نتایج جستجو برای: ack

تعداد نتایج: 901  

2002
Fei Peng Victor C. M. Leung

Since TCP can only detect congestion after packet losses have already happened, various forms of Fast TCP (FTCP) have been proposed to notify congestion early and avoid packet losses in intermediate nodes by effectively controlling backward ACK flows traversing the same nodes as the forward data packets. Among them, token-based FTCP (TB-FTP) is a promising approach as it does not need to determ...

2014
Etsuo Mizukami Hideki Kashioka

s g F m Initiate Ack s u F m InitiateU AckG g Ack To engage conversations, especially those which have certain goals or tasks, the participants have to share many things to achieve collaboration. In each local interaction, the achievement of grounding (Clark and Schaefer, 1989; Clark and Brennan, 1991) about sharing each utterances meanings would be needed. By accumulating these grounding proce...

Journal: :JCS 2015
Gayathri A. P. Narayanasamy

Corresponding Author: Gayathri, A. Department of Information Science and Technology, Anna University, Chennai-25, Tamilnadu, India Email: [email protected] Abstract: Mobile Ad-hoc Network (MANET) is one among the fastest growing area in the field of research where security is a vital factor for protecting MANET against attacks, EAACK is an acknowledgement based IDS which is composed of th...

Journal: :Computer Networks 2013
Youghourta Benfattoum Steven Martin Khaldoun Al Agha

Most of the works on Generation-Based Network Coding (GBNC) consider a fixed generation size. A large generation size maximizes the Network Coding benefits but leads to a long delay while a small generation size reduces the delay but decreases the throughput. This paper presents the DYnamic GEneration Size (DYGES) approach. Our network-aware method adjusts the generation size according to the n...

1996

q 3 q 1 q 1 q 1 q 3 j j+1 i-1 i-2-1 0 D activated by P activated by P j 0 Fig. 10. Two processes entering region D. 27 q 0. .. p p q q q q q q q 1 1 1 1 1 1 1. .. .. . p 0 p p p q 3 p q j 0 q 1 q q q 1 1. .. 0 q 1 q q q 1 1. .. 0 q r 3-d r +d q 3 16 3 16 q 1 17 9-d +d q 1 9 11 9-d +d 11 q 0 9 10-b +b q 0 +ack-ack 10

2002
William H. Winsborough Ninghui Li

Exchange of attribute credentials is a means to establish mutual trust between strangers that wish to share resources or conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the exchange of sensitive credentials by using access control policies. Existing ATN work makes unrealistic simplifying assumptions about credential-representation languages and creden...

Journal: :JCM 2015
Ryosuke Murata Masakatsu Ogawa Jyunya Fukuzawa Ken Okamoto Yuichiro Okugawa Kazuhiro Takaya

—ZigBee has attracted attention for constructing the sensor network such as home energy management system. Both ZigBee and wireless LAN (WLAN) use a 2.4GHz band, called the industrial, scientific, and medical unlicensed band; therefore, ZigBee faces severe interference problems in the presence of WLAN. Frame collisions are serious problems between ZigBee and WLAN. Both employ a carrier sense m...

2002
Runtong Zhang Jian Ma Ping Li Dong Jie

Being a widely used transport protocol in Internet, TCP has its own congestion control mechanism. However, TCP might be ineffective because it starts decreasing its rate just after it senses packet's loss, implying that the network has already been congested somewhere. Although several amendments have been developed to improved TCP performance over these years, some inefficiencies such as slow ...

2009
Ilpo Järvinen Markku Kojo

Linux TCP implementation has significant limitations in loss recovery performance due to Selective Acknowledgment (SACK) related processing latencies when the outstanding window is large. In this paper we address a number of these shortcomings by extending earlier work by others using fast access shortcut variables to the expected next-tobe-processed segment and through novel resegmentation of ...

Journal: :IEICE Transactions 2006
Hirotaka Nakano Go Hasegawa Masashi Nakata

Recently, heterogeneous networks with wired and wireless links are becoming common. However, the performance of TCP data transmission deteriorates significantly over such networks because of packet losses caused by the high bit error rate of wireless links. We had proposed receiver-based ACK splitting mechanism to solve that problem previously. Our mechanism does not need modifications to the s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید