Enhancing TCP Performance Over Wireless Networks Using TCP-LBA Techniques
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 4
Abstract
There are many researches in the Networking especially in TCP protocols; when you move on wireless networks then many techniques improve the performances of this TCP protocol. To managing the TCP connection is also a very big challenge so in this paper we try to improve the performance of the wireless networks we use an TCP-LBA (Transmission Control Protocol Loss based Acknowledgment) technique for handling the unwanted losses in the wireless networks and to maintain the connectivity in between each node and router. The main drawback of the other approaches that uses TCP that when any losses occurred during transmissions it assumed that this was occurred due to congestion or retransmit timeout. This paper uses the TCP-LBA technique for avoiding such levels by addresses the unwanted reduce ACK packets number and optimize ACK mechanism in TCP [1].
Authors and Affiliations
Savreet Kaur Brar , Sandeep Singh Kang
Study of Routing Protocols in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are rapidly evolving as an important area of mobility. MANETs are infrastructure less autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless...
A Comparative study Between Fuzzy Clustering Algorithm and Hard Clustering Algorithm
Data clustering is an important area of data mining. This is an unsupervised study where data of similar types are put into one cluster while data of another types are put into different cluster. Fuzzy C means is a very...
An Adaptive Log Based Realtime Network Scans in LAN
Network scans really are a common initial step within a network intrusion attempt. As a way to gain details about a possible network intrusion, it can be beneficial to analyze these network scans. Scanning activity is na...
OSI Reference Model: An Overview
A reference model is a conceptual blueprint of how communication should take place. It addresses all the process required for effective communication and divides these processes into logical grouping called layers. When...
Security Strategies for Online Social Networks
In this decade online social networks (OSNs) have marvelous enlargement per hundred of millions of users on the internet. The internet users are more good-looking about OSNs for information sharing and social interaction...