Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Flow-level sampling methods have been widely studied and extensively employed in network traffic measurement systems. However, traffic anomalies are becoming more prevalent and severe in the Internet, which pose great challenges to the traffic measurement. Existing solutions targeted at such scenario have either low accuracy or high memory usage. In this paper, we propose a two-stage sampling approach-Anti...
The presence service provides event-based notifications of the status of contacts. Currently duplicate notifications must be sent directly to a set of watchers in unicast messages, putting unneeded strain on outgoing network links of the source node. In this article, we propose an extension to the Session Initiation Protocol (SIP) to distribute notifications through a tree of watchers using network...
In the maintenance of communication networks, nodes often need to be rebooted or brought off line for software updates, configuration updates or hardware maintenance. ISPs often run the same protocols and use equipment from the same vendor network-wide, increasing the probability that a maintenance window will be network wide. Some of the updates can be critical where we have to update fast, for example,...
Inter-domain handoffs in wireless mesh networks (WMNs) must evaluate the resource conditions of the target handoff domain in order to make QoS handoff decisions. Performance degradations to either or both handoff and existing QoS-aware traffic occur when resources on gateways and mesh routers in the handoff domain are over-utilized, while on the other hand, global resources across domains might still...
Path splicing is a proposed routing architecture for the Internet in which end-hosts (and intermediate routers) are empowered to change the paths their traffic uses by modifying a number of bits in the packet headers. These bits allow intermediate routers to choose alternate paths from the shortest one. To that end, this paper exposes SKWeak (Selective K Weakest links) attacks that exploit the adaptive...
The Internet has recently been evolving from homogeneous congestion control to heterogeneous congestion control. Five years ago, Internet traffic was mainly controlled by the standard TCP AIMD algorithm, whereas Internet traffic is now controlled by many different TCP congestion control algorithms, such as AIMD, CUBIC, CTCP, and FAST. However, there is very little work on the performance and stability...
The recent trend in Internet traffic indicates the proliferation of usage of multimedia services where a substantial part is related to some sort of video transmission. Moreover, an increasing number of Internet users employ wireless access technologies. High-quality video streaming over wireless access in unison with great mobility brings challenges to sustain the mobile user perceived video quality...
This paper proposes an intelligent rate controller for the Internet traffic. Called the IntelRate (Intelligent Rate), it is a router-based controller and uses the fuzzy logic control approach to adjust the source sending rate based on the instantaneous queue size of the router. Unlike other explicit congestion control protocols, the IntelRate controller need not evaluate the link states (such as bottleneck...
In recent years, energy-efficient design of optical WDM networks has become increasingly important as efforts to reduce the operational expenditure (Opex) and the carbon footprint of the internet are prioritized. In this paper we focus on energy- efficient survivable network design where backup resources are shared for efficient capacity consumption. However there is a trade-off between energy-efficiency...
Identifying heavy-hitter traffic flows efficiently and accurately is essential for Internet security, accounting and traffic engineering. However, finding all heavy-hitters might require large memory for storage of flows information that is incompatible with the usage of fast and small memory. Moreover, upcoming 100Gbps transmission rates make this recognition more challenging. How to improve the...
Energy consumption is a concern with mobile de-vices nowadays. Network interfaces are among the most power hungry components in these devices. In this paper, we describe the design and implementation of a client-centric protocol for energy efficiency. Inspired by earlier work, our protocol works by exploiting the TCP flow-control mechanism to shape incoming traffic into bursts in order to utilize...
IEEE 802.16d standard defines WiMAX Mesh mode, which uses Centralized Scheduling (CS), Distributed Scheduling (DS), and co-existence of CS/DS data subframes to allocate resources for data transmissions. The CS and CS/DS schemes are suitable for Internet traffic, but the lack of spatial reuse in over-pessimistic use of CS causes scalability problems and bandwidth limitations. In this paper a Hybrid...
In the access part of the network, passive optical networks (PON) are the top priority due to their robustness and large data carrying capacity. The customer premises equipment consumes 65% of the total power. We propose a cross layer model for saving energy in the optical network units (ONU). Our solution involves analysis of TCP traffic by extracting session information from the traffic and determining...
It is used to identify users' connections by using the source IP addresses in the traffic log inside a firewall. In the case with pre-assigned IP addresses, the mapping relationship between IP addresses and users is fixed. However, an IP address can be counterfeited or abused. Therefore, an evil user can do any wicked network behavior with others' IP addresses when they get off work or take off. Users...
The estimation of Retransmission Timeout (RTO) in Transmission Control Protocol (TCP) affects the throughput of the transmission link. If the RTO is just a little larger than the Round Trip Time (RTT), retransmissions will occur too often, and this increases congestion in the transmission link. If the RTO is much larger than the RTT, the response to retransmit when a packet is lost will be too slow,...
When a content provider (CP) provides peer-to-peer live streaming service, routing decisions based on the knowledge of underlay traffic could lead to much better performance (such as user delay). On the other hand, if the Internet Service Providers (ISPs) provide underlay traffic information to the CP, their overall network cost due to routing inefficiencies could be reduced. There is hence incentive...
Peer-to-peer (P2P) technology greatly scales up traditional Internet streaming service. However, the philosophy that peers help one another distribute video content produces a large amount of cross-ISP P2P traffic. Newly proposed ISP-friendly P2P mechanisms reduce the cross-ISP P2P traffic by using locality-based peer selection methods with which peers tend to connect to other peers in the same ISP...
Thunder (also called Xunlei) is the most popular P2P file sharing application in China and probably the most popular P2P software in term of traffic volume and number of users. Precisely identifying Thunder traffic can help network administrators to efficiently manage their networks. Traditional methods of identifying P2P traffic such as port-based or content-based approaches are ineffective to Thunder...
We present a novel resilient routing policy for controlling the routing across peering links between Internet carriers. Our policy is aimed at offering more reliability, dependability and better performance to the routing decision with respect to the current practice (e.g., hot-potato routing). Our work relies on a non-cooperative game framework, called Peering Equilibrium MultiPath (PEMP), that has...
Emerging Peer-to-Peer (P2P) technologies have enabled various types of content to be efficiently distributed over the Internet. Most P2P systems adopt selfish peer selection schemes in the application layer that in some sense optimize the user quality of experience. On the network side, traffic engineering (TE) is deployed by ISPs in order to achieve overall efficient network resource utilization...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.