{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:02:50Z","timestamp":1743040970328,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642209307"},{"type":"electronic","value":"9783642209314"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20931-4_1","type":"book-chapter","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T10:14:52Z","timestamp":1318932892000},"page":"3-17","source":"Crossref","is-referenced-by-count":1,"title":["Improving TCP-Friendliness for mHIP"],"prefix":"10.1007","author":[{"given":"Tatiana","family":"Polishchuk","sequence":"first","affiliation":[]},{"given":"Andrei","family":"Gurtov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Network simulator ns-2, \n                    \n                      http:\/\/www.isi.edu\/nsnam\/ns\/\n                    \n                    \n                   (last checked 15\/02\/2010)"},{"key":"1_CR2","unstructured":"Barre, S., Bonaventure, O.: Shim6 implementation report: Linshim6. Internet draft, draft-barre-shim6-impl-03.txt (September 2009)"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1007\/978-3-540-24693-0_59","volume-title":"NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications","author":"S. Bhandarkar","year":"2004","unstructured":"Bhandarkar, S., Reddy, A.L.N.: TCP-DCR: Making TCP robust to non-congestion events. In: Mitrou, N., Kontovasilis, K.P., Rouskas, G.N., Iliadis, I., Merakos, L.F. (eds.) NETWORKING 2004. LNCS, vol.\u00a03042, pp. 712\u2013724. Springer, Heidelberg (2004)"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Blanton, E., Allman, M.: On making TCP more robust to packet reordering. ACM Computer Communication Review\u00a032 (2002)","DOI":"10.1145\/510726.510728"},{"issue":"5","key":"1_CR5","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1007\/s11276-005-3518-5","volume":"11","author":"K. Chebrolu","year":"2005","unstructured":"Chebrolu, K., Raman, B., Rao, R.R.: A network layer approach to enable TCP over multiple interfaces. Wirel. Netw.\u00a011(5), 637\u2013650 (2005)","journal-title":"Wirel. Netw."},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Ford, A., Raiciu, C., Barre, S., Iyengar, J.: Architectural guidelines for multipath TCP development. Technical report, Internet draft, draft-ietf-mptcp-architecture-01 (June 2010) (work in progress)","DOI":"10.17487\/rfc6182"},{"key":"1_CR7","doi-asserted-by":"publisher","DOI":"10.1002\/9780470772898","volume-title":"Host Identity Protocol (HIP): Towards the Secure Mobile Internet","author":"A. Gurtov","year":"2008","unstructured":"Gurtov, A.: Host Identity Protocol (HIP): Towards the Secure Mobile Internet. Wiley and Sons, Chichester (2008)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Gurtov, A., Polishchuk, T.: Secure multipath transport for legacy Internet applications. In: Proc. of BROADNETS 2009, Madrid, Spain (September 2009)","DOI":"10.4108\/ICST.BROADNETS2009.7186"},{"key":"1_CR9","unstructured":"Hacker, T.J., Noble, B.D., Athey, B.D.: Improving throughput and maintaining fairness using parallel TCP. In: IEEE InfoCom (2004)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Ishida, T., Ueda, K., Yakoh, T.: Fairness and utilization in multipath network flow optimization. In: Proc. of 2006 IEEE International Conference on Industrial Informatics, pp. 1096\u20131101 (2006)","DOI":"10.1109\/INDIN.2006.275770"},{"key":"1_CR11","unstructured":"Ishiyama, M., Kunishi, M., Teraoka, F.: An analysis of mobility handling in LIN6. In: Proc. of International Symposium on Wireless Personal Multimedia Communications (WPMC 2001) (August 2001)"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Jokela, P., Moskowitz, R., Nikander, P.: Using the Encapsulating Security Payload (ESP) transport format with the Host Identity Protocol (HIP). IETF RFC 5202 (March 2008)","DOI":"10.17487\/rfc5202"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Jungmaier, A., Rescorla, E., Tuexen, M.: Transport layer security over Stream Control Transmission Protocol. RFC 3436, IETF (December 2002)","DOI":"10.17487\/rfc3436"},{"issue":"3-4","key":"1_CR14","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1023\/B:WIRE.0000047072.64159.35","volume":"29","author":"J. Kempf","year":"2004","unstructured":"Kempf, J., Arkko, J., Nikander, P.: Mobile IPv6 security. Wirel. Pers. Commun.