New techniques for making transport protocols robust to corruption-based loss
暂无分享,去创建一个
[1] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[2] Jeffrey C. Mogul,et al. Fragmentation considered harmful , 1987, CCRV.
[3] Jon Postel,et al. Internet Control Message Protocol , 1981, RFC.
[4] Hari Balakrishnan,et al. Explicit Loss Notification and Wireless Web Performance , 2006 .
[5] V. Jacobson,et al. Congestion avoidance and control , 1988, CCRV.
[6] Benjamin Arazi,et al. A commonsense approach to the theory of error correcting codes , 1988, MIT Press Series in Computer Systems.
[7] Stephen E. Deering,et al. Path MTU discovery , 1990, RFC.
[8] David L. Black,et al. The Addition of Explicit Congestion Notification (ECN) to IP , 2001, RFC.
[9] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[10] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[11] Sally Floyd,et al. TCP Selective Acknowledgement Options , 1996 .
[12] Jerome H. Saltzer,et al. End-to-end arguments in system design , 1984, TOCS.
[13] Srinivasan Seshan,et al. Improving TCP/IP performance over wireless networks , 1995, MobiCom '95.
[14] Mark Handley,et al. Equation-based congestion control for unicast applications , 2000, SIGCOMM.
[15] Stephen E. Deering,et al. Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.
[16] Lixia Zhang,et al. Stream Control Transmission Protocol , 2000, RFC.
[17] B. R. Badrinath,et al. I-TCP: indirect TCP for mobile hosts , 1995, Proceedings of 15th International Conference on Distributed Computing Systems.
[18] Stephen Deering,et al. Internet Protocol Version 6(IPv6) , 1998 .
[19] Mischa Schwartz,et al. ACM SIGCOMM computer communication review , 2001, CCRV.
[20] Craig Partridge,et al. Packet reordering is not pathological network behavior , 1999, TNET.
[21] Ray Jain,et al. The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.
[22] Wesley M. Eddy. Improving Transport Control Protocol Performance With Path Error Rate Information , 2004 .
[23] Sally Floyd,et al. Simulation-based comparisons of Tahoe, Reno and SACK TCP , 1996, CCRV.
[24] William Stallings,et al. Data and Computer Communications , 1985 .
[25] Stefan Savage,et al. TCP congestion control with a misbehaving receiver , 1999, CCRV.
[26] Raj Jain,et al. The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.
[27] Ramesh Govindan,et al. Estimating Router ICMP Generation Delays , 2002 .
[28] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[29] Rajesh Krishnan,et al. Explicit transport error notification (ETEN) for error-prone wireless and satellite networks , 2004, Comput. Networks.
[30] Sven Jaap,et al. TCP-friendly Rate Control (TFRC) , 2004 .
[31] Mark Allman,et al. Estimating loss rates with TCP , 2003, PERV.
[32] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[33] Donald F. Towsley,et al. Modeling TCP throughput: a simple model and its empirical validation , 1998, SIGCOMM '98.
[34] Sally Floyd,et al. Measuring interactions between transport protocols and middleboxes , 2004, IMC '04.
[35] Mark Handley,et al. Congestion control for high bandwidth-delay product networks , 2002, SIGCOMM '02.
[36] Jörg Widmer,et al. TCP Friendly Rate Control (TFRC): Protocol Specification , 2003, RFC.
[37] Sally Floyd,et al. An Extension to the Selective Acknowledgement (SACK) Option for TCP , 2000, RFC.