350 rub
Journal Information-measuring and Control Systems №8 for 2011 г.
Article in number:
Utilization methods of optimization protocols in modern information and telecommunication systems
Authors:
E. O. Karpuhin, A. S. Seednov, S. N. Smirnov
Abstract:
Existing methods for optimizing protocols of information exchange based on three directions. The first direction involves the modification of protocol parameters that are represented in the configuration files of operating systems and application layer protocols. The second direction (within-layer) provides for increasing the efficiency of protocol by choosing the most appropriate protocol for data transfer, improved algorithms for the protocol and optimization of inbound and outbound events. The third direction (cross-layer) associated with optimization set of protocols and affects multiple levels of protocol stack. Discussed in the article directions have their advantages and disadvantages, but each of the direction can complement another. To build on these methods of information and telecommunications systems need architecture that uses all the available service information. Service data from the protocols of the lower layer (physical, data link, network and transport) can be obtained through an open network interfaces and transmit them to the service of collecting and processing service information, which is responsible for: Receive service information from the network device drivers are responsible for physical and link layer; use ICMP protocol to obtain information about the probability of packet loss, time to transmit data to a receiver and back and the number of intermediate devices, routes the packets between the sender and receiver; getting information about available working network connection; use of information on the status of transport protocol for selecting the most appropriate; Improved configuration protocols of information exchange and check it for changes; control of protocol process optimization message delivery, the purpose of which is choosing a suitable transport protocol, methods to protect information transmitted from one subscriber to another, access to network applications, as well as the implementation of reliable data transfer based on UDP. The result of work the service of collecting and processing service information is to assess the state of network at any given time. This estimate can be used in selecting transport protocol that is best suited for these conditions.
Pages: 44-48
References
  1. Mahmoodi, T., Holland, O., Friderikos, V., Aghvami, A. H., Cross-layer optimization of the link-layer based on the detected TCP flavor // in Proc. PIMRC. 2008. P. 1-5.
  2. RFC4953 - Defending TCP Against Spoofing Attacks http://tools.ietf.org/html/rfc4953