期刊文献+
共找到23篇文章
< 1 2 >
每页显示 20 50 100
The Algorithms for Achieving Global States and Self-Stabilization for Communication Protocols
1
作者 Li Layuan & Li Chunlin(Department of Computer Science & Engineering. Wuhan Transportation University,430063,P . R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1999年第4期34-41,共8页
This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limita... This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limitation of self-stabilization for communication protocols, and thenpresents an improved algorithm that can be suitable to achieve global states and can be also usedto self-stabilizing communication protocols. Filially, it gives the proof of correctness and analysis ofcomplexity of the improved algorithm, and verifies its availability and efficiency by illustrating anexample protocol. 展开更多
关键词 communication protocols Algorithm for achieving global states Self-stabilization Computer networks Multimedia communication networks.
下载PDF
Research on IPv6 Transition Evolvement and Security Architecture of Smart Distribution Grid Data Communication System
2
作者 Xin Miao Xi Chen 《Journal of Energy and Power Engineering》 2012年第1期146-149,共4页
Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethe... Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems. 展开更多
关键词 Smart distribution grid data communication NETWORK IPV6 transition evolvement safety threaten security architecture.
下载PDF
A Message Transmission Protocol of a Mobile Data Communication Network
3
作者 顾学迈 郭庆 刘忠 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 1996年第4期16-20,共5页
AMessageTransmissionProtocolofaMobileDataCommunicationNetworkGUXuemai;GUOQing;LIUZhong(顾学迈)(郭庆)(刘忠)(Research... AMessageTransmissionProtocolofaMobileDataCommunicationNetworkGUXuemai;GUOQing;LIUZhong(顾学迈)(郭庆)(刘忠)(ResearchInstituteofCommun... 展开更多
关键词 ss: data communication MOBILE communication protocol
下载PDF
Coati Optimization-Based Energy Efficient Routing Protocol for Unmanned Aerial Vehicle Communication 被引量:1
4
作者 Hanan Abdullah Mengash Hamed Alqahtani +5 位作者 Mohammed Maray Mohamed K.Nour Radwa Marzouk Mohammed Abdullah Al-Hagery Heba Mohsen Mesfer Al Duhayyim 《Computers, Materials & Continua》 SCIE EI 2023年第6期4805-4820,共16页
With the flexible deployment and high mobility of Unmanned Aerial Vehicles(UAVs)in an open environment,they have generated con-siderable attention in military and civil applications intending to enable ubiquitous conn... With the flexible deployment and high mobility of Unmanned Aerial Vehicles(UAVs)in an open environment,they have generated con-siderable attention in military and civil applications intending to enable ubiquitous connectivity and foster agile communications.The difficulty stems from features other than mobile ad-hoc network(MANET),namely aerial mobility in three-dimensional space and often changing topology.In the UAV network,a single node serves as a forwarding,transmitting,and receiving node at the same time.Typically,the communication path is multi-hop,and routing significantly affects the network’s performance.A lot of effort should be invested in performance analysis for selecting the optimum routing system.With this motivation,this study modelled a new Coati Optimization Algorithm-based Energy-Efficient Routing Process for Unmanned Aerial Vehicle Communication(COAER-UAVC)technique.The presented COAER-UAVC technique establishes effective routes for communication between the UAVs.It is primarily based on the coati characteristics in nature:if attacking and hunting iguanas and escaping from predators.Besides,the presented COAER-UAVC technique concentrates on the design of fitness functions to minimize energy utilization and communication delay.A varied group of simulations was performed to depict the optimum performance of the COAER-UAVC system.The experimental results verified that the COAER-UAVC technique had assured improved performance over other approaches. 展开更多
关键词 Artificial intelligence unmanned aerial vehicle data communication routing protocol energy efficiency
下载PDF
Reliable transmission of consultative committee for space data systems file delivery protocol in deep space communication 被引量:7
5
作者 Hui Li Hao Luo Faxin Yu Zheming Lu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第3期349-354,共6页
In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative ac... In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification. 展开更多
关键词 deep space communication consultative committee for space data systems (CCSDS) CCSDS file delivery protocol (CFDP) RELIABLE delay.
下载PDF
Studies on Algorithms for Self-StabilizingCommunication Protocols
6
作者 李腊元 李春林 《Journal of Computer Science & Technology》 SCIE EI CSCD 1999年第6期606-613,共8页
in this paper the algorithms for self-stabilizing communication protocols are studied. First some concepts and a formal method for describing theproposed algorithms are described, then an improved algorithm for achiev... in this paper the algorithms for self-stabilizing communication protocols are studied. First some concepts and a formal method for describing theproposed algorithms are described, then an improved algorithm for achieving globalstates is presented. The study shows that the improved algorithm can be appliedto obtain the global states in the case of a loss of cooperation of the different processes in the protocol, which can be used as a recovery point that will be used bythe following recovery procedure. Thus, the improved algorithm can be used toself-stabilize a communication protocol. Meanwhile, a recovery algorithm for selfstabilizing communication protocols is presented. After a failure is detected, allProcesses can eventually know the error. The recovery algorithm uses the contextualinformation exchanged during the progress of the protocol and recorded on the stablememory. The proof of correctness and analysis of complexity for these algorithmshave been made. The availability and efficiency of the algorithms have been verifiedby illustrating the example protocols. Finally, some conclusions and remarks aregiven. 展开更多
关键词 communication protocol SELF-STABILIZATION global state recoveryalgorithm multimedia communication
原文传递
New semi-quantum key agreement protocol based on high-dimensional single-particle states 被引量:2
7
作者 Huan-Huan Li Li-Hua Gong Nan-Run Zhou 《Chinese Physics B》 SCIE EI CAS CSCD 2020年第11期189-196,共8页
A new efficient two-party semi-quantum key agreement protocol is proposed with high-dimensional single-particle states.Different from the previous semi-quantum key agreement protocols based on the two-level quantum sy... A new efficient two-party semi-quantum key agreement protocol is proposed with high-dimensional single-particle states.Different from the previous semi-quantum key agreement protocols based on the two-level quantum system,the propounded protocol makes use of the advantage of the high-dimensional quantum system,which possesses higher efficiency and better robustness against eavesdropping.Besides,the protocol allows the classical participant to encode the secret key with qudit shifting operations without involving any quantum measurement abilities.The designed semi-quantum key agreement protocol could resist both participant attacks and outsider attacks.Meanwhile,the conjoint analysis of security and efficiency provides an appropriate choice for reference on the dimension of single-particle states and the number of decoy states. 展开更多
关键词 semi-quantum key agreement protocol high-dimensional quantum state quantum cryptography quantum communication
下载PDF
Three-Party Simultaneous Quantum Secure Communication Based on Closed Transmission Loops
8
作者 Xunru Yin 《Journal of Quantum Information Science》 2014年第4期292-296,共5页
A kind of novel three-party quantum secure direct communication protocol is proposed with the correlation of two-particle entangled state. In this scheme the qubit transmission forms a closed loop and every one of the... A kind of novel three-party quantum secure direct communication protocol is proposed with the correlation of two-particle entangled state. In this scheme the qubit transmission forms a closed loop and every one of the three participants is both a receiver and a sender of particle sequences in the bidirectional quantum channels. Each party implements the corresponding unitary operations according to its secret bit value over the quantum channels and then extracts the other two parties’ unitary operations by performing Bell measurements on the encoded particles. Thus they can obtain the secret information simultaneously. Finally, the security analysis shows that the present three-party scheme is a secure protocol. 展开更多
关键词 QUANTUM Information QUANTUM CRYPTOGRAPHIC protocol QUANTUM Secure Direct communication BELL stateS
下载PDF
Quantum Steganography Embedded Any Secret Text without Changing the Content of Cover Data 被引量:1
9
