{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T19:54:52Z","timestamp":1649102092204},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1-4","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["CCF Trans. Netw."],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s42045-019-00015-9","type":"journal-article","created":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T16:33:55Z","timestamp":1557160435000},"page":"37-51","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Effect of multiplexing TCP flows on delay sensitivity in the internet communications"],"prefix":"10.1007","volume":"1","author":[{"given":"Sneha K.","family":"Thombre","sequence":"first","affiliation":[]},{"given":"Lalit M.","family":"Patnaik","sequence":"additional","affiliation":[]},{"given":"Anil S.","family":"Tavildar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,6]]},"reference":[{"issue":"3","key":"15_CR1","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1109\/SURV.2010.042710.00114","volume":"12","author":"A Afanasyev","year":"2010","unstructured":"Afanasyev, A., Tilley, N., Reiher, P., Kleinrock, L.: Host-to-host congestion control for tcp. IEEE Commun. Surv. Tutor. 12(3), 304\u2013342 (2010)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Araldo, A.\u00a0G,. Rossi, D.: Dissecting bufferbloat: Measurement and per-application breakdown of queueing delay. In: Proceedings of the 2013 workshop on Student workhop, pp. 53\u201356. ACM (2013)","DOI":"10.1145\/2537148.2537785"},{"key":"15_CR3","volume-title":"Data Networks","author":"D\u00a0P Bertsekas","year":"1992","unstructured":"Bertsekas, D\u00a0.P., Gallager, R\u00a0.G., Humblet, P.: Data Networks, vol. 2. Prentice-Hall International, New Jersey (1992)"},{"key":"15_CR4","volume-title":"An Introduction to Queueing Systems","author":"SK Bose","year":"2013","unstructured":"Bose, S.K.: An Introduction to Queueing Systems. Springer, Berlin (2013)"},{"issue":"3","key":"15_CR5","doi-asserted-by":"publisher","first-page":"2149","DOI":"10.1109\/COMST.2014.2375213","volume":"18","author":"B Briscoe","year":"2014","unstructured":"Briscoe, B., Brunstrom, A., Petlund, A., Hayes, D., Ros, D., Tsang, J., Gjessing, S., Fairhurst, G., Griwodz, C., Welzl, M.: Reducing internet latency: a survey of techniques and their merits. IEEE Commun. Surv. Tutor. 18(3), 2149\u20132196 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"15_CR6","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.comnet.2011.10.002","volume":"56","author":"C Callegari","year":"2012","unstructured":"Callegari, C., Giordano, S., Pagano, M., Pepe, T.: Behavior analysis of tcp linux variants. Comput. Netw. 56(1), 462\u2013476 (2012)","journal-title":"Comput. Netw."},{"issue":"8","key":"15_CR7","doi-asserted-by":"publisher","first-page":"1136","DOI":"10.1109\/5.236191","volume":"81","author":"M Calzarossa","year":"1993","unstructured":"Calzarossa, M., Serazzi, G.: Workload characterization: a survey. Proc. IEEE 81(8), 1136\u20131150 (1993)","journal-title":"Proc. IEEE"},{"issue":"2","key":"15_CR8","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/3009824","volume":"60","author":"N Cardwell","year":"2017","unstructured":"Cardwell, N., Cheng, Y., Gunn, C.S., Yeganeh, S.H.: Bbr: congestion-based congestion control. Commun. ACM 60(2), 58\u201366 (2017)","journal-title":"Commun. ACM"},{"issue":"4","key":"15_CR9","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/TNSM.2014.2377691","volume":"11","author":"P Casas","year":"2014","unstructured":"Casas, P., D\u2019Alconzo, A., Fiadino, P., B\u00e4r, A., Finamore, A., Zseby, T.: When youtube does not work?analysis of qoe-relevant degradation in google cdn traffic. IEEE Trans. Netw. Serv. Manag. 