Mobile Learning Using Cloud Computing
Research Paper | Journal Paper
Vol.2 , Issue.11 , pp.102-108, Nov-2014
Abstract
Mobile cloud learning, a combination of mobile learning and cloud computing, is a relatively new concept that holds considerable promise for future development and delivery in the education sectors. With the mass popularity of 3G, WIFI wireless network and intelligent mobile terminal equipment (intelligent mobile phone, tablet computer, etc.), mobile learning has become one of the important ways of learning. But the traditional mobile learning mode has many disadvantages, and the mobile learning based on cloud computing is a good way to overcome the disadvantages. This paper first introduces the concept and cloud computing, then designs a structure of mobile learning system based on cloud computing and mobile learning architecture and how mobile learning differentiate from e-learning.
Key-Words / Index Term
Cloud Computing; Mobile Learning; E-Learning; Mobile Technologies
References
[1] Paul Hofmann, SAP Labs, Dan Woods, CITO Research: The Limits of Public Clouds for Business Applications: Digital LibraryNovember/December 2010.
[2] Uhlig, R., Neiger, G. Rodgers, D. S.M. Kagi, A.Leung, F.H. Smith : Intel Corp., USA: Intel visualization technology IEEE Computer Society: May 2005.
[3] Perez, R., van Doom, L., Sailer, R. IBM T.J. Watson Res. Center, Yorktown Heights, NY: Visualization and Hardware-Based Security –October 2008.
[4] GregorPetri: The Data Center is dead; long live the Virtual Data Center? Join The Efficient Data Center Nov 2010.
[5]N. M. Rao, C. Sasidhar, and V. S. Kumar, Cloud Computing Through Mobile Learning,? (IJACSA) International Journal of Advanced Computer Science and Applications, Vol 1, No. 6, pp. 42 – 46, December 2010. 2. K. Verma, S. Dubey, M.A.Rizvi, Mobile Cloud A New Vehicle For Learning: m-Learning Its Issues And hallenges?s, Volume 1, No.3, July – August 2012, International Journal of Science and Applied Information Technology.
[6]A. Hossain Masud, X. Huang, J.Yong ?Enhanced M-Learning with Cloud Computing: The Bangladesh Case?, Proceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design, witzerland.
[7]Hong-qing Gao, Yan-jie Zhai, ―System Design of Cloud Computing Based on Mobile Learning‖, Knowledge Acquisition and Modelling (KAM), Third International Symposium, PP. 239 – 242, IEEE 2010.
[8]A. Hossain Masud, X. Huang , ―A Novel Approach for Adopting Cloud-based E-learning System‖, 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, China, pp 37-42.
[9]Ercan, T., “Effective use of cloud computing in educational institutions”, Procedia Social and Behavioural Sciences, 2, 2010, 938-942.
[10] Masud, A. H. and Huang, X., “A Cloud Based M- learning Architecture for Higher Education”, Archives Des Sciences Vol 66, No. 1; Jan 2013
[11]Dong, B., Zheng, Q., Yang, J., LiQiao, H., An E-learning Ecosystem Based on Cloud Computing Infrastructure, 9th IEEE International Conference on Advanced Learning Technologies, pp. 125–127. IEEE Press, Latvia (2009).
[12]Erenben, C., "Cloud computing: the economic imperative", eSchool News, Vol. 13, March, 2009, available at: www.eschoolnews.com/emails/esntoday/esntoday061509.htm
Citation
S. Dhanalakshmi, S. Suganya and K. Kokilavani, "Mobile Learning Using Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.102-108, 2014.
Assessment of Grid and Cloud Computing
Research Paper | Journal Paper
Vol.2 , Issue.11 , pp.109-113, Nov-2014
Abstract
Cloud computing is based on several other computing research areas such as HPC, virtualization, utility computing and grid computing. The service oriented, loose coupling, strong fault tolerant, business model and ease use are main characteristics of cloud computing. Grid computing in the simplest case refers to cooperation of multiple processors on multiple machines and its objective is to boost the computational power in the fields which require high capacity of the CPU. In grid computing multiple servers which use common operating systems and software have interactions with each other. Grid computing is hardware and software infrastructure which offer a cheap, distributable, coordinated and reliable access to powerful computational capabilities. This paper strives to compare and contrast Cloud Computing with Grid Computing from various angles and give insights into the essential characteristics of both.
Key-Words / Index Term
Cloud Computing, Grid Computing, Cloud services
References
[1] A. Weiss. (2007). Computing in the Clouds, netWorker 11 (4) 16_25
[2] A. Greenberg, J. Hamilton, D. A. Maltz, P. Patel. ( 2009). http://ccr.sigcomm.org/online/files/p68- v39n1o-greenberg.pdf
[3] Amazon simple storage service. Web Page http://www.amazon.com/gp/browse.html?node=16427261
[4] R. Desisto, D. Plummer, Smith (2007). “Tutorial for Understanding the Relationship between Cloud Computing
[5] G. V. Mc Evoy, B. Schulze (2008). “Using Clouds to address Grid Limitations”.
http://portal.acm.org/citation.cfm?id=1462704.1462715
[6] G. Boss, P. Malladi, D. Quan, L. Legregni, H. Hall. (2007). “Cloud Computing”
www.ibm.com/developerworks/websphere/zones/hipods/
[7] H. Stockinger. (2007). “Defining the grid: a snapshot on the current view”. The Journal of
Supercomputing, (1):3–17 International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol.2, No.4, August 2012
[8] I. Foster (2002). What is the Grid? A Three Point Checklist. Grid Today, vol. 1, no. 6, pp. 22—25.
[9] I. Foster's. (2008). weblog. http://ianfoster.typepad.com/blog/2008/01/theres-grid-in.html
[10] S . Jha, A. Merzky, G. Fox. Using Clouds to Provide Grids Higher-Levels of Abstraction and Explicit Support for Usage Modes. [Online] Available: http://www.ogf.org/OGF_Special_Issue/cloudgridsaga. Pdf
[11] L. M. Vaquero, L. R. Merino , J. Caceres, M Lindner. (2009). “A Break in the Clouds: Towards a Cloud Definition”. http://portal.acm.org/citation.cfm?id=1496091.1496100.
[12] Members of EGEE-II. An egee comparative study: Grids and clouds - evolution or revolution. Technical report, Enabling Grids for E-sciencE Project, June 2008. Electronic version available at https://edms.cern.ch/document/925013/
Citation
S. Dhanalakshmi and G. Thenmozhi, "Assessment of Grid and Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.109-113, 2014.
Cloud Computing For E-Learning System Based On System Architecture
Review Paper | Journal Paper
Vol.2 , Issue.11 , pp.114-119, Nov-2014
Abstract
Cloud computing is growing rapidly, with applications almost in any area, including education. E-Learning system requires many hardware and software resources. Therefore, there is a need to redesign the educational system to meet the needs better. The advent of computers with sophisticated software has made it possible to solve many complex problems very fast and at a lower cost. This paper introduces the characteristics of the current E-Learning and then analyses the concept of cloud computing and describes the architecture of cloud computing platform by combining the features of E-Learning. This paper describes the following aspects: architecture, construction method and external interface with the model and tried introduce cloud computing to E-Learning.
Key-Words / Index Term
Architecture, Cloud computing, E-learning, Information Technology
References
[1]. F. Jian, “Cloud computing based distance education outlook”, China electronic education, 2009.10, Totally 273, pp.39-42.
[2]. R.Hua, “Teaching Information System Based on Cloud Computing”,Computer and Telecommunications, 2010.02, pp. 42-43.
[3]. Y. Juan, S. Yi-xiang, “The Initial Idea of New Learning Society which Based on Cloud Computing”, Modern Educational Technology, Vol.20, No.1, 2010, pp.14-17.
[4]. T. Jian, F. Lijian, G. Tao, “Cloud computing-based Design of Network Teaching System”, Journal of TaiYuan Urban Vocational college, Mar. 2010, pp.159-160.
[5]. Z. Zhong-ping, L. Hui-cheng , “The Development and Exploring of E- Learning System on Campus Network”,Journal of Shanxi Teacher’s University (Natural Science Edition), Vol.18, No.1, Mar. 2004, pp.36-40.
[6]. W. Jianmin, “Campus Network's E-learning Mode”, New Curriculum Research, 2007.08, pp.84-86.
[7]. Y. Wei, Y. Rong, “Research of an E-learning System Model Based on Agent”, Computer Engineering and Applications, Nov. 2004, pp.156-158.
[8]. Z. Chengyun, “Cloud Security: The security risks of cloud computing, models and strategies”, Programmer, May.2010, pp.71-73.
[9]. B. Hayes, "Cloud computing," vol. 51, no. 7, pp. 9– 11, 2008.
[10]. E. Tuncay, "Effective use of Cloud computing in educational institutions," Procedia Social Behavioral Sciences, p. 938–942, 2010.
