Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol
スポンサーリンク
概要
- 論文の詳細を見る
The distribution of streaming multicast and real time audio/video applications in the Internet has been quickly increased in the Internet. Commonly, these applications rarely use congestion control and do not fairly share provided network capacity with TCP-based applications such as HTTP, FTP and emails. Therefore, Internet communities will be threatened by the increase of non-TCP-based applications that likely cause a significant increase of traffics congestion and starvation. This paper proposes a set of mechanisms, such as providing various data rates, background traffics, and various scenarios, to act friendly with TCP when sending multicast traffics. By using 8 scenarios of simulations, we use 6 layered multicast transmissions with background traffic Pareto with the shape factor 1.5 to evaluate performance metrics such as throughput, delay/latency, jitter, TCP friendliness, packet loss ratio, and convergence time. Our study shows that non TCP traffics behave fairly and respectful of the co-existent TCP-based applications that run on shared link transmissions even with background traffic. Another result shows that the simulation has low values on throughput, vary in jitter (0-10ms), and packet loss ratio > 3%. It was also difficult to reach convergence time quickly when involving only non TCP traffics.
- 2010-11-01
著者
-
Sakurai Kouichi
Department Of Computer Science And Communication Engineering Faculty Of Information Science And Elec
-
Hori Yoshiaki
Department Of Informatics Graduate School Of Information Science And Electrical Engineering Kyushu U
-
Hori Yoshiaki
Department Of Computer Science And Communication Engineering Kyushu University
-
Sakurai Kouichi
Department Of Informatics Graduate School Of Information Science And Electrical Engineering Kyushu U
-
SUKOCO Heru
Department of Informatics, Graduate School of Information Science and Electrical Engineering, Kyushu
-
Sukoco Heru
Department Of Informatics Graduate School Of Information Science And Electrical Engineering Kyushu U
-
Sakurai Kouichi
Department Of Applied Science Faculty Of Engineering 36 Kyushu University
関連論文
- On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Differential Cell- and Immuno-Biological Properties of Murine B16-F1 and F10 Melanomas : Oncogene c-fos Expression, Sensitivity to LAK Cells and/or IL-2, and Components of Gangliosides
- Increase in the peripheral lymphocyte populations expressing CD54 (ICAM-1) after hyperthermic isolated limb perfusion in patients with malignant melanoma : an analysis of four cases
- In vitro Comparison between Mouse B16 and Human Melanoma Cell Lines of the Expression of ICAM-1 Induced by Cytokines and/or Hyperthermia
- Two Cases of Metastatic Malignant Melanoma of the Lower Limb Treated with Hyperthermic Isolated Limb Perfusion and Concomitant Infusion of Either Carboplatin or β-Interferon
- The proliferative properties of tumor cells differentially correlate with the host immune responses in anogenital Bowen's disease
- Kinetics of immunological parameters in patients with malignant melanoma treated with hyperthermic isolated limb perfusion
- In vitro analysis of mediators of contact urticaria caused by cefotiam hydrochloride
- Analysis and Comparison of Crytographic Techniques in E-voting and E-auction
- 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
- Reliable Key Distribution Scheme for Lossy Channels
- D-031 Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
- Private Data Clustering based on Secure Approximation
- Reduced amount of secretory component of IgA secretion in tears of patients with atopic dermatitis
- Case Report : Gianotti-Crosti Syndrome Associated with Human Herpesvirus-6 Infection
- Insulin Resistance Type A syndrome in a 12-year-old Girl
- Increased Serum Level of Interleukin-6 in Patients with Psoriatic Arthritis and Thrombocytosis
- Analysis and Design for Private Message Board Systems
- On the Complexity of the Discrete Logarithm for a General Finite Group (Special Section on Cryptography and Information Security)
- Promotion of Tyrosinase Folding in Cos 7 Cells by Calnexin
- Improved Subset Difference Method with Ternary Tree
- Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol
- Computerized Colorimetry in Screening for Malignant Melanomas
- Experimental approaches for the treatment of murine B16 melanomas of various sizes : II : Injection of ethanol with combinations of β-interferon and microwaval hyperthermia for B16 melanomas with a size of greater than 10mm in diameter
- Experimental approaches for the treatment of murine B16 melanomas of various sizes : I : Local injection of ethanol with a combination of interleukin-2 or microwaval hyperthermia for B16 melanomas with a size of less than 7mm in diameter
- Rapid Destruction of Murine and Human Melanomas by Local Injection of Absolute Ethanol : Augmentation of the Anti-proliferative Effects with a Combination of Biological Response Modifiers
- On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks(Tamper-Resistance)(Cryptography and Information Security)
- Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost(Application)(Cryptography and Information Security)
- Analysis and Design for Private Message Board Systems (Applications) (Cryptography and Information Security)
- Special Section on Discrete Mathematics and Its Applications
- Immune Thrombocytopenia Due to Tranilast (Rizaben^【○!R】) : Detection of Drug-dependent Platelet-associated IgG
- Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs
- Securing Provenance of Distributed Processes in an Untrusted Environment
- Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs
- Equivalence problem and automorphisms of some abelian branched coverings of the Riemann sphere