[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 16 Dec 2024Bibliometrics

Newsletter Downloads

Skip Table Of Content Section
FEATURE: Short paper
article
Beware of BGP attacks

This note attempts to raise awareness within the network research community about the security of the interdomain routing infrastructure. We identify several attack objectives and mechanisms, assuming that one or more BGP routers have been compromised. ...

FEATURE: Full papers
article
Non-stationarity and high-order scaling in TCP flow arrivals: a methodological analysis

The last decade has been a very fruitful period in important discoveries in network traffic modeling, uncovering various scaling behaviors. Self-similarity, long-range dependence, multifractal behavior and finally cascades have been studied and ...

article
Performance evaluation and comparison of Westwood+, New Reno, and Vegas TCP congestion control

TCP congestion control has been designed to ensure Internet stability along with fair and efficient allocation of the network bandwidth. During the last decade, many congestion control algorithms have been proposed to improve the classic Tahoe/Reno TCP ...

article
A taxonomy of DDoS attack and DDoS defense mechanisms

Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying attacks and defenses, and thus provides ...

article
SAKM: a scalable and adaptive key management approach for multicast communications

Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applications, the traffic encryption key has to be changed whenever a user joins or leaves ...

article
A Per-Domain Behavior for circuit emulation in IP networks

Circuit networks are expensive to build, difficult to operate, fragile, and not easily scalable. Many network operators would like to carry circuit traffic as an overlay on top of an IP network. With higher bandwidths, faster routers, and Differentiated ...

article
Modeling wireless links for transport protocols

Wireless links have intrinsic characteristics that affect the performance of transport protocols; these include variable bandwidth, corruption, channel allocation delays, and asymmetry. In this paper we review simulation models for cellular, WLAN and ...

article
Tree bitmap: hardware/software IP lookups with incremental updates

Even with the significant focus on IP address lookup in the published literature as well as focus on this market by commercial semiconductor vendors, there is still a challenge for router architects to find solutions that simultaneously meet 3 criteria: ...

article
On making SCTP robust to spurious retransmissions

Network anomalies such as packet reordering and delay spikes can result in spurious retransmissions and degrade performance of reliable transport protocols such as TCP and SCTP. Past research showed that in certain networks or paths, such anomalies were ...

article
End-to-end congestion control for TCP-friendly flows with variable packet size

Current TCP-friendly congestion control mechanisms adjust the packet rate in order to adapt to network conditions and obtain a throughput not exceeding that of a TCP connection operating under the same conditions. In an environment where the bottleneck ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.