نتایج جستجو برای: network traffic identification

تعداد نتایج: 1117736  

2008
Byungchul Park Young J. Won Mi-Jung Choi Myung-Sup Kim James Won-Ki Hong

Accurate application traffic classification and identification are important for network monitoring and analysis. The accuracy of traditional Internet application traffic classification approaches is rapidly decreasing due to the diversity of today’s Internet application traffic, such as ephemeral port allocation, proprietary protocol, and traffic encryption. This paper presents an empirical ev...

آبرودی, سیدمجتبی, آریانا, محمد, حسینی چشمه ماکانی, سیدتیمور,

One of the management issues in the city of Tehran is urban traffic. In the city of Tehran, population increase and limited resources have resulted in confusion and disorganization in dealing with this matter. Identification of difficulties and effective factors on traffic and transport management of Tehran, particularly dealing with urban sectors, meets the need of city management in a relativ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده برق و کامپیوتر 1391

هدف شبکه های نسل جدید فراهم کردن شرایطی است که علاوه بر پوشش کاربردهای موجود، امکان پوشش کاربردهایی که در آینده بوجود می آیند نیز وجود داشته باشد. یکی از نکاتی که می بایست در ارائه مکانیزم های جدید مسیریابی مورد توجه قرار گیرد، پاسخ گویی به چالش های پیش روی شبکه های نسل جدید است. مسیریابی در این شبکه ها باید توزیع ترافیک ورودی را برای مصرف بهینه منابع و یافتن مسیرها مبتنی بر کیفیت مورد نظر کارب...

Journal: :international journal of information science and management 0
a. a. safavi ph.d. , department of electrical engineering school of engineering, shiraz university, shiraz i. shames m.s. , department of electrical engineering school of engineering, shiraz university n. najmaei m.s. , department of electrical engineering school of engineering, shiraz university, shiraz m. zamani m.s. , department of electrical engineering school of engineering, shiraz university, shiraz

in this paper, the advantage of reinforcement learning to develop a new traffic shaper is invoked in order to obtain a reasonable utilization of bandwidth while preventing traffic overload in other parts of the network. this leads to a reduction in the total number of packet droppings in the whole network. the method is implemented in a novel proposed intelligent simulation environment. keeping...

2009
Marco Canini Wei Li Martin Zadnik Andrew W. Moore

This paper introduces AtoZ, an automatic traffic organizer that provides endusers with control of how their applications use network resources. Such an approach contrasts with the moves of many ISPs towards network-wide application throttling and provider-centric control of an application’s network-usage. AtoZ provides seamless per-application traffic-organizing on gigabit links, with minimal p...

2013
Madhavi Vaidya

Traffic congestion on road networks is characterized by slower speeds, longer trip times and increased vehicular queuing. We all are observing that vehicle volume is increasing day by day exponentially, but in comparison with it, the road infrastructure is not. It leads to ever increasing traffic congestion. Different technologies are used to detect traffic congestion and making congestion mana...

2002
Ossama Younis Sonia Fahmy

We design an efficient on-line approach, FlowMate, for partitioning flows at a busy server into flow groups that share bottlenecks. These groups are periodically input to congestion coordination, aggregation, load balancing, admission control, or pricing modules. FlowMate uses inband packet delay measurements to the receivers to determine shared bottlenecks among flows. Packet delay information...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2017

Journal: :ACM SIGMETRICS Performance Evaluation Review 2007

2005
Dae Sun Kim Choong Seon Hong Yu Xiang

With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of source identification, and there are some issues on it. For large amount of packets, analysis time and complicated computation are necessary while detect marking information. This paper focuses on this direction, and proposes a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید