نتایج جستجو برای: transport protocol

تعداد نتایج: 514843  

1998
Rajarshi Gupta Mike Chen Steven McCanne

The use of TCP for the Web has caused a variety of performance problems because the interactive request/response nature of Web tra c is incongruent with the sequenced, bi-directional, continuous, byte-stream model of TCP. We believe that these problems can be overcome by abandoning the constraints imposed by TCP and designing a new receiver-oriented transport protocol for the Web that leverages...

Journal: :RFC 2011
Michael Vittrup Larsen Fernando Gont

During the last few years, awareness has been raised about a number of "blind" attacks that can be performed against the Transmission Control Protocol (TCP) and similar protocols. The consequences of these attacks range from throughput reduction to broken connections or data corruption. These attacks rely on the attacker's ability to guess or know the five-tuple (Protocol, Source Address, Desti...

Journal: :African J. of Inf. & Commun. Technology 2007
Deddy Chandra Richard J. Harris

The traditional assumptions made by TCP about the operation of wired networks are often found to be invalid for wireless networks. Standard TCP semantics such as end-to-end flow control, congestion control mechanisms and error recovery provide reliability in wired networks. However, wireless communication systems have different characteristics when compared to wired networks that include higher...

2003
Javed I. Khan Raid Y. Zaghal

Interactivity in transport protocol can greatly benefit transport friendly applications. We have recently implemented an interactive version of TCP. The implementation has two components-an interactive transport protocol over FreeBSD called iTCP and, a novel symbiotic MPEG-2 full logic transcoder, which can dynamically change video characteristics based on interactive congestion response inside...

Journal: :Wireless Sensor Network 2011
Ahmed Ayadi

New wireless sensor network applications (e.g., military surveillance) require higher reliability than a simple best effort service could provide. Classical reliable transport protocols like Transmission Control Protocol (TCP) are not well suited for wireless sensor networks due to both the characteristics of the network nodes (low computing power, strong energy constraints) and those of the ma...

2011
Tobias Hoßfeld Raimund Schatz Thomas Zinner Michael Seufert Phuoc Tran-Gia

Video streaming currently dominates global Internet traffic and will be of even increasing importance in the future. In this paper we assess the impact of the underlying transport protocol on the user perceived quality for video streaming using YouTube as example. In particular, we investigate whether UDP or TCP fits better for Video-on-Demand delivery from the end user’s perspective, when the ...

1996
J. William Atwood O. Catrina J. Fenton W. Timothy Strayer

The Xpress Transport Protocol (XTP) is designed to meet the needs of distributed, real-time, and multimedia systems. This paper describes the genesis of recent improvements to XTP that provide mechanisms for reliable management of multicast groups, and gives details of the

1998
Dane Dwyer Sungwon Ha Jia-Ru Li Vaduvur Bharghavan

In this paper, we propose a novel approach for effectively supporting multimedia packet flows in an Internet environment. The following are the key contributions of this paper: (a) we propose a new transport protocol called HPF that supports multiple interleaved reliable and unreliable data sub-streams, (b) we decouple the congestion control and reliability mechanisms that are integrated in TCP...

2007

3 Channel Protocol 5 3.1 Protocol Organization . . . . . . . . . . . 5 3.2 Packet Layout . . . . . . . . . . . . . . . 5 3.3 Channel Identification . . . . . . . . . . . 6 3.4 Sequencing Layer . . . . . . . . . . . . . 6 3.4.1 Sequencing Barriers . . . . . . . 6 3.4.2 Extrapolating Sequence Numbers 6 3.5 Encoding Layer . . . . . . . . . . . . . . 7 3.6 Integrity Layer . . . . . . . . . . . . . ...

2014
Manisha Y. Joshi R. S. Bichkar

Conditional access system offers different services to the many groups simultaneously. The broadcast contents are scrambled with the secret key that protects it from unauthorized users. The secret key is distributed by server to the authorized users and shared it between user and server. The key transport protocol is used to transfer the secret key securely to these users. In this paper we pres...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید