84 research outputs found

    Masking Lossy Networks by TCP Tunnel with Network Coding

    Get PDF
    Transmission Control Protocol (TCP) with Network Coding (TCP/NC) was designed to recover the lost packets without TCP retransmission to improve the goodput performance in lossy networks. However, TCP/NC is too costly to be implemented in some types of end devices, e.g., with less memory and power. In addition, TCP/NC across loss-free but thin networks may waste scarce link bandwidth due to the redundant combination packets sacrificed for the lossy network. In this paper, we propose the TCP/NC tunnel to convey end-to-end TCP sessions on a single TCP/NC flow traversing a lossy network between two special gateways without per-flow management. We implemented and validated our proposal in Network Simulator 3, in which each gateway runs a reinforced version of TCP/NC that we previously developed. The results show that the proposed TCP/NC tunnel can mitigate the goodput degradation of end-to-end TCP sessions traversing a lossy network without any change in TCP on each end host.The 22nd IEEE Symposium on Computers and Communications (ISCC\u2717), 03 - 06 July 2017, Heraklion, Crete, Greec

    On the Characteristics of TCP/NC Tunneling in Heterogeneous Environments

    Get PDF
    Transmission Control Protocol (TCP) with a loss-based congestion control is still dominantly used for reliable end-to-end data transfer over diverse types of network although it is ineffective when traversing lossy networks. We previously proposed an IP tunneling system across lossy networks using the TCP with Network Coding (TCP/NC tunnel) and showed its potential to significantly mitigate the goodput degradation of end-to-end TCP sessions without any change of enddevice’s communications protocol stack, but it was shown only in homogeneous conditions. On the other hand, reliable end-to-end data transfer in diverse and heterogeneous IoT environments in a cost-efficient manner is an emerging challenge. Therefore, in this paper, we investigate the characteristics of the TCP/NC tunnel on heterogeneous networks with/without network congestions, to assess the applicability of the TCP/NC tunnel-based intelligent gateway system to IoT environments where end-devices are connected to a gateway with different link bandwidths or connected to different gateways in terms of network topology. The simulation results suggest the TCP/NC tunnel can efficiently utilize the bottleneck bandwidth in such heterogeneous situations even with congestion and achieve a significantly high goodput of end-to-end TCP sessions in a wide range of link loss degree especially when the tunnel link bandwidth is sufficient.The 10th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2018), September 5 - 7, 2018, Comenius University in Bratislava, Slovaki

    TCP network coding with adapting parameters for bursty and time-varying loss

    Get PDF
    The Transmission Control Protocol (TCP) with Network Coding (TCP/NC) was proposed to introduce packet loss recovery ability at the sink without TCP retransmission, which is realized by proactively sending redundant combination packets encoded at the source. Although TCP/NC is expected to mitigate the goodput degradation of TCP over lossy networks, the original TCP/NC does not work well in burst loss and time-varying channels. No apparent scheme was provided to decide and change the network coding-related parameters (NC parameters) to suit the diverse and changeable loss conditions. In this paper, a solution to support TCP/NC in adapting to mentioned conditions is proposed, called TCP/NC with Loss Rate and Loss Burstiness Estimation (TCP/NCwLRLBE). Both the packet loss rate and burstiness are estimated by observing transmitted packets to adapt to burst loss channels. Appropriate NC parameters are calculated from the estimated probability of successful recoverable transmission based on a mathematical model of packet losses. Moreover, a new mechanism for coding window handling is developed to update NC parameters in the coding system promptly. The proposed scheme is implemented and validated in Network Simulator 3 with two different types of burst loss model. The results suggest the potential of TCP/NCwLRLBE to mitigate the TCP goodput degradation in both the random loss and burst loss channels with the time-varying conditions

    Distributed multimedia systems

    Get PDF
    A distributed multimedia system (DMS) is an integrated communication, computing, and information system that enables the processing, management, delivery, and presentation of synchronized multimedia information with quality-of-service guarantees. Multimedia information may include discrete media data, such as text, data, and images, and continuous media data, such as video and audio. Such a system enhances human communications by exploiting both visual and aural senses and provides the ultimate flexibility in work and entertainment, allowing one to collaborate with remote participants, view movies on demand, access on-line digital libraries from the desktop, and so forth. In this paper, we present a technical survey of a DMS. We give an overview of distributed multimedia systems, examine the fundamental concept of digital media, identify the applications, and survey the important enabling technologies.published_or_final_versio

    A survey of IoT security based on a layered architecture of sensing and data analysis

    Get PDF
    The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers. Likewise, we propose a new classification of security threats and attacks based on new IoT architecture. The IoT architecture involves a physical perception layer, a network and protocol layer, a transport layer, an application layer, and a data and cloud services layer. First, the physical sensing layer incorporates the basic hardware used by IoT. Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions. Transport protocols are exhibited and the security threats against them are discussed while providing common solutions. Then, the application layer involves application protocols and lightweight encryption algorithms for IoT. Finally, in the data and cloud services layer, the main important security features of IoT cloud platforms are addressed, involving confidentiality, integrity, authorization, authentication, and encryption protocols. The paper is concluded by presenting the open research issues and future directions towards securing IoT, including the lack of standardized lightweight encryption algorithms, the use of machine-learning algorithms to enhance security and the related challenges, the use of Blockchain to address security challenges in IoT, and the implications of IoT deployment in 5G and beyond

