[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 27 Dec 2024Bibliometrics

Newsletter Downloads

Skip Table Of Content Section
article
Counting the number of active flows on a high speed link

Internet links operate at high speeds, and past trends predict that these speeds will continue to increase rapidly. Routers and Intrusion Detection Systems that operate at up to OC-768 speeds (40 Gigabits/second) are currently being developed. In this ...

article
The performance of circuit switching in the internet

Recently there has been renewed interest in circuit switching because of the ease of building very high capacity optical circuit switches. This poster studies the performance, as seen by the end user, of an Internet that uses circuit switching instead ...

article
article
Encoded meta-data formats for internet subscription systems
article
Provisioning on-line games: a traffic analysis of a busy counter-strike server

This poster describes the results of a 500 million packet trace of a popular on-line, multiplayer, game server. The results show that the traffic behavior of this heavily loaded game server is highly predictable and can be attributed to the fact that ...

article
Oblivious AQM and nash equilibria
article
A comparison of RED's byte and packet modes
article
Robust rate based congestion control
article
article
Fixing 802.11 access point selection
article
STAR: a transparent spanning tree bridge protocol with alternate routing

With increasing demand for multimedia applications, local area network (LAN) technologies are rapidly being upgraded to provide support for quality of service (QoS). In a network that consists of an interconnection of multiple LANs via bridges, the QoS ...

article
A game-theoretic approach towards congestion control in communication networks

Most of the end-to-end congestion control schemes are "voluntary" in nature and critically depend on end-user cooperation. We show that in the presence of selfish users, all such schemes will inevitably lead to a congestion collapse. Router and switch ...

article
Controlling high bandwidth aggregates in the network

The current Internet infrastructure has very few built-in protection mechanisms, and is therefore vulnerable to attacks and failures. In particular, recent events have illustrated the Internet's vulnerability to both denial of service (DoS) attacks and ...

article
Passive estimation of TCP round-trip times

We propose and evaluate a passive measurement methodology that estimates the distribution of Round-Trip Times (RTTs) for the TCP connections that flow through a network link. Such an RTT distribution is important in buffer provisioning, configuration of ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.