作者 Takashi Mihara 《Journal of Quantum Information Science》 2012年第1期10-14,共5页
Steganography is a technique hiding secret information within innocent-looking information (e.g., text, audio, image, video, and so on). In this paper, we propose a quantum steganography protocol using plain text as i... Steganography is a technique hiding secret information within innocent-looking information (e.g., text, audio, image, video, and so on). In this paper, we propose a quantum steganography protocol using plain text as innocent-looking information called cover data. Our steganograpy protocol has three features. First, we can use any plain text that is inde-pendent of any secret message sent between parties. When we make stego data, we do not need to change the content of plain text at all. Second, embedded messages are not included in opened information (innocent-looking messages), but are included as phases of the entangled states. Finally, in quantum states shared between parties in advance, i.e., as quantum keys used when the parties recover secret messages from stego data, neither innocent-looking information nor the information of any secret message is included. 展开更多
关键词 QUANTUM STEGANOGRAPHY Hidden data QUANTUM communication ENTANGLED state
下载PDF
ERROR COUNTER-BASED NEGATIVE ACKNOWLEDGEMENT MODE IN CCSDS FILE DELIVERY PROTOCOL
10
作者 Xiao Shiiie Yang Mingchuan Guo Qing 《Journal of Electronics(China)》 2011年第2期222-227,共6页
Deep space communication has its own features such as long propagation delays,heavy noise,asymmetric link rates,and intermittent connectivity in space,therefore TCP/IP protocol cannot perform as well as it does in ter... Deep space communication has its own features such as long propagation delays,heavy noise,asymmetric link rates,and intermittent connectivity in space,therefore TCP/IP protocol cannot perform as well as it does in terrestrial communications.Accordingly,the Consultative Committee for Space Data Systems(CCSDS) developed CCSDS File Delivery Protocol(CFDP),which sets standards of efficient file delivery service capable of transferring files to and from mass memory located in the space segment.In CFDP,four optional acknowledge modes are supported to make the communication more reliable.In this paper,we gave a general introduction of typical communication process in CFDP and analysis of its four Negative Acknowledgement(NAK) modes on the respect of file delivery delay and times of retransmission.We found out that despite the shortest file delivery delay,immediate NAK mode suffers from the problem that frequent retransmission may probably lead to network congestion.Thus,we proposed a new mode,the error counter-based NAK mode.By simulation of the case focused on the link between a deep space probe on Mars and a ter-restrial station on Earth,we concluded that error counter-based NAK mode has successfully reduced the retransmission times at negligible cost of certain amount of file delivery delay. 展开更多
关键词 Deep space communication Consultative Committee for Space data Systems(CCSDS) File Delivery protocol(CFDP) Negative AcKnowledgement(NAK) mode
下载PDF
DFDVis:A Visual Analytics System for Understanding the Semantics of Data Flow Diagram
11
作者 Hao Xiong Haocheng Zhang +2 位作者 Xiaoju Dong Lingxi Meng Wenyang Zhao 《国际计算机前沿大会会议论文集》 2017年第1期164-166,共3页
Data flow diagram(DFD),as a special kind of data,is a design artifact in both requirement analysis and structured analysis in software development.However,rigorous analysis of DFD requires a formal semantics.Formal re... Data flow diagram(DFD),as a special kind of data,is a design artifact in both requirement analysis and structured analysis in software development.However,rigorous analysis of DFD requires a formal semantics.Formal representation of DFD and its formal semantics will help to reduce inconsistencies and confusion.The logical structure of DFD can be described using formalism of Calculus of Communicating System(CCS).With a finite number of states based on CCS,state space methods will help a lot in analysis and verification of the behavior of the systems.But the number of states of even a relatively small system is often very great that is called state explosion.In this paper,we present a visual system which combines Formal methods and visualization techniques so as to help the researchers to understand and analyze the system described by the DFD regardless of the problem of state explosion. 展开更多
关键词 data flow diagram(DFD) CALCULUS of COMMUNICATING Systems(CCS) state space VISUALIZATION techniques
下载PDF
Hardware-in-loop Simulation(HLS) of Homing Anti-tank Missile 被引量:1
12
作者 宋建梅 张天桥 《Journal of Beijing Institute of Technology》 EI CAS 1996年第1期49-54,共6页
The simulation techniques of hardware-in-loop simulation(HLS) of homing antitank missile based on the personal computer (PC) are discussed. The PC and MCS-96 chip controller employ A/D and D/A boards (with photoelectr... The simulation techniques of hardware-in-loop simulation(HLS) of homing antitank missile based on the personal computer (PC) are discussed. The PC and MCS-96 chip controller employ A/D and D/A boards (with photoelectricity isolation) to transfer measur ment and control information about homing head, gyro and rudder and utilize the digital hand shaking board to build correct communication communication protocol. In order to satisfy the real-time requirement of HLS, this paper first simplifies the aerodynamic data file reasonably, then builds a PC software with C language. The program of the controller part is made with PL/M language. The simulation of HLS based on PC is done with the same sampling period of 10ms as that of YH-F1 and the experiment results are identical to those of digital simulation of the homing anti-tank guided missile. 展开更多
关键词 HARDWARE-IN-LOOP SIMULATION communication protocol aerodynamic data
下载PDF
扩充状态转移网络(ATN)在计算机数据通讯中的应用 被引量:3
13
作者 张朋飞 何克忠 +1 位作者 张君宇 欧阳正柱 《计算机工程与应用》 CSCD 北大核心 2002年第8期128-131,共4页
在类似移动机器人这样的复杂控制系统中,数据通讯起着至关重要的作用,设计数据通讯协议是复杂控制系统集成中的基础工作。文章介绍了从人工智能研究领域自然语言的语法分析研究中借鉴来的扩充状态转移网络(ATN)方法,并加以修正和推广,... 在类似移动机器人这样的复杂控制系统中,数据通讯起着至关重要的作用,设计数据通讯协议是复杂控制系统集成中的基础工作。文章介绍了从人工智能研究领域自然语言的语法分析研究中借鉴来的扩充状态转移网络(ATN)方法,并加以修正和推广,以及应用ATN设计数据通讯协议的技术与方法。 展开更多
关键词 数据通讯 通讯协议 扩充状态转移网络 计算机 人工智能
下载PDF
Efficient Three-Party Quantum Secret Sharing with Single Photons 被引量:4
14
作者 周萍 李熙涵 +1 位作者 邓富国 周宏余 《Chinese Physics Letters》 SCIE CAS CSCD 2007年第8期2181-2184,共4页
A scheme for three-party quantum secret sharing of a private key is presented with single photons. The agent Bob first prepares a sequence of single photons with two biased bases and then sends them to the boss Alice ... A scheme for three-party quantum secret sharing of a private key is presented with single photons. The agent Bob first prepares a sequence of single photons with two biased bases and then sends them to the boss Alice who checks the security of the transmission with measurements and produces some decoy photons by rearranging the orders of some sample photons. Alice encodes her bits with two unitary operations on the photons and then sends them to the other agent. The security of this scheme is equivalent to that in the modified Bennett Brassard 1984 quantum key distribution protocol. Moreover, each photon can carry one bit of the private key and the intrinsic efficiency for qubits and the total efficiency both approach the maximal value 100% when the number of the bits in the key is very large. 展开更多
关键词 PODOLSKY-ROSEN PAIRS HORNE-ZEILINGER stateS communication protocolS ENTANGLED stateS BELL stateS INFORMATION NETWORK CRYPTOGRAPHY SCHEME
下载PDF
Design and Research of Information Processing System Based on Mix Platform
15
作者 董宁 徐立新 +1 位作者 何超 张宇河 《Journal of Beijing Institute of Technology》 EI CAS 1999年第3期294-299,共6页
Aim To develop an information processing system with real time processing capability and artistic user interface for the optoelectronic antagonism general measuring system. Methods The A/D board and the multifun... Aim To develop an information processing system with real time processing capability and artistic user interface for the optoelectronic antagonism general measuring system. Methods The A/D board and the multifunctional board communicating with every instruments were designed, data collecting and processing were realized by selecting appropriate software platform. Results Simulating results show the information processing system can operate correctly and dependably, the measuring rules, interactive interface and data handling method were all accepted by the user. Conclusion The designing approach based on the mix platform takes advantages of the two operating systems, the desired performances are acquired both in the real time processing and with the friendly artistic user interface. 展开更多