    Preserving data integrity of encoded medical images: the LAR compression framework

    Get PDF
    International audienceThrough the development of medical imaging systems and their integration into a complete information system, the need for advanced joint coding and network services becomes predominant. PACS (Picture Archiving and Communication System) aims to acquire, store and compress, retrieve, present and distribute medical images. These systems have to be accessible via the Internet or wireless channels. Thus protection processes against transmission errors have to be added to get a powerful joint source-channel coding tool. Moreover, these sensitive data require confidentiality and privacy for both archiving and transmission purposes, leading to use cryptography and data embedding solutions. This chapter introduces data integrity protection and developed dedicated tools of content protection and secure bitstream transmission for medical encoded image purposes. In particular, the LAR image coding method is defined together with advanced securization services

    A system for improving the quality of real-time services on the internet

    Get PDF
    Real-time Internet services are becoming more popular every day, and Voice over Internet Protocol (VOIP) is arguably the most popular of these, despite the quality and reliability problems that are so characteristic of VOIP. This thesis proposes to apply a routing technique called Fully Redundant Dispersity Routing to VOIP and shows how this mitigates these problems to deliver a premium service that is more equal to traditional telephony than VOIP is currently.Fully Redundant Dispersity Routing uses the path diversity readily available in the Internet to route complete copies of the data to be communicated over multiple paths. This allows the effect of a failure on a path to be reduced, and possibly even masked completely, by the other paths. Significantly, rather than expecting changes of the Internet that will improve real-time service quality, this approach simply changes the manner in which real-time services use the Internet, leaving the Internet itself to stay the way it is.First, real VOIP traffic in a commercial call centre is measured (1) to establish a baseline of current quality characteristics against which the effects of Fully Redundant Dispersity Routing may be measured, and (2) as a source of realistic path characteristics. Simulations of various Fully Redundant Dispersity Routing systems that adopt the measured VOIP traffic characteristics then (1) show how this routing technique mitigates quality and reliability problems, and (2) quantify the quality deliverable with the VOIP traffic characteristics measured. For example, quantifying quality as a Mean Opinion Score (MOS) estimated from the measurements with the International Telecommunication Union’s E-model, slightly more than 1 in every 23 of the VOIP telephone calls measured in the call centre is likely to be perceived to be of a quality with which humans would be less than very satisfied. Simulations carried out for this thesis show that using just two paths adopting the same measurements, Fully Redundant Dispersity Routing may increase quality to reduce that proportion to slightly less than 1 in every 10 000 VOIP telephone calls

    Secure VoIP Performance Measurement

    Get PDF
    This project presents a mechanism for instrumentation of secure VoIP calls. The experiments were run under different network conditions and security systems. VoIP services such as Google Talk, Express Talk and Skype were under test. The project allowed analysis of the voice quality of the VoIP services based on the Mean Opinion Score (MOS) values generated by Perceptual valuation of Speech Quality (PESQ). The quality of the audio streams produced were subjected to end-to-end delay, jitter, packet loss and extra processing in the networking hardware and end devices due to Internetworking Layer security or Transport Layer security implementations. The MOS values were mapped to Perceptual Evaluation of Speech Quality for wideband (PESQ-WB) scores. From these PESQ-WB scores, the graphs of the mean of 10 runs and box and whisker plots for each parameter were drawn. Analysis on the graphs was performed in order to deduce the quality of each VoIP service. The E-model was used to predict the network readiness and Common vulnerability Scoring System (CVSS) was used to predict the network vulnerabilities. The project also provided the mechanism to measure the throughput for each test case. The overall performance of each VoIP service was determined by PESQ-WB scores, CVSS scores and the throughput. The experiment demonstrated the relationship among VoIP performance, VoIP security and VoIP service type. The experiment also suggested that, when compared to an unsecure IPIP tunnel, Internetworking Layer security like IPSec ESP or Transport Layer security like OpenVPN TLS would improve a VoIP security by reducing the vulnerabilities of the media part of the VoIP signal. Morever, adding a security layer has little impact on the VoIP voice quality

    Internet of Things From Hype to Reality

    Get PDF
    The Internet of Things (IoT) has gained significant mindshare, let alone attention, in academia and the industry especially over the past few years. The reasons behind this interest are the potential capabilities that IoT promises to offer. On the personal level, it paints a picture of a future world where all the things in our ambient environment are connected to the Internet and seamlessly communicate with each other to operate intelligently. The ultimate goal is to enable objects around us to efficiently sense our surroundings, inexpensively communicate, and ultimately create a better environment for us: one where everyday objects act based on what we need and like without explicit instructions
    • 

    corecore