This website uses cookies to ensure you have the best experience. Learn more

Computer Networks Essay

991 words - 4 pages

Computer networks like internet necessitate network resources, i.e. bandwidth, buffer spaces, etc in order to accommodate the arriving packets at router buffers [25]. When the arriving packets cannot be accommodated due to lack of network resources, this indicates occurring congestion at router buffers of networks [21]. Congestion can deteriorate a network performance [22, 25] through growing the packet loss probability due to overflow as well as the mean waiting time for packets in the queueing network. In addition, congestion may reduce the throughput and increase the packet dropping probability precedes the router buffers have overflowed. Congestion can also generate unmaintained average ...view middle of the document...

Therefore, every arriving packet will lose. 2) At a particular time, the RED’s congestion measure ( ) value may be below the value of minimum threshold position at the router buffer ( ). This indicates no packet can be dropped. However, for a short time the arrival rate increases and making the router buffer overflowing. Nonetheless, the value increases but still smaller than the value of . This also makes no dropping for packets even the router buffer is overflowing. 3) RED is greatly reliance upon setting of its parameters ( , the maximum position at the router buffer ( ), queue weight ( ), maximum value of packet dropping probability ( )) [14] in order to obtain a satisfactory performance [9, 15].
To deal with the above RED’s problem, GRED was proposed as a variant of RED, in which GRED enhances the way of tuning some of RED’s parameters such as and [16]. Moreover, GRED maintains the value at a level on a router buffer which is between the and positions, this level is named [16]. Maintaining value at level avoids increasing the router buffer size to be above the position, and therefore smaller number of packets is dropped.
Some researchers have proposed fuzzy logic controller (FLC) mechanisms in order to use them as congestion control approaches [10, 11, 12, 17, 27]. A reason for developing these FLC mechanisms is the difficult of developing new AQM mechanisms [20, 27]. [27] proposed a FLC mechanism aims to enhance the BLUE method’s performance [13]. Two input linguistic variables (current queue length and packet loss rate) were utilised to evaluate a single output linguistic variable (packet dropping probability). The performance measure results with reference to queue length, throughput and packet loss rate of the FLC mechanism in [27] were provided better than those of BLUE method. [10, 11, 12, 17] proposed a FLC mechanism based on RED method which applied in TCP/IP differentiated service networks. In [10, 11, 12, 17], different classes of...

Other Essays Like Computer Networks

Wide Area Networks Essay

1741 words - 7 pages luxuries and is a bit more understanding of what the benefits and the operations of these functions can bring us. With these technologies introduced wide area networks are just another development to help influence the computer age into a bright, and much larger future. References Duley, CJ. WAN (2000) http://www.btinternet.com/~C.J.Duley/WAN.htm O’Brien, James A. (2004) Management Information Systems: Managing information

NT1310 unit 5 lab 1 Essay

1026 words - 5 pages . Cables need to be run from computer to computer and switch to switch. Process can be time consuming. Loose cables likely remain the single most common and annoying source of failure in a wired network.” (PACE University, n.d.) While a wireless network is a very useful and convenient networking device, however these types of networks a lot less secure and transmission speeds can suffer from outside interference. Although wireless networking is

Computer Virus

1196 words - 5 pages . How does Viruses Enter in our Computer ? The main path which provides the virus to enter inside the computer is the Internet. The virus enters the computer by sharing networks also. Inserting the Floppyies ,pen drivers, or CD which consist of virus. By playing online games. Watching online movies , plays. Using any online website or conversation. By downloading the online and free softwares. Using artificial windows . Using the

Botnet Zombies

644 words - 3 pages Botnets are computer programs that are designed to take control of your computer without your knowledge. They are designed to infect computers and allow hackers to remotely control your computer via an Internet connection. Most users are unaware their computer has been hijacked because little evidence can be found that the computer is not working as expected. Once a computer has been compromised it is sometimes referred to as a bot or zombie

Data Transmission and Networking

892 words - 4 pages form networks • If the distances are short the network is called a LAN, if longer the network is a WAN • Networks allow computers to communicate • Networks allow the sharing of both hardware and software. 1.5 (b) Hardware and Software Network Basics. In order to connect computers in a network there ar e a number of essential things necessary • Each computer needs to be able to communicate with others. In order to do this

