The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We studied a class of Service Overlay Network (SON) capacity allocation problem. By analyzing the problem with two different nonlinear optimization formulations, we show that the prices of offering service guarantees are closely related to a set of Lagrange multipliers. Moreover, if the Grade of service (GoS) constraints are not hard requirements, the network design resulting from the set of prices...
We present a State Estimation based Internet traffic flow control system where the objective is to maximize the aggregate bandwidth utility of network sources over their transmission rates. The network links and sources are viewed as processors of distributed computation and the control mechanism is based on estimation and optimization framework to solve the dual problem. The novelty of our approach...
The configuration and management of security policies in enterprise networks becoming hard due to complex policy constraints of the organizations and dynamic changes in the network topologies. Typically, the organizational security policy is defined as a collection of rules for allowing/denying service accesses between various network zones. Implementation of the policy is realized in a distributed...
This paper propose a novel approach to utilize the network to store data in form of floating IP packets. Network could play the role of temporary storage in certain applications and packets could be retained in the network in a closed routing loop. This approach which is called Data Storage Technique on IP Networks (DSTN) could be considered as one of the new applications of future IP networks. With...
An alarming trend for the global routing table's growth factor in the interdomain IP backbone shows that Internet inter-domain routing scalability becomes an issue again. It is widely agreed upon that the rapid global routing table size growth is mainly due to the growth in the number of ASs and the wide deployments of multihoming and traffic engineering. These popular commercial practices deaggregate...
Local link analysis of topical graphs on the Web allows to experiment focused crawling strategies in a detailed way. In this scope, models, parameters and metrics used to orientate the crawler can be better understood, tuned and evaluated. We develop a methodological and experimental approach that exploits link analysis in order to determine what constitutes a good content analysis metric able to...
This paper reports put forward a research about secure access gateway based on moving the control terminal down to the layer 2 switches through the analysis of the actual network condition in university, and design a 24 ports hardware product by using embedded NAT processing unit. After a year of online testing, this product achieves in the function of address translation, access control, user binding,...
The authors investigate the performance profit of concurrent multi-path transmission (CMT) schemes of Stream Control Transmission Protocol (SCTP) over various network environments. The results of simulation show that the performance profit of CMT-SCTP schemes strongly depends on network conditions (e.g., bandwidth). This implies that there are still a lot of studies to be needed on how to effectively...
In order to achieve the self-adaptive architecture-centric services' selection, this paper put forward the design principle of topology routing about service nodes, a network structure is built that agent is viewed as the basic Internetware granularity unit; By virtue of P2P environment such as open, dynamic, varied and more controllable evolution character, it is done to expand the self-adaptive...
The ontology is used in different areas of computer systems for the explicit representation of conceptualizations, but there are few studies on the application of ontology in the intermediate and lower layers of computer networks. This paper extend the studies on ontology for the network and transport layers of the TCP/IP architecture, to address the human needs that demands technological requirements...
Given a large scale Internet, how can we derive a representative simplifying topology model by network simulation? There are many known algorithms to compute interesting measures (scale down the number of clients, deletion methods, contraction methods, et al.), but most of them only reduce the scale of the network topology, the facticity of network simulation results can't be guaranteed. So when simplifying...
Traceroute-like method is of foundation for inferring forward IP paths that in succession are often used for generating different level Internet topologies. Based on Paris traceroute method of avoiding traceroute anomalies, this paper examines the practical feasibility of inferring forward IP paths by sending mixed TCP packets with other control bit(s) instead of SYN to a set of well-known Web sites...
It is known that there exist Triangle Inequality Violations (TIVs) with respect to network Quality of Service (QoS) metrics such as latency between nodes in the Internet. This motivates the exploitation of QoS-aware routing overlays. To find an optimal overlay route, we would usually need to examine all the possible overlay routes. However, this requires both measuring QoS between all node pairs and...
DTIA (Dynamic Topological Information Architecture), an inter-domain routing architecture, assumed the existence of "regions of domains" to offer a scalable solution for the Internet. The way regions can be connected and how traffic flow amongst them is not a trivial aspect and can jeopardize the solution proposed for intra-region traffic. This paper covers the inter-region case showing...
Modeling Internet topology is necessary for analyzing of network characteristics for the large and even growing network size. For example, the evolution of network structure and node attributes in the network is a key issue for us to understand the network properties and to design appropriate internetworking technology. In this paper, we define ??favorability degree?? to quantity the attributes of...
Mining and statistical analysis of network data are often employed to determine traffic loads, analyze patterns of users' behavior, and predict future network traffic. In this talk, we analyze traffic data collected from three deployed networks: a cellular wireless network used by public safety agancies, a satellite network used by Internet service providers, and the Internet. We describe analysis...
When designing network topology, we need to simultaneously consider multiple criteria, such as network cost and reliability. Therefore, the author applied the analytic hierarchy process (AHP) to network topology evaluation. However, the time required to construct a candidate topology set drastically increases as the network scale grows. So, the author proposed an efficient method for constructing...
To enable seamless integration of ad hoc networks with other Infrastructure LANs and to the Internet, TCP seems to be the natural choice for users of ad hoc networks that want to communicate reliably with each other and with the Internet. It is well-known that due to the nature of multi-hop wireless Ad hoc network applications, TCP throughput instability can have a devastating impact on the QoS requirements...
Internet topology plays a vital role in studying network's internal structure and properties. Currently traceroute-based topology discovery is the main approach to map the network. However, the deployments of probing sources are usually quite costly and complex. Even if the total numbers of sources are the same, the overall coverage of the sampled network may vary significantly for different sources...
The publicly available BGP vantage points (VPs) have been heavily used by the research community to build the Internet autonomous system (AS) level topology, which is a key input to many applications, such as routing protocol design, performance evaluation and network security issues. However, a detailed study on the eyeshots of these VPs has received little attention before. In this paper, we inspect...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.