The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Development of transport protocols have received a great deal of attention of network research community at several past decades. One of the general directions of such an effort was to improve a congestion control mechanism of the TCP (Transmission Control Protocol), which is tightly bounded with other components of the protocol responsible, for example, for robust delivery of data and loss detection...
Data center networks widely uses TCP for communication between the servers as it provides reliability and congestion control. However, TCP does not work well for certain type of communication patterns. One such a pattern is barrier synchronized many to one communication. During this type of data transmissions, multiple servers simultaneously transmits data to a single client and also the client cannot...
In today's Internet age, web-based applications are an extremely logical way to disseminate, update, and visualize information. Our modern wired infrastructure and high-speed wireless access points make it possible to access high-bandwidth demanding applications from nearly everywhere. However, in places where infrastructure does not exist, and where information needs to be disseminated over areas...
Host identification, today, can be done at many layers of the network protocol stack depending on the identifiable parameter used for classification. But, these generally include fields from TCP/IP/MAC packets; that can be spoofed or manipulated very easily to misguide the identification process or include intolerable error into. Identification on wireless networks can be done with better precision...
This paper analyzes the performance of Ethernet layer congestion control mechanism Quantized Congestion Notification (QCN) during data access from clustered servers in data centers. We analyze the reasons why QCN does not perform adequately in these situations and propose several modifications to the protocol to improve its performance in these scenarios. We trace the causes of QCN performance degradation...
In the last years, Precision Farming and Farm Automation in Agricultural field, have been requesting short range wireless communication systems for machine synchronization and long range wireless communication for fleet management, and for production and task control in real time. Existing protocols can meet the requirements only partially: different legislation and product availability in different...
An innovative application for communication platform based on SIP protocol is presented in this paper. In this application, a group management model is proposed for SIP with grouping functions. A new encryption mechanism that combines AES and RSA algorithm is included in this model to ensure the security of SIP messages. Different from the traditional application based on SIP, the architecture of...
Efficient network transmission technology is one of the key technologies of stereoscopic video. This paper envisages a scenario of stereoscopic video transmitting over IP networking and puts forward so called Multi-View Data Conduit protocol (MVDC) which is an efficient network transmission technology for stereoscopic video using layered architecture of the scalable extension of H.264. The paper also...
Quality of Service (QoS) is still one of the major challenges for emerging services based on the Real-Time Transport Protocol (RTP) to deliver multimedia content. In the context of the Internet Protocol Television (IPTV) services, the synchronization of multimedia components plays an important role. In order to synchronize audio and video components of multimedia content, RTP timestamps have to be...
The composition and characteristics of real-time transport protocol (RTP) for voice is firstly discussed in this paper. According to RTP protocol and its related functions, in the Windows environment it uses WinSock (Windows Sockets) and multimedia library provided by Windows SDK to realize the implementation of RTP/RTCP protocol, and apply Visual C++ to design a real-time voice transmission software,...
In this paper, we describe the implementation of a Web-based application supported by SyncML protocol, which is able to execute management operations in different kind of devices. This application is characterized by a set of management options, in order to test and verify whether specific mobile devices implement Open Mobile Alliance(OMA) specifications. The elements that compose our Web-based application,...
Botnets with the centralized architecture provide a simple, low-latency, anonymous and efficient real-time communication platform for the botnet controllers. To our knowledge, most of the latest detected large-scale botnets are based on the centralized structure with HTTP or customized protocols. Therefore, centralized botnets detection helps greatly improve control of unwanted traffic. The main contribution...
IP networks allow constructing versatile device configurations for multimedia streaming. However, the stochastic nature of the packet-switched data transmission may complicate IP-based implementations of some conventional applications such as analog wired transmission of synchronized multi-channel audio. This paper introduces a multimedia streaming system based on the synchronization of multiple playback...
In distributed file systems, a need may arise for relocation of the file system to a different server. This is one of the fundamental mechanisms for ensuring file service availability for the geographically distributed clients. However, migration or replication in many such systems requires that the client or client side daemons take active measures for accessing the alternate servers, thus compromising...
To provide the reliable connectivity between two endpoints over the Internet, a firewall cluster for stateful high availability removes the single-point failure by replicating and maintaining TCP connection states to a backup firewall node, at the expense of the costs of network and system resources. In this paper, through trace-based simulations on a prototype implementation, we evaluate the overheads...
Implementing cryptography on devices with low computational power is a necessity as they became involved in communications over public networks. Even more, these devices became ubiquitous and are used in a large area of applications, from home-office systems to industrial control systems. We deal with the design and implementation of a cryptographic protocol that can be used to assure the authenticity...
The datagram congestion control protocol (DCCP) is a new transport protocol standard that the IETF recently proposed. Because DCCP simultaneously features congestion control and unreliable transmission, it's especially suited to multimedia streaming applications and has thus received much attention. This article introduces DCCP's main characteristics and operation.
FTPGrid incorporates traditional FTP system with grid technology to implement large-scale resource sharing with high performance and reliability. FTP servers that geographically neighbor with each other form communities, which in turn constitute the FTPGrid. In this paper, we propose a resource merging mechanism to establish a well-organized resource directory in each community by merging duplicated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.