• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 7,994
Next 10 →

CTCP: A Transparent Centralized TCP/IP Architecture for Network Security

by Fu-hau Hsu, Tzi-cker Chiueh - In: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC , 2004
"... Many network security problems can be solved in a centralized TCP (CTCP) architecture, in which an organization's edge router transparently proxies every TCP connection between an internal host and an external host on the Internet. This paper describes the design, implementation, and evaluation ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Many network security problems can be solved in a centralized TCP (CTCP) architecture, in which an organization's edge router transparently proxies every TCP connection between an internal host and an external host on the Internet. This paper describes the design, implementation

A TCP/IP Architecture for Connectional Parallelism with Low Synchronization Overhead

by Jordi Ros, Rod Allen, Tcp/ip Acceleration Group, Xiran Labs, Wei K. Tsai
"... Abstract – A new architecture is proposed to accelerate network oriented processing in multiprocessor systems. The key is to recognize the connection nature of the tasks and to distribute them onto processors with as much awareness of known properties of the tasks. The approach enables us to transfo ..."
Abstract - Add to MetaCart
Abstract – A new architecture is proposed to accelerate network oriented processing in multiprocessor systems. The key is to recognize the connection nature of the tasks and to distribute them onto processors with as much awareness of known properties of the tasks. The approach enables us

I-TCP: Indirect TCP for mobile hosts

by Ajay Bakre, B. R. Badrinath , 1995
"... Abstract — IP-based solutions to accommodate mobile hosts within existing internetworks do not address the distinctive features of wireless mobile computing. IP-based transport protocols thus suffer from poor performance when a mobile host communicates with a host on the fixed network. This is cause ..."
Abstract - Cited by 614 (7 self) - Add to MetaCart
(MSRs) to provide transport layer communication between mobile hosts and hosts on the fixed network. With I-TCP, the problems related to mobility and the unreliability of wireless link are handled entirely within the wireless link; the TCP/IP software on the fixed hosts is not modified. Using I-TCP

TCP and Explicit Congestion Notification

by Sally Floyd - In: ACM Computer Communication Review, V. 24 N , 1994
"... This paper discusses the use of Explicit Congestion Notification (ECN) mechanisms in the TCP/IP protocol. The first part proposes new guidelines for TCP’s response to ECN mechanisms (e.g., Source Quench packets, ECN fields in packet headers). Next, using simulations, we explore the benefits and draw ..."
Abstract - Cited by 636 (13 self) - Add to MetaCart
This paper discusses the use of Explicit Congestion Notification (ECN) mechanisms in the TCP/IP protocol. The first part proposes new guidelines for TCP’s response to ECN mechanisms (e.g., Source Quench packets, ECN fields in packet headers). Next, using simulations, we explore the benefits

The Performance of TCP/IP for Networks with High Bandwidth-Delay Products and Random Loss.

by Member, IEEE T V Lakshman , Senior Member, IEEE Upamanyu Madhow - IEEE/ACM Trans. Networking, , 1997
"... Abstract-This paper examines the performance of TCP/IP, the Internet data transport protocol, over wide-area networks (WANs) in which data traffic could coexist with real-time traffic such as voice and video. Specifically, we attempt to develop a basic understanding, using analysis and simulation, ..."
Abstract - Cited by 465 (6 self) - Add to MetaCart
Abstract-This paper examines the performance of TCP/IP, the Internet data transport protocol, over wide-area networks (WANs) in which data traffic could coexist with real-time traffic such as voice and video. Specifically, we attempt to develop a basic understanding, using analysis and simulation

Improving TCP/IP performance over wireless networks

by Hari Balakrishnan, Srinivasan Seshan, Elan Amir, Randy H. Katz - IN PROCEEDINGS, 1ST ACM CONF. ON MOBILE COMPUTING AND NETWORKING , 1995
"... TCP is a reliable transport protocol tuned to perform well in traditional networks made up of links with low bit-error rates. Networks with higher bit-error rates, such as those with wireless links and mobile hosts, violate many of the assumptions made by TCP, causing degraded end-to-end performance ..."
Abstract - Cited by 433 (18 self) - Add to MetaCart
TCP is a reliable transport protocol tuned to perform well in traditional networks made up of links with low bit-error rates. Networks with higher bit-error rates, such as those with wireless links and mobile hosts, violate many of the assumptions made by TCP, causing degraded end

A Scalable, Commodity Data Center Network Architecture

by Mohammad Al-Fares, Alexander Loukissas, Amin Vahdat , 2008
"... Today’s data centers may contain tens of thousands of computers with significant aggregate bandwidth requirements. The network architecture typically consists of a tree of routing and switching elements with progressively more specialized and expensive equipment moving up the network hierarchy. Unfo ..."
Abstract - Cited by 466 (18 self) - Add to MetaCart
backward compatible with Ethernet, IP, and TCP.

An Architecture for Wide-Area Multicast Routing

by Stephen Deering , Deborah Estrin , Dino Farinacci , Van Jacobson , Ching-gung Liu, Liming Wei
"... Existing multicast routing mechanisms were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. When group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets or ..."
Abstract - Cited by 534 (22 self) - Add to MetaCart
is measured in terms of the state, control message processing, and data packet processing, required across the entire network in order to deliver data packets to the members of the group. Our Protocol Independent Multicast (PIM) architecture: (a) maintains the traditional IP multicast service model

Integrated services in the internet architecture: an overview (RFC

by Group R. Braden, S. Shenker, Scott Shenker, Lixia Zhang, Deborah Estrin, Sugih Jamin , 1633
"... This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited. This memo discusses a proposed extension to the Internet architecture and protocols to provide integrated services, i.e., to support real-ti ..."
Abstract - Cited by 737 (24 self) - Add to MetaCart
This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited. This memo discusses a proposed extension to the Internet architecture and protocols to provide integrated services, i.e., to support real

A Delay-Tolerant Network Architecture for Challenged Internets

by Kevin Fall , 2003
"... The highly successful architecture and protocols of today’s Internet may operate poorly in environments characterized by very long delay paths and frequent network partitions. These problems are exacerbated by end nodes with limited power or memory resources. Often deployed in mobile and extreme env ..."
Abstract - Cited by 953 (12 self) - Add to MetaCart
environments lacking continuous connectivity, many such networks have their own specialized protocols, and do not utilize IP. To achieve interoperability between them, we propose a network architecture and application interface structured around optionally-reliable asynchronous message forwarding, with limited
Next 10 →
Results 1 - 10 of 7,994
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University