Citation
Muruganandam. S, and .Sruthi .K. L.V, "Cloud Computing For E-Learning System Based On System Architecture," International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.114-119, 2014.
A Survey on Security Threats and Attacks in Cloud Computing
Survey Paper | Journal Paper
Vol.2 , Issue.11 , pp.120-125, Nov-2014
Abstract
Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing parts of the IT industry. IT organizations have expresses concern about critical issues (such as security) that exist with the widespread implementation of cloud computing. The security for Cloud Computing is emerging area for study and this paper provide security topic in terms of cloud computing based on analysis of Cloud Security threats and Technical Components of Cloud Computing.
Key-Words / Index Term
Cloud Computing, Security, Threats, attacks, Cloud Service Provider
References
[1]. S. Roschke, et aI., "Intrusion Detection in the Cloud," presented at the Eighth IEEE International Conference on Dependable, AutonomIc and Secure Computing, Chengdu, China, 2009.
[2]. J Brodkin. (2008). Gartner Seven cloud-computing security risks. Available: http://www.networkworld.com/news/200S!07020Scloud. Html
[3]. D. L. Ponemon, "Security of Cloud Computing Users," 2010.
[4]. S. K. Tim Mather, and Shahed Latif, Cloud Security and Privacy: O'Reilly Media, Inc , 2009.
[5]. C. Almond, "A Practical Guide to Cloud Computing Security," 27 August 2009 2009.
[6]. http://cloudsecurity.trendmicro.com/
[7]. N. Mead, et ai, "Security quality requirements engineering (SQUARE) methodolgy," Carnegie Mellon Software Engineering Institute.
[8]. J. W.Rittinghouse and J. F.Ransome, Cloud Computing: Taylor and Francis Group, LLC, 2010.
[9]. T. Mather. (2011). Data Leakage Prevention and Cloud Computing. Available: http://www.kpmg.com/Globa1/Pages/default.aspx.
[10]. P. Coffee, "Cloud Computing: More Than a Virtual Stack," ed: salesforce.com. [II] z. Zorz, "Top 7 threats to cloud computing," 2010.
[11]. Security Management in the Cloud. Available http://mscerts.net/programming/Security%20Management%20in%20t he%20Cloud.aspx
[12]. (2010). Security Management in the Cloud – Access Control.
[13]. P. Sefton, "Privacy and data control in the era of cloud computing.
Citation
V.P.Muthukumar and R.Saranya, "A Survey on Security Threats and Attacks in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.120-125, 2014.
A Survey: Different Approaches to Integrate Data Using Ontology and Methodologies to Improve the Quality of Data
Survey Paper | Journal Paper
Vol.2 , Issue.11 , pp.126-131, Nov-2014
Abstract
This In today’s world, the amount of data is increasing tremendously. In order to analyze data and make decisions, data residing at different sources are integrated. Data integration is an approach to integrate data from different data sources. Data federation is a data integration strategy used to create integrated virtual view. This paper deals with various approaches of data integration to resolve semantic heterogeneity using ontology. Various ontology based data integration techniques are reviewed and issues are summarized. Different metrics and approaches are also discussed to improve the quality of the data.
Key-Words / Index Term
Data Integration, Ontology, Semantic heterogeneity, Data quality
References
[1] Batini C, Lenzerini M, Navathe S B, “A comprative analysis of methodologies for schema integration”,Journal of ACM Computing Surveys, (CSUR 1986),Volume-18, Issue-4, page no ( 2-6), January 1986.
[2] Yushui Geng,Xiangcui Kong, “The Key Technologies of Heterogeneous Data Integration System Based on Ontology”, International Workshop on Education Technology and Training, page no (723-725), January 2008.
[3] Maurizio Lenzerini, “Data Integration: A Theoretical Perspective”, Proceedings of PODS, page no (233-246), December 2002.
[4] Arens, Y., Hsu, C., Knoblock, C.A, “Query processing in the SIMS Information Mediator”. Advanced Planning Technology, Austin Tate (Ed.), AAAI Press, Menlo Park, CA, page no (61-69), 1996.
[5] Mena, E., Kashyap, V., Sheth, A. and Illarramendi, A. “Observer: An approach for query processing in global information systems based on interoperation across pre-existing ontologies”, Kluwer AcademicPublishers,Boston.http://citeseer.nj.nec.com/mena96observer.html, 1-49, 2000.
[6] Cui, Z. and O’Brien, P. “Domain Ontology Management Environment”. In Proceedings of the 33rd Hawaii International Conference on System Sciences, 2000.
[7] Gray, P.M.D, Preece, A., Fiddian, N.J. and colab, “KRAFT: Knowledge Fusion from Distributed Databases and Knowledge Bases”, Proceedings of 8th International Workshop on database and Expert Systems Applications (DEXA'97), 1997.
[8] Woelk, D., P. Cannata, M. Huhns, W. Shen, and C. Tomlinson. Using Carnot for Enterprise Information Integration. Second International Conf. Parallel and Distributed Information Systems, page no (133-136), January 1993.
[9] Goh, C.H., Bressan, S., Siegel, M. and Madnick, S. E. “Context Interchange: New Features and Formalisms for the Intelligent Integration of Information”. ACM Transactions on Information Systems, Vol. 17(3), pp (270–293), 1999.
[10] Wand, R. A product perspective on total data quality management. Comm. ACM 41, 2, 1998.
[11] Jeusfeld, M.,Quix, C., and Jarke,M. “Design and analysis of quality information for datawarehouses”. In Proceedings of the 17th International Conference on Conceptual Modeling, 1998.
[12] English, L. “Improving Data Warehouse and Business Information Quality”. Wiley & Sons, 1999.
[13] Lee, Y.W., Strong, D. M., Kahn, B. K., Andwang, R. Y. “AIMQ: A methodology for information quality assessment”. Inform. Manage. 40, 2, pp (133–460), 2002.
[14] Long, J. and Seko, C, “A cyclic-hierarchical method for database data-quality evaluation and improvement. In Advances in Management Information Systems-Information Quality Monograph (AMISIQ)”, April 2005.
[15] Monograph, R. Wang, E. Pierce, S. Madnick, and Fisher C.W. Pipino, L., Lee, Y., and Wang, R., “Data quality assessment”. Commun. ACM 45, 4, 2002.
[16] Eppler, M. and Munzenmaier, P, Measuring information quality in the Web context: A survey of state-of-the-art instruments and an application methodology. In Proceedings of the 7th International Conference on Information Systems (ICIQ).ISTAT, 2002.
[17] Guidelines for the data quality improvement of localization data in public administration (in Italian). www.istat.it.2004.
[18] Su, Y. and Jin, Z. 2004. “A methodology for information quality assessment in the designing and manufacturing processes of mechanical products”, In Proceedings of the 9th International Conference on Information Quality (ICIQ). Page no (447–465), December 2004.
[19] Loshin, D. “Enterprise Knowledge Management - The Data Quality Approach. Series in Data Management Systems”, Morgan Kaufmann, chapter 4, 2004.
[20] Scannapieco, M., M.Virgillito, Marchetti, M., Mecella, M., and Maldoni, R.. “The DaQuinCIS architecture: a platform for exchanging and improving data quality in Cooperative Information Systems”, Inform. Syst. 29, 7, pp (551–582) ,January 2004.
[21] De amiciS, F. and Batini, C, “A methodology for data quality assessment on financial data”. Studies Commun. Sci. SCKM, 2004.
[22] M.J. Carey, L.M. Haas, P.M. Schwarz, M. Arya, W.F. Cody, R.. II,J.H. Williams, and E.L. Wimmers, “Towards heterogeneous multimedia information systems: The Garlic approach”, IBMAlmaden Research Center, San Jose, CA, 1996.
Citation
Sowmya Devi L, Jai Barathi B, Hema M.S. and S. Chandramathi , "A Survey: Different Approaches to Integrate Data Using Ontology and Methodologies to Improve the Quality of Data," International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.126-131, 2014.
A Traffic Aware Health Monitoring Application Embedded in Smart Ambulance (THESA)
Research Paper | Journal Paper
Vol.2 , Issue.11 , pp.132-137, Nov-2014
Abstract
This paper discusses the use of pervasive computing in health monitoring using computer devices with enriched database distribution to virtually bring the experts to an emergency site. It examines the vision of new field pervasive healthcare and identifies new research thrusts: Convenient communication and access to PHR (Patient Health Record), Helping experts, patients and others to navigate and locate nearest health care, convenient traffic monitoring for health experts. Some of hypothetical pervasive computing scenarios are considered and uses them to find out key capabilities that are missing from today’s systems. The paper ends with a discussion of the research necessary to develop these capabilities using embedded sensors.
