The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is becoming increasing difficult to implement an effective DDoS Defense System, because (1) the raising sophistication of DDoS attack requires more complex analysis to detect, (2) internet traffic grows bigger and bigger which needs more powerful system to monitor. Taking advantages of the great improvement in multi-core technology, a multi-core based DDoS detection system (MIFDDS) is proposed...
Many researchers have discussed the effects of heavy-tailedness in network traffic patterns and shown that Internet traffic flows exhibit characteristics of self-similarity that can be explained by the heavy-tailedness of the various distributions involved. Self-similarity and heavy-tailedness are of great importance for network capacity planning purposes in which researchers are interested in developing...
In order to provision bandwidth, in this paper we propose a discrete-time dynamical system model to capture the marginal distribution and autocorrelation of the input traffic simultaneously. For model identification, we use a periodicity transform to identify the most significant periods of the traffic and use an auto regressive time series to model it. Bandwidth provisioning is formulated as an optimal...
The Internet traffic gets exploded due to the increasing demand for bandwidth as more number of users gets added to the Internet. In order to meet the demands of the growing needs, the working of various devices and operations has to be redesigned. One of the areas is the design of the high performance router. The traditional router performs two basic tasks in forwarding a packet. Firstly, looking...
Resource allocation schemes dedicated to satellite environment often considers Internet traffic as the superposition of traffic sources without distinguishing between TCP and UDP flows, even if TCP and UDP imply very different traffic characteristics. The basic idea of this work is that a resource allocation algorithm where the allocation function is conscious of the difference may result more efficient...
A number of analytical models have been proposed to describe the priority schemes of the enhanced distributed channel access (EDCA) mechanism of the IEEE 802.11e standard. EDCA provides a class-based differentiated quality of service (QoS) to IEEE 802.11 WLANs. Many have used a multiple number of nodes to study the differentiation behaviour of the model. However, in many real-life usage scenarios...
Accurate timestamps on both the sender and the receiver side are crucial for one-way delay (OWD) measurements. Traditionally, such measurements use software-based timestamps, which could suffer from errors of up to tens of milliseconds. In this paper, we introduce HOTS-a hardware packet timestamp recorder dedicated to OWD measurements. Compared with traditional methods, HOTS has the advantage of:...
Internet traffic has been proven to be long-tailed and often modeled by lognormal distribution, Weibull or Pareto distributions theoretically. However, these mathematical models hinder us in traffic analysis and evaluation studies due to their complex representations and theoretical properties. This paper proposes a hyper-Erlang model (mixed Erlang distribution) for such a long-tailed network traffic...
Currently, IEEE 802.16a wireless MAN supports the contention based OFDMA-CDMA ranging subsystem for ranging operation (initial ranging, periodic ranging, bandwidth request). This system is basically similar to slotted ALOHA (K. Leonard and S.S. Lam, April 1975), but the frame size (code-slot/frame) allocated for random access or ranging request is relatively big and can be altered by the dynamic adjustment...
The novel RTPD/MACSC model proposed in this paper tunes the cache size adoptively on the fly. It combines the extant MACSC (model for adaptive cache size control) and the novel RTPD (real-time traffic pattern detection) capability. Similar to its MACSC predecessor, the new RTPD/MACSC tuner maintains the given cache hit ratio consistently and persistently. It, however, differs from its predecessor...
Quality of service (QoS) in the Internet depends on queuing and sophisticated scheduling in routers. In this paper, we address the issue of managing traffic flows with different priorities. In our reference model, incoming packets are first classified based on their priority, placed into different queues with different capacities, and then multiplexed onto one router link. The fuzzy nature of the...
Since the identification of long-range dependence in network traffic ten years ago, its consistent appearance across numerous measurement studies has largely discredited Poisson-based models. However, since that original data set was collected, both link speeds and the number of Internet-connected hosts have increased by more than three orders of magnitude. Thus, we now revisit the Poisson assumption,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.