fixed missing book
This commit is contained in:
parent
2d121c0cd0
commit
c6c05d680f
@ -19,23 +19,6 @@
|
||||
file = {Kohler et al. - Designing DCCP Congestion Control Without Reliabi.pdf:/home/jake/Zotero/storage/KMDTAT3J/Kohler et al. - Designing DCCP Congestion Control Without Reliabi.pdf:application/pdf},
|
||||
}
|
||||
|
||||
@inproceedings{honda_understanding_2005,
|
||||
address = {Boston, MA},
|
||||
title = {Understanding {TCP} over {TCP}: effects of {TCP} tunneling on end-to-end throughput and latency},
|
||||
shorttitle = {Understanding {TCP} over {TCP}},
|
||||
url = {http://proceedings.spiedigitallibrary.org/proceeding.aspx?doi=10.1117/12.630496},
|
||||
doi = {10.1117/12.630496},
|
||||
abstract = {TCP tunnel is a technology that aggregates and transfers packets sent between end hosts as a single TCP connection. By using a TCP tunnel, the fairness among aggregated flows can be improved and several protocols can be transparently transmitted through a firewall. Currently, many applications such as SSH, VTun, and HTun use a TCP tunnel. However, since most applications running on end hosts generally use TCP, two TCP congestion controls (i.e., end-to-end TCP and tunnel TCP) operate simultaneously and interfere each other. Under certain conditions, it has been known that using a TCP tunnel severely degrades the end-to-end TCP performance. Namely, it has known that using a TCP tunnel drastically degrades the end-to-end TCP throughput for some time, which is called TCP meltdown problem. On the contrary, under other conditions, it has been known that using a TCP tunnel significantly improves the end-to-end TCP performance. However, it is still an open issue — how, when, and why is a TCP tunnel malicious for end-to-end TCP performance? In this paper, we therefore investigate effect of TCP tunnel on end-to-end TCP performance using simulation experiments. Specifically, we quantitatively reveal effects of several factors (e.g., the propagation delay, usage of SACK option, TCP socket buffer size, and sender buffer size of TCP tunnel) on performance of end-to-end TCP and tunnel TCP.},
|
||||
language = {en},
|
||||
urldate = {2021-02-08},
|
||||
author = {Honda, Osamu and Ohsaki, Hiroyuki and Imase, Makoto and Ishizuka, Mika and Murayama, Junichi},
|
||||
editor = {Atiquzzaman, Mohammed and Balandin, Sergey I.},
|
||||
month = oct,
|
||||
year = {2005},
|
||||
pages = {60110H},
|
||||
file = {Honda et al. - 2005 - Understanding TCP over TCP effects of TCP tunneli.pdf:/home/jake/Zotero/storage/GIMYQLCT/Honda et al. - 2005 - Understanding TCP over TCP effects of TCP tunneli.pdf:application/pdf},
|
||||
}
|
||||
|
||||
@misc{kent_ip_2005,
|
||||
title = {{IP} {Authentication} {Header}},
|
||||
url = {https://tools.ietf.org/html/rfc4302},
|
||||
@ -266,7 +249,7 @@ Section: Proceedings on Privacy Enhancing Technologies},
|
||||
month = feb,
|
||||
year = {2016},
|
||||
note = {Conference Name: IEEE/ACM Transactions on Networking},
|
||||
keywords = {multipath TCP, Aggregates, Algorithm design and analysis, Asymptotic stability, balanced linked adaptation, Balia algorithm, Computer networks, convergence, Heuristic algorithms, Linux kernel, MP-TCP algorithms, nonlinear dynamical systems, Oscillators, Stability analysis, TCPIP, transport protocols, Vectors, window oscillation},
|
||||
keywords = {Aggregates, Algorithm design and analysis, Asymptotic stability, balanced linked adaptation, Balia algorithm, Computer networks, convergence, Heuristic algorithms, Linux kernel, MP-TCP algorithms, multipath TCP, nonlinear dynamical systems, Oscillators, Stability analysis, TCPIP, transport protocols, Vectors, window oscillation},
|
||||
pages = {596--609},
|
||||
file = {IEEE Xplore Abstract Record:/home/jake/Zotero/storage/S2L269MS/7000573.html:text/html;IEEE Xplore Full Text PDF:/home/jake/Zotero/storage/9QTMKA3G/Peng et al. - 2016 - Multipath TCP Analysis, Design, and Implementatio.pdf:application/pdf},
|
||||
}
|
||||
@ -338,3 +321,20 @@ Section: Proceedings on Privacy Enhancing Technologies},
|
||||
year = {2021},
|
||||
file = {Snapshot:/home/jake/Zotero/storage/SA5YGQGZ/draft-ietf-quic-http-34.html:text/html},
|
||||
}
|
||||
|
||||
@inproceedings{honda_understanding_2005,
|
||||
title = {Understanding {TCP} over {TCP}: effects of {TCP} tunneling on end-to-end throughput and latency},
|
||||
volume = {6011},
|
||||
shorttitle = {Understanding {TCP} over {TCP}},
|
||||
url = {https://www.spiedigitallibrary.org/conference-proceedings-of-spie/6011/60110H/Understanding-TCP-over-TCP--effects-of-TCP-tunneling-on/10.1117/12.630496.short},
|
||||
doi = {10.1117/12.630496},
|
||||
abstract = {TCP tunnel is a technology that aggregates and transfers packets sent between end hosts as a single TCP connection. By using a TCP tunnel, the fairness among aggregated flows can be improved and several protocols can be transparently transmitted through a firewall. Currently, many applications such as SSH, VTun, and HTun use a TCP tunnel. However, since most applications running on end hosts generally use TCP, two TCP congestion controls (i.e., end-to-end TCP and tunnel TCP) operate simultaneously and interfere each other. Under certain conditions, it has been known that using a TCP tunnel severely degrades the end-to-end TCP performance. Namely, it has known that using a TCP tunnel drastically degrades the end-to-end TCP throughput for some time, which is called \textit{TCP meltdown} problem. On the contrary, under other conditions, it has been known that using a TCP tunnel significantly improves the end-to-end TCP performance. However, it is still an open issue --- how, when, and why is a TCP tunnel malicious for end-to-end TCP performance? In this paper, we therefore investigate effect of TCP tunnel on end-to-end TCP performance using simulation experiments. Specifically, we quantitatively reveal effects of several factors (e.g., the propagation delay, usage of SACK option, TCP socket buffer size, and sender buffer size of TCP tunnel) on performance of end-to-end TCP and tunnel TCP.},
|
||||
urldate = {2021-04-30},
|
||||
booktitle = {Performance, {Quality} of {Service}, and {Control} of {Next}-{Generation} {Communication} and {Sensor} {Networks} {III}},
|
||||
publisher = {International Society for Optics and Photonics},
|
||||
author = {Honda, Osamu and Ohsaki, Hiroyuki and Imase, Makoto and Ishizuka, Mika and Murayama, Junichi},
|
||||
month = oct,
|
||||
year = {2005},
|
||||
pages = {60110H},
|
||||
file = {Full Text PDF:/home/jake/Zotero/storage/HZ4HF793/Honda et al. - 2005 - Understanding TCP over TCP effects of TCP tunneli.pdf:application/pdf;Snapshot:/home/jake/Zotero/storage/VQLH6I65/12.630496.html:text/html},
|
||||
}
|
||||
|
BIN
thesis.pdf
BIN
thesis.pdf
Binary file not shown.
Loading…
Reference in New Issue
Block a user