The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes efficient analytical models to dimension the required transport bandwidths for the Long Term Evolution (LTE) access network for the elastic Internet traffic (which is carried by the TCP protocol). The dimensioning models are based on the use of Processor Sharing queuing theory to guarantee a desired end-to-end application QoS target. For validating the analytical dimensioning models,...
With the development of space science and technologies the exploration of the deep space has become the most important and direct way of exploring the unidentified planets or space resources. The data gathered by the equipment of deep space exploration need to be sent back to the Earth exactly, and the network is in a reliable manner. The transmission protocol of the deep space communication network...
Several communication environments, supporting important operational scenarios such as deep space communications, Earth observation and mobile terrestrial communications, are extremely challenging for traditional TCP/IP protocols because of their intrinsic characteristic to not guarantee continuously an end-to-end path. An attractive application scenario is concerned the presence of terminals moving...
The proliferation of handheld devices with the support of multiple interfaces makes it a common requirement of users to have access to multiple access networks simultaneously in order to obtain increased performance. Aggregating bandwidth of two or more Internet connections makes Internet applications to use the total available bandwidth in order to increase the goodput and reliability with link redundancy...
We propose a primary path switching scheme to provide a seamless handover for dual-homed mobile terminals. This scheme is suggested as an enhancement to the mSCTP protocol. With our scheme, a mobile terminal performs primary path switching before it becomes unavailable due to its primary path drop. The improvement of the scheme comes from considering the temporal velocity of the mobile terminal with...
TCP's performance significantly degrades in multi-hop wireless networks because TCP's retransmission timeouts (RTOs) are frequently triggered regardless of congestion due to sudden delay, and wireless transmission errors. The RTOs caused by wireless errors lead to TCP's unnecessary behaviors such as reducing sharply its sending rate and increasing exponentially its back-off value even when the network...
In wireless communication networks, TCP is a widely applied solution as it guarantees the delivery of data by implementing acknowledgement based techniques and used in wired networks as it ensures guard against the common remedy congestion in networks. Deploying TCP over wireless networks, restrictions such as random link errors, random packet loss, node distance, constantly changing topology are...
One of main feature of next generation of mobile networks is an integration of existing cellular systems with other wireless access technologies. In order to realize a seamless vertical handover (inter-RAT handover) among these different access technologies, a multi-interfaced mobile station is expected to communicate simultaneously on various network interfaces (i.e. to be multihomed) to achieve...
Hiding information in network traffic may lead to leakage of confidential information. In this paper we introduce a new steganographic system: the PadSteg (Padding Steganography). To authors' best knowledge it is the first information hiding solution which represents inter-protocol steganography i.e. usage of relation between two or more protocols from the TCP/IP stack to enable secret communication...
With the proliferation of the Internet, voice over IP and multimedia communication become more and more important. One of the protocol that facilitated this development is Session Initiation Protocol (SIP). SIP is a signaling protocol which manages the session establishment and termination. It can be based on UDP or TCP at the transport layer. In this paper, the strengths and weaknesses of SIP over...
Nowadays, most IPTV senders provide all of their multiple streaming channels under IPv4 protocol, in dedicated networks, which are high bandwidth but costly and having geographically limited number of subscribers located relatively close to IPTV senders. Due to the increase of Internet bandwidth, IPTV providers seem to offer incredibly better television standard with HD IPTV. In this paper we adopt...
This paper aims to determine the best rate adaptation strategy to maximize the received video quality when streaming SVC video over the Internet. Different bandwidth estimation techniques are implemented for different transport protocols, such as using the TFRC rate when available or calculating the packet transmission rate otherwise. It is observed that controlling the rate of packets dispatched...
Packet pacing in TCP has been introduced as one of the solutions to alleviate bursty traffic in TCP. In this paper, we investigate the performance of paced and standard (unpaced) TCP when coexist with DCCP over short and long delay link networks. We found that paced TCP for the entire TCP connection performs better in long delay link, with smoother throughput and better jitter, whereas in short delay...
Network congestion in the heterogeneous Internet, which is connected by millions of asynchronous systems, poses a serious threat to communication and intermediate nodes that falls under its path. The primary cause of network congestion is that data in networks are overloaded and available resources are inadequate to contain such traffic loads. An enormous amount of proposed approach towards network...
This paper analyzes the performance of Ethernet layer congestion control mechanism Quantized Congestion Notification (QCN) during data access from clustered servers in data centers. We analyze the reasons why QCN does not perform adequately in these situations and propose several modifications to the protocol to improve its performance in these scenarios. We trace the causes of QCN performance degradation...
To minimize the power consumption of a mobile device, mobile WiMAX based on IEEE 802.16/802.16e defines three power saving classes for transmitting different types of data traffic. However, the standard specification does not suggest a power saving class for transmitting background TCP traffic, such as a long FTP session. This paper investigates the energy efficiency of TCP transmission over a WiMAX...
Congestion control is the key techniques of Next-Generation-Networks. The classical TCP congestion control such as RED is difficult to configure parameters and the average queue length is related to the load level. A network-measurement based on congestion control algorithm is proposed, the essential idea is introduce macroscopic guidance according to network measurement, the measurement facilities...
Recently, both research-and-education networks (RENs) and commercial networks have added a dynamic circuit service. With this service, users can request and obtain dedicated bandwidth for short durations (on the order of minutes to hours). Host-to-host (cluster-to-cluster) circuits are used for large file transfers. The network nodes used for this circuit service are not pure TDM or WDM circuit switches;...
In recent years, the video streaming service has become one of the most important applications. The rapid growth of users raises a big challenge to the traditional client-server VoD service. In order to provide large scale VoD service with lower server bandwidth cost, P2P technology has been introduced to VoD service. P2P based VoD service provides the same user experience as the client-server mode...
Network emulation plays an important role in conducting performance analysis of network protocols and studying various network-related issues, such as Quality of Service of multimedia applications and traffic control algorithms. In this paper, we design and implement a Windows-based network emulator, WINPLEM, using the Network Driver Interface Specification technology. The emulator is capable of emulating...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.