The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When a content provider (CP) provides peer-to-peer live streaming service, routing decisions based on the knowledge of underlay traffic could lead to much better performance (such as user delay). On the other hand, if the Internet Service Providers (ISPs) provide underlay traffic information to the CP, their overall network cost due to routing inefficiencies could be reduced. There is hence incentive...
Peer-to-peer (P2P) technology greatly scales up traditional Internet streaming service. However, the philosophy that peers help one another distribute video content produces a large amount of cross-ISP P2P traffic. Newly proposed ISP-friendly P2P mechanisms reduce the cross-ISP P2P traffic by using locality-based peer selection methods with which peers tend to connect to other peers in the same ISP...
Thunder (also called Xunlei) is the most popular P2P file sharing application in China and probably the most popular P2P software in term of traffic volume and number of users. Precisely identifying Thunder traffic can help network administrators to efficiently manage their networks. Traditional methods of identifying P2P traffic such as port-based or content-based approaches are ineffective to Thunder...
Power consumption is an essentially important issue and an interesting challenge to prolong the lifetime of wireless sensor network (WSN). Sensors closer to a sink node have a larger forwarding traffic burden and consume more energy than nodes further away from the sink. The whole operational lifetime of WSN is deteriorated because of such an uneven node power consumption patterns, leading to what...
In this paper, a bandwidth allocation scheme for the transmission of medical data in the IEEE 802.11n based WLAN is proposed. The main idea is to transmit medical data on the subcarriers for realtime traffic when these subcarriers are available and, otherwise, to store these medical data in patient devices; this is a tradeoff between the traffic load in the WLAN and the memory size of patient devices...
A wireless sensor network (WSN) is envisioned as a cluster of tiny power-constrained devices with functions of sensing and communications. Sensors closer to a sink node have a larger forwarding traffic burden and consume more energy than nodes further away from the sink. The whole lifetime of WSN is deteriorated because of such an uneven node power consumption patterns, leading to what is known as...
The purpose of this research is to design the new queueing algorithm effectively controlling the heavy-tailed traffics based on the comparison between the performance of the passive queue algorithm and that of the active queue algorithm. We adopted the tail-drop algorithm for PQM and the Random Early Detection (RED) for AQM, and conducted the experiments using ns-2 simulator. As the results, we extracted...
This paper presents a cooperative object caching mechanism for maintaining high content availability in Social Wireless Networks. Most of the existing cooperative caching schemes in wireless networks provide either high network level availability or high node level availability, but not both at the same time. The first one ensures object availability in isolated network partitions and the second one...
Recently, the variety and vastness of computer networks have increased rapidly. To keep networks stable and reliable, network administrators have to understand the nature of network traffic flows. We have developed a cardinality-analysis method that analyzes cardinalities in TCP/IP headers. The cardinalities can be used to detect abnormal traffic such as DDoS attacks and Internet worms. However there...
We performed statistical analysis on the total PTR resource record (RR) based DNS query packet traffic from a university campus network to the top domain DNS server through March 14th, 2009, when the network servers in the campus network were under inbound SSH dictionary attack. The interesting results are obtained, as follows: (1) the network servers, especially, they have a function of SSH services,...
Vehicular networks are formed by vehicles communicating in an ad hoc manner or through cellular and IEEE 802.11 base stations. Routing in vehicular networks is challenging due to highly dynamic network topologies. Previous research done has proposed the idea of Road-Based using Vehicular Traffic information (RBVT) routing. In RBVT, routes are sequences of road intersections, and geographical forwarding...
Understanding the characteristics of Internet application structure and traffic is critical for traffic modeling and network optimization. In this paper, the behavioral structures of different Internet applications are constructed based on a large sample of flow data collected from operational network of ISP. For each application type, i.e. Web, P2P Stream, P2P Download, Video Stream, Instant Messaging...
Encrypting network traffic is a normal procedure to protect information for exchange. This prevents tapping and manipulation but it also hampers intrusion as well as data leakage and misuse detection. Obtaining knowledge about users of encrypted communications is, however, beneficial in terms of monitoring access, security and accounting reasons. Thus, the objective is to provide evidence of the source...
Peer-to-peer (P2P) file-sharing applications are now widely used. The traffic generated by the P2P applications occupies a significant proportion of Internet traffic, and has an enormous impact on the backbone networks. Since these peers communicate by constructing virtual overlay routes, which are constructed independently from the IP networks topology, the characteristics of P2P traffic between...
Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service unavailability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries flood a large amount of bogus data to interfere or disrupt the service on the server. By using a volume-based scheme to...
p-Cycles present a very interesting approach to building survivable networks. They have been widely studied for unicast and recently for multicast traffic. For anycast traffic almost no research have been done. We will discuss a new p-cycles version, called Anycast-Protecting p-Cycles, introduced in our previous paper. We provide detailed description of some new properties, ILP models, results and...
Most of previous research on survivable networks has been focused on protecting the unicast traffic against random failures. In this paper we propose a new approach, called RA (resistant-to-attack), to provide protection of anycast and unicast communications against attacks on irregular (e.g. scale-free) networks. We use the single backup path approach to provide protection against a single node failure...
Recently, all-IP intelligent video surveillance/door system is one of the attractive and important applications in the world. However, because the current Internet architecture cannot provide sufficient QoS for such kind of real-time applications, the performances of them are often poor under congested or interfered Internet environment. When Internet traffics are congested or interfered, the frame...
A Mobile Peer-to-Peer (MP2P) traffic intelligent management model (BP Neural Network and Intelligent Management, BP-IM) based on neural network is proposed. First, the whole MP2P network is modeled by the semi-distributed structure. Then the BP neural network is introduced to measure and control the MP2P flow effectively. In addition, the corresponding P2P traffic priority table is established and...
The converge cast traffic pattern (many-to-one data communication) of wireless sensor networks leads to high load at nodes that are aggregating data. Therefore, we need to distribute the entire traffic load by deploying multiple data collectors and each node should select a collector node to access. Additionally, with the progress of IPv6-based wireless sensor networks, advantages of IPv6 protocols...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.