Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 3
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

This paper presents non-linear mathematical model of a computer network with a part of wireless network. The article contains an analysis of the stability of the network based on TCP-DCR, which is a modification of the traditional TCP. Block diagram of the network model was converted to a form in order to investigate the D-stability using the method of the space of uncertain parameters. Robust D-stability is calculated for constant delays values.
Go to article

Authors and Affiliations

Jerzy Klamka
Jolanta Tańcula
Download PDF Download RIS Download Bibtex

Abstract

In this paper we derive mathematical description of TCP (Transmission Control Protocol) retransmission probability based on Jacobson’s smoothing algorithm that belongs to EWMA (Exponentially Weighted Moving Average) category. This description is parametrized on the probability density function (pdf) of RTT (Round Trip Time) samples and α, β – two primary parameters of Jacobson’s algorithm. Although it is not a close form expression, it is formulated as an effective algorithm that let us to explicitly calculate the values of RTO (Retransmission Time Out) probability as a function of α, β and the pdf of RTT samples. We achieve the effectiveness of this approach by applying smart discretization of the state space and replacement of continuous functions with discrete approximate equivalents. In this way, we mitigate the cardinality of discrete distributions we deal with that results in linear (n+m) instead of multiplicative (n⋅m) growth of computational complexity. We provide the evaluation of RTO probability for a wide set of α, β parameter values and differently shaped Normal and Laplace pdfs the RTT samples are taken from. The obtained numerical results let us to draw some conclusions regarding the choice of optimal values of α, β parameters as well as the impact of pdf the RTT samples are taken from.
Go to article

Authors and Affiliations

Michał Grabowski
1
Robert Janowski
1

  1. Warsaw School of Computer Science, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

This article describes security mechanisms used by 3rd-7th layers in OSI/ISO network model. Many of commonly used protocols by these layers were designed with assumption that there are nointruders. Such assumption was true many years ago. The network situation has been changed for last few years and we should realize that some properties of existing protocols may be abused. Moreover, we should exchange some of them or create new versions. There are some methods and guidelines concerning secure programming, but there is also lack of guidelines about creating secure protocols. Authors see the necessity of such guideline and this article is an attempt at analysing existing solutions and selecting some universal and important patterns.

Go to article

Authors and Affiliations

Marek Kołodziejczyk
Marek R. Ogiela

This page uses 'cookies'. Learn more