In addition to unresponsive UDP traffic, aggressive TCP flows pose a serious challenge to congestion control and stability of the future Internet. This paper considers the problem of dealing with such unresponsive TCP sessions that can be considered to collectively constitute a Denial-of-Service (DoS) attack on conforming TCP sessions. The proposed policing scheme, called HaDQ (HaTCh-based Dynamic Quarantine), is based on a recently proposed HaTCh mechanism, which accurately estimates the number of active flows without maintenance of per-flow states in a router. We augment HaTCh with a small Content Addressable Memory (CAM), called quarantine memory, to dynamically quarantine and penalize the unresponsive TCP flows. We exploit the advantage of the smaller, first-level cache of HaTCh for isolating and detecting the aggressive flows. The aggressive flows from the smaller cache are then moved to the quarantine memory and are precisely monitored for taking appropriate punitive action. While the proposed HaDQ technique is quite generic in that it can work with or without any AQM scheme, in this paper we have integrated HaDQ and an AQM scheme to compare it against some of the existing techniques. For this, we extend the HaTCh scheme to develop a complete AQM mechanism, called HRED. Simulation-based performance analysis indicates that by using a proper configuration of the monitoring period and the detection threshold, the proposed HaDQ scheme can achieve a low false drop rate (false positives) of less than 0.1%. Comparison with two AQM schemes (CHOKe and FRED), which were proposed for handling unresponsive UDP flows, shows that HaDQ is more effective in penalizing the bandwidth attackers and enforcing fairness between conforming and aggressive TCP flows. 相似文献
Handovers may cause delays and packet losses that affect real-time communication performance. Mobility protocols at several layers are designed to support handover, but they need to be optimized to ensure high-quality application performance. Existing optimization techniques are not sufficient to take care of interdomain and intertechnology handovers involving different access technologies, such as Wi-Fi, GSM, CDMA, and WiMAX. We categorize several types of handover, describe handover delay components, and propose a handover optimization framework called media independent pre-authentication that can provide optimizations for interdomain and intertechnology handover in a manner that is transparent to mobility management protocols. In addition, we also present experimental results demonstrating that this framework can achieve a significant reduction in handover delays for both network-layer and application-layer mobility management protocols. 相似文献
In this paper, a multi hybrid decode-amplify-forward relay cooperative network with perfect CSI in flat Rayleigh fading channel is considered. Using moment generating function based approach, the closed form of symbol error rate (SER) with asymptotic approximation is derived. Based on the lower bound of SER (Olfat and Olfat in IET Commun 5(4):2018–2027, 2011), Lagrange multiplier method and differential evolution (DE) algorithm based power allocation schemes are proposed. With fixed source power, the relay powers are optimized with the proposed schemes by the power allocation factor. Further the SER performance of proposed power allocation schemes is investigated by varying the location of the relays. The performance gain of proposed power allocation schemes depends on the channel quality of source to relay and relay to destination links. It is observed that the proposed power allocation schemes outperform the equal power allocation scheme and DE based power allocation provides SER response close to power allocation with Lagrange multiplier method. In order to achieve the target SER (quality of service) minimum power allocation is introduced as minimum relay power allocation and minimum source and relay power allocation.
Wireless Personal Communications - Privacy issue has become a crucial concern in internet of things (IoT) applications ranging from home appliances to vehicular networks. RFID system has found... 相似文献
The implementation of machine-to-machine (M2M) communications in fifth-generation (5G) cellular networks can facilitate with several benefits like enhancement of bandwidth utilization, accommodating large number of users and decreasing traffic load on evolved node B (eNB). Integration of location information of unknown machine in communication mode selection mechanism is the key feature of this research. In this paper, a distance based communication mode selection mechanism using non-orthogonal resource sharing scheme is adopted in the proposed system model. Under the proposed mechanism, the expressions of throughput and RBs utilization policy are derived, which are the key parameters to evaluate the performance in the proposed network. Depending on the mode selection condition, such as threshold distance and threshold SINR between M2M users and regular cellular users, a UE can automatically choose its communication mode in the network. It is supposed that selection of mode before data transfer can improve the system performance. On the other hand, designing of efficient distance assisted proposed resource blocks (RBs) utilization policy reduces the traffic load on the eNB. Extensive simulations are carried out for evaluating the performance of the proposed mechanisms. The system performance is compared with various changeable parameters, such as throughput, mode selection threshold SINR, threshold distance and RBs. Besides, the proposed mechanism provides better network performance as well as reduces the traffic load in the proposed network.
The fluctuation of available link bandwidth in mobilecellular networks motivates the study of adaptive multimediaservices, where the bandwidth of an ongoing multimedia call can bedynamically adjusted. We analyze the diverse objectives of theadaptive multimedia framework and propose two bandwidth adaptationalgorithms (BAAs) that can satisfy these objectives. The firstalgorithm, BAA-RA, takes into consideration revenue and``anti-adaptation' where anti-adaptation means that a user feelsuncomfortable whenever the bandwidth of the user's call ischanged. This algorithm achieves near-optimal total revenue withmuch less complexity compared to an optimal BAA. The secondalgorithm, BAA-RF, considers revenue and fairness, and aims at themaximum revenue generation while satisfying the fairnessconstraint defined herein. Comprehensive simulation experimentsshow that the difference of the total revenue of BAA-RA and thatof an optimal BAA is negligible. Also, numerical results revealthat there is a conflicting relationship between anti-adaptationand fairness. 相似文献
The capacitance of dielectric coated metallic cylinder and truncated cone are evaluated using the method of moments based on the pulse function and point matching. The analysis is based on the boundary condition for the potential on the conductor surface and the normal component of the displacement density at the dielectric-free space interface. The total free charge on the conductor surface is found from the inversion of a matrix partitioned into submatrices. Numerical data on the capacitance and charge distribution are presented 相似文献
Often, in synthetic aperture radar (SAR) images of polar ice, one encounters shadow-like features across the images. Such features make it difficult to classify pixels into ice and water. Accordingly, it becomes a challenge to determine the true size and boundaries of ice floes in an SAR image of polar ice. We develop a simple statistical procedure which classifies pixels of an image by eliminating the effects of shadow-like features. Methodology developed in this paper is illustrated using some noisy SAR images of ice floes in the Arctic sea. 相似文献