Connections. for Example, with Our Network with Three a New Architecture for Packet Switch- Ing Network Protocols, In

ثبت نشده
چکیده

connections, with a buer size of 32 and a pipe size of 50 packets, the relative shares of throughput were 31%, 39%, and 30%. This anomalous behavior can be removed by simply changing the congestion avoidance increase algorithm to read: cwnd += 1 / wnd With this change, bcwndc always increases by one in every epoch. For those who are interested in experimenting with the above algorithm, the modied TCP code that we are currently exploring is described below. In real BSD TCP code, cwnd is in terms of bytes, instead of packets. The above modication requires a one-line change in tcp_input() procedure: replace u_int incr = tp->t_maxseg; if (tp->snd_cwnd > tp->snd_ssthresh) incr = MAX(incr * incr / tp->snd_cwnd, 1); by u_int incr = tp->t_maxseg; if (tp->snd_cwnd > tp->snd_ssthresh) incr = MAX(incr / (tp->snd_cwnd / incr), 1); References [1] R. Braden (editor). Requirements for Internet hosts-communication layers, RFC-1122, Octo-ber 1989.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Parameters Evaluation in Vehicular Ad-hoc Network (VANET) Routing Protocols for Efficient Message Delivery in City Environment

Abstract- Efficient message delivery in city environment is required to ensure driver’s safety and passenger’s comfortability. In cities of developed nations, routing of data in vehicular Ad hoc Network (VANET) faces many challenges such as radio obstacles, mobility constraints and uneven nodes distribution. These factors primarily makes communication between vehicles complex. To overcome and t...

متن کامل

Design of Arrayed Waveguide Grating based Optical Switch for High Speed Optical Networks

This paper demonstrates the design of an Arrayed Waveguide Gratings (AWG) based optical switch. In the design both physical and network layer analysis is performed. The physical layer power and noise analysis is done to obtain Bit Error Rate (BER). This has been found that at the higher bit rates, BER is not affected with number of buffer modules. Network layer analysis is done to obtain perfor...

متن کامل

New High Secure Network Steganography Method Based on Packet Length

In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...

متن کامل

بهبود پروتکل AODV جهت مقابله با حملات کرم‌چاله در شبکه‌های اقتضایی

Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node.  In Wormhole attacks, one malicious node tunnels packets from its location to the ...

متن کامل

Design and Practical Implementation of a New Markov Model Predictive Controller for Variable Communication Packet Loss in Network Control Systems

The current paper investigates the influence of packet losses in network control systems (NCS’s) using the model predictive control (MPC) strategy. The study focuses on two main network packet losses due to sensor to controller and controller to actuator along the communication paths. A new Markov-based method is employed to recursively estimate the probability of time delay in controller to ac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1990