In this paper, we propose an analytic approach of modeling a closed-loop network with multiple feedback loops using fluid-flow approximation. Specifically, we model building bl...
— Performance in multihop wireless networks is known to degrade with the number of hops for both TCP and UDP traffic. For VoIP, the wireless network presents additional challeng...
Dragor Niculescu, Samrat Ganguly, Kyungtae Kim, Ra...
A number of science applications employing collaborative computations require transport methods that guarantee end-to-end performance at the application level. Throughputs achieve...
Qishi Wu, Nageswara S. V. Rao, S. Sitharama Iyenga...
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
Traces of Internet packets from the past two years show that between 1 packet in 1,100 and 1 packet in 32,000 fails the TCP checksum, even on links where link-level CRCs should ca...