نتایج جستجو برای: packet modification
تعداد نتایج: 169396 فیلتر نتایج به سال:
Summery A fixed-packet optimal joint source channel coding scheme for transmission of progressive images over Rayleigh channels is proposed. A first order Markov model is used in rate allocation problem to concern channel temporal variations during image transmission. Also, introducing a modification on the used progressive coding scheme, the requirement for the immediate decoding termination u...
Explicit Congestion Notification (ECN) and Active Queue Management Schemes such as Random Early Detection (RED), Adaptive Random Early Detection (ARED) and BLUE queues have been proposed for TCP/IP networks to compensate network congestion. However, using ECN requires that ECN be supported by both TCP senders and receivers. This paper presents a novel AQM modification called Receiver-Window Mod...
A subtle modification to the Signal-Stability based Adaptive routing protocol along with their performance comparison has been presented in this paper. The modified protocol (MSSA) is found to offer better packet delivery and less link failures.
In traditional packet voice or the emerging 2.5G and 3G wireless data services, smooth and timely delivery of audio is an essential requirement in Quality of Service (QoS) provision. It has been shown in our previous work that, by adapting time-scale modification to audio signals, an adaptive play-out algorithm can be designed to minimize packet dropping at the receiver end. By stretching the a...
in this paper we study necessary and sufficient conditions for some types of linear combinations of wave packet frames to be a frame for l^2(r^d). further, we illustrate our results with some examples and applications.
This draft specifies a modification to RFC 3168 to allow TCP SYN/ACK packets to be ECN-Capable. For TCP, RFC 3168 only specifies setting an ECN-Capable codepoint on data packets, and not on SYN and SYN/ACK packets. However, because of the high cost to the TCP transfer of having a SYN/ACK packet dropped, with the resulting retransmit timeout, this document specifies the use of ECN for the SYN/AC...
In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...
Multi-packet detection approaches handle packet collisions and errors by forcing packet retransmission and by processing the resulting signals. NDMA (Network Diversity Multiple Access) detection approach forces Q retransmissions by all stations when Q stations transmit in one collision slot. Previous work assumed that perfect power control is used, where the average reception power is equal for...
usually in the form of parallel processing with parallel multi-processor systems are designed .for this reason irregular flow may occur with packages. when you're tired and it all comes out in his np (network processors) system, reset depending on network performance is negatively affected and we delayed to do this, the design of processors working in parallel packet transmission by avoid...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید