709 Hits in 2.5 sec

Protecting Bursty Applications Against Traffic Aggressiveness

Anat Bremler-Barr, Nir Halachmi, Hanoch Levy
2006 IEEE International Workshop on Quality of Service, IWQoS  
WFQ: UNFAIR SERVICE TO BURSTY FLOWS IN THE PRESENCE OF AGGRESSIVE USERS Web traffic is characterized as a bursty application.  ...  However, as shown in this work, in an environment of bursty applications this is not enough. Bursty applications are applications whose traffic demand varies heavily over time.  ... 
doi:10.1109/iwqos.2006.250479 dblp:conf/iwqos/Bremler-BarrLH06 fatcat:cvgrbffarrcb5gloehxbh3ykqy

Protecting bursty applications against traffic aggressiveness

Anat Bremler-Barr, Nir Halachmi, Hanoch Levy
2007 Computer Networks  
WFQ: UNFAIR SERVICE TO BURSTY FLOWS IN THE PRESENCE OF AGGRESSIVE USERS Web traffic is characterized as a bursty application.  ...  However, as shown in this work, in an environment of bursty applications this is not enough. Bursty applications are applications whose traffic demand varies heavily over time.  ... 
doi:10.1016/j.comnet.2007.04.006 fatcat:t7akmadszjbejaerrofzm2m6l4

AWAIT: Efficient Overload Management for Busy Multi-tier Web Services under Bursty Workloads [chapter]

Lei Lu, Ludmila Cherkasova, Vittoria de Nitto Personè, Ningfang Mi, Evgenia Smirni
2010 Lecture Notes in Computer Science  
Detailed simulations illustrate the effectiveness of AWAIT under different workload burstiness profiles and therefore strongly argue for its effectiveness.  ...  The problem of service differentiation and admission control in web services that utilize a multi-tier architecture is more challenging than in a single-tiered one, especially in the presence of bursty  ...  sessions against admitting new sessions, especially under periods of bursty traffic.  ... 
doi:10.1007/978-3-642-13911-6_6 fatcat:vfkthcy6rzcktmsybcjeaimsyq

Gateway Strategies for VoIP Traffic over Wireless Multihop Networks

Kyungtae Kim
2011 KSII Transactions on Internet and Information Systems  
TCP and VoIP traffic do not easily coexist because of TCP aggressiveness and data burstiness, and the (self-) interference nature of multihop traffic.  ...  When supporting both voice and TCP in a wireless multihop network, there are two conflicting goals: to protect the VoIP traffic, and to completely utilize the remaining capacity for TCP.  ...  VAGP limits TCP share within milliseconds of noticing reduced capacity, but still allows aggressive discovery when new bandwidth becomes suddenly available, all while protecting voice traffic.  ... 
doi:10.3837/tiis.2011.01.002 fatcat:6xxso2txl5ecroi35i73yq67k4

Proxy-assisted interactive-video services over networks with large delays

Ali C. Begen, Yucel Altunbasak
2005 Signal processing. Image communication  
This methodology is then used by the proxy and end-users to improve the error-control/protection capability of the video applications.  ...  A promising approach in satisfying the stringent requirements of delay-intolerant video applications is to benefit from configurable proxies.  ...  Distributions of the forward-trip and interarrival times for the non-bursty video traffic (on the left) and bursty video traffic (on the right).  ... 
doi:10.1016/j.image.2005.05.001 fatcat:gxmm4nx6mzexhl5sf347as34iy

Complementing TCP Congestion Control with Forward Error Correction [chapter]

Vicky Sharma, Kadangode Ramakrishnan, Koushik Kar, Shivkumar Kalyanaraman
2009 Lecture Notes in Computer Science  
In this paper, we examine an emerging combination of challenges for TCP: increasingly bursty background traffic that is not subject to flow and congestion control, higher bandwidth networks and small buffers  ...  We demonstrate the effectiveness of using FEC with TCP SACK congestion control by showing that such an approach improves performance for TCP flows for the emerging bursty traffic, small buffer, high bandwidth-delay  ...  These studies indicated a high burstiness in traffic patterns for new streaming applications. Appenseller et al.  ... 
doi:10.1007/978-3-642-01399-7_30 fatcat:thusw2l3ivfkfhhm5yfqxrfiru

Allocating Bandwidth Using Fair Random Indication with Discarding Aggressiveness Yardstick (FRIDAY) [chapter]

Shushan Wen, Hairong Sun, Lemin Li
2003 IFIP Advances in Information and Communication Technology  
fairness than LQD (Longest Queue Drop), RED (Random Early Detection), and TD (Tail Drop), (2) maintain a shorter average waiting time in the queue than LQD and TD, and (3) control the time limit for a bursty  ...  In order to improve the fairness of bandwidth allocation in the Internet, we present an active queue management scheme called Fair Random Indication with Discarding Aggressiveness Yardstick (FRIDA Y),  ...  Therefore, LQD has a bias against the traffic that is bursty but has a low average sending rate.  ... 
doi:10.1007/978-0-387-35620-4_31 fatcat:xuht2spbjrd6pptcevfkfo75u4

