Spelling suggestions: "subject:"computer network, protocol"" "subject:"coomputer network, protocol""
201 |
Avaliação de desempenho do protocolo TCP-NACK em canais com desvanecimento Rayleigh / Performance evaluation of TCP-NACK protocol over Rayleigh fading channelsPilo-Pais Albuja, Pablo Andres, 1987- 26 August 2018 (has links)
Orientador: Celso de Almeida / Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação / Made available in DSpace on 2018-08-26T13:55:04Z (GMT). No. of bitstreams: 1
Pilo-PaisAlbuja_PabloAndres_M.pdf: 1954449 bytes, checksum: e3d003c58a69987d3faeca15cf23928f (MD5)
Previous issue date: 2015 / Resumo: Os enlaces sem fio são propensos a gerar mais erros e perdas de segmentos devido à natureza do desvanecimento neste canal de comunicação. A falta de um mecanismo no protocolo TCP Reno que permita distinguir as perdas por erros aleatórios das perdas por congestionamento, resulta na redução da vazão de dados e um desempenho inferior ao esperado. A fim de melhorar o desempenho do protocolo TCP sobre redes sem fio, uma variante do protocolo TCP que utiliza uma confirmação negativa, NACK, foi proposta previamente em [1] para informar ao transmissor acerca do recebimento de um segmento com erro para sua retransmissão instantânea sem reduzir a janela de congestionamento. Na presente dissertação será avaliado o desempenho do algoritmo TCP-NACK sobre um cenário de provas com desvanecimento Rayleigh. Os resultados mostram que o protocolo TCP-NACK possui melhor desempenho em relação ao protocolo TCP em enlaces sem fio / Abstract: Wireless links are prone to generate more errors and segments loss due to the fading nature of the communication channel. The lack of a mechanism in TCP Reno to distinguish random errors from congestion losses, results in throughput reduction and performance lower than expected. In order to improve TCP over wireless networks, a negative acknowledgment, NACK, was earlier proposed in [1] to inform the transmitter about the reception of a segment with error for its retransmission without reducing the congestion window. In this thesis we are going to evaluate the TCP-NACK algorithm over a scenario with Rayleigh fading. The results show that TCP-NACK has better performance over TCP Reno in wireless links / Mestrado / Telecomunicações e Telemática / Mestre em Engenharia Elétrica
|
202 |
Traffic engineering label switched pathsBagula, Bigomokero Antoine 03 1900 (has links)
Thesis (MSc)--Stellenbosch University, 2002. / ENGLISH ABSTRACT: The Internet is evolving into a commercial platform requiring enhanced protocols and an expanded
physical infrastructure allowing a better delivery from IP. Multi-protocol Label Switching (MPLS)
is a technology enabling traffic engineering and virtual private network (VPN) provisioning.
MPLS achieves traffic engineering by carrying the traffic over virtual connections called Label
Switched Paths (LSPs) which are engineered based on QoS requirements such as delay, jitter and
packet loss minimization or throughput maximization.
This thesis proposes path finding and traffic distribution methods to be deployed in MPLS networks
for traffic engineering LSPs. A flow optimization model based on a pre-planned routing approach
separating path finding and traffic distribution is presented. This model is augmented by a
threshold routing approach which routes the traffic based on thresholds expressing the maximum
load level reached by network links. This routing approach moves the traffic away from thresholdmarked
links to achieve low-utilized links/paths. The performance and routing capabilities of
these methods are evaluated through designed software. A routing architecture implementing a
two-layer signalling model for MPLS network is proposed and evaluated through simulation.
v / AFRIKAANSE OPSOMMING:Die verandering van die Internet in 'n kommersiele platform met verbeterde protokolle en 'n
uitgebreide fisieke infrastruktuur stel die internetprotokol (IP) in staat tot beter lewering. Multiprotokol-
etiketskakeling (MPLS), is 'n tegnologie vir die voorsiening van televerkeerbeheer en
virtuele privaatnetwerke (VPN). MPLS verskaf televerkeerbeheer deur die verkeer te dra oar
virtuele konneksies, wat bekend staan as etiketgeskakelde paaie, waarvan die ontwerp gebaseer
is op vereistes vir diensgehalte soos vertraging, ritteling en die minimering van pakketverlies of
maksimering van deurvoer.
