Filters








156,053 Hits in 4.2 sec

User-level network interface protocols

R.A.F. Bhoedjang, T. Ruhl, H.E. Bal
1998 Computer  
The last issues we focus on are reliability and multicast, which in modern networks can be supported both on the host processor and the network interface.  ...  six important issues to consider in designing communication protocols for user-level architectures.  ...  This research is supported in part by a Pionier grant from the Netherlands Organization for Scientific Research.  ... 
doi:10.1109/2.730737 fatcat:5462f3ahlbbwxclhscvdxrnxgq

GONE

Xiaoming Fu, Jon Crowcroft
2006 Proceedings of the 2006 international workshop on Network and operating systems support for digital audio and video - NOSSDAV '06  
these issues in a large scale.  ...  So far the proposed approaches have focused on applying application-layer routing and path monitoring for reliability and on enforcing stateful packet filters in hosts or network to protect against Denial  ...  In addition, Andreas Pashalidis and Hannes Tschofenig provided helpful feedbacks to the initial version of this paper.  ... 
doi:10.1145/1378191.1378214 dblp:conf/nossdav/FuC06 fatcat:juremwutzvaedjcz4xqsu7tepy

Reliability and scaling issues in multicast communication

Bala Rajagopalan
1992 Conference proceedings on Communications architectures & protocols - SIGCOMM '92  
In this paper, we examine the issues pertinent to eliminating these shortcomings.  ...  In this paper, we show that using relatively simple network level protocols, more advanced services can be provided to support the sophisticated needs of distributed applications.  ...  Transfer the message reliably to children in T;~, using Procedue gz. 3. Each end gateway e in Tg: Use Protocol GH2 to transfer invocation messages to all end hosts.  ... 
doi:10.1145/144179.144275 dblp:conf/sigcomm/Rajagopalan92 fatcat:5lje2qyymranrnl32s44ed7ic4

Reliability and scaling issues in multicast communication

Bala Rajagopalan
1992 Computer communication review  
In this paper, we examine the issues pertinent to eliminating these shortcomings.  ...  In this paper, we show that using relatively simple network level protocols, more advanced services can be provided to support the sophisticated needs of distributed applications.  ...  Transfer the message reliably to children in T;~, using Procedue gz. 3. Each end gateway e in Tg: Use Protocol GH2 to transfer invocation messages to all end hosts.  ... 
doi:10.1145/144191.144275 fatcat:rmwubjage5btjdr6p24ds7ewqy

Multicast: wired to wireless

H. Gossain, C.D.M. Cordeiro, D.P. Agrawal
2002 IEEE Communications Magazine  
We hope that the discussion presented here will be helpful to application developers in selecting an appropriate multicast protocol for their specific needs.  ...  Due to very diverse requirements, it is necessary to investigate and discern the applicability of existing multicast protocols and qualify which is more suitable for which types of applications.  ...  Reliability is another major issue in wireless, since a host may miss some packets, or may receive some duplicate packets due to host movement.  ... 
doi:10.1109/mcom.2002.1007417 fatcat:fq465kr6dbfnbhktbe3j3abkbe

A Pragmatic Semantic Reliable Multicast Architecture for Distance Learning [chapter]

TAN Kun, SHI Yuanchun, XU Guangyou
2000 Lecture Notes in Computer Science  
As PSRM is based upon ALF protocol architecture, we use application-defined semantics to adapt content in a heterogeneous environment.  ...  In this paper, we present an alternative architecture for data distribution on Internet called PSRM that realizes semantic reliable, loose synchronized, multicast data delivery.  ...  Issues in Supporting Reliable Multicast In this section, we discuss two key issues in supporting reliable multicast: the semantics of reliable multicast and the application level framing protocol architecture  ... 
doi:10.1007/3-540-40063-x_85 fatcat:24rjxva3wbb6ndyyiqkefw2x6i

Mobile Computing: A Research Perspective [chapter]

Pravin Bhagwat, Satish K. Tripathi
1995 Computer Networks, Architecture and Applications  
The key difference with respect to wired networks, however, lies in the mobility of hosts enabled by wireless access.  ...  Host mobility affects design considerations of co=unica.tion systems a.t allla.yers of protocol stack.  ...  Another plausible solution to this problem is to use a reliable link layer protocol over the wireless segment.  ... 
doi:10.1007/978-0-387-34887-2_1 fatcat:62bcgydokre2lhbtaxazzbliia

The Eventual Clusterer Oracle and Its Application to Consensus in MANETs

Weigang Wu, Jiannong Cao, Michel Raynal
2007 Symposium on Reliable Distributed Systems. Proceedings  
The messages from and to the hosts in the same cluster are merged/unmerged by the clusterhead so as to reduce the message cost and improve the scalability.  ...  The clustering function, named eventual clusterer (denoted as ◊C), is designed to construct a clusterbased hierarchy over the mobile hosts in the network.  ...  The core issue in defining ◊C is to identify its properties with respect to the requirements of the consensus protocol.  ... 
doi:10.1109/srds.2007.4365681 fatcat:gcmzta2d7naunfhfcf2grkacbm

