Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Packet traffic.

Статті в журналах з теми "Packet traffic"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Packet traffic".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Chen, Xu-Yang, Lu Han, De-Chuan Zhan, and Han-Jia Ye. "MIETT: Multi-Instance Encrypted Traffic Transformer for Encrypted Traffic Classification." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 15 (2025): 15922–29. https://doi.org/10.1609/aaai.v39i15.33748.

Повний текст джерела
Анотація:
Network traffic includes data transmitted across a network, such as web browsing and file transfers, and is organized into packets (small units of data) and flows (sequences of packets exchanged between two endpoints). Classifying encrypted traffic is essential for detecting security threats and optimizing network management. Recent advancements have highlighted the superiority of foundation models in this task, particularly for their ability to leverage large amounts of unlabeled data and demonstrate strong generalization to unseen data. However, existing methods that focus on token-level rel
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Dr., Paravathi C., D. Roshini, and S. Nayak Shwetha. "Packet Sniffing." International Journal of Engineering and Management Research 14, no. 1 (2024): 71–76. https://doi.org/10.5281/zenodo.10686707.

Повний текст джерела
Анотація:
Packet sniffing is a technique used to monitor network traffic by intercepting each packet that flows across the network. It can be used as a helpful administrative tool or for malicious purposes. With the advancement of technology, the network is growing rapidly, resulting in an increase in network traffic. Therefore, it is crucial to monitor both the network traffic and the activities of its users in order to maintain a smooth and efficient network. However, monitoring a large network can be a complex task due to the large number of packets involved. This is where packet sniffing comes in ha
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Shafiq, Muhammad, and Xiangzhan Yu. "Effective Packet Number for 5G IM WeChat Application at Early Stage Traffic Classification." Mobile Information Systems 2017 (2017): 1–22. http://dx.doi.org/10.1155/2017/3146868.

Повний текст джерела
Анотація:
Accurate network traffic classification at early stage is very important for 5G network applications. During the last few years, researchers endeavored hard to propose effective machine learning model for classification of Internet traffic applications at early stage with few packets. Nevertheless, this essential problem still needs to be studied profoundly to find out effective packet number as well as effective machine learning (ML) model. In this paper, we tried to solve the above-mentioned problem. For this purpose, five Internet traffic datasets are utilized. Initially, we extract packet
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Nisar, Kashif. "Fourth Stage of Voice Priority Queue for VoIP over WLANs." International Journal of Interdisciplinary Telecommunications and Networking 4, no. 2 (2012): 48–63. http://dx.doi.org/10.4018/jitn.2012040104.

Повний текст джерела
Анотація:
Voice over Internet Protocol (VoIP) is growing rapidly during this decade. VoIP is seen as a short-term and long-term transmission for voice and audio traffic and is moving on Wireless Local Area Networks (WLANs) based on IEEE 802.11 standards. Currently, packet scheduling algorithms like Weighted Fair Queuing (WFQ), was mainly designed to provide the bandwidth reservation. The Strict Priority (SP) is low-cost to maintain the delay sensitive voice traffic. Also, a number of research scheduling solutions have been proposed like General processor sharing (GPS), Deficit Round Robin (DRR), Content
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Hadap, Prof Manish, Chanchal Halwe, Sakshi Wase, et al. "Network Packet Sniffing and Monitoring." International Journal of Advances in Engineering and Management 6, no. 10 (2024): 260–66. https://doi.org/10.35629/5252-0610260266.

Повний текст джерела
Анотація:
The daily increase in the number of users on the network is causing a surge in network traffic, highlighting the importance of monitoring both user activity and network traffic to ensure smooth network operations. Monitoring network activity is challenging due to the large volume of packets on the network. Packet sniffing is a technique used to observe various network activities and identify vulnerabilities, enabling network administrators to bolster network security. This process involves inspecting data transmitted by other users on the network and is applicable to both switched and non-swit
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Ogbimi, Voke, and Emuejevoke Francis. "An Improved Error Control Model in Packet Switched Wide Area Networks." Transactions on Networks and Communications 7, no. 4 (2019): 01–18. http://dx.doi.org/10.14738/tnc.74.7263.

Повний текст джерела
Анотація:
Error is an important problem in communication that occurs in shared networks when a packet fails to arrive at the destination or it arrives at the destination but some of the bits are in error or have been altered. In typical packet switched wide area networks, this can occur quite easily when output links are slower than inputs and multiple traffic sources competing for same output link at the same time. Typical for packet switched WAN, the packet transmit input/output buffer and queue of the network devices in their way towards the destination. Moreover, these networks are characterized by
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Pustovoitov, Pavlo, Vitalii Voronets, Oleksandr Voronets, Halyna Sokol, and Maksym Okhrymenko. "Assessment of QOS indicators of a network with UDP and TCP traffic under a node peak load mode." Eastern-European Journal of Enterprise Technologies 1, no. 4 (127) (2024): 23–31. http://dx.doi.org/10.15587/1729-4061.2024.299124.

Повний текст джерела
Анотація:
The object of research is Markov models of network nodes with UDP (User Datagram Protocol) and TCP (Transmission Control Protocol) traffic and their differences. The task solved is the lack of Markov models of network nodes describing the behavior of TCP traffic from the point of view of packet retransmissions and packet delivery guarantees. Markov models of network nodes describing traffic behavior with guaranteed packet delivery have been further advanced. Given the comparison of the models, the differences from the classic models serving TCP traffic were shown, for each packet flow, an addi
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Berqia, Amine, Mohamed Hanini, and Abdelkrim Haqiq. "Combined Queue Management and Scheduling Mechanism to Improve Intra-User Multi-Flow QoS in a Beyond 3,5G Network." International Journal of Mobile Computing and Multimedia Communications 4, no. 1 (2012): 57–68. http://dx.doi.org/10.4018/jmcmc.2012010105.

Повний текст джерела
Анотація:
Packet scheduling and buffer management are the two important functions adopted in networks design to ensure the Quality of Service (QoS) when different types of packets with different needs of quality share the same network resources. The Packet scheduling policy determines packet service priorities at the output link, it can reduce packet delay and delay jitter for high-priority traffic. The buffer management involves packet dropping and buffer allocation. The overall goal of such schemes proposed in High Speed Downlink Packet Access (HSDPA) is to take advantage of the channel variations bet
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Ermakov, R. N. "CLASSIFICATION OF NETWORK PROTOCOLS WITH APPLICATION OF MACHINE LEARNING METHODS AND FUZZY LOGIC ALGORITHMS IN TRAFFIC ANALYSIS SYSTEMS." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 189 (March 2020): 37–48. http://dx.doi.org/10.14489/vkit.2020.03.pp.037-048.

Повний текст джерела
Анотація:
This paper presents a new effective approach to analyzing network traffic in order to determine the protocol of information exchange. A brief description of the structure of the algorithm for classifying network packets by belonging to one of the known network protocols is given. To define the protocol, the principle of high-speed one-packet classification is used, which consists in analyzing the information transmitted in each particular packet. Elements of behavioral analysis are used, namely, the transition states of information exchange protocols are classified, which allows to achieve a h
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Lozhkovskyi, A. G., V. A. Turchyn, and V. S. Andriiaka. "INFLUENCE OF CALCULATION ACCURACY OF TRAFFIC SELF-SIMILARITY EXPONENT ON A QUALITY OF SERVICE CHARACTERISTICS." Proceedings of the O.S. Popov ОNAT 1, no. 1 (2020): 88–94. http://dx.doi.org/10.33243/2518-7139-2020-1-1-88-94.

Повний текст джерела
Анотація:
The quality of service (QoS) characteristics in any telecommunication system depend on its scheme, requirements servicing rules and, to the greatest extent, on the type of traffic generated by the system requirements flow. In packet communication networks, a mathematical model of self-similar traffic is used, where the time interval between packets is described by Pareto or Weibull distributions. With an increase in the degree of self-similarity of packet traffic, the QoS characteristics in the system significantly deteriorate compared to servicing, for example, Poisson traffic. But for such t
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Sumeet, Bissa, Dadhich Harish, Kumar Sudhir, and Kansara Himanshu. "Comparative Study of AQT, FIS, RFC and TCAM Algorithms." Advancement of Computer Technology and its Applications 2, no. 3 (2019): 1–5. https://doi.org/10.5281/zenodo.3490553.

Повний текст джерела
Анотація:
<em>Source to destination the process of sending packets flows through router according to pre-defined rules and are processed by the router using some methodology. We differentiate Packet flows on the Basis of Algorithm such a service and the capability to differentiate the traffic in different flows for suitable processing. There are a various algorithms available for packetflows classification. These algorithms are classified on the basis of Data Structure. The different parameters of router services are packet filtering, policy routing, traffic rate limiting, traffic shaping are considered
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Meleshko, Yelyzaveta, Hanna Drieieva, Oleksandr Drieiev, Mykola Yakymenko, Volodymyr Mikhav, and Serhii Shymko. "A Method of Routing of Fractal-like Traffic with Prediction of Router Load for Reduce the Probability of Network Packet Loss." Computational Linguistics and Intelligent Systems, COLINS 2023 (ISSN 16130073) III (May 25, 2023): 434–48. https://doi.org/10.5281/zenodo.8231189.

Повний текст джерела
Анотація:
In this paper, a method for routing fractal-like traffic in computer networks was proposed. This method uses the prediction of router load by analyzing the fractal dimension of network traffic to reduce the probability of packet loss. It takes into account the predicted router load as one of the metrics for determining the shortest packet transmission routes in a computer network. Additionally, a computer simulation model of a computer network based on complex network theory, Markov processes, and fractal time series was created. This computer simulation model allows the generation of a comput
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Jiang, Chao, Jinlin Wang, and Yang Li. "An Efficient Indexing Scheme for Network Traffic Collection and Retrieval System." Electronics 10, no. 2 (2021): 191. http://dx.doi.org/10.3390/electronics10020191.

Повний текст джерела
Анотація:
Historical network traffic retrieval, both at the packet and flow level, has been applied in many fields of network security, such as network traffic analysis and network forensics. To retrieve specific packets from a vast number of packet traces, it is an effective solution to build indexes for the query attributes. However, it brings challenges of storage consumption and construction time overhead for packet indexing. To address these challenges, we propose an efficient indexing scheme called IndexWM based on the wavelet matrix data structure for packet indexing. Moreover, we design a packet
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Mutalemwa, Lilian C., and Seokjoo Shin. "Secure Routing Protocols for Source Node Privacy Protection in Multi-Hop Communication Wireless Networks." Energies 13, no. 2 (2020): 292. http://dx.doi.org/10.3390/en13020292.

Повний текст джерела
Анотація:
Traffic analysis attacks are common in monitoring wireless sensor networks (WSNs). In the attacks, adversaries analyze the traffic pattern to obtain critical information such as the location information of a source node. Fake source packet routing protocols are often used to ensure source location privacy (SLP) protection. The protocols rely on broadcasting fake packets from fake sources concurrently with the transmission of real packets from the real source nodes to obfuscate the adversaries. However, fake source packet routing protocols have demonstrated some performance limitations includin
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Nisar, Kashif, and Suhaidi Hassan. "Mobility of Mobile Station in Voice Priority Queue Scheduler for VoIPWLANs." Journal of Communications and Computer Engineering 2, no. 3 (2011): 28. http://dx.doi.org/10.20454/jcce.2012.249.

Повний текст джерела
Анотація:
Voice over Internet Protocol (VoIP) is growing rapidly during this decade. VoIP is seen as a short-term and long-trem transmission for voice and audio traffic. Meanwhile, VoIP is moving on Wireless Local Area Networks (WLANs) based on IEEE 802.11 standards. Currently, many packet scheduling algorithms like Weighted Fair Queuing (WFQ), was mainly designed to provide the bandwidth reservation. The Strict Priority (SP) is low-cost to maintain the delay sensitive voice traffic. Also, a number of research scheduling solutions have been proposed like General processor sharing (GPS), Deficit Round Ro
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Yang, Jianhua, and Lixin Wang. "Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection." Sensors 21, no. 22 (2021): 7464. http://dx.doi.org/10.3390/s21227464.

Повний текст джерела
Анотація:
A long interactive TCP connection chain has been widely used by attackers to launch their attacks and thus avoid detection. The longer a connection chain, the higher the probability the chain is exploited by attackers. Round-trip Time (RTT) can represent the length of a connection chain. In order to obtain the RTTs from the sniffed Send and Echo packets in a connection chain, matching the Sends and Echoes is required. In this paper, we first model a network traffic as the collection of RTTs and present the rationale of using the RTTs of a connection chain to represent the length of the chain.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

OIDA, K., and K. SHINJO. "CHARACTERISTICS OF DETERMINISTIC OPTIMAL ROUTING FOR TWO HETEROGENEOUS PARALLEL SERVERS." International Journal of Foundations of Computer Science 12, no. 06 (2001): 775–90. http://dx.doi.org/10.1142/s0129054101000862.

Повний текст джерела
Анотація:
This paper presents characteristics of optimal routing that assigns each arriving packet to one of two heterogeneous parallel servers, each with its own queue. The characteristics are derived from numerical solutions to an optimization problem, which is to find optimal routing that minimizes the average packet delay under the condition that all of the packets' arrival times as well as all of the packets' sizes are completely known in advance. There are four characteristics: (1) Under light or moderate traffic, the average packet delay of optimal routing is almost the same as that of join the s
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Cao, Ping, and Jian Zhang. "Topology-Based Traffic Identification Method with Heuristic Rules." Advanced Materials Research 588-589 (November 2012): 1427–30. http://dx.doi.org/10.4028/www.scientific.net/amr.588-589.1427.

Повний текст джерела
Анотація:
Traffic identification using statistic features of traffic flows has attracted a great deal of interest. One challenging issue for these methods is that they ignore the short flows containing just 2-3 packets, for statistic features of short flows are mainly insignificant or meaningless. A topology-based method combining heuristic rules and deep-in packet inspection is proposed to identify the application types of traffic flows. The experiment results demonstrate that the method can get higher precisions and similar recalls compared to deep-in packet inspection method.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Lozhkovskyi, A. G., and K. D. Guliaiev. "CALCULATING METHOD OF THE PACKET NETWORK ACCESS TRAFFIC CAPACITY FOR IoT DEVICES." Proceedings of the O.S. Popov ОNAT 1, no. 2 (2020): 31–40. http://dx.doi.org/10.33243/2518-7139-2020-1-2-31-40.

Повний текст джерела
Анотація:
When creating packet networks of a new generation, the problem of calculating the throughput of broadband multiservice access networks arises. In practice, for this they use mathematical modeling, or without proper justification, the traditional formulas of the theory of information distribution. The well-known analytical solution for ATM technology is extremely cumbersome and practically not used. Today, there is not generally accepted analytical or engineering method for solving the problem. At the same time, telecommunication networks must develop to provide all the necessary conditions for
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Frantti, Tapio. "Cascaded Fuzzy Congestion Controller for TCP/IP Traffic." Journal of Advanced Computational Intelligence and Intelligent Informatics 9, no. 2 (2005): 92–99. http://dx.doi.org/10.20965/jaciii.2005.p0092.

Повний текст джерела
Анотація:
This paper presents a fuzzy congestion control solution for active queue management in wireline packet switched networks, that use TCP to solve end-to-end flow control. Queue management is a trade-off between link utilisation, delay and the loss of packets. The targets of it are to reduce the average queue length in routers, decrease the end-to-end delay and reduce the packet loss probability by preventing buffer overflows. In the presented solution, a fuzzy controller regulates the rejection probability of received packets in routers to prevent buffer overflow and the rejection of all packets
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Dr., Anamol Chand Jain. "Protocols and Techniques for End to End Congestion Avoidance on a Global Internet." Applied Science & Engineering Journal for Advanced Research 3, no. 1 (2024): 32–38. https://doi.org/10.5281/zenodo.10717806.

