Using TCP for multicast applications would be hard since now the sender would have to keep track of retransmissions or sending rate for multiple receivers. Various flow control schemes have been adopted widely to enhance native UDP for achieving an optimum performance. Some schemes exhibit high overhead logic. Hence an efficient method is propos... ... middle of paper ... ...issue over UDP and its influence on SIP session performance are respectively determined, investigated and analyzed. REFERENCES  Ahmed Osama Fathy Atya and Jilong Kuang.
p. 11. 18. Ernits, J., et al. Requirements-driven model-based testing of the IP multimedia subsystem. in Electronics Conference, 2008.
Communications Magazine, IEEE 51.11 (2013): 24-31.  Zhang, Liang-Jie, and Qun Zhou. "CCOA: Cloud computing open architecture." Web Services, 2009. ICWS 2009.
Kaufman C., Perlman R, and Speciner M. (2002). Network Security, Private Communications in a Public World, 2nd Edition, Prentice Hall. Kim H., and Hou J., (2003). Improving protocol capacity with model-based frame Scheduling in IEEE 802.11-operated WLANS. In Proceedings of the 9th annual international conference on Mobile computing and networking (MobiCom ’03).
This number is compared with the last sequence number in RREP at source node. If both the numbers match, the data will be forwarded to that route otherwise an alarm message is broadcast to isolate the malicious node in the network. However, in both the solutions time delay is the major drawback. According to proposed solution in  by Tamilselvan et.al, the source node waits for other replies with next hop information. Once it receives the first ... ... middle of paper ... ...tional conference on wireless networks, CSREA Press, Las Vegas, pp .570–575, 2003.
Since the hosts are mobile, the network topology may change rapidly and unpredictably over time . Congestion in a network may occur if the load on the network (the numbers of packets send to the network) is greater than the capacity of the network (the number of packets a network can handle). Thus network congestion can severely increase delay and packet loss and reduced network throughput. Congestion control refers to techniques and mechanisms that can either prevent congestion before it happens, or remove congestion after it happened. The main objective of congestion control is to limit the delay and buffer overflow caused by network congestion and provide better performance of the network .
Computer networks like internet necessitate network resources, i.e. bandwidth, buffer spaces, etc in order to accommodate the arriving packets at router buffers . When the arriving packets cannot be accommodated due to lack of network resources, this indicates occurring congestion at router buffers of networks . Congestion can deteriorate a network performance [22, 25] through growing the packet loss probability due to overflow as well as the mean waiting time for packets in the queueing network. In addition, congestion may reduce the throughput and increase the packet dropping probability precedes the router buffers have overflowed.
41 (4). doi: 10.1145/1899639.1899644. Blumberg, M., Donker, H. (2008). Collaborative process management and virtual teams. CHASE '08: Proceedings of the 2008 international workshop on Cooperative and human aspects of software engineering.
 B. Song and C. J. Mitchell. RFID authentication protocol for low-cost tags. In WiSec ’08: Proceedings of the first ACM conference on Wireless network security, volume 0, pages 140–147. ACM, 2008.
In: ACMSIGCOMM, editor. Computer communication review 2009. New York: ACM Press; 2009. pp. 50–5. (for grid virtualization) [p13] Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing, 2009. http://www.ibm.com/developerswork/websphere/zones/hipods/ library.html.