|
[1]R. Braden, D. Clark, and S. Shenker, “Integrated Services in the Internet Architecture: an Overview,” IETF RFC 1633, July 1994. [2]S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, and W. Weiss, “An Architecture for Differentiated Services,” IETF RFC 2475, December 1998. [3]C. Dovrolis, D.Stiliadis, and P. Ramanathan, “A Case for Relative Differentiated Services and the Proportional Differentiation model,” IEEE Network, September 1999. [4]C. Dovrolis, D.Stiliadis, and P. Ramanathan, “Proportional Differentiated Services: Delay Differentiation and Packet Scheduling,” IEEE/ACM Trans. on Networking, Vol. 10, No.1, Feb. 2002. [5]Y. Chen, M. Hamdi, H.K. Tsang, and C. Qiao, “Proportional QoS Provision: A Uniform and practical Solution,” IEEE International Conference on Communications, 2002, Vol. 4, pp. 2363 -2367, 2002. [6]C. C. Li, S. L. Tsao, M. C. Cheng, Y. Sun, and Y. M. Huang, “Proportional Delay Differentiation Service Based on weighted Fair Queuing,” IEEE 9th International Conference on Computer Communication and Network (IC3N), , October 2000. [7]V. Jacobson, K. Nichols, and K. Poduri, “An Expedited Forwarding PHB,” IETF RFC 2598, June 1999. [8]J. Heinanen, T. Finland, F. Baker, W. Weiss, and J. Wroclawski, “Assured Forwarding PHB Group,” IETF RFC 2597, June 1999. [9]C. Lin, Y. Jiang, and W. Zhou, "Integrated Performance Evaluation Criteria for Network Traffic Control," IEICE Trans. on Communications, E85-B (11): 2447-2456, November 2002. [10]A. K. Parekh and R. G. Gallager, "A Generalized Processor Sharing Approach to Flow Control: The single Node Case," In Proceedings of IEEE INFOCOM''92, May 1992. [11]S. Floyd and V. Jacobson, "Link-Sharing and resource management models for packet networks," IEEE/ACM Trans. on Networking, Vol.3, pp. 365-386, August 1995. [12]S. Floyd and V. Jacobson, “Random early detection gateways for congestion avoidance,” IEEE/ACM Trans. on Networking, Vol. 1, No. 4, pp. 397-413, August 1993. [13]D. D. Clark and W. Fang, "Explicit allocation of best-effort packet delivery services," IEEEACM Trans. on Networking, Vol.6, pp. 362-373, August 1998. [14]B. Bloom, “Space/time Trade-offs in Hash Coding with Allowable Errors,” Communications of the ACM, 13(7), July 1970. [15]V. Misra, W. B. Gong, and D. Towsley, “Stochastic Differential Equation Modeling and Analysis of TCP Windowsize Behavior.” Technical Report ECE-TR-CCS-99-10-01, 1999 Istanbul. Available at ftp://gaia.cs.umass.edu/pub/Misra99-TCP-Stochastic.ps.gz [16]J.Padhye, V. Firoiu, D. Towsley, and J. Kurose, “Modeling TCP throughput: A simple model and its empirical validation,” In Proceedings of ACM/SIGCOMM, 1998. [17]R. Morris, “Scalable TCP Congestion Control,” In Proceedings of IEEE INFOCOM 2000, pp. 1176 — 1183. [18]V. Misra, W. B. Gong, and D. Towsley, “Fluid-based Analysis of a Network of QUEUE MANAGEMENT Routers Supporting TCP Flows with an Application to RED,” In Proceedings of IEEE INFOCOM, 2001. [19][Online]. Available at : http://www.aciri.org/floyed/REDparameters.txt [20]http://www.isi.edu/nsnam/ns/
|