Balanced window size Allocation Mechanism for Congestion control of Transmission Control Protocol based on improved bandwidth Estimation.
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 4
Abstract
TCP is the widely used protocol for its reliable data communication over the network. Though it is used for enabling communication over the large network, it has some incapability in handling continues data transmission with reduced congestion over the internet. One of the most problems of TCP is fixing window size that turned to have a balanced allocation of buffer in accordance to handling congestion and traffic in a network. In this paper we present a framework for TCP congestion, called “Delay and Bandwidth based estimation”, which defines an exact window size that to be assigned to have balanced configuration of bandwidth with respect to delay. It tries to find out the round-trip-time to decide to fix window size by increasing or decreasing the boundaries of a buffer. Firstly we have discussed overview of TCP and its AQM. Then steady state of the window size is investigated via normalizing bandwidth factor. Finally simulation is conducted to compare with traditional TCP-Vegas under different network environments
Authors and Affiliations
Dusmant Kumar Sahu1 , S. LaKshmiNarasimman , G. Michale
Design Of ARM Based Face Recognition System using Open CV Library
Face Recognition is a very active research area specializing on how to recognize faces within images or videos. Face recognition compliments Face Detection. Face Detection is the process of finding a 'face' within...
Fuzzy logic Controller for Flowing Fluids
Flow measurement and control are essential in plant process control. The aim of this paper is to do the comparative study of Fuzzy Logic controller and conventional PID controller for flowing fluids.These two contr...
Design of Robotics Technology for Application in the Electrical field with narrow and hazardous space
Robotics is the branch of technology that deals with the design, construction, operation and application of robots [1] and computer systems for their control, sensory feedback, and information processing. These...
Secure Re-encryption in Unreliable Cloud using Synchronous clock
In this Paper With rapid development of cloud computing, more and more enterprises will outsource their sensitive data for sharing in a cloud. To keep the shared data confidential against untrusted cloud service provi...
ASHA: AGENT BASED SECURE HOST ARP CACHE MANAGEMENT
Host systems are exchange their IP-MAC pairs to establish communication. ARP (address resolution protocol) is maintains the IP-MAC pair of address of host in the cache table when the messages are receiving and send...