Piggybacking of Udp and Tcp Packets

نویسندگان

  • Pooja Bangalore Vijayakumar
  • Ravi Pendse
  • Vinod Namboodiri
  • Linda Kliment
  • Nagaraja Thanthry
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New High Secure Network Steganography Method Based on Packet Length

In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...

متن کامل

Adaptive Queue Management Scheme for Flexible Dual TCP/UDP Streaming Protocol

Flexible Dual-TCP/UDP Streaming Protocol (FDSP) is a new method for streaming H.264-encoded High-definition (HD) video over wireless networks. FDSP streaming is done in sequential video segments or chunks called substreams. In FDSP, substream lengths are used to control the amount of Transmission Control Protocol (TCP) data that needs to be sent prior to the playback of that substream. To avoid...

متن کامل

Better audio performance when video stream is monitored by TCP congestion control

Conventional wisdom holds that the TCP like congestion control is unsuitable for real-time multimedia conferencing. However, our results clearly show that an audio and video conferencing system that transmits video over TCP (and audio over RTP/UDP) can provide significantly better audio quality to the end user than one built on RTP/UDP alone. We measured audio quality in terms of packet loss, p...

متن کامل

Understanding CHOKe

A recently proposed active queue management, CHOKe, is stateless, simple to implement, yet surprisingly effective in protecting TCP from UDP flows. As UDP rate increases, even though the number of UDP packets in the queue rises, its bandwidth share eventually drops to zero, in stark contrast to the behavior of a regular FIFO buffer. We derive a detailed model of CHOKe that accurately predicts t...

متن کامل

Loss concealments of subband coded images for real-time transmissions in the Internet

Subband-coded images can be transmitted in the Internet using either the TCP or the UDP protocol. Due to the facts that TCP employs congestion control and retransmissions and that UDP and TCP packets are treated differently by routers, TCP takes much longer delays than those of UDP to deliver an image, but packet losses in UDP may lead to poor decoding quality if the image is single-description...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012