The Transmission Control Protocol (TCP) is ubiquitous, sophisticated, and effective. It also prevents the innovation needed to improve delivery of Internet services to the wireless tactical edge of DOD operations. We argue in this paper that TCP should be used as a short-range local access protocol for COTS compatibility rather than as the primary end-to-end transport protocol for the tactical GIG. We describe a straightforward way to implement this architecture without changing COTS endpoints. The implementation includes a TCP spoofing proxy, an open-standard HAIPE-compatible short-haul protocol, and a modularized core transport protocol endpoint
Abstract Transmission Control Protocol (TCP) is the most reliable protocol. That was previously intr...
This paper won the best student paper award. TCP is a reliable transport protocol tuned to perform w...
Transport Control Protocol (TCP) incast clog happens when number of senders work in parallel with th...
Transport protocols are an essential part of any modern data network, including military tactical ne...
This paper argues that transport protocols such as TCP provide a rare domain in which protocol exten...
The TCP/IP protocols provide data packet services on the Internet. These protocols are associa...
This paper arg---6 that transport protocols such as TCP provide a rare domain in which protocol exte...
© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
International audienceTCP is not necessarily suitable for all contexts. It is well-known that, in so...
We present icTCP, an "information and control" TCP implementation that exposes key pieces of interna...
Military applications are relying more and more on Commercial Off-The-Shelf (COTS) hardware and soft...
International audienceInternet and its evolutions are fundamentally based on the unique TCP/IP model...
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code t...
Network traffic encryption is becoming a requirement, not an option. Enabling encryption will be a c...
TCP stands for transmission control protocol. It was defined by Internet Engineering Task Force (IET...
Abstract Transmission Control Protocol (TCP) is the most reliable protocol. That was previously intr...
This paper won the best student paper award. TCP is a reliable transport protocol tuned to perform w...
Transport Control Protocol (TCP) incast clog happens when number of senders work in parallel with th...
Transport protocols are an essential part of any modern data network, including military tactical ne...
This paper argues that transport protocols such as TCP provide a rare domain in which protocol exten...
The TCP/IP protocols provide data packet services on the Internet. These protocols are associa...
This paper arg---6 that transport protocols such as TCP provide a rare domain in which protocol exte...
© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
International audienceTCP is not necessarily suitable for all contexts. It is well-known that, in so...
We present icTCP, an "information and control" TCP implementation that exposes key pieces of interna...
Military applications are relying more and more on Commercial Off-The-Shelf (COTS) hardware and soft...
International audienceInternet and its evolutions are fundamentally based on the unique TCP/IP model...
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code t...
Network traffic encryption is becoming a requirement, not an option. Enabling encryption will be a c...
TCP stands for transmission control protocol. It was defined by Internet Engineering Task Force (IET...
Abstract Transmission Control Protocol (TCP) is the most reliable protocol. That was previously intr...
This paper won the best student paper award. TCP is a reliable transport protocol tuned to perform w...
Transport Control Protocol (TCP) incast clog happens when number of senders work in parallel with th...