The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Performance of wireless sensor networks (WSNs) can be affected when the network is deployed under different topologies. In this paper we present a performance study of congestion control algorithms in WSNs when nodes are deployed under different topologies. To perform our research we have employed algorithms SenTCP, directed diffusion, and HTAP. The choice of these algorithms is based on the fact...
Current wired networks have been developed on the basis of the AIMD principle, which offers increased performance and fairness. Nevertheless, there is a vast spectrum of networks, from deep space to wireless sensor networks, where TCP fails to operate, as it results in frequent timeouts and intermittent or no connectivity at all. The DTN (delay/disruption tolerant networking) architecture and particularly...
The Stream Control Transmission Protocol (SCTP) is a new transport layer protocol. Multihoming is one of the most important features in SCTP, which can be used by the data sender to send data to a receiver through different paths. Although SCTP provides support for multihoming, the basic reason for such a provision was to improve reliability of associations. Currently, simultaneous transfer of new...
TCP round trip time is an important subject of network measurement research. And it is widely utilized in congestion control and network tomography. Compared with active methods to measure round trip time, passive ones are superior for low cost and not injecting traffic into networks. However, all present passive measurement methods have deficiencies. Some of them are not accurate enough, some others...
In order to improve the performance of existing multicast congestion control mechanisms applied to wireless networks, in this paper, we propose an expert-control-based intelligent multicast congestion control mechanism for wireless networks, termed ECMCC. ECMCC detects the network congestion state according to network relative queuing delay and packet loss, feedbacks information to multicast source...
Packet reordering (RO) is an Internet event that degrades the performance of both TCP and UDP-based applications. In this paper, we present an end-to-end measurement study of packet reordering of UDP traffic. The goal of our measurement study is to characterize packet reordering in the current Internet as it is reflected by PlanetLab infrastructure. Overall, our analysis shows that current UDP traffic...
TFRC is a transport protocol specifically designed to carry multimedia streams. TFRC does not enable a reliable and in order data delivery services. However TFRC implements a congestion control algorithm which is friendly with TCP. This congestion control relies in a feedback mechanism allowing receivers to communicate to the senders an experienced drop rate. Although the current TFRC RFC states that...
In this paper, we are proposing RCUBE (receiver window modified random early detection queues with RECHOKe) which combines the advantages of both receiver window modification (RWM) and RECHOKe schemes. By using the RECHOKe scheme, RCUBE easily identifies malicious flows by using CHOKe hit and CHOKe-RED histories, by requiring only a small amount of information, approximately proportional to the order...
Summary form only given. Logs generated by operating systems and application programs provide important information to a network administrator. Logs are used for various purposes including security management, audit, and forensics of intranet. To use logs for such purposes, it is important that logs are reliably retrieved from hosts in the intranet. But the syslog protocol which is widely used for...
We propose a new TCP-friendly multicast congestion control for very large groups of receivers. This protocol named M2C is layered and receiver-driven. Like TCP, M2C is composed of a congestion avoidance and a slow start state. However, M2C can re-activate the Slow Start when the current rate is far below the fair one. This protocol is well designed for continuous and long lived data streams, such...
In this paper the interaction between the AIMD algorithm of TCP and the random access channel is investigated. In particular, we examine the effects of the MAC and the physical layer of the backward channel on the window size evolution of TCP. The problem of coupling the window size evolution of TCP with a random access channel is addressed using point processes and the theory of martingales.
According to previous studies, the UDLs (user data links) or ISLs (intersatellite links) switch and failure can result in the packet reordering in low Earth orbit (LEO) satellite networks. The packet reordering can severely deteriorate the performance of transmission in LEO satellite networks, especially at very high levels of packet reordering. In order to improve the TCP (transmission control protocol)...
Impact of OBS and TCP parameters on instantaneous behavior (fluctuations) of TCP cwnd is evaluated on LOBS Testbed. Experimental and simulation results show that cwnd fluctuations can be reduced by tuning OBS and TCP parameters.
In VoIP (Voice over Internet Protocol) applications, packet loss affects the received speech quality greatly. PCM (Pulse Code Modulation) coders are often used for VoIP and also face such problems. In this paper a side information based packet loss recovery algorithm is proposed, which introduces a small part of corrective information to provide an enhanced reconstruction of the lost packets. A virtual...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.