A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2004; you can also visit the original URL.
The file type is application/pdf
.
Filters
User-level network interface protocols
1998
Computer
The last issues we focus on are reliability and multicast, which in modern networks can be supported both on the host processor and the network interface. ...
six important issues to consider in designing communication protocols for user-level architectures. ...
This research is supported in part by a Pionier grant from the Netherlands Organization for Scientific Research. ...
doi:10.1109/2.730737
fatcat:5462f3ahlbbwxclhscvdxrnxgq
these issues in a large scale. ...
So far the proposed approaches have focused on applying application-layer routing and path monitoring for reliability and on enforcing stateful packet filters in hosts or network to protect against Denial ...
In addition, Andreas Pashalidis and Hannes Tschofenig provided helpful feedbacks to the initial version of this paper. ...
doi:10.1145/1378191.1378214
dblp:conf/nossdav/FuC06
fatcat:juremwutzvaedjcz4xqsu7tepy
Reliability and scaling issues in multicast communication
1992
Conference proceedings on Communications architectures & protocols - SIGCOMM '92
In this paper, we examine the issues pertinent to eliminating these shortcomings. ...
In this paper, we show that using relatively simple network level protocols, more advanced services can be provided to support the sophisticated needs of distributed applications. ...
Transfer
the message
reliably
to children in T;~, using Procedue gz.
3.
Each end gateway e in Tg: Use Protocol GH2 to transfer
invocation messages to all end hosts. ...
doi:10.1145/144179.144275
dblp:conf/sigcomm/Rajagopalan92
fatcat:5lje2qyymranrnl32s44ed7ic4
Reliability and scaling issues in multicast communication
1992
Computer communication review
In this paper, we examine the issues pertinent to eliminating these shortcomings. ...
In this paper, we show that using relatively simple network level protocols, more advanced services can be provided to support the sophisticated needs of distributed applications. ...
Transfer
the message
reliably
to children in T;~, using Procedue gz.
3.
Each end gateway e in Tg: Use Protocol GH2 to transfer
invocation messages to all end hosts. ...
doi:10.1145/144191.144275
fatcat:rmwubjage5btjdr6p24ds7ewqy
Multicast: wired to wireless
2002
IEEE Communications Magazine
We hope that the discussion presented here will be helpful to application developers in selecting an appropriate multicast protocol for their specific needs. ...
Due to very diverse requirements, it is necessary to investigate and discern the applicability of existing multicast protocols and qualify which is more suitable for which types of applications. ...
Reliability is another major issue in wireless, since a host may miss some packets, or may receive some duplicate packets due to host movement. ...
doi:10.1109/mcom.2002.1007417
fatcat:fq465kr6dbfnbhktbe3j3abkbe
A Pragmatic Semantic Reliable Multicast Architecture for Distance Learning
[chapter]
2000
Lecture Notes in Computer Science
As PSRM is based upon ALF protocol architecture, we use application-defined semantics to adapt content in a heterogeneous environment. ...
In this paper, we present an alternative architecture for data distribution on Internet called PSRM that realizes semantic reliable, loose synchronized, multicast data delivery. ...
Issues in Supporting Reliable Multicast In this section, we discuss two key issues in supporting reliable multicast: the semantics of reliable multicast and the application level framing protocol architecture ...
doi:10.1007/3-540-40063-x_85
fatcat:24rjxva3wbb6ndyyiqkefw2x6i
Mobile Computing: A Research Perspective
[chapter]
1995
Computer Networks, Architecture and Applications
The key difference with respect to wired networks, however, lies in the mobility of hosts enabled by wireless access. ...
Host mobility affects design considerations of co=unica.tion systems a.t allla.yers of protocol stack. ...
Another plausible solution to this problem is to use a reliable link layer protocol over the wireless segment. ...
doi:10.1007/978-0-387-34887-2_1
fatcat:62bcgydokre2lhbtaxazzbliia
The Eventual Clusterer Oracle and Its Application to Consensus in MANETs
2007
Symposium on Reliable Distributed Systems. Proceedings
The messages from and to the hosts in the same cluster are merged/unmerged by the clusterhead so as to reduce the message cost and improve the scalability. ...
The clustering function, named eventual clusterer (denoted as ◊C), is designed to construct a clusterbased hierarchy over the mobile hosts in the network. ...
