The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Quality of Service (QoS) control is an important concept in computer networking, as it is related to end-user experience. While providing QoS guarantees over the Internet has long been deemed too complicated, the emergence of Software Defined Networking (SDN), and OpenFlow as its most popular standard, may facilitate QoS control. In this paper, we consider how to enable bandwidth guarantees with OpenFlow...
Explicit Congestion Notification (ECN) lets a bottleneck's Active Queue Management (AQM) mechanism inform an endpoint about congestion without having to drop a packet. A recently proposed sender-side modification called Alternative Backoff with ECN (ABE) enables reduced latency while maintaining good utilization with ECN. However, under certain circumstances ABE can produce a degree of unfair behavior...
An important aspect in providing Internet access is the cost for both fronthaul as well as backhaul connectivity, ultimately providing the access to the wider Internet content and services to the local community. The proliferation of media-rich content has led to a dramatic increase of backhaul costs, while creating pinching points in the often also limited fronthaul network that faces the end users...
The share of video streaming in the Internet traffic is expected to reach 80% by 2019. To deliver these video services in possibly strained settings and to meet with the users requirement of anywhere and multi-screen experience, HTTP Adaptive Streaming (HAS) is gaining momentum. However, TCP-transport of HAS flows is known to entail a number of issues both on Quality of Experience (QoE) and network...
Botnet-based Distributed Denial of Service (DDoS) attacks are considered as the main concerns and problems of today's Internet. The damage of these attacks are very serious since the number of computers involved in these attacks is huge and distributed worldwide. However, many protocols such as Domain Name System (DNS) have several security vulnerabilities nowadays that are utilized by botnet attackers...
The Content Delivery Network (CDN) has become an important element in the Internet, which uses applicationlayer caches to improve user experience and reduce network/server load. However, CDNs face efficiency issues due to the following two reasons: 1) they are not aware of the network status, and 2) the underlying location-centric network (IP) does not understand content. At the same time, the Information-Centric...
Due to the fluctuation of the bandwidth consumption of mobile users, the availability of a more flexible bandwidth pricing structure becomes important. Unfortunately, most mobile service providers only offer long-term contracts. Hence, wireless bandwidth sharing has a potential to become a niche market. In this paper, we propose the pay-per-second model, in which the price is based on the mobile net...
The Internet has become an integral part of human's life with an ever increasing number of applications and services that it provides to its customers. Both the numbers of Internet users and services provided by the Internet continue to rise tremendously. Quality of Service (QoS) is the ability of a network to provide better services for the users to divide the bandwidth according to the needs of...
This paper will discuss about transmission of multimedia content in limited capacity network (up to 5 Mbps), especially to study about the impact of background traffic towards multimedia content delivery quality in a limited capacity network. Observation methods proposed in the study include measurement of limited capacity network, background traffic modeling, and simulating the network to observe...
In Content-Centric Networking (CCN), Routing is intrinsically more difficult than routing in the traditional IP networks. Strategic content replication techniques reduce response time and the amount of network resources (e.g. bandwidth and server load). Thus, more than one path can be followed to reach the same content. however, each router does not have all information of cached data in the network,...
Currently, the Internet is one important part of the campus infrastructure that supports the teaching and learning activities. The important part of the internet facility is the provided bandwidth as Bandwidth management to teaching and learning is indispensable. In this study, an analysis and cluster of the university internet traffic is required as bandwidth management decision support. Therefore,...
To stream video using HTTP, a client device sequentiallyrequests and receives chunks of the video file fromthe server over a TCP connection. It is well-known that TCPperforms poorly in networks with high latency and packet losssuch as wireless networks. On mobile devices, in particular, usinga single TCP connection for video streaming is not efficient, andthus, the user may not receive the highest...
The Digital Agenda for Europe (DAE) mandates that 100-Mbit/s Internet access should be available to 50% of the households. Fiber to the Cabinet and Fiber to the Building are appealing architectures to quickly achieve this goal. This paper compares the standard copper technologies G.fast, VDSL2 and their enhancements in a multi-operator environment. The paper shows that both G.fast and the new EVDSL...
Adaptive video streaming techniques were introduced to enable high quality video delivery over HTTP. These schemes propose to choose dynamically the appropriate video rate to match the operating conditions. In home networks, wireless access is the predominant Internet access. Multiple clients/players with different link qualities compete over a limited wireless bandwidth to transfer their video streams...
Due to the increasing network risk of large-scale disaster, it is important to protect failed requests for network operators. For the disaster survivable problem in an elastic optical datacenter networks with a bandwidth constraint, we formulate an integer linear program (ILP) for shared protection model. The algorithm utilizes the priori method to maximize the network throughput firstly, and then...
Cyber-attacks appear to have grown in the past few years. Many policy changes have been made to control them, however, a clear path to a safe and secure cyber world is not visible. A mere technical view to confront the cyber-attacks could be futile if motivations behind attacks are not understood. To understand the motives behind cyber-attacks, we look at cyber-attacks as societal events associated...
A large part of the data transmitted over the Internet today consists of video streaming services, mainly due to the growth of services like Youtube, Skype or WebEx. The need for an adaptive video stream arose as a mobile robot with real-time video streaming capability has been developed. ARC-ROVER is a robot that could connect to the Internet via 3G technology, and that could be controlled over the...
Traditional routing in the Internet is best-effort. Path differentiation including multipath routing is a promising technique to be used for meeting QoS requirements of media-intensive applications. Since different paths have different characteristics in terms of latency, availability and bandwidth, they offer flexibility in QoS and congestion control. Additionally protection techniques can be used...
In current Internet, most of the traffic dedicated to video streaming applications. In recent years, Peer-to-Peer (P2P) streaming approach has gained more attention, due to the high cost of providing the required bandwidth for a large number of users in Client-Server model. Mesh-based peer-to-peer video streaming is a robust approach which recently employed in many multimedia networking applications...
Peer to peer networks offer an extensible framework for supporting video streaming service over the Internet. P2P networks efficiency highly depends on peers' contribution. In practice, some peers only use the service, but share few resources or do not share any resources. This phenomenon is called free riding which seriously affects the P2P networks efficiency. So, in order to encourage the peers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.