The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - Nov.-Dec. (2012 vol.16)
pp: 30-39
ABSTRACT
Since the original design of TCP and UDP, the world has changed, and with it, the Internet. Here, the authors argue that transport protocol architectures, most notably TCP's, must be updated to meet the needs of today's Internet. Their optimistic approach favors normal operation at the expense of overhead when dealing with corner cases and advocates leaving certain policies to the application instead of the transport protocol.
INDEX TERMS
transport protocols, Internet, all-weather transport essentials, TCP, UDP, Internet, transport protocol architectures, optimistic approach, normal operation, corner cases, Transport protocols, Internet, Multiplexing, Servers, Streaming media, Routing protocols, Protocols, Internet, Transport protocols, Internet, Multiplexing, Servers, Streaming media, Routing protocols, Protocols, computer networks, transport protocols
CITATION
C. Leng, W. W. Terpstra, M. Lehn, R. Rehner, A. Buchmann, "All-Weather Transport Essentials", IEEE Internet Computing, vol.16, no. 6, pp. 30-39, Nov.-Dec. 2012, doi:10.1109/MIC.2012.121
REFERENCES
1. W.W. Terpstra et al., “Channel-Based Unidirectional Stream Protocol (CUSP),” Proc. IEEE INFOCOM Mini Conf., IEEE Press, 2010.
2. J. Postel, Transmission Control Protocol, IETF RFC 793, Sept. 1981; www.ietf.org/rfcrfc793.txt.
3. J. Postel, User Datagram Protocol, IETF RFC 768, Aug. 1980; www.ietf.org/rfcrfc768.txt.
4. R. Stewart, Stream Control Transmission Protocol, IETF RFC 4960, Sept. 2007; www.ietf.org/rfcrfc4960.txt.
5. B. Ford, “Structured Streams: A New Transport Abstraction,” ACM SIGCOMM Computer Communication Rev., vol. 37, no. 4, 2007, pp. 361–372.
6. “SPDY: An Experimental Protocol for a Faster Web,” whitepaper, the Chromium Projects, 2011; http://dev.chromium.org/spdy spdy-whitepaper .
7. T. Dierks and E. Rescorla, Transport Layer Security (TLS) Protocol Version 1.2, IETF RFC 5246, Aug. 2008; www.ietf.org/rfcrfc5246.txt.
8. L. Hennessy and A. Patterson,Computer Architecture: A Quantitative Approach, 2nd ed., Elsevier, 1995.
9. B. Ford and J. Iyengar, “Efficient Cross-Layer Negotiation,” Proc. 8th ACM Workshop Hot Topics in Networks (HotNets VIII), ACM, 2009.
10. A. Kuzmanovic et al., Adding Explicit Congestion Notification (ECN) Capability to TCP's SYN/ACK Packets, IETF RFC 5562, June 2009; http://tools.ietf.org/htmlrfc5562.
11. S. Floyd et al., Quick-Start for TCP and IP, IETF RFC 4782, Jan. 2007; http://tools.ietf.org/htmlrfc4782.
12. R. Fonseca et al., IP Options Are Not an Option, tech. report, Electrical Eng. and Computer Sciences, Univ. of California, Berkeley, 2005.
13. D. Katabi, M. Handley, and C. Rohrs, “Congestion Control for High Bandwidth-Delay Product Networks,” Proc. Conf. Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 02), ACM, 2002, pp. 89–102.
14. M.F Nowlan et al., “Fitting Square Pegs through Round Pipes: Unordered Delivery Wire-Compatible with TCP and TLS,” Proc. 9th Usenix Conf. Networked Systems Design and Implementation (NSDI 12), Usenix Assoc., 2012, p. 28.
15. J. Nagle, Congestion Control in IP/TCP Internetworks, IETF RFC 896, Jan. 1984; http://tools.ietf.org/htmlrfc896.
16. J.C. Mogul and G. Minshall, “Rethinking the TCP Nagle algorithm,” ACM SIGCOMM Computer Communication Rev., vol. 31, no. 1, 2001, pp. 6–20.
17. G. Montenegro, Reverse Tunneling for Mobile IP, revised, IETF RFC 3024, Jan. 2001; http://tools.ietf.org/htmlrfc3024.
18. A.C. Snoeren and H. Balakrishnan, “An End-to-End Approach to Host Mobility,” Proc. 6th Ann. Int'l Conf. Mobile Computing and Networking (MobiCom 00), ACM, 2000, pp. 155–166.
19. C. Raiciu et al., “Opportunistic Mobility with Multipath TCP,” Proc. 6th ACM Int'l Workshop Mobility in the Evolving Internet Architecture, ACM, 2011, pp. 7–12.
20. D. Wischik and M. Handley, “The Resource Pooling Principle,” ACM SIGCOMM Computer Communication Rev., vol. 38, no. 5, 2008, pp. 47–52.
21. J.R. Iyengar, P.D. Amer, and R. Stewart, “Concurrent Multipath Transfer Using SCTP Multihoming Over Independent End-to-End Paths,” IEEE/ACM Trans. Networking, vol. 14, no. 5, 2006, pp. 951–964.
22. T. Aura, P. Nikander, and J. Leiwo, “DOS-Resistant Authentication with Client Puzzles,” Security Protocols, LNCS 2133, Springer, 2001, pp. 170–177.
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool