{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T03:05:13Z","timestamp":1771038313485,"version":"3.50.1"},"reference-count":73,"publisher":"IEEE","funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,2]]},"DOI":"10.23919\/cnsm50824.2020.9269115","type":"proceedings-article","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T21:36:55Z","timestamp":1606772215000},"page":"1-7","source":"Crossref","is-referenced-by-count":6,"title":["Connection-Free Reliable and Efficient Transport Services in the IP Internet"],"prefix":"10.23919","author":[{"given":"J.J.","family":"Garcia-Luna-Aceves","sequence":"first","affiliation":[]},{"given":"Abdulazaz","family":"Ali Albalawi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","article-title":"The CYCLADES End-to-End Protocol","author":"zimmermann","year":"1975","journal-title":"Proc of the Fourth Data Comm Symposium"},{"key":"ref72","article-title":"A Case for Stateful Forwarding Plane","author":"yi","year":"2012","journal-title":"NDN Tech Rep NDN-0002"},{"key":"ref71","article-title":"A Survey of Information-centric Networking Research","author":"xylomenos","year":"2013","journal-title":"IEEE Communication Surveys and Tutorials"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486020"},{"key":"ref39","author":"moiseenko","year":"2014","journal-title":"Fetching content in Named Data Networking with embedded manifests"},{"key":"ref38","author":"lynch","year":"1996","journal-title":"Distributed Algorithms"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/55483.55484"},{"key":"ref32","article-title":"A Deep Reinforcement Learning Perspective on Internet Congestion Control","author":"jay","year":"2019","journal-title":"Proc 36th Int&#x2019; Conf on Machine Learning"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1658978.1658980"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/62546.62572"},{"key":"ref36","article-title":"Explicit Trusted Proxy in HTTP\/2.0","author":"loreto","year":"2014","journal-title":"IETF Internet-Draft"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4340"},{"key":"ref60","article-title":"Reliable Communication on Data Links","author":"spinelli","year":"1988","journal-title":"LIDS-P-1844"},{"key":"ref62","article-title":"Dagster: Censorship-Resistant Publishing Without Replication","author":"stubblefield","year":"2001","journal-title":"Technical Report TR01-380"},{"key":"ref61","author":"stewart","year":"2007","journal-title":"RFC 4960 Stream Control Transmission Protocol (SCTP)"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.21236\/ADA025508"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2006.11.009","article-title":"UDT: UDP-Based Data Transfer for High-Speed Wide Area Networks","volume":"51","author":"gu","year":"2007","journal-title":"Computer Networks"},{"key":"ref64","article-title":"Connection Management in Transport Protocols","author":"sunshine","year":"1978","journal-title":"Computer Networks"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6182"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2015.7390442"},{"key":"ref66","year":"0","journal-title":"NS-3 Network Simulator"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52356"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/361284.361288"},{"key":"ref68","first-page":"172","article-title":"Host-To-Host Protocols","author":"walden","year":"1978","journal-title":"Tutorial A Practical View of Computer Communications Protocols"},{"key":"ref69","article-title":"Tight Bounds for the Sequence Transmission Problem","author":"wand","year":"1989","journal-title":"Proc ACM PODC &#x2018;88"},{"key":"ref2","article-title":"Xavier: A Reinforcement-Learning Approach to TCP Congestion Control","author":"agrawal","year":"2016","journal-title":"Technical Report"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/195613.195651"},{"key":"ref20","article-title":"Specification of Internet Transmission Control Program, TCP (Version 2)","author":"cerf","year":"1977"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2016.7497205"},{"key":"ref21","author":"cerf","year":"1978","journal-title":"Specification of Internet Transmission Control Program TCP (Version 3)"},{"key":"ref24","author":"davis","year":"1979","journal-title":"Computer Networks and Their Protocols"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660143"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282421"},{"key":"ref25","author":"dierks","year":"2008","journal-title":"The Transport Layer Security (TLS) Protocol Version 1 2"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0760"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0761"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787502"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2984356.2984369"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6655143"},{"key":"ref56","article-title":"An Improved Hop-by-hop Interest Shaper for Congestion Control in Named Data Networking","author":"rozhnova","year":"2013","journal-title":"Proc ACM ICN ' &#x2018;12"},{"key":"ref55","article-title":"UDP and TCP as the New Waist of the Internet Hourglass","author":"rosenberg","year":"2008","journal-title":"IETF Internet Draft"},{"key":"ref54","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0052348","article-title":"All-or-nothing Encryption and the Package Transform","author":"rivest","year":"1997","journal-title":"Proc Fast Software Encryption"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3168"},{"key":"ref52","article-title":"The ARPA Internet Protocol","author":"postel","year":"1981","journal-title":"Computer Networks"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1976.1093283"},{"key":"ref11","author":"bertsekas","year":"1992","journal-title":"Data Networks"},{"key":"ref40","article-title":"CCNx Manifest Specification","author":"mosko","year":"2016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2013.6614106"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2012.6193510"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970718"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1476936.1477024"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2528164"},{"key":"ref17","article-title":"Encapsulation of TCP and other transport protocols over UDP","author":"cheshire","year":"2013","journal-title":"Internet draft"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1974.1092259"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0675"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2019.8685491"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6231276"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015499"},{"key":"ref5","article-title":"Named-Data Transport: An End-to-End Approach for an Information-Centric IP Internet","author":"albalawi","year":"2020","journal-title":"Proc ACM ICN ' &#x2018;12"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/26.2744"},{"key":"ref7","article-title":"Contug: A Receiver-Driven Transport Protocol for Content-Centric Networks","author":"arianfar","year":"2010","journal-title":"Proc IEEE ICNP &#x2018;10 (Poster session)"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2932905"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6384450"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.1999.801940"},{"key":"ref45","article-title":"De-ossifying the Internet Transport Layer: A Survey and Future Perspectives","author":"papastergiou","year":"2016","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018596"},{"key":"ref47","article-title":"Explicit Proxies for HTTP\/2.0","author":"peon","year":"2012","journal-title":"IETF Internet Draft Informational"},{"key":"ref42","article-title":"Fitting Square Pegs Through Round Pipes: Unordered Delivery Wire-Compatible with TCP and TLS","author":"nowlan","year":"2012","journal-title":"USENIX NSDI '&#x2018;12"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787482"},{"key":"ref44","year":"0","journal-title":"Ns-3 Based Named Data Networking (Ndn) Simulator"},{"key":"ref43","year":"0","journal-title":"NSF Named Data Networking Project"}],"event":{"name":"2020 16th International Conference on Network and Service Management (CNSM)","location":"Izmir, Turkey","start":{"date-parts":[[2020,11,2]]},"end":{"date-parts":[[2020,11,6]]}},"container-title":["2020 16th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9269033\/9269034\/09269115.pdf?arnumber=9269115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T20:53:15Z","timestamp":1643143995000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9269115\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,2]]},"references-count":73,"URL":"https:\/\/doi.org\/10.23919\/cnsm50824.2020.9269115","relation":{},"subject":[],"published":{"date-parts":[[2020,11,2]]}}}