Since TCP is considered unsuitable for the majority of the emerging multimedia applications, these applications primarily use UDP transport together with proprietary congestion co...
The last decade has been a very fruitful period in important discoveries in network traffic modeling, uncovering various scaling behaviors. Self-similarity, long-range dependence,...
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
TCP(α,β) protocols trade the congestion window increase value α for the decrease ratio β , to generate smoother traffic patterns and to maintain a friendly behavior. In this p...
TCP Throughput Collapse, also known as Incast, is a pathological behavior of TCP that results in gross under-utilization of link capacity in certain many-to-one communication patt...
Yanpei Chen, Rean Griffith, Junda Liu, Randy H. Ka...