58 research outputs found
TCP Sintok: Transmission control protocol with delay-based loss detection and contention avoidance mechanisms for mobile ad hoc networks
Mobile Ad hoc Network (MANET) consists of mobile devices that are connected to each other using a wireless channel, forming a temporary network without the aid of fixed infrastructure; in which hosts are free to move randomly as well as free to join or leave. This decentralized nature of MANET comes with new challenges that violate the design concepts of Transmission Control Protocol (TCP); the current dominant protocol of the Internet. TCP always infers packet loss as an indicator of network congestion and causes it to perform a sharp reduction to its sending rate. MANET
suffers from several types of packet losses due to its mobility feature and contention on wireless channel access and these would lead to poor TCP performance. This experimental study investigates mobility and contention issues by proposing a protocol named TCP Sintok. This protocol comprises two mechanisms: Delay-based Loss Detection Mechanism (LDM), and Contention Avoidance Mechanism (CAM). LDM was introduced to determine the cause of the packet loss by monitoring the trend of end-to-end delay samples. CAM was developed to adapt the sending rate (congestion window) according to the current network condition. A series of experimental studies were conducted to validate the effectiveness of TCP Sintok in identifying the cause of packet loss and adapting the sending rate appropriately. Two variants of TCP protocol known as TCP NewReno and ADTCP were chosen to evaluate the performance of TCP Sintok through simulation. The results demonstrate that TCP Sintok improves jitter, delay and throughput as compared to the two variants. The findings have significant
implication in providing reliable data transfer within MANET and supporting its deployment on mobile device communication
Simulation-Based Performance Comparison of TCP Over IPV6 and IPV4
Internet Protocol ver-4 (IPv4) has been used for long times ago, but the great growth of the Internet and its change in drastic way over time makes IPv4 face many problems. The main one is the lack in address space, not to forget issues such as mobility and security. To meet requirements that didn't exist in IPv4, IP version 6 (IPv6) was designed. TCP protocol is as fundamental as IP protocol in the TCP/IP Protocol Suite. TCP adds some mechanisms to overcome unreliability and connectionless IP functionalities so can guarantee delivery the messages. In this project, we investigated the impact of using IPv6 on the behavior of TCP
by comparing the performance of TCP over IPv6 and IPv4. TCP Reno (one of TCP flavors)is used in the comparison; NS-2 and OMNeT++ are tools used to perform the simulation
experiments. During the course of simulations, throughput and delay (measured RTT) of TCP over IPv6 and 1Pv4 have been studied, and two different type of traffic (FTP,HTTP) are generated on same network topology with two scenarios run for each type of traffic (single flow, compete flow). Project results have shown a poor performance of TCP over IPv6 in terms of a lot of packet loss and long delay (measured RTT)
Adaptive Interest Lifetime in Named Data Networking to Support Disaster Area
Pending Interest Table (PIT) in Named Data Network (NDN) maintains a track of forwarded Interest packets so that the returned Data packet can be sent to its subscriber(s). PIT size is a crucial parameter, which can have a huge impact on the number of both satisfied and timed out Interest packet, and consequently, on the number of packet delay in terms of PIT overflow. There are a lot of studies focusing on caching, applications, and security to make NDN getting perfect, while the management of PIT is still one of the primary concerns of high-speed forwarding. Thus, PIT manages mechanism is one of the most important design specifics that have not been studied in the context of NDN to a significant extent. NDN needs to define concise mechanisms to monitor traffic when multiple users contend for access to the same or different resources, which may lead the PIT is overflowing and as a result increasing the delay. In order that, the objective of this study is to provide an adaptive mechanism under network load, namely Smart Threshold Interest Lifetime (STIL) to adjust incoming Interest packet in the early phase of occurrence to propose possible response decisions to realize PIT overflow recovery. The ndnSIM network simulator was used to measure the STIL. The results demonstrate that the proposed mechanism outperforms the performance of standard NDN PIT with respect to average Interest lifetime, Interest satisfaction, Interest retransmission and Interest satisfaction delay. The significance of this study is to provide a fundamental direction of a new adaptive Interest lifetime mechanism in NDN router to decrease the delay, especially on the natural disaster in a city, which will be very much useful for emergency operation centers, emergency rescue teams, and citizens
