The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Development of transport protocols have received a great deal of attention of network research community at several past decades. One of the general directions of such an effort was to improve a congestion control mechanism of the TCP (Transmission Control Protocol), which is tightly bounded with other components of the protocol responsible, for example, for robust delivery of data and loss detection...
This paper presents an environment for molecular visualization with multi-projection and collaboration capabilities between geographically dispersed research groups. It was drafted a hardware and software architecture whose purpose is to reduce the negative effects of the delay in communication inherent long-distance networks.
Networking has experienced tremendous changes. Once dedicated to one single type of services, technologies are now offering integrated services: we want to have access to any services anywhere. One challenge is the mobility, with 3G terrestrial offers beginning to be successful. In such a context, satellite systems appear as a real opportunity since they may fill the gap between dense connected areas...
The web service technologies enable us to develop the web community to provide corresponding services for users. In this paper, we proposes a new structure of distributed mobile society, and explicit it from three architectural cornerstone: naming, routing and transport. The INS naming and routing mechanism enables users to manage and access nodes in the network easily and effectively. The structured...
This paper discusses the technical structure and utilization of remote supervisory control system. And the novel dual-parallel coupled inverted pendulum platform is constructed. Client-Server architecture is developed with the network communication for closed-loop control. The application allows performing a number of laboratory scale hard real-time control experiments, which can be remotely monitored...
In the traditional structure of B/S, the date interaction between the client and the server is Request-Response mechanism based on the HTTP model Protocol so that the operating efficiency and real-time of B/S monitoring system limited greatly which are basic requirements of modern industrial production and control system. On this issue, a new B/S model industrial control system based on Ajax technology...
This paper proposes an architecture for forming a parallelization network composed of anonymous web clients - those users anonymously browsing a website. This architecture is layered on conventional HTTP-based web applications to organize their clients as computing nodes in a massively distributed computation. The key technology of this architecture is a dynamic installation mechanism for a media...
The ontology is used in different areas of computer systems for the explicit representation of conceptualizations, but there are few studies on the application of ontology in the intermediate and lower layers of computer networks. This paper extend the studies on ontology for the network and transport layers of the TCP/IP architecture, to address the human needs that demands technological requirements...
An instance of measuring node of service life measuring and control system of household appliances using FPGA and nRF2401 is present. FPGA is the core of the system which is embedded with E-MAC IP core to realize the remote monitor system replying on the TCP/IP communication protocol, and nRF2401 is wireless periphery that realizes the wireless data acquisition. How to design and implement the hardware...
Botnets with the centralized architecture provide a simple, low-latency, anonymous and efficient real-time communication platform for the botnet controllers. To our knowledge, most of the latest detected large-scale botnets are based on the centralized structure with HTTP or customized protocols. Therefore, centralized botnets detection helps greatly improve control of unwanted traffic. The main contribution...
IPv6 provides a platform for new Internet functionality. It includes support for real-time flows, provider selection, and host mobility, end-to-end security, auto-configuration, and auto-reconfiguration. It solves the Internet scaling problem, provides a flexible transition mechanism for the current Internet, and was designed to meet the needs of new markets such as nomadic personal computing devices,...
This paper analyzes the shortages of traditional Web/CORBA based network management architecture firstly, and then puts forward a new Web/CORBA based architecture for network management with TCP connection, which applies information push technology and notification service to traditional model. It changes the passive state of server and implements network management in an active state. It can push...
Multimedia conferencing is becoming a hot topic of communication in recent years. There are already a few products of multimedia conferencing based on H.323. SIP, which is a more feasible protocol, is put on the agenda of being the call signaling protocol for conferencing. Most of the researches on SIP-based multimedia conferencing, however, have still remained on theories or experiments. In this...
IPv6 offers variety of enhancements including increased addressing capacity, Quality of Service (QoS) provisioning, built in security through IPSec and improved routing efficiency, over IPv4. But moving from the current version of IPv4 to the future version of IPv6 is not a straightforward process due to their incompatibility and will consume significant amount of time. So for the coming years both...
In order to generate self-similar network traffics, researchers designed network traffic simulation system using sequential methods to generate network traffics with self-similar property on a short time scale. But there is one difficulty in how the simulation system can generate network traffics with high accuracy on a much larger time scale. So, in this paper, we present an architecture design for...
The security of well established secure channel technologies like transport layer security (TLS) or IP security (IPSec) can be significantly improved by emerging concepts like trusted computing. The use of trusted platform modules (TPMs) offers new methods for improving the security of these well established technologies. How secure channel technologies can be adapted to use trusted computing concepts...
To solve the scalability issue of the traditional client-server architecture, many media streaming applications have adopted peer-to-peer (P2P) architecture in their implementations. Because of the success of using TCP in client-server streaming applications, most P2P streaming applications also use TCP as their transport protocol. On the other hand, some researchers argue that UDP is a better choice...
Recently, a move from traditional, network specific multimedia services to IP-based solutions could be observed. Although many of these applications have similar requirements and address the same issues, individual solutions based on specialized protocols are commonly used. This specialization prohibits the extraction and reuse of common services and hinders the interoperability between services and...
The purpose of this article is to remove CPU from heavy services of protocol processing, and alleviate the bottlenecks of communication system to suit for the high speed network. Design a new architecture for TOE which includes TOE design, TOE data stream transfer, TOE performance test and TOE security, etc. By analysis and design with Linux specialties binding to functions of ML403 development version,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.