The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, more and more applications use proprietary protocols, which make it difficult to identify them by using predefined well-known ports. Among all the mechanisms to identify and classify network traffic, the deep packet inspection (DPI)[1] is the most widely used method. In order to make the identification more accuracy, we should build a good set of application protocol signatures, however,...
This paper discusses problems on scale-free network traffic, with the bandwidth considered as the delivering ability of links. Moreover, the traffic model of scale-free network is established, with the fixed bandwidth, which means the delivering ability of each link as a constant in the network. For better understanding traffic dynamic in real systems, the effects of bandwidth on the packet delivering...
ON/OFF model is the most attractive self-similar traffic generating methods due to a clear physical meaning of the self-similarity/long-range dependence. The Hurst is the most important parameters for the simulated traffics to be estimated. However, the estimated Hurst values often change with the sampling frequency. In this paper, firstly, we under-sample and over-sample the network traffic simulated...
Recently, traffic classification (TC) becomes more and more important for network management and measurement tasks. The new-coming machine learning based classification methods can achieve high classification accuracy and fast identification ability; however, all these related TC methods up to now always have the assumption of the stability of classification model constituted from network traffic...
The next generation Internet Protocol, IPv6, has attracted growing attention and has been deploying worldwide, especially in Europe, Asia, and North America. It intends to provide better QoS (quality of service) ability for the increasing demanding multimedia service, and FL (flowlabel) field in IPv6 main header was designed to be a big help in alleviating QoS problem. However, the related research...
Recently, traffic classification becomes more and more important for network management and measurement tasks. In this paper, we make a first step towards dynamic online traffic classification using data stream mining method. Two main contributions are as follows. Firstly, we propose a novel integrated dynamic online traffic classification framework, called DSTC (data stream based traffic classification)...
One of the important issues in the design of future generation high-speed networks is to provide differentiated services to different types of traffic with/without various time constraints and priorities. In this paper, we study the problem of providing differentiated services in passive star coupled wavelength division multiplexing (WDM) optical networks. We suggest a simple static priority based...
In this paper, a local optimization framework is proposed, which is able to include system constraints, i.e., channel availability, receiver availability and tuning overhead, by linear mathematical formulations so that it is sufficient to obtain the optimal performance in terms of message loss rate. A mixed integer linear programming (MILP) based optimal scheduling scheme has been proposed. Based...
Longest prefix matching (LPM) is a challenging subject because of the increasing routing table size, the increasing link speed, and the increasing Internet traffic with decreasing packet size. With the advent of IPv6, it requires reconsideration of the previous schemes particularly designed for IPv4. We introduce the first algorithm that we are aware of to employ divide-and-conquer method for IPv6...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.