Mongoose: Throughput Redistributing Virtual World

Iain Oliver, Alan Miller, Colin Allison
2012 2012 21st International Conference on Computer Communications and Networks (ICCCN)  
The responsiveness of the system is effected by interactions between avatar activity, application traffic regulation and network conditions.  ...  They offer much of the engagement of on line 3D games but support heterogeneous applications.  ...  The small difference between the mean, median and quartiles at higher loss levels shows that the traffic is less bursty and is limited by the throttle system rather than the application.  ... 
doi:10.1109/icccn.2012.6289297 dblp:conf/icccn/OliverMA12 fatcat:o6fiw6liqvfpdkqm3boo2o37qa

Congestion control based on flow-state-dependent dynamic priority scheduling

C.-K. Siew, G. Feng, F. Long, M.-H. Er
2005 IEE Proceedings - Communications  
active queue management (AQM), such as random early detection (RED), cannot cope with flows that are unresponsive to congestion notification or non-TCP-compatible flows which are responsive but more aggressive  ...  paper, a new mechanism is presented, namely source aware congestion control (SACC) based on a packet scheduling algorithm called flow-state-dependent dynamic priority scheduling (FDPS), which performs traffic  ...  Thus the minimum buffer size B j provides protection against any loss of guaranteed traffic.  ... 
doi:10.1049/ip-com:20045218 fatcat:d3kdktzs7ffhdhvufjw2pci54m

AccFlow: Defending Against the Low-Rate TCP DoS Attack in Wireless Sensor Networks [article]

Yuan Cao and Lijuan Han and Xiaojin Zhao and Xiaofang Pan
2019 arXiv   pre-print
The larger their loss rates, the more aggressively AccFlow drops their packets.  ...  In this paper, we develop AccFlow which is an incrementally deployable Software-Defined Networking based protocol that is able to serve as a countermeasure against the low-rate TCP DoS attack.  ...  Aggressive Detection is used to block the attacking flows that are behaving aggressively enough to be detected whereas Early Drop is used to protect the network when attackers try to evade detection by  ... 
arXiv:1903.06394v1 fatcat:3manylv74ber5nxvmvuw7mvzui

Buffer management schemes for supporting TCP in gigabit routers with per-flow queueing

B. Suter, T.V. Lakshman, D. Stiliadis, A.K. Choudhury
1999 IEEE Journal on Selected Areas in Communications  
Recently, there has been much interest in using active queue management in routers in order to protect users from connections that are not very responsive to congestion notification.  ...  sources, and one-way and two-way traffic.  ...  In some cases, as with one-way traffic, the throughput differences are not very large.  ... 
doi:10.1109/49.772451 fatcat:pxjmu6uninc6lkwfhh5moapnum

iTeleScope: Intelligent Video Telemetry and Classification in Real-Time using Software Defined Networking [article]

Hassan Habibi Gharakheili, Minzhao Lyu, Yu Wang, Himal Kumar, Vijay Sivaraman
2018 arXiv   pre-print
Video continues to dominate network traffic, yet operators today have poor visibility into the number, duration, and resolutions of the video streams traversing their domain.  ...  This protects the controller from overload from the data-plane, allowing it to scale to high rates and to service other SDN applications.  ...  For example, the Facebook application flow shown in Fig. 3 (g) exhibits similar characteristics of video streams (shown in Figures 3(b)-3(c) ) in terms of idle-time and burstiness, but its rate is far  ... 
arXiv:1804.09914v1 fatcat:e7wou33acrbhvewoewtpcoxayi

TCP Rapid: From theory to practice

Qianwen Yin, Jasleen Kaur, F. Donelson Smith
2017 IEEE INFOCOM 2017 - IEEE Conference on Computer Communications  
Thus, a model learned from bursty cross-traffic is robust to testing cases of less bursty cross-traffic.  ...  The burstiness of the aggregate traffic is 2.79Gbps, and we label this traffic as "BCT", which is (the most bursty cross traffic used in this testbed).  ... 
doi:10.1109/infocom.2017.8057179 dblp:conf/infocom/YinKS17 fatcat:u32jaqugsvafdnjsjyf7a7n7zm

On the Scalable Fairness and Efficient Active Queue Management of RED

Hui WANG, Xiao-Hui LIN, Kai-Yu ZHOU, Nin XIE, Hui LI
2009 International Journal of Communications, Network and System Sciences  
The underlying idea is that, with the proposed nonlinear packet dropping function, packet dropping becomes gentler than RED at light traffic load but more aggressive at heavy load.  ...  Based on the list, our proposed scheme jointly considers the identification and punish of the fast and unresponsive fast flows, and the protection of slow flows.  ...  RED is shown to effectively tackle both the global synchronization problem and the problem of bias against bursty sources.  ... 
doi:10.4236/ijcns.2009.21009 fatcat:pkevbi7gcjew7ka7necq3alif4

Identifying MMORPG Bots: A Traffic Analysis Approach

Kuan-Ta Chen, Jhih-Wei Jiang, Polly Huang, Hao-Hua Chu, Chin-Laung Lei, Wen-Chin Chen
2008 EURASIP Journal on Advances in Signal Processing  
We find that their traffic is distinguishable by 1) the regularity in the release time of client commands, 2) the trend and magnitude of traffic burstiness in multiple time scales, and 3) the sensitivity  ...  Finally, we discuss the robustness of the proposed methods against countermeasures of bot developers, and consider a number of possible ways to manage the increasingly serious bot problem.  ...  The former completely avoids making false accusations against bona fide players, while the latter tracks game bots down more aggressively.  ... 
doi:10.1155/2009/797159 fatcat:nrqug74ezfg2jhhnt64yxof6za
« Previous Showing results 1 — 15 out of 709 results