Vertical Handover in Wireless Heterogeneous Networks
Handover is one of the enhancement mechanisms that plays a central role in heterogeneous wireless networks. Designing a handover algorithm for heterogeneous networks becomes an essential issue since it is responsible for providing better Quality of Service (QoS) and higher level of Quality of Experience (QoE) to users. Similarly, the proposed algorithms must fulfill the user’s QoS requirements and must also provide seamless roaming across different networks. This paper presents an overview of some key issues pertaining to the design of Vertical Handover (VH) in 4G and 5G wireless networks. The VH measurements and decision mechanisms are studied in relation to network types and frequency used mechanisms. Moreover, the advantages and drawbacks of the existing works are investigated in detail and the challenging issues of the next generation of wireless networks are presented as well
A Scalable Name Resolution System for Information Centric Networking
Information Centric Networking (ICN) is a new paradigm, aimed at shifting to the future Internet from host centric to a content centric approach. ICN focuses on retrieval and dissemination of information between pairwise communications of hosts. Information are organized in the form of Information Objects (IO), known as Named Data Objects (NDO). These NDO are location independent. Objects in ICN are stored in the system overlay; popularly known as Name Resolution System (NRS). NDOs are requested by the Subscribers in the network to get the needed information from the Publishers, through NRS. Thus, the NRS is responsible in forwarding the interest packets based on the names of NDOs. This application of ICN depends on the scalability of the NRS. To design NRS, the most significant issue is scalability due to the ever-increasing number of NDOs. This paper aims to present the issues, by proposing balanced binary tree data structure to organize and store the NDOs. The methodology proposed in this work is thus; for every new insertion in the tree, a Balance Factor (BF) is computed to balance the height of left and right sub-tree. According to our investigation, balanced binary tree provides less searching time when compared to the Distributed Hash Table (DHT) approach. Simulation results show that End-to-End delay decreases by increasing the throughput in the network
A secure data outsourcing scheme based on Asmuth – Bloom secret sharing
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users’ queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients’ data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth–Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing
Review of name resolution and data routing for information centric networking
Information Centric Networking (ICN) a future Internet, presents a new paradigm by shifting the current network to the modern network protocols. Its goal, to improve the traditional network operations by enabling ICN packet routing and
forwarding based on names.This shift will bring advantages, but at the same time, it is leading to a big challenge on routing approaches to implement ICN nodes. Routing approaches must use special techniques to publish messages to all the network
nodes.Flooding approach is an easy and stateless, however, results in control overhead, depending on the network size.Moreover, designing, implementing, and evaluating routing approaches with higher capacity is really a key challenge in the overall ICN research area, because the state of ICN brings a significant cost; both in packet processing and router storage.Many approaches were proposed in the literatures over these years
for the efficient control of forwarding on the network.This paper provides a classification and review of the routing mechanisms that are proposed on six ICN architectures.A summary in tabular form and a comparative study of these six architectures is also given in the paper as well as few open research challenges are highlighted
Security Loop Agents for the Enterprise Applications based on Resource Description Framework
Security loop-holes can cost a fortune to a large enterprise organization providing e-commerce services. Meanwhile, the enterprise applications have been applied widely to simplify and generate better performance in managing the business tasks. Most of these applications (Enterprise Applications) unable to provide a high level of security due to the new daily threats specially when malicious agents entered into agent platforms and destroyed other active agents during the agent performance for client query. Meanwhile, the security issues in these applications left in the system unintentionally but are intruded intentionally. Hence, this study aims to come out with suitable solution for the existing question on how to secure and platform independent environment for the enterprise applications? By designing architecture to provides a secure and platform independent environment for agents' communication
- …