Throughput Analysis of TCP Newreno for Multiple Bottlenecks
Journal Title: International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC) - Year 2017, Vol 7, Issue 3
Abstract
A very complex problem in the network is –congestion control. It is one of the major problems among top listed network problems. A lot of important data might be àt loss, as a result, resources become wasted. Many TCP models have proposed to protect the loss during data transfer. They differ from each other on the basis of algorithm for congestion control and segment loss recovery technique. TCP NewReno is one of them that we have proposed in our paper, and it is also an analytical model for the throughput of TCP NewReno. This performance is given for multiple bottlenecks -a queue management mechanism. In our paper, we show that increased throughput of TCP New Reno over Reno and how NewReno suffers from less packet loss rate than the Reno model, by using the NS-2 simulator
Authors and Affiliations
MOHIBUR RAHMAN, LUTFUN NAHAR, ZINNIA SULTANA, RASHEDUL ISLAM
IMPROVED REPOSITION CLUSTER HEAD IN LEACH PROTOCOL FOR HETEROGENEOUS WIRELESS NETWORK
With the fast improvement in wireless technologies, amenities and devices, used in a distinct radio system, in which second generation (2G) and third-generation (3G) wireless scheme may be not effective to transmit data...
The Optimal Carpool Planning Based on IOS Platform
The rapid development of technology has aggravated global warming and air pollution, particularly in metropolises, with high population density. Urban overpopulation has also caused serious traffic problems. The area aro...
STUDY OF THE OCDMA TRANSMISSION CHARACTERISTICS USING BIDIRECTIONAL OPTICAL FIBER LINK, BASED ON EDW CODE
Discussion on free space optics as a link was done by numerous studies by using EDW code. In this paper, we discuss the bidirectional fiber as a connecting media channels. This unit was tested by using the Enhanced Doubl...
Performance Analysis of Select Forwarding Attack on WSN and its Detection and Removal from Network
Wireless Sensor Networks is quite vulnerable to many security compromising attacks as wormhole attack, message replay or tampering, identity spoofing, black hole attack, eavesdropping, and so on. One of the impacts of se...
Enhanced Identity-Based Signcryption System
A combination of encryption and signature is a cryptosystem called traditional signcryption, wherein sender authentication is considered a key task to be verified by third party or judge. Without the knowledge of the sen...