Hierdie tesis stel nuwe padvind- en verkeerdistribusiemetodes voor wat aangewend word in MPLSnetwerke
om etiketgeskakelde paaie te beheer. 'n Model vir vloei-optimering-gebaseer op voorafbeplande
roetering wat padvinding en verkeerdistribusie skei-word aangebied. Hierdie model
word uitgebrei deur 'n benadering van drempelroetering wat die verkeer roeteer en gebaseer is op
drempels wat die maksimum ladingsvlak voorstel wat bereik kan word deur netwerkskakels. Hierdie
roeteringsbenadering skuif die verkeer weg van drempelgemerkte skakels en bereik daardeur
laaggebruikte skakelsjpaaie. Die prestasie en roeteringsvaardigheid van hierdie metodes word
gevalueer deur selfontwikkelde programmatuur. 'n Argitektuur vir roetering wat 'n dubbellaagseinmodel
implementeer vir 'n MPLS-netwerk, word aangebied en gevalueer met simulasie.
|
203 |
The modelling of TCP traffic in MPLS networksVillet, Marcel 04 1900 (has links)
Thesis (MSc)--Stellenbosch University, 2003. / ENGLISH ABSTRACT: The Internet has experienced tremendous growth in the last three decades and has emerged as a
platform to carryall forms of communications including voice, video and data. Along with this
growth came the urgency for quality of service (QoS) controls in IP networks as different types of
traffics have different service requirements. Although the IP protocol is able to scale to very large
networks, it does not provide sufficient functionality for traffic engineering in order to enable QoS
control.
Multi-protocol label switching (MPLS) is a new routing technology that enhances IP with some
QoS concepts from ATM and uses relatively simple packet forwarding mechanisms. MPLS has the
ability to perform traffic engineering and QoS control by routing traffic flowson virtual connections
called label switched paths (LSPs) which are assigned capacity.
A large portion of the traffic carried on the Internet consists of data traffic in the form of TCP
traffic. This thesis investigates several TCP models to find the ones most suitable to represent
TCP traffic in MPLS networks. The models consist of three types. The first type models a single
TCP source and the second type models a fixed number of TCP sources. The third type models
an infinite number of TCP sources. The models were evaluated by comparing their throughput
predictions and results obtained from simulation experiments that were done with the widely-used
simulator ns. We also present a simple derivation of the 1/,;e law for the TCP congestion window
size where e is the packet loss probability. / AFRIKAANSE OPSOMMING:In die afgelope drie dekades het die Internet beduidende groei ervaar, soveel so dat dit ontluik het
as 'n medium om alle tipes van moderne kommunikasies te hanteer insluitend telefoon, video en
data. Hierdie groei het gepaard gegaan met die behoefte na diensvlak (QoS) meganismes in IP
netwerke aangesien verskillende tipe kommunikasies verskillende diens vereistes het. Alhoewel die
IP protokol skalleerbaar is tot baie groot netwerke, voorsien dit nie voldoende funksionaliteit om
QoS beheer toe te pas nie.
"Multi-protocol label switching" (MPLS) is 'n nuwe roeterings tegnologie wat IP aanvul met QoS
konsepte van ATM en dit maak gebruik van relatief eenvoudige pakkie versendings-meganismes.
MPLS het die vermoe om netwerk-verkeer reeling en QoS beheer toe te pas deur verkeers-strome
te roeteer op virtuele roetes genaamd "label switched paths" (LSPs) aan wie kapasiteit toegeken
is.
'n Beduidende gedeelte van Internet-verkeer bestaan uit TCP-verkeer. Hierdie tesis ondersoek
verskillende modelle van TCP om die te vind wat die mees geskik is om TCP verkeer in MPLS
netwerke te verteenwoordig. Drie tipes modelle is ondersoek. Die eerste tipe moduleer 'n enkele
TCP verkeersbron en die tweede tipe moduleer 'n vasgestelde aantal TCP verkeersbronne. Die
derde tipe moduleer 'n oneindige aantal verkeersbronne. Die modelle is geevalueer deur hul voorspellings
van die tempo van data transmissie te vergelyk met resultate van simulasies. Die simulasies
is gedoen met die veelgebruikte simulator ns. Hierdie tesis bevat ook 'n eenvoudige afleiding
vir die 1/,;e wet vir die TCP oorlading venster grootte met e die verlies waarskeinlikheid van 'n
netwerk pakkie.
