نتایج جستجو برای: packet dropping

تعداد نتایج: 57255  

Journal: :Security and Communication Networks 2013
Issa M. Khalil Saurabh Bagchi Najah AbuAli Mohammad Hayajneh

Local monitoring has been demonstrated as a powerful technique for mitigating security attacks in multi-hop ad-hoc networks. In local monitoring, nodes overhear partial neighborhood communication to detect misbehavior such as packet drop or delay. However, local monitoring as presented in the literature is vulnerable to a class of attacks that we introduce here called stealthy packet dropping. ...

Journal: :CoRR 2009
Mohammed M. Kadhum Suhaidi Hassan

Fast Congestion Notification (FN) is one of the proactive queue management mechanisms that practices congestion avoidance to help avoid the beginning of congestion by marking/dropping packets before the router’s queue gets full; and exercises congestion control, when congestion avoidance fails, by increasing the rate of packet marking/dropping. Technically, FN avoids the queue overflows by cont...

Journal: :Computer Communications 2007
Xiaobo Zhou Dennis Ippoliti Terrance E. Boult

Network applications and users have very diverse service expectations and requirements, demanding for provisioning different levels of quality of service on the Internet. As the speed of network links has been rising at a pace that exceeds that of the growth in the buffer size, packet loss rate differentiation has been an active research topic. However, none of the existing packet dropping sche...

2012
S. Gopinath

Mobile Ad Hoc Networks are the set of mobile hosts operating without the aid of the established infrastructure of centralized administration. Due to lack of infrastructure, the network can be easily affected by several attacks. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is t...

2007
Xin Zhang Haowen Chan Abhishek Jain Adrian Perrig

A malicious insider in a sensor network may sabotage the network at any level of operation. While most prior work on network-layer security has focused on providing control plane integrity (specifically, routing correctness), we approach a complementary and equally important problem: data plane reliability. In a data plane attack, the attacker does not attack the routing control logic, but inst...

2006
Xiaobo Zhou Dennis Ippoliti Terrance Boult

Network applications and users have very diverse service expectations and requirements, demanding for provisioning of different levels of quality of service on the Internet. As the speed of network links has been rising at a pace that exceeds that of the growth in the buffer size, packet loss rate differentiation has been an active research topic. However, none of the existing packet dropping s...

Journal: :J. Inform. and Commun. Convergence Engineering 2010
In-Taek Lim Young-Tae Ryu

513 Abstract—This paper proposes a medium access control protocol for integrated voice and data services in slotted CDMA systems. The proposed protocol, which is named as RCSSMA (Reservation Code and Status Sensing Multiple Access), adopts a code reservation and status sensing schemes. RCSSMA protocol gives higher access priority to the voice traffic than data traffic for reducing the packet dr...

1996
Ioannis Stavrakakis

In this paper a system of T resources (wireless channels) shared by a number of un-buuered applications is considered. Packets which are not allocated a channel within the current service cycle are dropped. The Quality of Service (QoS) vector is equivalently described in terms of (diverse) packet dropping probabilities (pi), or (diverse) packet dropping rates (di). From a precisely deened regio...

Journal: :Applied Mathematics and Computer Science 2011
Andrzej Chydzinski Lukasz Chrost

Queueing systems in which an arriving job is blocked and lost with a probability that depends on the queue size are studied. The study is motivated by the popularity of Active Queue Management (AQM) algorithms proposed for packet queueing in Internet routers. AQM algorithms often exploit the idea of queue-size based packet dropping. The main results include analytical solutions for queue size d...

2015
Priyanka Gaur Neha Goswami

Scattered Dropping Attack (SDA) is a simple yet very powerful denial of service (DoS) attack that is effective on both TCP and UDP based MANETs. The simulation results clearly show the impact of proposed attack on the network throughput, bandwidth wastage and received data quality. It has also been observed that even though the TCP congestion control is adaptable to the packet losses but in cas...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید