To see the other types of publications on this topic, follow the link: Packets loss.

Journal articles on the topic 'Packets loss'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Packets loss.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

MS., POONAM SHINDE, and MR. V. M. SARDAR PROF. "DATA LOSS PREVENTION IN CONGESTION PRONE WIRELESS SENSOR NETWORK USING VCLR MODEL." JournalNX - a Multidisciplinary Peer Reviewed Journal 3, no. 9 (2017): 52–55. https://doi.org/10.5281/zenodo.1420616.

Full text
Abstract:
In WSN source node generate an event within the cluster at that time this collected information forward towards sink node through cluster head node. Cluster head acts as intermediate node between sink node and source node. The congestion may occur at the cluster head and this prompts to data loss also affect the reliability of the network. In existing system cluster head only performs normal data packet transmission from source node to sink. Due to insufficient buffer size at cluster head node there is more packets drop during the transmission of packets. So, this system gives lower packet del
APA, Harvard, Vancouver, ISO, and other styles
2

Karamat Khan, Tehmina, Zulkefli Bin Muhammad Yusof, and Asadullah Shah. "Performance Evaluation of Distributed Multi Media Wireless Sensor Network." International Journal of Engineering & Technology 7, no. 4.15 (2018): 318. http://dx.doi.org/10.14419/ijet.v7i4.15.23020.

Full text
Abstract:
The demand for multimedia services i.e. audio, video and data with improve QoS and optimum utilization of resources in WSN’s has posed new challenges. As the intensity of traffic increases; it demands for higher bandwidth and dedicated resources to reduce packet loss and delay. There have been analytical models proposed where priorities were assigned to video and voice packets to reduce packet loss and optimize resource utilization. In this paper distributed scheme is proposed to handle video, voice and data packets by having multiple sink nodes. There are shared sink nodes where video, voice
APA, Harvard, Vancouver, ISO, and other styles
3

Hamatta, Hatem S. A., Abdul Basit, K. A. Sharada, et al. "Relay Node-Based Routing Algorithm for Reducing Latency in Industrial Mobile Communication Network." Wireless Communications and Mobile Computing 2023 (June 20, 2023): 1–10. http://dx.doi.org/10.1155/2023/7297208.

Full text
Abstract:
Mobile network nodes perform time transfer during data packet performance in an asynchronous manner. Network nodes get packets for transmission from node sensors that reject the demands of node attackers. When packet loss occurs unexpectedly due to a network removal, it is exceedingly difficult to detect assaults and time forwarding. Attack detection accuracy deteriorates, and packet loss rates rise. A strategy for node mobile intermediate that gets over attacks that identify the forward choosing is provided for improved data forwarding. Network performance is completely damaged by specific at
APA, Harvard, Vancouver, ISO, and other styles
4

Volochiy, B., A. Kushyk, Yu Salnyk, V. Onyshchenko, and P. Каzаn. "Method of increasing the efficiency of the switch node of the information communication network for special purpose in the conditions of combat use." Military Technical Collection, no. 26 (June 23, 2022): 3–12. http://dx.doi.org/10.33577/2312-4458.26.2022.3-12.

Full text
Abstract:
The peculiarity of the special purpose communication information network is that its functioning is influenced by the tactical situation. In particular, it determines the intensity of the flow of packets with information about the enemy's moving objects from reconnaissance and signaling complexes to the switching node, and from it to the control point and means of destruction, depending on the probable nature of enemy action. In combat applications, the information network operates simultaneously with fast and slow packet flows.
 At the same time, the packet delay in the switching node sh
APA, Harvard, Vancouver, ISO, and other styles
5

Şensoy, Murat, Burcu Yılmaz, and Erdoğan Yılmaz. "An Intelligent Packet Loss Control Heuristic for Connectionless Real-Time Voice Communication." Mathematical Problems in Engineering 2010 (2010): 1–9. http://dx.doi.org/10.1155/2010/984923.

Full text
Abstract:
Time critical nature of the real-time communication usually makes connection-oriented protocols such as TCP useless, because retransmission of old and probably expired packets is not desired. However, connectionless protocols such as UDP do not provide such packet loss control and suitable for real-time communication such as voice or video communication. In this paper, we present an adaptive approach for the intelligent packet loss control for connectionless real-time voice communication. Instead of detecting and resending lost voice packets, this heuristic estimates the packet loss rate adapt
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Shuhe, Rui Han, and Xu Wang. "A Coloring-Based Packet Loss Rate Measurement Scheme on Network Nodes." Electronics 13, no. 23 (2024): 4692. http://dx.doi.org/10.3390/electronics13234692.

Full text
Abstract:
Network measurement is an efficient way to understand network behavior. Traditional measurement techniques focus on internet protocol (IP) networks, where the processing capacity of network nodes is limited and primarily dedicated to packet forwarding. As a result, these techniques typically rely on end hosts or external systems to analyze traffic and evaluate network performance. This reliance introduces several challenges, such as increased measurement latency and scalability limitations, particularly in large-scale networks. With the emergence of next-generation internet architectures, espe
APA, Harvard, Vancouver, ISO, and other styles
7

Zhou, Kaijie, and Navid Nikaein. "Random access with adaptive packet aggregation in LTE/LTE-A." EURASIP Journal on Wireless Communications and Networking 2016, no. 1 (2016): 36. https://doi.org/10.1186/s13638-016-0531-6.

Full text
Abstract:
While random access presents a promising solution for efficient uplink channel access, the preamble collision rate can significantly increase when massive number of devices simultaneously access the channel. To address this issue and improve the reliability of the random access, an adaptive packet aggregation method is proposed. With the proposed method, a device does not trigger a random access for every single packet. Instead, it starts a random access when the number of aggregated packets reaches a given threshold. This method reduces the packet collision rate at the expense of an extra lat
APA, Harvard, Vancouver, ISO, and other styles
8

Chih-Heng Ke, Chih-Heng Ke, Yu-Wen Lo Chih-Heng Ke, Yeong-Sheng Chen Yu-Wen Lo, and Hung-Pai Chen Yeong-Sheng Chen. "An Enhanced Explicit Port Forwarding Solution for Improving Video Delivery over Software-Defined Networks." 網際網路技術學刊 24, no. 2 (2023): 313–21. http://dx.doi.org/10.53106/160792642023032402010.

Full text
Abstract:
<p>In order to improve video delivery, an Enhanced Explicit Port Forwarding (EEPF) solution is proposed. Data are divided into ordinary packets and video packets using a packet identification mechanism. Traditional mechanisms transmit packets through routing table lookup. As the size of the routing table often becomes excessively large, this lookup can be time-consuming. While the EEPF solution directly includes the transmission path in the video packet, which can reduce the transmission time. And by setting header flags/fields in video packets, the transmission can be further optimized.
APA, Harvard, Vancouver, ISO, and other styles
9

Shaldit Sheni, J., K. Jayashree, and B. Fowzia Sihana. "Malicious Packet Loss Identification in Disruption Tolerant Network." Asian Journal of Computer Science and Technology 3, no. 1 (2014): 36–40. http://dx.doi.org/10.51983/ajcst-2014.3.1.1727.

Full text
Abstract:
In recent days network is suffering serious problems with the packet loss. Dropping of received packets, even it has adequate buffers is very common in Disruption Tolerant Network. The DTN node facilitates communication between mobile nodes. Sometimes the mobile node selects the DTN with lowest reputation that affects packet delivery ratio. If there is a malicious node in the route, the data packet does not reach its destination. Repeatedly the misbehaving nodes may forge some records to avoid being spotted. To solve these issues we propose a scheme to limit the packet rolling in the direction
APA, Harvard, Vancouver, ISO, and other styles
10

Chandran, Priya, and Chelpa Lingam. "A Statistical Approach to Adaptive Playout Scheduling in Voice Over Internet Protocol Communication." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 2926. http://dx.doi.org/10.11591/ijece.v8i5.pp2926-2933.

Full text
Abstract:
Factors like network delay, latency and bandwidth significantly affect the quality of communication using Voice over Internet Protocol. The use of jitter buffer at the receiving end compensates the effect of varying network delay up to some extent. But the extra buffer delay given for each packet plays a major role in playing late packets and thereby improving voice quality. As the buffer delay increases packet loss rate decreases, which in general is a very good sign. However, an increase of buffer delay beyond a certain limit affects the interactive quality of voice communication. In this pa
APA, Harvard, Vancouver, ISO, and other styles
11

Priya, Chandran, and Lingam Chelpa. "A Statistical Approach to Adaptive Playout Scheduling in Voice Over Internet Protocol Communication." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 2926–33. https://doi.org/10.11591/ijece.v8i5.pp2926-2933.

Full text
Abstract:
Factors like network delay, latency and bandwidth significantly affect the quality of communication using Voice over Internet Protocol. The use of jitter buffer at the receiving end compensates the effect of varying network delay up to some extent. But the extra buffer delay given for each packet plays a major role in playing late packets and thereby improving voice quality. As the buffer delay increases packet loss rate decreases, which in general is a very good sign. However, an increase of buffer delay beyond a certain limit affects the interactive quality of voice communication. In this pa
APA, Harvard, Vancouver, ISO, and other styles
12

Lee, Woonghee, Joon Yeop Lee, Hyeontae Joo, and Hwangnam Kim. "An MPTCP-Based Transmission Scheme for Improving the Control Stability of Unmanned Aerial Vehicles." Sensors 21, no. 8 (2021): 2791. http://dx.doi.org/10.3390/s21082791.

Full text
Abstract:
Recently, unmanned aerial vehicles (UAVs) have been applied to various applications. In order to perform repetitive and accurate tasks with a UAV, it is more efficient for the operator to perform the tasks through an integrated management program rather than controlling the UAVs one by one through a controller. In this environment, control packets must be reliably delivered to the UAV to perform missions stably. However, wireless communication is at risk of packet loss or packet delay. Typical network communications can respond to situations in which packets are lost by retransmitting lost pac
APA, Harvard, Vancouver, ISO, and other styles
13

Cheng, Irene, Lihang Ying, and Anup Basu. "Packet-Loss Modeling for Perceptually Optimized 3D Transmission." Advances in Multimedia 2007 (2007): 1–10. http://dx.doi.org/10.1155/2007/95218.

