The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, the self-similarity characteristic of network traffic and its influence on the queuing performance are studied. The network simulator OPNET is applied to build a local wired experimental network and a campus wireless network. The queuing performance of these two kinds of network is analyzed based on the M/P/1 queuing model. The simulation results demonstrate the influence of traffic...
In this paper, superposition fractal renewal point process (Sup-FRPP) is used to generate fractal traffic. The numerical simulation and analysis results demonstrate that the variation range and relative average degree of fractal of fractal traffic data created by sup-FRPP increase with the increment of Hurst parameter H. The average packet arrival rate, the fractality start-time of the generated traffic,...
In this paper, we apply locally linear embedding method to large-scale communication network traffic analysis at flow-level. With the method, we can separate normal behavior from abnormal behavior by search k nearest neighbors. Compare with PCA, the method provide a nonlinear dimensionality reduction method for network traffic analysis and display more nonlinear information about data.
Call admission control (CAC) is a key factor in quality of service (QoS) provisioning for multimedia service in modern network. Lots of CAC schemes aim to satisfy QoS requirement and upgrade network utilization, but they ignore the fairness principle in network. Directly and simply using these schemes, it will appear the phenomenon that the narrow band calls block the broad band calls. The common...
Accurate classification of Internet traffic is used in many fields such as network planning, network design, network management and monitoring of Internet traffic. In this paper, we apply an unsupervised machine learning approach based on clustering by exploiting the characteristic of applications. This approach uses an improved K-means clustering algorithm named as I-K-Means. I-K-Means uses a transcendental...
Traffic models play an important role in network design and performance evaluation. Since the usual assumption of independencies between different traffic streams, these models are not able to precisely reflect the characteristic of real network traffics. In this paper, we present a joint distribution traffic model which can express the dependency of two traffics. This model is constructed with parameters...
In this paper, we study blocking and outage probabilities in data CDMA networks. Interactions between traffic and interference stochastic characteristics are considered. Different from the traditional approaches where traffic activity factor was used to represent impact of stochastic traffic, we investigate traffic impact jointly with considering the interactions from interference process. Appropriate...
Valiant load-balancing [1] (VLB) has attracted considerable research interest in recent years, as it guarantees 100% throughput for any traffic matrix satisfying hose model[2] constraints without obtaining precise traffic matrix. However, when the traffic variation tends to be gentle, the measurement of traffic demands between certain node pairs becomes feasible. Then it is likely to adjust the VLB...
Survivable multicast traffic grooming (SMTG) is a promising approach to provide reliable and resource-efficient multi-granularity multicast services in mesh wavelength-division multiplexing (WDM) optical networks. In this paper, we focus on the problem of SMTG in WDM mesh networks and propose two models, named traffic grooming with shared protection (TG-SP) and traffic grooming with mixed band protection...
In this paper, we propose a novel hybrid optical network design method, cycle-based hybrid switching optical networks (CHSON), to efficiently support bursty traffic patterns of current networks. CHSON integrates highly efficient transportation of optical circuit switching with statistical multiplexing of Optical burst switching. CHSON could not only reduce the strain on packet forwarding of traditional...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.