The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Classifying network traffic according to the applications is important to a broad range of network areas. Compared with the traditional method which classifies traffic using predefined well-known port numbers, the method using application signatures is more accurate. Unfortunately, analyzing signatures and maintaining up-to-date signatures for various applications is very difficult. To solve the problem,...
In this paper, a new delay-enabled EDCF for the transport of real-time traffic over an IEEE802.11e wireless LAN is proposed. The proposed technique will drop any packet belonging to a conversational class when a maximum queueing delay is reached. The packets belonging to an interactive or a background class are not dropped due to the queuing delay. The performance of this new technique is evaluated...
Traffic anomaly detection is one of the most important technologies that should be considered in network security and administration. In this paper, we propose a traffic anomaly detection mechanism that includes traffic monitoring and traffic analysis. We develop an analytical system called WISE-Mon that inspects the traffic behavior by monitoring and analyzing the traffic. We establish a criterion...
We consider extensions of the design theory and related operating concepts to support multiple levels of Quality of Service (QoS) for priority-based traffic in a transport network that uses p-cycles as the basic protection method. The proposed integrated QoS scheme can provide appropriate transport service for various applications relating to different service categories. Notably this includes in...
ESRT protocol is a transport solution that seeks to achieve reliable event detection solution with minimum energy expenditure and congestion resolution. Depending on the current network state, it configures the reporting frequency rate f for the next time interval. Due to the dynamic properties of the networks, the adjustment always has a delay. A prediction-based ESRT (PBESRT) protocol is presented...
Wireless sensor networks (WSN) can increase the efficiency of many real-life applications through the collaboration of thousands of miniaturized sensors which can be deployed unattended in inhospitable environments. Due to the harsh surroundings and violent nature of the applications, the network sometimes suffers a large scale damage that involves many nodes and would thus create multiple disjoint...
Packet classification is one of the crucial components of application such as firewalls, intrusion detection, and differentiated services. For example, an intrusion detection system (IDS) classifies packets either as benign or malicious and alerts the network administrator when hostile traffic is detected. Since existing IDS spend the majority of CPU time in packet classification, an IDS fails to...
Jamming attacks are considered one of the most devastating attacks as they are difficult to prevent and sometimes hard to detect. In this paper we consider the impact of the placement and range of limited-range jammers on ad hoc networks. Limited range jammers are more difficult to detect as they use transmission powers similar to that of regular nodes (or perhaps even smaller transmit powers). The...
Internet is becoming an indispensible infrastructure of essential media, which makes a great burden for ISP's security and traffic management. Especially the situation will be much more serious in NGI (the Next-Generation Internet) because of its innumerable users, mobile device, information appliances (IA) and networked sensors etc with 128-bit IPv6 address. For the reason of lacking scalability,...
With the increasing volume of VoIP, IPTV, and other real-time traffic on the Internet in recent years, service providers and operators demand tools to effectively detect and manage such traffic in their networks. However, many such applications are not easy to detect by using conventional approaches based on packet header and payload inspections since they may use random ports and data encryption...
Intradomain routing in IP networks follows least-cost paths according to administrative link costs. Routing optimization modifies these values to minimize an objective function for a network with given link capacities and traffic matrix. An example for an objective function is the maximum utilization of all links under failure-free conditions or also after rerouting in case of network failures. Many...
Unlike in IEEE 802.11, the CSMA/CA traffic conditions in IEEE 802.15.3 are typically unsaturated. This paper presents an extended analytical model based on Bianchi's model in IEEE 802.11, by taking into account the device suspending events, unsaturated traffic conditions, as well as the effects of error-prone channels. Based on this model we re-derive a closed form expression of the average service...
Mesh router (MR) placement is one of the fundamental issues that need to be addressed carefully to achieve a desired performance of a wireless mesh network (WMN). The objective of the MR placement schemes is to systematically determine the minimal number of MRs and their positions while satisfying various constraints, such as coverage, connectivity, traffic demand, etc. This paper explores the solution...
The performance of multi-radio multi-channel wireless mesh networks (WMNs) based on the IEEE 802.11 technology depends significantly on how the channels are assigned to the radios and how traffic is routed between the access points and the gateways. In this paper we propose an algorithmic approach to this problem, for which no conclusive solution has been put forward in the literature so far. The...
A wireless sensor network (WSN) is composed of a large number of sensor nodes which are resource constraints, e.g., limited power. This drives research on how to design routing protocols to gather data efficiently so that the life of the network can be prolonged. A usual concept to collect data by a sink node is to transfer data from sensor nodes to the sink node by multi-hop. However, it gives rise...
For the last few years, there has been a large volume of research on Peer-to-Peer (P2P) system, resulting in many hybrid P2P models. This model is important to keep a high available SP because all P2P overlay traffic will be routed via the SP. Main purpose of this paper is to improve SP's availability for OPs so that the system selects the peer with the potential to go the longest without needing...
We suggested a joint algorithm for opportunistic spectrum and time sharing in cognitive radio (CR) wireless mesh networks (WMNs) in this paper. The problem was formulated using linear programming and solved by the simplex-II method. The flow optimization problem was first developed for grid topology of CR WMNs. Results showed optimized flow of the CR WMNs with ideal interference free link scheduling...
Resource reservation call admission control (CAC) schemes constitute an efficient solution for prioritizing high priority calls. Issues concerning fairness among calls arise during the implementation of CAC. In this paper, a new optimization model selecting the admission probability in thinning schemes is proposed to provide fairness in resource sharing among different input call stream flows. The...
Traffic engineering (TE) has become a challenging task for network management and resources optimization due to traffic uncertainty and to the difficulty to predict traffic variations. To address this uncertainty in a robust and efficient way, two almost antagonist approaches have emerged during the last years: robust routing and dynamic load-balancing. The former copes with traffic uncertainty in...
This paper aims at improving the throughput of the wireless sensor networks (WSNs), particularly to overcome the so-called funneling effect for WSNs with converge-cast patterns. Due to the disproportionate larger number of packets accumulated in the sensors that are closer to the sink, there is a need to decrease the collisions and increase the throughput around the sink area as well as the nodes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.