نتایج جستجو برای: network traffic identification
تعداد نتایج: 1117736 فیلتر نتایج به سال:
Accurate application traffic classification and identification are important for network monitoring and analysis. The accuracy of traditional Internet application traffic classification approaches is rapidly decreasing due to the diversity of today’s Internet application traffic, such as ephemeral port allocation, proprietary protocol, and traffic encryption. This paper presents an empirical ev...
One of the management issues in the city of Tehran is urban traffic. In the city of Tehran, population increase and limited resources have resulted in confusion and disorganization in dealing with this matter. Identification of difficulties and effective factors on traffic and transport management of Tehran, particularly dealing with urban sectors, meets the need of city management in a relativ...
هدف شبکه های نسل جدید فراهم کردن شرایطی است که علاوه بر پوشش کاربردهای موجود، امکان پوشش کاربردهایی که در آینده بوجود می آیند نیز وجود داشته باشد. یکی از نکاتی که می بایست در ارائه مکانیزم های جدید مسیریابی مورد توجه قرار گیرد، پاسخ گویی به چالش های پیش روی شبکه های نسل جدید است. مسیریابی در این شبکه ها باید توزیع ترافیک ورودی را برای مصرف بهینه منابع و یافتن مسیرها مبتنی بر کیفیت مورد نظر کارب...
in this paper, the advantage of reinforcement learning to develop a new traffic shaper is invoked in order to obtain a reasonable utilization of bandwidth while preventing traffic overload in other parts of the network. this leads to a reduction in the total number of packet droppings in the whole network. the method is implemented in a novel proposed intelligent simulation environment. keeping...
This paper introduces AtoZ, an automatic traffic organizer that provides endusers with control of how their applications use network resources. Such an approach contrasts with the moves of many ISPs towards network-wide application throttling and provider-centric control of an application’s network-usage. AtoZ provides seamless per-application traffic-organizing on gigabit links, with minimal p...
Traffic congestion on road networks is characterized by slower speeds, longer trip times and increased vehicular queuing. We all are observing that vehicle volume is increasing day by day exponentially, but in comparison with it, the road infrastructure is not. It leads to ever increasing traffic congestion. Different technologies are used to detect traffic congestion and making congestion mana...
We design an efficient on-line approach, FlowMate, for partitioning flows at a busy server into flow groups that share bottlenecks. These groups are periodically input to congestion coordination, aggregation, load balancing, admission control, or pricing modules. FlowMate uses inband packet delay measurements to the receivers to determine shared bottlenecks among flows. Packet delay information...
With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of source identification, and there are some issues on it. For large amount of packets, analysis time and complicated computation are necessary while detect marking information. This paper focuses on this direction, and proposes a ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید