نتایج جستجو برای: packet length

تعداد نتایج: 347989  

2013
Wang XiaoPeng Liu Yang

This paper presents a set of programme to extract the application-layer protocol features. Based on frequent itemsets mining, the program automatically extracts four most common features of a protocol: characteristic string, session tag, packet length, and packet order. It is experimentally demonstrated that this progran can significantly improve the efficiency of feature extraction, and can be...

Journal: :IEEE Journal on Selected Areas in Communications 1999
Kenichi Nagami Hiroshi Esaki Yasuhiro Katsube Osamu Nakamura

Label-switching technology enables high performance and flexible layer-3 packet forwarding based on the fixed-length label information that is mapped to the layer-3 packet stream. A label-switching router (LSR) forwards layer-3 packets based on their layer-3 address information or their label information that is mapped to the layer-3 address information. Two label-mapping policies have been pro...

2002
Ching-Fang Hsu Te-Lung Liu Nen-Fu Huang

deflection routing is enabled, optical buffers are necessary to solve the insufficient offset time problem. Another solution, which can alleviate buffering, is to lengthen offset time in the beginning. As previous work indicated, a burst with extra offset time has higher priority than that without extra offset time and quality-of-service (QoS) can be accomplished in this way. Therefore, we inve...

Journal: :Wave Motion 2022

We examine the scattering of an Ostrovsky wave packet, generated from a solitary wave, in two layered waveguide with delamination centre and soft (imperfect) bonding either side centre. The lower layer is assumed to be significantly denser than upper layer, leading system Boussinesq–Klein–Gordon (BKG) equations. Direct numerical modelling difficult so semi-analytical approach consisting several...

Journal: :International Journal of Electronics and Telecommunications 2023

This paper presents the design of a compact pro- tocol for fixed-latency, high-speed, reliable, serial transmission between simple field-programmable gate arrays (FPGA) devices. Implementation project aims to delineate word boundaries, provide randomness electromagnetic interference (EMI) generated by electrical transitions, allow clock recov- ery and maintain direct current (DC) balance. An or...

2010
Kenton Born

This paper explores taking a passive approach to covert communication over DNS. By exploiting the slack space that can be created in DNS packets, data may be inserted into packets without affecting the operation of DNS resolvers and security tools. Several locations in the packet exist that allow additional data to be inserted into the network traffic without being noticed by applications befor...

2004
Sarang Dharmapurikar Praveen Krishnamurthy Todd S. Sproull John W. Lockwood

There is a class of packet processing applications that inspect packets deeper than the protocol headers to analyze content. For instance, network security applications must drop packets containing certain malicious Internet worms or computer viruses carried in a packet payload. Content-based billing systems analyze media files and bill the receiver based on the material transferred over the ne...

2003
Takashi Yamaguchi Ken-ichi Baba Masayuki Murata Ken-ichi Kitayama

In this paper, we comparatively evaluate two photonic packet switch architectures with WDM-FDL buffers for synchronized variable length packets. The first one is an output buffer type switch, which stores packets in the FDL buffer attached to each output port. Another is a shared buffer type switch, which stores packets in the shared FDL buffer. The performance of a switch is greatly influenced...

2007
Weijiang Liu

Traffic sampling technology has been widely deployed in front of many high-speed network applications to alleviate the great pressure on packet capturing.Increasingly passive traffic measurement employs sampling at the packet level. Packet sampling has become an attractive and scalable means to measure flow data on high-speed links. However, knowing the number and length of the original flows i...

2009
LEOPOLDO ESTRADA DENI TORRES HOMERO TORAL

In this work, the perceived quality of VoIP communications is studied. The distributions of the number of consecutive received and lost packets, respectively named gap and burst, of a VoIP communication are modeled with discrete two-state and four-state Markov chains. Algorithms for estimating the transition probabilities between states and from these, the packet loss rate and the respective ga...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید