The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
By constructing the exponential delay cost function, we formulate the consumer decision model based on the threshold strategies in dual-mechanism, and prove that there exists a unique symmetric Nash equilibrium in which the high-valuation consumers use a threshold policy to choose between the two selling channels. Then we extend our model under general delay cost function, and find that consumers...
With the development of the wireless communications technology and the multimedia technology, the wireless internet multimedia transport of real-time becomes an important applications field. We will meet a problem that the distinguish of the status of package loss is not very good which will affect the QoS when we transport multimedia data in wireless internet. Based on this problem the article comes...
Unlike traditional routing schemes that route all traffic along a single path, multipath routing strategies split the traffic among several paths in order to ease congestion. It has been widely recognized that multipath routing can be fundamentally more efficient than the traditional approach of routing along single paths. aiming at the increasing network traffic and the deficity that the former Ant...
TCP's downlink performance during FMIPv6-enabled IEEE802.11g handoff is examined. The use of a user-initiated Handoff Notification, sent prior to handoff, is proposed. Therefore, the correspondent node is aware of the handoff-induced disruption, hence avoiding dropping the congestion window size and triggering Fast Retransmission mechanisms. During handoff, it continues to send data packets which...
P2P (peer-to-peer) streaming systems are getting more and more popular in recent years. P2P streaming architectures can be classified into tree-based and mesh-based. The tree-based architecture has low start-up delay, but is less resilient to node failures compared to the mesh-based architecture, and it would result in a low delivery ratio and unstable quality of received multimedia. In this paper,...
Last few decades has brought many fundamental changes to data communications and the Internet. Internet has its roots in a networking project started by ARPA which consisted of four computers. Now the Internet spans the However transition to the new version has been remarkably slow. Thus in the interim, various transition mechanisms can be employed. In this paper two such mechanisms, namely configured...
Multimedia communication networks, such as the Internet, are heterogeneous in their nature due to the usage of different methods for content distribution. The efficiency of multimedia distribution depends on the variety of communication protocols that are simultaneously running (composed) over different network hosts in order to resolve packet conflicts. A very natural question that arises in such...
SIP (Session Initiation Protocol) is standardized by Internet Engineering Task Force (IETF) as a signaling and control functionality for multimedia services (video and audio). However, SIP is a text-based protocol with messages usually exceeding several hundred bytes in size, thus causing high call set-up latency over low bit-rate links. As a consequence, SIP suffers from undesirable delay which is...
In this paper, dynamics of the delayed Internet TCP-RED congestion control model is considered employing the analysis software of the delayed dynamical systems-DDE-BIFTOOL. The transmission delay τ1 can make it subject to Hopf and Fold bifurcation, thus the averaged queue length and arrival rate would be the approximately constant or vary periodically. The important effects of the transmission delay...
Traditional congestion control algorithms exhibit low convergence speed to equilibrium in high BDP (Bandwidth Delay Product) networks. The Fast Max-Min Kelly Control (FMKC) is a new and promising protocol that performs well especially in fairness convergence speed. FMKC utilizes packet loss to switch temporarily into a fairing mode and thereby improve the fairness convergence speed. In this paper,...
As VoIP applications become increasingly popular, voice quality remains the user's biggest concern. Peer-to-Peer network can potentially obtain qualified relay nodes (QRNs) to make path switching when the QoS of a default path degrades. Locating quality relay nodes rapidly and inexpensively however is a very challenging task. In this paper, we design and develop a sophisticated system to take snapshots...
Border Gateway Protocol (BGP) is the current interdomain routing protocol, which limits each router to using a single best path for each destination prefix even though multiple paths are available. This may not satisfy the diverse requirements of end users. The long convergence delay in BGP may cause serious inefficiency in network resource utilization and vulnerability to route failures. In this...
The file download process over Internet is usually slow. This paper presents design and simulation of a distributed and co-ordinated file transfer protocol for the Internet applications. Presented approach, known as hybrid parallelized file transport protocol (HPFTP), consist of a centralized server that distributes the download process across multiple file servers based on QoS parameters as available...
The paper discusses the network calculus and its application for streaming media transmission in packet switched networks. With more and more new services and applications deployed over the Internet, the demands for a new theory and tool have been required tremendously. Conventional queueing theory has some limitations and difficulties in its application for the new services over Internet, since conventional...
A lot of large distributed system can benefit from the implement of network coordinate system, which can estimate latencies among Internet hosts. In this paper, we focus on problems in building network coordinate system. Firstly, we analyze the disadvantages of some algorithms that based on fixed reference nodes and algorithms based on unfixed reference nodes. Then we propose a new architecture of...
Real time network applications require effective mechanisms for managing Internet traffic in order to avoid or at least limit the level of congestion. We propose, design and analyze an Active Queue Manager (AQM) for controlling jitter using robust control theory. We used an output feedback controller and this controller is based on discrete-time model of TCP. The natural properties of robust controller...
The end-to-end (e2e) arguments are of the most influential design principles for the Internet for about three decades, which basically suggest a design principle that puts the application-level functions at the network rather than inside the network as much as possible to simplify network design and implementation. In many cases moving some functions from a network edge into the network is often considered...
Delay jitter in packet-switched networks has to be compensated by a playout buffer. The playout buffer algorithm plays an important role in real-time applications such as VoIP, in this, paper we introduce a method based on truncated Gaussians to calculate the playout delay for VoIP application. Our method out-performs the existing methods both in term of residual delay and packet loss. This method...
An organization undertakes various steps to make sure that their business runs smoothly without any difficulties. Among them, data protection procedure is the soul of an organisation to recover from a disaster. This minor research aims at proposing a new risk analysis method which facilitates in overcoming issues related to data protection.
As the Internet is rapidly growing and its popularity increases, users tend to use creative, time-conservative, entertained and economical technologies. Real-time applications such as online gaming, voice and video applications are becoming more popular. Research effort to improve scheduling mechanisms in routers is currently given less attention by network researchers. This trend is far behind in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.