Sciweavers

785 search results - page 136 / 157
» Cache Behavior of Network Protocols
Sort
View
CCR
2006
118views more  CCR 2006»
13 years 7 months ago
Tmix: a tool for generating realistic TCP application workloads in ns-2
In order to perform realistic network simulations, one needs a traffic generator that is capable of generating realistic synthetic traffic in a closed-loop fashion that "look...
Michele C. Weigle, Prashanth Adurthi, Félix...
ESA
2005
Springer
114views Algorithms» more  ESA 2005»
14 years 1 months ago
Making Chord Robust to Byzantine Attacks
Chord is a distributed hash table (DHT) that requires only O(logn) links per node and performs searches with latency and message cost O(logn), where n is the number of peers in the...
Amos Fiat, Jared Saia, Maxwell Young
GLOBECOM
2009
IEEE
14 years 2 months ago
ANTS - A Framework for Knowledge Based NAT Traversal
—Today most home networks are connected to the Internet via Network Address Translation (NAT) devices. NAT is an obstacle for services that should be accessible from the public I...
Andreas Müller, Andreas Klenk, Georg Carle
INFOCOM
2000
IEEE
13 years 12 months ago
The Chaotic Nature of TCP Congestion Control
— In this paper we demonstrate how TCP congestion control can show chaotic behavior. We demonstrate the major features of chaotic systems in TCP/IP networks with examples. These ...
Andras Veres, Miklós Boda
INFOCOM
2006
IEEE
14 years 1 months ago
TCP Internal Buffers Optimization for Fast Long-Distance Links
— In recent years, issues regarding the behavior of TCP in high-speed and long-distance networks have been extensively addressed in the networking research community, both becaus...
Andrea Baiocchi, Saverio Mascolo, Francesco Vacirc...