Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
FlexPath NP: a network processor concept with application-driven flexible processing paths
CODES+ISSS '05 Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
SCTP: an innovative transport layer protocol for the web
Proceedings of the 15th international conference on World Wide Web
High-performance data transfer using SCTP-based compact association scheme
ICCSA '07 Proceedings of the The 2007 International Conference Computational Science and its Applications
Implementing SIP-based technology for management framework
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
Adaptive encryption for the realization of real-time transmission of sensitive medical video streams
WOWMOM '08 Proceedings of the 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks
A novel network mobility handoff scheme using SIP and SCTP for multimedia applications
Journal of Network and Computer Applications
Hi-index | 0.09 |
Due to the rapid development of network applications, today the Internet plays an important role in our everyday life. Users hope that the network is always speedy enough to help them access the Internet without any delay. But the real situation is far from the ideal case. In the future, network researchers will continuously improve the network speed, and try to develop networks that are robust, without any crashes or packet loss. In this paper, we propose an aggressive path switching scheme for SCTP. Before data transmission, the scheme selects the fastest path as the primary path to transmit packets. When the path fails or transmission quality is poor, this scheme evaluates alternate paths, and selects the one with the best quality as the new primary path to substitute for the original one. After that, packets are delivered through the new path. Several factors are considered in the evaluation, including bandwidth, encryption/decryption, size of the congestion window, retransmission policy, routing policy, etc.