Filters








13,790 Hits in 8.0 sec

How to model a TCP/IP network using only 20 parameters

Kevin L. Mills, Edward J. Schwartz, Jian Yuan
2010 Proceedings of the 2010 Winter Simulation Conference  
Such models are difficult to understand, parameterize and investigate. This paper explains how to model a modern data communication network concisely, using only 20 parameters.  ...  Most simulation models for data communication networks encompass hundreds of parameters that can each take on millions of values.  ...  CONCLUSIONS We defined a concise TCP/IP network model that can be configured using only 20 parameters.  ... 
doi:10.1109/wsc.2010.5679106 dblp:conf/wsc/MillsSY10 fatcat:j7epwf2llze7xam2yrz2r6t75y

TCP/IP modeling and validation

C. Barakat
2001 IEEE Network  
This has motivated the introduction of a new parameter to RED (the gentle parameter) in order to avoid such a jump.  ...  As we will see later, a model for the network also has to describe how the RTT of the connection varies. The variation of the RTT determines the variation of the window between congestion events.  ...  The author would also like to thank his colleagues at ESSI, ENST, and the University of South Australia for providing the required material to conduct the experiments.  ... 
doi:10.1109/65.923939 fatcat:wamptnvaonfini4drkjvfjktw4

TCP/IP Protocol Suite

Ashima Tyagi
2020 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
TCP/IP model is used widely and it is essential to understand how different protocols work to provide different functionalities.  ...  Each layer of TCP/IP model generally has more than one protocol for carrying out the functions that the layer complies to.  ...  The TCP/IP model is hierarchical meaning that every protocol of lower layer supports the protocol on the above higher layers.  ... 
doi:10.32628/cseit206420 fatcat:dk2jnlotknbutcsiyoce5f6ldu

TCP/IP: The next generation

E. G. Britton, J. Tavs, R. Bournas
1995 IBM Systems Journal  
hosts in a TCP/IP network.  ...  Adetailed paper on TCP/IP performance modeling using this newly developed IBM tool is a subject for future pub- lication. .  ... 
doi:10.1147/sj.343.0452 fatcat:p2d5xc2xpva33og7sjptb5dhb4

TCP/IP traffic dynamics and network performance

Youngmi Joo, Vinay Ribeiro, Anja Feldmann, Anna C. Gilbert, Walter Willinger
2001 Computer communication review  
The main objective of this paper is to demonstrate in the context of a simple TCP/IP-based network that depending on the underlying assumptions about the inherent nature of the dynamics of network traffic  ...  to be endogenous in nature (i.e., a result of the "closed loop" nature of the feedback-based congestion control algorithm of TCP) or exogenously determined (i.e., given by some conventional traffic model  ...  Acknowledgments We would like to acknowledge Polly Huang for her help with the ns-~-simulations and Sally Floyd for valuable comments and providing references to related studies.  ... 
doi:10.1145/505666.505670 fatcat:ui5nuyqwova6rezy2vlclmplaa

TCP/IP Timing Channels: Theory to Implementation

S. H. Sellke, C.-C. Wang, S. Bagchi, N. Shroff
2009 IEEE INFOCOM 2009 - The 28th Conference on Computer Communications  
The other is to use timing channels to communicate at a low data rate without being detected. In this paper, we design and implement a covert TCP/IP timing channel.  ...  We are able to quantify the achievable data rate (or leak rate) of such a covert channel.  ...  In TCP/IP networks, end-to-end delays are much larger than the jitter.  ... 
doi:10.1109/infcom.2009.5062145 dblp:conf/infocom/SellkeWBS09 fatcat:tirr3eyklrgxtb3ukq622u3dlm

Embedding Covert Channels into TCP/IP [chapter]

Steven J. Murdoch, Stephen Lewis
2005 Lecture Notes in Computer Science  
Previous work on TCP/IP steganography does not take this into account and, by examining TCP/IP specifications and open source implementations, we have developed tests to detect the use of naïve embedding  ...  The techniques used can be extended to other operating systems. A message can thus be hidden in such a way that an attacker cannot demonstrate its existence without knowledge of a secret key.  ...  Acknowledgments: Thanks are due to Joanna Rutkowska, George Danezis and Richard Clayton for their helpful contributions.  ... 
doi:10.1007/11558859_19 fatcat:qh6m6hgquvh2pb6tb5xqto3jva

Broadband Satellite Network: TCP/IP Performance Analysis [chapter]

Sastri Kota, Mukul Goyal, Rohit Goyal, Raj Jain
2000 Broadband Communications  
Several performance issues need to be addressed before a transport layer protocol, like TCP can satisfactorily work over satellite ATM for large delay-bandwidth networks.  ...  A number of satellite communication systems have been proposed using geosynchronous (GEO) satellites, as well as low earth orbit (LEO) constellations operating in the Ka-band and above.  ...  to explain how much each factor contributes to the total variation.  ... 
doi:10.1007/978-0-387-35579-5_24 fatcat:zl3k5khyjzdthhqys5lecajqgi

