نتایج جستجو برای: ack
تعداد نتایج: 901 فیلتر نتایج به سال:
Since TCP can only detect congestion after packet losses have already happened, various forms of Fast TCP (FTCP) have been proposed to notify congestion early and avoid packet losses in intermediate nodes by effectively controlling backward ACK flows traversing the same nodes as the forward data packets. Among them, token-based FTCP (TB-FTP) is a promising approach as it does not need to determ...
s g F m Initiate Ack s u F m InitiateU AckG g Ack To engage conversations, especially those which have certain goals or tasks, the participants have to share many things to achieve collaboration. In each local interaction, the achievement of grounding (Clark and Schaefer, 1989; Clark and Brennan, 1991) about sharing each utterances meanings would be needed. By accumulating these grounding proce...
Corresponding Author: Gayathri, A. Department of Information Science and Technology, Anna University, Chennai-25, Tamilnadu, India Email: [email protected] Abstract: Mobile Ad-hoc Network (MANET) is one among the fastest growing area in the field of research where security is a vital factor for protecting MANET against attacks, EAACK is an acknowledgement based IDS which is composed of th...
Most of the works on Generation-Based Network Coding (GBNC) consider a fixed generation size. A large generation size maximizes the Network Coding benefits but leads to a long delay while a small generation size reduces the delay but decreases the throughput. This paper presents the DYnamic GEneration Size (DYGES) approach. Our network-aware method adjusts the generation size according to the n...
q 3 q 1 q 1 q 1 q 3 j j+1 i-1 i-2-1 0 D activated by P activated by P j 0 Fig. 10. Two processes entering region D. 27 q 0. .. p p q q q q q q q 1 1 1 1 1 1 1. .. .. . p 0 p p p q 3 p q j 0 q 1 q q q 1 1. .. 0 q 1 q q q 1 1. .. 0 q r 3-d r +d q 3 16 3 16 q 1 17 9-d +d q 1 9 11 9-d +d 11 q 0 9 10-b +b q 0 +ack-ack 10
Exchange of attribute credentials is a means to establish mutual trust between strangers that wish to share resources or conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the exchange of sensitive credentials by using access control policies. Existing ATN work makes unrealistic simplifying assumptions about credential-representation languages and creden...
—ZigBee has attracted attention for constructing the sensor network such as home energy management system. Both ZigBee and wireless LAN (WLAN) use a 2.4GHz band, called the industrial, scientific, and medical unlicensed band; therefore, ZigBee faces severe interference problems in the presence of WLAN. Frame collisions are serious problems between ZigBee and WLAN. Both employ a carrier sense m...
Being a widely used transport protocol in Internet, TCP has its own congestion control mechanism. However, TCP might be ineffective because it starts decreasing its rate just after it senses packet's loss, implying that the network has already been congested somewhere. Although several amendments have been developed to improved TCP performance over these years, some inefficiencies such as slow ...
Linux TCP implementation has significant limitations in loss recovery performance due to Selective Acknowledgment (SACK) related processing latencies when the outstanding window is large. In this paper we address a number of these shortcomings by extending earlier work by others using fast access shortcut variables to the expected next-tobe-processed segment and through novel resegmentation of ...
Recently, heterogeneous networks with wired and wireless links are becoming common. However, the performance of TCP data transmission deteriorates significantly over such networks because of packet losses caused by the high bit error rate of wireless links. We had proposed receiver-based ACK splitting mechanism to solve that problem previously. Our mechanism does not need modifications to the s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید