A Digital Fountain Approach to Reliable Distribution of Bulk Data
|
|
|
- Russell Mosley
- 10 years ago
- Views:
Transcription
1 A Digital Fountain Approach to Reliable Distribution of Bulk Data John Byers, ICSI Michael Luby, ICSI Michael Mitzenmacher, Compaq SRC Ashu Rege, ICSI
2 Application: Software Distribution New release of widely used software. Hundreds of thousands of clients or more. Bulk data: tens or hundreds of MB Heterogeneous clients: Modem users: hours Well-connected users: minutes
3 Primary Objectives Scale to vast numbers of clients No ARQs or NACKs Minimize use of network bandwidth Minimize overhead at receivers: Computation time Useless packets Compatibility Networks: Internet, satellite, wireless Scheduling policies, i.e. congestion control
4 Impediments Packet loss wired networks: congestion satellite networks, mobile receivers Receiver heterogeneity packet loss rates end-to-end throughput Receiver access patterns asynchronous arrivals and departures overlapping access intervals
5 Digital Fountain k k k Source Encoding Stream Received Message Instantaneous Transmission Instantaneous Can recover file from any set of k encoding packets.
6 Digital Fountain Solution File Transmission 0 hours 1 hour 2 hours 3 hours 4 hours User 1 User 2 5 hours
7 Is FEC Inherently Bad? Faulty Reasoning FEC adds redundancy Redundancy increases congestion and losses More losses necessitate more transmissions FEC consumes more overall bandwidth But Each and every packet can be useful to all clients Each client consumes minimum bandwidth possible FEC consumes less overall bandwidth by compressing bandwidth across clients
8 DF Solution Features Users can initiate the download at their discretion. Users can continue download seamlessly after temporary interruption. Tolerates moderate packet loss. Low server load - simple protocol. Does scale well. Low network load.
9 Approximating a Digital Fountain k Source Encoding Stream Encoding Time (1 + c) k k Received Message Decoding Time
10 Approximating a DF: Performance Measures Time Overhead: Time to decode (or encode) as a function of k. Decoding Inefficiency: packets needed to decode k
11 Work on Erasure Codes Standard Reed-Solomon Codes Dense systems of linear equations. Poor time overhead (quadratic in k) Optimal decoding inefficiency of 1 Tornado Codes [LMSSS 97] Sparse systems of equations. Fast encoding and decoding (linear in k) Suboptimal decoding inefficiency
12 Tornado Z: Encoding Structure Irregular bipartite graph Irregular bipartite graph k stretch factor = 2 k = 16,000 nodes = source data = redundancy
13 Encoding/Decoding Process a b c d a b f a b c d g c e g h b d e f g h e f g h
14 Timing Comparison Encoding time, 1K packets Size Reed-Solomon Tornado Z 250 K 500 K 1 MB 2 MB 4 MB 8 MB 16 MB 4.6 sec. 19 sec. 93 sec. 442 sec. 30 min. 2 hrs. 8 hrs sec sec sec sec sec sec sec. Decoding time, 1K packets Size Reed-Solomon Tornado Z 250 K 500 K 1 MB 2 MB 4 MB 8 MB 16 MB 2.06 sec. 8.4 sec sec. 199 sec. 13 min. 1 hr. 4 hrs sec sec sec sec sec sec sec. Tornado Z: Average inefficiency = Both codes: Stretch factor = 2
15 Cyclic Interleaving Transmission File Blocks Encoded Blocks Interleaved Encoding Encoding Copy 1 Encoding Copy 2 Tornado Encoding
16 Cyclic Interleaving: Drawbacks The Coupon Collector s Problem Waiting for packets from the last blocks: T B blocks More blocks: faster decoding, larger inefficiency
17 Scalability over File Size Decoding Inefficiency Decoding Inefficiency, 500 Receivers, p = 0.1 Interleaved, T = 20, Max. Interleaved, T = 20, Avg. Interleaved, T = 50, Max. Interleaved, T = 50, Avg. Tornado Z, Max. Tornado Z, Avg File Size, KB
18 Scalability over Receivers Decoding Inefficiency on a 1MB File, p = 0.1 Decoding Inefficiency Interleaved, T = 20 Interleaved, T = 50 Tornado Z Receivers
19 Digital Fountain Prototype Built on top of IP Multicast. Tolerating heterogeneity: Layered multicast Congestion control [VRC 98] Experimental results over MBONE.
