Performance of transmission control protocol on self-similar traffic.
Internet traffic will continue to expand in terms of both volume and users, and transmission congestion protocol (TCP) is accounting for more than 90% of the total traffic volume. It is well known that network traffic exhibit self-similar behavior and cannot be described by traditional Markovian mod...
| Main Authors: | Salleh, Mazleena, Abu Bakar, Ahmad Zaki |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UTM Press
2005
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/8528/ http://eprints.utm.my/8528/1/MazleenaSalleh2005_PerfomanceOfTransmissionControlProtocol.PDF |
Similar Items
Comparison of TCP Variants Over Self-Similar Traffic
by: Salleh, Mazleena, et al.
Published: (2005)
by: Salleh, Mazleena, et al.
Published: (2005)
Simulating self-similar vbr traffic / Malini Subramaniam
by: Malini, Subramaniam
Published: (2004)
by: Malini, Subramaniam
Published: (2004)
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004)
by: Idris, Mohd. Yazid, et al.
Published: (2004)
Fast optimization method : the window size and hurst parameter estimator on self-similar network traffic
by: Idris, Mohd. Yazid, et al.
Published: (2007)
by: Idris, Mohd. Yazid, et al.
Published: (2007)
Uncovering anomaly traffic based on loss of self-similarity behavior using second order statistical model
by: Rohani, M. F., et al.
Published: (2007)
by: Rohani, M. F., et al.
Published: (2007)
Comparison between transmission control protocol schemes on wireless environment
by: M. Albareki, Mustafa Ali
Published: (2008)
by: M. Albareki, Mustafa Ali
Published: (2008)
Performance analysis of MAC protocol for cooperative MIMO transmissions in WSN
by: Ahmad, Mohd Riduan, et al.
Published: (2008)
by: Ahmad, Mohd Riduan, et al.
Published: (2008)
The sign tale of hurst parameter: a revisit
by: Salleh, Mazleena, et al.
Published: (2007)
by: Salleh, Mazleena, et al.
Published: (2007)
The sign tale of hurst parameter : a revisit
by: Salleh, Mazleena, et al.
Published: (2007)
by: Salleh, Mazleena, et al.
Published: (2007)
Performance evaluation of MAC protocols for cooperative MIMO transmissions in sensor networks
by: Ahmad, Mohd Riduan, et al.
Published: (2008)
by: Ahmad, Mohd Riduan, et al.
Published: (2008)
Adaptive Concurrent Transmission Protocol for
Wireless Mesh Network
by: Ibrahim, Mohd Sufiz, et al.
Published: (2010)
by: Ibrahim, Mohd Sufiz, et al.
Published: (2010)
MAC protocol for cooperative MIMO transmissions in asynchronous wireless sensor networks
by: Ahmad, Mohd Riduan, et al.
Published: (2008)
by: Ahmad, Mohd Riduan, et al.
Published: (2008)
Smart community: The Malaysian perspective
by: Mohd Yassin, Noraniah, et al.
Published: (2004)
by: Mohd Yassin, Noraniah, et al.
Published: (2004)
A protocol for secret key infusion from satellite transmissions
by: Wahiddin, Mohamed Ridza, et al.
Published: (2010)
by: Wahiddin, Mohamed Ridza, et al.
Published: (2010)
Self-similar network traffic using Successive Random Addition (SRA) algorithm / Hani Hamira Harun
by: Harun, Hani Hamira
Published: (2006)
by: Harun, Hani Hamira
Published: (2006)
Prediction of optimum performance in self-organizing networks with dynamic source routing protocol
by: Abdullah, Muhammad Hisyam Lee
Published: (2005)
by: Abdullah, Muhammad Hisyam Lee
Published: (2005)
Performance Comparison of Transmission Control Protocol and User Datagram Protocol over Wireless Networks
by: Mohammed Hasan, Ali, et al.
Published: (2015)
by: Mohammed Hasan, Ali, et al.
Published: (2015)
Generation of self similar network traffic using DFGN algorithm / Che Ku Noreymie Che Ku Jusoh
by: Che Ku Jusoh, Che Ku Noreymie
Published: (2006)
by: Che Ku Jusoh, Che Ku Noreymie
Published: (2006)
Self-similar network traffic using Random Midpoint Displacement (RMD) algorithm / Jumaliah Saarini
by: Saarini, Jumaliah
Published: (2006)
by: Saarini, Jumaliah
Published: (2006)
Control of a complex traffic junction using fuzzy inference
by: Yusof, Rubiyah, et al.
Published: (2004)
by: Yusof, Rubiyah, et al.
Published: (2004)
Security guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
Recommended guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
Implementation traffic control and traffic shaping in linux using web approach / Eric Ng Kang Yin
by: Eric Ng, Kang Yin
Published: (2004)
by: Eric Ng, Kang Yin
Published: (2004)
Implementation of dynamic fuzzy logic control of traffic
light with accident detection and action system using iTraffic simulation
Simulation
by: Alkandari, Abdulrahman, et al.
Published: (2018)
by: Alkandari, Abdulrahman, et al.
Published: (2018)
Comparative study between traffic control methods
Using simulation software
by: Taha Alshaikhli , Imad Fakhri, et al.
Published: (2013)
by: Taha Alshaikhli , Imad Fakhri, et al.
Published: (2013)
Paraphrase Detection using String Similarity with Synonyms
by: Lee, Jun Choi, et al.
Published: (2015)
by: Lee, Jun Choi, et al.
Published: (2015)
The study of probability model for compound similarity searching
by: Salim, Naomie, et al.
Published: (2006)
by: Salim, Naomie, et al.
Published: (2006)
Image retrieval based on similarity score fusion
by: Mohd. Ali, Iliana
Published: (2007)
by: Mohd. Ali, Iliana
Published: (2007)
Inference networks for molecular database similarity searching
by: Abdo, Ammar, et al.
Published: (2008)
by: Abdo, Ammar, et al.
Published: (2008)
Comparative study of probability models for compound similarity searching
by: Salim, Naomie, et al.
Published: (2005)
by: Salim, Naomie, et al.
Published: (2005)
Predictive data mining based on similarity and clustering methods.
by: Defit, Sarjon, et al.
Published: (2000)
by: Defit, Sarjon, et al.
Published: (2000)
Reducing real-time traffic packet loss in mobile IPv6 using two tier buffer
by: M. Zaki, Salim
Published: (2008)
by: M. Zaki, Salim
Published: (2008)
An interface of wireless network traffic analysis
by: Mohamed Almoustafa, Ahmad Mohamed Jamil
Published: (2007)
by: Mohamed Almoustafa, Ahmad Mohamed Jamil
Published: (2007)
Electronic Voting System: Preliminary Study
by: Ibrahim, Subariah, et al.
Published: (2000)
by: Ibrahim, Subariah, et al.
Published: (2000)
Similarity-based virtual screening with a bayesian inference network
by: Abdo, Ammar, et al.
Published: (2008)
by: Abdo, Ammar, et al.
Published: (2008)
Performance analysis of RTS/CTS protocol over basic access in wireless networks: Study of protocol impact on performance in wireless networks
by: Kuruvilla, Mathew, et al.
Published: (2015)
by: Kuruvilla, Mathew, et al.
Published: (2015)
Development of a low cost smart traffic controller system
by: Purnomo, Muhammad Ridwan Andi, et al.
Published: (2009)
by: Purnomo, Muhammad Ridwan Andi, et al.
Published: (2009)
Fusion of similarity measures using genetic algorithm for searching chemical database
by: Rahman Ali, Yahya Ali Abdel
Published: (2007)
by: Rahman Ali, Yahya Ali Abdel
Published: (2007)
Similarity measure for retrieval of question items with multi-variable data sets
by: Che Hassan, Siti Hasrinafasya
Published: (2008)
by: Che Hassan, Siti Hasrinafasya
Published: (2008)
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Similar Items
-
Comparison of TCP Variants Over Self-Similar Traffic
by: Salleh, Mazleena, et al.
Published: (2005) -
Simulating self-similar vbr traffic / Malini Subramaniam
by: Malini, Subramaniam
Published: (2004) -
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004) -
Fast optimization method : the window size and hurst parameter estimator on self-similar network traffic
by: Idris, Mohd. Yazid, et al.
Published: (2007) -
Uncovering anomaly traffic based on loss of self-similarity behavior using second order statistical model
by: Rohani, M. F., et al.
Published: (2007)