The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Queue management in Named Data Networks (NDN) has gained a lot of attention recently. Unlike the traditional IP architecture, the transport mechanism in NDN is intricate and comprises of in-network caching of data packets at routers. Hence, the most effective avoidance of congestion can occur at the routers itself. In this paper, we make two contributions: first, we propose a back pressure based congestion...
Slow Start algorithm helps the TCP flows to quickly ramp up their congestion window (cwnd) by employing an exponential increase pattern. This pattern of increasing cwnd leads to consecutive loss of packets in bulk, and hence, results in large number of packets being re-transmitted. Recently, the limitations of this approach have become apparent as many Internet applications are becoming more sensitive...
Active Queue Management (AQM) mechanisms have come a long way, with an initial goal to avoid congestion to the recent most focus on reducing queue delay. The benefits of using AQM mechanisms at routers are being thoroughly studied nowadays, mainly to avoid the problem of bufferblaat. Although a lot of work has focused on analyzing the behavior of AQM mechanisms, the nature of traffic used while deriving...
Ensuring security in routing protocols designed for Internet of Things (IoT) is more challenging owing to the fact that devices are resource constrained. The need for lightweight security mechanisms is apparent because cryptography based mechanisms have intense computation requirements. Although Routing Protocol for Low power and lossy networks (RPL) inherently comprises a few security mechanisms,...
Routing Protocol for Low power and lossy networks (RPL) is a proactive algorithm for Low-power and Lossy Networks (LLNs). Recent growth in Internet of Things (IoT) applications has made proactive handling of mobility apparent. While RPL does not tackle mobility, mRPL addresses it by adopting a proactive Hand-Off strategy. Since this strategy follows a greedy approach to select the next hop, a best...
Wireless networks have evolved considerably in the last decade and the world has seen an exponential increase in the number of mobile device users. The performance of the wireless networks has become a critical factor and researchers nowadays are trying to bring out even the slightest increase in network performance wherever possible. TCP, which is the most dominant transport protocol of the Internet,...
The future of communication resides in Internet of Things, which is certainly the most sought after technology today. The applications of IoT are diverse, and range from ordinary voice recognition to critical space programmes. Recently, a lot of efforts have been made to design operating systems for IoT devices because neither traditional Windows/Unix, nor the existing Real Time Operating Systems...
Data Center Networks (DCNs) today are used to compute and store the data of multiple users because of low cost, flexibility and availability. In this multi-tenant cloud environment, resources are shared among different users. Suppose two users fetch data at same time from the same DCNs, one fetches small amount of data (like web search) while another user fetches larger amount of data (like software...
The next generation Internet supports dynamic deployment of different protocols and heterogeneous applications. To support this, routers in next generation computer networks use general purpose programmable packet processors. The customization of routers introduces increased vulnerabilities and attacks that allow potential attackers to compromise the router. Since network routers play a key role in...
Today, usage of internet is growing exponentially. Congestion detection and avoidance algorithms are the major issues in TCP/IP. Earlier, packet drops are only source of congestion indication, but it leads to loss of throughput. Active Queue Management (AQM) can detect congestion before the queue overflows and informs the end hosts to respond congestion. It allows gateways to drop packets when average...
Internet is the major source of information today and its usage is increasing at an alarming rate. A wide variety of data travels over the Internet to cater the needs of end users. This has eventually led to heavy congestion in the network which in turn, worsens the user perceived latency. Internet routers are the main agents that detect congestion prior to end hosts. Traditional router incorporates...
CUBIC TCP, a variant of the traditional TCP, is the default congestion control algorithm deployed in Linux kernels above 2.6 version. CUBIC is mainly designed for high speed, long distance wired networks and several studies have exhibited that it indeed, enriches the performance of such networks. Recently, hand-held devices such as smart phones have grown very popular and there has been a lot of interest...
The availability of cheaper and high capacity Random Access Memory (RAM) has resulted in the growth of buffer size in all the computing devices. This aberrant increase of buffer capacity in network devices has resulted into high latency, leading to reduced throughput; thus decreasing the tendency of absorbing spontaneous burst of traffic. The requirement for Active Queue Management (AQM) has been...
Internet in the present scenario has become a gigantic source of information. There has been a tremendous rise in the variety of Internet applications with each application demanding a specific performance criteria to be satisfied. Routers presently use Passive Queue Management (PQM) mechanisms and hence, merely have any control over the queue occupancy. Therefore, there has been an increased interest...
Internet in the present scenario has become a gigantic source of information. There has been a tremendous rise in the variety of Internet applications, with each application demanding a specific performance criteria to be satisfied. Routers presently use Passive Queue Management (PQM) mechanisms and hence, merely have any control over the queue occupancy. Therefore, there has been an increased interest...
Transmission Control Protocol (TCP) has been the workhorse of the Internet ever since its inception. The success of the Internet, infact, can be partly attributed to the congestion control mechanisms implemented in TCP. Though the scale of the Internet and its usage increased exponentially in recent past, TCP has evolved to keep up with the changing network conditions and has proven to be scalable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.