11(4), 441\u2013457 (2014)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"1116","DOI":"10.1109\/TPDS.2015.2427155","volume":"4","author":"H Chen","year":"2016","unstructured":"Chen, H., Jin, H., Wu, S.: Minimizing inter-server communications by exploiting self-similarity in online social networks. IEEE Trans. Parallel Distrib. Syst. 4, 1116\u20131130 (2016)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Csoma, A., Toka, L., Guly\u00e1s, A.: On lower estimating internet queuing delay. In: 2015 38th International Conference on Telecommunications and Signal Processing (TSP), pp. 299\u2013303. IEEE (2015)","DOI":"10.1109\/TSP.2015.7296272"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Domaski, A., Domaska, J., Czachrski, T., Klamka, J.: Self-similarity traffic and aqm mechanism based on non-integer order controller. In: International Conference on Computer Networks, pp. 336\u2013350. Springer (2017)","DOI":"10.1007\/978-3-319-59767-6_27"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Downey, A.\u00a0B.: Evidence for long-tailed distributions in the internet. In: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, pp. 229\u2013241. ACM (2001)","DOI":"10.1145\/505202.505230"},{"issue":"1","key":"15_CR14","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/2063176.2063196","volume":"55","author":"J Gettys","year":"2012","unstructured":"Gettys, J., Nichols, K.: Bufferbloat: dark buffers in the internet. Commun. ACM 55(1), 57\u201365 (2012)","journal-title":"Commun. ACM"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Iya, N., Kuhn, N., Verdicchio, F., Fairhurst, G.: Analyzing the impact of bufferbloat on latency-sensitive applications. In: 2015 IEEE International Conference on Communications (ICC), pp. 6098\u20136103. IEEE (2015)","DOI":"10.1109\/ICC.2015.7249294"},{"key":"15_CR16","unstructured":"Kaur, G., Saxena, V., Gupta, J.: Detection of tcp targeted high bandwidth attacks using self-similarity. J. King Saud Univ. Comput. Inf. Sci. (2017)"},{"key":"15_CR17","unstructured":"Kleinrock, L.: Queueing systems, volume 2: Computer applications, volume\u00a066. Wiley, New York (1976)"},{"issue":"1","key":"15_CR18","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1002\/dac.2800","volume":"29","author":"S Li","year":"2016","unstructured":"Li, S., Sun, W., Hua, C.: Optimal resource allocation for heterogeneous traffic in multipath networks. Int. J. Commun. Syst. 29(1), 84\u201398 (2016)","journal-title":"Int. J. Commun. Syst."},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Liu, X., Yang, F., Jin, Y., Wang, Z., Cao, Z., Sun, N.: Regional congestion mitigation in lossless datacenter networks. In: IFIP International Conference on Network and Parallel Computing, pp. 62\u201374. Springer (2017)","DOI":"10.1007\/978-3-319-68210-5_6"},{"issue":"5","key":"15_CR20","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1002\/wcm.524","volume":"7","author":"C Lochert","year":"2007","unstructured":"Lochert, C., Scheuermann, B., Mauve, M.: A survey on congestion control for mobile ad hoc networks. Wirel. Commun. Mob. Comput. 7(5), 655\u2013676 (2007)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"14","key":"15_CR21","doi-asserted-by":"publisher","first-page":"3233","DOI":"10.1016\/j.comnet.2012.06.010","volume":"56","author":"A Mondal","year":"2012","unstructured":"Mondal, A., Trestian, I., Qin, Z., Kuzmanovic, A.: P2p as a cdn: a new service model for file sharing. Comput. Netw. 56(14), 3233\u20133246 (2012)","journal-title":"Comput. Netw."},{"issue":"7","key":"15_CR22","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/2209249.2209264","volume":"55","author":"K Nichols","year":"2012","unstructured":"Nichols, K., Jacobson, V.: Controlling queue delay. Commun. ACM 55(7), 42\u201350 (2012)","journal-title":"Commun. ACM"},{"key":"15_CR23","volume-title":"Probability, Random Variables, and Stochastic Processes","author":"A Papoulis","year":"2002","unstructured":"Papoulis, A., Pillai, S.U.: Probability, Random Variables, and Stochastic Processes. Tata McGraw-Hill Education, UK (2002)"},{"key":"15_CR24","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.measurement.2015.07.051","volume":"75","author":"RK Polaganga","year":"2015","unstructured":"Polaganga, R.K., Liang, Q.: Self-similarity and modeling of lte\/lte-a data traffic. Measurement 75, 218\u2013229 (2015)","journal-title":"Measurement"},{"key":"15_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2016.04.017","volume":"86","author":"Y Ren","year":"2016","unstructured":"Ren, Y., Li, J., Shi, S., Li, L., Wang, G., Zhang, B.: Congestion control in named data networking-a survey. Comput. Commun. 