An SDN-based true end-to-end TCP for wireless LAN

2021 ◽  
Author(s):  
Krishna Vijay Kumar Singh ◽  
Mayank Pandey
Keyword(s):  
2020 ◽  
Vol 9 (2) ◽  
pp. 51-60
Author(s):  
Pritee Parwekar ◽  
Adilya Bakambekova ◽  
Talgat Bizhigit ◽  
Yeldar Toleubay

Different access network types are characterized by a variety of attributes which include link bandwidths, physical media, capacity, and reliability. Therefore, the question of accurately identifying whether the sender uses a wired ethernet connection or a wireless LAN connection comes into place. This article aims to analyse, simulate, validate, and improve the existing classification scheme which is based on measuring entropy of packet pair inter-arrival times and median. A riverbed modeller (former OPNET) is used for simulating the different scenarios. Small-scale experiment conducted on campus at the Nazarbayev University (NU) validates the insignificance of the packet probe size chosen for the classification.


Author(s):  
Spiros Louvros ◽  
Gerasimos Pylarinos ◽  
Stavros Kotsopoulos

During the last decade mobile communication networks follow the evolution of fixed networks in order to provide moving subscribers with all the services and applications of fixed subscribers. This however is unfeasible due to restrictions and limitations imposed by the hostile radio channel. The global system mobile (GSM) network, known as 2G technology (Mouly & Pautet, 1992), is adequate in meeting voice communication speeds of a typical subscriber since it offers limited communication capabilities (< 9.6 kb/s). The ideal mobile network would be able to provide moving subscribers with continuous access to every possible voice or data network, leading to the realization of a “mobile office.” The result of this effort (although somewhat restrictive in terms of realizable bit rates) was another evolution in mobile networks, the general packet radio service (GPRS) network (usually referred to as 2.5G), with available data rates of approximately 40 kb/s up to 100 kb/s. The universal mobile telecommunication system (UMTS) (usually referred to as the third-generation cellular network or 3G), with competitive rates of 300 kb/s and a future possible upgrade up to 2 Mb/s, is the realization of a new generation of telecommunications technology for a world in which personal services will be based on a combination of fixed and mobile services to form a seamless end-to-end service for the subscriber. Its realization at least requires provision of a unified presentation of services to the end user, mobile technology that supports a very broad mix of communication services and applications, and finally on-demand flexible bandwidth allocation reaching 2Mb/s per subscriber. Moreover the exploitation of pure (not tunneled) Internet protocol (IP) interconnection of network elements between each other for data exchange and operation and maintenance purposes should be available, along with the provision of flexible end-to-end all-IP connectivity in terms of user information. 3.5G and 4G (Esmailzadeh, Nakagawa, & Jones, 2003) systems are already under investigation. Aiming to “context-aware personalized ubiquitous multimedia services” (Houssos et al., 2003), 3.5G systems promise rates of up to 10Mb/s (3GPP Release 5), while with the use of greater bandwidth, these rates may raise even more in 4G (Esmailzadeh et al., 2003). On the other hand, the last five years a standardization effort has started for the integration of Wireless local area network (WLAN) in order to support higher bit rates in hotspots or business and factory environments, with a cell radius on the order of 100m. In any case, 4G and WLAN technology are going to be based on an IP backbone between access points (APs) and access controllers or routers and the Internet. Mobile IPv4 and IPv6 are already under investigation (Lach, Janneteau, & Petrescu, 2003) to provide user mobility support for context-type services.


2008 ◽  
Vol 31 (8) ◽  
pp. 1551-1563 ◽  
Author(s):  
Sébastien Roy ◽  
Jean-François Boudreault ◽  
Louis Dupont

VASA ◽  
2016 ◽  
Vol 45 (3) ◽  
pp. 223-228 ◽  
Author(s):  
Jan Paweł Skóra ◽  
Jacek Kurcz ◽  
Krzysztof Korta ◽  
Przemysław Szyber ◽  
Tadeusz Andrzej Dorobisz ◽  
...  