\u00a029(3-4), 389\u2013414 (2004)","journal-title":"Wirel. Pers. Commun."},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Kim, K.-H., Shin, K.G.: Improving TCP performance over wireless networks with collaborative multi-homed mobile hosts. In: Proc. of the 3rd Int. Conf. on Mobile Systems, Applications, and Services (MobiSys 2005), pp. 107\u2013120 (June 2005)","DOI":"10.1145\/1067170.1067183"},{"key":"1_CR16","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1109\/TPDS.2007.1011","volume":"18","author":"K.-C. Leung","year":"2007","unstructured":"Leung, K.-C., Li, V.O., Yang, D.: An overview of packet reordering in Transmission Control Protocol (tcp): Problems, solutions, and challenges. IEEE Transactions on Parallel and Distributed Systems\u00a018, 522\u2013535 (2007)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"1","key":"1_CR17","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/505688.505692","volume":"30","author":"R. Ludwig","year":"2000","unstructured":"Ludwig, R., Katz, R.H.: The Eifel algorithm: making TCP robust against spurious retransmissions. SIGCOMM Comput. Commun. Rev.\u00a030(1), 30\u201336 (2000)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"1_CR18","unstructured":"Raiciu, C.: Coupled multipath-aware congestion control (March 2010) (work in progress)"},{"issue":"8","key":"1_CR19","doi-asserted-by":"publisher","first-page":"2163","DOI":"10.1016\/j.comnet.2006.09.019","volume":"51","author":"S. Ramasubramanian","year":"2007","unstructured":"Ramasubramanian, S., Krishnamoorthy, H., Krunz, M.: Disjoint multipath routing using colored trees. Comput. Netw.\u00a051(8), 2163\u20132180 (2007)","journal-title":"Comput. Netw."},{"key":"1_CR20","volume-title":"TCP\/IP illustrated: TCP for transactions, HTTP, NNTP, and the Unix domain protocols","author":"W.R. Stevens","year":"1996","unstructured":"Stevens, W.R.: TCP\/IP illustrated: TCP for transactions, HTTP, NNTP, and the Unix domain protocols, vol.\u00a03. Addison Wesley Longman Publishing Co., Inc., Redwood City (1996)"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Stevens, W.R.: TCP slow start, congestion avoidance, fast retransmit, and fast recovery algorithms. RFC 2001, IETF (January 1997)","DOI":"10.17487\/rfc2001"},{"issue":"6","key":"1_CR22","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MNET.2007.4395105","volume":"21","author":"S.-C. Tsao","year":"2007","unstructured":"Tsao, S.-C., Chiao, N.: Taxonomy and evaluation of TCP-friendly congestion-control schemes on fairness, aggressiveness, and responsiveness. IEEE Network\u00a021(6), 6\u201315 (2007)","journal-title":"IEEE Network"},{"issue":"5","key":"1_CR23","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/1452335.1452342","volume":"38","author":"D. Wischik","year":"2008","unstructured":"Wischik, D., Handley, M., Braun, M.B.: The resource pooling principle. SIGCOMM Comput. Commun. Rev.\u00a038(5), 47\u201352 (2008)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"1_CR24","unstructured":"Zhang, M., Karp, B., Floyd, S., Peterson, L.: RR-TCP: A reordering-robust TCP with DSACK. In: Proc. of IEEE ICNP, pp. 95\u2013106 (2003)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Access Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20931-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T01:15:54Z","timestamp":1558401354000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20931-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642209307","9783642209314"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20931-4_1","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2011]]}}}