Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Buffer Management

Handbook of Research on Cloud Computing and Big Data Applications in IoT
The buffers available in routers are valuable resources. A router uses them for storing incoming packets to forward them later. Due to the large number of packets that arrive in a router and limited buffer size, not all packets can be saved at the router. The quality of buffer management can define the quality of service provided to the customers. The buffer management module takes care of managing buffers shared by a number of modules and interfaces within the network layer. The default “best-effort” packet-forwarding service of IP is typically implemented in routers by a single, fixed-size, FIFO queue shared by all incoming packets.
Published in Chapter:
Delay Tolerant Networks: Architecture, Routing, Congestion, and Security Issues
Vandana Kushwaha (Banaras Hindu University, India) and Ratneshwer Gupta (Jawaharlal Nehru University, India)
DOI: 10.4018/978-1-5225-8407-0.ch020
Abstract
Opportunistic networks are one of the emerging evolutions of the network system. In opportunistic networks, nodes are able to communicate with each other even if the route between source to destination does not already exist. Opportunistic networks have to be delay tolerant in nature (i.e., able to tolerate larger delays). Delay tolerant network (DTNs) uses the concept of “store-carry-forward” of data packets. DTNs are able to transfer data or establish communication in remote area or crisis environment where there is no network established. DTNs have many applications like to provide low-cost internet provision in remote areas, in vehicular networks, noise monitoring, extreme terrestrial environments, etc. It is therefore very promising to identify aspects for integration and inculcation of opportunistic network methodologies and technologies into delay tolerant networking. In this chapter, the authors emphasize delay tolerant networks by considering its architectural, routing, congestion, and security issues.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR