A large amount of personal data is being collected in the form of metadata or personal identification data having the potential of invading the privacy of the data subject, even when collected anonymously. The consentisan instrument in the hands of data subjects to control their personal data in the context of EU data privacy framework.Â Â Â The consent plays an important role inÂ legitimising the processing of personal data and EU has place high stakes on this concept at the cost of other legitimising factors like contract, which probably would be amore attractive proposition for market Â forces. There is are al possibility that by the time GDPRis adopted by member states, the enforcement of the violations of the provisions related to the consent becomes impossible and redund antinview of rapidly evolving information society services.
The internet and its applications are an important part of oneâ€™s daily life. Todayâ€™s internet needs to provide best effort service. The demands for quality of service have rapidly developed due to the rapid transformation of the Internet into a commercial infrastructure. Traffic is processed as quickly as possible, but there is no guarantee of timelines or actual delivery. As the masses of modern world are very much dependent on various network services like VOIP, video conferencing and file transfer. So to prevent the problem of congestion control and synchronization, various active queue management (AQM) techniques are used. AQM algorithms execute on network routers and detect initial congestion by monitoring some functions. When congestion occurs on the link the AQM algorithm detects and provides signals to the end systems. In this paper, we evaluate several queue management algorithms with respect to their abilities of maintaining high resource utilization, identifying and restricting disproportionate bandwidth usage, and their deployment complexity. We compare the performance of RED, FRED, BLUE, SFB, and CHOKe based on simulation results. The characteristics of different algorithms are also discussed and compared.