Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper presents a new foundational approach to reason about available bandwidth estimation as the analysis of a min-plus linear system. The available bandwidth of a link or complete path is expressed in terms of a service curve, which is a function that appears in the network calculus to express the service available to a traffic flow. The service curve is estimated based on measurements of a...
We present a State Estimation based Internet traffic flow control system where the objective is to maximize the aggregate bandwidth utility of network sources over their transmission rates. The network links and sources are viewed as processors of distributed computation and the control mechanism is based on estimation and optimization framework to solve the dual problem. The novelty of our approach...
In HPC domain, a majority of applications build on MPI and employ collective operations in their communication kernels. Improving the performance of collectives has been long term focused by a lot of work. Recently, in the optimization work of collectives on multi-core clusters, hierarchical algorithm designs are remark-able. This kind of algorithms can greatly reduce the inter-node traffic but increase...
As more and more services are provided by servers via the Internet, Denial-of-Service (DoS) attacks pose an increasing threat to the Internet community. A DoS attack overloads the target server with a large volume of adverse requests, thereby rendering the server unavailable to ??well-behaved?? users. Recently, the novel paradigm of traffic ownership that enables the clients of Internet service providers...
We consider the revenue management problem on communication networks with multiple classes of traffic. Bandwidth allocation is determined to maximize revenue under network users' quality of service requirements. This paper presents the sensitivity analysis of an average revenue function for given traffic class by varying bandwidth allocation, traffic demand and the number of virtual paths. Numerical...
We present a network-assisted scheme for media-aware bandwidth sharing among multiple video streaming sessions. Departing from the conventional paradigm of fair-rate allocation among data traffic flows, our scheme allocates the bottleneck bandwidth among the video streams according to their rate-distortion (R-D) characteristics, with the objective of minimizing the total video distortion of all streams...
In this paper we propose a new cover traffic generation algorithm for flow-based anonymity systems and compare it with other algorithms from the literature. Our algorithm is based on four ideas: fixed time rounds, flow classification with different protection methods for different classes, protection depending on the potential cost and finally, use of history. Simulation results show that our solution...
In enterprises and residential networks, there are always multiple classes of traffic sharing the limited access bandwidth, and multiple token buckets are used to guarantee the usage of every class. At the same time, network managers hope to utilize the idle resource, in case of the bandwidth for some classes is redundant, for higher classes, as well as lower classes. A bi-direction adjustable multi-class...
In order to plan the network construction reasonable and ensure the quality of network service, it is important to measure the Link-bandwidth utilization and get the flow information. One of the methods to monitor network efficiently is based on flow-conservation, and the problem of searching a solution for this method could be deduced to solving weak vertex cover problem, which has been proved NP-hard...
It is necessary to control the P2P traffic among ASs (autonomous systems) while the P2P applications occupy the most bandwidth of the backbone network. Instead of only restricting the P2P applications, the paper suggests an intelligent relay method based on P2P communities model. The proxy of content caching (PCC) nodes is proposed which are used to manage the local content cache in the P2P communities...
Future trend in the development of communication network is the All-IP network, which provides mobile P2P network huge space for development. However, the P2P technology subverts the centralized control mode in traditional telecommunication system, so it makes traditional communication network billing control face a lot of difficulties. We propose a flow oriented billing model for mobile P2P network...
Traffic anomaly detection is one of the most important technologies that should be considered in network security and administration. In this paper, we propose a traffic anomaly detection mechanism that includes traffic monitoring and traffic analysis. We develop an analytical system called WISE-Mon that inspects the traffic behavior by monitoring and analyzing the traffic. We establish a criterion...
This paper studies the importance of accounting for a neglected facet of overall workload behavior, the pattern of task arrival. A stochastic characterization is formulated that defines regularity in the task arrival pattern. This characterization is used as the basis for a quantitative evaluation of the importance of accurately accounting for the task arrival behavior in the design of the processing...
In network survivability design, it is important to be able to differentiate network topologies by means of a quantitative measure that would indicate different levels of robustness of these topologies to failures of their nodes and links. Ideally, such a measure should be sensitive to the existence of nodes or links which are more critical than others, for example, if their failures can disconnect...
This paper presents an analytical model of proportional bandwidth adjustment (PBA) in a two-tier hierarchical NEMO system, composed of an access router (AR), mobile routers (MRs), and visiting mobile nodes (MNs). Depending on the location, an MN may use direct link to AR (Tier-0) or indirect link to AR via MR (Tier-1). To increase system utilization, sessions generated by high-speed MNs in one tier...
Individual optimization of sensor data transport over a fixed network or designing a network around fixed sensor data distribution requirements is less efficient than joint optimization. Simplified rules and methods of estimating bandwidth and planning networks are needed to tackle the more complex problem of joint optimization. A process of estimating and combining steady-state and burst data flows...
Two-phase routing, where traffic is first distributed to intermediate nodes before being routed to the final destination, has been proposed for handling widely fluctuating traffic without the need to adapt network routing to changing traffic. Pre-configuring the network in a traffic independent manner using two-phase routing simplifies network operation considerably. In this paper, we extend this...
Design and planning of survivable WDM networks involve different decision and optimization problems under network, traffic, and cost constraints. The high bandwidth brought by WDM access technology has incited network operators to extensive deployment of WDM in both access and backbone networks. Edges of networks have been pushed and transport capacity significantly increased, making the design and...
RED is the only active queue management mechanism recommended by IETF. Though RED is successful in network congestion control and link utilization enhancement, it suffers from two problems, the stability and the fairness. The fairness problem means 1) RED has little affects on unresponsive flows in congestion control - the UDP flow for example; 2) responsive flows with different packet size or round...
p-Cycle protection is an efficient pre-configured and pre-cross-connected protection scheme which can achieve ring-like recovery speed while retaining the capacity efficiency of mesh-based schemes. Thereafter, we study the stability and the efficient reconfiguration of p-cycles in the context of dynamic asymmetric traffic, a protection problem that is acknowledged to be difficult to solve, but with...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.