Filters








1,645 Hits in 5.1 sec

Applying Principles of Active Available Bandwidth Algorithms to Passive TCP Traces [chapter]

Marcia Zangrilli, Bruce B. Lowekamp
2005 Lecture Notes in Computer Science  
Our goal is to apply the self-induced congestion principle to passive traces of existing TCP traffic instead of actively probing the path.  ...  The primary challenge is that, unlike active algorithms, we have no control over the traffic pattern in the passive TCP traces.  ...  Our goal is to use passive traces of existing TCP traffic instead of actively generating the traffic being used to measure available bandwidth.  ... 
doi:10.1007/978-3-540-31966-5_28 fatcat:jlrpu7qxsbfd3jthc2k5lzable

Transparent Optimization of Grid Server Selection With Real-Time Passive Network Measurements

Marcia Zangrilli, Bruce B. Lowekamp
2006 2006 3rd International Conference on Broadband Communications, Networks and Systems  
We describe how we implement the proxy and monitor the available bandwidth to the service providers using the Wren monitoring toolkit.  ...  At the same time, the increased level of abstraction reduces the opportunities available to the application for optimizing its performance by monitoring the system.  ...  Acknowledgments We would like to thank INCOGEN for allowing us to use their VIBE software toolkit.  ... 
doi:10.1109/broadnets.2006.4374425 dblp:conf/broadnets/ZangrilliL06 fatcat:hqmr2dyolzgnfbampwusxdr7r4

On Queue Length and Link Buffer Size Estimation in 3G/4G Mobile Data Networks

2014 IEEE Transactions on Mobile Computing  
Index Terms-Queue length, link buffer size, estimation algorithm, sum-of-delays, mobile data networks, passive and active estimations  ...  We develop a novel sum-of-delays algorithm which incorporates the effect of bandwidth variations into its estimation.  ...  The experimental results in this paper were made possible through the support of our industry collaborators. They sincerely thank them for their generous support.  ... 
doi:10.1109/tmc.2013.127 fatcat:vy66xm2m4fbyvk4n2z4o7ym4l4

A Deep Learning Approach to Dynamic Passive RTT Prediction Model for TCP

Desta Haileselassie Hagos, Paal E. Engelstad, Anis Yazid, Carsten Griwodz
2019 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC)  
The end-to-end RTT value influences significantly the dynamics and performance of TCP, which is by far the most used communication protocol.  ...  We show that our model, which is based on classical deep learning algorithms, gives reasonably effective state-of-the-art performance results across multiple TCP congestion control variants.  ...  ACKNOWLEDGMENT We would like to sincerely thank Professor Øivind Kure for his comments on the final draft of our paper.  ... 
doi:10.1109/ipccc47392.2019.8958727 dblp:conf/ipccc/HagosEYG19 fatcat:tjp5upilbzdondw2skpxmjgkua

XCP-Winf and RCP-Winf: Congestion Control Techniques for Wireless Mesh Networks

Luis Barreto, Susana Sargento
2011 2011 IEEE International Conference on Communications (ICC)  
Moreover, although these protocols estimate the available bandwidth of the links, this estimation is not accurate for wireless networks.  ...  These congestion control mechanisms are supported on a new method to estimate the available bandwidth and the path capacity over a wireless network path, denoted as rt-Winf, through a cross-layer approach  ...  Then, it is of major importance to obtain accurately the link capacity and available bandwidth, and use these parameters actively in WMNs congestion control.  ... 
doi:10.1109/icc.2011.5963464 dblp:conf/icc/BarretoS11 fatcat:5wrap4wysrbjvmstrd3a5p5vlu

Machine-Learned Recognition of Network Traffic for Optimization through Protocol Selection

Hamidreza Anvari, Paul Lu
2021 Computers  
Therefore, we build and empirically evaluate several machine-learned (ML) classifiers, trained on local round-trip time (RTT) time-series data gathered using active probing, to recognize the mix of network  ...  protocols in the background with an accuracy of up to 0.96.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/computers10060076 fatcat:uhbu7hdolbhpbdk2cl7xrdgxda

A machine learning approach to TCP state monitoring from passive measurements

Desta Haileselassie Hagos, Paal E. Engelstad, Anis Yazidi, Oivind Kure
2018 2018 Wireless Days (WD)  
We would like to thank the Research Infrastructure Services Group at the University of Oslo for the use of multicore cluster machines.  ...  We would like to thank the Research Infrastructure Services Group at the University of Oslo for the use of multicore cluster machines. Acknowledgements.  ...  algorithms which are unfair and affecting other user's available bandwidth?  ... 
doi:10.1109/wd.2018.8361713 dblp:conf/wd/HagosEYK18 fatcat:hmeh7nfa7bbwxnncel5xnyytim

Shared Bottleneck Detecction Based on Trend Line Regression for Multipath Transmission [article]

Songyang Zhang, Weimin Lei, Wei Zhang, Yunchong Guan
2018 arXiv   pre-print
The current deployed multipath congestion control algorithms couple all the subflows together to avoid bandwidth occupation aggressiveness if the subflows of multipath transmission protocol share common  ...  Deduced from TCP fluid model, the packet round trip delay signal shows linear increase property during the queue building up process of the narrowest link and the delay trend line slopes of two flows are  ...  to ensure the stability and availability of network links.  ... 
arXiv:1812.05816v1 fatcat:nstqparo2bhvhobudqwpwwbdfy

Multi-way Association Clustering Analysis on Adaptive Real-Time Multicast Data [chapter]

Sheneela Naz, Sohail Asghar, Simon Fong, Amir Qayyum
2011 Communications in Computer and Information Science  
These patterns are identified by using association rules techniques such as Apriori and clustering algorithms. A simulation experiment was configured to verify the efficacy of the algorithms.  ...  In this paper, we set our goal to identify the recurrent patterns and classification of transport layer data, as an effective measure of anomaly-based intrusion detection.  ...  Therefore Receiver has an active role while the sender has a passive role in adapting receiver based rate control.  ... 
doi:10.1007/978-3-642-22185-9_33 fatcat:7s764rrfd5fkjaspcwddjpm4ue

Network Measurement and Performance Analysis at Server Side

Guang-Qian Peng, Guangtao Xue, Yi-Chao Chen
2018 Future Internet  
EVA passively collects packet traces near the server (hypervisor, NIC, or top-of-rack switch), and pinpoints the location of the performance bottleneck (sender, network, or receiver).  ...  of collection latency, bandwidth, and processing power.  ...  We define this available bandwidth as BtlBw, i.e., bottleneck bandwidth.  ... 
doi:10.3390/fi10070067 fatcat:cnjuuuvuzrdzdk6gaw7rdct2fq

A Collaborative Event Processing System for Protection of Critical Infrastructures from Cyber Attacks [chapter]

Leonardo Aniello, Giuseppe Antonio Di Luna, Giorgia Lodi, Roberto Baldoni
2011 Lecture Notes in Computer Science  
link bandwidths (i.e., less than 3Mbit/s) connecting the organizations to Esper.  ...  This instance uses the open source Complex Event Processing (CEP) engine ESPER to correlate massive amounts of network traffic data exhibiting the evidence of those scans.  ...  The content of the traces is described in Table 1 . In each trace, the first TCP packet of a scanner always corresponded to the first TCP packet of a real port scan activity.  ... 
doi:10.1007/978-3-642-24270-0_23 fatcat:uabmw62afrbatjfqjjdpwkmqby

Bandwidth estimation schemes for TCP over wireless networks

A. Capone, L. Fratta, F. Martignon
2004 IEEE Transactions on Mobile Computing  
Moreover, by studying TCP behavior with an ideal bandwidth estimation, we provide an upper bound to the performance of all possible schemes based on different bandwidth estimates.  ...  This paper first analyzes the problems faced by every bandwidth estimation algorithm implemented at the sender side of a TCP connection.  ...  ACKNOWLEDGMENTS This work was partially supported by MIUR in the framework of FIRB VICOM and TANGO projects.  ... 
doi:10.1109/tmc.2004.5 fatcat:ahu6fwvurrhx5l6v7egkewswoy

Diagnosis of capacity bottlenecks via passive monitoring in 3G networks: An empirical analysis

Fabio Ricciato, Francesco Vacirca, Philipp Svoboda
2007 Computer Networks  
In this work we address the problem of inferring the presence of a capacity bottleneck from passive measurements in a 3G network.  ...  The second approach is based on the analysis of several TCP performance parameters, e.g. estimated frequency of retransmissions.  ...  The authors would like to acknowledge the developers of the monitoring system, particularly E. Hasenleithner, R. Pilz and P. Krueger: without their work this research would have not been possible.  ... 
doi:10.1016/j.comnet.2006.07.011 fatcat:klh4it6cmndo7ezzqargb2ls6i

Remote detection of bottleneck links using spectral and statistical methods

Xinming He, Christos Papadopoulos, John Heidemann, Urbashi Mitra, Usman Riaz
2009 Computer Networks  
We use data from live Internet traces to evaluate the performance of our algorithm under various network conditions.  ...  Currently bottleneck links can be detected either locally, through SNMP information, or remotely, through active probing or passive flow-based analysis.  ...  apply wavelet denoising to improve the accuracy of detecting congestion among different flows (Kim et al., 2004) . It requires active probing to measure the one-way-delay.  ... 
doi:10.1016/j.comnet.2008.10.001 fatcat:7j2byeuscng2tdxdwaw7cmarz4

An Experimental Evaluation of Tools for Estimating Bandwidth-Related Metrics

Fatih Abut, Martin Leischner
2018 International Journal of Computer Network and Information Security  
In literature, several tools have been proposed to estimate major bandwidth-related metrics such as capacity, available bandwidth and achievable throughput.  ...  For many different applications, current information about the bandwidth-related metrics of the utilized connection is very useful as they directly impact the performance of throughput sensitive applications  ...  Per-hop End-to-end Per-hop Methodology PP VPS Active / Passive Active Passive Active Protocol UDP & TCP TCP UDP Works on asymmetrical links No Yes No Deployment Sender & Receiver  ... 
doi:10.5815/ijcnis.2018.07.01 fatcat:26w2zelfeza2xhwv6nb3d37gjy
« Previous Showing results 1 — 15 out of 1,645 results