In the context of a collaborating surveillance system for active TCP sessions handled by a networking device, we consider two problems. The first is the problem of protecting a flow table from overflow and the second is developing an efficient algorithm for estimating the number of active flows coupled with the identification of “heavy-hitter ” TCP sessions. Our proposed techniques are sensitive to limited hardware and software resources allocated for this purpose in the linecards in addition to the very high data rates that modern line cards handle; specifically we are interested in cooperatively maintaining a per-flow state with a low cost, which has resiliency on dynamic traffic mix. We investigate a traditional timeout processing mechan...
Part 6: Monitoring Methods for Quality-of-Service and SecurityInternational audienceNetwork flow mea...
Users typically want their flows to complete as quickly as possible. This makes Flow Completion Time...
This article presents the use of fluid flow approximation to model interactions between a set of TCP...
Abstract—In the context of a collaborating surveillance system for active TCP sessions handled by an...
Abstract—Timely deletion of a large number of stale sessions monitored by Internet routers, particul...
We begin this thesis by generalizing some results related to a recently proposed positive system mod...
While traffic volume of real-time applications is rapidly increasing, current routers do not guarant...
TCP congestion avoidance mechanisms are based on adjustments to the congestion-window size, triggere...
Accurately predicting network behavior is beneficial for TCP congestion control, and can help improv...
While traffic volume of real-time applications is rapidly increasing, current routers do not guaran...
Many attacks that threaten service providers and legitimate users are anomalous behaviors out of spe...
Cluster based packet capturing is a way of overcoming the speed of a slow disk to tap a high-speed n...
The thesis deals with optimization of network flow monitoring. Flow-based network traffic processing...
This paper addresses the problem of optimal Quality of Service (QoS), Traffic Engineering (TE) and F...
In recent research of TCP/IP great effort has been put on enhancing the flow and congestion control ...
Part 6: Monitoring Methods for Quality-of-Service and SecurityInternational audienceNetwork flow mea...
Users typically want their flows to complete as quickly as possible. This makes Flow Completion Time...
This article presents the use of fluid flow approximation to model interactions between a set of TCP...
Abstract—In the context of a collaborating surveillance system for active TCP sessions handled by an...
Abstract—Timely deletion of a large number of stale sessions monitored by Internet routers, particul...
We begin this thesis by generalizing some results related to a recently proposed positive system mod...
While traffic volume of real-time applications is rapidly increasing, current routers do not guarant...
TCP congestion avoidance mechanisms are based on adjustments to the congestion-window size, triggere...
Accurately predicting network behavior is beneficial for TCP congestion control, and can help improv...
While traffic volume of real-time applications is rapidly increasing, current routers do not guaran...
Many attacks that threaten service providers and legitimate users are anomalous behaviors out of spe...
Cluster based packet capturing is a way of overcoming the speed of a slow disk to tap a high-speed n...
The thesis deals with optimization of network flow monitoring. Flow-based network traffic processing...
This paper addresses the problem of optimal Quality of Service (QoS), Traffic Engineering (TE) and F...
In recent research of TCP/IP great effort has been put on enhancing the flow and congestion control ...
Part 6: Monitoring Methods for Quality-of-Service and SecurityInternational audienceNetwork flow mea...
Users typically want their flows to complete as quickly as possible. This makes Flow Completion Time...
This article presents the use of fluid flow approximation to model interactions between a set of TCP...