Flexible buffer management with thresholds and blocking for congestion control in multi-server computer systems

2010 ◽  
Vol 22 (1) ◽  
Author(s):  
Walenty Oniszczuk
2006 ◽  
Vol 07 (01) ◽  
pp. 163-177
Author(s):  
ASFAND-E YAR ◽  
I. U. AWAN ◽  
M. E. WOODWARD

Evolution in Wireless Technologies and Networks imposes a greater need for network support as current congestion control and avoidance techniques are mainly designed for wired networks. The current performance evaluation techniques proposed for wireless networks are not able to achieve optimal performance to guarantee desired Quality of Service (QoS) standards. Thus, the new schemes such as Active Queue Management (AQM) are needed to be adaptive to dynamic wireless networks and bursty traffic conditions to help in avoiding severe performance degradation in wireless environment. Thus, in this paper we developed and validated a novel approximate analytical performance model of a multiple threshold Random Early Detection (RED) congestion control mechanism based on the principle of Maximum Entropy (ME). It can be employed at the wireless gateways/base stations to regulate the buffer management and bandwidth allocation. Closed form expressions for the state and blocking probabilities have also been characterized. Numerical examples have been presented for aggregate and marginal QoS measures, which show the credibility of the ME solution and its validation against simulation.


2020 ◽  
Vol 5 (1) ◽  
pp. 26-34
Author(s):  
Amsar

Each online based server cannot be fully secured from various external attacks that attempt to infiltrate the system. Server security is the most important part for administrators against intruders who carry out their actions in attacking computer systems, there are several attack methods that can be done, method like brute-force are usually deployed to attack computer security systems that are connected to the internet. In this study to overcome attacks penetrating into the server system, the port knoking method can be used as a step taken to prevent attacks that enter the system or also known as the authentication method. By using this port knoking method the administrator can control the system to be more secure from brute-force attackers addressed in certain parts such as SSH server and FTP server. So that users can perform services connected with SSH server and FTP server services, knocked functions as a port knocking daemon that is ready to receive port knocking authentication from the user then rewrites the firewall, so that the connected services can be secured from attacks that try to infiltrate the server system. Furthermore, Ip tables and uncomplicated firewalls function to build firewalls that will deny connections to the SSH server and FTP server services. So when a foreign user accesses SSH and FPT without first doing the autendiction, the firewall will reject the connection, but if the user passes the port knocking autendiction stage via sending SYN packets to the port provided in the knocking daemon port, then the knocking daemon port is will rewrite the firewall so users can connect to the SSH server and FPT server services.


2016 ◽  
Vol 25 (10) ◽  
pp. 1650125 ◽  
Author(s):  
Heying Zhang ◽  
Kefei Wang ◽  
Zhengbin Pang ◽  
Liquan Xiao ◽  
Qiang Dou ◽  
...  

As the port count of routers in an interconnection network increases rapidly, the amount of buffers within the router chip also increases greatly. To improve the buffer utilization and to reduce the buffer size, the dynamically allocated multi-queue (DAMQ) algorithm is commonly used. However, traditional DAMQ buffer management suffers from high write latency and read latency, and one virtual channel (VC) monopolizes the entire buffer. To address these issues, we propose a fast and area-efficient DAMQ buffer-management algorithm and a novel flow-control mechanism based on credit with congestion-control support. The simulation results show that the new DAMQ algorithm can achieve low latency and prevent one VC from occupying the entire buffer during periods of congestion. Additionally, it can achieve high throughput with a shallow buffer, which leads to a reduced chip area.


Sign in / Sign up

Export Citation Format

Share Document