关键词 information processing real time data collection communicating protocols
下载PDF
Control System Design and Implementation at Flexible, Distributed Offshore Sensor Test Sites in the Yangtze Estuary Area
16
作者 HU Qingsong JIANG Chao +5 位作者 DU Lin LI Jun CHEN Leilei XIANG Peng ZHANG Hongcheng RAHMAN Hafiz Abd ur 《Journal of Ocean University of China》 SCIE CAS CSCD 2021年第2期285-295,共11页
Marine in situ testing is a necessary step for stereotyping newly developed marine sensors. The use of test sites in the Yangtze Estuary area, which has high turbidity and abundant nutrients, can effectively reduce th... Marine in situ testing is a necessary step for stereotyping newly developed marine sensors. The use of test sites in the Yangtze Estuary area, which has high turbidity and abundant nutrients, can effectively reduce the needed testing time owing to its harsh conditions. Five test stations were established, and a floating buoy and fixed test equipment were designed. A control system, including a sensor connection, data processor, video remote transmission, and corresponding control algorithm, was developed. The control system enabled the nondestructive monitoring of biological attachments and bidirectional, real-time communication between an upper server on land and the control system at the test sites. The dissolved oxygen(DO), temperature, and pH data of DOS600 and DPS600 sensors were compared with those of AP2000 sensors. Temperature recording using the DOS600 sensor was performed nearly as well as that of the AP2000 sensor. The mean DO values(standard deviations) were 8.414 mg L-1(2.068) and 6.896 mg L-1(1.235) for the DOS600 and AP2000 sensors, respectively, indicating that the DOS600 performance was unsatisfactory. The pH recording of the DPS600 was slightly worse than that of the AP2000 sensor. Experimental results showed that the DO value was more easily affected by the buoy movement of waves compared to the pH and temperature. Moreover, data fluctuations showed that the DO and pH parameters were more vulnerable to biofouling than temperature. Waves and biofouling create a harsh test environment, and the performance difference between the developed sensors and a standard sensor can be obtained in a short time period. 展开更多
关键词 offshore sensor test sites Yangtze Estuary control system communication protocol MICROWAVE sensor detection data analysis
下载PDF
A novel hybrid cybersecurity scheme against false data injection attacks in automated power systems
17
作者 Shahbaz Hussain S.M.Suhail Hussain +5 位作者 Marziyeh Hemmati Atif Iqbal Rashid Alammari Stefano Zanero Enrico Ragaini Giambattista Gruosso 《Protection and Control of Modern Power Systems》 SCIE EI 2023年第3期1-15,共15页
The conventional power systems are evolving as smart grids.In recent times cyberattacks on smart grids have been increasing.Among different attacks,False Data Injection(FDI)is considered as an emerging threat that has... The conventional power systems are evolving as smart grids.In recent times cyberattacks on smart grids have been increasing.Among different attacks,False Data Injection(FDI)is considered as an emerging threat that has significant impact.By exploiting the vulnerabilities of IEC 61850 Generic Object-Oriented Substation Events(GOOSE)and Sam-pled Values(SV)attackers can launch different FDI attacks.In this paper,a real-time set up capable of simulating FDI on GOOSE and SV protocols is developed to evaluate the impact of such attacks on power grid.IEC 62351 stipulates cybersecurity guidelines for GOOSE and SV,but only at communication or Information Technology(IT)level.Hence there is a need to develop a holistic security both at IT and Operation Technology(OT)level.In this regard,a novel sequence content resolver-based hybrid security scheme suitable to tackle FDI attacks on GOOSE and SV is proposed.Furthermore,the computational performance of the proposed hybrid security scheme is presented to demonstrate its applicability to the time critical GOOSE and SV protocols. 展开更多
关键词 Cyberattacks False data injection Real time digital simulation IEC 61850 communication protocols Control authority COUNTERMEASURES
原文传递
Quantum Key Distribution Network Based on Differential Phase Shift 被引量:5
