• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 8,206
Next 10 →

Analysis and evaluation of the TCP/IP protocol stack of LINUX

by Guo Chuanxiong, Zheng Shaoren - In Proceedings of ICCT 2000 , 2000
"... Abstract-With the rapid progress of high-speed network technology, the communication speed between hosts will reach giga bls. So i t is important to investigate the traditional TCPllP protocol stack to find out whether i t is suitable for high-speed communication and can provide QoS or not. Based on ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
, the time consuming of each layer and the queuing of the IP layer a t high speed are tested. Our experiments show that the throughput of TCP/IP stack of LINUX can reach 360MbitIs a t the sending side and ISOMbit/s when the localhost device is used at bi-direction, the protocol stack can be improved

Security Analysis of Voice-over-IP Protocols

by Prateek Gupta, Vmware Inc
"... The transmission of voice communications as datagram packets over IP networks, commonly known as Voice-over-IP (VoIP) telephony, is rapidly gaining wide acceptance. With private phone conversations being conducted on insecure public networks, security of VoIP communications is increasingly important ..."
Abstract - Cited by 11 (0 self) - Add to MetaCart
important. We present a structured security analysis of the VoIP protocol stack, which consists of signaling (SIP), session description (SDP), key establishment (SDES, MIKEY, and ZRTP) and secure media transport (SRTP) protocols. Using a combination of manual and tool-supported formal analysis, we uncover

What TCP/IP Protocol Headers Can Tell Us About the Web

by F. Donelson Smith, Felix Hernandez-Campos, Kevin Jeffay, David Ott - in ACM SIGMETRICS , 2001
"... : We report the results of a large-scale empirical study of web traffic. Our study is based on over 500 GB of TCP/IP protocol-header traces collected in 1999 and 2000 (approximately one year apart) from the high-speed link connecting a large university to its Internet service provider. We also use a ..."
Abstract - Cited by 94 (10 self) - Add to MetaCart
: We report the results of a large-scale empirical study of web traffic. Our study is based on over 500 GB of TCP/IP protocol-header traces collected in 1999 and 2000 (approximately one year apart) from the high-speed link connecting a large university to its Internet service provider. We also use

RSVP: A New Resource Reservation Protocol

by Lixia Zhang, Stephen Deering, Deborah Estrin, Scott Shenker, et al. , 1993
"... Whe origin of the RSVP protocol can be traced back to 1991, when a team of network researchers, including myself, started playing with a number of packet scheduling algorithms on the DARTNET (DARPA Testbed NETwork), a network testbed made of open source, workstation-based routers. Because scheduling ..."
Abstract - Cited by 1005 (25 self) - Add to MetaCart
that could support both unicast and many-to-many multicast applications. That effort led to the birth of RSVP. As a signaling protocol designed specifically to run over IP, RSVP distinguishes itself from previous signaling protocols in several fundamental ways. The most profound ones include a soft

TYPES OF ADDRESSES AND LEVELS OF USE IN THE TCP/IP PROTOCOL STACK

by Gencho Stoitsov
"... Abstract. The publication comments on certain moments of the method of teaching the types of addresses and their use in the TCP/IP protocol stack. ..."
Abstract - Add to MetaCart
Abstract. The publication comments on certain moments of the method of teaching the types of addresses and their use in the TCP/IP protocol stack.

A Parallel TCP/IP Protocol Implementation

by Paul Mackerras, David Sitsky
"... . With the ever-increasing network data rates available, the throughput achieved on a connection over a fast network using a transport protocol such as TCP/ IP can easily be limited by the speed of the processor used to implement the transport protocol, rather than the network data rate. Distributin ..."
Abstract - Add to MetaCart
. With the ever-increasing network data rates available, the throughput achieved on a connection over a fast network using a transport protocol such as TCP/ IP can easily be limited by the speed of the processor used to implement the transport protocol, rather than the network data rate

A Proposal to add Explicit Congestion Notification (ECN) to IP

by K. Ramakrishnan, S. Floyd , 1999
"... This note describes a proposed addition of ECN (Explicit Congestion Notification) to IP. TCP is currently the dominant transport protocol used in the Internet. We begin by describing TCP's use of packet drops as an indication of congestion. Next we argue that with the addition of active queue m ..."
Abstract - Cited by 472 (26 self) - Add to MetaCart
This note describes a proposed addition of ECN (Explicit Congestion Notification) to IP. TCP is currently the dominant transport protocol used in the Internet. We begin by describing TCP's use of packet drops as an indication of congestion. Next we argue that with the addition of active queue

TCP and Explicit Congestion Notification

by Sally Floyd - In: ACM Computer Communication Review, V. 24 N , 1994
"... This paper discusses the use of Explicit Congestion Notification (ECN) mechanisms in the TCP/IP protocol. The first part proposes new guidelines for TCP’s response to ECN mechanisms (e.g., Source Quench packets, ECN fields in packet headers). Next, using simulations, we explore the benefits and draw ..."
Abstract - Cited by 636 (13 self) - Add to MetaCart
This paper discusses the use of Explicit Congestion Notification (ECN) mechanisms in the TCP/IP protocol. The first part proposes new guidelines for TCP’s response to ECN mechanisms (e.g., Source Quench packets, ECN fields in packet headers). Next, using simulations, we explore the benefits

The Design and Implement of TCP/IP Protocol Cluster on AVR Singlechip

by Rong Pan, Hai Zhao, Jialiang Wang, Dan Liu, Penghua Cai , 2010
"... With the rapid development of the embedded technology, research and implement of the Internet of things will be a new technology revolution, yet the implement of the Internet of things is on the base of the communication between the things. For this reason, realizing the function of communication be ..."
Abstract - Add to MetaCart
between singlechip is particularly important. Based on the characteristics of the embedded microcontroller, we analyzed the traditional PC TCP/IP protocol, and appropri-ately tailored TCP/IP protocol cluster on the basis of the characteristics of embedded singlechip. At last, we realized the reduced TCP/IP

Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web

by David Karger, Eric Lehman, Tom Leighton, Matthew Levine, Daniel Lewin, Rina Panigrahy - IN PROC. 29TH ACM SYMPOSIUM ON THEORY OF COMPUTING (STOC , 1997
"... We describe a family of caching protocols for distrib-uted networks that can be used to decrease or eliminate the occurrence of hot spots in the network. Our protocols are particularly designed for use with very large networks such as the Internet, where delays caused by hot spots can be severe, and ..."
Abstract - Cited by 699 (10 self) - Add to MetaCart
, and where it is not feasible for every server to have complete information about the current state of the entire network. The protocols are easy to implement using existing network protocols such as TCP/IP, and require very little overhead. The protocols work with local control, make efficient use
Next 10 →
Results 11 - 20 of 8,206
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University