20 Research Directions Other applications for digital fountains Dispersity routing Accessing data from multiple mirror sites in parallel Improving the codes Implementation and deployment Scale to large number of clients Network interactions
Definition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
Peer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding
Mathematical Modelling of Computer Networks: Part II Module 1: Network Coding Lecture 3: Network coding and TCP 12th November 2013 Laila Daniel and Krishnan Narayanan Dept. of Computer Science, University
Performance measurements of STANAG 5066 and Applications Running over STANAG 5066
Performance measurements of STANAG 5066 and Applications Running over STANAG 5066 Steve Kille CEO September 14 th 2009 Why Measure? The End Goal is to run Applications and Services over HF Radio Maximize
The Impact of QoS Changes towards Network Performance
International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 48 53 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) The Impact
Dynamic Load Balancing and Node Migration in a Continuous Media Network
Dynamic Load Balancing and Node Migration in a Continuous Media Network Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Draft: April 9, 2001 Abstract This report examines current technologies
TCP for Wireless Networks
TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted
The Data Replication Bottleneck: Overcoming Out of Order and Lost Packets across the WAN
The Data Replication Bottleneck: Overcoming Out of Order and Lost Packets across the WAN By Jim Metzler, Cofounder, Webtorials Editorial/Analyst Division Background and Goal Many papers have been written
ASPERA HIGH-SPEED TRANSFER SOFTWARE. Moving the world s data at maximum speed
ASPERA HIGH-SPEED TRANSFER SOFTWARE Moving the world s data at maximum speed PRESENTERS AND AGENDA PRESENTER John Heaton Aspera Director of Sales Engineering [email protected] AGENDA How Cloud is used
Portable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
The Interaction of Forward Error Correction and Active Queue Management
The Interaction of Forward Error Correction and Active Queue Management Tigist Alemu, Yvan Calas, and Alain Jean-Marie LIRMM UMR 5506 CNRS and University of Montpellier II 161, Rue Ada, 34392 Montpellier
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
Classes of multimedia Applications
Classes of multimedia Applications Streaming Stored Audio and Video Streaming Live Audio and Video Real-Time Interactive Audio and Video Others Class: Streaming Stored Audio and Video The multimedia content
Key Components of WAN Optimization Controller Functionality
Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications
Network Coding for Distributed Storage
Network Coding for Distributed Storage Alex Dimakis USC Overview Motivation Data centers Mobile distributed storage for D2D Specific storage problems Fundamental tradeoff between repair communication and
VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert
Sales & Engineering 3500 Virginia Beach Blvd Virginia Beach, VA 23452 800.853.0434 Ground Operations 1520 S. Arlington Road Akron, OH 44306 800.268.8653 VPN over Satellite A comparison of approaches by
Transforming cloud infrastructure to support Big Data Ying Xu Aspera, Inc
Transforming cloud infrastructure to support Big Data Ying Xu Aspera, Inc Presenters and Agenda! PRESENTER Ying Xu Principle Engineer, Aspera R&D [email protected] AGENDA Challenges in Moving Big Data
Choosing the right Internet solution for your business.
Choosing the right Internet solution for your business. Choosing the right Internet solution for your business. Let s face it, when it comes to the Internet it s all about speed and reliability. Slow connections
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
Mobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
EonStor DS remote replication feature guide
EonStor DS remote replication feature guide White paper Version: 1.0 Updated: Abstract: Remote replication on select EonStor DS storage systems offers strong defense against major disruption to IT continuity,
Digital Audio and Video Data
Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday
Lecture 14: Data transfer in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Data transfer over multiple wireless hops Many applications: TCP flow from a wireless node
OFFSHORE BANDWIDTH BOOST TECHNICAL WHITEPAPER
OFFSHORE BANDWIDTH BOOST TECHNICAL WHITEPAPER Page: 2 Executive Summary Costly, outdated technology has restricted those wanting to communicate to and from offshore supply vessels. Innovations from MCP
Steelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
16/5-05 Datakommunikation - Jonny Pettersson, UmU 2. 16/5-05 Datakommunikation - Jonny Pettersson, UmU 4
Multimedia Networking Principles Last time Classify multimedia Multimedia Networking Applications Streaming stored audio and video Identify the network Real-time Multimedia: Internet Phone services the
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
Lecture 33. Streaming Media. Streaming Media. Real-Time. Streaming Stored Multimedia. Streaming Stored Multimedia
Streaming Media Lecture 33 Streaming Audio & Video April 20, 2005 Classes of applications: streaming stored video/audio streaming live video/audio real-time interactive video/audio Examples: distributed
Accelerating File Transfers Increase File Transfer Speeds in Poorly-Performing Networks
Accelerating File Transfers Increase File Transfer Speeds in Poorly-Performing Networks Contents Introduction... 2 Common File Delivery Methods... 2 Understanding FTP... 3 Latency and its effect on FTP...
SYSTEMATIC NETWORK CODING FOR LOSSY LINE NETWORKS. (Paresh Saxena) Supervisor: Dr. M. A. Vázquez-Castro
SYSTEMATIC NETWORK CODING FOR LOSSY LINE NETWORKS Paresh Saxena Supervisor: Dr. M. A. Vázquez-Castro PhD Programme in Telecommunications and Systems Engineering Department of Telecommunications and Systems
Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
Video Streaming with Network Coding
Video Streaming with Network Coding Kien Nguyen, Thinh Nguyen, and Sen-Ching Cheung Abstract Recent years have witnessed an explosive growth in multimedia streaming applications over the Internet. Notably,
Mobile Communications Chapter 9: Mobile Transport Layer
Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery
Input / Ouput devices. I/O Chapter 8. Goals & Constraints. Measures of Performance. Anatomy of a Disk Drive. Introduction - 8.1
Introduction - 8.1 I/O Chapter 8 Disk Storage and Dependability 8.2 Buses and other connectors 8.4 I/O performance measures 8.6 Input / Ouput devices keyboard, mouse, printer, game controllers, hard drive,
Chapter 7 outline. 7.5 providing multiple classes of service 7.6 providing QoS guarantees RTP, RTCP, SIP. 7: Multimedia Networking 7-71
Chapter 7 outline 7.1 multimedia networking applications 7.2 streaming stored audio and video 7.3 making the best out of best effort service 7.4 protocols for real-time interactive applications RTP, RTCP,
How To Make A Delay Tolerant Network (Dtn) Work When You Can'T Get A Signal From A Long Delay (Tcp/Ip) To A Long Time (Tokus) Or From A Short Delay (Ip) (Tko
Delay / Disruption Tolerant Networking (DTN) Security Key Management Fred L. Templin [email protected] Mark Anderson, L2 Background The Internet Protocols (TCP/IP) are ubiquitous: Most widely-deployed
Proactive Prioritized Mixing of Scalable Video Packets in Push-Based Network Coding Overlays
Proactive Prioritized Mixing of Scalable Video Packets in Push-Based Network Coding Overlays Michele Sanna and Ebroul Izquierdo School of Electronic Engineering and Computer Science Queen Mary, University
HOW PUBLIC INTERNET IS FINALLY READY FOR HD VIDEO BACKHAUL
White Paper HOW PUBLIC INTERNET IS FINALLY READY FOR HD VIDEO BACKHAUL EXPLORING THE CHALLENGES AND OPPORTUNITIES OF DELIVERING MORE CONTENT AT LESS COST Today s broadcasters are faced with an ever- present
Traffic Engineering & Network Planning Tool for MPLS Networks
Traffic Engineering & Network Planning Tool for MPLS Networks Dr. Associate Professor, Department of Electrical Engineering Indian Institute of Technology Bombay, Powai, Mumbai 76 Founder & Director, Vegayan
A comparison of TCP and SCTP performance using the HTTP protocol
