In this paper, we explore the operation of TCP congestion control when the receiver can misbehave, as might occur with a greedy Web client. We first demonstrate that there are sim...
Stefan Savage, Neal Cardwell, David Wetherall, Tom...
Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. En...
Lyndon G. Pierson, Edward L. Witzke, Mark O. Bean,...
This paper presents three transmission schemes to improve the transmission of MPEG video over a timed token medium access control (MAC) network. Multiple classes of MPEG video are...
Understanding the performance of the Internet's Transmission Control Protocol (TCP) is important because it is the dominant protocol used in the Internet today. Various testi...
The ability to rapidly create and deploy new transport, control and management architectures in response to new service demands is a key factor driving the programmable networking...
Andrew T. Campbell, Irene Katzela, Kazuho Miki, Jo...