TCP flows start with an initial congestion window of at most four segments or approximately 4KB of data. Because most Web transactions are short-lived, the initial congestion wind...
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
— In 802.11 wireless links with disabled MAC retries, data and ACK packets within a TCP session collide resulting in packet losses. We show in this paper that in this situation, ...
Inference of the network structure (e.g., routing topology) and dynamics (e.g., traffic matrices, link performance) is an important component in many network design and management ...
Network traffic modeling generally views traffic as a superposition of flows that creates a timeseries of volume counts (e.g. of bytes or packets). What is omitted from this view ...