The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Age of Information is a measure of the freshness of status updates in applications where the timeliness of information is crucial. We study an energy harvesting communication system in which status updates are sent through a link with negligible delay. We consider the average of a cost which is a non-decreasing function of the status age and investigate the optimal policy particularly for the scenario...
Backpressure-based adaptive routing algorithms have been studied extensively in the literature. Although backpressure-based adaptive routing algorithms have been shown to be network-wide throughput optimal, they typically have poor delay performance under light or moderate loads because packets may be sent over unnecessarily long routes. Further, backpressure-based algorithms have required every node...
The emerging Internet of Things (IoT) involves integrating and forwarding data generated by heterogeneous sensing devices (IoT devices). The data is sent using various wireless technologies to application servers present in the IoT cloud via intermediate gateways. Using traditional routing techniques to connect millions of IoT devices to the Internet result in congestion and overloading of gateways...
A fast Deflate implementation is described that outperforms Zlib by 6x. This pushes Deflate to speeds similar or better than purpose-built for speed standards such as LZ4 and Snappy but at better compression ratios.
Vehicular networks arose to support safety related applications and to improve the traffic flow in the roads; however, nowadays they are also used to provide Internet access and entertainment to the vehicles' users. Intrinsic characteristics of these networks are the constant mobility and high dynamics. Furthermore, being based on vehicles, the number of network nodes tends to increase in a fast pace...
The Multi-Path Transmission Control Protocol (MPTCP) is the new concurrent multi-path transfer extension for the widely-deployed Transmission Control Protocol (TCP). Of course, having multiple and possibly highly dissimilar paths for transmission is a challenge for the management of the send and receive buffers, since optimal throughput is desired with a reasonable allocation of the limited memory...
With the rapid development of Internet communications, there is a growing demand to support devices being connected to multiple Internet service providers simultaneously. For example, every modern smartphone already provides at least mobile broadband(UMTS, LTE) as well as Wi-Fi interfaces. This multi-homing property can be used for resilience, but there is also an increasing interest in making use...
Longest-prefix name-based forwarding in Content-Centric Networking poses many significant challenges on design of routers and algorithms, because the name space is many orders of magnitude larger and significantly more complex than the IP address space. IP forwarding algorithms are no longer applicable and cannot reach the satisfactory performance. In this paper, we present a framework of fast longest-name-prefix...
IPv6 has become popular now-a-days among the ISPs, organization and end users because of its magnificent features and due to the limitation of IPv4. The migration from IPv4 to IPv6 is mandatory due to the address scarcity and security vulnerabilities of IPv4. But the deployment of IPv6 is far beyond satisfactory level in Bangladesh. So, a smooth as well as effective transition mechanism is needed...
Recently, mobile broadcast services such as DMB, multimedia streaming services and IPTV, caused rapid increase of multimedia services sent over the Internet. It is important to define, measure and evaluate the elements related to the quality of providing the services over the Internet. In this paper, we propose multimedia quality measurement model that evaluates the quality of multimedia from consumers...
Satellites give exceptional points of interest, for example, remote scope with fast sending, separation lack of care, transmission capacity on interest, safety to physical debacles, and offering broadband connections. TCP has been produced for wired systems that have a lower delay and a low piece mistake rate. It is the most usually utilized transport layer convention as a part of the Internet and...
When media is streamed over networks that only provide best-effort delivery, playback interruptions caused by variations of network throughput can be largely eliminated by using techniques such as client-side playback buffering. A larger buffer generally provides stronger protection against playback interruptions, since it accommodates a wider range of download rate variability. However, larger buffers...
Emerging Information-Centric Networking (ICN) architectures seek to optimally utilize both bandwidth and storage for efficient content distribution over the network. The Virtual Interest Packet (VIP) framework has been proposed to enable joint design of forwarding, caching, and congestion control strategies within the Named Data Networking (NDN) architecture. While the existing VIP algorithms exhibit...
In this paper, we propose an improved MANET gateway selection scheme suitable for disaster recovery applications. Having an infrastructure less and decentralize features, MANET is well suited to bring the network back that has been collapse after a disaster. In this paper, we focus on improving throughput performance of MANET by designing a better gateway selection scheme. The key idea is to eliminate...
TTEthemet is a real-time Ethernet protocol that was designed to not only provide a deterministically temporal behavior for hard real-time communication but also support all types of Ethernet-based traffic coexisting in the same TTEthemet network. TTEthemet switches using the Timely Block method can obtain the timely deterministic behavior of time-triggered (TT) traffic with a very low communication...
The present paper focuses on the quantitative and qualitative performance analysis of Network Mobility (NEMO). It compares the original NEMO architecture with an architecture in which NEMO is enhanced with Multi-Path TCP (MPTCP). This quantitative and qualitative analysis is done by plotting theoretical and experimental results using a local testbed implementation. It is shown that the novel combination...
User Datagram Protocol (UDP) is designed as light weight protocol with no support for handshaking, ordering and error recovery etc. Hence, UDP is a preferred protocol where reliability can be traded-off for the end-to-end delay experienced by the users. This makes UDP suitable for delay sensitive traffic such as video and voice applications. In the literature, various models have been presented for...
Previously, we proposed the active access-point (AP) configuration algorithm for elastic Wireless Local-Area Network (WLAN) systems using heterogeneous APs. This algorithm activates or deactivates APs depending on traffic demands, assuming that any active AP can use a different channel to avoid interferences among APs. However, the number of non-interfered channels in IEEE 802.11 protocols is limited...
Quality of Service (QoS) control is an important concept in computer networking, as it is related to end-user experience. While providing QoS guarantees over the Internet has long been deemed too complicated, the emergence of Software Defined Networking (SDN), and OpenFlow as its most popular standard, may facilitate QoS control. In this paper, we consider how to enable bandwidth guarantees with OpenFlow...
Rateless erasure code (REC) is an erasure code, where the encoder generates a potentially infinite number of encoded symbols and the original message can be reconstructed from a sufficient number of correctly received packets. Many REC-based transmission protocols have been proposed for improving network throughput in lossy channel. However, state-of-the-art RECs (such as LT code and Raptor code)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.