Analysis on packet resequencing for reliable network protocols

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis on Packet Resequencing for Reliable Network Protocols

Protocols such as TCP requires packets to be accepted (i.e., delivered to the receiving application) in the order they are transmitted at the sender. Packets are sometimes misordered in the network. In order to deliver the arrived packets to the application in sequence, the receiver’s transport layer needs to temporarily buffer out-of-order packets and re-sequence them as more packets arrive. E...

متن کامل

Packet Delivery Ratio and Normalized Routing Load Analysis on Ad-hoc Network Protocols

Mobile ad-hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. In order to facilitate communication within the network, a routing protocol is used to ...

متن کامل

Formally modeling, analyzing, and designing network protocols: a case study on retransmission-based reliable multicast protocols

In this thesis, we conduct an extensive case study on formally modeling, analyzing, and designing retransmission-based reliable multicast protocols. We first present an abstract model of the communication service that several reliable multicast protocols [12, 13, 32–34] strive to provide. This model precisely specifies i) what it means to be a member of the reliable multicast group, ii) which p...

متن کامل

New High Secure Network Steganography Method Based on Packet Length

In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Performance Evaluation

سال: 2005

ISSN: 0166-5316

DOI: 10.1016/j.peva.2004.09.002