The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Congestion control is vital in the streaming of a video sequence or clip, as network traffic varies unpredictably requiring constant adjustment of the transmission rate. Standard TCP-Friendly Rate Control (TFRC) wastes bandwidth and may react to congestion only when packet loss has already occurred. This paper presents a unicast transport protocol named RRB-SIMD for video streaming over the Internet,...
In this paper, we discuss the challenges associated with integrating multiuser OFDMA in a single cell IEEE 802.11 based wireless ad hoc network and propose a new, dynamic and robust approach to improve it. Our new MAC, using OFDMA in the physical layer, can incorporate multiple concurrent transmissions or receptions in a dynamic manner and can adjust the collision probability based on the traffic...
In this paper we address the Quality of Service (QoS) issues for applications such as voice and video that generate bursty traffic in mobile ad hoc networks while asynchronous power saving protocols are applied to wireless hosts. To provide QoS, we propose our new quorum-based power saving protocol called "consecutive quorum-based power saving (CQPS)". Within this torus-based protocol each...
Overlay architectures are the information theoretical playgrounds of the Internet. They provide significant gains in throughput by shifting complexity into the network nodes. A consequence is the requirement for smart routers between adjacent network segments. Since meanwhile audiovisual media allocate the major part of the Internet traffic, protocols as well as overlay structures have to serve Predictable...
Broadcast communication prevails for data dissemination and resource discovery. In mission-critical applications, extensive information sharing and coordination endow broadcast with new features: a large number of active broadcast sources, probabilistic broadcast reception and high receiving rate. We identify this type of broadcast traffic as ASP Bcast traffic. Many efforts have been made to authenticate...
DCF (distributed coordination function) of IEEE802.11 MAC protocols uses binary exponential increasing mechanism, called BEB (binary exponential backoff) algorithm. Due to the lack of a mechanism evaluating the channel condition, it can not tune the value of contention windows adaptively, according to the actual network traffic. By introducing the network allocation vector count in routing protocol...
We present in this paper a simulation-based comparison of one of the best known multicast congestion control schemes - TFMCC - against our proposed adaptive smooth multicast protocol (ASMP). ASMP consists of a single-rate multicast congestion control, which takes advantage of the RTCP sender (SR) and receiver reports (RR) in order to adjust the sender's transmission rate in respect of the network...
Accurate analytical expressions of delay and packet reception probabilities, and energy consumption of duty-cycled wireless sensor networks with random medium access control (MAC) are instrumental for the efficient design and optimization of these resource-constrained networks. Given a clustered network topology with unslotted IEEE 802.15.4 and preamble sampling MAC, a novel approach to the modeling...
Bandwidth reservation in mobile wireless networks is a very challenging task due to the instability of radio channels, node mobility and lack of coordination between mobile nodes. Previously proposed reservation MAC protocols reserve a slot to each real-time source assuming that the source will use the reserved slot in each super-frame. Since different applications may have different bandwidth requirements,...
TCP congestion-control is fairly inefficient in achieving high throughput in high-speed and dynamic-bandwidth environments. The main culprit is the slow bandwidth-search process used by TCP, which may take up to several thousands of round-trip times (RTTs) in searching for and acquiring the end-to-end spare bandwidth. Even the recently-proposed "highspeed" transport protocols may take hundreds...
Computer network is an important phenomenon for digital information world. Computer network having the various problem due to more demand such as congestion control security, reliability, scalability, fairness etc. Multicast service helps computer network to flow information from one end to another end. In this paper, we provide BDQP approach to minimize the congestion control. NS-2 result shows,...
Broadcast communication is a dominant communication pattern in WSN. As a major security concern, the broadcast source authentication is needed to mitigate impersonation of a broadcast source, modifications of its broadcasted data, or depletion of the limited energy of sensors caused by an attacker injecting useless broadcast traffic. Several Broadcast Source Authentication Protocols (BSAPs) were proposed...
This paper shows the network-level view of the behaviour of two popular and deployed anonymity systems; Tor and JAP (AN.ON). The analysis uses the fact that both of them depend on TCP (transmission control protocol) and shows cases when network conditions may affect the systemspsila operations. The main topics are: on-off traffic, difference in available bandwidth between peers, and usage of the window...
In this paper we present a comparative study of the nominee-based approach and consolidation-based approach to TCP-friendly reliable multicast. In this study, we find that TCP-friendliness may not be maintained in the nominee-based approach. The lack of flow control on recovery traffic is another drawback of nominee-based approach. On the other hand, throughput of the basic consolidation-based approach...
In this work, we focus on a WLANs mesh, i.e., an ad hoc, IEEE 802.11-based network whose nodes are either user devices or access points providing access to the mesh network or to the Internet. By relying on some work about IEEE 802.11 MAC analysis, we consider mesh-DQDC protocol and present an analytical model of the MAC scheme, through which we show that the protocol achieves high throughput both...
In this paper, we address the issue of transmission power control (TPC) in wireless ad hoc networks. Power control plays an important role in energy saving and network performance enhancement. However, the existing TPC schemes either face the problem of hidden and exposed terminal or have additional hardware requirements. We propose a novel distributed power control protocol, called Receiver Initiated...
In this paper, we propose an adaptive pacing scheme at the link layer for IEEE 802.11 based multihop wireless networks. Our objective is to improve the performance of higher layer protocols without any modifications to them. Our adaptive pacing scheme estimates the four-hop transmission delay in the network path without incurring any additional overheads, and accordingly paces the packets to reduce...
This paper proposes a novel and simple adaptive control algorithm for the effective delay control and resource utilization of end host multicast (EMcast) when the traffic load becomes heavy in a multigroup network with real-time flows constrained by (sigma, rho) regulators. The control algorithm is implemented at the overlay networks and provides more regulations through a novel (sigma, rho, lambda)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.