The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
TCP and UDP are two important protocols in the network transport layer. In this paper, we study the effects of TCP and UDP on the performance of the application. Based on OPNET simulation software, a simple FTP application simulation model was created and the experiment was carried out. In order to test the influences of different transport protocols on the performance of application in different...
The recent advances in thin client devices and the push to transition users' desktop delivery to cloud environments will eventually transform how desktop computers are used today. The ability to measure and adapt the performance of virtual desktop environments is a major challenge for ''virtual desktop cloud'' service providers. In this paper, we present the ''VD Bench'' toolkit that uses a novel...
The current generation of distributed and automated physical location surveillance systems faces high demands for robustness and reliability. We present and evaluate the design of the Logical Decision Making Server (LDMS), a rule-based automated decision making component used in the Single Location Surveillance Point (SLSP) system. To validate the robustness of the LDMS design for operation in the...
Performance of transport control protocol (TCP) in wireless mesh networks (WMNs) has been a topic of intense research interest. The interest is aimed to provide high-speed TCP connectivity on the wireless mesh backbone that acts as an extension to the wired infrastructure of the Internet. As an effort to actualize this aim, we propose a framework incorporating orthogonal radio channels and novel mechanisms...
This paper proposes HELP://, a simple light-weight protocol that runs over HTTP and is used to disseminate information from a server(s) to its clients during the time of a crisis. HELP runs on an architecture that is a hybrid mix between a pure client/server architecture and a peer-to-peer architecture. Its resemblance to one versus the other is dynamically decided based on load. In particular, under...
SIP flow management should respect the specific characteristics of SIP protocol applied in multimedia or telecom services for meeting stringent quality of service (QoS) requirement. The specific characteristics include explicit session structure for correlating a series of SIP messages, stringent response time required by real-time applications, extra overhead imposed by SIP message retransmission,...
Peer-to-peer mechanisms are considered as one of the key innovative and user-friendly solutions for real-time Internet communication services. Eliminating server-based architecture, reducing or eliminating configuration effort, and allowing end-user devices to bring resources into the network, will reshape the network as we currently know it. This presents substantial opportunities for networks and...
Transient overload is a short term event characterized by a sudden and unexpected rise of the arrival rate in a Web server. Transient overload events in Web servers have been observed more frequently as the number of Internet users grows and the Web services become more popular. This paper deals with the non-trivial problem of generating overload for Web server testing. In this paper we present a...
We describe a novel approach to managing the application-level performance of servers within an enterprise network given only passively-collected TCP/IP headers of packets from a link connecting clients to servers. The analysis is driven by constructing, in real-time, a source-level model of the request-response exchanges between each server and all of its clients. By continuously monitoring traffic,...
Tor (the onion routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server's IP address. In general the acceptance of services strongly relies on its QoS properties. For potential Tor users, provided the anonymity is secured, probably the most important QoS parameter is the time until they finally get response by such a hidden service. Internally, overall...
To overcome the drawbacks of the mobile IPv6 protocol on handling local mobility management, IETF proposed the HMIPv6 protocol which introduces an intermediate mobility anchor point (MAP) to hide the movement of a mobile node within a local area. However, the MAP forms a bottleneck in the network since all the traffic destined for its served nodes has to go through it. Most research on HMIPv6 focuses...
SCTP has been originally designed to transport PSTN signaling messages over IP networks. It does not suffer from the head of line blocking issue inherent to TCP due to its multi streaming functionality. This work investigates the influence of the multi streaming when used to transport web pages in HTTP 1.0 transaction over SCTP. This solution is compared to the more classical case of HTTP 1.0 over...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.