The Eventual Clusterer Oracle and Its Application to Consensus in MANETs

Weigang Wu, Jiannong Cao, Michel Raynal
2007 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007)  
The messages from and to the hosts in the same cluster are merged/unmerged by the clusterhead so as to reduce the message cost and improve the scalability.  ...  The clustering function, named eventual clusterer (denoted as ◊C), is designed to construct a clusterbased hierarchy over the mobile hosts in the network.  ...  The core issue in defining ◊C is to identify its properties with respect to the requirements of the consensus protocol.  ... 
doi:10.1109/srds.2007.24 dblp:conf/srds/WuCR07 fatcat:afgmfy53znepzfdhfc7oajsabe

Active route-maintenance protocol for signal-based communication path in ad hoc networks

Chih-Yung Chang, Shin-Chih Tu
2002 Journal of Network and Computer Applications  
The network topology changes frequently due to host migration, signal interference and power outages, making routing maintenance a challenging consideration in designing routing protocols.  ...  Monitoring the signal strength and stability of individual hosts allows the active node, which causes the route to have a weak connection, to issue actively a route-reestablishment instruction for selecting  ...  Acknowledgements The authors would like to thank the Ministry of Education, ROC, for partially supporting this research under Contract No. 90-H-FA07-1-4 (Learning Technology).  ... 
doi:10.1006/jnca.2002.0143 fatcat:v2xyeh3rgne2hgnl65wglo3tf4

SCTP: new transport protocol for TCP/IP

R. Stewart, C. Metz
2001 IEEE Internet Computing  
Any application running over TCP can be ported to run over SCTP.  ...  With TCP, the two are linked in that all data is reliably delivered (lost packets are retransmitted, for example) to the destination host and presented to the application in their transmission sequence  ...  A transmission sequence number in the SCTP header ensures that all messages are reliably delivered to the destination host, but SCTP has several options in determining which order to present the messages  ... 
doi:10.1109/4236.968833 fatcat:sc4hgidnkfeztimetp77uqorbq

Organizing multicast receivers deterministically by packet-loss correlation

Brian Neil Levine, Sanjoy Paul, J. J. Garcia-Luna-Aceves
1998 Proceedings of the sixth ACM international conference on Multimedia - MULTIMEDIA '98  
Tracer uses MTRACE packets in IGMP to allow a receiver host to obtain its path to the source of a multicast group.  ...  , and without requiring any c hanges to existing multicast routing protocols.  ...  We h a ve identi ed that extending IGMP with MTRACE packets multicast from sources to receivers is a desirable feature that makes Tracer much more scalable.  ... 
doi:10.1145/290747.290772 dblp:conf/mm/LevinePG98 fatcat:vzq6omccyzhm3hvqb7ejjhmehu

Organizing multicast receivers deterministically by packet-loss correlation

Brian Neil Levine, Sanjoy Paul, J. J. Garcia-Luna-Aceves
2003 Multimedia Systems  
Tracer uses MTRACE packets in IGMP to allow a receiver host to obtain its path to the source of a multicast group.  ...  , and without requiring any c hanges to existing multicast routing protocols.  ...  We h a ve identi ed that extending IGMP with MTRACE packets multicast from sources to receivers is a desirable feature that makes Tracer much more scalable.  ... 
doi:10.1007/s00530-003-0050-2 fatcat:4chrrzifdfdujdijdznwqqh644

Page 546 of IEEE Transactions on Computers Vol. 52, Issue 5 [page]

2003 IEEE Transactions on Computers  
We consider how to perform broadcasting on top of an IEEE 802.11-like protocol \ broadcast request can be issued by any source host which has a packet to be distributed to the whole network [his paper  ...  Such protocols are typically accom- plished at the application layer and are out of the scope of this paper (however, the result in this paper may serve as an underlying facility to implement reliable  ... 

Internetwork Protocol Approaches [chapter]

Jonathan B. Postel
1982 Computer Network Architectures and Protocols  
In either case the issues of addressing, routing, buffering, flow control, error control, and security must be considered.  ...  To provide these services either new end-toend service protocols must be defined or the service protocols of the individual networks must be made to intenvork.  ...  This inherent unreliability in the IP level allows it to be simple and requires the end-to-end use of a reliable protocol.  ... 
doi:10.1007/978-1-4615-6698-4_18 fatcat:e2ma5hyfazfzjkx7ifzfap546m
« Previous Showing results 1 — 15 out of 156,053 results