نتایج جستجو برای: ack

تعداد نتایج: 901  

Journal: :IEICE communications express 2023

This paper discusses sensor network protocols in terms of the valueput, a metric that considers both quantity and freshness collected information. Considering wireless using acknowledgment feedback, we propose two communication protocols, namely packet retransmission protocol timing shift protocol, numerically analyze their impact on valueput. The obtained results show effectively improves thro...

2002
Jian Fang Ian F. Akyildiz

In this paper, a multicast transport protocol, called TCP-Peachtree, is proposed for satellite IP networks. In addition to the acknowledgment implosion and scalability problems appeared in terrestrial wirelined networks, satellite multicasting has additional problems, i.e., low bandwidth feedback link, different multicast topology and congestion control problem. In TCPPeachtree, the modified B+...

2015
Cheryl Ingram-Smith Jeffrey Wharton Christian Reinholz Tara Doucet Rachel Hesler Kerry Smith

Acetate kinase (ACK), which catalyzes the reversible phosphorylation of acetate by ATP, is a member of the acetate and sugar kinase/heat shock cognate/actin (ASKHA) superfamily. ASKHA family members share a common core fold that includes an ATPase domain with five structural motifs. The PHOSPHATE1 motif has previously been shown to be important for catalysis. We have investigated the role of tw...

2003
James J. Martin Nitin Shrivastav

We have developed a model of the Data over Cable (DOCSIS) version 1.1/2.0 MAC and physical layers using the ‘ns’ simulation package. In this paper we present the results of a performance analysis that we have conducted using the model. The main objective of our study is to examine the performance impact of several key MAC layer system parameters as traffic loads are varied. We focus on the DOCS...

Journal: :Wireless Communications and Mobile Computing 2015
Feyza Keceli Inanc Inan Ender Ayanoglu

When the stations in an IEEE 802.11 infrastructure basic service set employ Transmission Control Protocol (TCP), this exacerbates per-flow unfair access problem. We propose a novel analytical model to approximately calculate the maximum per-flow TCP congestion window limit that prevents packet losses at the access point buffer and therefore provides fair TCP access both in the downlink and upli...

2001
Seok Joo Koh Eunsook Kim

Seok Joo Koh et al. 111 For scalable multicast transport, one of the promising approaches is to employ a control tree known as acknowledgement (ACK) tree which can be used to convey information on reliability and session status from receivers to a root sender. The existing tree configuration has focused on a ‘bottom-up’ scheme in which ACK trees grow from leaf receivers toward a root sender. Th...

1996
A. N. Netravali W. D. Roome

This paper describes the design and implementation of a multicast transport protocol called RMTP. RMTP provides sequenced, lossless delivery of bulk data from one sender to a group of receivers. RMTP achieves reliability by using a packet based selective repeat retransmission scheme, in which each acknowledgment (ACK) packet carries a sequence number and a bitmap. ACK handling is based on a mul...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2012
Antony M Jose Yunsoo A Kim Steven Leal-Ekman Craig P Hunter

RNA silencing in Caenorhabditis elegans is transmitted between cells by the transport of double-stranded RNA (dsRNA). The efficiency of such transmission, however, depends on both the cell type and the environment. Here, we identify systemic RNAi defective-3 (SID-3) as a conserved tyrosine kinase required for the efficient import of dsRNA. Without SID-3, cells perform RNA silencing well but imp...

2007
Vrizlynn L. L. Thing Morris Sloman Naranker Dulay

In this paper, we analyze the stateless SYNSYN&ACK and SYN-FIN/RST detection mechanisms for TCP SYN attacks. We indicate the inherent vulnerability of the SYN-FIN/RST detection mechanism caused by the computation of the RST packet counts. We indicate why SYNSYN&ACK is a more efficient and reliable detection mechanism than SYN-FIN/RST. We come up with ‘Bot Buddies’ for TCP SYN attacks and explai...

2010
Saurabh Mehta Kyung Sup Kwak

The wireless personal area network (WPAN) is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC) is proposed to coordinate the access to the wireless medium among the competing devices, especially for short range and high data rate applications in home networks. In this paper we use analytical modeli...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید