Zobrazeno 1 - 10
of 168
pro vyhledávání: '"TCP window scale option"'
Publikováno v:
IEEE Transactions on Network Science and Engineering. 7:3042-3056
The current Internet is dramatically suffering the Distributed Denial of Service (DDoS) attacks, in which the perpetrator maliciously makes network resource unavailable to its intended users by temporarily or indefinitely disrupting the services of a
Autor:
Domenico Ciuonzo, Antonio Montieri, Alfredo Nascita, Antonio Pescape, Giuseppe Aceto, Valerio Persico
Publikováno v:
CSR
The widespread use of powerful mobile devices has deeply affected the mix of traffic traversing both the Internet and enterprise networks (with bring-your-own-device policies). Traffic encryption has become extremely common, and the quick proliferati
Publikováno v:
2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS).
This work discusses how the TCP window size affects the throughput and its measurements and estimated packet delivery delay on two experimental setups using freely available tools JPerf and PsPing. The first setup is a direct connection between two P
Publikováno v:
2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).
With the rapid development of network services, metropolitan area network networking has been widely used in large-scale wide area networks of group company headquarters and branch offices. When users located in the branch structure of the WAN access
Publikováno v:
COMPUTER NETWORKS
r-CTTC. Repositorio Institucional Producción Científica del Centre Tecnològic de Telecomunicacions de Catalunya (CTTC)
Universitat Oberta de Catalunya (UOC)
r-CTTC. Repositorio Institucional Producción Científica del Centre Tecnològic de Telecomunicacions de Catalunya (CTTC)
Universitat Oberta de Catalunya (UOC)
TCP Wave relies on a disruptive communication paradigm based on bursts, to overcome limitations of legacy TCP with modern applications and challenging network scenarios. This protocol was already validated with appealing results via simulations. This
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ae9e4e9ad07dabbe4790c504abc12320
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85094869264&doi=10.1016/j.comnet.2020.107633&partnerID=40&md5=c35808bd5a97ac52cbc6bf7920557fbd
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85094869264&doi=10.1016/j.comnet.2020.107633&partnerID=40&md5=c35808bd5a97ac52cbc6bf7920557fbd
Publikováno v:
Information and Communication Technology for Competitive Strategies (ICTCS 2020) ISBN: 9789811608810
The relevance of flooding attacks is increasing day by day. The incongruity between network capabilities and market requirements lead to the development of novel network architecture named software-defined networking (SDN). SDN architecture drastical
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7decb9ba98a3900924c8ea3853dc4409
https://doi.org/10.1007/978-981-16-0882-7_41
https://doi.org/10.1007/978-981-16-0882-7_41
Publikováno v:
LATINCOM
Over the past years the use of anonymization services has gained significant relevance as more users are interested in protecting their data and privacy on the internet. One of the most popular ways to achieve this result is Tor. The anonymity and un
Autor:
Chansook Lim
Publikováno v:
Sensors
Volume 20
Issue 17
Sensors (Basel, Switzerland)
Sensors, Vol 20, Iss 4774, p 4774 (2020)
Volume 20
Issue 17
Sensors (Basel, Switzerland)
Sensors, Vol 20, Iss 4774, p 4774 (2020)
For smooth integration with middleboxes on the Internet, TCP (Transmission Control Protocol) is favorably considered as a transport-layer protocol for IoT (Internet of Things) networks. In constrained networks, TCP tends to perform well with a small
Autor:
Apostolis Xenakis, Fotis Foukalas
Publikováno v:
Wireless Personal Communications. 99:1015-1033
In this paper, we study the aggregation between the frequency division duplex and time division duplex (TDD) spectrum bands within the context of 3GPP LTE-A system. To be specific, we first provide a cross-layer design analysis to obtain the achievab
Publikováno v:
Computer Networks. 113:159-175
TCP remains the dominant transport protocol for Internet traffic. It is usually considered to have its sending rate covered by a sliding window congestion control mechanism. However, in addition to this normal congestion control, a number of other me