3,279 research outputs found
TCP in the Internet of Things: from ostracism to prominence
© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.TCP has traditionally been neglected as a transport-layer protocol for the Internet of Things (IoT). However, recent trends and industry needs are favoring TCP presence in IoT environments. In this article, we describe the main IoT scenarios where TCP will be used. We then analyze the historically claimed issues of TCP in the IoT context. We argue that, in contrast to generally accepted wisdom, most of those possible issues fall in one of the following categories: i) are also found in well-accepted IoT end-to-end reliability mechanisms, ii) can be solved, or iii) are not actual issues. Considering the future prominent role of TCP in the IoT, we provide recommendations for lightweight TCP implementation and suitable operation in such scenarios, based on our IETF standardization work on the topic.Postprint (author's final draft
Reflections on security options for the real-time transport protocol framework
The Real-time Transport Protocol (RTP) supports a range of video conferencing, telephony, and streaming video ap- plications, but offers few native security features. We discuss the problem of securing RTP, considering the range of applications. We outline why this makes RTP a difficult protocol to secure, and describe the approach we have recently proposed in the IETF to provide security for RTP applications. This approach treats RTP as a framework with a set of extensible security building blocks, and prescribes mandatory-to-implement security at the level of different application classes, rather than at the level of the media transport protocol
The evaluation of an active networking approach for supporting the QOS requirements of distributed virtual environments
This paper describes work that is part of a more general investigation into how Active Network ideas
might benefit large scale Distributed-Virtual-Environments (DVEs). Active Network approaches have been
shown to offer improved solutions to the Scalable Reliable Multicast problem, and this is in a sense the lowest
level at which Active Networks might benefit DVEs in supporting the peer-to-peer architectures considered
most promising for large scale DVEs. To go further than this, the key benefit of Active Networking is the ability
to take away from the application the need to understand the network topology and delegate the execution of
certain actions, for example intelligent message pruning, to the network itself. The need to exchange geometrical
information results in a type of traffic that can place occasional, short-lived, but heavy loads on the network.
However, the Level of Detail (LoD) concept provides the potential to reduce this loading in certain circumstances.
This paper introduces the performance modelling approach being used to evaluate the effectiveness of
active network approaches for supporting DVEs and presents an evaluation of messages filtering mechanisms,
which are based on the (LoD) concept. It describes the simulation experiment used to carry out the evaluation,
presents its results and discusses plans for future work
Performance Analysis of Multicast Mobility in a Hierarchical Mobile IP Proxy Environment
Mobility support in IPv6 networks is ready for release as an RFC, stimulating
major discussions on improvements to meet real-time communication requirements.
Sprawling hot spots of IP-only wireless networks at the same time await voice
and videoconferencing as standard mobile Internet services, thereby adding the
request for multicast support to real-time mobility. This paper briefly
introduces current approaches for seamless multicast extensions to Mobile IPv6.
Key issues of multicast mobility are discussed. Both analytically and in
simulations comparisons are drawn between handover performance characteristics,
dedicating special focus on the M-HMIPv6 approach.Comment: 11 pages, 7 figure
- …