86, 1\u201311 (2016)","journal-title":"Comput. Commun."},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Rossi, D., Muscariello, L., Mellia, M.: On the properties of tcp flow arrival process. In: 2004 IEEE International Conference on Communications, Vol.\u00a04, pp. 2153\u20132157. IEEE (2004)","DOI":"10.1109\/ICC.2004.1312899"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Rouskas, G., Vishwanath, A., Sivaraman, V.: Anomalous loss performance for mixed real-time and tcp traffic in routers with very small buffers. IEEE\/ACM Trans. Netw. 19(4), (2011)","DOI":"10.1109\/TNET.2010.2091721"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Shailendra, S., Bhattacharjee, R., Bose, S.K.: Optimized flow division modeling for multi-path transport. Annual IEEE India Conference (INDICON) 1\u20134 (2010a)","DOI":"10.1109\/INDCON.2010.5712713"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Shailendra, S., Bhattacharjee, R., Bose, S.K.: Optimized flow division modeling for multi-path transport. Annual IEEE India Conference (INDICON) 1\u20134 (2010b)","DOI":"10.1109\/INDCON.2010.5712713"},{"issue":"4","key":"15_CR30","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/MCOM.2016.7452277","volume":"54","author":"A Showail","year":"2016","unstructured":"Showail, A., Jamshaid, K., Shihada, B.: Buffer sizing in wireless networks: challenges, solutions, and opportunities. IEEE Commun. Mag. 54(4), 130\u2013137 (2016)","journal-title":"IEEE Commun. Mag."},{"key":"15_CR31","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139565844","volume-title":"Communication networks: an optimization, control, and stochastic networks perspective","author":"R Srikant","year":"2013","unstructured":"Srikant, R., Ying, L.: Communication networks: an optimization, control, and stochastic networks perspective. Cambridge University Press, Cambridge (2013)"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Wang, J., Liu, A., Yan, T., Zeng, Z.: A resource allocation model based on double-sided combinational auctions for transparent computing. Peer-to-Peer Netw Appl 1\u201318 (2017)","DOI":"10.1007\/s12083-017-0556-6"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Xu, Y., Yu, C., Li, J., Liu, Y.: Video telephony for end-consumers: measurement study of google+, ichat, and skype. In: Proceedings of the 2012 ACM conference on Internet measurement conference, pp. 371\u2013384. ACM (2012)","DOI":"10.1145\/2398776.2398816"},{"issue":"4","key":"15_CR34","doi-asserted-by":"publisher","first-page":"1311","DOI":"10.1109\/TNET.2013.2278271","volume":"22","author":"P Yang","year":"2014","unstructured":"Yang, P., Shao, J., Luo, W., Xu, L., Deogun, J., Lu, Y.: Tcp congestion avoidance algorithm identification. IEEE\/ACM Trans. Netw. (TON) 22(4), 1311\u20131324 (2014)","journal-title":"IEEE\/ACM Trans. Netw. (TON)"}],"container-title":["CCF Transactions on Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42045-019-00015-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s42045-019-00015-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42045-019-00015-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T23:05:03Z","timestamp":1588633503000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s42045-019-00015-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":34,"journal-issue":{"issue":"1-4","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["15"],"URL":"https:\/\/doi.org\/10.1007\/s42045-019-00015-9","relation":{},"ISSN":["2520-8462","2520-8470"],"issn-type":[{"value":"2520-8462","type":"print"},{"value":"2520-8470","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5]]},"assertion":[{"value":"20 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}