The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data center networks widely uses TCP for communication between the servers as it provides reliability and congestion control. However, TCP does not work well for certain type of communication patterns. One such a pattern is barrier synchronized many to one communication. During this type of data transmissions, multiple servers simultaneously transmits data to a single client and also the client cannot...
Application migration is a promising technique to enable users of computational devices to continue a task even though the executing device changes. One key challenge to realise application migrations is to maintain the network sessions in case a network based application is migrated. This article presents a solution to maintain network sessions in application migration scenarios. We develop a prototype...
Pervasive computing is characterized by heterogeneous devices that usually have scarce resources requiring optimized usage. These devices may use different communication protocols which can be switched at runtime. As different communication protocols have different quality of service (QoS) properties, this motivates optimized self-adaption of protocols for devices, e.g., considering power consumption...
Random Early Detection (RED) algorithm, a framework of active queue management (AQM), has been proposed in order to improve the performance of congestion routers due to the increased use of Internet. But, the basic problem of a lag between congestion's occurrence and its remedy remained. To overcome this problem of RED, Explicit Congestion Notification (ECN) proposed by the IETF that allows end-to-end...
In this paper, we consider Peer-to-Peer Video on- Demand (P2P VoD) systems based on the Bit Torrent file sharing protocol. Since the rarest first policy adopted in the Bit Torrent protocol could not collect all pieces corresponding to a video file by their playback time, we need to develop a new piece selection rule particularly designed for P2P VoDs. In the proposed scheme, we assume the existence...
With the evolving of the network technology, the number of terminal equipping with multiple network interfaces keeps increasing because of the deploying of various access methods and the price descending of access devices. However, the terminals can not make full use of multiple interfaces concurrently in conversional network. In this paper, we motivate the advantages of simultaneously using multiple...
The aim of this study is to quantify performance of network file transfer for research testbed. This study was carried out because Internet users nowadays has surfing tendency to stream video, download and upload video which need more Internet bandwidth. In addition, there is also a requirement for clarification between theoretical and actual performance of Internet Protocol version 6 (IPv6). This...
This paper analyzes the performance of Ethernet layer congestion control mechanism Quantized Congestion Notification (QCN) during data access from clustered servers in data centers. We analyze the reasons why QCN does not perform adequately in these situations and propose several modifications to the protocol to improve its performance in these scenarios. We trace the causes of QCN performance degradation...
About ten years ago the trend of development of Ethernet-based field buses began. Now a (large) number of them are standardized within IEC 61158, a variety of products and a variety of installed systems do exist. Beside the usage of Ethernet as a fast physical layer it also brought the entire TCP/UDP/IP or Internet protocol suite down to the shop floor, establishing the general opportunity to provide...
Network device vendors have recently opened up the processing capabilities on their hardware platform to support third-party applications. In this paper, we explore the requirements and overheads associated with co-locating middlebox functionality on such computing resources on networking hardware. In particular, we use an example of TCP acceleration proxy (CHART) that improves throughput over networks...
In this paper, we propose a mechanism to support switching of multimedia services toward one display equipment among others connected to IP sharing device especially in home network. For this, we developed a client agent mounted on display equipment for recognizing of user's information, a switching agent mounted on IP sharing device, which is related to IPtables management in the device, and embedded...
Multi-homing has been widely adopted in todaypsilas Internet. Several solutions have been proposed to support multi-homing, and Shim6 became most promising for IPv6-based next generation Internet. This paper proposes a Shim6-based dynamic path-selection mechanism, which selects path adaptively to earn higher bandwidth utilities and better performance. The experiment result shows that the new mechanism...
To increase the application accuracy of the inertia instrument, a distributed network test system for inertial instrument is designed and realized, on the base of analyzed the test contents, test parameters, network architecture, and network test mode. The system has four layers composite architecture based on C/S/B network model. The scheme of automatic test based on VXI bus was adopted in the field...
This paper presents a new kind of distributed fault recorder including the design of the system structure, the hardware and software design of the recorder. The recorder adopts NI CompaceRIO series programmable automation controller (PAC) in the hardware while virtual instrument technology in the software. The network communication based on TCP/IP between the client and the server is adopted in the...
We present a session initiation protocol (SIP) network design for a voice-over-IP (VoIP) network to prevent congestion caused by people calling friends and family after a disaster. The design increases the capacity of SIP servers in a network by using all the SIP servers equally. The design uses a property that SIP network elements do not carry voice data packets but signaling packets instead. Furthermore,...
In this paper, we present a formal model of Web services transport layer based on CSP which addresses multiple transport, multiple Message Exchange Patterns (MEPs) and dynamic switching among multiple transport protocols. This approach abstracts message transferred over networks as transport object and splits message transportation process of a transport protocol into two CSP processes: a transport...
In this paper we present a uniform negotiation and delivery mechanism for SIP-based conferencing system over IP network. With this mechanism rich innovative collaboration services can be developed conveniently to provide users with novel communication experience in IETF centralized conferencing (XCON) system. The mechanism adopts the extended SDP and offer/answer model as media description and negotiation...
Billions of dollars of electricity are being used to keep idle or unused network hosts fully powered-on only to maintain their network presence. We investigate how a network connectivity proxy (NCP) could enable significant energy savings by allowing idle hosts to enter a low-power sleep state and still maintain full network presence. An NCP must handle ARP, ICMP, DHCP, and other low-level network...
In distributed file systems, a need may arise for relocation of the file system to a different server. This is one of the fundamental mechanisms for ensuring file service availability for the geographically distributed clients. However, migration or replication in many such systems requires that the client or client side daemons take active measures for accessing the alternate servers, thus compromising...
Distributed denial-of-service (DDoS) attacks are a significant problem because they are very hard to detect, there is no comprehensive solution and it can shut an organization off from the Internet. The primary goal of an attack is to deny the victim's access to a particular resource. DDoS is implemented using source IP address spoofing. This paper provides a framework for detecting the attack and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.