|
204 |
Predicting catastrophic BGP routing instabilitiesNguyen, Lien K. 03 1900 (has links)
Approved for public release, distribution is unlimited / Inter-domain routing connects individual pieces of Internet topology, creating an integral, global data delivery infrastructure. Currently, this critical function is performed by the Border Gateway Protocol (BGP) version 4 [RFC1771]. Like all routing protocols, BGP is vulnerable to instabilities that reduce its effectiveness. Among the causes of these instabilities are those which are maliciously induced. Although there are other causes, e.g., natural events and network anomalies, this thesis will focus exclusively on maliciously induced instabilities. Most current models that attempt to predict a BGP routing instability confine their focus to either macro- or micro-level metrics, but not to both. The inherent limitations of each of these forms of metric gives rise to an excessive rate of spurious alerts, both false positives and false negatives. It is the original intent of this thesis to develop an improved BGP instability prediction model by statistically combining BGP instability metrics with user level performance metrics. The motivation for such a model is twofold. 1) To provide sufficient prior warning of impending failure to facilitate proactive protection measures. 2) To improve warning reliability beyond existing models, by demonstrably reducing both false positives and false negatives. However, our analysis of actual network trace data shows that a widely used BGP instability metric, the total number of update messages received in a time period, is not a good indicator of future user level performance. / Civilian, Department of Defense
|
205 |
Implementing security in an IP Multimedia Subsystem (IMS) next generation network - a case studyUnknown Date (has links)
The IP Multimedia Subsystem (IMS) has gone from just a step in the evolution of the GSM cellular architecture control core, to being the de-facto framework for Next Generation Network (NGN) implementations and deployments by operators world-wide, not only cellular mobile communications operators, but also fixed line, cable television, and alternative operators. With this transition from standards documents to the real world, engineers in these new multimedia communications companies need to face the task of making these new networks secure against threats and real attacks that were not a part of the previous generation of networks. We present the IMS and other competing frameworks, we analyze the security issues, we present the topic of Security Patterns, we introduce several new patterns, including the basis for a Generic Network pattern, and we apply these concepts to designing a security architecture for a fictitious 3G operator using IMS for the control core. / by Jose M. Ortiz-Villajos. / Thesis (M.S.C.S.)--Florida Atlantic University, 2009. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2009. Mode of access: World Wide Web.
|
206 |
Experimental implementation of the new prototype in LinuxUnknown Date (has links)
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite. In the wired network, TCP performs remarkably well due to its scalability and distributed end-to-end congestion control algorithms. However, many studies have shown that the unmodified standard TCP performs poorly in networks with large bandwidth-delay products and/or lossy wireless links. In this thesis, we analyze the problems TCP exhibits in the wireless communication and develop TCP congestion control algorithm for mobile applications. We show that the optimal TCP congestion control and link scheduling scheme amounts to window-control oriented implicit primaldual solvers for underlying network utility maximization. Based on this idea, we used a scalable congestion control algorithm called QUeueIng-Control (QUIC) TCP where it utilizes queueing-delay based MaxWeight-type scheduler for wireless links developed in [34]. Simulation and test results are provided to evaluate the proposed schemes in practical networks. / by Gee Won Han. / Thesis (M.S.C.S.)--Florida Atlantic University, 2013. / Includes bibliography. / Mode of access: World Wide Web. / System requirements: Adobe Reader.
|
207 |
Joint TCP congestion control and wireless-link scheduling for mobile Internet applicationsUnknown Date (has links)
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite, which is used by major Internet applications such as World Wide Web, email, remote administration and file transfer. TCP implements scalable and distributed end-to-end congestion control algorithms to share network resources among competing users. TCP was originally designed primarily for wired networks, and it has performed remarkably well as the Internet scaled up by six orders of magnitude in the past decade. However, many studies have shown that the unmodified standard TCP performs poorly in networks with large bandwidth-delay products and/or lossy wireless links. In this thesis, we analyze the problems TCP exhibits in the wireless communication environment, and develop joint TCP congestion control and wireless-link scheduling schemes for mobile applications. ... Different from the existing solutions, the proposed schemes can be asynchronously implemented without message passing among network nodes; thus they are readily deployable with current infrastructure. Moreover, global convergence/stability of the proposed schemes to optimal equilibrium is established using the Lyapunov method in the network fluid model. Simulation results are provided to evaluate the proposed schemes in practical networks. / by Zhaoquan Li. / Thesis (Ph.D.)--Florida Atlantic University, 2013. / Includes bibliography. / Mode of access: World Wide Web. / System requirements: Adobe Reader.
