The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We conduct the analysis of the traffic measured on the backbone link between the WIDE network that connects a number of leading universities in Japan and the upstream internet service provider. We study its statistical properties such as the packet sizes and time distributions between packets. To reveal the laws governing the end user activity and its impact on the network traffic dynamics, we next...
Harris Corporation is conducting a series of investigations in which network simulations are used to characterize and analyze the performance of existing HF communications waveforms and protocols, and to develop and optimize innovative techniques realizing improved network throughput, capacity, and user experience. The work reported in this paper includes development of HF physical layer models providing...
The goal of this paper is to prove the potential of fractal analysis techniques in evaluation of network characteristics, especially in detection of anomalies, as a method to reveal self-similarities in generated traffic. After a short review of some anomaly detection methods, one describe in detail a statistical signal processing technique based on abrupt change detection. A case study based on real...
The extensive growth of peer-to-peer video applications (P2PTV) indicates the evolutionary path towards the next generation of networking. To enhance the quality of experience for P2PTV users, new P2P video traffic models are required. These models are often developed by measurement-driven performance modeling based upon statistical analysis. However, this type of analysis can be a challenging task,...
Sharing of information leads to the need to transfer data between geographically distant locations. Identifying the most appropriate time period to execute the data transfer is essential to achieve the best data transfer throughput; e.g. one can forecast network traffic, identify future low network traffic activities between two entities, and plan the data transfer accordingly. This forecasting can...
In Wireless Sensor Networks, the traffic is light under idle or light load. When an event is detected the network becomes active and the data flow traffic becomes heavy, which leads to congestion. Congestion plays an vital role in reducing the performance of the network. Hence it necessitates to develop an effective congestion control technique. This paper focus on congestion detection and control...
CBTC (Communication Based Train Control) will be based on mobile communication, which the key problem is how to support reliability of control data transmission to improve track utilization and enhance train safety. This paper proposed a kind of real-time transmission model for high speed train end-to-end control data operation, which based on circuit switched data service by traditional wireless...
The self-similarity becomes one of the method of anomaly detection. The multi-layer `on-off' model of traffic source is developed. The generator implemented according this model allows generate traffic flow characterized by self-similarity. The ability of generation of traffic similar to malicious one is verified by experiments. The results confirm that proposed model is useful to produce traffic...
Mutual interactions of different network equipment, topology configurations, transmission protocols and cooperation and competition among the network users inevitably cause the network traffic flow which is controlled by several driving factors to appear non-stationary and complicated behavior. Because of its non-stationary property it can not easily use traditional way to analyze the complicated...
When using simulation in analysis networks with number of sources, one of problems is creating traffic sources matching real network data. Credibility of conclusions acquired by simulation tools are in great deal dependent of fidelity of simulation traffic source generators. This paper presents one simple approach for real traffic source reconstruction on the basis on limited real traffic data. Source...
Many results have been published in the literature based on performance measurements obtained from simulations of vehicular networks (VANETs). These simulations use as input traces of vehicle movements that have been generated by traffic simulators which are based on traffic theory models. To our knowledge, no one has published any work based on actual large-scale recordings of vehicle movements....
The Internet Protocol Stack provides a set of transport layer protocols. There are two dominant types of transport layer protocol used in the Internet: UDP (User Datagram Protocol) and TCP (Transmission Control Protocol). The transport layer provides end-to-end information transfer across a network with the quality of service needed by the application. In this paper, we provide a performance comparison...
Return network traffic (from servers to clients) in thin-client systems is modeled as a mixture of interactive data flows corresponding to keystrokes and bulk data flows related to screen updates. Users are very sensitive to delay and jitter of the former flows. Thus our goal is to minimize the latency of interactive data transfer without increasing latency of bulk data transfer. Through simulation...
The Internet protocol stack provides a set of transport layer protocols. There are two dominant types of transport layer protocol used in the Internet: UDP (user datagram protocol) and TCP (transmission control protocol). The transport layer provides end-to-end information transfer across a network with the quality of service needed by the application. In this paper, we provide a performance comparison...
For determination of data sources statistics based on measured packet network traffic many methods and special - consequently expensive - instruments exist. In the searching for alternative, cheaper and simpler solutions, we studied two methods based on packet network traffic measurement by simple sniffers and transforation of captured packet traffic into data sources statistics. We studied two types...
DCF (distributed coordination function) of IEEE802.11 MAC protocols uses binary exponential increasing mechanism, called BEB (binary exponential backoff) algorithm. Due to the lack of a mechanism evaluating the channel condition, it can not tune the value of contention windows adaptively, according to the actual network traffic. By introducing the network allocation vector count in routing protocol...
Malicious behavior will lead to abnormal network traffic patterns. This paper presents a network traffic based method to evaluate the security situation of hosts. A group of variables that can reflect the network traffic feature in a fixed time window are selected as the evaluation metrics. Based on the large samples, we report on a preliminary proof-of-concept approach, that's logistic regression...
A protocol anomaly detection model based on hidden Markov model (HMM) is given in this work which can verify normal and abnormal traffic. Then we demonstrate the model's correctness and effectiveness by using MIT Lincoln Laboratory 1999 DARPA Intrusion Detection Evaluation Data Set.
Recently, traffic classification (TC) becomes more and more important for network management and measurement tasks. The new-coming machine learning based classification methods can achieve high classification accuracy and fast identification ability; however, all these related TC methods up to now always have the assumption of the stability of classification model constituted from network traffic...
This paper investigates Real-Time Ethernet (RTE) protocols for industrial applications and their clock synchronization performance. In fact, if different RTE protocols coexist on the same network sharing the same infrastructure, clock synchronization capabilities can be affected. This paper introduces a simulation environment to evaluate coexistence of RTE protocols. The proposed tool is described...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.