共查询到20条相似文献,搜索用时 93 毫秒
1.
底层网络随机丢包导致的传输控制协议(TCP)传输性能恶化的问题由来已久.为了保障TCP的吞吐量在无线网络环境下依然能够保持在较好的性能,通过分析传输层网络编码(TCP/NC)协议的基本原理,分别利用NS-2搭建了软件仿真平台和Wi-Fi开发板搭建了硬件仿真平台.在2种平台上分别测试了传输层网络编码的性能并且分析了TCP的拥塞窗口和吞吐量性能.实验结果表明:传输层网络编码能够有效克服底层的随机丢包带来的影响,提升TCP吞吐量. 相似文献
2.
3.
在无线多跳网络中,本地重传和网络编码已经被成功地应用到多路径技术上以增加吞吐量并减少丢包。然而,在提高UDP传输性能的同时,也产生了数据包重排序和延迟等副作用,严重影响了TCP性能。针对此问题,主要提出一种基于网络编码的多路径传输方案NC-MPTCP,即在无线mesh网络的多条路径中引入网络编码、执行拥塞控制以及使用一个基于信用的方法控制节点的传输速率,提高网络的吞吐量以及增加网络传输的可靠性。该方案使用一个简单的算法,评估丢包率以及发送线性组合数据包的速率,用来降低目的节点的数据包解码延迟和防止TCP的超时重传。仿真结果表明设计的NC-MPTCP有效。 相似文献
4.
网络编码可以提高无线Mesh网络的吞吐量,但是网络编码在无线Mesh网络中实际应用获得最大网络利用率是需要解决的问题。提出一种多路径策略,能够通过将网络编码和TCP进行最大化融合提高网络的利用率。网络编码被加入到现有的网络系统,通过解决速率控制问题和分组调度问题,调整源节点的数据编码分块,降低数据包重传的次数,提高网络的吞吐量。 相似文献
5.
网络化多媒体实时监控系统的应用研究 总被引:7,自引:1,他引:6
采用MPEG-1编码解码国际标准和TCP/IP网络协议,在网络环境下,实现视音频信息和控制数据的网上传输。介绍了网络化多媒体实时监控系统的的构成、工作原理和功能特点,并对视音频实时编码技术和网络编程技术进行了详细探讨。 相似文献
6.
随着社会电子化智能程度的深入,基于TCP/IP的网络家电已成为家电系统中极其重要的一部分,在一些发达国家中,TCP/IP网络家电正日益普及并迅速发展。文章结合工作实际从网络家电系统、网络通信技术、网络家电设计等几个方面对网络家电系统原理和设计作了详细分析。 相似文献
7.
8.
9.
TCP拥塞控制机制及性能分析 总被引:1,自引:0,他引:1
随着因特网的迅猛发展,因特网中的业务量呈逐年上升趋势,研究了TCP拥塞控制机制及其提供的拥塞控制性能,特别是对TCP连接过程中的数据业务流量与丢失率和其他参数的关系进行了深入的研究。分析表明TCP拥塞控制机制可通过控制注入网络的业务流量,在一定程度下缓解网络拥塞程度,但不能实现数据的有效率的传输。 相似文献
10.
11.
LIU Zhi-qingSchool of Software Engineering Beijing University of Posts Telecommunications Beijing P.R. China 《中国邮电高校学报(英文版)》2005,12(3)
1 Introduction With the rapid development of the Internet and popu-lar broadband connections to the Internet , more andmore embedded systems are designed with networkingconnections for home and office use[1]. Some examplesof such embedded systems include Wi-Fi cell-phones ,systems for long-distance education,setup boxes for In-ternet TV,and more . These systems typically run anembedded operating system and support TCP/IP net-working on the traditional fast Ethernet and the emerg-ing WLA… 相似文献
12.
Several solutions are proposed to extend storage area networking solutions over distances of hundreds to thousands of kilometers. Native fibre channel or end-to-end fibre channel-based solutions can be offered over long distances using SONET-based networks. Protocols such as Internet SCSI (iSCSI), Internet fibre channel protocol (iFCP) and fibre channel over TCP/IP (FCIP) are being proposed to enable storage area networking solutions over networks that use IP as their transport protocol. Performance analysis of these solutions in terms of application throughput under variable network conditions of packet loss, bandwidth availability, extension distance, and TCP implementations in the sender and receiver is presented based on analytical modeling of different solutions. 相似文献
13.
14.
Jiann‐Liang Chen Yu‐Feng Lee Yao‐Chung Chang 《International Journal of Network Management》2006,16(1):29-43
Recently, the world has become increasingly mobile, and people have started communicating by wireless networking. Mobile IPv6 enables mobile users to communicate with each other while moving. In this study, a mobile IPv6 network was implemented by the IEEE 802.11 specification, and its performance was analyzed using TCP and UDP applications. The experimental results indicate that throughput stabilized for UDP applications after about 6–14 seconds. However, TCP applications were found to stabilize throughput in 10–20 seconds. The evaluation results reveal that TCP applications perform less well in mobile IPv6 networking than UDP applications. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
15.
16.
Transmission control protocol (TCP) is the most widely used transport protocol on the Internet today. Over the years, especially recently, due to requirements of high bandwidth transmission, various approaches have been proposed to improve TCP performance. The Linux 2.6 kernel is now preemptible. It can be interrupted mid‐task, making the system more responsive and interactive. However, we have noticed that Linux kernel preemption can interact badly with the performance of the networking subsystem. In this paper, we investigate the performance bottleneck in Linux TCP. We systematically describe the trip of a TCP packet from its ingress into a Linux network end system to its final delivery to the application; we study the performance bottleneck in Linux TCP through mathematical modelling and practical experiments; finally, we propose and test one possible solution to resolve this performance bottleneck in Linux TCP. Copyright © 2007 John Wiley & Sons, Ltd. 相似文献
17.
An overview of low bit rate coding and the interaction between source coding and channel coding is presented. The interaction of coding with networking in a multiuser environment, including algorithms for robust coding which anticipate imperfect network performance, and techniques of decoding a signal that has traversed an imperfect network are described. The performances of such algorithms are illustrated with examples from speech, audio, and video transmission in the presence of packet losses. The challenges in measuring the quality of service (QOS) in the context of new algorithms for coding and networking and the difficulty of measuring QOS in the networking of multimedia information are discussed 相似文献
18.
Orphanos G. Birbas A. Petrellis N. Mountzouris L. Malataras A. Goldfinch A. Brosnan L. Janko U. 《Communications Magazine, IEEE》2000,38(4):128-135
This article presents the design and development of a networking system architecture targeted to support high-speed TCP/IP communication over ATM. The discussed architecture has been developed in the form of an integrated system which incorporates state-of-the-art software and hardware subsystems, and an OC-12c ATM adapter (622 Mb/s). Moreover, the design of this embedded system has been based on the Chorus real-time operating system, which, in turn, hosts an accelerated TCP/IP protocol stack over ATM. Furthermore, the embedded system board has been developed according to the PCI specification to easily be plugged into a host platform. In addition, the OC-12c ATM adapter subsystem has been designed and developed in order to also be plugged into the same host. The developed architecture has proven very efficient and reliable, providing high-throughput and low-latency bulk data communications. The measured performance on an OC-3c-based (155 Mb/s) testbed has shown that an optimally implemented TCP/IP stack, hosted by a real-time kernel and coupled with an ATM adapter, offers a robust desktop platform for high-speed end-to-end communications. The main feature of the accelerated TCP/IP protocol stack is the out-of-band processing of control and data information. The protocol accelerator embedded system processes the TCP/IP headers and accomplishes checksum computations, while data is transferred from the host's user memory space directly to the network. Finally, for validation purposes, the prototype system has been incorporated in an existing networking infrastructure targeted to support mass storage applications 相似文献
19.
20.
The Transmission Control Protocol/Internet Protocol (TCP/IP) suite is widely employed to interconnect computing facilities in today's network environments. However, there exist several security vulnerabilities in the TCP specification and additional weaknesses in a number of its implementations. These vulnerabilities may allow an intruder to “attack” TCP-based systems, enabling him/her to “hijack” a TCP connection or cause denial of service to legitimate users. The authors analyze the TCP code via a “reverse engineering” technique called “program slicing” to identify several of these vulnerabilities, especially those that are related to the TCP state-transition diagram. They discuss many of the flaws present in the TCP implementation of many widely used operating systems, such as SUNOS 4.1.3, SVR4, and ULTRIX 4.3. The corresponding TCP attack “signatures” (including the well-known 1994 Christmas Day Mitnick Attack) are described, and recommendations are provided to improve the security state of a TCP-based system (e.g., incorporation of a “timer escape route” from every TCP state). Also, it is anticipated that wide dissemination of this article's results may not only lead to vendor patches to TCP code to plug security holes, but also raise awareness of how program slicing may be used to analyze other networking software and how future designs of TCP and other software can be improved 相似文献