A case for context-aware TCP/IP

Carey Williamson, Qian Wu
2002 Performance Evaluation Review  
We evaluate the performance of the context-aware TCP/IP approach first using ns-2 network simulation, and then using WAN emulation to test a prototype implementation of CATNIP in the Linux kernel of an  ...  Simulation results indicate a 10-20% reduction in TCP packet loss using simple endpoint control mechanisms, with no adverse impact on Web page retrieval times.  ...  We use this example to support the case for a general "context-aware" TCP/IP.  ... 
doi:10.1145/512840.512843 fatcat:tidvkh6imndftklqfhlgadpi2a

Satellite ATM Network Architectural Considerations and TCP/IP Performance [article]

Sastri Kota, Rohit Goyal, Raj Jain
1998 arXiv   pre-print
We have presented the buffer requirements for TCP/IP traffic over ATM-UBR for satellite latencies.  ...  Several issues such as the ATM service model, media access protocols, and traffic management issues must be considered when designing a satellite ATM network to effectively transport Internet traffic.  ...  TCP IP TRAFFIC OV E R A S A TELLITE-ATM NETWORK The ATM Unspeci ed Bit Rate UBR service category is expected to be used by a wide range of applications.  ... 
arXiv:cs/9809062v1 fatcat:4wgap6fosrcahjxevvfouhdcki

A Robust Classifier for Passive TCP/IP Fingerprinting [chapter]

Robert Beverly
2004 Lecture Notes in Computer Science  
NAT (Network Address Translation) Deployment• More on these later...TCP/IP Fingerprinting Background• Observation: TCP Stacks between Vendors and OS Versions are Unique • Differences Due to: -A "Probe  ...  • We seek to determine the practical impact of these limitations and how well alternate approach works in comparison. • Contributions of this Work: -Developed Robust tool for TCP/IP Fingerprinting -Measure  ... 
doi:10.1007/978-3-540-24668-8_16 fatcat:wdeq7e2uqzf6diampoqb7a6pmi

TCP/IP over the Bluetooth Wireless Ad-hoc Network [chapter]

Niklas Johansson, Maria Kihl, Ulf Körner
2000 Lecture Notes in Computer Science  
In this paper we analyse how well Bluetooth can carry TCP/IP traffic and in particular we show that though the radio channel is very disturbed the TCP Vegas protocol with its flow control mechanism can  ...  Bluetooth is a wireless ad-hoc network concept that was presented in February 1998 by its five original promoters Ericsson, Nokia, IBM, Toshiba and Intel.  ...  In this paper, we present a detailed simulation model of TCP/IP over Bluetooth. We use this model to examine the maximum throughput and packet delays for TCP/IP traffic under various conditions.  ... 
doi:10.1007/3-540-45551-5_67 fatcat:rpzq5pnnufhyrjs7uh4m2kjkhi

Cross-layer optimization in TCP/IP networks

Jiantao Wang, Lun Li, S.H. Low, J.C. Doyle
2005 IEEE/ACM Transactions on Networking  
Third, the algorithms developed for network flow problems are typically centralized and therefore cannot model TCP/IP iterations or be carried out in a large network where they must be decentralized.  ...  Since multipath problem upper bounds the TCP/IP problem, the work on network flow problems provides insight on the performance limit of TCP/IP. There are however differences.  ...  To simplify notation, we will henceforth use TCP-AQM/IP and TCP/IP interchangeably.  ... 
doi:10.1109/tnet.2005.850219 fatcat:lkenxphoeredxdyjsldpoxypai

Improving Control Mechanism at Routers in TCP/IP Network

Nguyen Kim Quoc, Vo Thanh Tu, Nguyen Thuc Hai
2014 EAI Endorsed Transactions on Context-aware Systems and Applications  
To solve this problem, we propose a solution combined fuzzy reasoning with neural network control put on active queue management mechanisms at the network nodes  ...  The existing control mechanisms at the network nodes have a good active and very effective at each local router, but they do not still strong enough to control nonlinear and dynamical behaviour of the  ...  Dynamical model of TCP We can realize that the entire TCP/IP is a feedback system linked as described in Figure 1 .  ... 
doi:10.4108/casa.1.1.e6 fatcat:5ltuaph5vnghdjzpawpotb2lza

Performance Evaluation [chapter]

2012 End to End Adaptive Congestion Control in TCP/IP Networks  
These networks constitute a new application area for this process algebra formalism. We show that this formalism can easily be used to model such systems.  ...  We present a performance evaluation study of hierarchical cellular networks using Performance Evaluation Process Algebra (PEPA).  ...  We then describe our PEPA model of the network and show briefly how to apply the strong equivalence aggregation technique of PEPA to simplify the model.  ... 
doi:10.1201/b11870-13 fatcat:4neueqaigrcx3mqzrueni4mimq
« Previous Showing results 1 — 15 out of 13,790 results