Abstract. Background: We present the methods and results of the surgical management of extracranial carotid artery aneurysms (ECCA). Postoperative complications including early and late neurological events were analysed. Correlation between reconstruction techniques and morphology of ECCA was assessed in this retrospective study. Patients and methods: In total, 32 reconstructions of ECCA were performed in 31 symptomatic patients with a mean age of 59.2 (range 33 - 84) years. The causes of ECCA were divided among atherosclerosis (n = 25; 78.1 %), previous carotid endarterectomy with Dacron patch (n = 4; 12.5 %), iatrogenic injury (n = 2; 6.3 %) and infection (n = 1; 3.1 %). In 23 cases, intervention consisted of carotid bypass. Aneurysmectomy with end-to-end suture was performed in 4 cases. Aneurysmal resection with patching was done in 2 cases and aneurysmorrhaphy without patching in another 2 cases. In 1 case, ligature of the internal carotid artery (ICA) was required. Results: Technical success defined as the preservation of ICA patency was achieved in 31 cases (96.9 %). There was one perioperative death due to major stroke (3.1 %). Two cases of minor stroke occurred in the 30-day observation period (6.3 %). Three patients had a transient hypoglossal nerve palsy that subsided spontaneously (9.4 %). At a mean long-term follow-up of 68 months, there were no major or minor ipsilateral strokes or surgery-related deaths reported. In all 30 surviving patients (96.9 %), long-term clinical outcomes were free from ipsilateral neurological symptoms. Conclusions: Open surgery is a relatively safe method in the therapy of ECCA. Surgical repair of ECCAs can be associated with an acceptable major stroke rate and moderate minor stroke rate. Complication-free long-term outcomes can be achieved in as many as 96.9 % of patients. Aneurysmectomy with end-to-end anastomosis or bypass surgery can be implemented during open repair of ECCA.


Author(s):  
Ahmed Mousa ◽  
Ossama M. Zakaria ◽  
Mai A. Elkalla ◽  
Lotfy A. Abdelsattar ◽  
Hamad Al-Game'a

AbstractThis study was aimed to evaluate different management modalities for peripheral vascular trauma in children, with the aid of the Mangled Extremity Severity Score (MESS). A single-center retrospective analysis took place between 2010 and 2017 at University Hospitals, having emergencies and critical care centers. Different types of vascular repair were adopted by skillful vascular experts and highly trained pediatric surgeons. Patients were divided into three different age groups. Group I included those children between 5 and 10 years; group II involved pediatrics between 11 and 15 years; while children between 16 and 21 years participated in group III. We recruited 183 children with peripheral vascular injuries. They were 87% males and 13% females, with the mean age of 14.72 ± 04. Arteriorrhaphy was performed in 32%; end-to-end anastomosis and natural vein graft were adopted in 40.5 and 49%, respectively. On the other hand, 10.5% underwent bypass surgery. The age groups I and II are highly susceptible to penetrating trauma (p = 0.001), while patients with an extreme age (i.e., group III) are more susceptible to blunt injury (p = 0.001). The MESS has a significant correlation to both age groups I and II (p = 0.001). Vein patch angioplasty and end-to-end primary repair should be adopted as the main treatment options for the repair of extremity vascular injuries in children. Moreover, other treatment modalities, such as repair with autologous vein graft/bypass surgery, may be adopted whenever possible. They are cost-effective, reliable, and simple techniques with fewer postoperative complication, especially in poor/limited resources.


2014 ◽  
Vol 1 (1) ◽  
pp. 9-34
Author(s):  
Bobby Suryajaya

SKK Migas plans to apply end-to-end security based on Web Services Security (WS-Security) for Sistem Operasi Terpadu (SOT). However, there are no prototype or simulation results that can support the plan that has already been communicated to many parties. This paper proposes an experiment that performs PRODML data transfer using WS-Security by altering the WSDL to include encryption and digital signature. The experiment utilizes SoapUI, and successfully loaded PRODML WSDL that had been altered with WSP-Policy based on X.509 to transfer a SOAP message.


Sign in / Sign up

Export Citation Format

Share Document