Results 1 - 10
of
3,696
Improving TCP/IP performance over wireless networks
- IN PROCEEDINGS, 1ST ACM CONF. ON MOBILE COMPUTING AND NETWORKING
, 1995
"... TCP is a reliable transport protocol tuned to perform well in traditional networks made up of links with low bit-error rates. Networks with higher bit-error rates, such as those with wireless links and mobile hosts, violate many of the assumptions made by TCP, causing degraded end-to-end performance ..."
Abstract
-
Cited by 433 (18 self)
- Add to MetaCart
TCP is a reliable transport protocol tuned to perform well in traditional networks made up of links with low bit-error rates. Networks with higher bit-error rates, such as those with wireless links and mobile hosts, violate many of the assumptions made by TCP, causing degraded end
The Performance of TCP/IP for Networks with High Bandwidth-Delay Products and Random Loss.
- IEEE/ACM Trans. Networking,
, 1997
"... Abstract-This paper examines the performance of TCP/IP, the Internet data transport protocol, over wide-area networks (WANs) in which data traffic could coexist with real-time traffic such as voice and video. Specifically, we attempt to develop a basic understanding, using analysis and simulation, ..."
Abstract
-
Cited by 465 (6 self)
- Add to MetaCart
Abstract-This paper examines the performance of TCP/IP, the Internet data transport protocol, over wide-area networks (WANs) in which data traffic could coexist with real-time traffic such as voice and video. Specifically, we attempt to develop a basic understanding, using analysis and simulation
The Political Nature of TCP/IP
, 2011
"... The Political Nature of TCP/IP Despite the importance of the Internet in the modern world, many users and even policy makers don’t have a necessary historical or technical grasp of the technology behind it. In the spirit of addressing this issue, this thesis attempts to shed light on the historical, ..."
Abstract
- Add to MetaCart
The Political Nature of TCP/IP Despite the importance of the Internet in the modern world, many users and even policy makers don’t have a necessary historical or technical grasp of the technology behind it. In the spirit of addressing this issue, this thesis attempts to shed light on the historical
Snooping on TCP/IP Streams
, 1997
"... TCP/IP has been the dominant network protocol suite since the 70's. Since then, numerous applications based on TCP/IP have been developed and delivered. However, not many low level TCP/IP debugging or tracking tools have been published. This project focuses on the TCP protocol, how to extract a ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
TCP/IP has been the dominant network protocol suite since the 70's. Since then, numerous applications based on TCP/IP have been developed and delivered. However, not many low level TCP/IP debugging or tracking tools have been published. This project focuses on the TCP protocol, how to extract
TCP/IP Over Satellite
, 2000
"... Introductory paper to current enhancements and aspects of TCP/IP over satellite channels. 1 1. This paper is an extended version. The original document dealing only with LEO satellite systems appeared in [BBW+00a]. ..."
Abstract
- Add to MetaCart
Introductory paper to current enhancements and aspects of TCP/IP over satellite channels. 1 1. This paper is an extended version. The original document dealing only with LEO satellite systems appeared in [BBW+00a].
The case for TCP/IP puzzles
- in ACM SIGCOMM Workshop on Future Directions in Network Architecture (FDNA03
, 2003
"... Since the Morris worm was unleashed in 1988, distributed denial-of-service (DDoS) attacks via worms and viruses have continued to periodically disrupt the Internet. Client puzzles have been proposed as one mechanism for protecting protocols against denial of service attacks. In this paper, we argue ..."
Abstract
-
Cited by 25 (6 self)
- Add to MetaCart
that such puzzles must be placed within the slim waistline of the TCP/IP protocol stack in order to truly provide protection. We then describe several scenarios in which TCP/IP puzzles could be used to thwart port scans and coordinated DDoS attacks. Finally, while puzzles hold the promise of being able to change
SCI for TCP/IP with Linux
- In Proceedings of SCI Europe 98
, 1998
"... In this paper, we present how SCI devices can be integrated in the TCP/IP protocol stack of Linux for high speed communication within a cluster. We designed a network driver which is using SCI at the physical layer to allow us to transfer data with high throughput and low latency. In our solution we ..."
Abstract
- Add to MetaCart
In this paper, we present how SCI devices can be integrated in the TCP/IP protocol stack of Linux for high speed communication within a cluster. We designed a network driver which is using SCI at the physical layer to allow us to transfer data with high throughput and low latency. In our solution
TCP/IP XML Solution
"... Since its introduction, Extensible Markup Language (XML) has evolved and helped us evolve in the way which we think about structuring, describing, and exchanging information. The ways in which XML is used in the software industry are many and growing. For example, for Web services the importance of ..."
Abstract
- Add to MetaCart
of XML is crucial; all key Web service technologies are based on it. In this paper it’s presented a TCP/IP XML solution for integrating an intermediary trading system with the Bucharest Stock Exchange trading system. The solution is presented from the intermediary point of view and can be the first step
Embedding covert channels into TCP/IP
- Information Hiding: 7th International Workshop, volume 3727 of LNCS
, 2005
"... Abstract. It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random ” data, such as the IP identifier, TCP initial sequence number (ISN) or the least significant bit of the TCP timestamp. We show that this is not the ..."
Abstract
-
Cited by 76 (3 self)
- Add to MetaCart
Abstract. It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random ” data, such as the IP identifier, TCP initial sequence number (ISN) or the least significant bit of the TCP timestamp. We show
Results 1 - 10
of
3,696