Full text
Abstract:
Transmissions over unreliable networks, for example, wireless, can lead to packet loss. An area that has received limited research attention is how to tailor multimedia information taking into account the way packets are lost. We provide a brief overview of our research on designing a 3D perceptual quality metric integrating two important factors, resolution of texture and resolution of mesh, which control transmission bandwidth, followed by a suggestion on alternative strategies for packet 3D transmission of both texture and mesh. These strategies are then compared with respect to preserving
APA, Harvard, Vancouver, ISO, and other styles
14

MS., VRUSHALI MORE, and SHAJID SHAIKH DR. "PACKET LOSS CONCEALMENT USING WSOLA & GWSOLA TECHNIQUES." JournalNX - A Multidisciplinary Peer Reviewed Journal 3, no. 4 (2017): 4–8. https://doi.org/10.5281/zenodo.1452079.

Full text
Abstract:
In this paper, concealment algorithms to reconstruct lost voice packets are discussed. The algorithms are receiver based and its functionality is based on Time Scale Modifications of speech and autocorrelation of a speech signal. The proposed WSOLA algorithm is time domain approach of time scale modification and is used for many applications. Audio signal packet loss concealment is an important application of WSOLA algorithm. WSOLA algorithm extends the packets before the missing packet to conceal the lost packet. Gain controlled Waveform Similarity Overlap and Add (GWSOLA) algorithm is the mo
APA, Harvard, Vancouver, ISO, and other styles
15

Bharti, Rajendra Kumar, V. Bhoopathy, Parul Bhanarkar, et al. "Routing Path Selection and Data Transmission in Industry-Based Mobile Communications Using Optimization Technique." Wireless Communications and Mobile Computing 2022 (July 21, 2022): 1–9. http://dx.doi.org/10.1155/2022/5431413.

Full text
Abstract:
In a mobile network, nodes are share data packets; sometimes, that packets are totally flooding. The packet dropping node does not easily detect for routing time instance. The node trust level is minimum causing the packet loss; it affects the entire network performance, and it reduces throughput and increases communication overhead. Proposed exhaustive routing path allocation (ERP) technique is applied to select the legitimate node for broadcasting the data packets completely. The attacker nodes of that flooding packets are detected by using the legitimate detector which are present in networ
APA, Harvard, Vancouver, ISO, and other styles
16

ARAI, MASAYUKI, SATOSHI FUKUMOTO, and KAZUHIKO IWASAKI. "A NOTE ON RELIABLE MULTICAST APPLYING CONVOLUTIONAL-CODE-BASED FEC OVER FINITE FIELD." International Journal of Reliability, Quality and Safety Engineering 12, no. 03 (2005): 203–12. http://dx.doi.org/10.1142/s0218539305001781.

Full text
Abstract:
We apply (n, k, m) convolutional codes in which elements in generator matrices are the ones over a finite field to Hybrid ARQ combining with retransmission mechanisms, and evaluate the number of transmitted packets and the number of transmissions. We assume star topology and independent model for a transmission model, and compare two retransmission strategies: (1) one which has been applied with Reed-Solomon (RS) code, and (2) one which choose transmitted packets considering the constraint length m. We use computer simulation for (14, 7, m) and (6, 3, m) convolutional codes to observe the effe
APA, Harvard, Vancouver, ISO, and other styles
17

Ávalos-Arce, Mariana, Heráclito Pérez-Díaz, Carolina Del-Valle-Soto, and Ramon A. Briseño. "Uncovering the Limitations and Insights of Packet Status Prediction Models in IEEE 802.15.4-Based Wireless Networks and Insights from Data Science." Informatics 11, no. 1 (2024): 7. http://dx.doi.org/10.3390/informatics11010007.

Full text
Abstract:
Wireless networks play a pivotal role in various domains, including industrial automation, autonomous vehicles, robotics, and mobile sensor networks. This research investigates the critical issue of packet loss in modern wireless networks and aims to identify the conditions within a network’s environment that lead to such losses. We propose a packet status prediction model for data packets that travel through a wireless network based on the IEEE 802.15.4 standard and are exposed to five different types of interference in a controlled experimentation environment. The proposed model focuses on t
APA, Harvard, Vancouver, ISO, and other styles
18

Hemalatha, S., Harikumar Pallathadka, Rajesh P. Chinhewadi, D. Kalaiyarasi, and M. Suresh Thangakrishnan. "Intelligent Buffer Management Algorithm to Prevent Packet loss in Mobile Adhoc Network." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 325–28. http://dx.doi.org/10.17762/ijritcc.v11i8s.7212.

Full text
Abstract:
In a mobile ad hoc network, which is self-organized and operates without any fundamental infrastructure, packet transmission from the source node to the destination node is completed after sending the route request and route reply. A reliable path is then selected depending on the protocol choice. Data that the sender intends to deliver is broken up into packets and given sequence numbers before being transmitted over the channel. With the aid of an internal buffer that helps to receive packets and forward them to the next destination, each and every packet travels along the allotted path unti
APA, Harvard, Vancouver, ISO, and other styles
19

Zou, Kun, and Yao Shen. "Optimal Scheduling Algorithm of Wireless Communication Packets Based on Knapsack Theory." Mobile Information Systems 2022 (June 7, 2022): 1–9. http://dx.doi.org/10.1155/2022/6990375.

Full text
Abstract:
Due to the instability of the wireless channel, data packet loss occurs during wireless communication information transmission. Wireless communication can effectively improve transmission efficiency, study the optimal transmission method of wireless communication data packets, improve the information transmission efficiency and quality of wireless communication, and realize the optimal transmission of wireless communication data packets in order to ensure the reliable transmission of data. It is crucial for increasing wireless communication quality. Natural scheduling and priority scheduling a
APA, Harvard, Vancouver, ISO, and other styles
20

Chen, Li Shui, Gui Zhong Liu, Jun Fang Wang, Qin Li Wang, and Hai Dong Wang. "A Novel Priority Based Packet Scheduling Scheme for Video Streaming over WiMAX Networks." Applied Mechanics and Materials 236-237 (November 2012): 1163–67. http://dx.doi.org/10.4028/www.scientific.net/amm.236-237.1163.

Full text
Abstract:
A priority based packet scheduling scheme for video streaming (rtPS) over WiMAX networks, which corporate with a resource allocation algorithm, has been proposed in this paper. After resource allocation algorithm allocates all the resources available among service flows, packet scheduling algorithm schedules packets in each packet queue according to current byte loss rate of video streaming queue. Priorities of the video packets in the queue and delays of these packets until all the resources for this flow are used up. Simulation results show that the proposed algorithm has better performance
APA, Harvard, Vancouver, ISO, and other styles
21

Kim, Dong Hyun, and Jong Deok Kim. "Unequal loss protection scheme using a quality prediction model in a Wi-Fi broadcasting system." International Journal of Distributed Sensor Networks 15, no. 6 (2019): 155014771985424. http://dx.doi.org/10.1177/1550147719854247.

Full text
Abstract:
Wireless local area network–based broadcasting techniques are a type of mobile Internet Protocol television technology that simultaneously transmits multimedia content to local users. Contrary to the existing wireless local area network–based multimedia transmission systems, which transmit multimedia data to users using unicast packets, a wireless local area network–based broadcasting system is able to transmit multimedia data to many users in a single broadcast packet. Consequently, network resources do not increase with the increase in the number of users. However, IEEE 802.11 does not provi
APA, Harvard, Vancouver, ISO, and other styles
22

YAMASAKI, Y., H. SHIMONISHI, and T. MURASE. "Estimating TCP Packet Loss Ratio from Sampled ACK Packets." IEICE Transactions on Communications E91-B, no. 2 (2008): 418–27. http://dx.doi.org/10.1093/ietcom/e91-b.2.418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

MS., POONAM SHINDE PROF. MR. V. M. SARDAR. "DATA LOSS PREVENTION IN CONGESTION PRONE WIRELESS SENSOR NETWORK USING VCLR MODEL." JournalNX - A Multidisciplinary Peer Reviewed Journal 3, no. 9 (2018): 52–55. https://doi.org/10.5281/zenodo.1143811.

Full text
Abstract:
In WSN source node generate an event within the cluster at that time this collected information forward towards sink node through cluster head node. Cluster head acts as intermediate node between sink node and source node. The congestion may occur at the cluster head and this prompts to data loss also affect the reliability of the network. In existing system cluster head only performs normal data packet transmission from source node to sink. Due to  insufficient buffer size at cluster head node there is more packets drop during the transmission of packets. So, this system gives lower pack
APA, Harvard, Vancouver, ISO, and other styles
24

Berqia, Amine, Mohamed Hanini, and Abdelkrim Haqiq. "Combined Queue Management and Scheduling Mechanism to Improve Intra-User Multi-Flow QoS in a Beyond 3,5G Network." International Journal of Mobile Computing and Multimedia Communications 4, no. 1 (2012): 57–68. http://dx.doi.org/10.4018/jmcmc.2012010105.

Full text
Abstract:
Packet scheduling and buffer management are the two important functions adopted in networks design to ensure the Quality of Service (QoS) when different types of packets with different needs of quality share the same network resources. The Packet scheduling policy determines packet service priorities at the output link, it can reduce packet delay and delay jitter for high-priority traffic. The buffer management involves packet dropping and buffer allocation. The overall goal of such schemes proposed in High Speed Downlink Packet Access (HSDPA) is to take advantage of the channel variations bet
APA, Harvard, Vancouver, ISO, and other styles
25

Frantti, Tapio. "Cascaded Fuzzy Congestion Controller for TCP/IP Traffic." Journal of Advanced Computational Intelligence and Intelligent Informatics 9, no. 2 (2005): 92–99. http://dx.doi.org/10.20965/jaciii.2005.p0092.

Full text
Abstract:
This paper presents a fuzzy congestion control solution for active queue management in wireline packet switched networks, that use TCP to solve end-to-end flow control. Queue management is a trade-off between link utilisation, delay and the loss of packets. The targets of it are to reduce the average queue length in routers, decrease the end-to-end delay and reduce the packet loss probability by preventing buffer overflows. In the presented solution, a fuzzy controller regulates the rejection probability of received packets in routers to prevent buffer overflow and the rejection of all packets
APA, Harvard, Vancouver, ISO, and other styles
26

Ghani, Rana Fareed, and Laith Al-Jobouri. "Packet Loss Optimization in Router Forwarding Tasks Based on the Particle Swarm Algorithm." Electronics 12, no. 2 (2023): 462. http://dx.doi.org/10.3390/electronics12020462.

Full text
Abstract:
Software-defined networks (SDNs) are computer networks where parameters and devices are configured by software. Recently, artificial intelligence aspects have been used for SDN programs for various applications, including packet classification and forwarding according to the quality of service (QoS) requirements. The main problem is that when packets from different applications pass through computer networks, they have different QoS criteria. To meet the requirements of packets, routers classify these packets, add them to multiple weighting queue systems, and forward them according to their pr
APA, Harvard, Vancouver, ISO, and other styles
27

B, Purushotham, and D. V. Subba Rao Ch. "An Efficient Buffer Overflow Control Scheme to Mitigate Packet Loss in Manets." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 71–76. https://doi.org/10.35940/ijeat.B3732.029320.

Full text
Abstract:
MANET (Mobile Ad hoc Network) is self-configuring, self-organizing, infrastructure-less network of mobile devices connected without wires. Because of the dynamic changes in the network topology, there is no centralized control in ad hoc networks. So, mobile nodes can communicate with each other via intermediate nodes. The buffer size of intermediate nodes plays a significant role to hold packets in the buffer before dropping the newly arrived packets. In MANET, buffer overflow (congestion) occurs in any intermediary nodes when data packets pass through source to destination and incurs packet l
APA, Harvard, Vancouver, ISO, and other styles
28

Kimura, Mitsutaka, Mitsuhiro Imaizumi, and Toshio Nakagawa. "Reliability Analysis of Window Flow Control Based on Packet Transmission Interval with ECN Considering Packet Loss." International Journal of Reliability, Quality and Safety Engineering 28, no. 01 (2020): 2150001. http://dx.doi.org/10.1142/s0218539321500017.

Full text
Abstract:
This paper discusses the reliability model of a window flow control scheme using High-performance and Flexible Protocol (HpFP) with Explicit Congestion Notification (ECN) considering packet loss. HpFP is an important techniques as congestion control scheme in a radio environment and video stream communication. HpFP has the character that throughput is adjusted by changing a packet transmission interval. We have already discussed some reliability models of a window flow control scheme based on a packet transmission interval. In these models, if some packets has failed at a first-time transmissi
APA, Harvard, Vancouver, ISO, and other styles
29

Suha, Sahib Oleiwi, N. Mohammed Ghassan, and Al-Barazanchi Israa. "Mitigation of packet loss with end-to-end delay in wireless body area network applications." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (2022): 460–70. https://doi.org/10.11591/ijece.v12i1.pp460-470.

Full text
Abstract:
The wireless body area network (WBAN) has been proposed to offer a solution to the problem of population ageing, shortage in medical facilities and different chronic diseases. The development of this technology has been further fueled by the demand for real-time application for monitoring these cases in networks. The integrity of communication is constrained by the loss of packets during communication affecting the reliability of WBAN. Mitigating the loss of packets and ensuring the performance of the network is a challenging task that has sparked numerous studies over the years. The WBAN tech
APA, Harvard, Vancouver, ISO, and other styles
30

Jegadeesan, R., A. Beno, S. P. Manikandan, et al. "Stable Route Selection for Adaptive Packet Transmission in 5G-Based Mobile Communications." Wireless Communications and Mobile Computing 2022 (August 26, 2022): 1–10. http://dx.doi.org/10.1155/2022/8009105.

Full text
Abstract:
In mobile nodes in the network, they are unstable, so single-path communication does not provide sufficient results. In the alternative single path, communication is very difficult to handle the heavy load. The poor connectivity among the mobile node makes the uncertainty of packet loss; the path link is not measured in this network. The communication cost is also focused to achieve valid packet transmission. Because the high distance path selected for packet transmission causes a high cost for communication. It increases energy consumption and packet loss rate. So, the proposed dispersed path
APA, Harvard, Vancouver, ISO, and other styles
31

Abu-Shareha, Ahmad Adel, Adeeb Alsaaidah, Ali Alshahrani, and Basil Al-Kasasbeh. "Fuzzy-Based Active Queue Management Using Precise Fuzzy Modeling and Genetic Algorithm." Symmetry 15, no. 9 (2023): 1733. http://dx.doi.org/10.3390/sym15091733.

Full text
Abstract:
Active Queue Management (AQM) methods significantly impact the network performance, as they manage the router queue and facilitate the traffic flow through the network. This paper presents a novel fuzzy-based AQM method developed with a computationally efficient precise fuzzy modeling optimized using the Genetic Algorithm. The proposed method focuses on the concept of symmetry as a means to achieve a more balanced and equitable distribution of the resources and avoid bandwidth wasting resulting from unnecessary packet dropping. The proposed method calculates the dropping probability of each pa
APA, Harvard, Vancouver, ISO, and other styles
32

Ma, Jiandong, Zhichuan Guo, and Mangu Song. "SSPRD: A Shared-Storage-Based Hardware Packet Reordering and Deduplication System for Multipath Transmission in Wide Area Networks." Micromachines 15, no. 11 (2024): 1323. http://dx.doi.org/10.3390/mi15111323.

Full text
Abstract:
To increase bandwidth and overcome packet loss in Wide Area Networks (WANs), per-packet multipath transmission and redundant transmission are increasingly being used as Software-Defined Wide Area Network (SD-WAN) solutions. However, this results in out-of-order and duplicate packets in the destination network. To restore sequential and unique data streams for multiple connections, hardware packet buffers with significant depth are required due to the large delay difference between WAN paths. To address this issue, SSPRD, a shared-storage-based packet reordering and deduplication system using a
APA, Harvard, Vancouver, ISO, and other styles
33

SU, XIAO, and BENJAMIN W. WAH. "LOSS AWARE RATE ALLOCATIONS IN H.263 CODED VIDEO TRANSMISSIONS." Journal of Circuits, Systems and Computers 14, no. 06 (2005): 1157–71. http://dx.doi.org/10.1142/s0218126605002878.

Full text
Abstract:
For packet video, information loss and bandwidth limitation are two factors that affect video playback quality. Traditional rate allocation approaches have focused on optimizing video quality under bandwidth constraint alone. However, in the best-effort Internet, packets carrying video data are susceptible to losses, which need to be reconstructed at the receiver side. In this paper, we propose loss aware rate allocations in both group-of-block (GOB) level and macroblock level, given that certain packets are lost during transmissions and reconstructed using simple interpolation methods at the
APA, Harvard, Vancouver, ISO, and other styles
34

Karamat Khan, Tehmina, Asadullah Shah, and Zulkefli Bin Muhammad Yusof. "Performance Optimization of Wireless Sensor network for Multimedia services." International Journal of Engineering & Technology 7, no. 4.15 (2018): 323. http://dx.doi.org/10.14419/ijet.v7i4.15.23021.

Full text
Abstract:
WSN multimedia services are currently being used by several types of applications. These services experiences performance related issues in the form of slow data rates, packet loss etc. due to stringent resources. Lots of solutions are contributed to develop a system that optimizes the resources utilization, performance and packet loss. Performance evaluation for enhancing QoS of WSN is also required where packets arrive and depart the service facility (sink) in burst. In this paper, novel analytical approach is developed for packets arrival from sensor node in burst and departure of services
APA, Harvard, Vancouver, ISO, and other styles
35

Vanamoorthy, Muthumanikandan, and Valliyammai Chinnaiah. "Congestion-Free Transient Plane (CFTP) Using Bandwidth Sharing During Link Failures in SDN." Computer Journal 63, no. 6 (2019): 832–43. http://dx.doi.org/10.1093/comjnl/bxz137.

Full text
Abstract:
Abstract Software-defined networking (SDN) is an emerging trend where the control plane and the data plane are separated from each other, culminating in effective bandwidth utilization. This separation also allows multi-vendor interoperability. Link failure is a major problem in networking and must be detected as soon as possible because when a link fails the path becomes congested and packet loss occurs, delaying the delivery of packets to the destination. Backup paths must be configured immediately when a failure is detected in the network to speed up packet delivery, avoid congestion and pa
APA, Harvard, Vancouver, ISO, and other styles
36

Abu-Shareha, Ahmad Adel, Basil Al-Kasasbeh, Qusai Y. Shambour, Mosleh M. Abualhaj, and Sumaya N. Al-Khatib. "Fuzzy Comprehensive Random Early Detection of Router Congestion." Information Technology and Control 51, no. 2 (2022): 252–67. http://dx.doi.org/10.5755/j01.itc.51.2.30194.

Full text
Abstract:
The queue length and the load rate should be monitored to overcome the problem of router congestion due to the increase in network utilization and achieve a high-speed transmission. Previous active queue management methods manage the queued packets in the router buffer to maintain high network performance. However, these methods depend on monitoring indicators that do not cover all the congestion signs, leading to packet loss and delay. Accordingly, all the congestion signs should be wrapped into these indicators and managed by an algorithm that randomly drops packets to avoid global synchroni
APA, Harvard, Vancouver, ISO, and other styles
37

Zhang, Min, and Bin Li. "Performance Analysis of Cognitive Radio Networks with a Two-Part Queue." Open Electrical & Electronic Engineering Journal 9, no. 1 (2015): 238–46. http://dx.doi.org/10.2174/1874129001509010238.

Full text
Abstract:
In a cognitive radio network (CRN), a preempted secondary user (SU) is placed in a call level queue to wait for accessing another free channel. If the availability of channels is transparent to SUs, packets will be generated during their waiting time and the performance of the CRN will be influenced by which way to handle these packets. In this paper, the call level queue is departed into two parts, delay queue and discard queue. Here, an analytical model is developed to derive the formulas for both call level performance measures (i.e., call blocking probability) and packet level performance
APA, Harvard, Vancouver, ISO, and other styles
38

Bharti, Rajendra Kumar, Soundarajan S, Sushma V. Sumant, et al. "Enhanced Path Routing with Buffer Allocation Method Using Coupling Node Selection Algorithm in MANET." Wireless Communications and Mobile Computing 2022 (July 18, 2022): 1–11. http://dx.doi.org/10.1155/2022/1955290.

Full text
Abstract:
In a mobile network, nodes are placed in infrequent manner, which are moved along network in abruptly. Communication flaw between sender node and accepting node in path, the node having restricted energy and restricted transmission rate. It does not provide perfect route for communication among mobile nodes. It increases the packet drop rate and minimizes the lifetime of network. This work has proposed enhanced path routing with buffer allocation (IPBA) scheme which is implemented to obtain better communication; it protects the node from packet loss, and the buffer is used to maintain the temp
APA, Harvard, Vancouver, ISO, and other styles
39

Lee, Heung Ki, Jaehee Jung, Kyung Jin Ahn, Hwa-Young Jeong, and Gangman Yi. "Numeric Analysis for Relationship-Aware Scalable Streaming Scheme." Journal of Applied Mathematics 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/195781.

Full text
Abstract:
Frequent packet loss of media data is a critical problem that degrades the quality of streaming services over mobile networks. Packet loss invalidates frames containing lost packets and other related frames at the same time. Indirect loss caused by losing packets decreases the quality of streaming. A scalable streaming service can decrease the amount of dropped multimedia resulting from a single packet loss. Content providers typically divide one large media stream into several layers through a scalable streaming service and then provide each scalable layer to the user depending on the mobile
APA, Harvard, Vancouver, ISO, and other styles
40

AOUIZ, Amir Abdelkader, Sofiane BOUKLI HACENE, Pascal Lorenz, and Marc GILG. "Network Life Time maximization of the AOMDV Protocol Using Nodes Energy Variation." Network Protocols and Algorithms 10, no. 2 (2018): 73. http://dx.doi.org/10.5296/npa.v10i2.13322.

Full text
Abstract:
Mobile ad hoc network presents generally several challenges such as high dynamic topology, packet loss and frequent routes discovering that result in low throughput and reduced packet delivery ratio. To reduce the number of route discovering process, multipath routing protocols makes use of alternate paths to continue packets transmission. Ad Hoc On-demand, multipath distance vector routing protocol or AOMDV, is one of the well-known multipath protocols that relays on the hop count metric to route packets. However maintaining disjoint active routes can reduce nodes life time and lead to more c
APA, Harvard, Vancouver, ISO, and other styles
41

V. Gokul. "Evaluation of Packet Transfer Delivery Timeouts During Packet Transmission Using the DA-ARQ (Delay-Aware Automatic Repeat Request) Methodology." Journal of Information Systems Engineering and Management 10, no. 49s (2025): 13–26. https://doi.org/10.52783/jisem.v10i49s.9804.

Full text
Abstract:
DA-ARQ is adaptive and dynamic; it can change the rate of retransmission in dependence on receiver feedback and network state. This might result in additional reliable retransmissions with increased efficiency and reduced latency. DA-ARQ adjusts its timeout duration and retransmission rate utilizing feedback mechanisms like ACKs and NACKs. This allows it to take into account the receiver's response and alter the retransmission rate based on the network's current status. DA-ARQ can reduce latency by reducing the time required to retransmit dropped packets. This may result in the quick retransmi
APA, Harvard, Vancouver, ISO, and other styles
42

SEO, M. k., Y. w. JEONG, K. d. SEO, and J. k. KIM. "Piggyback Packetization of Duplicate Packets for Packet-Loss Resilient Video Transmission." IEICE Transactions on Communications E89-B, no. 10 (2006): 2802–8. http://dx.doi.org/10.1093/ietcom/e89-b.10.2802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Oleiwi, Suha Sahib, Ghassan N. Mohammed, and Israa Al_Barazanchi. "Mitigation of packet loss with end-to-end delay in wireless body area network applications." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (2022): 460. http://dx.doi.org/10.11591/ijece.v12i1.pp460-470.

Full text
Abstract:
The wireless body area network (WBAN) has been proposed to offer a solution to the problem of population ageing, shortage in medical facilities and different chronic diseases. The development of this technology has been further fueled by the demand for real-time application for monitoring these cases in networks. The integrity of communication is constrained by the loss of packets during communication affecting the reliability of WBAN. Mitigating the loss of packets and ensuring the performance of the network is a challenging task that has sparked numerous studies over the years. The WBAN tech
APA, Harvard, Vancouver, ISO, and other styles
44

H. Abdulqadder, Ihsan, and Israa T. Aziz. "Load Balanced Attack Defense System with Lightweight Authentication and Modified Blockchain in SDN for B5G." International journal of Computer Networks & Communications 17, no. 1 (2025): 81–99. https://doi.org/10.5121/ijcnc.2025.17106.

Full text
Abstract:
The involvement of unauthorized packets in Software Defined Networks (SDN) has raised the demand for security. These days, users can access the Internet of Things (IoT) wirelessly over long distances with the use of mobility, and handover. Due to changes in connectivity, the mobility feature is the main reason to permit unauthorized packets. This article uses handover authentication and a modified blockchain to overcome the security issue named LLModBloc. The 5G users are initially authenticated by the edge layer access points (APs) using a hash produced by the lightweight QUARK algorithm usin
APA, Harvard, Vancouver, ISO, and other styles
45

Devos, David. "Load Balanced Attack Defense System with Lightweight Authentication and Modified Blockchain in SDN for B5G." Load Balanced Attack Defense System with Lightweight Authentication and Modified Blockchain in SDN for B5G 17, no. 1 (2025): 978–1. https://doi.org/10.5121/ijcnc.2025.17106.

Full text
Abstract:
The involvement of unauthorized packets in Software Defined Networks (SDN) has raised the demand for security. These days, users can access the Internet of Things (IoT) wirelessly over long distances with the use of mobility, and handover. Due to changes in connectivity, the mobility feature is the main reason to permit unauthorized packets. This article uses handover authentication and a modified blockchain to overcome the security issue named LLModBloc. The 5G users are initially authenticated by the edge layer access points (APs) using a hash produced by the lightweight QUARK algorithm usin
APA, Harvard, Vancouver, ISO, and other styles
46

Bakri, Adil, Abderrahmane Amrouche, Mourad Abbas, and Lallouani Bouchakour. "Automatic Speech Recognition For Voip With Packet Loss Concealment." AL-Lisaniyyat 22, no. 2 (2016): 57–60. http://dx.doi.org/10.61850/allj.v22i2.376.

Full text
Abstract:
This paper proposes a packet loss concealment (PLC) technique for increase the robustness of automatic speech recognition (ASR) of speech coded with the G729 codec, on the Voice over Internet Protocol (VoIP). Many of the standard ITU-T CELP based speech coders, such as the G.723.1, G.728, and G.729, model speech reproduction in their decoders. These decoders have enough state information to integrate PLC algorithms directly in the decoder, and are specified as part of their standards in particular by PLC based ITU-T G711 Appendix I. Speech is transmitted with source and channel codes optimized
APA, Harvard, Vancouver, ISO, and other styles
47

Gao, Tingjin, Feng Chen, and Pingping Chen. "LDMP-FEC: A Real-Time Low-Latency Scheduling Algorithm for Video Transmission in Heterogeneous Networks." Electronics 14, no. 3 (2025): 563. https://doi.org/10.3390/electronics14030563.

Full text
Abstract:
With the rapid development of mobile networks and devices, real-time video transmission has become increasingly important worldwide. Constrained by the bandwidth limitations of single networks, extensive research has shifted towards video transmission in multi-network environments. However, differences in bandwidth and latency in heterogeneous networks (such as LTE and Wi-Fi) lead to high latency and packet loss issues, severely affecting video quality and user experience. This paper proposes a Forward Error Correction (FEC)-based Low-Delay Multipath Scheduling algorithm (LDMP-FEC). This algor
APA, Harvard, Vancouver, ISO, and other styles
48

姚, 荣亮. "A Data Processing Method for Avoiding Loss of Continuous Two Packets due to Packet Loss." Journal of Sensor Technology and Application 04, no. 04 (2016): 117–23. http://dx.doi.org/10.12677/jsta.2016.44014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Triyono, Joko, Rahmad Ramadhan, and Prita Haryani. "PERANCANGAN DAN OPTIMALISASI KINERJA JARINGAN HOTSPOT SERVER BERBASIS MIKROTIK PADA SMK NEGERI 2 DOMPU." Jurnal Informatika Komputer, Bisnis dan Manajemen 19, no. 2 (2023): 41–50. http://dx.doi.org/10.61805/fahma.v19i2.58.

Full text
Abstract:
SMK Negeri 2 Dompu is one of the vocational high schools located in Dompu Regency, the school already has a wireless network, but the large number of uses in one access point device results in an unstable internet network or the network being slow because it has not used an optimal configuration. The proxy-based Hotspot Server network uses the Mikrotik Simple Queue feature at schools to centrally manage hotspot networks and can manage bandwidth evenly. The method used in this research is the data collection method, namely the method of observation and literature study methods, the method of qu
APA, Harvard, Vancouver, ISO, and other styles
50

Meleshko, Yelyzaveta, Hanna Drieieva, Oleksandr Drieiev, Mykola Yakymenko, Volodymyr Mikhav, and Serhii Shymko. "A Method of Routing of Fractal-like Traffic with Prediction of Router Load for Reduce the Probability of Network Packet Loss." Computational Linguistics and Intelligent Systems, COLINS 2023 (ISSN 16130073) III (May 25, 2023): 434–48. https://doi.org/10.5281/zenodo.8231189.

Full text
Abstract:
In this paper, a method for routing fractal-like traffic in computer networks was proposed. This method uses the prediction of router load by analyzing the fractal dimension of network traffic to reduce the probability of packet loss. It takes into account the predicted router load as one of the metrics for determining the shortest packet transmission routes in a computer network. Additionally, a computer simulation model of a computer network based on complex network theory, Markov processes, and fractal time series was created. This computer simulation model allows the generation of a comput
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!