The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Classical network fluid model and RED algorithm are based on TCP flows in internet network, and they have not considered the UDP flows' effects in network. However, in real work of the network, the network link capacity is shared by the hybrid traffics: TCP flows and UDP flows, and UDP flows can occupy the original link capacity of TCP flow. Since there is no feedback control for UDP flows, the classical...
The volume of Internet traffic increases every year, caused by increased amounts of individual information. Quality of Service (QoS) controls is necessary to manage this traffic. Differentiated Service (Diffserv) is a promising technique to realize scalable QoS control in the internet; extensive efforts have been made for its practical use and it is already introduced in some networks. The control...
In new generation cellular networks, opportunistic schedulers take advantage from the delay-tolerance of data applications to ensure that transmission occurs when radio channel conditions are most favourable. “Proportional Fair” (PF) is a well-known opportunistic scheduler that provides a good compromise between fairness and efficiency when transmitting long flows. Unfortunately, the PF algorithm...
This paper researches on QoS (Quality of Service) control problems for web servers. A Fuzzy Adaptive PI Control system is proposed in this paper. Via a basic PI controller, the system can dynamically adjust the ratio of request-accepting time in a control period, in order to turn down requests when the server is overloaded. Considering that in a real Internet environment, the network and server load...
According to different priority based services, IEEE 802.16e WiMAX standard classifies packets as UGS, RTPS, eRTPS, nRTPS, BE. The standard treats all packets generated while browsing the internet as delay tolerant packets and classifies them as Best Effort (BE) packets. This includes BE packets generated while browsing secure websites. However, secure transactions are governed by time constraints...
The premier infrastructure of the information technology is the Internet. The future Internet is a multimedia communication network. However, no control results in no quality in the multimedia Internet. Admission control is one of the most important control mechanisms in the Internet. Therefore, this paper develops an integrated curve that can universally stand for the requirement of a source. If...
This paper introduces a novel admission control algorithm called dynamic measured sum (DMS), which is based on active measurements of the actual load. The kernel of the algorithm is the dynamical adjustment of the measurement period length, which hence enables a better matching to the traffic changes and results in an obvious improvement of delay performance. Furthermore, the multi-class admission...
The following topics are dealt with: next generation Internet; wireless networks; QoS; admission control; overlays and virtualisation; multipath communications; context-aware networking; network resiliance and robustness; and network and traffic measurement.
Random Early Detection (RED) is recommended as the congestion avoidance mechanism in packet switched networks in RFC2309 and has become the focus of much research into congestion control. Furthermore, RED and WRED are the AQM schemes most widely deployed in commercial Internet routers, such as Cisco and Juniper routers. This paper describes an analytical approach that models RED and WRED schemes using...
In order to provide high speed broadband access to users in next generation networks, Gigabit Ethernet-Passive Optical Network (GE-PON) has emerged as one of the most promising technologies. The evolution of the GE-PON technology permits the users to connect to the Internet via gigabit access networks, which contribute to the increase of the network traffic in not only downstream but also along the...
Diffserv(Differentiated Service) is a promising technique to realize scalable QoS control in the internet. Therefore, extensive efforts have been made for the practical use of this technique. Diffserv is already introduced in some networks. Control functions for Diffserv are installed in edge routers and core routers. This enables a scalable QoS control as mentioned above. This paper proposes a new...
Many receivers driven cumulative layered multicast congestion control protocol such as RLM, RLC and FLID-DL used for multimedia application. However, these protocols are suffering with problem of congestion during IGMP leave latency leading to switching between overloading and under loading network state which can't utilize bandwidth so that quality of service gets degraded. To overcome of these problems,...
Active Queue Management (AQM) algorithm is important to manage buffers and transfer packets for wired/wireless networks. However, the unresponsive flows to the network congestion control is dangerous to the network equilibrium and Quality of Service (QoS), especially from the point of network resource allocation. In some certain scenarios, the limited network resource (buffers) can be occupied by...
A wireless mesh network (WMN) is a collection of wireless network nodes that communicate among themselves. Unlike wireless local area networks, WMNs are self configuring systems, where each node can relay messages on behalf of others. This allows coverage of a much larger geographical area than if all nodes needed to be able to communicate directly with a central node. WMNs promise to deliver wireless...
The interest in solving the issue of congestion or flow control in network established from the first discovery and increase popularity of the Internet in 1967 or earlier. As the use of the network deployed and the popularity increase, the issue grows and the demand for an optimal or tentative solution becomes obvious. Since that time there has been an intensive effort from the scholars and researchers...
We address the following question in this study: Can a network application detect not only the occurrence, but also the location of congestion? Answering this question will not only help the diagnostic of network failure and monitor server's QoS, but also help developers to engineer transport protocols with more desirable congestion avoidance behavior. The paper answers this question through new analytic...
Despite the significant body of research that has been conducted on quality of service (QoS), the notion of a dominant approach to end-to-end (E2E) QoS remains elusive. Beyond the ever present issue of deployment, the complexity and limited speed of resource negotiation arising from per-hop or per-domain interactions limit the general utility of the existing approaches. In this paper, we propose a...
Although server technology provides a means to support a wide range of online services and applications, their ad-hoc configuration poses significant challenges to the performance, availability and economical costs of applications. In this paper, we examine the impact of server configuration on the central tradeoff between service performance and availability. First, we present a server model as a...
With the growing demands for computer network communication, it becomes increasingly important to secure the data flow path. The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the performance of networks to meet quality of service (QoS) constrains for various applications. The security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.