RFC 3724 Future of End - to - End March 2004 by TCP
نویسنده
چکیده
Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract The end-to-end principle is the core architectural guideline of the Internet. In this document, we briefly examine the development of the end-to-end principle as it has been applied to the Internet architecture over the years. We discuss current trends in the evolution of the Internet architecture in relation to the end-to-end principle, and try to draw some conclusion about the evolution of the end-to-end principle, and thus for the Internet architecture which it supports, in light of these current trends.
منابع مشابه
RFC 5482 TCP User
The TCP user timeout controls how long transmitted data may remain unacknowledged before a connection is forcefully closed. It is a local, per-connection parameter. This document specifies a new TCP option -the TCP User Timeout Option -that allows one end of a TCP connection to advertise its current user timeout value. This information provides advice to the other end of the TCP connection to a...
متن کاملTCP User Timeout Option Status of This Memo
The TCP user timeout controls how long transmitted data may remain unacknowledged before a connection is forcefully closed. It is a local, per-connection parameter. This document specifies a new TCP option -the TCP User Timeout Option -that allows one end of a TCP connection to advertise its current user timeout value. This information provides advice to the other end of the TCP connection to a...
متن کاملMaking TCP More Robust to Long Connectivity Disruptions (TCP-LCD)
Disruptions in end-to-end path connectivity, which last longer than one retransmission timeout, cause suboptimal TCP performance. The reason for this performance degradation is that TCP interprets segment loss induced by long connectivity disruptions as a sign of congestion, resulting in repeated retransmission timer backoffs. This, in turn, leads to a delayed detection of the re-establishment ...
متن کاملRFC 5926 Crypto for TCP - AO June 2010 2
The TCP Authentication Option (TCP-AO) relies on security algorithms to provide authentication between two end-points. There are many such algorithms available, and two TCP-AO systems cannot interoperate unless they are using the same algorithms. This document specifies the algorithms and attributes that can be used in TCP-AO’s current manual keying mechanism and provides the interface for futu...
متن کاملRFC 5926 Crypto for TCP - AO
The TCP Authentication Option (TCP-AO) relies on security algorithms to provide authentication between two end-points. There are many such algorithms available, and two TCP-AO systems cannot interoperate unless they are using the same algorithms. This document specifies the algorithms and attributes that can be used in TCP-AO’s current manual keying mechanism and provides the interface for futu...
متن کامل