The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the Session Initiation Protocol (SIP) becomes more and more the core of the communication networks convergence, there is urgent need to manage the critical problem of SIP service availability under extreme overload. This paper proposes a novel solution to control SIP overload. We demonstrate the efficiency of the approach compared with a well known SIP overload control algorithm. The solution builds...
In this paper, a generic framework for dynamic bandwidth management of SDH resources is proposed in context of Unicast NGN service solutions. This avoids major up-gradation of existing network while obtaining maximum benefits from existing protocols and design practices. Mechanisms of traffic monitoring and hierarchical address allocation are also proposed.
Streaming media protocol-based applications share communication resources with regular Network/Internet traffic. So, they are exposed to any existing security attacks. In the present paper, we measure this relationship between attacks and applications by introducing a probabilistic verification evaluation. Our approach is novel in that, it is based on the concurrency between models. In addition, the...
Piecewise polynomials have been used to visually link and classify network traffic. The advantage of using piecewise polynomials to approximate traffic is that significantly less storage space is required when compared to traditional packet captures. However, when representing discrete data with continuous approximations, error is introduced. We analyze this error through the creation and examination...
A large university usually has many units that may locate far apart, and there are many proxy servers installed to give web access services to those units individually. However, some proxies may face the performance bottleneck when many users access the Internet simultaneously since such servers have limited capacity and could not handle high workload whereas the workload cannot be transferred to...
In the research of the anomaly detection system analyzing the packet header on the Internet, previous researches have proposed the anomaly detection system using chi-square values in terms of the source IP address and/or the destination port number. In these previous researches, the chi-square values were calculated from one feature causing the degradation in the False-Positive when the same symbol...
The web caching business has significantly changed over the recent years. The percentage of content that is suitable for caching has constantly decreased, e.g. due to unfavorable content formats like Flash or varying URLs due to usage of CDNs. While this of course has a negative impact on the effectiveness of caching, also other parts of the equation have changed: Transmission cost has dropped significantly,...
We analyze TCP-controlled bulk file transfers in a single station WLAN with nonzero propagation delay between the file server and the WLAN. Our approach is to model the flow of packets as a closed queueing network (BCMP network) with 3 service centres, one each for the Access Point and the STA, and the third for the propagation delay. The service rates of the first two are obtained by analyzing the...
While the majority of Internet traffic is becoming of high quality multimedia variety, also mostly generated by consumers themselves, efficient content sharing with intuitive useability and security measure in a mobile environment remains an elusive goal. In this paper, we present a Content-Centric Networking (CCN) based Virtual Private Community (VPC) service which aims at supporting intuitive content...
Internet Service Providers (ISPs) are in a constant race to meet the bandwidth demands of their subscribers. Access link upgrades, however, are expensive and take years to deploy. Many ISPs are looking for alternative solutions to reduce the need for continuous and expensive infrastructure expansion. This paper shows that there are many forms of local connectivity and storage in residential environments,...
We study how much energy can be saved by reshaping audio streaming traffic before receiving at the mobile devices. The rationale is the following: Mobile network interfaces (WLAN and 3G) are in active mode when they transmit or receive data, otherwise they are in idle/sleep mode. To save energy, minimum possible time should be spent in active mode and maximum in idle/sleep mode. It is well known that...
Most of controlling disaster management focus on how to rescue people from a disaster area. In this paper, we propose an emergency escape system that helps people escape by themselves effectively from a disaster area in which each person owns a mobile device. We define a scenario for the proposed system in which there are five system states; they are Idle, Discovery, Subscription/Publication, Execution,...
This paper analyzes signaling traffic generated by IP Multimedia Subsystem (IMS) when deployed within a hybrid WLAN IEEE 802.11 and CDMA2000 networks to provide wireless and broadband services to users. IMS provides a services infrastructure to 3G networks and beyond and delivers the capability to maintain sessions among calling parties. IMS is under varying degrees of trials and deployment. Service...
Malicious attackers intended to annihilate the availability of network server with threats such as Transmission Control Protocol (TCP) Synchronized (SYN) Flood. The attackers usually make the server exhausted and unavailable in order to complete the TCP three-way handshake mechanism. Detecting TCP SYN Flood in the Hypertext Transfer Protocol (HTTP) is the main problem in this paper. Anomaly detection...
Burstiness is an important network feature. Many studies apply crude methods using “burst” or flow size to diagnose bursty flows, but these approaches cannot reveal traffic details. Using the self-similarity of network flow, the study transforms the time-domain traffic into space-domain data, and adopts the variations of fractal dimensions to determine the variations of burstiness. The resulting variations...
The recent years have seen an explosive upsurge in the popularity of IPTV networks and the IPTV user base. The increased user base poses new challenges to IPTV provider in providing the IPTV services with the expected QoE to the users due to the increase in traffic and heterogeneity in networks. The VoD, being the most prominent and most lucrative of the triple play components, require efficient managing...
Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol and it does not require mobile node's involving in mobility management. In PMIPv6, the Mobile Access Gateway (MAG) incurs a high signaling cost to update the location of a mobile node to the remote Local Mobility Anchor (LMA) if it moves frequently. It may cause excessive signaling traffic and increase a high traffic load on...
Energy consumption is a concern with mobile de-vices nowadays. Network interfaces are among the most power hungry components in these devices. In this paper, we describe the design and implementation of a client-centric protocol for energy efficiency. Inspired by earlier work, our protocol works by exploiting the TCP flow-control mechanism to shape incoming traffic into bursts in order to utilize...
In this paper, we study the delay performance of wireless network considering different resource allocation schemes with single-hop traffic. Existing works studying the delay performance only consider a given resource allocation scheme, either multi-channel system (sharing bandwidth) or time slotted system (sharing time). The fundamental question ignored is which type of resource allocation scheme...
When moving towards fully Peer-to-Peer Virtual Environments (P2P-VE), the amount of network traffic generated at each peer remains a significant concern. Multiplayer Online Games (MOG) are the largest application subset of VEs and have been shown to require high frequency of update messages and minimal network latencies. Yet, this demanding criteria must be balanced with the need to also limit the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.