Fixed IP-port based Application-Level Internet Traffic Classification

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Internet Application Traffic Classification Using Fixed IP-Port

As network traffic is dramatically increasing due to the popularization of Internet, the need for application traffic classification becomes important for the effective use of network resources. In this paper, we present an application traffic classification method based on fixed IP-port information. A fixed IP-port is a {IP, protocol, port} triple dedicated to only one application, which is au...

متن کامل

An Integrated Method for Application-level Internet Traffic Classification

Enhanced network speed and the appearance of various applications have recently resulted in the rapid increase of Internet users and the explosive growth of network traffic. Under this circumstance, Internet users are eager to receive reliable and Quality of Service (QoS)-guaranteed services. To provide reliable network services, network managers need to perform control measures involving dropp...

متن کامل

Internet Traffic Classification

Executive Summary ...................................

متن کامل

Self-Learning IP Traffic Classification Based on Statistical Flow Characteristics

A number of key areas in IP network engineering, management and surveillance greatly benefit from the ability to dynamically identify traffic flows according to the applications responsible for their creation. Currently such classifications rely on selected packet header fields (e.g. destination port) or application layer protocol decoding. These methods have a number of shortfalls e.g. many ap...

متن کامل

Efficient Port-based Network Access Control for IP DSLAMs in Ethernet-based Fixed Access Networks

This paper focuses on establishment of new authentication and authorization mechanisms in Ethernet-based fixed Access Networks. We provide approaches for an efficient usage of IEEE Standard 802.1X mechanisms in an Access Network environment for authentication and authorization purposes. We explain how 802.1X Authenticator functionality can be integrated in different Access Network systems such ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The KIPS Transactions:PartC

سال: 2010

ISSN: 1598-2858

DOI: 10.3745/kipstc.2010.17c.2.205