نتایج جستجو برای: packet dropping

تعداد نتایج: 57255  

Journal: :Journal of Interconnection Networks 2009
Djamel Djenouri Othmane Mahmoudi Mohamed Bouamama

This paper deals with security of routing protocols of Mobile Ad hoc Networks (MANETs), and proposes a solution to immunize such protocols against packet dropping misbehavior. Most of the current secure protocols are vulnerable to packet dropping misbehavior, which can be exploited by selfish nodes and malicious ones as well. For example, simply by dropping RREQ (Route Request) packets a selfis...

2003
Mirosław Klinkowski Davide Careglio Marian Marciniak Josep Sole-Pareta

This paper addresses the problem of providing QoS management for optical packet switch. In particular we propose the Simple Prioritized Buffering Algorithm (SPBA) for prioritized buffer’s management, which aims to guarantee different packet loss probabilities to different packet streams. In contrast to other solutions, SPBA does not need any resource reservation or threshold dropping, but only ...

Journal: :IEEE Trans. Communications 1996
Jon M. Peha Fouad A. Tobagi

Applications with diverse performance objectives must be supported on a single packet-switched network. The e ciency of such networks can be greatly improved through use of sophisticated scheduling and dropping algorithms within the queues that form at the network access points and in switches throughout the network. In our approach, arbitrary performance objectives are expressed in the form of...

1996
Jon M. Peha Fouad A. Tobagi

Applications with diverse performance objectives must be supported on a single packet-switched network. The e ciency of such networks can be greatly improved through use of sophisticated scheduling and dropping algorithms within the queues that form at the network access points and in switches throughout the network. In our approach, arbitrary performance objectives are expressed in the form of...

2004
Majid Ghaderi Raouf Boutaba

Admission control is a key element for providing quality of service in a mobile cellular network. The problem of admission control in packet-switched cellular networks is more challenging compared to their circuit-switched counterparts due to packet-level network interactions. Although packet-based architectures allow for more efficient sharing of scarce radio resources, admission of new connec...

Journal: :CoRR 2015
Maimuna Khatari Ghassan Samara

Congestion in router buffer increases the delay and packet loss. Active Queue Management (AQM) methods are able to detect congestion in early stage and control it by packet dropping. Effective Random Early Detection (ERED) method, among many other AQM methods, gives a good performance in detect and control congestion and preserve packet loss. However, the ERED neglect the delay factor, which is...

2000
Gonçalo Quadros Antonio Alves Edmundo Monteiro Fernando Boavida

Many research teams are developing technologies to turn the Internet into a QoS-capable network, which is one of the biggest challenges that this communication system currently faces. Naturally, at the core of such a challenge are IP routers and the technology they use. It is a well known fact that the common packet scheduling discipline that is used in routers (first come first served) makes t...

2004
Sirisha R. Medidi Muralidhar Medidi Sireesh Gavini

Mobile Ad-hoc networks are inherently prone to security attacks, with node mobility being the primary cause in allowing security breaches. This makes the network susceptible to Byzantyne faults with packets getting misrouted, corrupted or dropped. In this paper we propose solutions using an unobtrusive monitoring technique using the “Detection Manager” to locate malicious or faulty nodes that m...

2015
Kishan N. Patel Rutvij H. Jhaveri Md Akhtaruzzaman Mohammd Abdur Razzaque Ishtiaque Ahmed Chen Khong Tham Ravinder Singh Sawhney

Vehicular Ad Hoc Networks (VANETs) are special type of decentralized wireless networks among the various mobile nodes. In VANET decision of forwarding the data packets from one node to other node is dynamic and based on the network connectivity. So efficient, optimized and secure techniques are required for secure transmission of data packets and tracking the changing topology of the network. W...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید