نتایج جستجو برای: packet loss

تعداد نتایج: 481138  

Journal: :International Journal of Computer Applications 2013

Journal: :Symmetry 2021

This paper is devoted to further strengthening, in the current asymmetric information environment, informed level of operators about network performance. Specifically, view burst and perishability a packet loss event, better meet real-time requirements high-speed backbone performance monitoring, model for Packet Loss Measurement at access boundary Based on Sampled Flow (PLMBSF) presented this u...

In this paper, loss probabilities and steady state probabilities of data packets for an asynchronous transfer mode (ATM) network are investigated under the buffer division and push-out schemes. Data packets are classified in classes k which arrive in Poisson fashion to the service facility and are served with general service rate under buffer division scheme, finite buffer space N is divided in...

We consider a grid network where nodes contain small buffers. A packet that faces a crowded buffer in its route will get extra latency and may be dropped. In this paper, we propose a novel flow control protocol called RFCC for grid networks. RFCC tries to reroute delayed packets and utilizes network coding to introduce a configurable amount of redundant information in the network, thereby incre...

Journal: :journal of advances in computer research 0
reza fotohi department of computer engineering, germi branch, islamic azad university, germi, iran roodabe heydari department of computer engineering, germi branch, islamic azad university, germi, iran shahram jamali department of computer engineering, mohaghegh ardabili university, ardabil, iran

mobile-ad-hoc-networks (manets) are self-configuring networks of mobile nodes, which communicate through wireless links. the infrastructure of a mobile ad hoc network (manet) has no routers for routing, and all nodes must share the same routing protocol to assist each other when transmitting messages. the main issues in manets include the mobility of the network nodes, the scarcity of computati...

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید