Sciweavers

455 search results - page 7 / 91
» Peer-to-Peer Traffic in Operator Networks
Sort
View
ICC
2007
IEEE
15 years 3 months ago
iOPEN Network: Operation Mechanisms and Experimental Study
Integrated OPtical EtherNet (iOPEN) network was earlier proposed as an integrated Ethernet and reconfigurable WDM network, which supports Ethernet transport services in campus area...
Luying Zhou, Xu Shao, Teck Yoong Chai, Chava Vijay...
CONEXT
2007
ACM
15 years 1 months ago
Rethinking internet traffic management: from multiple decompositions to a practical protocol
In the Internet today, traffic management spans congestion control (at end hosts), routing protocols (on routers), and traffic engineering (by network operators). Historically, th...
Jiayue He, Martin Suchara, Ma'ayan Bresler, Jennif...
82
Voted
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
15 years 1 months ago
Impact of arrival burstiness on queue length: An infinitesimal perturbation analysis
Traffic burstiness has a significant impact on network performance. Burstiness can cause buffer overflows and packet drops and is particularly problematic in the context of small-b...
Yan Cai, Yong Liu, Weibo Gong, Tilman Wolf
IWCMC
2010
ACM
14 years 11 months ago
A flow trace generator using graph-based traffic classification techniques
We propose a novel methodology to generate realistic network flow traces to enable systematic evaluation of network monitoring systems in various traffic conditions. Our technique...
Peter Siska, Marc Ph. Stoecklin, Andreas Kind, Tor...
CCR
2006
76views more  CCR 2006»
14 years 9 months ago
Unwanted traffic in 3G networks
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence in...
Fabio Ricciato