A comparison of TCP and SCTP performance using the HTTP protocol Henrik Österdahl ([email protected]), 800606-0290, D-01 Abstract This paper discusses using HTTP over SCTP as an alternative to the traditional
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
WebEx. Network Bandwidth White Paper. WebEx Communications Inc. - 1 -
WebEx Network Bandwidth White Paper WebEx Communications Inc. - 1 - Copyright WebEx Communications, Inc. reserves the right to make changes in the information contained in this publication without prior
VIA CONNECT PRO Deployment Guide
VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
PEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
Understanding Latency in IP Telephony
Understanding Latency in IP Telephony By Alan Percy, Senior Sales Engineer Brooktrout Technology, Inc. 410 First Avenue Needham, MA 02494 Phone: (781) 449-4100 Fax: (781) 449-9009 Internet: www.brooktrout.com
A Novel Routing and Data Transmission Method for Stub Network of Internet of Things based on Percolation
IEEE INFOCO 2011 Workshop on 2CN-2011 A Novel Routing and Data Transmission ethod for Stub Network of Internet of Things based on Percolation Xiangming Li, Jihua Lu, Jie Yang, and Jianping An School of
Data Link Layer Overview
Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,
Quality of Service Management for Teleteaching Applications Using the MPEG-4/DMIF
Quality of Service Management for Teleteaching Applications Using the MPEG-4/DMIF Gregor v. Bochmann and Zhen Yang University of Ottawa Presentation at the IDMS conference in Toulouse, October 1999 This
Study on Redundant Strategies in Peer to Peer Cloud Storage Systems
Applied Mathematics & Information Sciences An International Journal 2011 NSP 5 (2) (2011), 235S-242S Study on Redundant Strategies in Peer to Peer Cloud Storage Systems Wu Ji-yi 1, Zhang Jian-lin 1, Wang
NETWORK ISSUES: COSTS & OPTIONS
VIDEO CONFERENCING NETWORK ISSUES: COSTS & OPTIONS Prepared By: S. Ann Earon, Ph.D., President Telemanagement Resources International Inc. Sponsored by Vidyo By:S.AnnEaron,Ph.D. Introduction Successful
An Introduction to Dispersive Virtualized Networks
An Introduction to Dispersive Virtualized Networks Dispersive Technologies software and cloud-based virtualized networks deliver mission-critical communications over the public Internet to help organizations
Module 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
The Evolution of 3G CDMA Wireless Networks. David W. Paranchych IEEE CVT Luncheon January 21, 2003
The Evolution of 3G CDMA Wireless Networks David W. Paranchych IEEE CVT Luncheon January 21, 2003 Outline Past: cdma2000 1xRTT Present: 1xEV-DO What is it? How does it work? How well does it work? What
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Growth Codes: Maximizing Sensor Network Data Persistence
Growth Codes: Maximizing Sensor Network Data Persistence ABSTRACT Abhinav Kamra Columbia University New York, USA [email protected] Jon Feldman Google Inc. New York, USA [email protected] Sensor networks
Overview. 15-441: Computer Networking. Components of Integrated Services. Service Interfaces RSVP. Differentiated services
Overview 15-441: Computer Networking Lecture 21: QoS and Mobile/Wireless Networking RSVP Differentiated services Internet mobility TCP Over Noisy Links Lecture 21: 3-31-05 2 Components of Integrated Services
Wireless Video Best Practices Guide
Wireless Video Best Practices Guide Using Digital Video Manager (DVM) with the OneWireless Universal Mesh Network Authors: Annemarie Diepenbroek DVM Product Manager Soroush Amidi OneWireless Product Manager
Four Ways High-Speed Data Transfer Can Transform Oil and Gas WHITE PAPER
Transform Oil and Gas WHITE PAPER TABLE OF CONTENTS Overview Four Ways to Accelerate the Acquisition of Remote Sensing Data Maximize HPC Utilization Simplify and Optimize Data Distribution Improve Business
Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide
Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate
RTT 60.5 msec receiver window size: 32 KB
Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)
Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
Traffic Monitoring in a Switched Environment
Traffic Monitoring in a Switched Environment InMon Corp. 1404 Irving St., San Francisco, CA 94122 www.inmon.com 1. SUMMARY This document provides a brief overview of some of the issues involved in monitoring
CS 61C: Great Ideas in Computer Architecture. Dependability: Parity, RAID, ECC
CS 61C: Great Ideas in Computer Architecture Dependability: Parity, RAID, ECC Instructor: Justin Hsia 8/08/2013 Summer 2013 Lecture #27 1 Review of Last Lecture MapReduce Data Level Parallelism Framework
WAN OPTIMIZATION. Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc.
