UDP-based Data Transfer Protocol
   HOME
*





UDP-based Data Transfer Protocol
UDP-based Data Transfer Protocol (UDT), is a high-performance data transfer protocol designed for transferring large volumetric datasets over high-speed wide area networks. Such settings are typically disadvantageous for the more common TCP protocol. Initial versions were developed and tested on very high-speed networks (1 Gbit/s, 10 Gbit/s, etc.); however, recent versions of the protocol have been updated to support the commodity Internet as well. For example, the protocol now supports rendezvous connection setup, which is a desirable feature for traversing NAT firewalls using UDP. UDT has an open source implementation which can be found on SourceForge. It is one of the most popular solutions for supporting high-speed data transfer and is part of many research projects and commercial products. Background UDT was developed by Yunhong Gu during his PhD studies at the National Center for Data Mining (NCDM) of University of Illinois at Chicago in the laboratory of Dr. Robert Gros ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Protocol (computing)
A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information via any kind of variation of a physical quantity. The protocol defines the rules, syntax, semantics and synchronization of communication and possible error recovery methods. Protocols may be implemented by hardware, software, or a combination of both. Communicating systems use well-defined formats for exchanging various messages. Each message has an exact meaning intended to elicit a response from a range of possible responses pre-determined for that particular situation. The specified behavior is typically independent of how it is to be implemented. Communication protocols have to be agreed upon by the parties involved. To reach an agreement, a protocol may be developed into a technical standard. A programming language describes the same for computations, so there is a close analogy between protocols and programming languages: ''protocols are t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


AIMD
The additive-increase/multiplicative-decrease (AIMD) algorithm is a feedback control algorithm best known for its use in TCP congestion control. AIMD combines linear growth of the congestion window when there is no congestion with an exponential reduction when congestion is detected. Multiple flows using AIMD congestion control will eventually converge to an equal usage of a shared link. The related schemes of multiplicative-increase/multiplicative-decrease (MIMD) and additive-increase/additive-decrease (AIAD) do not reach stability. Algorithm The approach taken is to increase the transmission rate (window size), probing for usable bandwidth, until loss occurs. The policy of additive increase may, for instance, increase the congestion window by a fixed amount every round-trip time. When congestion is detected, the transmitter decreases the transmission rate by a multiplicative factor; for example, cut the congestion window in half after loss. The result is a saw-tooth behavior th ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Application Layer Protocols
Application may refer to: Mathematics and computing * Application software, computer software designed to help the user to perform specific tasks ** Application layer, an abstraction layer that specifies protocols and interface methods used in a communications network * Function application, in mathematics and computer science Processes and documents * Application for employment, a form or forms that an individual seeking employment must fill out * College application, the process by which prospective students apply for entry into a college or university * Patent application, a document filed at a patent office to support the grant of a patent Other uses * Application (virtue), a characteristic encapsulated in diligence * Topical application A topical medication is a medication that is applied to a particular place on or in the body. Most often topical medication means application to body surfaces such as the skin or mucous membranes to treat ailments via a large range of cl ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

QUIC
QUIC (pronounced "quick") is a general-purpose transport layer network protocol initially designed by Jim Roskind at Google, implemented, and deployed in 2012, announced publicly in 2013 as experimentation broadened, and described at an IETF meeting. QUIC is used by more than half of all connections from the Chrome web browser to Google's servers. Microsoft Edge (a derivative of the open-source Chromium browser) and Firefox support it. Safari implements the protocol, however it is not enabled by default. Although its name was initially proposed as the acronym for "Quick UDP Internet Connections", IETF's use of the word QUIC is not an acronym; it is simply the name of the protocol. QUIC improves performance of connection-oriented web applications that are currently using TCP. It does this by establishing a number of multiplexed connections between two endpoints using User Datagram Protocol (UDP), and is designed to obsolete TCP at the transport layer for many applications, thus ea ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Fast And Secure Protocol
The Fast Adaptive and Secure Protocol (FASP) is a proprietary data transfer protocol. FASP is a network-optimized network protocol developed by Aspera, owned by IBM. The associated client/server software packages are also commonly called Aspera. The technology is patented under US Patent #20090063698, ''Method and system for aggregate bandwidth control''. Similar to the connectionless UDP protocol, FASP does not expect any feedback on every packet sent. Only the packets marked as really lost must be requested again by the recipient. As a result, it does not suffer as much loss of throughput as TCP does on networks with high latency or high packet loss. Large organizations like IBM, the European Nucleotide Archive, the US National Institutes of Health National Center for Biotechnology Information and others use the protocol in different areas. Amazon also wants to use the protocol for uploading to data centers. Security FASP has built-in security mechanisms that do not af ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Tsunami UDP Protocol
The Tsunami UDP Protocol is a UDP-based protocol that was developed for high-speed file transfer over network paths that have a high bandwidth-delay product. Such protocols are needed because standard TCP does not perform well over paths with high bandwidth-delay products. Tsunami was developed at the Advanced Network Management Laboratory of Indiana University Indiana University (IU) is a system of public universities in the U.S. state of Indiana. Campuses Indiana University has two core campuses, five regional campuses, and two regional centers under the administration of IUPUI. *Indiana Universi .... Tsunami effects a file transfer by chunking the file into numbered blocks of 32 kilobyte. Communication between the client and server applications flows over a low bandwidth TCP connection, and the bulk data is transferred over UDP. References External links * {{SourceForge, tsunami-udp, Tsunami UDP Protocol Internet protocols Transport layer protocols Computer netw ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


ACM/IEEE Supercomputing Conference
SC (formerly Supercomputing), the International Conference for High Performance Computing, Networking, Storage and Analysis, is the annual conference established in 1988 by the Association for Computing Machinery and the IEEE Computer Society. In 2019, about 13,950 people participated overall. The not-for-profit conference is run by a committee of approximately 600 volunteers who spend roughly three years organizing each conference. Sponsorship and Governance SC is sponsored by the Association for Computing Machinery and the IEEE Computer Society. From its formation through 2011, ACM sponsorship was managed through ACM's Special Interest Group on Computer Architecture (SIGARCH). Sponsors are listed on each proceedings page in the ACM DL; see for example. Beginning in 2012, ACM began the process of transitioning sponsorship from SIGARCH to the recently formed Special Interest Group on High Performance Computing (SIGHPC). This transition was completed after SC15, and for SC16 ACM ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Secure Reliable Transport
Secure Reliable Transport (SRT) is an open source video transport protocol that utilises the User Datagram Protocol, UDP transport protocol. Overview SRT provides connection and control, reliable transmission similar to Transmission Control Protocol, TCP; however, it does so at the application layer, using User Datagram Protocol, UDP protocol as an underlying transport layer. It supports packet recovery while maintaining low latency (default: 120 ms). SRT also supports encryption using Advanced Encryption Standard, AES. The protocol was derived from the UDP-based Data Transfer Protocol, UDT project, which was designed for fast file transmission. It provided the reliability mechanism by utilising similar methods for connection, sequence numbers, acknowledgements and re-transmission of lost packets. It utilises selective and immediate (NAK-based) re-transmission. SRT added several features on top of that in order to support live streaming mode: # Controlled latency, with s ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Protocol Composition Logic
Protocol Composition Logic is a formal method that is used for proving security properties of protocols that use symmetric key and Public key cryptography. PCL is designed around a process calculi In computer science, the process calculi (or process algebras) are a diverse family of related approaches for formally modelling concurrent systems. Process calculi provide a tool for the high-level description of interactions, communications, and ... with actions for possible protocol steps like generating some random number, perform encryption and decryption, send and receive messages and digital signature verification actions. Some problems with the logic have been found implying that some currently claimed proofs cannot be proven within the logic. References {{reflist Cryptography ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Australian Technology Network
The Australian Technology Network (ATN) is a network of six Australian universities, with a strong history of innovation, enterprise and working closely with industry. ATN traces its origins back to 1975 as the Directors of Central Institutes of Technology (DOCIT), and was revived in 1999 in its present form with major changes to its membership announced in 2018 and 2020. ATN is the second largest university grouping in Australia, in terms of student number and research funding. History The ATN originated in 1975 as the "Directors of Central Institutes of Technology (DOCIT)", a conference group consisting of the directors of Australia's leading "institutes of technology". Each of DOCIT's original member institutions (NSWIT, QIT, RMIT, SAIT and WAITPredecessors to University of Technology Sydney, Queensland University of Technology, RMIT University, University of South Australia, and Curtin University of Technology respectively.) were located in the central business district of ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

University Of Technology Sydney
The University of Technology Sydney (UTS) is a public research university located in Sydney, New South Wales, Australia. Although its origins are said to trace back to the 1830s, the university was founded in its current form in 1988. As of 2021, UTS enrols 45,221 students through its 9 faculties and schools. The university is regarded as one of the world's leading young universities (under 50 years old), ranked 1st in Australia and 11th in the world by the 2021 QS World University Rankings Young Universities. UTS is a founding member of the Australian Technology Network, and is a member of Universities Australia and the Worldwide Universities Network. History The University of Technology Sydney originates from the Sydney Mechanics' School of Arts (the oldest continuously running Mechanics' Institute in Australia), which was established in 1833. In the 1870s, the School formed the Workingman's College, which was later taken over by the NSW government to form, in 1882, the Sy ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]