The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Within the Future Internet, a new trend is foreseen with the creation of overlay networks composed of residential gateways (i.e. Home-Box), leveraging their storage and upload capacity in order to achieve scalable and cost-efficient content distribution. In this paper, we highlight an architecture of such a home-box overlay for Video On Demand (VOD) services, in cooperation with a network-aware request...
The measurement of worm propagation impact on network status remained an elusive goal. This paper analyzes the worm characteristics and network traffic and service, introduces evaluation metrics and presents a new method to assess the network situation under worm propagation. The applicability of this method is verified by simulated experiments with the network simulation tool LSNEMUlab test bed.
A large university usually has many units that may locate far apart, and there are many proxy servers installed to give web access services to those units individually. However, some proxies may face the performance bottleneck when many users access the Internet simultaneously since such servers have limited capacity and could not handle high workload whereas the workload cannot be transferred to...
When moving towards fully Peer-to-Peer Virtual Environments (P2P-VE), the amount of network traffic generated at each peer remains a significant concern. Multiplayer Online Games (MOG) are the largest application subset of VEs and have been shown to require high frequency of update messages and minimal network latencies. Yet, this demanding criteria must be balanced with the need to also limit the...
A wireless sensor network (WSN) is envisioned as a cluster of tiny power-constrained devices with functions of sensing and communications. Sensors closer to a sink node have a larger forwarding traffic burden and consume more energy than nodes further away from the sink. The whole lifetime of WSN is deteriorated because of such an uneven node power consumption patterns, leading to what is known as...
Most of previous research on survivable networks has been focused on protecting the unicast traffic against random failures. In this paper we propose a new approach, called RA (resistant-to-attack), to provide protection of anycast and unicast communications against attacks on irregular (e.g. scale-free) networks. We use the single backup path approach to provide protection against a single node failure...
Applications based on peer-to-peer (P2P) protocols have become tremendously popular over the last few years, now accounting for a significant share of the total network traffic. To avoid restrictions imposed by network administrators for various reasons, the P2P protocols have become more sophisticated and employ various techniques to avoid detection and recognition with standard measurement tools...
In this paper, we propose a new method to characterize unwanted email traffic. In order to survey a significant, diverse, and representative set of Internet email traffic, we use an extended deterministic finite automata (EFSA) model to express email session and then choose some parameters to capture email traffic characterization. We apply our mechanism to two different volumes of email traffic data...
The paper presents a concept of the peer-to-peer related traffic optimization. The mechanism is based on the Oracle idea, where a peer is informed on closely located P2P nodes suggesting connection to them. The Oracle gains the relevant information on the basis of BGP databases, where the important extension is related to using a cooperation mechanism between different operators' domains.
We present an Internet-scale network topology information (NTI) service named WIND for localizing P2P traffic. Central to WIND are the two simple ideas: 1) obtaining NTI directly from routing infrastructures, and 2) leveraging existing, widely deployed DNS caches for NTI delivery. WIND fulfills the fidelity, flexibility and scalability requirement of an effective NTI service. WIND is deployed in CERNET...
Server load balancing is indispensable in World Wide Web for providing high-quality service. In server load balancing, since the server loads and capacities are not always identical, traffic should be distributed by measuring server performance to improve the service quality. This paper proposes a load balancing technique conducted by passive measurement, which estimates the server performance through...
We collected packet traces from second life client sessions and analyzed the packet contents. We observed that textures constitute a majority of the network traffic. We further characterized the textures from three selected regions in second life in terms of their size and spatial distributions. We found that textures in these regions exhibit a different size distribution from files on a file system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.