Bandwidth tradeoff between TCP and link-level FEC
Computer Networks: The International Journal of Computer and Telecommunications Networking
Bandwidth tradeoff between TCP and link-level FEC
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the long-run behavior of equation-based rate control
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method
WI '04 Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence
Performance Evaluation - Special issue: Distributed systems performance
A stochastic model of TCP/IP with stationary random losses
IEEE/ACM Transactions on Networking (TON)
Flow Control as a Stochastic Optimal Control Problem with Incomplete Information
Problems of Information Transmission
Machine-learnt versus analytical models of TCP throughput
Computer Networks: The International Journal of Computer and Telecommunications Networking
Performance analysis of AIMD mechanisms over a multi-state Markovian path
Computer Networks: The International Journal of Computer and Telecommunications Networking
Impact of TCP ACK losses on TCP fairness in wireless mesh networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
On the accuracy of analytical models of TCP throughput
NETWORKING'06 Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
Hi-index | 0.00 |
We discuss the different issues to be considered when modeling the TCP protocol in a real environment. The discussion is based on measurements we made over the Internet. We show that the Internet is so heterogeneous that a simplistic assumption about TCP congestion control or the network may lead to erroneous results. We outline some of our results in this field, and we present a novel approach For a correct validation of a model for TCP