Raven Williams-1230

1110 words - 5 pages protocols. 4. What are the four different types of networks and what are the key characteristics of each? LAN -: LOCAL AREA NETWORKS WAN -: WIRELESS AREA NETWORKS MAN -: METROPOLITAN AREA NETWORK CAN -: CAMPUS AREA NETWORK 1.Local Area Network (LAN) A local area network (LAN) is a computer network that interconnects computers in a limited area such as a home, school, computer laboratory, or office building using network media. The

Introduction to Business

357 words - 2 pages Software helps companies IT departments manage the computer on there networks by providing them with there award winning software solutions.In all presentation there are large markets for the companies. With Fedelity there is a huge market for retirement, payroll services, 40k plans, and consulting services to corporations. Because of the large market Fedelity became one of the world's largest providers of financial services, and manages assets of

Is589 Chapter 1: Questions 7, 14, and 17

584 words - 3 pages technical standards-setting organization of the United Nations International Telecommunications Union, which is also based in Geneva (see www.itu.int). ITU is composed of representatives from about 200 member countries. Membership was originally focused on just the public telephone companies in each country, but a major reorganization in 1993 changed this, and ITU now seeks members among public- and private-sector organizations who operate computer or communications networks (e.g., RBOCs) or build software and equipment for them (e.g., AT&T).

Mobile Data Terminal

542 words - 3 pages , addresses, phone numbers and building information to the firefighters on scene. For now, most public safety agencies including the fire service uses slower speed networks which were built by the agency, higher speed cellular data networks, or self-built Wi-Fi networks for computer to computer or computer to base networks. For cellular data networks some of the major vendors for these devices are Sprint/Nextel, AT&T, Verizon, and T-Mobile

Wertewrterterw

775 words - 4 pages R. wide area network S. local area network T. dual-boot Answer: D Reference: Objective 4: Identify Types of Software and Their Uses Difficulty: Challenging Connecting one computer to another creates a(n): U. network. V. control unit. W. sector. X. track. Answer: A Reference: Objective 5: Describe Networks and Define Network Terms Difficulty: Easy The utility called __________, located in the

Digital Crimes

1272 words - 6 pages the greatest threat to information security for small businesses is their employees. As McCollum noted, "a company's employees typically have access to its personal computers and computer networks, and often they know precisely what business information is valuable and where to find it." The reasons for these betrayals are many, ranging from workplace dissatisfaction to financial or family difficulties. Computer crimes perpetrated by outsiders

Related Papers

Computer Network Essay

642 words - 3 pages COMPUTER NETWORK A computer network, often simply referred to as a network, is a collection of computers and devices interconnected by communications channels that facilitate communications and allows sharing of resources and information among interconnected devices. Computer networking or Data communications (Datacom) is the engineering discipline concerned with the computer networks. Computer networking is sometimes considered a sub

Speech Social Media

881 words - 4 pages General Purpose: To inform Specific Purpose: My audience will learn the importance of social networking in today’s computer-centric world, from its history to the many uses it provides. Thesis Statement: Today, I would like to tell you about three aspects of social networks: first, the history of social networks: second, the uses of social networking services: and finally, how social networks have influenced our lives. Social Networking

The Career I Chose To Be My Life

796 words - 4 pages Network and Computer Systems Administrators were averaging $72.560 dollars a year and $34.55 an hour said the Bureau of Labor Statistics, (2014). I really like this career because on the present day computer networks are some of the strongest links on every company and the computer system administrators are responsible for the day to day operation of these networks. “In some cases, administrators help network architects design and analyze

Bus 210 Week 8 Checkpoint Hardware Software Components

604 words - 3 pages major component of today’s computer networks, including the Internet. One form of software facilitates communication between computer systems, while another type of networking software provides users access to shared programs. | Computer security software | Computer security software is a program that can be installed on a computer to prevent a virus attack. When kept updated, it protects against a wide variety of potential risks, including