18
作者 王婉莹 王川 +1 位作者 文凯 龙桂鲁 《Chinese Physics Letters》 SCIE CAS CSCD 2007年第6期1463-1466,共4页
Using a series of quantum correlated photon pairs, we propose a theoretical scheme for any-to-any multi-user quantum key distribution network based on differential phase shift. The differential phase shift and the dif... Using a series of quantum correlated photon pairs, we propose a theoretical scheme for any-to-any multi-user quantum key distribution network based on differential phase shift. The differential phase shift and the different detection time slots ensure the security of our scheme against eavesdropping. We discuss the security under the intercept-resend attack and the source replacement attack. 展开更多
关键词 SECURE DIRECT communication DISTRIBUTION protocol OPTICAL NETWORKS BELLTHEOREM CRYPTOGRAPHY ENTANGLEMENT stateS
下载PDF
Multiparty Quantum Secret Report
19
作者 邓富国 李熙涵 +3 位作者 李春燕 周萍 梁玉洁 周宏余 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第7期1676-1679,共4页
A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M + 1)-particle Greenberger-Horne-Zeilinger (GHZ) states that only Alice k... A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M + 1)-particle Greenberger-Horne-Zeilinger (GHZ) states that only Alice knows which state each (M + 1)-particle quantum system is in. Each agent exploits a controlled-not (CNot) gate to encrypt the travelling particle by using the particle in the GHZ state as the control qubit. The boss Alice decrypts the travelling particle with a CNot gate after performing a aσ∞ operation on her particle in the GHZ state or not. After the GHZ states (the quantum key) are used up, the parties check whether there is a vicious eavesdropper, say Eve, monitoring the quantum line, by picking out some samples from the GHZ states shared and measuring them with two measuring bases. After confirming the security of the quantum key, they use the remaining GHZ states repeatedly for the next round of quantum communication. This scheme has the advantage of high intrinsic efficiency for the qubits and total efficiency. 展开更多
关键词 SECURE DIRECT communication LOCAL UNITARY OPERATIONS KEY DISTRIBUTION BELLTHEOREM GHZ stateS ENTANGLEMENT CRYPTOGRAPHY SCHEME protocol NETWORK
下载PDF
TCP Window Based Congestion Control -Slow-Start Approach
20
作者 Kolawole I. Oyeyinka Ayodeji O. Oluwatope +3 位作者 Adio. T. Akinwale Olusegun Folorunso Ganiyu A. Aderounmu Olatunde O. Abiona 《Communications and Network》 2011年第2期85-98,共14页
Transmission control protocol (TCP) has undergone several transformations. Several proposals have been put forward to change the mechanisms of TCP congestion control to improve its performance. A line of research tend... Transmission control protocol (TCP) has undergone several transformations. Several proposals have been put forward to change the mechanisms of TCP congestion control to improve its performance. A line of research tends to reduce speed in the face of congestion thereby penalizing itself. In this group are the window based congestion control algorithms that use the size of congestion window to determine transmission speed. The two main algorithm of window based congestion control are the congestion avoidance and the slow start. The aim of this study is to survey the various modifications of window based congestion control. Much work has been done on congestion avoidance hence specific attention is placed on the slow start in order to motivate a new direction of research in network utility maximization. Mathematical modeling of the internet is discussed and proposals to improve TCP startup were reviewed. There are three lines of research on the improvement of slow start. A group uses the estimation of certain parameters to determine initial speed. The second group uses bandwidth estimation while the last group uses explicit request for network assistance to determine initial startup speed. The problems of each proposal are analyzed and a multiple startup for TCP is proposed. Multiple startups for TCP specify that startup speed is selectable from an n-arry set of algorithms. We then introduced the e-speed start which uses the prevailing network condition to determine a suitable starting speed. 展开更多
关键词 data communication Network protocols TCP CONGESTION Control Slow-Start (Keywords)
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部