Results 221 to 230 of about 103,550 (267)
Some of the next articles are maybe not open access.
2011
This chapter discusses in details a traffic-constrained SOAP multicast routing protocol, called tc-SMP, which is an extension of the similarity-based SOAP multicast protocol (SMP) proposed in the previous chapter. Tc-SMP offers improvements over SMP in terms of network traffic size by using its own routing protocol instead of the shortest path ...
Zahir Tari +3 more
openaire +1 more source
This chapter discusses in details a traffic-constrained SOAP multicast routing protocol, called tc-SMP, which is an extension of the similarity-based SOAP multicast protocol (SMP) proposed in the previous chapter. Tc-SMP offers improvements over SMP in terms of network traffic size by using its own routing protocol instead of the shortest path ...
Zahir Tari +3 more
openaire +1 more source
2010
Any computer—and more to the point, a Mac OS X Server—receives a barrage of traffic over the network interfaces. You can use two services in particular to control this traffic. The first is the router, and the second is the firewall. A router is a device on your network that chooses the paths between devices that network traffic takes; in short, a ...
Charles S. Edge +2 more
openaire +1 more source
Any computer—and more to the point, a Mac OS X Server—receives a barrage of traffic over the network interfaces. You can use two services in particular to control this traffic. The first is the router, and the second is the firewall. A router is a device on your network that chooses the paths between devices that network traffic takes; in short, a ...
Charles S. Edge +2 more
openaire +1 more source
2016
Infiltration is a very real problem for network administrators, one that can lead to confidential data being leaked outside of your controlled environment. Every day, new attacks are developed that try to breach a network’s security perimeter. Building a secure network requires that a number of key software and hardware components are implemented and ...
Charles Edge, Daniel O’Donnell
openaire +1 more source
Infiltration is a very real problem for network administrators, one that can lead to confidential data being leaked outside of your controlled environment. Every day, new attacks are developed that try to breach a network’s security perimeter. Building a secure network requires that a number of key software and hardware components are implemented and ...
Charles Edge, Daniel O’Donnell
openaire +1 more source
Networks and Network Traffic Anomalies
2017Before discussing the actual detection and prevention of network traffic anomalies, we must introduce fundamental concepts on networks, network traffic, and traffic measurement. Therefore, this chapter is comprised of two parts. The first part discusses components of networks, topologies, and layered architectures followed by protocols used, metrics to
Monowar H. Bhuyan +2 more
openaire +1 more source
2016
In this chapter we are concerned with two schemes for allocating traffic to the arcs of congested road networks: system optimal traffic assignment and user equilibrium traffic assignment. We begin with some cautionary remarks concerning terminology. Techniques for determining Nash equilibria of road networks are frequently collectively referred to by ...
Terry L. Friesz, David Bernstein
openaire +1 more source
In this chapter we are concerned with two schemes for allocating traffic to the arcs of congested road networks: system optimal traffic assignment and user equilibrium traffic assignment. We begin with some cautionary remarks concerning terminology. Techniques for determining Nash equilibria of road networks are frequently collectively referred to by ...
Terry L. Friesz, David Bernstein
openaire +1 more source
Toward composable network traffic measurement
2013 Proceedings IEEE INFOCOM, 2013As the growth of Internet traffic volume and diversity continues, passive monitoring and data analysis, crucial to the correct operation of networks and the systems that rely on them, has become an increasingly difficult task. We present the design and implementation of Blockmon, a flexible, high performance system for network monitoring and analysis ...
Di Pietro, Andrea +7 more
openaire +2 more sources
2008
Different models are used to describe different types of traffic. For example, voice traffic is commonly described using the on–off source or the Markov modulated Poisson process (MMPP). Studies suggest that traffic sources such as variable bit rate (VBR) video and Ethernet traffic are better represented by self-similar traffic models [2–7].
openaire +1 more source
Different models are used to describe different types of traffic. For example, voice traffic is commonly described using the on–off source or the Markov modulated Poisson process (MMPP). Studies suggest that traffic sources such as variable bit rate (VBR) video and Ethernet traffic are better represented by self-similar traffic models [2–7].
openaire +1 more source
FLUCTUATIONS IN URBAN TRAFFIC NETWORKS
Modern Physics Letters B, 2008Urban traffic network is a typical complex system, in which movements of tremendous microscopic traffic participants (pedestrians, bicyclists and vehicles) form complicated spatial and temporal dynamics. We collected flow volumes data on the time-dependent activity of a typical urban traffic network, finding that the coupling between the average flux ...
Chen, Yu-Dong +4 more
openaire +2 more sources
2000
The first six chapters of this book have given you, the reader, the basics of queueing theory and performance evaluation for computer networks and computer systems. However this is only a beginning. There are a plethora of techniques to model traffic and evaluate network performance.
openaire +1 more source
The first six chapters of this book have given you, the reader, the basics of queueing theory and performance evaluation for computer networks and computer systems. However this is only a beginning. There are a plethora of techniques to model traffic and evaluate network performance.
openaire +1 more source
Unwanted traffic in 3G networks
ACM SIGCOMM Computer Communication Review, 2006The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence into account might experience troubles during periods of massive exposure to unwanted traffic, e.g. during large-scale infections. A concrete example was provided by the spreading of Code-
openaire +2 more sources

