1 |
PERFORMANCE ANALYSIS OF PRIORITIZED TCP ACK SCHEMES IN THE IEEE 802.11e WLANsTHANGARAJ, ARUNA January 2007 (has links)
No description available.
|
2 |
Evaluation of Probabilistic Early Response TCP (PERT) for Video Delivery and Extension with ACK CoalescingQian, Bin 2011 August 1900 (has links)
This thesis demonstrates the performance of Probabilistic Early Response TCP (PERT), a new TCP congestion control, for video streaming. As a delay based protocol, it measures the delay at the end host and adjusts the congestion window accordingly. Our experiments show that PERT improves video delivery performance by decreasing the fraction of packets delivered late. Furthermore, our Linux live streaming test indicates that PERT is able to reduce the playback glitches, when high resolution video is delivered over a link with non-zero packet loss. In order to operate PERT at higher thoughputs, we design PERT to work with Acknowledgement (ACK) coalescing at the receiver. ACK coalescing makes data transfers burstier and makes it hard to estimate delays accurately. We apply TCP pacing to fix this issue, and validate its effectiveness in the aspects of throughput, packet loss and fairness. Our experiment results also show that PERT with Delayed ACK and Pacing is more friendly, and therefore more suitable when multiple traffic flows are competing for limited bottleneck bandwidth or sharing the same router buffer.
|
3 |
Metabolic engineering for enhanced propionic acid fermentation by Propionibacterium acidipropioniciSuwannakham, Supaporn 19 April 2005 (has links)
No description available.
|
4 |
Simulation Study of an ADSL Network Architecture: TCP/IP Performance Characterization and Improvements using ACK Regulation and Scheduling MechanismsPhanse, Kaustubh Suhas 04 December 2000 (has links)
Asymmetric digital subscriber line (ADSL) is a broadband access technology capable of delivering large bandwidth over existing copper telephone line infrastructure. This research aims at characterizing and analyzing TCP/IP performance in presence of a new protocol stack (TCP/IP over PPP and ATM) being promoted for one of the ADSL network architectures.
Using extensive simulations, we verify the adverse effects of asymmetric links on the performance of TCP and additional throughput degradation caused by the overhead at the AAL5- ATM layers. This study involves unidirectional as well as bi-directional data transfer using different traffic mixes including bursty and non-bursty types of traffic. Bi-directional data transfer over asymmetric links results in ACK compression wherein TCP acknowledgements (ACKs) get bunched together behind larger data packets, further exacerbating the effect of asymmetry on TCP performance. By implementing the simulation model for PPP encapsulation over AAL5, we characterize its effect in terms of throughput degradation and excessive delay.
We quantify the improvement in the throughput obtained by delaying the TCP ACKs and by TCP/IP header compression. These techniques being effective for unidirectional traffic over asymmetric links, however, do not prove as effective when ATM enters the scenario or in presence of bi-directional data transfer. Further, we implemented a simulation model of the Smart ACK Dropper (SAD), a technique to regulate the flow of TCP ACKs. Considerable improvement in performance especially in the presence of unidirectional data transfer is achieved using the SAD technique. Although the improvement is to a lesser extent in the presence of bi-directional data traffic, SAD helps the network in quickly recovering from the impact of ACK compression.
We also propose and implement certain customized queuing/scheduling and policing mechanisms to enable differentiated servicing of TCP ACKs and data packets, and mitigate the effect of ACK compression. While providing considerable TCP performance improvement in presence of SAD, custom queuing also allows fair sharing of bandwidth between TCP flows, unlike priority queuing, which starves the low priority flow. The committed access rate (CAR)policing scheme provides considerable performance improvement when used with SAD, and is especially useful when TCP ACKs compete with bursty data traffic over the slower upstream. / Master of Science
|
5 |
Protecting 802.11-Based Wireless Networks From SCTS and JACK AttacksZhang, Zhiguo 07 August 2008 (has links)
The convenience of IEEE 802.11-based wireless access networks has led to widespread deployment. However, these applications are predicated on the assumption of availability and confidentiality. Error-prone wireless networks afford an attacker considerable flexibility to exploit the vulnerabilities of 802.11-based mechanism. Two of most famous misbehaviors are selfish and malicious attacks. In this thesis we investigate two attacks: Spurious CTS attack (SCTS) and Jamming ACK attack (JACK). In the SCTS, malicious nodes may send periodic Spurious CTS packets to force other nodes to update their NAV values and prevent them from using the channel. In the JACK, an attacker ruins legitimate ACK packets for the intention of disrupting the traffic flow and draining the battery energy of victim nodes quickly. Correspondingly, we propose solutions: termed Carrier Sensing based Discarding (CSD), and Extended Network Allocation Vector (ENAV) scheme. We further demonstrate the performance of our proposed schemes through analysis and NS2 simulations.
