The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There have been many traffic balancing solutions for datacenter networks. All of them require modifications to the network fabric or/and virtual machines. In this paper, we propose Virtual Multi-channel Scatter (VMS), a new traffic balancing solution in datacenter networks. VMS works in the virtual switches between the network fabric and virtual machines. It can be deployed by datacenter operators...
Nearly 50% of the energy overhead in today's datacenters comes from host-to-host data transfers, which largely depend on the transport layer performance. Multipath TCP (MPTCP) has recently been suggested as a promising transport protocol to improve datacenter network throughput, yet it also increases the host CPU power consumption. It remains unclear whether datacenters can indeed benefit from using...
Internet of Things (IoT) connects a large volume of devices together, via different modes of wired and wireless communication interfaces. The existing transport layer protocols, like TCP and UDP as well as their variants, lack functionality to handle the diverge and heterogeneous communication standards while ensuring the IoT transport requirements like short-lived packet or message transfer, short...
Since the early days of Quality of Experience (QoE) research, relationships to Quality of Service (QoS) and corresponding QoE-QoS models have been of great interest to the research community. However, the manifold quality transformations throughout the communication stack, together with accessibility issues of QoS parameters inside networks, hamper availability, applicability and generality of such...
Both enterprise and national firewalls filter network connections. For data forensics and botnet removal applications, it is important to establish the information source. In this paper, we describe a data transport layer which allows a client to transfer encrypted data that provides no discernible information regarding the data source. We use a domain generation algorithm (DGA) to encode AES encrypted...
TCP and UDP are two important protocols in the network transport layer. In this paper, we study the effects of TCP and UDP on the performance of the application. Based on OPNET simulation software, a simple FTP application simulation model was created and the experiment was carried out. In order to test the influences of different transport protocols on the performance of application in different...
With the widespread availability of multi-homed devices, multipath transport protocols such as MPTCP are becoming increasingly relevant to support better use of multiple connectivity through capacity aggregation and seamless failover. However, capacity aggregation over heterogeneous paths, such as offered by cellular and Wi-Fi networks, is problematic. It causes packet reordering leading to head-of-line...
In today's modern cloud supported applications, the traffic relies on both congestion-responsive transport protocols like TCP and congestion-oblivious transport like UDP including all their variations. As bandwidth is not totally virtualized in today's data centers, the diverse responses of these protocols to congestion lead to inefficiencies and service disruption to some applications. In this paper...
This paper shows that an appropriate choice of the transport protocol, either TCP or UDP, in video streaming services can effectively improve the efficiency of the network resources. The proposed algorithm compares the available network capacity with the rate that is required to transmit the video content. In particular, the study focuses on video streaming by means of DASH standard, so that a new...
We present a new method for finding attacks in unmodified transport protocol implementations using the specification of the protocol state machine to reduce the search space of possible attacks. Such reduction is obtained by appling malicious actions to all packets of the same type observed in the same state instead of applying them to individual packets. Our method requires knowledge of the packet...
Multipath transport is an important way to improve the transmission performance of Internet applications. This demo presents a multipath transport system based on application level relay (MPTS-AR), which defines three kinds of logical entity of user agent, controller and relay server. Controller and relay server collaboratively provide relay services, and user agent integrates the multipath transmission...
Development of transport protocols have received a great deal of attention of network research community at several past decades. One of the general directions of such an effort was to improve a congestion control mechanism of the TCP (Transmission Control Protocol), which is tightly bounded with other components of the protocol responsible, for example, for robust delivery of data and loss detection...
Data center networks widely uses TCP for communication between the servers as it provides reliability and congestion control. However, TCP does not work well for certain type of communication patterns. One such a pattern is barrier synchronized many to one communication. During this type of data transmissions, multiple servers simultaneously transmits data to a single client and also the client cannot...
The transfer of big data is increasingly supported by dedicated channels in high-performance networks. Transport protocols play a critical role in maximizing the link utilization of such high-speed connections. We propose a Transport Profile Generator (TPG) to characterize and enhance the end-to-end throughput performance of transport protocols. TPG automates the tuning of various transport-related...
Linking the communication and the information technology infrastructures forms the new Machine-to-machine (M2M) communication trend. We aim to exploit available standard protocols to support smart cities applications. In this paper, we report the work of implementing and evaluating the performance of using request/response protocols for M2M communications. The paper also introduces a mechanism to...
In the next few years the Internet of Things (IoT) is expected to bring together billions of devices, denoted as "smart objects," thus creating an extremely large-scale network of heterogeneous devices, which will provide an unprecedented opportunity to build new applications and forms of interactions that will shape the world. The heterogeneous and dynamic nature of smart objects that will...
Network traffic balancing is one of the major factors of building scalable and robust service oriented communication networks. A plethora of algorithms for traffic balancing exists for classical network architecture and for software-defined networks. Having spotted certain deficiencies of existing methods, we are presently developing a stateless transport protocol, one of key features of which is...
This paper compares two telecommunication standards for plaintext transmission over Session Initiation Protocol (SIP): SIP extension for Text over Internet Protocol (ToIP) and SIP extension for Instant Messaging (IM). ToIP provides a real-time text service, while IM provides a near realtime text service. Originally, SIP is a Voice over Internet Protocol (VoIP) call signaling protocol that uses Real-time...
In this paper we investigate the usage of the Stream Control Transmission Protocol (SCTP) as a data transport protocol for client-initiated data-intensive computations. The considered environment consists of job schedulers, storage nodes, computational nodes (workers) and clients. The clients submit jobs to the schedulers, which split them into multiple computation units and schedule these computations...
VoIP (Voice over Internet) provides delivery of voice information over unsecured IP-based networks like the Internet. VoIP data, signaling and voice, needs to be secured in such an environment. Security mechanisms take their toll on VoIP system performance. SIP is dominant signaling protocol for VoIP. This paper measures relative decrease in VoIP performance of system with secured SIP signaling over...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.