We first study the accuracy of two well-known analytical models of the average throughput of long-term TCP flows, namely the so-called SQRT and PFTK models, and show that these models are far from being accurate in general. Our simulations, based on a large set of long-term TCP sessions, show that 70% of their predictions exceed the boundaries of TCP-Friendliness, thus questioning their use in the design of new TCP-Friendly transport protocols. We then investigate the reasons of this inaccuracy, and show that it is largely due to the lack of discrimination between the two packet loss detection methods used by TCP, namely by triple duplicate acknowledgements or by timeout: expirations. We then apply various machine learning techniques to inf...
Abstract—In this paper, we present an accurate analytical model for transport control protocol (TCP)...
In this work, we investigate the bandwidth and transfer time of long-haul TCP versus cascaded TCP [5...
Besides the two classical techniques used to evaluate the performance of a protocol, computer simula...
peer reviewedWe first study the accuracy of two well-known analytical models of the average throughp...
peer reviewedBased on a large set of TCP sessions we first study the accuracy of two well-known anal...
In this paper we develop a simple analytic characterization of the steady state throughput, as a fun...
In this paper we develop a simple analytic characterization of the steady state throughput as a func...
In this thesis, a new model for the slow start phase based on the discrete evolutions of congestion ...
With the advent of overlay and peer-to-peer networks, Grid computing, and CDNs, network performance ...
With the advent of overlay and peer-to-peer networks, Grid computing, and CDNs, network performance...
International audienceIn today's Internet, a large part of the traffic is carried using the TCP tran...
In this paper, we study the timeout probability of TCP Reno under the bursty packet loss model, whic...
International audienceIn today's Internet, a large part of the traffic is carried using the TCP tran...
International audienceIn today's Internet, a large part of the traffic is carried using the TCP tran...
Besides the two classical techniques used to evaluate the performance of a protocol, computer simula...
Abstract—In this paper, we present an accurate analytical model for transport control protocol (TCP)...
In this work, we investigate the bandwidth and transfer time of long-haul TCP versus cascaded TCP [5...
Besides the two classical techniques used to evaluate the performance of a protocol, computer simula...
peer reviewedWe first study the accuracy of two well-known analytical models of the average throughp...
peer reviewedBased on a large set of TCP sessions we first study the accuracy of two well-known anal...
In this paper we develop a simple analytic characterization of the steady state throughput, as a fun...
In this paper we develop a simple analytic characterization of the steady state throughput as a func...
In this thesis, a new model for the slow start phase based on the discrete evolutions of congestion ...
With the advent of overlay and peer-to-peer networks, Grid computing, and CDNs, network performance ...
With the advent of overlay and peer-to-peer networks, Grid computing, and CDNs, network performance...
International audienceIn today's Internet, a large part of the traffic is carried using the TCP tran...
In this paper, we study the timeout probability of TCP Reno under the bursty packet loss model, whic...
International audienceIn today's Internet, a large part of the traffic is carried using the TCP tran...
International audienceIn today's Internet, a large part of the traffic is carried using the TCP tran...
Besides the two classical techniques used to evaluate the performance of a protocol, computer simula...
Abstract—In this paper, we present an accurate analytical model for transport control protocol (TCP)...
In this work, we investigate the bandwidth and transfer time of long-haul TCP versus cascaded TCP [5...
Besides the two classical techniques used to evaluate the performance of a protocol, computer simula...