Key-Words / Index Term
Smart Ambulance, Health, Health Care Hospitals, Doctors, Mobile Ambulance, Patient Monitoring, Medical Services,Computerized Monitoring, Distributed Database, Pervasive Computing
References
[1] J.E. Bardram, “Pervasive Healthcare as a Scientific Discipline”, Methods of Infor¬mation in Medicine, vol. 47, no. 3, pp. 178–185, 2008.
[2] D. Saha and A. Mukherjee, “Pervasive Computing: A Paradigm for the 21st Century”, IEEE Computer, vol. 36, no. 3, pp. 25–31, 2003.
[3] H. B. Christensen, J. E. Bardram, “Supporting Human Activities – Exploring Activity Centered Computing”, In the proceedings of Ubicomp 2002: Ubiquitous Computing, vol. 2498, pp. 107-116, 2002
[4] A. Chattaraj, S. Chakrabarti, S. Bansal, S. Halder and A. Chandra, “An Intelligent Traffic Control System using RFID”, IEEE Potentials, vol. 28, no. 3, pp. 40-43, May-Jun. 2009.
[5] Rifat Shahriyar, Md. Faizul Bari, Gourab Kundu, Sheikh Iqbal Ahamed and Md. Mostofa Akbar, “Intelligent Mobile Health Monitoring System (IMHMS),” International Journal of Control and Automation, vol.2, no.3, September 2009
[6] G. Borriello, V. Standford, C. Narayanaswami, and W. Menning, “Pervasive computing in Healthcare”, IEEE Computer Society, vol. 3, pp. 17–19, 2007.
[7] Wilcox, L., Morris, D., Tan, D., Gatewood, “Designing Patient-Centric Information Displays for Hospitals”, In the proceedings of ACM, vol. 2, pp. 2123-2132, 2006
[8] Bardram JE, Hansen TR, Soegaard M., “Aware-Media: A Shared Interactive Display Supporting Social, Temporal and Spatial Awareness in Surgery”, In the proceedings of 2006 conference on Computer supported cooperative work, vol. 2, pp 109-118, 2006
[9] James A. Landay, Gaetano Borriello, “Design Patterns for Ubiquitous Computing”, http://www.academia.edu, vol. 1, pp. 93-94, 2003.
[10] P.Padmavathy, C.Balakrishnan, “Smart Tracking of Human Location and Events Based on WPS using Android Technology”, International Journal of Computer Sciences and Engineering, vol. 2(1), pp. 30-34, Jan 2014.
Citation
Jasleen Kaur and Neera Batra, "A Traffic Aware Health Monitoring Application Embedded in Smart Ambulance (THESA)," International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.132-137, 2014.
A Probabilistic Estimation of Cluster Region Prone to Inter Cluster Data Movement
Research Paper | Journal Paper
Vol.2 , Issue.11 , pp.138-141, Nov-2014
Abstract
[1] J. Han and M.Kamber, “Data Mining: Concepts and Techniques”, Morgan Kaufmann Publishers, 2001. [2] S.Lloyd, “Least squares quantization in PCM”, IEEE Transactions on Information Theory, 1982, pp.129-136. [3] A. Campan and G. Serban, “Adaptive Clustering algorithms”, Advances in Artificial Intelligence, Springer, 2006. [4] G.Serban and A.Campan, “Adaptive Clustering using a Core-based Approach”, Informatica, Volume L, Number 2, 2005. [5] Charu C. Aggarwal, Philip S. Yu, “A Framework for Clustering Massive Text and Categorical Data Streams”, ACM SIAM Data Mining Conference, 2006 [6] Angie King, “Online k-Means Clustering of Non-stationary Data”, Prediction Project Report, 2012 [7] Seokkyung Chung and Dennis McLeod, “Dynamic Pattern Mining: An Incremental Data Clustering Approach”, Journal on Data Semantics, Volume 2, 2005 [8] A.M.Rajee and F.Sagayaraj Francis, “Inter Cluster Movement Estimation model based on cluster parameters”, in Proc. IEEE International Conference on Computational Intelligence and Computing Research”, 2013, pp.369-372. [9] Jain A. K, “Data Clustering: 50 Years Beyond K-means”, Pattern Recognition Letters 31(8), 2010, pp.651–666. [10] Jain A. K, Murty M. N and Flynn, P. J, “Data Clustering: A Review. ACM Computing Surveys”, 31(3), 1999, pp. 264–323.
Key-Words / Index Term
Data Clustering; Inter Cluster Data Movement; Probabilistic Model; Un-Clustered Information
References
[1] J. Han and M.Kamber, “Data Mining: Concepts and Techniques”, Morgan Kaufmann Publishers, 2001.
[2] S.Lloyd, “Least squares quantization in PCM”, IEEE Transactions on Information Theory, 1982, pp.129-136.
[3] A. Campan and G. Serban, “Adaptive Clustering algorithms”, Advances in Artificial Intelligence, Springer, 2006.
[4] G.Serban and A.Campan, “Adaptive Clustering using a Core-based Approach”, Informatica, Volume L, Number 2, 2005.
[5] Charu C. Aggarwal, Philip S. Yu, “A Framework for Clustering Massive Text and Categorical Data Streams”, ACM SIAM Data Mining Conference, 2006
[6] Angie King, “Online k-Means Clustering of Non-stationary Data”, Prediction Project Report, 2012
[7] Seokkyung Chung and Dennis McLeod, “Dynamic Pattern Mining: An Incremental Data Clustering Approach”, Journal on Data Semantics, Volume 2, 2005
[8] A.M.Rajee and F.Sagayaraj Francis, “Inter Cluster Movement Estimation model based on cluster parameters”, in Proc. IEEE International Conference on Computational Intelligence and Computing Research”, 2013, pp.369-372.
[9] Jain A. K, “Data Clustering: 50 Years Beyond K-means”, Pattern Recognition Letters 31(8), 2010, pp.651–666.
[10] Jain A. K, Murty M. N and Flynn, P. J, “Data Clustering: A Review. ACM Computing Surveys”, 31(3), 1999, pp. 264–323.
Citation
A. M. Rajee and F. Sagayaraj Francis, "A Probabilistic Estimation of Cluster Region Prone to Inter Cluster Data Movement," International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.138-141, 2014.
RECENTING ADVANCE REPORT IN TCP COGESTION CONTROL USING AIMD
Research Paper | Journal Paper
Vol.2 , Issue.11 , pp.142-145, Nov-2014
Abstract
In this paper introduced a common report of TCP congestion control and using the fast transmit over sending packets of Using AIMD Additive increase and multiplicative decrease. The host receives implicit packet loss or explicit packet mark indicate internal congestion. Concept implements AIMD to prevent from the traffic over TCP network. The acknowledgment of PACKET SENDING implements faster over TCP network using AIMD. Recent the report using Active queue management AQM has the pathological packet-dropping pattern.
Key-Words / Index Term
AIMD; AQM; Congestion Control; Pathological Packet
References
[1]W.Leland, M.Taqqu, W.Willinger, and D. Wilson, on the self-similar nature of Ethernet traffic (extended version) IEEE/ACM Transactions on Networking, pp. 2:1–15, 1994.
[2]S.Savage, N.Cardwell, D.Whetherall, and T.Anderson “TCP Congestion Control with Misbehaving Receiver ACM Computer Communication Review, Oct 1999.
[3]S.Floyd and V. Jacobson on Traffic Phase Effects in Packet-Switched Gateways. Sep.1992.
[4]. David D. Clark. The Design Philosophy of the DARPA Internet Protocols. In Proceedings SIGCOMM '88, Computer Communications Review Vol. 18, No. 4, August 1988.
[5]Sona Kaushik,”Strength of Quick Response Barcodes and Design of secure Data Sharing System“,(ijacsa)International Journal of Advanced Computer Science and Applications, Volume 2,Issue 11,2011.
[6]S.Floyd and V.Jacobson. Random Early Deduction Gateway for Congestion Avoidance. Aug 1993.
[7]V.Paxson, Strategies for sound Internet measurement in Proceedings of ACM SIGCOMM Internet Measurement Conference ’04, Taormina, Italy, November 2004.
[8]Peterson and Davie, Morgan Kaufman COMPUTER NETWORK A SYSTEM APPROACH”, third EDU.,2003.
[9].U.Ahmed and J.Salim,“Performance Evolution of Explicit Congestion Notification [ECN]” in IP Network RFC -2884, July 2000.
[10]M.Mathis, J.Madhavi, S.Floyd and A.Romanow. “TCP Selecting Acknowledgement Option .RFC -2018, Apr 1996”.
[11]AmitBhati-Congestion control, 1 edition Problem And Solution For Wireless Senor.
[12]Andrzej, Ignaciuk, Premysaw, bartoszewicz Congestion Control In Data Transmission Network.
Citation
S.Kalai Selvi and A.Meena, "RECENTING ADVANCE REPORT IN TCP COGESTION CONTROL USING AIMD," International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.142-145, 2014.