The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In today's Internet age, web-based applications are an extremely logical way to disseminate, update, and visualize information. Our modern wired infrastructure and high-speed wireless access points make it possible to access high-bandwidth demanding applications from nearly everywhere. However, in places where infrastructure does not exist, and where information needs to be disseminated over areas...
Transport protocol design for supporting smart metering applications poses certain challenges because of unique issues. The issues stem from the need to deploy a significantly large number of meters (e.g., hundreds of thousands). Each meter generates small reports at a fixed low rate. All meters' reports are destined to the same data collection center and require reliable end-to-end delivery. Although...
Energy consumption is a concern with mobile de-vices nowadays. Network interfaces are among the most power hungry components in these devices. In this paper, we describe the design and implementation of a client-centric protocol for energy efficiency. Inspired by earlier work, our protocol works by exploiting the TCP flow-control mechanism to shape incoming traffic into bursts in order to utilize...
In standard TCP/IP stack, its protocol dictates that if the header error is detected by mean of checksum computation, the packet will be discarded. Though this is a very fast and efficient method to detect `bad packet', it forces an extra channel usage. In this paper, we proposed a method to implement forward error correction (FEC) for uncompressed packet header. It is a byte-level FEC and it is going...
Future Internet researches revolve around the notion “Architecture”. Architecture can be defined as the set of principles and basic mechanisms that guide network engineering. Historically, informal architectural ideas guided design of the Internet protocols, but the architecture was formalized later. The today's Internet architecture is under serious reconsideration and people started thinking about...
We present a performance study of a wireless mesh network based on off-the-shelf 802.11 technology. Unlike earlier work, we explore the practical constraints of the use of a “vanilla”, unmodified 802.11 MAC layer. We also consider the use of multiple radios, in the 5GHz band, to reduce interference. We establish the origin of degradation and limits in performance of practical deployments and study...
With the development of the wireless communications technology and the multimedia technology, the wireless internet multimedia transport of real-time becomes an important applications field. We will meet a problem that the distinguish of the status of package loss is not very good which will affect the QoS when we transport multimedia data in wireless internet. Based on this problem the article comes...
To solve the problem of monitoring system for petrochemical equipment, proposing a three-level wireless distributed network monitoring application scheme. The terminal node and middle layer cluster head node of monitoring system were made up of short-distance wireless communication module nRF9E5 and GPRS network MC55 module. The wireless point to multi-point transceiver program based on dynamic multi-access...
With the rapid development of network technology, computer network evolved to the mobile wireless Internet gradually, and showing a highly heterogeneous trend. The traditional TCP protocol is designed for wire circumstance and is obviously poor in such circumstance. This paper proposes a new TCP scheme, called TCP-C, which is based on Explicit Congestion Notification algorithm ( ECN), referencing...
Currently, Transmission Control Protocol (TCP) is the dominant protocol used in the Internet. It is the transport protocol that is responsible for the transmission of around 90% of the Internet traffic. TCP was originally designed for wired network where packet loss due to congestion dominates. Mobile Ad Hoc Network (MANET), one of the wireless networks, has special characteristics which cause several...
Most of future digital services for home and office users will be deployed and delivered through the Internet and wireless connectivity. However, employing regular access points (APs) and protocols will not allow an efficient coexistence among heterogeneous application flows. Indeed, real-time and elastic applications are (and will be) supported by different protocols and featured with different performance...
TCP has been a congestion control method in the Internet. However, since TCP is not able to directly measure the network status from the end nodes, the TCP window control gradually increases the congestion window size until congestion occurs. This control gets network bandwidth aggressively and affects communication of all stations (STAs) which belong to the same access point of IEEE 802.11 standards...
A new methodology of mobile police spatial information service grid model is studied based on spatial grid computing environment. Key technologies are presented in the model, including spatial grid computing, mobile agent (MA) distributed computing, mobile geographic information system (GIS), global positioning system (GPS), video monitoring, transfer control protocol/internet protocol (TCP/IP), and...
There is an emerging class of applications in which there is a need to reliably transport data from a large number of low rate devices (e.g., hundreds of thousands) to a central server. Atop the list of such applications is smart grid infrastructure. Other applications include meteorological applications, such as monitoring of weather, pollution, and allergy conditions. These applications are characterized...
Wireless LANs have been widely deployed as edge access networks in home/office/commercial buildings, providing connection to the Internet. Therefore, performance of end-to-end connections to/from such WLANs is of great importance to network applications and end-users. The advent of Dynamic Spectrum Access (DSA) technology is expected to play a major role in improving wireless communication. With DSA...
Current Internet protocols like TCP have been designed to work well on channels with low channel error rates. Wireless channels on the other hand exhibit high loss rates when compared to wired channels. Current TCP implementations usually attribute packet losses caused by channel errors as being actually caused by congestion. The result is an unnecessary reduction of the sending rate which leads to...
Both the network mobility and the terminal mobility are likely to co-exist in the future. These two mobile communication paradigms have different wireless connectivity models and likely to deploy different schemes to address the wireless related performance issues for TCP. In this paper, we consider TCP Snoop, which allows a mobile terminal to efficiently recover from wireless-related losses. For...
We focus on the energy spent in radio communication by the stations (STAs) in an IEEE 802.11 infrastructure WLAN. All the STAs are engaged in web browsing, which is characterized by a short file downloads over TCP, with short duration of inactivity or think time in between two file downloads. Under this traffic, Static PSM (SPSM) performs better than CAM, since the STAs in SPSM can switch to low power...
The Cache-and-Forward (CNF) protocol architecture was proposed to support efficient mobile content delivery services in the future Internet. In contrast to the TCP/IP protocol stack which is based upon the assumption of reliable end-to-end path through the network, the CNF architecture considers varying access link speed/quality and periods of disconnection as inherent properties of the network. Routers...
Due to the rapid expansion of road and highway system around the world, there is a growing demand to monitor vehicle traffic patterns and road status by jurisdictional agencies charged with maintaining roads and ensuring the safety and usability of various highways within their jurisdictions. The feasibility of performing effective monitoring relies on cost, complexity and scalability of the traffic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.