The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As passive optical networks (PON) are increasingly deployed to provide high speed Internet access, it is important to understand their fundamental traffic capacity limits. The paper discusses performance models applicable to wavelength division multiplexing (WDM) EPONs and GPONs under the assumption that users access the fibre via optical network units equipped with tunable transmitters. The considered...
Motivated by the high variation in transmission rates for document transfer in the Internet and file down loads from web servers, we study the buffer content in a queue with a fluctuating service rate. The fluctuations are assumed to be driven by an independent stochastic process. We allow the queue to be overloaded in some of the server states. In all but a few special cases, either exact analysis...
Fractional Brownian motion (fBm) became known as a useful model for Internet traffic incorporating its self-similar and long-range dependent properties. In this paper we derive end-to-end performance bounds for a through flow in a network of tandem queues under fBm cross traffic. We build on a previously derived sample path envelope for fBm, which possesses a Weibullian decay of overflow probabilities...
This paper analysis the chaotic dynamical properties of network traffic based on the self-similarity characteristic of the Internet traffic. The phase space of the traffic time serials is reconstructed and the correlation dimension is analyzed, which indicate that the dynamical system has finite degree of freedom and a positive maximum Lyapunov exponent. The chaotic characteristic of the traffic is...
Large-scale attacks like distributed denial-of-service (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, many attack detection systems using various anomaly detection methods were developed in the past. These detection systems result in a set of anomalies detected by analysis of the traffic behavior. A realtime identification of the attack...
Stochastic fairness queuing scheduling scheme resolved the connection level fairness problem and are widely used in traditional network, however, with rapid development of P2P services in Internet, this classical algorithms failed in maintaining fairness among hosts. In this paper we proposed an improved SFQ algorithm: Dual Class SFQ to ensure the fairness among hosts using different type of services...
We have proposed CoMPACT monitor that achieves scalable measurement of one-way delay distribution for each flow. CoMPACT monitor is technique that transforms one-way delay data obtained by active measurement by using passively monitored traffic data of the target flow. In a recent study, it was reported that by using an inter-probe time that has a Gamma distribution can improve the accuracy of simple...
In this paper, the real network traffic is analyzed about its chaotic dynamic properties and the traffic signals are reconstructed using FBM based fractal interpolation algorithm. The self-similarity of network traffic is analyzed by estimating the value of Hurst exponent and the traffic time series is reconstructed as a phase trajectory by properly choosing some parameters. Through the reconstructed...
The immense popularity of new-age ??Web 2.0?? applications such as YouTube, Flickr, and Facebook, and non-Web applications such as peer-to-peer (P2P) file sharing, voice over IP, online games, and media streaming have significantly altered the composition of Internet traffic with respect to what it was a few years ago. In light of these changes, this paper revisits Internet traffic characteristics...
Random early detection (RED) is the most famous active queue management (AQM) algorithm and is widely used in current Internet. But classical RED is based on Poisson model which is short-range dependence. And what is more, RED is sensitive to parameters setting. Current Internet traffic has ubiquitous characteristic of self-similarity or long-range dependence (LRD). It is necessary to recheck the...
The sexual exploitation of children remains a very serious problem and is rapidly increasing globally through the use of the Internet. This paper focuses on the privacy issues involved in design and implementation of a system capable of image classification at the network layer. In this paper, we examined two learning algorithms, namely the Maximum Likelihood Estimator (MLE), and the Stochastic Learning...
The analysis of Internet traffic behavior under the pressure of long range dependence congestion factors has a great importance for performance management, anomaly detection and QoS control. The choice of methods using for analysis depends on the goal of description, accuracy requirements, measurement tools and assumptions concerning stochastic feature of network processes. Analysis without robust...
Video represents a larger and larger portion of the traffic in Internet. H.264/AVC and the SVC extension have recently become some of the most widely accepted video coding standards. Consequently, adequate models for this traffic are very important for the performance evaluation of networks architectures and protocols. Particularly, the efficient generation of synthetic sample paths is fundamental,...
The self-similar nature of bursty Internet traffic has been investigated for the last decade. A first generation of papers, approximately from 1994 to 2004, argued that the traditionally used Poisson models oversimplified the characteristics of network traffic and were not appropriate for modeling bursty, local-area, and wide-area network traffic. Since 2004, a second generation of papers has challenged...
A conditionally Poissonian power-law random graph with infinite degree variance is considered as a random network model. A method for elegant analytical computation of accurate approximations for various network characteristics is introduced, based on slight redefinition of the model in terms of non-homogeneous Poisson point processes and on the replacement of certain random variables by their expectations...
The growth of the Internet and emerging application layer technologies causes numerous changes in network environments. Therefore, it becomes important to achieve robust methods of controlling networks in addition to optimizing their performance. In this paper, we propose a robust virtual network topology (VNT) control method based on attractor selection, which models behaviors where biological systems...
In this paper, we investigate temporal and spatial correlations of time series of unwanted traffic (i.e., darknet or network telescope traffic) in order to estimate statistical behavior of unwanted activities from a small size of darknet address block. First, from the analysis of long-range dependency, we point out that TCP time series has a weak temporal correlation though UDP time series without...
Next generation wireless networks are evolving from the interworking of existing wireless networks. The interworking of these networks conveniently brings about ubiquitous broadband internet access required by network users. However, the major concerns in interworking wireless networks include how to ensure effective resource dimensioning and quality of service (QoS) provisioning while optimizing...
In contrast to many techniques exploiting temporal patterns of traffic from a single network element, network-wide traffic analysis mainly focuses on the spatial behavior across the whole network. This paper proposes a spatial hidden Markov model (SHMM) to learn the normal patterns of network-wide traffic. Combined with topology information, SHMM models traffic volumes on links as probabilistic outputs...
Network traffic such as Ethernet, Internet, World Wide Web, and TCP/UDP protocols has been extensively studied, with efforts focusing on the Poisson process and self-similarity. However, although SMTP (Simple Mail Transfer Protocol) occupies a significant portion of Internet traffic, it has attracted little attention. This paper shows that large-scale SMTP traffic possesses both the characteristics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.