The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most user terminals or Internet hosts are equipped with two or more interfaces that can simultaneously be attached to different access networks. These multihomed hosts can offer ubiquitous and cost-effective connectivity, while improving resiliency and bandwidth. Each interface would get an address (or locator) from the edge network to which it attaches. Thus the multihomed host has multiple locators...
In this paper the bifurcation behavior of a TCP fluid flow model for Internet congestion control in Wireless Networks is investigated. These bifurcation behaviors may cause heavy oscillation of average queue length and induce network instability. An impulsive control method was proposed for controlling bifurcations in the Internet congestion control system. Simulation results show that the nonlinear...
This document is written to give the chronology of technological evolution at IIT Bombay in Distance Education activity. Various technologies used are described in brief. The next technology have emerged out of some need that was unfulfilled in the previous technology used. A glimpse of future technologies likely to be used in distance learning are mentioned. The impact of distance education on different...
As the Internet becomes increasingly popular and mature, constant increase of demands and complexities for network traffic has been an big issue. A concentration of large traffic demands to one routing node or one communication line makes a network congestion. This congestion causes increment of total network delay and the total amount of packet losses. These losses grow retransmission of packets,...
Internet Protocol (IP) suite and Ethernet physical layer are the current trend in home and industrial systems communication protocols. Unfortunately, in the field of power line automation protocols that are in wide use in home automation applications, the lack of IP convergence leads to difficulties, because of the variety and high costs of systems and solutions that need to be integrated. This paper...
How to provide quality of service (QoS) guarantees in routing and switching systems has become one of the key research topics in the areas of routing and switching technologies. Differentiated services architecture (DiffServ) is known as a promising way for supporting QoS in a high-speed backbone network scenario. However, the measurement indexes for realtime multimedia traffic, which plays very important...
This paper discusses basic issues about the performance of semi-structured query processing in very large data sets. It is based on recent algorithm-engineering work, on the state of the art in performance management for XML query processing and on theoretical studies about the complexity structure of the querying problem. Its main conclusions provide a concrete view on the interaction between terabyte...
Traffic analysis, where eavesdroppers retrieve networking information such as source-destination pairs and paths of data flow, severely compromises user privacy and can equip an adversary to launch more powerful network attacks. Anonymous communication, where users exchange information without revealing the communicating parties is essential in any data network. Chaum Mixing, where relay nodes or...
Although there have been a plethora of studies on TCP performance in supporting of various applications, relatively little is known about the interaction between TCP and BGP, which is a specific application running on top of TCP. This paper investigates BGP's slow route propagation by analyzing packet traces collected from a large ISP and Route Views Oregon collector. In particular we focus on the...
Switching the operating state on machines is probably the simpler way to reduce the energy consumption of otherwise non energy-aware devices. Indeed, many energy-aware systems allow two states of operation: a low power idle (LPI) mode, in which the system is unable to process data, and a fully working mode. For networking equipment, packet coalescing is the best known algorithm for managing the LPI...
TCP Retransmission Timeouts (RTOs) related to non-congestion have been reported as one of the main reasons of the performance degradation of TCP in multi-hop wireless networks. In this paper, we introduce an efficient algorithm called TCP NRT (Non-congestion Retransmission Timeouts) which is capable of recovering packets by detecting, differentiating and reacting to congestion as well as non-congestion...
Network topology inference uses network measurement methods to find out the elements of internet in the target field and their connection relationship. In traditional network topology inference, traceroute-like methods which bases on the feedback information of routers are used, but anonymous routers seriously affect the performance. So tomography relying on end-to-end measurements has become a hot...
Microcontrollers and their ever growing applications have changed our everyday experience by its feature of programmability, data processing speed and with the consequent intelligences. Through this adventure of invention and engineering, the optoelectronic devices especially the light emitting diodes (LEDs) are used in various fields, such as electronic appliances, optical communication, security,...
Security is an important concern in Voice over IP (VoIP) applications. An approach to securing the signaling, such as the Session Initiation Protocol (SIP) and Location to Service Translation (LoST) messages, is to use Transport Layer Security (TLS). Several studies have measured the impact of using TLS on SIP. However, there have not been any tests on the impact of TLS or Internet Protocol Security...
The growing number of mobile devices equipped with a wireless interface and the end-user trend to shift toward wireless technology is opening new possibilities for networking. In particular, opportunistic communication embodies a feasible solution for environments with scarce or costly infrastructure-based connectivity. In this context we provide a delay-tolerant solution that provides service opportunistic...
Of late, an easy access to the Web 2.0 applications through the hand-held mobile devices has provided the consumers with the opportunity to express opinions on their invoked services conveniently. These opinions, also known as the Internet word of mouth, often impact a potential consumer's service selection notably in service rich urban terrains. Access to these opinions involves tariffs since they...
Cellular networks are currently facing significant challenges as mobile Internet access adoption continues to grow over the subscriber base. The challenge that network operators are facing is that Internet data traffic consumes considerably more resources than voice calls, necessitating in that respect significant capacity enhancements. Further, this rise in system utilization has caused a considerable...
Given an IP address, it is a challenging task to obtain its geographic location. Besides approaches which associate coordinates with IP addresses in a predominantly static way, there are also measurement based approaches that exploit the correlation between the propagation delay of signals and round trip times of probe packets. We analyze multiple approaches solely based on delay measurements, i....
To improve the operation efficiency and service levels of Bus Rapid Transit (BRT) systems, we propose a novel realtime BRT signal priority approach through two-stage green extension. For social justices, we control traffic signal lights under the people first principle after constructing BRT Internet of Things. This requests us to collect enough traffic information related to BRT vehicles, social...
Energy consumption of wireless data transmission heavily depends on the shape of the outgoing traffic of the mobile device. In this paper, we propose a traffic scheduler that shapes the packets into consistent bursts based on per-packet performance constraints in order to reduce the overall transmission cost. Our scheduler takes into account the scenarios where multiple network applications run concurrently...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.