The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet Service Providers (ISPs) are in a constant race to meet the bandwidth demands of their subscribers. Access link upgrades, however, are expensive and take years to deploy. Many ISPs are looking for alternative solutions to reduce the need for continuous and expensive infrastructure expansion. This paper shows that there are many forms of local connectivity and storage in residential environments,...
This work presents a study of RTP multiplexing schemes, which are compared with the normal use of RTP, in terms of ITU R-factor quality estimator. The bandwidth saving of the different schemes is studied, and some tests with VoIP traffic are carried out in order to compare R-factor using three different router buffer policies. Network delays are added using an adequate statistical distribution. The...
Our network infrastructure is exposed to persistent threats of DDoS and many unknown attacks. These threats threaten the availability of ISP's network and services. This paper proposes network-based anomalous traffic detection method and presents an anomalous traffic detection system, its architecture and main function blocks. Every five minutes, traffic information and security events are gathered...
Switch fabrics for 100 Gigabit Ethernet systems pose high demands in terms of delay and scalability. In this paper we analyze the performance of a Clos-based switch fabric under uniform and bursty traffic, and compare its performance to a crossbar-based switch design for benchmarking. In particular, we focus on a Clos-design using a Space-Memory-Memory (SMM) configuration, which has recently gained...
DDoS attacks are one of the top security problems affecting networks and disrupting services to legitimate users. The first vital step in dealing with this problem is the network's ability to detect such attacks. To that end, it is important that an intrusion detection mechanism be able to differentiate between real DDoS traffic and Flash Crowds traffic, the latter of which constitutes sudden bursts...
Whereas prefix hijacking is usually examined from security perspectives, this paper looks at it from a novel economic angle. Our study stems from an observation that a transit AS (Autonomous System) has a financial interest in attracting extra traffic to the links with its customers. Based on real data about the actual hijacking incident in the Internet, we conduct simulations in the real AS-level...
We review the growth of the different sources of data traffic on backbones, highlight the importance and nature of IP services today, and discuss the implications on content distribution and efficient use of backbone capacity.
Information or content centric networking is believed by many to have great potential to be the appropriate networking paradigm for the future Internet. In information centric networking, focus is shifted from the end-points in the network to the information objects themselves, with less care being placed on from where the information is fetched. In addition to the benefits this networking paradigm...
We study how much energy can be saved by reshaping audio streaming traffic before receiving at the mobile devices. The rationale is the following: Mobile network interfaces (WLAN and 3G) are in active mode when they transmit or receive data, otherwise they are in idle/sleep mode. To save energy, minimum possible time should be spent in active mode and maximum in idle/sleep mode. It is well known that...
Traffic in backbone networks continues to grow at rapid pace. The bulk of this growth comes from low revenue internet traffic. Naturally, this raises interest in lowering the costs of building and maintaining the transport network. It is here that some make the case for OTN switching as low-cost alternative to IP/MPLS core networks. To compare and contrast the costs of OTN versus MPLS, we undertook...
Traffic classification has become a crucial domain of research due to the rise in applications that are either encrypted or tend to change port consecutively. The challenge of flow classification is to determine the applications involved without any information on the payload. In this paper, our goal is to achieve a robust and reliable flow classification using data mining techniques. We propose a...
Using traffic random projections (sketches) and Principal Component Analysis (PCA) for Internet traffic anomaly detection has become popular topics in the anomaly detection fields, but few studies have been undertaken on the subjective and quantitative comparison of multiple methods using the data traces open to the community. In this paper, we propose a new method that combines sketches and PCA to...
A method and system design of controlling user's traffic in broadband access segments to enhance fairness among users are proposed and demonstrated. A proposed bandwidth control system utilizes QoS-related functions of existing heterogeneous access equipments, and provides a mechanism for maintaining bandwidth assignment based on each user's profile and usage.
We propose a MILP based design model for energy reduction in IP over dynamic optical networks. By virtual topology reconfiguration, it can dynamically switch off unnecessary networking equipments, and reduce the power caused by over-provision. Simulation results indicate that the proposed design can significantly improve network energy performance.
Accurate, real time identification of P2P traffic is especially important for network management, because they seriously affect QoS of normal network services. In this paper, we propose an omnibus approach to identify Bit Torrent (BT) traffic in real time. We apply application signatures to identify unencrypted traffic. And for those encrypted BT traffic, we propose a message stream model according...
Peer-to-Peer technology is one of the most popular techniques nowadays, and it brings some security issues, so the recognition and management of P2P applications on the internet is becoming much more important. The selection of protocol attributes is significant to the problem of P2P identification. To overcome the shortcomings of current methods, a new P2P identification algorithm based on genetic...
With the increase of network bandwidth, more and more new applications such as audio, video and online games have become the main body in network traffic. Based on real time considerations, these new applications mostly use UDP as transport layer protocol, which directly increase UDP traffic. However, traditional studies believe that TCP dominates the Internet traffic and previous traffic measurements...
We develop a protocol through which multipath enabled IP routers collectively engage in dynamic traffic engineering, to optimize performance in concert with legacy TCP congestion control. We build on recent theory which shows a globally optimum resource allocation across the TCP/IP layers can be achieved through control of rates and multipath routing fractions following a consistent congestion signal...
Streaming services such as voice and video based on IP technologies have been deployed widely throughout the world. The Asymmetric Digital Subscriber Line (ADSL) is one of broadband access technologies used to offer these services. Network operators and/or integrators must estimate ADSL link rates from the Network Operation Centers (NOC) which are far away from the customer's site. They must also...
Border Gateway Protocol (BGP) is the de facto standard protocol for the inter-domain routing. Due to multi-homing and traffic engineering, the BGP routing table size of default free zone (DFZ) is growing rapidly. Inter-domain routing is facing the scaling challenge. Many solutions have been proposed. Among them, the core-edge separation scheme gets more attentions than others due to its practical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.