Date Added: Jul 2011
Identifying the victimized packets which are dropped in the router and revoking them for further utilization and also to protect from hackers. It is quite challenging to attribute a missing packet to a malevolent action because normal network congestion cannot produce the same effect. Static user-defined threshold and ? protocol approached this issue but it is fundamentally limiting, based on measured traffic rates and buffer sizes. This approach does not infer dynamically and here always a possibility of losing the packets. The number of congestive packet losses that will create an ambiguity.