PDF Archive

Easily share your PDF documents with your contacts, on the Web and Social Networks.

Share a file Manage my documents Convert Recover PDF Search Help Contact


PDF Archive search engine
Last database update: 25 October at 07:31 - Around 210000 files indexed.

Show results per page

Results for «packets»:

Total: 600 results - 0.067 seconds

Acknowledgment 99%

Again, the 2ACK technique overcomes this problem due to the explicit 2ACK packets.


13/03/2014 www.pdf-archive.com

IJEAS0405005 99%

During transmission, either if a link failure happens or the next hop stops responding on R2, packets emerging from N2 start to wait for more time, imposing an increased queueing delay for packets coming from other sources like N1 and N3too.


10/09/2017 www.pdf-archive.com

26I20-IJAET0520922 v7 iss2 508-512 98%

In extreme cases, this situation can lead to congestion collapse in which high degrees of packet delay and loss occurs caused by routers discarding packets due to excessive congestion in the path from source to destination.


04/07/2014 www.pdf-archive.com

18I14-IJAET0514242 v6 iss2 724to729 98%

of Computer Science, Indira Gandhi College of Arts and Science, Puducherry, India 2 Department of Computer Science, Pondicherry Engineering College, Puducherry, India ABSTRACT In TCP over OBS networks, packets from various IP sources assemble into a data burst at the ingress node and are transmitted to egress node cutting through the core network all-optically.


13/05/2013 www.pdf-archive.com

1569926793 98%

Due to sparse deployments, some nodes are likely to become bottlenecks of the network because they have to forward packets of many other nodes.


27/12/2014 www.pdf-archive.com

13N19-IJAET0319419 v7 iss1 113-121 98%

In this network, IP packets coming from diverse sources are directly switched in the optical domain [2].


04/07/2014 www.pdf-archive.com

network viva questions and answers 97%

OSI - FTAM,VT,MHS,DS,CMIP TCP/IP - FTP,SMTP,TELNET,DNS,SNMP Although the notion of an application process is common to both, their approaches to constructing application entities is different TRANSPORT LAYER OSI It takes the information to be sent and breaks it into individual packets that are sent and reassembled into a complete message by the Transport Layer at the receiving node Transport Layer protocols include the capability to acknowledge the receipt of a packet;


24/11/2015 www.pdf-archive.com

IJEAS0404027 97%

The natural way is to overflow packets to any merge resource available in the network so that the reserve is no longer available to nodes in the network, as an conclusion of which the network no longer operational in the method it was designed to make active.


10/09/2017 www.pdf-archive.com

Lead2pass Free JN0-347 Exam Questions Download 100% Pass JN0-347 Exam (91-100) 96%

Packets are encapsulated unchanged before entering the tunnel.


25/05/2018 www.pdf-archive.com

Atmel-Kontiki 96%

(2) With a 802.15.4 USB Stick and a software called Wireless Protocol Analyzer it is possible to sniff the packets in a specific channel (in this case, channel 25 was used) RPL Collect:


08/09/2011 www.pdf-archive.com

UPDATED ACN Lab Manual 96%

Provide the configuration for the transmission of packets between two nodes connected to a common bus.


23/10/2017 www.pdf-archive.com

A client-side detection mechanism for evil twins 96%

An evil twin detector changes its wireless network interface card (WNIC) to monitor mode to capture wireless TCP/IP packets.


23/05/2016 www.pdf-archive.com

p2 1-1 95%

After receiving three data packets, a node will calculate the link breakage time and compare it with a fixed threshold.


21/03/2017 www.pdf-archive.com

400-101 Cisco Real Dumps 95%

DEMO 1/5 The safer , easier way to help you pass any IT exams.  1.Which two options are causes of out-of-order packets?


03/06/2016 www.pdf-archive.com

IJETR011308 95%

In mobile ad hoc network (MANETS) [2],[3],[4] all node cooperate in order to dynamically establish and maintain routing in the network , forwarding packets for each other to allow communication between nodes not directly within wireless transmission range.


27/12/2017 www.pdf-archive.com

test 94%

Raise two main advantages of packet switching, compared to message switching 1) Possibility to breaking long messages into multiple packet 2) Packets can be delivered and reassembled at destination 2.


19/12/2017 www.pdf-archive.com

24I15-IJAET0715620 v6 iss3 1228to1236 93%

Black hole attack is an attack in network layer which degrades the network performance by dropping packets.


04/07/2014 www.pdf-archive.com

10I15-IJAET0715557 v6 iss3 1123to1131 92%

Among the various reasons of energy wasting some important reasons are overhearing of the data packets, listening of the idle medium, collisions that increase the energy wastage because of retransmissions .primarily division of MAC protocol gives two basic kind of categories , these are slotted MAC (or synchronous) and random access MAC (or asynchronous) Protocols.


04/07/2014 www.pdf-archive.com

IJETR011611 92%

The planned routing protocol uses reactive route discoveries to gather key parameters from candidate routes to estimate the chance of success and delay of knowledge packets transmitted over them.


27/12/2017 www.pdf-archive.com

Thread Usage of 6LoWPAN white paper v2 public 92%

To satisfy these requirements, the 6LoWPAN adaptation layer employs several different techniques such as packet fragmentation and header compression (for the IPv6 header and transport headers such as UDP (User Datagram Protocol)) to ensure the successful delivery and reception of IPv6 packets coming to and from devices in the home.


18/11/2015 www.pdf-archive.com

Taming Asymmetric Network Delays 92%

For example, authenticated sequence numbers can guard against malicious dropping of packets, and signed messages or message digests can ensure the integrity of the message content.


16/12/2017 www.pdf-archive.com

ISSAP Exam Dumps - ISC2 Information Security Exam Questions PDF 92%

2 https://www.dumpskey.com https://www.certs4sale.com/ Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?


23/04/2019 www.pdf-archive.com

IHMSC.2017.132 92%

These data packets do not have obvious features and firewalls cannot decrypt these data, which result in that firewalls cannot detect and interfere these data.


11/10/2017 www.pdf-archive.com