Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Recovery of loss of packet in network using constant packet reordering

View through CrossRef
When the packet is reordered the most standard implementation of the Transmission control protocol (TCP) gives poor performance. This paper proposes a new version of the TCP which gives the high throughput when the packet reordering occurs and in another case if the packet reordering is not occurs then in that case also it is friendly to other version of the TCP. Transmission control protocol constant Packet Reordering (TCP-CPR) does not depend or rely on the duplicate acknowledgement to detect the packet loss. Instead the timer is used to maintain how long packet is transmitted. In this case timer is used to keep the track how long packets are transmitted. If acknowledgement are not received within the appropriate time then packet assume to loss because of the TCP-CPR does not depend on the duplicate acknowledgement. Packet reordering has does not effect on the performance of TCP-CPR. Through the performance of the TCP-CPR consistently better than existing mechanism that make the try to make the TCP more robust to packet reordering. In case where packets are not reordered, it’s verified that TCP-CPR maintains the same throughput as the typical implementation of TCP.
Title: Recovery of loss of packet in network using constant packet reordering
Description:
When the packet is reordered the most standard implementation of the Transmission control protocol (TCP) gives poor performance.
This paper proposes a new version of the TCP which gives the high throughput when the packet reordering occurs and in another case if the packet reordering is not occurs then in that case also it is friendly to other version of the TCP.
Transmission control protocol constant Packet Reordering (TCP-CPR) does not depend or rely on the duplicate acknowledgement to detect the packet loss.
Instead the timer is used to maintain how long packet is transmitted.
In this case timer is used to keep the track how long packets are transmitted.
If acknowledgement are not received within the appropriate time then packet assume to loss because of the TCP-CPR does not depend on the duplicate acknowledgement.
Packet reordering has does not effect on the performance of TCP-CPR.
Through the performance of the TCP-CPR consistently better than existing mechanism that make the try to make the TCP more robust to packet reordering.
In case where packets are not reordered, it’s verified that TCP-CPR maintains the same throughput as the typical implementation of TCP.

Related Results

Current therapeutic strategies for erectile function recovery after radical prostatectomy – literature review and meta-analysis
Current therapeutic strategies for erectile function recovery after radical prostatectomy – literature review and meta-analysis
Radical prostatectomy is the most commonly performed treatment option for localised prostate cancer. In the last decades the surgical technique has been improved and modified in or...
Enhanced Fast Rerouting Mechanisms for Protected Traffic in MPLS Networks
Enhanced Fast Rerouting Mechanisms for Protected Traffic in MPLS Networks
Multiprotocol Label Switching (MPLS) fuses the intelligence of routing with the performance of switching and provides significant benefits to networks with a pure IP architecture a...
Experimental Insights into the Performance of LoRa/LoRaWAN Radio Interface in Smart City Deployments
Experimental Insights into the Performance of LoRa/LoRaWAN Radio Interface in Smart City Deployments
IoT ecosystem extends beyond country borders and application domains, combining thousands of versatile devices that differ in terms of their structures, capabilities, and available...
The Implication of Different Transmission Protocols for Vehicular Networks using NS-2
The Implication of Different Transmission Protocols for Vehicular Networks using NS-2
A vehicular network, categorized as an ad-hoc network, operates without fixed base station infrastructure or centralized management. In this setup, each network entity can serve as...
Wave packet dynamics of the photodetachment ofH- near a metal surface
Wave packet dynamics of the photodetachment ofH- near a metal surface
The wave packet dynamics of the photodetachment of H- near metal surface is studied by using the wave packet evolution and the autocorrelation function. The results show that the e...
Active Versus Passive Recovery During High Intensity Intermittent Treadmill Running in Collegiate Sprinters
Active Versus Passive Recovery During High Intensity Intermittent Treadmill Running in Collegiate Sprinters
Most studies on manipulating recovery variables during interval exercise have focused primarily on aerobic training and performances. It was the purpose of this study to investigat...
SIPAV-SDN: Source Internet Protocol Address Validation for Software Defined Network
SIPAV-SDN: Source Internet Protocol Address Validation for Software Defined Network
SDN technology is becoming every day more popular and big data centers and organizational networks have started deploying for its advantages. Current development of SDN network rel...
Random Segmentation: New Traffic Obfuscation against Packet-Size-Based Side-Channel Attacks
Random Segmentation: New Traffic Obfuscation against Packet-Size-Based Side-Channel Attacks
Despite encryption, the packet size is still visible, enabling observers to infer private information in the Internet of Things (IoT) environment (e.g., IoT device identification)....

Back to Top