The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
VoIP is replacing traditional telephony system over PSTN as a more affordable communication tool on account of convergence of networks. Meanwhile, security issue brings more attention and becomes more important. SIP is based on text message. This makes the protocol easy to implement but also creates opportunity for hackers to steal or modify the messages. There exist a various approaches to secure...
Push-to-Talk over Cellular (PoC) system is ideal for group communication in many cooperative work environments because of its wider coverage and more flexibility than traditional trunk communication systems. The long session-setup-delay is an important problem that must be solved before the commercial application of PoC system. Many research works have been done to solve it in some mobile networks,...
Peer-to-Peer (P2P) network structure is widely employed for video streaming applications due to its high stability, flexible extensibility and ability to share data stream loading among different peer nodes. This paper proposes an interleaved video frame distribution (IVFD) scheme to resourcefully support full VCR functionalities in P2P environment without searching new source. Instead of acquiring...
In this paper, we study the performance of solid-state drives that employ flash technology as storage medium. Our prime objective is to understand how the scheduling of the user-generated read and write commands and the read, write, and erase operations induced by the garbage-collection process affect the basic performance measures throughput and latency. We demonstrate that the most straightforward...
Authentication has become a major problem in wireless network communication; since this technology enables its client to communicate each other through radio wave. This kind of communication makes user intercept the traffic easily. When wireless implements high level security standard such as IEEE 802.11i to tighten its authentication mechanism, it deals with long delay in handover. To support fast...
In this paper, we introduce a new priority and admission control mechanism for applications in the Vehicular Communication Networks (VCNs). The adopted network architecture integrates Vehicular Ad-hoc Networks (VANETs) based on the standard IEEE 802.11p and Wireless LAN Mesh Networks (WMNs) based on IEEE 802.11s. The proposed scheme is designed to ensure seamless provision of infrastructure-to-vehicle...
Data request task scheduling is one of the important issues for P2P VoD systems. However the existing data scheduling strategies in P2P VoD system is not fair enough. They make many nodes, which upload data actively, bear very heavy load, while those selfish nodes providing no resource sit idle. This paper presents an admission control strategy on serving nodes combining with the incentive mechanism...
Traffic generation represents one of the main challenge in modeling and simulating the application and network load. In this work, we present a tool, called OpenAirInterface Traffic Generator (OTG), for the generation of realistic application traffic that can be used for testing and evaluating the performance of emerging networking architectures. In addition to the traffic of conventional applications,...
Inspired by clustered photolithography tools in semiconductor wafer manufacturing, we study flow lines with deterministic process times subject to random state dependent setups. For tractability, we assume that the setup probability is constant and independent from customer to customer; the setup duration is constant. We show that the internal state of such a flow line can be modeled as a Markov chain...
Data center networks are characterized by high link speeds, low propagation delays, small switch buffers, and temporally clustered arrivals of many concurrent TCP flows fulfilling data transfer requests. However, the combination of these features can lead to transient buffer overflow and bursty packet losses, which in turn lead to TCP retransmission timeouts that degrade the performance of short-lived...
Sleep modes are important for user equipment to reduce power consumption or to reduce battery reloading. To keep the user equipment connected, it has to be activated for uplink or downlink data transfer which causes overhead and additional delay. Wireless or mobile equipment has to be monitored repeatedly for location updates. These classes of problems can be modeled by queuing systems with modified...
Multi-view video consists of multiple video sequences captured simultaneously from different angles by multiple closely spaced cameras. It enables the users to freely change their viewpoints by playing different video sequences. Transmission of multi-view video requires more bandwidth than conventional multimedia. To reduce the bandwidth, UDMVT (User Dependent Multi-view Video Transmission) based...
A complex software system may have hundreds of tuning parameters with both itself and its runtime environments. To perform optimally at runtime, a self-adaptive system often needs to employ a series of controllers to tune different parameters. In most cases, these parameters are not independent but interact with each other, thus demanding effective coordination among different controllers. Due to...
Intelligent Traffic Management (ITM) system promises to reduce the traffic congestion, intelligent intersection management as well as the smart dissemination of the informatics to control the traffic flow. Development of any Intelligent Transportation System (ITS) applications requires realistic road traffic model to analysis the performance. Service rate or service time is one of the most important...
In this paper we presented results of the performance evaluation of the WCDMA/HSPA radio access network when loaded with multiplayer real-time games and M2M applications traffic. Evaluation was done in a live network, on one Node B. Traffic, characteristic for the emerging Machine Type Communication and online multiplayer games, was generated by an application running on 10 mobile phones in parallel,...
Massive Multiplayer Online Role Playing Games (MMORPGs) have been reported as real-time applications using TCP. This surprising fact makes it interesting to study their behavior when sharing a link with other TCP flows. In this paper the coexistence of an MMORPG flow and an FTP background application is studied. A network scenario which fits an access network is simulated with NS2, using synthetic...
3GPP-LTE networks use the EAP-AKA protocol to authenticate and negotiate session keys with mobile users. However, with the popular trend of single user owning multiple devices and subscribing to multiple services, the EAP-AKA protocol appears inefficient because its authentication is device-oriented. In this paper, we propose a secure and efficient multi-device and multi-service authentication protocol,...
TCP In cast good put collapse, as a practical problem found in cluster-based storage networks and data center networks, attracts increasing attentions recently. This paper proposes a simple good put model of TCP In cast. Compared with previous In cast model, this model has three different properties. First, the TCP slow start process is considered as an essential part rather than a negligible one,...
Caching consistency in a MANET environment is an important issue as it is directly related to MANET connectivity. However, existing cooperative caching schemes mostly focus on delta and/or weak consistency. Recently, RPCC was proposed, but it cannot overcome traditional PUSH and PULL methods in terms of ensuring a strong consistency. In this paper, we propose three algorithms that are based on the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.