{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:10:41Z","timestamp":1758845441454},"reference-count":33,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1990,2,1]],"date-time":"1990-02-01T00:00:00Z","timestamp":633830400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks and ISDN Systems"],"published-print":{"date-parts":[[1990,2]]},"DOI":"10.1016\/0169-7552(90)90137-h","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T19:11:16Z","timestamp":1060283476000},"page":"79-95","source":"Crossref","is-referenced-by-count":5,"title":["A systematic approach for constructing gateways"],"prefix":"10.1016","volume":"18","author":[{"given":"Ernst W.","family":"Biersack","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0169-7552(90)90137-H_BIB1","article-title":"Information Processing Systems \u2014 Open Systems Interconnection \u2014 Basic Reference Model, ISO","author":"International Organization for Standardization","year":"1984","journal-title":"ISO 7498"},{"key":"10.1016\/0169-7552(90)90137-H_BIB2","series-title":"Proc. EFOC\/LAN 89","first-page":"37","article-title":"Principles of Network Interconnection","author":"Biersack","year":"1989"},{"issue":"3","key":"10.1016\/0169-7552(90)90137-H_BIB3","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/TCOM.1986.1096529","article-title":"Protocol Conversion","volume":"34","author":"Green","year":"1986","journal-title":"IEEE Trans. Comm."},{"key":"10.1016\/0169-7552(90)90137-H_BIB4","series-title":"Internet Request for Comments, RFC 942","article-title":"Transport Protocols for the Department of Defense Data Networks","author":"National Research Council","year":"1985"},{"key":"10.1016\/0169-7552(90)90137-H_BIB5","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/0169-7552(86)90054-1","article-title":"OSI Transport Services on Top of TCP","volume":"12","author":"Rose","year":"1987","journal-title":"Comput. Networks ISDN Systems"},{"key":"10.1016\/0169-7552(90)90137-H_BIB6","series-title":"IEEE Std 802.2-1985","article-title":"Logical Link Control","author":"Institute of Electrical and Electronics Engineers","year":"1985"},{"key":"10.1016\/0169-7552(90)90137-H_BIB7","first-page":"47","article-title":"Timer-based Mechanisms in Reliable Transport Protocol Connection Management","volume":"5","author":"Watson","year":"1981","journal-title":"Comput. Networks"},{"key":"10.1016\/0169-7552(90)90137-H_BIB8","series-title":"Internet Request for Comments, RFC 998","article-title":"NETBLK: A Bulk Data Transfer Protocol","author":"Clark","year":"1987"},{"issue":"4","key":"10.1016\/0169-7552(90)90137-H_BIB9","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/1024908.1024910","article-title":"Congestion Control in TCP\/IP Internetworks","volume":"14","author":"Nagle","year":"1984","journal-title":"Comput. Comm. Rev."},{"key":"10.1016\/0169-7552(90)90137-H_BIB10","series-title":"Proc. ACM SIGCOMM 88","first-page":"303","article-title":"An Explicit Binary Feedback Scheme for Congestion Avoidance in Computer Networks with a Connectionless Network Layer","author":"Ramakrishnan","year":"1988"},{"issue":"1","key":"10.1016\/0169-7552(90)90137-H_BIB11","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/2080.357392","article-title":"Implementing Remote Procedure Calls","volume":"2","author":"Birrel","year":"1984","journal-title":"ACM Trans. Comput. Systems"},{"key":"10.1016\/0169-7552(90)90137-H_BIB12","series-title":"Computer Networks","author":"Tanenbaum","year":"1988"},{"key":"10.1016\/0169-7552(90)90137-H_BIB13","article-title":"Information Processing Systems \u2014 Open Systems Interconnection \u2014 Connection Oriented Transport Protocol Specification, ISO","author":"International Organization for Standardization","year":"1984","journal-title":"ISO\/DP 8073"},{"key":"10.1016\/0169-7552(90)90137-H_BIB14","article-title":"Information Processing Systems \u2014 Open Systems Interconnection \u2014 Basic Reference Model \u2014 Part 4: Management Framework, ISO","author":"International Organization for Standardization","year":"1988","journal-title":"ISO 7498-4"},{"key":"10.1016\/0169-7552(90)90137-H_BIB15","article-title":"Data Communication \u2014 X.25 Packet Level Protocol for Data Terminal Equipment, ISO","author":"International Organization for Standardization","year":"1984","journal-title":"ISO\/DIS 8208"},{"key":"10.1016\/0169-7552(90)90137-H_BIB16","series-title":"Internet Request for Comments, RFC 826","article-title":"An Ethernet Address Resolution Protocol","author":"Plummer","year":"1982"},{"key":"10.1016\/0169-7552(90)90137-H_BIB17","series-title":"Internet Request for Comments, RFC 792","article-title":"Internet Control Message Protocol","author":"Postel","year":"1981"},{"key":"10.1016\/0169-7552(90)90137-H_BIB18","series-title":"Symposium on Security and Privacy '87","first-page":"174","article-title":"Visa Scheme for Inter-organization Network Security","author":"Estrin","year":"1987"},{"key":"10.1016\/0169-7552(90)90137-H_BIB19","series-title":"Proc. ACM SIGCOMM 86","first-page":"397","article-title":"Why TCP Timers Don't Work Well","author":"Zhang","year":"1986"},{"key":"10.1016\/0169-7552(90)90137-H_BIB20","series-title":"Proc. ACM SIGCOMM 87","first-page":"2","article-title":"Improving Round-Trip Time Estimates in Reliable Transport Protocols","author":"Karn","year":"1987"},{"key":"10.1016\/0169-7552(90)90137-H_BIB21","series-title":"Technical Report Report TM-726","article-title":"The TCP and ISO Transport Service, a Brief Description and Comparison","author":"Groenbaek","year":"1984"},{"key":"10.1016\/0169-7552(90)90137-H_BIB22","series-title":"Proc. ACM SIGCOMM 83","first-page":"154","article-title":"CSNET Protocol Software: The IP-to-X.25 Interface","author":"Comer","year":"1983"},{"key":"10.1016\/0169-7552(90)90137-H_BIB23","article-title":"Internet Protocol","author":"Department of Defense","year":"1983","journal-title":"MIL-STD-1777"},{"key":"10.1016\/0169-7552(90)90137-H_BIB24","series-title":"Technical Report TUM-I8802","article-title":"Techniken zum Zusammenschlu\u03b2 von Rechnernetzen und deren Anwendung auf Protokolle des Transportsystems","author":"Biersack","year":"1988"},{"key":"10.1016\/0169-7552(90)90137-H_BIB25","article-title":"Transmission Control Protocol","author":"Department of Defense","year":"1983","journal-title":"MIL-STD-1778"},{"issue":"4","key":"10.1016\/0169-7552(90)90137-H_BIB26","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1145\/357401.357402","article-title":"End-to-end Arguments in System Design","volume":"2","author":"Saltzer","year":"1984","journal-title":"ACM Trans. Comput. Systems"},{"key":"10.1016\/0169-7552(90)90137-H_BIB27","series-title":"Proc. Flow Control in Computer Networks","first-page":"359","article-title":"Comparison of the Hop-by-hop and Endpoint Approaches to Network Interconnection","author":"Edge","year":"1979"},{"key":"10.1016\/0169-7552(90)90137-H_BIB28","first-page":"180","article-title":"Internetworking","volume":"Vol. II","author":"Pouzin","year":"1985"},{"key":"10.1016\/0169-7552(90)90137-H_BIB29","article-title":"Recommendation X.25 \u2014 Interface between DTE and DCE for Terminals Operating in the Packet Mode on Public Data Networks","volume":"7","author":"Comit\u00e9Consultatif International de T\u00e9l\u00e9graphique et T\u00e9l\u00e9phonique","year":"1980","journal-title":"Orange Book"},{"key":"10.1016\/0169-7552(90)90137-H_BIB30","series-title":"Proc. 7th Int. Conf. on Distributed Computing Systems","first-page":"398","article-title":"A Performance Study of the ISO Transport Protocol","author":"Meister","year":"1987"},{"key":"10.1016\/0169-7552(90)90137-H_BIB31","article-title":"Carrier Sense Multiple Access with Collision Detection (CSMA\/CD) Access Method and Physical Layer Specifications","author":"Institute of Electrical and Electronics Engineers","year":"1985"},{"key":"10.1016\/0169-7552(90)90137-H_BIB32","series-title":"IEEE Std 802.4-1985","article-title":"Token-passing Bus Access Method and Physical Layer Specifications","author":"Institute of Electrical and Electronics Engineers","year":"1985"},{"key":"10.1016\/0169-7552(90)90137-H_BIB33","series-title":"IEEE Std 802.5-1985","article-title":"Token Ring Access Method and Physical Layer Specifications","author":"Institute of Electrical and Electronics Engineers","year":"1985"}],"container-title":["Computer Networks and ISDN Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016975529090137H?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016975529090137H?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T03:22:20Z","timestamp":1552620140000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/016975529090137H"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990,2]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1990,2]]}},"alternative-id":["016975529090137H"],"URL":"https:\/\/doi.org\/10.1016\/0169-7552(90)90137-h","relation":{},"ISSN":["0169-7552"],"issn-type":[{"value":"0169-7552","type":"print"}],"subject":[],"published":{"date-parts":[[1990,2]]}}}