authors have proposed using the thin-client protocol with enhanced image compression techniques while others have proposed using drawing commands instead. To take full advantage of the capabilities of thin-client...
TCP/IP is widely used both in the Internet as well as in data centers. The protocol makes very few assumptions about the underlying network and provides useful guarantees such as reliable transmission, in-order delivery, or control flow. The price for this functionality is complexity, latency, and computational overhead, which is especially pronounced in software implementations. While for Internet...
Scale-out distributed storage clusters require efficient selection of the storage targets holding replicas. This requires coordinated allocation of target IOPS, target persistent storage capacity and network bandwidth. The current generation of distributed storage solutions mostly select storage targets using consistent hashing. Implementations have become significantly more sophisticated than the...
The new CAN-FD standard for automotive communication provides support for real-time predictability at an increased rate and with a larger payload than the existing CAN standard. The adoption of CAN-FD requires the migration and possibly the redesign of the existing message sets to exploit the features of the protocol, by repacking the application signals in the new larger frames. Previous works provided...
Content-Centric Networking (CCN) is a recent network paradigm designed to address some key limitations of the current IP-based Internet. One of its main features is innetwork content caching which allows requests for content to be served by routers. Despite the benefits of improved bandwidth utilization and lower latency of retrieving popular content, innetwork caching inhibits producers from collecting...
Limited telemetry bandwidth due to restricted radio frequency spectrum allocation is typically one of the most challenging problems when designing a telemetry system for space applications. To further complicate the problem, a large percentage of the allotted bandwidth is consumed by the over-head required by each packet to follow various standards and layer of protocols used in the telemetry system...
Excessive bandwidth consuming by peer-to-peer (P2P) applications is one of serious problems in residential networks such as in dorms, apartments and even Small and Medium-sized Enterprises (SMEs) networks which have a limited bandwidth. P2P file sharing and P2P streaming applications usually are the cause of this problem. To share the bandwidth fairly among users, the traffic of these applications...
The high amount of small packets currently transported by IP networks results in a high overhead, caused by the significant header-to-payload ratio of these packets. In addition, the MAC layer of wireless technologies makes a non-optimal use of airtime when packets are small. Small packets are also costly in terms of processing capacity. This paper presents Simplemux, a protocol able to multiplex...
As the rising applications of Named Data Networking (NDN) continue to increase the demand on network bandwidth, developing effective congestion mechanisms has become one of the high-priority research tasks for NDN architecture. This paper explores rate control protocol (RCP), a unique hop-by-hop feature in NDN routing, and one-to-one relationship between interest requests and data packets to develop...
Current allocation rates suggest IPv4 exhaustion by approximately 2011. Hence, this paper will lead the way for the acceptance of Internet Protocol version 6 (IPv6) migration in the Philippines using a similar Network Address Translation (NAT) that there is an apparent means to be taken into consideration and NAT IPv6 to IPv4 (NAT64) can be a good choice for computer networks like the Philippines...
In environments with limited network bandwidth, current web service execution mode will face challenges for its enormous demand for network bandwidth. The transmitted message which contains real payload and XML-based format data seems to be verbose. The response time and fail risk will be brought to increase as well. In this paper we address this issue and propose an agent-based compression method...
This paper presents a qualitative study of FlexRay and Ethernet in in-vehicle communication networks. Although both protocols have experienced fast growth in the past years, they still have some important deficiencies that deserve attention. This qualitative study has not only outlined the important shortcomings of in-vehicle FlexRay and Ethernet, but also identified their unique competitive edges,...
Endpoint congestion in HPC networks creates tree saturation that is detrimental to performance. Endpoint congestion can be alleviated by reducing the injection rate of traffic sources, but requires fast reaction time to avoid congestion buildup. Congestion control becomes more challenging as application communication shift from traditional two-sided model to potentially fine-grained, one-sided communication...
It is observed that covert channels can be easily implemented in TCP/IP stack. It is easily achieved by embedding the covert message in the various header fields seemingly filled with "Random" data such as TCP Sequence Number (SQN), IP Identification (ID) etc. Such manipulation of these fields which seems "random" at first sight but might be detected with the help of various techniques...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.