The core issue in defining ◊C is to identify its properties with respect to the requirements of the consensus protocol. ...
doi:10.1109/srds.2007.4365681
fatcat:gcmzta2d7naunfhfcf2grkacbm
The Eventual Clusterer Oracle and Its Application to Consensus in MANETs
2007
2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007)
The messages from and to the hosts in the same cluster are merged/unmerged by the clusterhead so as to reduce the message cost and improve the scalability. ...
The clustering function, named eventual clusterer (denoted as ◊C), is designed to construct a clusterbased hierarchy over the mobile hosts in the network. ...
The core issue in defining ◊C is to identify its properties with respect to the requirements of the consensus protocol. ...
doi:10.1109/srds.2007.24
dblp:conf/srds/WuCR07
fatcat:afgmfy53znepzfdhfc7oajsabe
Active route-maintenance protocol for signal-based communication path in ad hoc networks
2002
Journal of Network and Computer Applications
The network topology changes frequently due to host migration, signal interference and power outages, making routing maintenance a challenging consideration in designing routing protocols. ...
Monitoring the signal strength and stability of individual hosts allows the active node, which causes the route to have a weak connection, to issue actively a route-reestablishment instruction for selecting ...
Acknowledgements The authors would like to thank the Ministry of Education, ROC, for partially supporting this research under Contract No. 90-H-FA07-1-4 (Learning Technology). ...
doi:10.1006/jnca.2002.0143
fatcat:v2xyeh3rgne2hgnl65wglo3tf4
SCTP: new transport protocol for TCP/IP
2001
IEEE Internet Computing
Any application running over TCP can be ported to run over SCTP. ...
With TCP, the two are linked in that all data is reliably delivered (lost packets are retransmitted, for example) to the destination host and presented to the application in their transmission sequence ...
A transmission sequence number in the SCTP header ensures that all messages are reliably delivered to the destination host, but SCTP has several options in determining which order to present the messages ...
doi:10.1109/4236.968833
fatcat:sc4hgidnkfeztimetp77uqorbq
Organizing multicast receivers deterministically by packet-loss correlation
1998
Proceedings of the sixth ACM international conference on Multimedia - MULTIMEDIA '98
Tracer uses MTRACE packets in IGMP to allow a receiver host to obtain its path to the source of a multicast group. ...
, and without requiring any c hanges to existing multicast routing protocols. ...
We h a ve identi ed that extending IGMP with MTRACE packets multicast from sources to receivers is a desirable feature that makes Tracer much more scalable. ...
doi:10.1145/290747.290772
dblp:conf/mm/LevinePG98
fatcat:vzq6omccyzhm3hvqb7ejjhmehu
Organizing multicast receivers deterministically by packet-loss correlation
2003
Multimedia Systems
Tracer uses MTRACE packets in IGMP to allow a receiver host to obtain its path to the source of a multicast group. ...
, and without requiring any c hanges to existing multicast routing protocols. ...
We h a ve identi ed that extending IGMP with MTRACE packets multicast from sources to receivers is a desirable feature that makes Tracer much more scalable. ...
doi:10.1007/s00530-003-0050-2
fatcat:4chrrzifdfdujdijdznwqqh644
Page 546 of IEEE Transactions on Computers Vol. 52, Issue 5
[page]
2003
IEEE Transactions on Computers
We consider how to perform broadcasting on top of an IEEE 802.11-like protocol
\ broadcast request can be issued by any source host which has a packet to be distributed to the whole network [his paper ...
Such protocols are typically accom- plished at the application layer and are out of the scope of this paper (however, the result in this paper may serve as an underlying facility to implement reliable ...
Internetwork Protocol Approaches
[chapter]
1982
Computer Network Architectures and Protocols
In either case the issues of addressing, routing, buffering, flow control, error control, and security must be considered. ...
To provide these services either new end-toend service protocols must be defined or the service protocols of the individual networks must be made to intenvork. ...
This inherent unreliability in the IP level allows it to be simple and requires the end-to-end use of a reliable protocol. ...
doi:10.1007/978-1-4615-6698-4_18
fatcat:e2ma5hyfazfzjkx7ifzfap546m
« Previous
Showing results 1 — 15 out of 156,053 results