Protocols and Techniques for End to End Congestion Avoidance on a Global Internet

AC Jain - Applied Science and Engineering Journal for …, 2024 - asejar.singhpublication.com
AC Jain
Applied Science and Engineering Journal for Advanced Research, 2024asejar.singhpublication.com
The packet transmission congestion control at the network node is presented in this
research study. It is increasing quickly due to the increased use of applications. It makes
clogged flows unpredictable and erratic. There aren't many outdated scheduling strategies
for handling network node congestion, but the ones that do exist were only for end-to-end
networks, thus they couldn't prevent unfairness brought on by applications and congestion
collapse. The switch-based packet transmission technique and the present packet …
Abstract
The packet transmission congestion control at the network node is presented in this research study. It is increasing quickly due to the increased use of applications. It makes clogged flows unpredictable and erratic. There aren't many outdated scheduling strategies for handling network node congestion, but the ones that do exist were only for end-to-end networks, thus they couldn't prevent unfairness brought on by applications and congestion collapse. The switch-based packet transmission technique and the present packet transmission algorithm are similar. An increase in packets between nodes results in congestion control situations. in order to solve existing problems and develop a more flexible method for building a network's improved leakage control scheme. The suggested Enhanced Leaky Bucket Index Algorithm can traverse the node and receive a large number of packets from it due to packet regulations. The proposed approach computes the full packet transmission. The suggested technique demonstrates the packet switching and congestion management mechanisms in the network node in order to identify and halt unresponsive congestion flows before they enter the network node and prevent congestion within the network node. Lastly, a comparison between the suggested and the current methods is made to control packet transmission overall.
asejar.singhpublication.com
Showing the best result for this search. See all results