{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:41:20Z","timestamp":1750308080970,"version":"3.41.0"},"reference-count":35,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2005,1]]},"abstract":"<jats:p>This paper presents a new methodology for graphical representation of TCP performance, either in simulation or real tests, for scenarios where many connections carrying different amounts of data coexist simultaneously. The methodology is based on statistical evaluation of the connections' goodput and graphical representation of the results using three plotting styles, each optimized for a different analysis. The suitability of this methodology has been proven by analysing the performance of different TCP versions and configurations in a web-browsing simulated scenario.<\/jats:p>","DOI":"10.1145\/1052812.1052815","type":"journal-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T19:28:32Z","timestamp":1131391712000},"page":"99-110","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A new methodology for representation of TCP performance in multiconnection environments"],"prefix":"10.1145","volume":"35","author":[{"given":"Eva","family":"Gonz\u00e1lez-Parada","sequence":"first","affiliation":[{"name":"University of M\u00e1laga"}]},{"given":"J. M.","family":"Cano-Garc\u00eda","sequence":"additional","affiliation":[{"name":"University of M\u00e1laga"}]},{"given":"A.","family":"D\u00edaz-Estrella","sequence":"additional","affiliation":[{"name":"University of M\u00e1laga"}]}],"member":"320","published-online":{"date-parts":[[2005,1]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/235160.235162"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/248156.248180"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/248156.248181"},{"key":"e_1_2_1_4_1","first-page":"205","article-title":"TCP behavior with many flows","author":"Morris R.","year":"1997","unstructured":"R. Morris , \" TCP behavior with many flows ,\" in Proceedings of IEEE International Conference on Network Protocols , 1997 , pp. 205 -- 211 .]] R. Morris, \"TCP behavior with many flows,\" in Proceedings of IEEE International Conference on Network Protocols, 1997, pp. 205--211.]]","journal-title":"Proceedings of IEEE International Conference on Network Protocols"},{"key":"e_1_2_1_5_1","volume-title":"RFC","author":"Poduri K.","year":"1998","unstructured":"K. Poduri and K. Nichols , \" Simulation studies of increased initial TCP window size,\" IETF , RFC 2415, September 1998 .]] K. Poduri and K. Nichols, \"Simulation studies of increased initial TCP window size,\" IETF, RFC 2415, September 1998.]]"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/510726.510728"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/774763.774767"},{"key":"e_1_2_1_8_1","first-page":"27","volume-title":"Eds. Birkhauser","author":"Willinger W.","year":"1998","unstructured":"W. Willinger , V. Paxon , and M. S. Taqqu , \" Self-similarity and heavy tails: Structural modeling of network traffic,\" in A Practical Guide to Heavy Tails: Statistical Techniques and Applications, R. Adler, R. Feldman, and M. S. Taqqu , Eds. Birkhauser , 1998 , pp. 27 -- 53 .]] W. Willinger, V. Paxon, and M. S. Taqqu, \"Self-similarity and heavy tails: Structural modeling of network traffic,\" in A Practical Guide to Heavy Tails: Statistical Techniques and Applications, R. Adler, R. Feldman, and M. S. Taqqu, Eds. Birkhauser, 1998, pp. 27--53.]]"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019236319752"},{"key":"e_1_2_1_10_1","volume-title":"A behavioral model of Web traffic,\" in Proceedings of 7th IEEE International Conference on Networ Protocol (ICNP'99), september","author":"Choi H.","year":"1999","unstructured":"H. Choi and J. Limb , \" A behavioral model of Web traffic,\" in Proceedings of 7th IEEE International Conference on Networ Protocol (ICNP'99), september , 1999 .]] H. Choi and J. Limb, \"A behavioral model of Web traffic,\" in Proceedings of 7th IEEE International Conference on Networ Protocol (ICNP'99), september, 1999.]]"},{"key":"e_1_2_1_11_1","first-page":"2004","article-title":"Stochastic models for generating synthetic http source traffic","author":"Cao J.","year":"2004","unstructured":"J. Cao , W. S. Cleveland , Y. Gao , K. Jeffay , F. D. Smith , and M. Wei , \" Stochastic models for generating synthetic http source traffic ,\" Proceedings of INFOCOM 2004 , 2004 .]] J. Cao, W. S. Cleveland, Y. Gao, K. Jeffay, F. D. Smith, and M. Wei, \"Stochastic models for generating synthetic http source traffic,\" Proceedings of INFOCOM 2004, 2004.]]","journal-title":"Proceedings of INFOCOM"},{"key":"e_1_2_1_12_1","volume-title":"Impact of TCP variants on http performance,\" in proceedings of International Workshop in High Speed Networking, may","author":"Farkas K.","year":"2002","unstructured":"K. Farkas , P. Huang , B. Krishnamurthy , Y. Zhang , and J. Padhye , \" Impact of TCP variants on http performance,\" in proceedings of International Workshop in High Speed Networking, may 2002 .]] K. Farkas, P. Huang, B. Krishnamurthy, Y. Zhang, and J. Padhye, \"Impact of TCP variants on http performance,\" in proceedings of International Workshop in High Speed Networking, may 2002.]]"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997155"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997159"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/505696.505703"},{"key":"e_1_2_1_16_1","volume-title":"wide project","author":"MAWI","year":"2003","unstructured":"\" MAWI working group traffic archive , wide project ,\" 2003 . {Online}. Available: http:\/\/tracer.csl.sony.co.jp\/mawi\/]] \"MAWI working group traffic archive, wide project,\" 2003. {Online}. Available: http:\/\/tracer.csl.sony.co.jp\/mawi\/]]"},{"key":"e_1_2_1_17_1","volume-title":"November","author":"Guo L.","year":"2001","unstructured":"L. Guo and I. Matta , \" The war between mice and elephants,\" in Proceedings of 9th IEEE International Conference on Network Protocols (ICNP'01) , November 2001 .]] L. Guo and I. Matta, \"The war between mice and elephants,\" in Proceedings of 9th IEEE International Conference on Network Protocols (ICNP'01), November 2001.]]"},{"key":"e_1_2_1_18_1","first-page":"1271","volume-title":"July 1999","author":"Reyes-Lecuona A.","unstructured":"A. Reyes-Lecuona , E. Gonz\u00e1lez-Parada , E. Casilari , J. Casasola , and A. Diaz-Estrella , \" A page-oriented WWW trafic model for wireless systems simulations,\" in Proceedings of 16th ITC , July 1999 , pp. 1271 -- 1280 .]] A. Reyes-Lecuona, E. Gonz\u00e1lez-Parada, E. Casilari, J. Casasola, and A. Diaz-Estrella, \"A page-oriented WWW trafic model for wireless systems simulations,\" in Proceedings of 16th ITC, July 1999, pp. 1271--1280.]]"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316235"},{"issue":"8","key":"e_1_2_1_20_1","first-page":"961","article-title":"Where mathematics meets the Internet","volume":"45","author":"Willinger W.","year":"1998","unstructured":"W. Willinger and V. Paxon , \" Where mathematics meets the Internet ,\" Notices of the American Mathematical Society , vol. 45 , no. 8 , pp. 961 -- 970 , September 1998 .]] W. Willinger and V. Paxon, \"Where mathematics meets the Internet,\" Notices of the American Mathematical Society, vol. 45, no. 8, pp. 961--970, September 1998.]]","journal-title":"Notices of the American Mathematical Society"},{"key":"e_1_2_1_21_1","first-page":"592","volume-title":"April 1997","author":"Mah B. A.","unstructured":"B. A. Mah , \"An empirical model of HTTP network traffic,\" in Proceedings of IEEE INFOCOM'97 , April 1997 , pp. 592 -- 600 .]] B. A. Mah, \"An empirical model of HTTP network traffic,\" in Proceedings of IEEE INFOCOM'97, April 1997, pp. 592--600.]]"},{"key":"e_1_2_1_22_1","volume-title":"RFC","author":"Floyd S.","year":"1999","unstructured":"S. Floyd and T. Henderson , \" The NewReno modification to TCP's fast recovery algorithm,\" IETF , RFC 2582, April 1999 .]] S. Floyd and T. Henderson, \"The NewReno modification to TCP's fast recovery algorithm,\" IETF, RFC 2582, April 1999.]]"},{"key":"e_1_2_1_23_1","volume-title":"RFC","author":"Allman M.","year":"2001","unstructured":"M. Allman and S. Floyd , \" Enhancing TCP loss recovery using limited transmit,\" IETF , RFC 3042, January 2001 .]] M. Allman and S. Floyd, \"Enhancing TCP loss recovery using limited transmit,\" IETF, RFC 3042, January 2001.]]"},{"key":"e_1_2_1_24_1","volume-title":"may","author":"Floyd S.","year":"1999","unstructured":"S. Floyd , \"Validation experiences with the ns simulator,\" in In Proceedings of the DARPA\/ NIST Network Simulation Validation Workshop , may 1999 .]] S. Floyd, \"Validation experiences with the ns simulator,\" in In Proceedings of the DARPA\/NIST Network Simulation Validation Workshop, may 1999.]]"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/52325.52356"},{"key":"e_1_2_1_26_1","volume-title":"RFC","author":"Allman M.","year":"1999","unstructured":"M. Allman , V. Paxson , and W. Stevens , \" TCP congestion control,\" IETF , RFC 2581, April 1999 .]] M. Allman, V. Paxson, and W. Stevens, \"TCP congestion control,\" IETF, RFC 2581, April 1999.]]"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2018"},{"key":"e_1_2_1_28_1","volume-title":"RFC","author":"Allman M.","year":"1998","unstructured":"M. Allman , S. Floyd , and C. Partridge , \" Increasing TCP initial window,\" IETF , RFC 2414, September 1998 .]] M. Allman, S. Floyd, and C. Partridge, \"Increasing TCP initial window,\" IETF, RFC 2414, September 1998.]]"},{"key":"e_1_2_1_29_1","doi-asserted-by":"crossref","unstructured":"M. Allman \"Increasing TCP initial window \" IETF RFC 3390 October 2002.]]   M. Allman \"Increasing TCP initial window \" IETF RFC 3390 October 2002.]]","DOI":"10.17487\/rfc3390"},{"key":"e_1_2_1_30_1","doi-asserted-by":"crossref","unstructured":"J. Postel \"The TCP Maximum Segment Size and related topics \" IETF RFC 879 November 1983.]]   J. Postel \"The TCP Maximum Segment Size and related topics \" IETF RFC 879 November 1983.]]","DOI":"10.17487\/rfc0879"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/293927.295114"},{"key":"e_1_2_1_32_1","unstructured":"U. Ayesta and K. Avrachenkov \"The effect of the initial window size and limited transmit algorithm on the transient behaviour of tcp transfers \" in Proceedings of The 15th ITC Specialist Seminar on Internet Traffic Engineering and Traffic Management july 2002.]]  U. Ayesta and K. Avrachenkov \"The effect of the initial window size and limited transmit algorithm on the transient behaviour of tcp transfers \" in Proceedings of The 15th ITC Specialist Seminar on Internet Traffic Engineering and Traffic Management july 2002.]]"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383083"},{"key":"e_1_2_1_34_1","volume-title":"lawrence berkeley national labs, ftp:\/\/ftp.ee.lbl.gov\/","author":"Jacobson V.","year":"1989","unstructured":"V. Jacobson , C. Leres , and S. McCanne , \"tcpdump , lawrence berkeley national labs, ftp:\/\/ftp.ee.lbl.gov\/ , 1989 ,\" 1989.]] V. Jacobson, C. Leres, and S. McCanne, \"tcpdump, lawrence berkeley national labs, ftp:\/\/ftp.ee.lbl.gov\/, 1989,\" 1989.]]"},{"key":"e_1_2_1_35_1","volume-title":"a tcpdump file analysis tool","author":"Ostermann S.","year":"1996","unstructured":"S. Ostermann , \"tcptrace : a tcpdump file analysis tool ,\" 1996 . {Online}. Available: http:\/\/jarok.cs.ohiou.edu\/software\/tcptrace\/tcptrace.html]] S. Ostermann, \"tcptrace: a tcpdump file analysis tool,\" 1996. {Online}. Available: http:\/\/jarok.cs.ohiou.edu\/software\/tcptrace\/tcptrace.html]]"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1052812.1052815","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1052812.1052815","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:07:42Z","timestamp":1750262862000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1052812.1052815"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,1]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2005,1]]}},"alternative-id":["10.1145\/1052812.1052815"],"URL":"https:\/\/doi.org\/10.1145\/1052812.1052815","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2005,1]]},"assertion":[{"value":"2005-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}