2020
DOI: 10.1016/j.comnet.2020.107211
|View full text |Cite
|
Sign up to set email alerts
|

On the usability of transport protocols other than TCP: A home gateway and internet path traversal study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 43 publications
(66 reference statements)
0
6
0
Order By: Relevance
“…When L = 1, the obtained solution converges to the form of ( 15), and when s r = 0, it converges to the form of (21). Finally, when V = ∞, we obtain…”
Section: The Concept Of Controlling Information Transfer In a Logical...mentioning
confidence: 58%
See 2 more Smart Citations
“…When L = 1, the obtained solution converges to the form of ( 15), and when s r = 0, it converges to the form of (21). Finally, when V = ∞, we obtain…”
Section: The Concept Of Controlling Information Transfer In a Logical...mentioning
confidence: 58%
“…It is worth noting separately that existing models of asynchronous control procedures for individual transit nodes and transmission protocols [5,20,21] do not account for the utilization of shared network resources, such as the individual inter-node channel bandwidths resulting from the presence of other virtual connections, leading to the formation of queues in the transit-node buffers. Eliminating such a limitation is the starting point of our research.…”
Section: State Of the Artmentioning
confidence: 99%
See 1 more Smart Citation
“…H4: Consumer trust to intention to buy. According to the research by [20], [26], [35], [36], [37], where this previous proves the hedonic brand image to intention to buy. H5: Hedonic brand image to intention to buy.…”
Section: Hypothesismentioning
confidence: 68%
“…Multipath TCP [29,82] (MPTCP) managed to cope with the interferences listed above, but at the price of increased complexity, most notably the utilization of a second level of checksum to detect middlebox interference [41,82], and fallback mechanisms. Choosing another transport is not a deployable approach as many middleboxes block transport protocols other than TCP and UDP [8].…”
Section: Tcp Mptcp Tls/tcp Quic Tcplsmentioning
confidence: 99%