|
6 |
Power Control Mechanisms on WARP BoardsKandukuri, Somasekhar Reddy January 2013 (has links)
In recent years, a number of power control concepts have been studied and implementedeither in simulation or in practice for different communication systems. It is still the case that a great deal of research is being conducted within the area of energyefficient power control mechanisms for future wireless communication networksystems. However, only a limited amount of practical work has been implemented onreal test beds environment. The main goal of this thesis is to propose and develop newprototype Transmit Power Control Mechanisms (TPCM) on WARP (Wireless Open-Access Research Platform) boards for point-to-point communications, which are to bedeveloped and tested in an indoor environment. This work mainly focuses on the automaticpower control nodes, transmission and reception over-the-air. In this thesis, wehave designed and developed TPCM to adjust the power levels on a transmitter nodeby following the feedback (ACK) approach. In this case, the destination (receiver)node always sends the feedback (ACK) to transmitter node during every successfultransmission of message signal and the main focus is on a reduction in the packetloss rate (PLR), an increase in the packet reception rate (PRR) and the capacity ofthe nodes. In this real work, we have developed and measured the results based ontwo functions namely, with and without packet window function power control mechanisms. According to the measurements section, both with and without function powercontrol mechanisms proved to have better performances for different tunable parameters.If both functions are compared, then the with window function power controlmechanism was shown to produce better performances than the without windowpower control mechanism and it also converged faster than the without window function.If consideration was given to controlling a reduction in packet loss rate, thenthe with widnow function offered higher performances than those without the windowfunction. In this regard, it was found that the with window function has acheived amaximum packet reception rate than that for the without window function for differenttunable parameters. In relation to the power consumption scenario, it was determinedthat the without window fuction proved to produce energy saving performances thanthe with window function. There are several interesting aspects of the transmit powercontrol mechanisms highlighted in the results and discussion chapter.
|
7 |
Security Threats in Mobile Ad Hoc NetworkBiswas, Kamanashis, Ali, Md. Liakat January 2007 (has links)
Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. As MANET is quickly spreading for the property of its capability in forming temporary network without the aid of any established infrastructure or centralized administration, security challenges has become a primary concern to provide secure communication. In this thesis, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have made comparative study to address the threats in different layers. Finally, we have identified the challenges and proposed solutions to overcome them. In our study, we have found that necessity of secure routing protocol is still a burning question. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack etc. In conclusion, we focus on the findings and future works which may be interesting for the researchers like robust key management, trust based systems, data security in different layer etc. However, in short, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.
|
8 |
Implementation of the IEEE 802.11a MAC layer in C language / Implementering av IEEE 802.11a MAC lagret i programspråket CPortales, Maria January 2004 (has links)
<p>There are several standards for wireless communication. People that are involved in computers and networking recognize names like Bluetooth, HiperLAN and IEEE 802.11. The last one was standardized in 1997 [2,6]and has begun to reach acceptance as a solid ground for wireless networking. A fundamental part of an IEEE 802.11 node is the Medium Access Controller, or MAC. It establishes and controls communication with other nodes, using a physical layer unit. </p><p>The work has been carried out as final project at Linkopings Universitet, it has been about the improvement of the functions of MAC layer. I have developed some of the required functions that PUM uses to interact with the MAC layer. Because of that, I have implemented the Reception functions of MAC layer, having the possibility of using short control frames RTS/CTS to minimize collision.</p>
|
9 |
Third-Party TCP Rate ControlBansal, Dushyant January 2005 (has links)
The Transmission Control Protocol (TCP) is the dominant transport protocol in today?s Internet. The original design of TCP left congestion control open to future designers. Short of implementing changes to the TCP stack on the end-nodes themselves, Internet Service Providers have employed several techniques to be able to operate their network equipment efficiently. These techniques amount to shaping traffic to reduce cost and improve overall customer satisfaction. <br /><br /> The method that gives maximum control when performing traffic shaping is using an inline traffic shaper. An inline traffic shaper sits in the middle of any flow, allowing packets to pass through it and, with policy-limited freedom, inspects and modifies all packets as it pleases. However, a number of practical issues such as hardware reliability or ISP policy, may prevent such a solution from being employed. For example, an ISP that does not fully trust the quality of the traffic shaper would not want such a product to be placed in-line with its equipment, as it places a significant threat to its business. What is required in such cases is third-party rate control. <br /><br /> Formally defined, a third-party rate controller is one that can see all traffic and inject new traffic into the network, but cannot remove or modify existing network packets. Given these restrictions, we present and study a technique to control TCP flows, namely triple-ACK duplication. The triple-ACK algorithm allows significant capabilities to a third-party traffic shaper. We provide an analytical justification for why this technique works under ideal conditions and demonstrate via simulation the bandwidth reduction achieved. When judiciously applied, the triple-ACK duplication technique produces minimal badput, while producing significant reductions in bandwidth consumption under ideal conditions. Based on a brief study, we show that our algorithm is able to selectively throttle one flow while allowing another to gain in bandwidth.
|
10 |
Implementation of the IEEE 802.11a MAC layer in C language / Implementering av IEEE 802.11a MAC lagret i programspråket CPortales, Maria January 2004 (has links)
There are several standards for wireless communication. People that are involved in computers and networking recognize names like Bluetooth, HiperLAN and IEEE 802.11. The last one was standardized in 1997 [2,6]and has begun to reach acceptance as a solid ground for wireless networking. A fundamental part of an IEEE 802.11 node is the Medium Access Controller, or MAC. It establishes and controls communication with other nodes, using a physical layer unit. The work has been carried out as final project at Linkopings Universitet, it has been about the improvement of the functions of MAC layer. I have developed some of the required functions that PUM uses to interact with the MAC layer. Because of that, I have implemented the Reception functions of MAC layer, having the possibility of using short control frames RTS/CTS to minimize collision.
|
Page generated in 0.0373 seconds