• Nenhum resultado encontrado

Network traffic

Netodyssey: a framework for real-time windowed analysis of network traffic

Netodyssey: a framework for real-time windowed analysis of network traffic

... The main purpose of the NetOdyssey framework was initially to support some research work at the NMCG, but, as NetOdyssey evolved, it became clear that it be could easily used by other researchers for network ...

110

A Study of Network Traffic Pattern and its Impact on Performance in Implementation of Web Services

A Study of Network Traffic Pattern and its Impact on Performance in Implementation of Web Services

... on network traffic measurement to look into the traffic characteristics and patterns or models both in internet and ...the traffic measurement data in the work (Meng et ...for network ...

7

TOPSIS Based Multi-Criteria Decision Making of Feature Selection Techniques for Network Traffic Dataset

TOPSIS Based Multi-Criteria Decision Making of Feature Selection Techniques for Network Traffic Dataset

... Choices can be made easily when there are only one attribute but selection among many available techniques sometimes become difficult job because they have multiple attributes. Effectiveness of feature selection ...

7

Effective Frame Switching using a Network Traffic Oscillator

Effective Frame Switching using a Network Traffic Oscillator

... a network layer terminology and frames as data-link layer but here this arbitrary division is overcome to connect the two layers and create a critical network suitable for continuous real-time ...resultant ...

5

Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks

Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks

... intercept network traffic due to the use of a broadcast medium for routing packets and get detailed information such as packet transmission time and frequency to perform traffic analysis and infer ...

6

AN APPROACH TO MITIGATE DENIAL OF SERVICE ATTACKS IN IEEE 802.11 NETWORKS

AN APPROACH TO MITIGATE DENIAL OF SERVICE ATTACKS IN IEEE 802.11 NETWORKS

... wireless network security have great attention to R&D community, mainly issues regarding denial of ...wireless network, through simulations using OMNeT++ network ...generated network ...

10

Managing Network Congestion with a Modified Kohonen-based RED Queue

Managing Network Congestion with a Modified Kohonen-based RED Queue

... The robustness of today’s Internet depends heavily on the TCP congestion control mechanism. Congestion is a key factor in transmission control protocol (TCP) which leads to many researches. Congestion control techniques ...

6

Proposal and Implementation of MPLS Fuzzy Traffic Monitor

Proposal and Implementation of MPLS Fuzzy Traffic Monitor

... the network was using 2 edge routers and 6 switch ...of traffic, where traffic volume is small and traffic type is ...on traffic scenarios, which have been implemented in this research ...

9

A Fuzzy Mathematical Model for Peformance Testing in Cloud Computing Using User Defined Parameters

A Fuzzy Mathematical Model for Peformance Testing in Cloud Computing Using User Defined Parameters

... parameters network traffic, disk storage [9] and ...When network traffic is low then the performance of the system will be high[12], when the disk storage and RAM is also high the performance ...

13

Assessment and ranking of traffic management Method for passenger safety in Zabol

Assessment and ranking of traffic management Method for passenger safety in Zabol

... street network, so traffic accidents are usually killed and wounded civilians, may be ...street network should be able to benefit from intelligent transport systems, knowledge based, at least time to ...

7

Adaptive Resource Allocation and Internet Traffic Engineering on Data Network

Adaptive Resource Allocation and Internet Traffic Engineering on Data Network

... corporate network management is to minimize the cost function on network spending, seeks efficient traffic flow and minimizes network traffic delays, and optimized network ...the ...

7

A new Framework to enable rapid innovation in Cloud Datacenter through a SDN approach

A new Framework to enable rapid innovation in Cloud Datacenter through a SDN approach

... while traffic modeling is out of the scope of this framework, giving the user tools that allows to easily create different traffic profiles is a main ...distributed traffic generator that allows to ...

119

Securing Gateways within Clustered Power Centric Network of Nodes

Securing Gateways within Clustered Power Centric Network of Nodes

... the network. Finally, a framework is provided for traffic analysis to boost the effectiveness of present Botnet detection ...the network traffic associated with these hosts to boost-up ...

10

Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures

Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures

... more traffic, it is essential to maintain a high level of performance and ...efficiency. Traffic engineering is the process of optimization of the network to maximize performance and ...for ...

6

Throughput Improvement In Wireless Mesh Networks By Integrating With Optical Network

Throughput Improvement In Wireless Mesh Networks By Integrating With Optical Network

... maximum network throughput, we only need to consider routing and link scheduling ...WMNs, traffic for peer-to-peer communications will always go through the shortest path between peer clients within the ...

7

Network Security Using Graph Theory

Network Security Using Graph Theory

... Computer network administrator’s faces at the network security level and the financial or at technical cost of achieving that security ...a network of configurable, networked routers with traffic ...

8

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS AND TCP VARIANTS UNDER HTTP AND FTP TRAFFIC IN MANETS

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS AND TCP VARIANTS UNDER HTTP AND FTP TRAFFIC IN MANETS

... between network nodes without creating major delays, because they do not need much time in a route discovery mechanism, where the routes are available in advance resulting lesser delay in ...the network ...

18

THE ACCESSIBILITY ASSESSMENT OF REGIONAL TRANSPORT NETWORK IN THE SOUTH EAST EUROPE

THE ACCESSIBILITY ASSESSMENT OF REGIONAL TRANSPORT NETWORK IN THE SOUTH EAST EUROPE

... international, mainly to and from European Union, due to relatively small SEE countries areas, which implicate lack of domestic traffic with exceptions in Croatia and Serbia. That fact highlights the importance of ...

14

J. Transp. Lit.  vol.9 número3

J. Transp. Lit. vol.9 número3

... and traffic volume ...in traffic volume till finally the provision of QJL becomes a redundant for the intersection at 75% of present traffic volume and ...100% traffic volume but an increasing ...

5

Show all 3354 documents...

temas relacionados