The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The signature-based malware-detection method is the most popular one used in anti-malware software. However, given advanced malware capabilities, the database of traditional signature-based antimalware software is becoming bloated to support identification of every variant. The increase in signatures slows the detection process and, in some cases, exceeds the resource availability of the platforms...
In this paper we present a new multifractal approach for modern network traffic modeling. The proposed method is based on a novel construction scheme of conservative multiplicative cascades. We show that the proposed model can faithfully capture some main characteristics (scaling function and moment factor) of multifractal processes. For this new network traffic model we also explicitly derive analytical...
In this paper, a general teletraffic analysis to evaluate the performance of cognitive radio networks with arbitrary order Coxian distributed channel holding time in the primary network is developed. The relevance of the considered Coxian model relies on its universality property, mathematical tractability, reduced dimensionality, and the fact that it generalizes a large class of useful previous employed...
The paper presents a new analytical model for performance evaluation of multi-service communication systems. The paper considers for the first time multi-service systems in which each single traffic source can generate calls of different traffic classes, i.e. the multi-service systems with multi-service sources. To date only the models assuming that a single source of given class generates always...
Research reveals that the fluid-based model can describe the dynamic behavior for bottleneck networks. The stability of the fluid-model can inflect whether there is a congestion of the network. A fluid-based model combined TCP and UDP under PI mechanism has been presented in this paper. We linearized the fluid-model equation and educe two propositions. Based on the fluid model, we linearized this...
In vehicular ad-hoc networks, physical parameters of traffic flow (traffic density and velocities), directly relate to networking parameters (node degree and duration of communication). While existing research on these relations has mainly focused on simulative work or on the free-flow regime of traffic, we discuss these relations for both free-flow and congested traffic and provide an analytical...
The fluctuation of input traffic source has a profound influence on the network system, the effective quantitative characterization on the fluctuation behavior is yet in need of development. On the network evolvement model, which is based on the evolvement rules, the paper provides an analytical result for description on fluctuation behavior of input traffic source. Firstly, the characteristic parameter...
The explosive growth of Internet traffic has led to a dramatic increase in demand for data transmission capacity, which has spurred tremendous research activities in real-time traffic estimation and related methodologies. High-speed services and bulk transmission were available and various next-generation converged services are undergoing a change by various services. This paper presents improved...
We consider the use of a novel load balancing-aware routing algorithm for multipath wireless sensor networks. Focusing on solutions that minimize end-to-end delay, we optimize resource usage in mobile nodes. An analytical model is provided for flow-level multipath routing design; we then proceed to simplify the model for more practicality while retaining much of the original functionality. The practical...
In many space communication scenarios high priority space traffic is received by a ground antenna and retransmitted via a ground link to a ground asset. In most instances this ground link supports multiple communication streams concurrently, and needs to multiplex the space traffic with these streams using a certain MAC layer protocol. By design, such MAC layer protocols will add a certain random...
Based on the analysis to the collected traffic from many WLAN testbed, a statistical model is proposed to predict the short-term traffic in IEEE 802.11 networks. By large numbers of differencing and sampling to the original data sequence, the season property was found and verified. Then, a time series model was given which can accurately predict the WLAN traffic, multiple seasonal arima model (0,...
Traffic burstiness has a significant impact on network performance. Burstiness can cause buffer overflows and packet drops and is particularly problematic in the context of small-buffer networks, which have been considered as a building block of the optical core infrastructure in the future Internet. To permit efficient operation of such networks, network traffic has to be ??paced?? by transmitting...
The paper presents the application of a new analytical model of the full-availability group carrying a mixture of different multi-rate traffic classes with compression property for modeling the WCDMA radio interface with packet scheduling. The proposed model can be directly used for modeling of the WCDMA interface in the UMTS network servicing different traffic classes with and without compression...
This paper proposes a new mathematical QoS model called LRD_Q_Model for long range dependence (LRD) multimedia flows on the basis of network calculus theory. In LRD_Q_Model, the packets of a LRD flow are regulated by the Fractal Leak Bucket model at the edge nodes of networks and scheduled by the weighted fairness queuing (WFQ) model at each router of the transmission path. We give the service curve...
Weighted fair queueing (WFQ) is a practical scheduling discipline for supporting differentiated quality-of-service (QoS) in computer networks and communication systems. Analytical models are important tools for system performance evaluation and resource optimization. However, there is not any comprehensive model reported in the open literature for analytically investigating the performance behaviors...
Contemporary communication networks are expected to support multimedia services which require differentiated quality-of-services (QoS). To this end, many traffic scheduling schemes have been proposed and extensively studied. Recently, a hybrid scheduling discipline which integrates priority queueing and generalized processor sharing (GPS) has been emerging as a promising scheme for QoS differentiation...
The article proposes a new method for calculating occupancy distribution and blocking/loss probability in the limited availability group with bandwidth reservation. The proposed method makes it possible to model groups servicing multi-service BPP traffic streams (Binomial-Poisson-Pascal). The proposed method is based on the analysis of the service process occurring in the considered system on the...
In this paper we examine the problem of evaluating the performance of TCP connections in a wide area network. Our approach combines analytical and simulation methods. Our model is represented by two finite buffer queues which are shared by two connections. One being the reference TCP connection and the other representing the exogenous traffic (in simulation we consider the UDP traffic). This model,...
In this paper, we propose a new analytical model in order to evaluate the throughput of a wireless tandem network coding. Our analytical model is based on a multi-class open queueing network. In this model, we include two basic processes of network coding, i.e., packets combination and packets multicasting, in a suitable way considering the constraints of the queueing networks. To this end, we consider...
In optical burst switching networks, bursts arrive out-of-sequence due to contention resolution schemes as well as contention avoidance schemes. Out-of-sequence bursts may imply out-of-sequence packets, which affect the packet layer performance. Consequently, it is necessary to classify and investigate the resulting burst/packet out-of-sequence pattern. In our previous work, we presented an analytic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.