Essays about: "DCCP"

Found 3 essays containing the word DCCP.

  1. 1. Simulation Based Comparison of SCTP, DCCP and UDP Using MPEG-4 Traffic Over Mobile WiMAX/IEEE 802.16e

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Muhammad Naveed Khalid; [2010]
    Keywords : IEEE 802.16e; DCCP; ns-2.;

    Abstract : With the advent of new multimedia applications the demand for in time delivery of data is increased as compared to the reliability. Usually the Transport Layer Protocols, User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) are used to transfer the data over the IP based network like Internet. READ MORE

  2. 2. Implementation and evaluation of a queuing discipline in Linux

    University essay from Institutionen för informationsteknologi och medier

    Author : Lennart Franked; David Håsäther; [2010]
    Keywords : AQM; FAFC; Linux;

    Abstract : Streaming video and VoIP are two popular services used over the Internet, and as the number of users increases, the demand on the network routers also increases. Since both streaming video and VoIP have a variable traffic flow, the routers must always have some free space in their receive buffers to handle traffic bursts. READ MORE

  3. 3. Optimization of Transport Security for Securing Peer-to-Peer Communication in Heterogeneous Networks

    University essay from KTH/Mikroelektronik och Informationsteknik, IMIT

    Author : Ta-wei Chen; [2005]
    Keywords : transport layer security; peer-to-peer communication; heterogeneous network; TESP; TCP; UDP; SCTP; DCCP; TLS; DTLS;

    Abstract : This thesis concerns the security of tomorrow’s peer-to-peer real-time communication in heterogeneous networks. Because of the additional delay caused by inband handshake and the poor compatibilities of some transport protocols, it was determined that existing security protocols such as transport layer security (TLS) and datagram transport layer security (DTLS) are not suitable in such a user scenario and a new security protocol should be designed. READ MORE