Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
A Carrier Ethernet Network (CEN) is a versatile, standardized, ubiquitous, carrier-class network. It possess several attributes that distinguish it from Metro Ethernet Networks (MENs), quality of service (QoS) being an integral one. Because CENs are designed to cover large areas (thousands of km) and transmit at high data rates (100 Gbps), these networks have a high bandwidth-delay product (BDP)....
Deploying networked control systems (NCSs) over wireless networks is becoming more and more popular. However, the widely-used transport layer protocols, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), are not designed for real-time applications. Therefore, they may not be suitable for many NCS application scenarios because of their limitations on reliability and/or delay performance,...
VoIP (Voice over Internet) provides delivery of voice information over unsecured IP-based networks like the Internet. VoIP data, signaling and voice, needs to be secured in such an environment. Security mechanisms take their toll on VoIP system performance. SIP is dominant signaling protocol for VoIP. This paper measures relative decrease in VoIP performance of system with secured SIP signaling over...
In a scenario where service reliability is achieved through multiple providers, it is crucial to detect faulty equipment. Such a scenario is the IP Multimedia Core Network Subsystem (IMS). where service is provided by multiple instances of the Application Server (AS). These servers may reside on remote locations, and network link between the Call Session Control Function (CSCF) and AS may become broken...
Military tactical networks require reach back connectivity, and in most cases the only viable solution is a combination of satellite and radio links. This hybrid network is characterized by long delay, transmission errors and relative low capacity. Geostationary satellites add a substantial time delay. Terrestrial wireless packet networks might introduce comparable delays and jitter. Mobility and...
The term Hap tic refers to the sense of touch. The feeling has the ability to increase the sense of reality, to excite the user and improve the quality of experience. To carry out this sense through the Internet was, until recently, impracticable due to processing inefficiencies and/or protocol performance in capabilities, such as throughput and jitter constraints. This paper describes a Hap tic system...
Recently, a number of transport and application layer protocols for haptic and Interactive applications have been proposed. This paper presents a survey of the above protocols. It outlines the haptic data transmission characteristics. It also depicts the qualitative features that transport and application layer protocols should contain in order to carry haptic data. Based on these criteria, evaluation...
Transport layer performance in IEEE 802.11 mul-tihop wireless networks (MHWNs) has been greatly challenged by wireless medium characteristics and multihop nature which are the sources of several types of packet loss including collision, random channel errors and route failures. Rate control transport protocols, the candidates for multimedia streaming applications suffer from high loss rates and end-to-end...
End-to-End transport protocols can not provide satisfying communication service in interplanetary backbone networks because of the long propagation delay and high BERs characteristics. This paper proposed a renovation protocol based on hop-by-hop Acknowledgment against the traditional end-to-end protocols for interplanetary backbone networks, which used Hop-by-Hop SNACK and End-to-End SNACK to ensure...
Secure Shell (SSH) is a multi-channel security protocol running over the Transmission Control Protocol (TCP), which offers channels for several services over a secured connection, such as remote shells and connection forwarding. In this paper we introduce a method for using SSH over the Stream Control Transmission Protocol (SCTP), a transport protocol supporting multi-homing and multi-streaming. We...
We consider a long-haul network in which sensors are remotely deployed and tasked to send state estimates of a dynamic target to the fusion center via satellite links. Due to severe loss and delay inherent in satellite channels, the number of estimates successfully arriving at the fusion center can be quite limited. A certain retransmission-based transport protocol can be applied so that lost messages...
Multipath transport protocols enable the concurrent use of different paths and resource pooling of their capacity. Ongoing research and standardization activities extend the Transmission Control Protocol (TCP) towards a Multipath TCP solution. The objective is to aggregate multiple subflows between two endpoints into a single session that can be accessed by an application like a single TCP connection...
The traditional problem of end-hosts efficiently and fairly utilizing end-to-end paths becomes significantly harder when the end-hosts are multihomed. Such is the case, for instance, when an end-host has simultaneous connectivity through several service providers, or when a mobile device is simultaneously connected via both a wireless LAN and a cellular network. A multihoming-aware transport protocol,...
We present sensing mechanisms that can be used for implicit high-load and overload detection in SIP networks. By means of measurements and simulations we highlight the characteristics of SIP proxy servers for different load situations and using different transport protocols. Each protocol yields to distinctive patterns that encourage deriving an algorithm that is able to estimate a downstream server's...
In this work a new test platform to develop control/network codesign solutions for NCS's is presented, based on the NS-2 network simulation suite, and focused in the transport layer. Simulation results with the test platform are presented to know network and control relationships from a network point of view, using TCP/IP shared networks. Interesting remarks have been made, and concluded that a transport...
In this article we work with the class of transport protocols that use queuing delay as a primary feedback signal for flow and congestion control. Our focus will be on this class of transport protocols operating over small buffered networks; i.e., buffers that are of the order of tens of packets. We show that the performance of Vegas and FAST can be very sensitive to the precise choice of small buffer...
We propose a solution to mitigate the performance degradation and corresponding Quality of Experience (QoE) reduction caused by packet reordering for multimedia applications which utilise unreliable transport protocols like the Datagram Congestion Control Protocol (DCCP). We analytically derive the optimum buffer size based on the applications data rate and the maximum delay tolerated by the multimedia...
Congestion control is vital in the streaming of a video sequence or clip, as network traffic varies unpredictably requiring constant adjustment of the transmission rate. Standard TCP-Friendly Rate Control (TFRC) wastes bandwidth and may react to congestion only when packet loss has already occurred. This paper presents a unicast transport protocol named RRB-SIMD for video streaming over the Internet,...
The relocation of live, running virtual machines from one physical host to another is a new and very desirable function because it provides a variety of features, including resilience to failures and flexibility of location. The data transfers required for live migration are supported in several commercial products by a protocol called iSCSI (Internet SCSI), which runs on top of TCP. We thoroughly...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.