A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
How to model a TCP/IP network using only 20 parameters
2010
Proceedings of the 2010 Winter Simulation Conference
Such models are difficult to understand, parameterize and investigate. This paper explains how to model a modern data communication network concisely, using only 20 parameters. ...
Most simulation models for data communication networks encompass hundreds of parameters that can each take on millions of values. ...
CONCLUSIONS We defined a concise TCP/IP network model that can be configured using only 20 parameters. ...
doi:10.1109/wsc.2010.5679106
dblp:conf/wsc/MillsSY10
fatcat:j7epwf2llze7xam2yrz2r6t75y
TCP/IP modeling and validation
2001
IEEE Network
This has motivated the introduction of a new parameter to RED (the gentle parameter) in order to avoid such a jump. ...
As we will see later, a model for the network also has to describe how the RTT of the connection varies. The variation of the RTT determines the variation of the window between congestion events. ...
The author would also like to thank his colleagues at ESSI, ENST, and the University of South Australia for providing the required material to conduct the experiments. ...
doi:10.1109/65.923939
fatcat:wamptnvaonfini4drkjvfjktw4
TCP/IP Protocol Suite
2020
International Journal of Scientific Research in Computer Science Engineering and Information Technology
TCP/IP model is used widely and it is essential to understand how different protocols work to provide different functionalities. ...
Each layer of TCP/IP model generally has more than one protocol for carrying out the functions that the layer complies to. ...
The TCP/IP model is hierarchical meaning that every protocol of lower layer supports the protocol on the above higher layers. ...
doi:10.32628/cseit206420
fatcat:dk2jnlotknbutcsiyoce5f6ldu
TCP/IP: The next generation
1995
IBM Systems Journal
hosts in a TCP/IP network. ...
Adetailed paper on TCP/IP performance modeling using this newly developed IBM tool is a subject for future pub- lication.
. ...
doi:10.1147/sj.343.0452
fatcat:p2d5xc2xpva33og7sjptb5dhb4
TCP/IP traffic dynamics and network performance
2001
Computer communication review
The main objective of this paper is to demonstrate in the context of a simple TCP/IP-based network that depending on the underlying assumptions about the inherent nature of the dynamics of network traffic ...
to be endogenous in nature (i.e., a result of the "closed loop" nature of the feedback-based congestion control algorithm of TCP) or exogenously determined (i.e., given by some conventional traffic model ...
Acknowledgments We would like to acknowledge Polly Huang for her help with the ns-~-simulations and Sally Floyd for valuable comments and providing references to related studies. ...
doi:10.1145/505666.505670
fatcat:ui5nuyqwova6rezy2vlclmplaa
TCP/IP Timing Channels: Theory to Implementation
2009
IEEE INFOCOM 2009 - The 28th Conference on Computer Communications
The other is to use timing channels to communicate at a low data rate without being detected. In this paper, we design and implement a covert TCP/IP timing channel. ...
We are able to quantify the achievable data rate (or leak rate) of such a covert channel. ...
In TCP/IP networks, end-to-end delays are much larger than the jitter. ...
doi:10.1109/infcom.2009.5062145
dblp:conf/infocom/SellkeWBS09
fatcat:tirr3eyklrgxtb3ukq622u3dlm
Embedding Covert Channels into TCP/IP
[chapter]
2005
Lecture Notes in Computer Science
Previous work on TCP/IP steganography does not take this into account and, by examining TCP/IP specifications and open source implementations, we have developed tests to detect the use of naïve embedding ...
The techniques used can be extended to other operating systems. A message can thus be hidden in such a way that an attacker cannot demonstrate its existence without knowledge of a secret key. ...
Acknowledgments: Thanks are due to Joanna Rutkowska, George Danezis and Richard Clayton for their helpful contributions. ...
doi:10.1007/11558859_19
fatcat:qh6m6hgquvh2pb6tb5xqto3jva
Broadband Satellite Network: TCP/IP Performance Analysis
[chapter]
2000
Broadband Communications
Several performance issues need to be addressed before a transport layer protocol, like TCP can satisfactorily work over satellite ATM for large delay-bandwidth networks. ...
A number of satellite communication systems have been proposed using geosynchronous (GEO) satellites, as well as low earth orbit (LEO) constellations operating in the Ka-band and above. ...
to explain how much each factor contributes to the total variation. ...
doi:10.1007/978-0-387-35579-5_24
fatcat:zl3k5khyjzdthhqys5lecajqgi
A case for context-aware TCP/IP
2002
Performance Evaluation Review
We evaluate the performance of the context-aware TCP/IP approach first using ns-2 network simulation, and then using WAN emulation to test a prototype implementation of CATNIP in the Linux kernel of an ...
Simulation results indicate a 10-20% reduction in TCP packet loss using simple endpoint control mechanisms, with no adverse impact on Web page retrieval times. ...
We use this example to support the case for a general "context-aware" TCP/IP. ...
doi:10.1145/512840.512843
fatcat:tidvkh6imndftklqfhlgadpi2a
Satellite ATM Network Architectural Considerations and TCP/IP Performance
[article]
1998
arXiv
pre-print
We have presented the buffer requirements for TCP/IP traffic over ATM-UBR for satellite latencies. ...
Several issues such as the ATM service model, media access protocols, and traffic management issues must be considered when designing a satellite ATM network to effectively transport Internet traffic. ...
TCP IP TRAFFIC OV E R A S A TELLITE-ATM NETWORK The ATM Unspeci ed Bit Rate UBR service category is expected to be used by a wide range of applications. ...
arXiv:cs/9809062v1
fatcat:4wgap6fosrcahjxevvfouhdcki
A Robust Classifier for Passive TCP/IP Fingerprinting
[chapter]
2004
Lecture Notes in Computer Science
NAT (Network Address Translation) Deployment• More on these later...TCP/IP Fingerprinting Background• Observation: TCP Stacks between Vendors and OS Versions are Unique • Differences Due to: -A "Probe ...
• We seek to determine the practical impact of these limitations and how well alternate approach works in comparison. • Contributions of this Work: -Developed Robust tool for TCP/IP Fingerprinting -Measure ...
doi:10.1007/978-3-540-24668-8_16
fatcat:wdeq7e2uqzf6diampoqb7a6pmi
TCP/IP over the Bluetooth Wireless Ad-hoc Network
[chapter]
2000
Lecture Notes in Computer Science
In this paper we analyse how well Bluetooth can carry TCP/IP traffic and in particular we show that though the radio channel is very disturbed the TCP Vegas protocol with its flow control mechanism can ...
Bluetooth is a wireless ad-hoc network concept that was presented in February 1998 by its five original promoters Ericsson, Nokia, IBM, Toshiba and Intel. ...
In this paper, we present a detailed simulation model of TCP/IP over Bluetooth. We use this model to examine the maximum throughput and packet delays for TCP/IP traffic under various conditions. ...
doi:10.1007/3-540-45551-5_67
fatcat:rpzq5pnnufhyrjs7uh4m2kjkhi
Cross-layer optimization in TCP/IP networks
2005
IEEE/ACM Transactions on Networking
Third, the algorithms developed for network flow problems are typically centralized and therefore cannot model TCP/IP iterations or be carried out in a large network where they must be decentralized. ...
Since multipath problem upper bounds the TCP/IP problem, the work on network flow problems provides insight on the performance limit of TCP/IP. There are however differences. ...
To simplify notation, we will henceforth use TCP-AQM/IP and TCP/IP interchangeably. ...
doi:10.1109/tnet.2005.850219
fatcat:lkenxphoeredxdyjsldpoxypai
Improving Control Mechanism at Routers in TCP/IP Network
2014
EAI Endorsed Transactions on Context-aware Systems and Applications
To solve this problem, we propose a solution combined fuzzy reasoning with neural network control put on active queue management mechanisms at the network nodes ...
The existing control mechanisms at the network nodes have a good active and very effective at each local router, but they do not still strong enough to control nonlinear and dynamical behaviour of the ...
Dynamical model of TCP We can realize that the entire TCP/IP is a feedback system linked as described in Figure 1 . ...
doi:10.4108/casa.1.1.e6
fatcat:5ltuaph5vnghdjzpawpotb2lza
Performance Evaluation
[chapter]
2012
End to End Adaptive Congestion Control in TCP/IP Networks
These networks constitute a new application area for this process algebra formalism. We show that this formalism can easily be used to model such systems. ...
We present a performance evaluation study of hierarchical cellular networks using Performance Evaluation Process Algebra (PEPA). ...
We then describe our PEPA model of the network and show briefly how to apply the strong equivalence aggregation technique of PEPA to simplify the model. ...
doi:10.1201/b11870-13
fatcat:4neueqaigrcx3mqzrueni4mimq
« Previous
Showing results 1 — 15 out of 13,790 results