نتایج جستجو برای: packet dropping

تعداد نتایج: 57255  

2013
K. Sasi Kala Rani J. Suganthi Yung-Chuan Wun Styllianos Dimitriou Ageliki Tsioliaridou Vassilis Tsaoussidis

The global reach and ubiquity of the Internet has created a large number of applications which leads to an extensive need to support both real time multimedia applications and traditional text based applications. Each application has different Quality of Service (QoS) requirements [1,2]. QoS for multimedia applications could be achieved by: (1) Difference in packets handling based on the conten...

Journal: :Perform. Eval. 1996
Jeffrey M. Capone Ioannis Stavrakakis

Networks are expected to support applications with diverse traac characteristics and Quality of Service (QoS) requirements, such as voice, data, video and multi-media. In this environment it is important to determine whether a given QoS vector is achievable (for call admission control), and if it is, design eecient resource allocation policies that deliver it. In this paper a system of T resour...

Journal: :Int. Arab J. Inf. Technol. 2007
Essam Natsheh Adznan B. Jantan Sabira Khatun Subramaniam Shamala

Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the ability to handle the congestion in its queues during traffic overflow. Traditionally, this was done through Drop-Tail policy where the node drops the incoming packets to its queues during overflow condition. Many studies ...

Journal: :JNW 2014
Jingjing Yuan Peiying Chen Qinghua Liu Heng Li

Due to population distribution and economic flourish diversity, the low earth orbit (LEO) satellite network carries unbalanced traffic load, which leads that parts of satellite links are congested while others are underutilized. Furthermore, the congested inter-satellite links result in high queuing delay and packet dropping ratio. To ensure an intelligent scheduling of traffic over entire sate...

2013
Abdul Wali Khan Muhammad Zakarya

DDoS attacks on the World Wide Web in broad-spectrum and predominantly in modern cloud computing has become a noticeable issue for researchers in academia and industry related to the field of computer sciences. DDoS attacks are cool to provoke but their uncovering is a very challenging and dingy task and therefore, an eye-catching weapon for hackers. Hence DDoS torrents do not have familiar app...

2000
Sungwon Ha Sung-Wook Han Vaduvur Bharghavan

The need for simple, scalable, and incrementally deployable router-level mechanisms to support end-to-end congestion control has been well recognized in literature. Specifically, mechanisms for early congestion detection and fair packet dropping, such as RED [1], have been proposed and extensively studied. It has been shown that RED does not scale well with the number of flows, is difficult to ...

Journal: :Wireless Networks 2003
Phone Lin

General Packet Radio Service (GPRS) provides mobile users end-to-end packet-switched services by sharing the radio channels with voice and circuit-switched services. In such a system, radio resource allocation for circuit-switched and packet-switched services is an important issue, which may affect the QoS for both services significantly. In this paper, we propose two algorithms: Dynamic Resour...

2005
Christian Hoene Sven Wiethölter Adam Wolisz

Losing VoIP packets or speech frames decreases the perceptual speech quality. The statistical relation between randomly lost speech frames and speech quality is well known. In cases of bursty and ratedistortion optimized losses, a precise quality model is required to relate losses to quality. In the present paper, we present a model that is based on the loss impact or the importance of single s...

Journal: :IJBDCN 2007
Essam Natsheh Adznan B. Jantan Sabira Khatun Subramaniam Shamala

Mobile ad hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the ability to handle the congestion in its queues during traffic overflow. Traditionally, this was done through DropTail policy where the node drops the incoming packets to its queues during overflow condition. Many studies s...

2010
Andrea Visconti Hooman Tahayori

Implementation of routing protocols in mobile adhoc networks relies on efficient node cooperation. However, node misbehavior is a common phenomenon, thus, ad-hoc networks are subject to packet dropping, packet modification, packet misrouting, selfish node behavior, and so on. In this paper, a biologically-inspired type-2 fuzzy set recognition algorithm for detecting misbehaving nodes in an ad-h...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید