نتایج جستجو برای: packet dropping
تعداد نتایج: 57255 فیلتر نتایج به سال:
This paper describes a method for robust streaming of combined MPEG2 audio/video content over in-home wireless networks. We make use of currently used content distribution formats and network protocols. The transmitted bit-rate is constantly adapted to the available network bandwidth, such that audio and video artifacts caused by packet loss are avoided. Bit-rate adaptation is achieved by using...
The queue length and the load rate should be monitored to overcome problem of router congestion due increase in network utilization achieve a high-speed transmission. Previous active management methods manage queued packets buffer maintain high performance. However, these depend on monitoring indicators that do not cover all signs, leading packet loss delay. Accordingly, signs wrapped into mana...
In this paper, we examined the effect on network performance of various strategies an attacker could adopt to launch Man-In The Middle (MITM) attacks wireless network, such as fleet or random strategies. particular, we're focusing some those goals for MITM attackers - message delay, dropping. According simulation data, these have a significant legitimate nodes in causing vast amounts infected p...
Multihop ad hoc networks were designed assuming trustworthiness and cooperation between all participating nodes; nodes in an ad-hoc network rely on one another in packet forwarding, detecting routes, etc. Thus, the performance of an ad hoc network degrades considerably with the presence of misbehaving nodes. Nodes’ misbehaviour includes, but is not limited to, refusing to relay data packets, co...
In case that malicious or selfish user congests network, the traditional congestion control schemes such as ECN (Explicit Congestion Notification) in TCP protocol could not control the pernicious congestion so perfectly as they protect normal traffic. In this paper, we propose a strong congestion-making traffic control scheme, which is capable of preventing malicious or selfish user from conges...
The paper presents a technique for computing the individual throughputs and the average queue occupancy when multiple TCP connections share a single bottleneck buffer. The bottleneck buffer is assumed to perform congestion feedback via randomized packet marking or drops. We first present a fixed point-based analytical technique to compute the mean congestion window sizes, the mean queue occupan...
This paper presents two methods to mitigate distributed denial of service attacks and flash crowds: device driver level packet filtering and remote firewall. Device driver level packet filtering is designed to eliminate harmful network traffic before it consumes the processing resource for higher network protocol layers at a production server. The remote firewall is designed with a cross-layer ...
A Wireless Sensor Network (WSN) is a collection of petite sensor terminals, capable of sensing and communication. Here topology is dynamic Node developments result in dynamic topology and cause link failures in an Ad-hoc. Here focusing on the using of packet scheduling technique for AODV (Ad Hoc on Demand Distance Vector) routing protocol by weight hop based scheduling in this paper. The transi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید