Enviar búsqueda
Cargar
Kumpulan shalawat pilihan
•
0 recomendaciones
•
376 vistas
Abrar Farisi
Seguir
Educación
Denunciar
Compartir
Denunciar
Compartir
1 de 18
Descargar ahora
Descargar para leer sin conexión
Recomendados
The TCP congestion control mechanism in standard implementations presents several problems, for example, large queue lengths in network routers and packet losses, a misleading reduce of the transmission rate when there are link failures, among others. This paper proposes a schema to congestion control in TCP protocols, called NGWA, witch is based on the network bandwidth. The NGWA provides information considering the available bandwidth of the network infrastructure to the endpoints of the TCP connection. Hence, it helps in choosing a better transmission rate for TCP improving its performance. Simulation results show superior performance of the proposed scheme when compared to those obtained by TCP New Reno and standard TCP. A physical implementation in the Linux kernel was performed to prove the correct operation of the proposal.
Available network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocols
IJCNCJournal
Presentación 2
Presentación 2
Liliana Triana Soracá
Presentación 1
Presentación 1
Liliana Triana Soracá
Grupo 2
Grupo 2
Liliana Triana Soracá
Bahayazina ibnqayyimal-jauziyah
Bahayazina ibnqayyimal-jauziyah
Abrar Farisi
Visual studio 2008
Visual studio 2008 overview
Visual studio 2008 overview
OPENLANE
Grupo 3
Grupo 3
Liliana Triana Soracá
CertificateMBA
CertificateMBA
Seksith Chotikul
Recomendados
The TCP congestion control mechanism in standard implementations presents several problems, for example, large queue lengths in network routers and packet losses, a misleading reduce of the transmission rate when there are link failures, among others. This paper proposes a schema to congestion control in TCP protocols, called NGWA, witch is based on the network bandwidth. The NGWA provides information considering the available bandwidth of the network infrastructure to the endpoints of the TCP connection. Hence, it helps in choosing a better transmission rate for TCP improving its performance. Simulation results show superior performance of the proposed scheme when compared to those obtained by TCP New Reno and standard TCP. A physical implementation in the Linux kernel was performed to prove the correct operation of the proposal.
Available network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocols
IJCNCJournal
Presentación 2
Presentación 2
Liliana Triana Soracá
Presentación 1
Presentación 1
Liliana Triana Soracá
Grupo 2
Grupo 2
Liliana Triana Soracá
Bahayazina ibnqayyimal-jauziyah
Bahayazina ibnqayyimal-jauziyah
Abrar Farisi
Visual studio 2008
Visual studio 2008 overview
Visual studio 2008 overview
OPENLANE
Grupo 3
Grupo 3
Liliana Triana Soracá
CertificateMBA
CertificateMBA
Seksith Chotikul
Time Manajemen
Time Manajemen
Wendri Situmorang
Introduction to web services
Introduction to web services
Introduction to web services
Mohammad Tahsin Alshalabi
Cloud Computing has received much attention by the IT-Business world. As compared to the common computing platforms, cloud computing is more flexible in supporting real-time computation and is considered a more powerful model for hosting and delivering services over the Internet. However, since cloud computing is still at its infancy, it faces many challenges that stand against its growth and spread. This article discusses some challenges facing cloud computing growth and conducts a comparison study between Amazon EC2 and Windows Azure in dealing with such challenges. It concludes that Amazon EC2 generally offers better solutions than Windows Azure. Nevertheless, the selection between them depends on the needs of customers.
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
IJCNCJournal
The Internet has made it possible for users to be robbed of their reputation, money and credit worthiness by the click of a mouse. The impact of identity theft severely limits victims’ ability to participate in commerce, education and normal societal functions. This paper evaluates resurgence in syndicated cyber attacks, which includes but not limited to identity theft, corporate espionage and cyber warfare taking advantage of the Internet as a medium of operations. The paper highlights the increase of cyber related attacks in the past ten years due to lack of transatlantic international corporation between participating countries, coherent information security policies, data aggregation and sound international laws to facilitate prosecution of perpetrators. The cyber space coupled with availability of free hacking tools has contributed to resurgence in syndicated identity theft, corporate espionage and identity theft by organized crime elements taking advantage of the Internet as a medium of operations. This paper presents conclusive solution that users, organizations and consumers can enact to protect themselves from the threat of cyber attacks culminating into identity theft, financial loss or both.
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
IJCNCJournal
Dokumen standard pk kssr tahun 1
Dokumen standard pk kssr tahun 1
Lisnah Morin
Grupo 7
Grupo 7
Liliana Triana Soracá
שנה לחוק הסופרים. הודעה לעיתונות מעודכן
שנה לחוק הסופרים. הודעה לעיתונות מעודכן
Anochi.com.
Bab7 software
Bab7 software
Mila Masduki Masduki
Power point text graphics
Power point text graphics
Abrar Farisi
Lkin
Lkin
Abrar Farisi
Kumpulan puisi perpisahan terbaru
Kumpulan puisi perpisahan terbaru
Abrar Farisi
Kimia kebahagiaan
Kimia kebahagiaan
Abrar Farisi
Imamal ghazali kimia kebahagiaan
Imamal ghazali kimia kebahagiaan
Abrar Farisi
Contoh sertifikat komputer
Contoh sertifikat komputer
Abrar Farisi
nilam
Slaid Taklimat Program NILAM 2021 malaysia
Slaid Taklimat Program NILAM 2021 malaysia
LUKTZECHINMoe
Pendidikan Moral Tingkatan 1
Group Project (1).pdf pendidikan moral tingkatan 1
Group Project (1).pdf pendidikan moral tingkatan 1
nurulaidahashim1
kimia
Bab 2 Sebatian Karbon new copy kimi.pptx
Bab 2 Sebatian Karbon new copy kimi.pptx
Farid Salleh
isi penting kokurikulum
Mesyuarat kokurikulum sjk t bukit darah.
Mesyuarat kokurikulum sjk t bukit darah.
gs69955
Perniagaan
Bab 1 : Tujuan Perniagaan dan pemilikan perniagaan
Bab 1 : Tujuan Perniagaan dan pemilikan perniagaan
ErnaKasran1
seminar bahaya vape dan rokok
Bahaya vape dan rokok (Seminar Remaja Kebangsaan)-1.pptx
Bahaya vape dan rokok (Seminar Remaja Kebangsaan)-1.pptx
kedekut1
Más contenido relacionado
Destacado
Time Manajemen
Time Manajemen
Wendri Situmorang
Introduction to web services
Introduction to web services
Introduction to web services
Mohammad Tahsin Alshalabi
Cloud Computing has received much attention by the IT-Business world. As compared to the common computing platforms, cloud computing is more flexible in supporting real-time computation and is considered a more powerful model for hosting and delivering services over the Internet. However, since cloud computing is still at its infancy, it faces many challenges that stand against its growth and spread. This article discusses some challenges facing cloud computing growth and conducts a comparison study between Amazon EC2 and Windows Azure in dealing with such challenges. It concludes that Amazon EC2 generally offers better solutions than Windows Azure. Nevertheless, the selection between them depends on the needs of customers.
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
IJCNCJournal
The Internet has made it possible for users to be robbed of their reputation, money and credit worthiness by the click of a mouse. The impact of identity theft severely limits victims’ ability to participate in commerce, education and normal societal functions. This paper evaluates resurgence in syndicated cyber attacks, which includes but not limited to identity theft, corporate espionage and cyber warfare taking advantage of the Internet as a medium of operations. The paper highlights the increase of cyber related attacks in the past ten years due to lack of transatlantic international corporation between participating countries, coherent information security policies, data aggregation and sound international laws to facilitate prosecution of perpetrators. The cyber space coupled with availability of free hacking tools has contributed to resurgence in syndicated identity theft, corporate espionage and identity theft by organized crime elements taking advantage of the Internet as a medium of operations. This paper presents conclusive solution that users, organizations and consumers can enact to protect themselves from the threat of cyber attacks culminating into identity theft, financial loss or both.
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
IJCNCJournal
Dokumen standard pk kssr tahun 1
Dokumen standard pk kssr tahun 1
Lisnah Morin
Grupo 7
Grupo 7
Liliana Triana Soracá
שנה לחוק הסופרים. הודעה לעיתונות מעודכן
שנה לחוק הסופרים. הודעה לעיתונות מעודכן
Anochi.com.
Bab7 software
Bab7 software
Mila Masduki Masduki
Destacado
(8)
Time Manajemen
Time Manajemen
Introduction to web services
Introduction to web services
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
Dokumen standard pk kssr tahun 1
Dokumen standard pk kssr tahun 1
Grupo 7
Grupo 7
שנה לחוק הסופרים. הודעה לעיתונות מעודכן
שנה לחוק הסופרים. הודעה לעיתונות מעודכן
Bab7 software
Bab7 software
Más de Abrar Farisi
Power point text graphics
Power point text graphics
Abrar Farisi
Lkin
Lkin
Abrar Farisi
Kumpulan puisi perpisahan terbaru
Kumpulan puisi perpisahan terbaru
Abrar Farisi
Kimia kebahagiaan
Kimia kebahagiaan
Abrar Farisi
Imamal ghazali kimia kebahagiaan
Imamal ghazali kimia kebahagiaan
Abrar Farisi
Contoh sertifikat komputer
Contoh sertifikat komputer
Abrar Farisi
Más de Abrar Farisi
(6)
Power point text graphics
Power point text graphics
Lkin
Lkin
Kumpulan puisi perpisahan terbaru
Kumpulan puisi perpisahan terbaru
Kimia kebahagiaan
Kimia kebahagiaan
Imamal ghazali kimia kebahagiaan
Imamal ghazali kimia kebahagiaan
Contoh sertifikat komputer
Contoh sertifikat komputer
Último
nilam
Slaid Taklimat Program NILAM 2021 malaysia
Slaid Taklimat Program NILAM 2021 malaysia
LUKTZECHINMoe
Pendidikan Moral Tingkatan 1
Group Project (1).pdf pendidikan moral tingkatan 1
Group Project (1).pdf pendidikan moral tingkatan 1
nurulaidahashim1
kimia
Bab 2 Sebatian Karbon new copy kimi.pptx
Bab 2 Sebatian Karbon new copy kimi.pptx
Farid Salleh
isi penting kokurikulum
Mesyuarat kokurikulum sjk t bukit darah.
Mesyuarat kokurikulum sjk t bukit darah.
gs69955
Perniagaan
Bab 1 : Tujuan Perniagaan dan pemilikan perniagaan
Bab 1 : Tujuan Perniagaan dan pemilikan perniagaan
ErnaKasran1
seminar bahaya vape dan rokok
Bahaya vape dan rokok (Seminar Remaja Kebangsaan)-1.pptx
Bahaya vape dan rokok (Seminar Remaja Kebangsaan)-1.pptx
kedekut1
Último
(6)
Slaid Taklimat Program NILAM 2021 malaysia
Slaid Taklimat Program NILAM 2021 malaysia
Group Project (1).pdf pendidikan moral tingkatan 1
Group Project (1).pdf pendidikan moral tingkatan 1
Bab 2 Sebatian Karbon new copy kimi.pptx
Bab 2 Sebatian Karbon new copy kimi.pptx
Mesyuarat kokurikulum sjk t bukit darah.
Mesyuarat kokurikulum sjk t bukit darah.
Bab 1 : Tujuan Perniagaan dan pemilikan perniagaan
Bab 1 : Tujuan Perniagaan dan pemilikan perniagaan
Bahaya vape dan rokok (Seminar Remaja Kebangsaan)-1.pptx
Bahaya vape dan rokok (Seminar Remaja Kebangsaan)-1.pptx
Descargar ahora