WAN OPTIMIZATION Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc. Disclaimer Please be aware that the concepts and opinions expressed in the following presentation are those of
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
Giving life to today s media distribution services
Giving life to today s media distribution services FIA - Future Internet Assembly Athens, 17 March 2014 Presenter: Nikolaos Efthymiopoulos Network architecture & Management Group Copyright University of
Efficient and low cost Internet backup to Primary Video lines
Efficient and low cost Internet backup to Primary Video lines By Adi Rozenberg, CTO Table of Contents Chapter 1. Introduction... 1 Chapter 2. The DVP100 solution... 2 Chapter 3. VideoFlow 3V Technology...
ADVANTAGES OF AV OVER IP. EMCORE Corporation
ADVANTAGES OF AV OVER IP More organizations than ever before are looking for cost-effective ways to distribute large digital communications files. One of the best ways to achieve this is with an AV over
Application Note How To Determine Bandwidth Requirements
Application Note How To Determine Bandwidth Requirements 08 July 2008 Bandwidth Table of Contents 1 BANDWIDTH REQUIREMENTS... 1 1.1 VOICE REQUIREMENTS... 1 1.1.1 Calculating VoIP Bandwidth... 2 2 VOIP
RVS-Seminar Implementation and Evaluation of WinJTAP Interface. Milan Nikolic Universität Bern
RVS-Seminar Implementation and Evaluation of WinJTAP Interface Milan Nikolic Universität Bern Overview > Short introduction > TAP interface on Win32 OS > Implementation of WinJTAP interface > Test of WinJTAP:
Cisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
CITS1231 Web Technologies. Client, Server, the Internet, and the Web
CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the
Unequal Error Protection using Fountain Codes. with Applications to Video Communication
Unequal Error Protection using Fountain Codes 1 with Applications to Video Communication Shakeel Ahmad, Raouf Hamzaoui, Marwan Al-Akaidi Abstract Application-layer forward error correction (FEC) is used
Video Transmission over Wireless LAN. Hang Liu [email protected]
Video Transmission over Wireless LAN Hang Liu [email protected] Page 1 Introduction! Introduction! Wi-Fi Multimedia and IEEE 802.11e for QoS Enhancement! Error Control Techniques Page 2 Introduction!
Axceleon s CloudFuzion Turbocharges 3D Rendering On Amazon s EC2
Axceleon s CloudFuzion Turbocharges 3D Rendering On Amazon s EC2 In the movie making, visual effects and 3D animation industrues meeting project and timing deadlines is critical to success. Poor quality
Supporting VoIP in IEEE802.11 Distributed WLANs
Supporting VoIP in IEEE802.11 Distributed WLANs Zuo Liu Supervisor: Dr. Nick Filer July 2012 1 Voice VoIP Applications Constant Streaming Traffic Packetize interval usually 10-30 ms 8 160 bytes each packet
VIA COLLAGE Deployment Guide
VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
The Problem with TCP. Overcoming TCP s Drawbacks
White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,
Data Networks Summer 2007 Homework #3
Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.
Service Overview CloudCare Online Backup
Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
Lustre Networking BY PETER J. BRAAM
Lustre Networking BY PETER J. BRAAM A WHITE PAPER FROM CLUSTER FILE SYSTEMS, INC. APRIL 2007 Audience Architects of HPC clusters Abstract This paper provides architects of HPC clusters with information
Chapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
Mul$media Networking. #3 Mul$media Networking Semester Ganjil PTIIK Universitas Brawijaya. #3 Requirements of Mul$media Networking
Mul$media #3 Mul$media Semester Ganjil PTIIK Universitas Brawijaya Schedule of Class Mee$ng 1. Introduc$on 2. Applica$ons of MN 3. Requirements of MN 4. Coding and Compression 5. RTP 6. IP Mul$cast 7.
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran
Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran Network Research Group, School of Computer Sciences Universiti Sains Malaysia11800 Penang, Malaysia Abstract
