Tcp
15 Followers
Recent papers in Tcp
This paper provides an overview of cellular networks and wireless Internet. It focuses on the problems of providing multimedia services over these networks, and highlights the latest developments in the area. This is done by providing... more
Stored fast ion beams in atomic and molecular collision experiments are discussed with an emphasis on electron-ion interactions at low relative energies. Recent progress was obtained in electron collision spectroscopy using an... more
Data centers provide resources for a broad range of services, such as web search, email, web sites, etc., each with different delay requirements. For example, web search should cater to users' requests quickly, while data backup has no... more
Most of future digital services for home and office users will be deployed and delivered through the Internet and wireless connectivity. However, employing regular access points (APs) and protocols will not allow an efficient coexistence... more
LTE (Long Term Evolution) networks have been introduced in 3GPP (Third Generation Partnership Project) release 8 specifications, with an objective of high-data-rate, low latency and packet-optimized radio access technology. This paper... more
Traditional analysis on the TCP performance attributes the overhead of TCP mainly on these aspects: many times of memory access and copy, much data transmission on bus and a large number of CPU cycles required by the protocol processing.... more
Data centers provide resources for a broad range of services, such as web search, email, web sites, etc., each with different delay requirements. For example, web search should cater to users' requests quickly, while data backup has no... more
TCP is the most widely used transport protocol on the Internet today. Over the years, especially recently, due to requirements of high bandwidth transmission, various approaches have been proposed to improve TCP performance. The Linux 2.6... more
The past decade has seen the rapid development of new strategies for the design of biodegradable macromolecular compounds, with properly suited architecture and tailored properties, functioning as temporary support for the engineering of... more
Titanium and its alloys are widely used as implant materials. Their integration in the bone is in general very good without fibrous interface layer. However, titanium and its alloys have certain limitations. Metal ions are released from... more
Replacing malfunctioning tissues with titanium-based implants has become a widespread practice spurred by population aging. Advances in biomaterials, technology and implantation protocols have led to increasing expectations on the... more
Designing efficient transmission mechanisms for advanced satellite networks is a demanding task, requiring the definition and the implementation of protocols and architectures well suited to this challenging environment. In particular,... more
Transport connections set up in wireless ad hoc networks are plagued by problems such as high bit error rates, frequent route changes, and partitions. If we run transmission control protocol (TCP) over such connections, the throughput of... more
The widely used reliable transport protocol TCP, is an end to end protocol designed for the wireline networks characterized by negligible random packet losses. This paper represents exploratory study of TCP congestion control principles... more
Several objectives have been identified in developing the random early drop (RED): decreasing queueing delay, increasing throughput, and increasing fairness between short and long lived connections. It has been believed that indeed the... more
The new opportunities opened up by wireless technologies are also accompanied with new technical challenges. Principal among the challenges is the fact that wireless medium has limited bandwidth resources when compared with wired... more
Abstract: Audio/Video Streaming services enable us to watch videos or listen to music from anywhere and from any web enabled multimedia device like our personal computers or smart phones. All that the user requires other than a personal... more
Corresponding developments in technology, information access more affordable and easier. Today, more communications media that can be applied as a medium of information access. One way is to use wireless technology or media without cable... more
IP spoofing is one of the most common forms of on-line disguise. Hackers have long employed the tactic of disguising their true identity. It exploits the security weaknesses in TCP/IP protocol suite. This paper evaluates basic techniques... more
This paper introduces and analyzes a class of nonlinear congestion control algorithms called binomial algorithms, motivated in part by the needs of streaming audio and video applications for which a drastic reduction in transmission rate... more
Implementing Network File System] protocol for larger block or packet transfer over to Network Attached Storage] from clients. Network Attached Storage scalability is habitually inadequate to the volume of the appliance. Addition of an... more
Human microsomes from duodenum and ileum/jejunum were used. The toxic metabolite chlorpyrifos-oxon was the only one formed. 10-fold interindividual variability was observed. Bioactivation was confined in the duodenum, declining toward the... more
a b s t r a c t E341 (tricalcium phosphate) (TCP) is commonly used as a food additive and also as a nutritional supplement. To evaluate the possible developmental effects, female Wistar rats were treated with E341 (TCP) by oral gavage... more
This paper describes the design, implementation and performance of an open, high performance, dynamically extensible router under development at Washington University in St. Louis. This router supports the dynamic installation of software... more
Providing reliable data communications over wireless channels is a challenging task because time-varying wireless channel characteristics often lead to bit errors. These errors result in loss of IP packets and, consequently, TCP segments... more
The performance of a distributed system is affected by the various functions of its components. The interaction between components such as network nodes, computer systems and system programs is examined with special interest accorded to... more
Computer network technologies have been growing explosively. Teaching computer networking principles can be enhanced using simulation through the use of interactive (not statistical based) simulation. The curriculum is based on the theory... more
This paper introduces and analyzes a class of nonlinear congestion control algorithms called binomial algorithms, motivated in part by the needs of streaming audio and video applications for which a drastic reduction in transmission rate... more
In this paper an effort has been made to study various Congestion control techniques used for reducing/easing the level of congestion and subsequently avoiding the congestion of the wired communication networks in general and High Speed... more
This paper presents a novel mathematical model for the TCP Tragedy of the Commons, using Game Theory concepts. This tragedy may appear in a TCP/IP-based network when hosts do not respect the protocol rules and try to monopolize the shared... more
Please cite this article in press as: M. Noguero, et al., The role of the DNA-binding One Zinc Finger (DOF) transcription factor family in plants, Plant Sci. (2013), http://dx.a b s t r a c t
This paper discusses a case study, the co-design of an ATM Network Interface Card (NIC). The NIC is aimed to interface applications with the physical network line. It is composed of a stack of four protocol layers: TCP, IP, AAL and ATM.
Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. At the same time they do not give sufficient control to the network to control the handover process. This... more
The self-clocking principle (SCP) of Transmission Control Protocol (TCP) had been analyzed for a network implementing a per-flow buffering scheme. The ideal SCP is yet unknown for the Internet which implements a first-in-first-out... more
The current congestion control mechanism used in TCP has difficulty reaching full utilization on high speed links, particularly on wide-area connections. For example, the packet drop rate needed to fill a Gigabit pipe using the present... more
There is a growing interest in the use of variants of the Transmission Control Protocol (TCP) in high-speed networks. ns-2 has implementations of many of these high-speed TCP variants, as does Linux. ns-2, through an extension, permits... more
In networks with very large delay like satellite IPbased networks, standard TCP is unable to correctly grab the available resources. To overcome this problem, Performance Enhancing Proxies (PEPs), which break the end-to-end connection and... more
Increasingly, multimedia applications need higher bandwidth to provide better quality, for example in multi-party HD video conferencing. This demanding class of interactive applications simultaneously require high bandwidth and low... more