Conventionally, most network protocols assume that the network entities who participate in the network activities will always behave as instructed. However, in practice, most netwo...
Weizhao Wang, Xiang-Yang Li, Yu Wang 0003, Zheng S...
Abstract—We investigate the performance of TCP under three representatives of packet scheduling algorithms at the router. Our main focus is to investigate how fair service can be...
Go Hasegawa, Takahiro Matsuo, Masayuki Murata, Hid...
This paper describes our experiences in the development of the UDP-based Data Transport (UDT) protocol, an application level transport protocol used in distributed data intensive ...
— Conventionally, most network protocols assume that the network entities who participate in the network activities will always behave as instructed. However, in practice, most n...
Weizhao Wang, Xiang-Yang Li, Zheng Sun, Yu Wang 00...
— This paper contains a detailed description of the congestion control algorithm of TRAM, a tree-based reliable multicast protocol. This algorithm takes advantage of regular ackn...
Dah-Ming Chiu, Miriam Kadansky, Joe Provino, Josep...