|
208 |
Deadline-ordered burst-based parallel scheduling strategy for IP-over-ATM with QoS support.January 2001 (has links)
Siu Chun. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2001. / Includes bibliographical references (leaves 66-68). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Thesis Overview --- p.3 / Chapter 2 --- Background and Related work --- p.4 / Chapter 2.1 --- Emergence of IP-over-ATM --- p.4 / Chapter 2.2 --- ATM architecture --- p.5 / Chapter 2.3 --- Scheduling issues in output-queued switch --- p.6 / Chapter 2.4 --- Scheduling issues in input-queued switch --- p.18 / Chapter 3 --- The Deadline-ordered Burst-based Parallel Scheduling Strategy --- p.23 / Chapter 3.1 --- Introduction --- p.23 / Chapter 3.2 --- Switch and queueing model --- p.24 / Chapter 3.2.1 --- Switch model --- p.24 / Chapter 3.2.2 --- Queueing model --- p.25 / Chapter 3.3 --- The DBPS Strategy --- p.26 / Chapter 3.3.1 --- Motivation --- p.26 / Chapter 3.3.2 --- Strategy --- p.31 / Chapter 3.4 --- The Deadline-ordered Burst-based Parallel Iterative Matching --- p.33 / Chapter 3.4.1 --- Algorithm --- p.34 / Chapter 3.4.2 --- An example of DBPIM --- p.35 / Chapter 3.5 --- Simulation results --- p.33 / Chapter 3.6 --- Discussions --- p.46 / Chapter 3.7 --- Future work --- p.47 / Chapter 4 --- The Quasi-static DBPIM Algorithm --- p.50 / Chapter 4.1 --- Introduction --- p.50 / Chapter 4.2 --- Quasi-static path scheduling principle --- p.51 / Chapter 4.3 --- Quasi-static DBPIM algorithm --- p.56 / Chapter 4.4 --- An example of Quasi-static DBPIM --- p.59 / Chapter 5 --- Conclusion --- p.63 / Bibliography --- p.65
|
209 |
Congestion Control for Streaming MediaChung, Jae Won 18 August 2005 (has links)
"The Internet has assumed the role of the underlying communication network for applications such as file transfer, electronic mail, Web browsing and multimedia streaming. Multimedia streaming, in particular, is growing with the growth in power and connectivity of today's computers. These Internet applications have a variety of network service requirements and traffic characteristics, which presents new challenges to the single best-effort service of today's Internet. TCP, the de facto Internet transport protocol, has been successful in satisfying the needs of traditional Internet applications, but fails to satisfy the increasingly popular delay sensitive multimedia applications. Streaming applications often use UDP without a proper congestion avoidance mechanisms, threatening the well-being of the Internet. This dissertation presents an IP router traffic management mechanism, referred to as Crimson, that can be seamlessly deployed in the current Internet to protect well-behaving traffic from misbehaving traffic and support Quality of Service (QoS) requirements of delay sensitive multimedia applications as well as traditional Internet applications. In addition, as a means to enhance Internet support for multimedia streaming, this dissertation report presents design and evaluation of a TCP-Friendly and streaming-friendly transport protocol called the Multimedia Transport Protocol (MTP). Through a simulation study this report shows the Crimson network efficiently handles network congestion and minimizes queuing delay while providing affordable fairness protection from misbehaving flows over a wide range of traffic conditions. In addition, our results show that MTP offers streaming performance comparable to that provided by UDP, while doing so under a TCP-Friendly rate."
|
210 |
Proportional Integrator with Short-lived flows AdjustmentKim, Minchong 22 January 2004 (has links)
The number of Web traffic flows dominates Internet traffic today and most Web interactions are short-lived HTTP connections handled by TCP. Most core Internet routers use Drop Tail queuing which produces bursts of packet drops that contribute to unfair service. This thesis introduces two new active queue management (AQM) algorithms, PISA (PI with Short-lived flows Adjustment) and PIMC (PI with Minimum Cwnd). These AQMs are built on top of the PI (Proportional Integrator). To evaluate the performance of PISA and PIMC, a new simple model of HTTP traffic was developed for the NS-2 simulation. TCP sources inform PISA and PIMC routers of their congestion window by embedding a source hint in the packet header. Using the congestion window, PISA drops packets from short-lived Web flows less than packets from long-lived flows. Using a congestion window, PIMC does not drop a packet when congestion window is below a fixed threshold. This study provides a series of NS-2 experiments to investigate the behavior of PISA and PIMC. The results show fewer drops for both PISA and PIMC that avoids timeouts and increases the rate at which Web objects are sent. PISA and PIMC improve the performance of HTTP flows significantly over PI. PISA performs slightly better than PIMC.
|
Page generated in 0.0747 seconds