{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T06:13:34Z","timestamp":1744784014795},"reference-count":47,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1990,4,1]],"date-time":"1990-04-01T00:00:00Z","timestamp":638928000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Performance Evaluation"],"published-print":{"date-parts":[[1990,4]]},"DOI":"10.1016\/0166-5316(90)90026-f","type":"journal-article","created":{"date-parts":[[2003,8,8]],"date-time":"2003-08-08T06:10:42Z","timestamp":1060323042000},"page":"45-65","source":"Crossref","is-referenced-by-count":15,"title":["Performance analysis of transport protocols over congestive channels"],"prefix":"10.1016","volume":"11","author":[{"given":"Jean-Chrysostome","family":"Bolot","sequence":"first","affiliation":[]},{"given":"A","family":"Udaya Shankar","sequence":"additional","affiliation":[]},{"given":"Brigitte D","family":"Plateau","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/0166-5316(90)90026-F_BIB1","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1109\/TCOM.1986.1096499","article-title":"Performance analysis of the selective repeat ARQ protocol","volume":"COM-34","author":"Anagnostou","year":"1986","journal-title":"IEEE Trans. Commun."},{"issue":"11","key":"10.1016\/0166-5316(90)90026-F_BIB2","doi-asserted-by":"crossref","first-page":"1889","DOI":"10.1109\/TCOM.1980.1094606","article-title":"Balanced HDLC procedures: a performance analysis","volume":"COM-28","author":"Bux","year":"1980","journal-title":"IEEE Trans. Commun."},{"issue":"1","key":"10.1016\/0166-5316(90)90026-F_BIB3","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/32.4621","article-title":"User-process communication performance in networks of computers","volume":"TSE-14","author":"Cabrera","year":"1988","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/0166-5316(90)90026-F_BIB4","series-title":"Proc. ACM SIGCOMM '86","first-page":"406","article-title":"VMTP: a transport protocol for the next generation of communication systems","author":"Cheriton","year":"1986"},{"key":"10.1016\/0166-5316(90)90026-F_BIB5","series-title":"Window and Acknowledgement Strategy in TCP, RFC 813","author":"Clark","year":"1982"},{"key":"10.1016\/0166-5316(90)90026-F_BIB6","series-title":"Proc. ACM SIGCOMM '87","first-page":"353","article-title":"NETBLT: a high throughput transport protocol","author":"Clark","year":"1987"},{"key":"10.1016\/0166-5316(90)90026-F_BIB7","article-title":"Defense Data Networks","year":"1983","journal-title":"Transmission Control Protocol"},{"key":"10.1016\/0166-5316(90)90026-F_BIB8","article-title":"Defense Data Networks","year":"1984","journal-title":"File Transfer Protocol"},{"key":"10.1016\/0166-5316(90)90026-F_BIB9","article-title":"Defense Data Networks","year":"1984","journal-title":"Telnet"},{"issue":"7","key":"10.1016\/0166-5316(90)90026-F_BIB10","doi-asserted-by":"crossref","first-page":"944","DOI":"10.1109\/TCOM.1981.1095078","article-title":"Design choices for selective-repeat retransmission protocols","volume":"COM-29","author":"Easton","year":"1981","journal-title":"IEEE Trans. Commun."},{"issue":"1","key":"10.1016\/0166-5316(90)90026-F_BIB11","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/24605.24608","article-title":"Some observations on the performance of a 56Kbit Internet link","volume":"17","author":"Farber","year":"1987","journal-title":"Comput. Commun. Review"},{"issue":"3","key":"10.1016\/0166-5316(90)90026-F_BIB12","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1109\/TCOM.1978.1094065","article-title":"An analytic evaluation of the performance of the \u201cSend and Wait\u201d protocol","volume":"COM-26","author":"Fayolle","year":"1978","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/0166-5316(90)90026-F_BIB13","first-page":"409","article-title":"Performance evaluation of the HDLC protocol","volume":"2","author":"Gelenbe","year":"1978","journal-title":"Comput. Networks"},{"key":"10.1016\/0166-5316(90)90026-F_BIB14","series-title":"Matrix Computations","author":"Golub","year":"1983"},{"key":"10.1016\/0166-5316(90)90026-F_BIB15","series-title":"International Standard 4335, High Level Data Link Control Procedures","author":"International Standard Organization","year":"1979"},{"key":"10.1016\/0166-5316(90)90026-F_BIB16","series-title":"International Standard 8073, Transport Protocol Specification","author":"International Standard Organization","year":"1984"},{"key":"10.1016\/0166-5316(90)90026-F_BIB17","series-title":"Proc. ACM SIGCOMM '88","first-page":"314","article-title":"Congestion avoidance and control","author":"Jacobson","year":"1988"},{"issue":"4","key":"10.1016\/0166-5316(90)90026-F_BIB18","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1109\/TCOM.1981.1095012","article-title":"A drop and throttle flow control policy for computer networks","volume":"COM-29","author":"Kamoun","year":"1981","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/0166-5316(90)90026-F_BIB19","series-title":"Proc. ACM SIGCOMM '87","first-page":"2","article-title":"Improving round-trip time estimates in reliable transport protocols","author":"Karn","year":"1987"},{"key":"10.1016\/0166-5316(90)90026-F_BIB20","series-title":"Proc. ACM SIGCOMM '87","first-page":"390","article-title":"Fragmentation considered harmful","author":"Kent","year":"1988"},{"key":"10.1016\/0166-5316(90)90026-F_BIB21","series-title":"Communication Nets: Stochastic Message Flow and Delay","author":"Kleinrock","year":"1964"},{"issue":"4","key":"10.1016\/0166-5316(90)90026-F_BIB22","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1145\/357377.357381","article-title":"Optimal routing in closed queueing networks","volume":"1","author":"Kobayashi","year":"1983","journal-title":"ACM Trans. Comput. Syst."},{"issue":"1","key":"10.1016\/0166-5316(90)90026-F_BIB23","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1145\/1040142.1040143","article-title":"Modeling delay in selective retransmission protocol by a FIFO queue","volume":"14","author":"Kumar","year":"1984","journal-title":"Comp. Commun. Review"},{"issue":"1","key":"10.1016\/0166-5316(90)90026-F_BIB24","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1109\/TCOM.1979.1094280","article-title":"Congestion control of store-and-forward networks by input buffer limits\u2014An analysis","volume":"COM-27","author":"Lam","year":"1979","journal-title":"IEEE Trans. Commun."},{"issue":"3","key":"10.1016\/0166-5316(90)90026-F_BIB25","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/0166-5316(82)90009-8","article-title":"Queueing network models of packet switching networks, Part 2: networks with population size constraints","volume":"2","author":"Lam","year":"1982","journal-title":"Perform. Eval."},{"key":"10.1016\/0166-5316(90)90026-F_BIB26","series-title":"Internet Delay Experiments, RFC 889","author":"Mills","year":"1983"},{"key":"10.1016\/0166-5316(90)90026-F_BIB27","series-title":"Proc. ACM SIGCOMM '87","first-page":"191","article-title":"The NSFNET backbone network","author":"Mills","year":"1987"},{"issue":"4","key":"10.1016\/0166-5316(90)90026-F_BIB28","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/1024908.1024910","article-title":"Congestion control in IP\/TCP internetworks","volume":"14","author":"Nagle","year":"1984","journal-title":"Comp. Commun. Review"},{"issue":"12","key":"10.1016\/0166-5316(90)90026-F_BIB29","doi-asserted-by":"crossref","first-page":"1434","DOI":"10.1109\/TCOM.1975.1092752","article-title":"Congestion control in store and forward tandem links","volume":"COM-23","author":"Pennotti","year":"1975","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/0166-5316(90)90026-F_BIB30","article-title":"A method for handling complex Markov models of distributed algorithms","author":"Plateau","year":"1986"},{"key":"10.1016\/0166-5316(90)90026-F_BIB31","series-title":"Proc. 4th Int. Conf. on Modelling Techniques and Tools for Comp. Perf. Eval.","first-page":"283","article-title":"PEPS: A package for solving complex Markov models of parallel systems","author":"Plateau","year":"1988"},{"issue":"4","key":"10.1016\/0166-5316(90)90026-F_BIB32","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/0166-5316(88)90031-4","article-title":"Performance analysis of synchronization for two communicating processes","volume":"8","author":"Plateau","year":"1988","journal-title":"Perform. Eval."},{"key":"10.1016\/0166-5316(90)90026-F_BIB33","series-title":"Proc. ACM SIGCOMM '88","first-page":"303","article-title":"A binary feedback scheme for congestion avoidance in computer networks with a connectionless network layer","author":"Ramakrishnan","year":"1988"},{"issue":"10","key":"10.1016\/0166-5316(90)90026-F_BIB34","doi-asserted-by":"crossref","first-page":"1199","DOI":"10.1109\/TCOM.1979.1094531","article-title":"A queueing network analysis of computer communication networks with window flow control","volume":"COM-27","author":"Reiser","year":"1979","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/0166-5316(90)90026-F_BIB35","series-title":"Performance of Data Communication Systems and their Applications","first-page":"67","article-title":"Admission delays on virtual routes with window flow control","author":"Reiser","year":"1981"},{"key":"10.1016\/0166-5316(90)90026-F_BIB36","unstructured":"D. Sanghi, TCP Performance Monitoring, Master's Thesis, Dept. of Computer Science, University of Maryland, College Park (in preparation)."},{"key":"10.1016\/0166-5316(90)90026-F_BIB37","series-title":"Instrumenting a TCP implementation, CS-TR-2061","author":"Sanghi","year":"1988"},{"issue":"1","key":"10.1016\/0166-5316(90)90026-F_BIB38","first-page":"3","article-title":"Packet fragmentation in internet protocols","volume":"3","author":"Schoh","year":"1979","journal-title":"Comput. Networks"},{"issue":"1","key":"10.1016\/0166-5316(90)90026-F_BIB39","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1109\/TCOM.1982.1095377","article-title":"Performance analysis of the SNA virtual route pacing control","volume":"COM-30","author":"Schwartz","year":"1982","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/0166-5316(90)90026-F_BIB40","series-title":"Proc. ACM SIGCOMM '86","first-page":"84","article-title":"A verified sliding window protocol with variable flow control","author":"Shankar","year":"1986"},{"issue":"3","key":"10.1016\/0166-5316(90)90026-F_BIB41","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1145\/65000.65003","article-title":"Verified data transfer protocols with variable flow control","volume":"7","author":"Shankar","year":"1989","journal-title":"ACM Trans. Comput. Syst."},{"issue":"2","key":"10.1016\/0166-5316(90)90026-F_BIB42","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1109\/TCOM.1977.1093807","article-title":"Efficiency of interprocess communication protocols for computer networks","volume":"COM-25","author":"Sunshine","year":"1977","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/0166-5316(90)90026-F_BIB43","series-title":"Computer Networks","author":"Tanenbaum","year":"1988"},{"issue":"3","key":"10.1016\/0166-5316(90)90026-F_BIB44","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1109\/TCOM.1986.1096526","article-title":"Interaction between routing and flow control algorithms","volume":"COM-34","author":"Thaker","year":"1986","journal-title":"IEEE Trans. Commun."},{"issue":"2","key":"10.1016\/0166-5316(90)90026-F_BIB45","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/13677.13678","article-title":"Gaining efficiency in transport services by appropriate design and implementation choices","volume":"5","author":"Watson","year":"1987","journal-title":"ACM Trans. Comput. Syst."},{"issue":"3","key":"10.1016\/0166-5316(90)90026-F_BIB46","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/0166-5316(86)90016-7","article-title":"Performance analysis of a virtual circuit protocol with local control","volume":"6","author":"Wieber","year":"1986","journal-title":"Perform. Eval."},{"key":"10.1016\/0166-5316(90)90026-F_BIB47","series-title":"Proc. ACM SIGCOMM '86","first-page":"397","article-title":"Why TCP timers don't work well","author":"Zhang","year":"1986"}],"container-title":["Performance Evaluation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016653169090026F?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016653169090026F?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T00:58:33Z","timestamp":1552611513000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/016653169090026F"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990,4]]},"references-count":47,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1990,4]]}},"alternative-id":["016653169090026F"],"URL":"https:\/\/doi.org\/10.1016\/0166-5316(90)90026-f","relation":{},"ISSN":["0166-5316"],"issn-type":[{"value":"0166-5316","type":"print"}],"subject":[],"published":{"date-parts":[[1990,4]]}}}