The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the current mobile network context, a Mobile Node can change its point of attachment to different networks so frequently that basic Mobile IPv6 has many difficulties in preversing system quality in handover process. This problem has attracted the attention of many research groups and also gained certain achievements. Our paper focuses on analysing, comparing and synthesizing published Mobile IPv6...
Low handover latency and IP session continuity are envisioned to be important factors for realizing next-generation all-IP heterogeneous wireless networks. To meet these constraints of the next generation networks, Proxy Mobile IPv6 (PMIPv6) has been considered as one of the IP mobility management protocols in recent years. Much research about the performance analysis of PMIPv6 has been done. However,...
In a wireless domain where a mobile user accesses heterogeneous wireless technologies with multiple interfaces, a multi-path scheduling algorithm can benefit mobile users' experience by aggregating different network bandwidth together. However, existing literature actually shows that for TCP flows, it may not be the case. To better exploit multi-path scheduling for TCP connections, this paper presents...
Optical circuit-switched networks deployed in core (backbone) networks are used primarily to offer leased-line (“static”) services to interconnect IP routers. Most end-user applications are implemented to use the TCP/IP protocol stack of the Internet. Recently, a number of eScience applications have emerged that could rightly be characterized as “heavy-hitters” in that they require a disproportionately...
Delivering desired QoS to the applications is one of the most important challenges in next generation networks. Designing efficient queue management in midway nodes leads to improvement in NGN efficiency. This paper presents fair Efficient active Queue Management (EQM) mechanism for congestion avoidance and control in next generation networks. Proposed AQM mechanism uses instantaneous queue length...
In monitoring wireless sensor networks (WSNs), the occurrence of an emergency will generate a large amount of data in a very short time. Among them, some urgent information is more critical and needs to be transmitted out reliably as soon as possible. In this scenario, congestion is inevitable due to the limited resources, especially near the sink. To address this problem, we propose a novel reliable...
We present an empirical model of the upstream end-to-end Voice-over-IP (VoIP) delay over a mobile, multi-hop wireless network towards a single gateway. First, we define the “VoIP regime” as the regime of network operation in which a fraction 1 - ϵ of the packets are received by the gateway within the maximum tolerable VoIP networking delay yvoip, and such that e is less than a maximum tolerable outage...
In IEEE 802.16 networks, bandwidth allocation is centralized at the base station (BS). For the uplink traffic, data transmission is scheduled after the BS processes bandwidth requests (BW-REQs) sent by mobile stations (MSs). In this paper we focus on the multicast/broadcast polling method, where MSs send their BW-REQs during contention periods. Contention-based polling is deemed suitable for Best-Effort...
In the present heterogeneous wired networks, reliability priority consideration is important. Quality of Service (QoS) varies according to congestion in the network and it can be avoided by different TCP Agents using congestion control algorithms. Previously, researches had only analyzed TCP agents, we extend their work to practical simulation for the multisource scenario to compare performance evaluation...
This paper demonstrates a File delivery Protocol called as CCSDS File Delivery Protocol (CFDP). CFDP is a Consultative Committee for Space Data System (CCSDS) Protocol. It is applicable for use in data transfer from Onboard Space Craft to Ground Station and Vice Versa. First part of paper talks about necessity of specialized protocol like CFDP followed by futures of CFDP. Design of CFDP is explained...
The paper presents a solution to voice conflict of IP video intercom system and achieve voice communication by studying voice communication of IP intercom system. This solution applies G.711 used widely to code and decode and also applies UDP transmission protocol for real-time transmission. It solves the problems of voice-conflict, voice delay and voice's quality.
In this paper, a networked visual servo control system with distributed computation is proposed to overcome the low sampling rate problem in vision-based control systems. A real-time image data transmission protocol based on Realtime Transport Protocol (RTP) is developed. The captured images are sent to different processing nodes connected over a communication network and processed in parallel. Thus,...
During the last decades TCP and the networks it is used in steadily evolved. To aid further development it is crucial to give researchers measurement tools so they can evaluate and analyze their TCP modifications in real world network environments. In this paper we introduce the new measurement tool flowgrind. Unlike existing measurement tools, flowgrind's distributed architecture allows for an easy...
Improving video streaming performance is a main target today for the development of services and related business opportunities in the Internet. For this reason the definition of an efficient video transport paradigm is yet a challenging task. The most common protocol for data transmission in the Internet is TCP but it has been widely believed not suitable for multimedia streaming because of bandwidth...
We develop a protocol through which multipath enabled IP routers collectively engage in dynamic traffic engineering, to optimize performance in concert with legacy TCP congestion control. We build on recent theory which shows a globally optimum resource allocation across the TCP/IP layers can be achieved through control of rates and multipath routing fractions following a consistent congestion signal...
By identifying the shortcomings of using RTT to evaluate the quality of different paths in a multipath scenario, we propose a Relative Delay Estimator (RDE) to compare the relative one way delay of different paths without clock synchronisation. This estimator enables the comparison and selection of the best forward and backward paths, in terms of delay. As an initial application of RDE, we design...
Intermittently Connected Wireless Networks (ICWN) or Delay/Disruption Tolerant Networks (DTN), have attracted attention from researchers because of their inherent characteristics, including long latency, low data rate, and intermittent connectivity. Extensive research has been conducted on ICWN, including the architecture, and routing. However, few researchers have investigated the performance of...
BitTorrent developers have recently introduced a new application layer congestion control algorithm based on UDP framing at transport layer and currently under definition at the IETF ledbat Working Group. Ledbat is a delay-based protocol which aims at offering a ``lower than Best Effort'''' data transfer service, with a lower priority with respect to elastic TCP and interactive traffic (e.g., VoIP,...
Delay/disruption tolerant networking (DTN) technology offers a new solution to highly stressed communications in space environments, especially those with long link delay and frequent link disruptions in deep space missions. To date, little work has been done in evaluating the effectiveness of the available DTN protocols when they are applied to an interplanetary Internet. In this paper, we present...
Researches on multicast has explored security challenges faced by group communications. Multicast transport protocols and multicast security protocols need to work closely to provide reliable and secure multicast services. However, there has been comparatively little work carried out to specify how exactly the two technologies can work together efficiently. In this paper, authors present an example...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.