The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The development of telehaptic communication protocols has gained widespread focus over the past decade. Several protocols have been proposed for carrying out telehaptic activities over a shared network. However, a comprehensive analysis of the impact of the network crosstraffic on the telehaptic stream, and the feasibility of Quality of Service (QoS) compliance, is lacking in the literature. In this...
In both wired and wireless networks, time synchronization is an important service for a wide range of applications in distributed systems. This includes radio interferometry. However, literature researches show that many distributed protocols cannot satisfy sub-ns time synchronization accuracy due to asymmetric delay errors, accumulated jitters and because of the strategy used to compute and adjust...
The availability and reasonable cost of broadband Internet made it an attractive and favourable option to billions of users worldwide. Being a fast service also encourages its users to use real-time applications which is streaming and live data transfer includes VoIP and video streaming. The performance of such applications in Wireless Local Area Network (WLAN) may be highly affected by security protocols...
The 1588 Precision Timing Protocol (1588-PTP) states that a timestamp event is generated at the time of transmission and reception of any event message and that the timestamp event occurs when the message's timestamp point crosses the boundary between the node and the network (event generation points). The protocol defines the message timestamp point for an event message as the beginning of the first...
Predictable message transmission is the primary requirement in networked safety critical embedded systems design. In these systems, delay jitter has been proven to be a critical factor that must be considered. For periodic messages, minimizing the delay jitter means messages should be transmitted at the expected time in every period. In this paper, we investigate the scheduling problem to reduce the...
With the growing demand for electricity, there was the need to develop an efficient system load demand management for power grids. For implementation of a load demand management system was proposed smart grid architecture. The smart grid is a highly power system complex system involving a large number of information and communication technology devices integrated with the purpose of fault detection...
Many multimedia applications employ transmission control protocol (TCP) to send video packets. TCP ensures reliable transmission but experiences significant delays. Various techniques have been proposed to enhance the performances, for instance by controlling TCP window. This paper proposes a split-routed acknowledgement packet that is aimed to reduce acknowledgement delay. The simulation evaluations...
A Virtual Private Network (VPN) is a technology that is used to securely connect private network passing through a public network such as the Internet. Using a VPN, a computer, tablet, or smartphone is able to securely connect with others in the Internet as if they were part of a private network. Using this technology may also bring security threats like spoofing, snipping, and hacking as the data...
Wireless Mesh Networks (WMNs) are attracting a lot of attention from wireless network researchers, because of their potential use in several fields such as collaborative computing and communications. In this paper, we present the implementation of a testbed for WMNs using Raspbian OS. We analyze the performance of Optimized Link State Routing (OLSR) protocol in an indoor environment considering Transmission...
This paper provide an overview of behaviour of transition mechanisms, with and without VPN Protocols. Performance metrics related to networks have been gathered from test-bed implementations. The two transition mechanisms we will be evaluating are 4to6 and 6to4. Both of these mechanism have certain advantages and disadvantages. VPN protocols, PPTP and IPsec were configured on the transition mechanism...
There has been a strong focus on the evaluation of Quality of Service (QoS) and multimedia transmission over protocols of internet protocol (IP). The main goal of this paper is to evaluate the performance of QoS in real implementation, also a comparison of an appropriate video and voice (CODECS) over IP schemes depending on the SIP and IAX2 protocols based on the Asterisk PBX server(s), an open source...
Network virtualization has become a fundamental technology to deliver services for emerging data-intensive applications in fields such as bioinformatics and retail analytics hosted at multi-data center scale. To create and maintain a successful virtual network service, the problem of generating a constrained path manifests both in the management plane with a physical path creation —chains of virtual...
More and more Internet-enabled devices, such as server instances or smartphones, have multiple network interfaces. Multipath TCP (MPTCP) has proven to increase bandwidth for these devices, while remaining compatible with the existing network infrastructure and applications. For interactive applications and services, however, low latency and low jitter often is more important than bandwidth. In this...
In this paper we evaluate the performance of the new algorithm of the TCP protocol for a long distance wireless link in the Galapagos Islands. In order to achieve this goal, it has been started from a study of different standards and tools for this project, besides of the amendments to the TCP protocol for wireless environments. Finally, the network was implemented and preceded to inject traffic to...
The Content Centric Networks (CCN) replaces the IP narrow waist of the Internet architecture by a content layer. When a node wants to access a piece of content, it sends an Interest packet to the network. The network then, using the name of the content for routing, forwards the Interest to one or more copies of the content object. In this paper, we present the implementation of a OpenWRT OS based...
The improvement of the Internet's network conditions have made possible for the real time Haptic data transferring over the Internet. With the word Haptic we refer to the sense of touch that the user feels when he uses a Haptic service. This paper deals with the transfer of real time Haptic data over the Internet. It presents the related work on Haptic data transferring. It outlines the Haptic data...
With an increasing use of Long-Term Evolution (LTE) in mobile networks, it is necessary to evaluate its performance. In this paper, we evaluate the performance of Long Term Evolution (LTE) for mobile networks under Transmission Control Protocol (TCP) traffic. We evaluate the performance of LTE for TCP traffic for both the directions uplink as well as downlink. During the evaluations, we focus on the...
Since complex network environment makes the video data with network resources change quickly, video transmission must possess the ability to adapt to the change of network status. After studying the video stream congestion question as well as the network adaptive transmission control and the transmission characteristic of RTP (Real-time Transport Protocol) RTCP (Real-time Transport Control Protocol),...
Cognitive radio is the one of the technique which used to solve the problems of spectrum inefficiency and limited spectrum availability in wireless networks. However, while designing the availability and efficiency of spectrum in wireless network the security in cognitive radio is one of the key challenge. The selfish attack is one of major security issue found in cognitiveradio. The selfish attack...
The Modbus protocol is widely used at the field level, such as building automation and industrial automation. Among existing implementations of the protocol over different communication infrastructures, Modbus TCP offers better scalability and interoperability than Modbus RTU and Modbus CAN, while at the same time, its real-time performance suffers, which limits its adoption in time-critical application...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.