scholarly journals Temporary Redundant Transmission Mechanism for SCTP Multihomed Hosts

2015 ◽  
Vol 2015 ◽  
pp. 1-10
Author(s):  
D. Mohana Geetha ◽  
S. K. Muthusundar ◽  
M. Subramaniam ◽  
Kathirvel Ayyaswamy

In SCTP’s Concurrent Multipath Transfer, if data is sent to the destined IP(s) without knowledge of the paths condition, packets may be lost or delayed. This is because of the bursty nature of IP traffic and physical damage to the network. To offset these problems, network path status is examined using our new mechanism Multipath State Aware Concurrent Multipath Transfer using redundant transmission (MSACMT-RTv2). Here the status of multiple paths is analyzed, initially and periodically thereafter transmitted. After examination, paths priority is assigned before transmission. One path is temporarily employed as redundant path for the failure-expected path (FEP); this redundant path is used for transmitting redundant data. At the end of predefined period, reliability of the FEP is confirmed. If FEP is ensured to be reliable, temporary path is transformed into normal CMT path. MSACMT-RTv2 algorithm is simulated using the Delaware University ns-2 SCTP/CMT module (ns-2; V2.29). We present and discuss MSACMT-RTv2 performance in asymmetric path delay and with finite receiver buffer (rbuf) size. We extended our experiment to test robustness of this algorithm and inferred exhaustive result. It is inferred that our algorithm outperforms better in terms of increasing the throughput and reducing the latency than existing system.

2013 ◽  
Vol 433-435 ◽  
pp. 1795-1799
Author(s):  
Hui Min Weng ◽  
Ming He Huang ◽  
Hao Wang ◽  
Chang Qiao Xu ◽  
Kai Liu

Stream Control Transmission Protocol (SCTP) is a new generation of reliable transport layer protocol, unlike TCP, it has new features of multi-homing and multi-streaming, and has good scalability. SCTP is expected to replace TCP as the next generation of universal transport layer protocol. We introduce and analyze the basic structure and features of SCTP, introduce the related research of SCTP, including the implementation method of mobile SCTP and the Concurrent Multipath Transfer mechanism. Finally, compared and analyzed the performance of TCP, SCTP and SCTP-CMT by the ns-2 simulations, results show that in the case of multiple paths are available, the transmission performance of SCTP and SCTP-CMT are both better than TCP.


Author(s):  
Denis M. Provencher

In this chapter, I provide a synthesis of the different categories of queer Maghrebi and Maghrebi French subjects we have seen throughout the chapters -- those who are French born or émigrés, those who are working class or middle class, and those who are authors and artists or in other “non-creative” life endeavors. I highlight the multiple paths to queer Maghrebi and Maghrebi French diasporic subjecthood and stress that even those who have access to utopian spaces and transfilial scripts call upon them differently. Indeed, no single diasporic subject exists and each one’s path is unique. Moreover, while the individual’s education level or social class can affect orality, literacy, imagination, and even coherence in one’s story telling, this does not automatically predict how authors, artists and everyday speakers shape their stories with all or any of these. Indeed both the stories of creative and successful strategies and of failure illustrate that the contradictions in the French system limit mobility and integration. Finally, I draw on Raissiguier’s work on France’s sans-papières (undocumented women) and Fernando’s work on veiled French Muslim women working for human rights organizations, to conclude the book with a brief discussion of the status on the languages of racism, patriarchy, and homophobia in France and a call for new models of language on human rights in France and the European Union.


2019 ◽  
Vol 10 (1) ◽  
pp. 177 ◽  
Author(s):  
Anwar Khan ◽  
Khursheed Aurangzeb ◽  
Emad-ul-Haq Qazi ◽  
Atiq Ur Rahman

In wireless underwater sensor networks (WUSNs), network protocols for information routing are usually designed when a significant number of nodes are present in the network. Therefore, for sparse conditions, when a noticeable reduction in the number of nodes occurs, the performance of such protocols exhibits a degraded behavior pattern. To cope with routing issues when sparse conditions prevail, two routing algorithms for WUSNs are proposed in this paper. They are energy-aware scalable reliable and void-hole mitigation routing (ESRVR) and cooperative energy-aware scalable reliable and void-hole mitigation routing (Co-ESRVR). The ESRVR uses a number of strategies. Firstly, it uses two hop neighbors’ information to develop routing trajectories for information advancement, as one hop information cannot avoid a void-hole, a condition when a node is not able to find neighbors towards the sea surface, and more than two hop information is difficult to obtain when sparse conditions prevail. Secondly, when a void-hole still exists, the protocol uses a backward transmission mechanism to find other routing paths to deliver packets to the end target. Thirdly, the time by which a packet is held by a node prior to transmission is short for the nodes with low energy, depth and high count of neighbors. This reduces packets loss and avoids congestion of the channel. It also helps the nodes with no or few neighbors to hold the packet for a significant chunk of time until they find suitable neighbors, due to sea tides and currents, for further packets’ advancement. The Co-ESRVR further adds reliability to information advancement by adding routing in a cooperative fashion to ESRVR, which involves packets advancement to destination along two paths: directly from source and via a relayed path. This provides multiple paths for data advancement to the sea surface, so that if one path is badly affected by the harsh sea characteristics, others may not be. Unlike the counterpart protocol, the proposed algorithms are not dependent on a node’s geographical location or the distance from the sea surface, which increases their scalability and reduces the computational complexity. Performance analysis displays superior behavior patterns of the proposed algorithms over the counterpart in terms of the compared characteristics.


2018 ◽  
Vol 8 (3) ◽  
pp. 3079-3083
Author(s):  
I. A. Halepoto ◽  
I. H. Sadhayo ◽  
M. S. Memon ◽  
A. Manzoor ◽  
S. Bhatti

Stream control transmission protocol (SCTP) is a transport layer protocol, which is efficient, reliable, and connection-oriented as compared to transmission control protocol (TCP) and user datagram protocol (UDP). Additionally, SCTP has more innovative features like multihoming, multistreaming and unordered delivery. With multihoming, SCTP establishes multiple paths between a sender and receiver. However, it only uses the primary path for data transmission and the secondary path (or paths) for fault tolerance. Concurrent multipath transfer extension of SCTP (CMT-SCTP) allows a sender to transmit data in parallel over multiple paths, which increases the overall transmission throughput. Parallel data transmission is beneficial for higher data rates. Parallel transmission or connection is also good in services such as video streaming where if one connection is occupied with errors the transmission continues on alternate links. With parallel transmission, the unordered data packets arrival is very common at receiver. The receiver has to wait until the missing data packets arrive, causing performance degradation while using CMT-SCTP. In order to reduce the transmission delay at the receiver, CMT-SCTP uses intelligent retransmission polices to immediately retransmit the missing packets. The retransmission policies used by CMT-SCTP are RTX-SSTHRESH, RTX-LOSSRATE and RTX-CWND. The main objective of this paper is the performance analysis of the retransmission policies. This paper evaluates RTX-SSTHRESH, RTX-LOSSRATE and RTX-CWND. Simulations are performed on the Network Simulator 2. In the simulations with various scenarios and parameters, it is observed that the RTX-LOSSRATE is a suitable policy.


2020 ◽  
Vol 218 ◽  
pp. 02028
Author(s):  
Wen Wang ◽  
Xiaofeng Peng ◽  
Jun Jia ◽  
Ji Zhao ◽  
Wei Xiao ◽  
...  

Focusing on the battery-charging problem that is brought to the electric automobile users, this paper integrated the “automobile-network-path” multi-source information and presented the multi-level user experience index system which combined charging prices, driving distances, degrees of traffic congestion and other factors. The recommended algorithm and model for charging strategy was built up to improve the user experience. Meanwhile, it invoked map Application Programming Interface (API) to plan multiple paths. Consolidated by the status of charging piles, the distance between the automobile and the piles, the charging prices along with more real-time information, the multi-level user oriented experience index system was set up to recommend an optimal navigation route to the charging station for the automobile owners. Validated by the application results, the proposed algorithm that helped navigate to the charging stations or piles can effectively solve the practical problems1 such as difficulty in orienting the charging piles, waiting in lines, and high charging fees.


Electronics ◽  
2018 ◽  
Vol 7 (10) ◽  
pp. 240 ◽  
Author(s):  
Carlos Robles-Algarín ◽  
William Echavez ◽  
Aura Polo

The implementation of a printed circuit board (PCB) drilling machine using recyclable materials and computer-aided control is presented. A mechanical system using a DC motor for movement on the X and Y axes, and a transmission mechanism by belts, pulleys, and a worm screw was made. For the Z axis, a mechanism based on a worm screw, nuts, and a stepper motor was implemented. The main board has two microcontrollers communicating in a master-slave configuration via a serial protocol. A real-time operating system (OSA) was implemented to optimize the data flow to the computer using the USB protocol, for communication with the slave microcontroller, positioning the Cartesian axes, and control the motors. The slave is responsible for monitoring the status of the encoders and limit switches, as well as the information delivery to the master. A Matlab-based user interface was developed to determine the coordinates of the holes to be drilled by processing a jpg image. This also allows the user to control the DC motors using PWM signals via configurable parameters of PID controllers. The end result is a drilling machine which able to operate both manually and via a computer, for drilling PCBs of a maximum size of 24 × 40 cm.


The data center networks encompass various cloud services. Network congestion and network load imbalance may occur in data center networks due to elephant flows. In order to improve the throughput and overall utilization of the network, a dynamic load balancing mechanism has to be in place. Software Defined Networking (SDN) is used to perform the balancing of the network load. SDN can obtain the global view of the network and hence contain the status and topology of the entire data center network. The elephant flows can be split and send to multiple paths based on the current state of the network. The described idea is implemented in the OpenFlow environment and tested for improvement. The result shows the enhancement in throughput and network utilization.


Author(s):  
J.FARITHA BANU ◽  
V. RAMACHANDRAN

Concurrent Multipath Transfer distributes incoming traffic simultaneously between several paths to maximize network resource utilization and to improve quality of service. Voices over IP real time application is more sensitive to delay and requires bandwidth guarantee. In this paper, Efficient Bandwidth Estimation Management for VoIP Concurrent Multipath Transfer is proposed. The proposed technique estimates the bandwidth of each path from a group and selects multiple paths from SCTP multihoming association to transmit VoIP traffic with assured bandwidth guarantees. Simulation results are reported using Ns2 network simulator to show the efficiency of the proposed system.


Author(s):  
Scott A. Smith ◽  
Dallas J. Capesius

High-pressure hydraulic hoses are used throughout industry to transmit fluid power. The current state of the art in hose replacement consists of two strategies; these are (1) replacement upon failure and (2) time-based replacement. For the replacement upon failure method, end users inspect hoses and either replace when there is obvious physical damage or the hose has burst and allowed the release of fluid under high pressure. Hose users that employ time-based replacement cycles often collect data and either subjectively or statistically choose a replacement frequency intended to prevent unexpected failures. Engineers at Eaton Corporation worked with Purdue University to develop an alternative. A novel hose construction using two conductors with an isolating layer provides a component in an electrical circuit which can be monitored to determine the status, or health, of a hose in operation. The first step in this development was the realization that hose failure is a process and not an event. By tracking a hose’s electrical signature and characterizing the change that occurs when the internal structure begins to break down, a user is alerted prior to a catastrophic hose failure. Eaton is developing notification systems capable of both monitoring the hose’s electrical signature and alerting an equipment user prior to unexpected failure. The system requires direct electrical connection to the hose fitting for monitoring. There are currently two strategies in development, a wired system and a wireless system. The wired system uses a remote diagnostic unit with cables running to each hose assembly to query the hose and alert an equipment user directly. The wireless system employs battery-powered sensors installed on a hose assembly which communicate with a gateway located nearby. When a hose approaches its end of life a warning is issued by illuminating a warning light or issuing a remote warning through a cellular or wireless network. There are significant gains in the ability to prevent hydraulic hose failures. These unexpected incidents lead to downtime, damage to equipment, environmental damage, and serious personal injury. Additionally, using this advanced warning system allows users to use nearly a hose’s entire life. This improves asset utilization considerable when compared to the useful life sacrificed by using time-based replacement schedules. This technology will reduce operating costs and prevent downtime, environmental incidents, and the threat of personal injury present when hydraulic hose fails.


2021 ◽  
Vol 20 (1) ◽  
Author(s):  
Thomas Smith ◽  
Adrian Denz ◽  
Maurice Ombok ◽  
Nabie Bayoh ◽  
Hannah Koenker ◽  
...  

Abstract Background Efforts to improve the impact of long-lasting insecticidal nets (LLINs) should be informed by understanding of the causes of decay in effect. Holes in LLINs have been estimated to account for 7–11% of loss in effect on vectorial capacity for Plasmodium falciparum malaria in an analysis of repeated cross-sectional surveys of LLINs in Kenya. This does not account for the effect of holes as a cause of net attrition or non-use, which cannot be measured using only cross-sectional data. There is a need for estimates of how much these indirect effects of physical damage on use and attrition contribute to decay in effectiveness of LLINs. Methods Use, physical integrity, and survival were assessed in a cohort of 4514 LLINs followed for up to 4 years in Kenya. Flow diagrams were used to illustrate how the status of nets, in terms of categories of use, physical integrity, and attrition, changed between surveys carried out at 6-month intervals. A compartment model defined in terms of ordinary differential equations (ODEs) was used to estimate the transition rates between the categories. Effects of physical damage to LLINs on use and attrition were quantified by simulating counterfactuals in which there was no damage. Results Allowing for the direct effect of holes, the effect on use, and the effect on attrition, 18% of the impact on vectorial capacity was estimated to be lost because of damage. The estimated median lifetime of the LLINs was 2.9 years, but this was extended to 5.7 years in the counterfactual without physical damage. Nets that were in use were more likely to be in a damaged state than unused nets but use made little direct difference to LLIN lifetimes. Damage was reported as the reason for attrition for almost half of attrited nets, but the model estimated that almost all attrited nets had suffered some damage before attrition. Conclusions Full quantification of the effects of damage will require measurement of the supply of new nets and of household stocks of unused nets, and also of their impacts on both net use and retention. The timing of mass distribution campaigns is less important than ensuring sufficient supply. In the Kenyan setting, nets acquired damage rapidly once use began and the damage led to rapid attrition. Increasing the robustness of nets could substantially increase their lifetime and impact but the impact of LLIN programmes on malaria transmission is ultimately limited by levels of use. Longitudinal analyses of net integrity data from different settings are needed to determine the importance of physical damage to nets as a driver of attrition and non-use, and the importance of frequent use as a cause of physical damage in different contexts.


Sign in / Sign up

Export Citation Format

Share Document