Повний текст джерела
Анотація:
The packet transmission congestion control at the network node is presented in this research study. It is increasing quickly due to the increased use of applications. It makes clogged flows unpredictable and erratic. There aren't many outdated scheduling strategies for handling network node congestion, but the ones that do exist were only for end-to-end networks, thus they couldn't prevent unfairness brought on by applications and congestion collapse. The switch-based packet transmission technique and the present packet transmission algorithm are similar. An increase in packets between nodes r
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Tsmots, I. G., and S. V. Tesliuk. "MODELS AND TOOLS OF THE AUTOMATED SYSTEM FOR COMPUTER NETWORK TRAFFIC INVESTIGATION USING BERKELEY PACKET FILTER." Ukrainian Journal of Information Technology 4, no. 2 (2022): 61–67. http://dx.doi.org/10.23939/ujit2022.02.061.

Повний текст джерела
Анотація:
An approach for automating the monitoring and analysis of incoming network traffic in large-scale computer networks is proposed in the paper. The authors suggest using the Linux Berkeley Packet Filter tool to automate traffic analysis in computer networks. The software structure is developed, which includes two main parts: the service machine and the user machine, it is based on the modular principle, which allows for rapid improvement and modernization of the system. The main algorithms for software functionality are built, namely: the algorithm for processing network packets using the Berkel
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Mun, Hyunsu, and Youngseok Lee. "Internet Traffic Classification with Federated Learning." Electronics 10, no. 1 (2020): 27. http://dx.doi.org/10.3390/electronics10010027.

Повний текст джерела
Анотація:
As Internet traffic classification is a typical problem for ISPs or mobile carriers, there have been a lot of studies based on statistical packet header information, deep packet inspection, or machine learning. Due to recent advances in end-to-end encryption and dynamic port policies, machine or deep learning has been an essential key to improve the accuracy of packet classification. In addition, ISPs or mobile carriers should carefully deal with the privacy issue while collecting user packets for accounting or security. The recent development of distributed machine learning, called federated
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Ismail, Nanang, Eki Ahmad Zaki, and Muhamad Arghifary. "Interoperability and Reliability of Multiplatform MPLS VPN: Comparison of Traffic Engineering with RSVP-TE Protocol and LDP Protocol." CommIT (Communication and Information Technology) Journal 11, no. 2 (2017): 57. http://dx.doi.org/10.21512/commit.v11i2.2105.

Повний текст джерела
Анотація:
One of the alternatives to overcome network scalability problem and maintaining reliability is using MPLS VPN network. In reallity, the current network is already using a multiplatform of several different hardware vendors, i.e., Cisco and Juniper platforms. This paper discusses the comparison of the simulation results to see interoperability of multiplatform MPLS VPN andreliability through traffic engineering using RSVP-TE and LDP protocols. Both the RSVP and LDP protocols are tested on a stable network and in a recovery mode,as well as non-load conditions and with additional traffic load. Th
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Lozhkovskyi, Anatoliy, and Yevgeniy Levenberg. "Calculation of average time of packet delay in the storage buffer of a single-channel system with self-similar traffic." Computational Problems of Electrical Engineering 7, no. 2 (2017): 87–91. https://doi.org/10.23939/jcpee2017.02.087.

Повний текст джерела
Анотація:
First step for the calculation of service quality characteristics in a single-channel packet communication system is to estimate the Hurst exponent for self-similar traffic, after which, according to the well-known Norros formula, the average number of packets in the system N is calculated. However, such an algorithm does not allow calculating two very important service quality characteristics, such as the average waiting time of packets in the cumulative buffer (not in the system as a whole) and the waiting probability of the service start of the packet. In the paper the new method for approx
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Moon, Daekyeong. "Network Traffic Characteristics and Analysis in Recent Mobile Games." Applied Sciences 14, no. 4 (2024): 1397. http://dx.doi.org/10.3390/app14041397.

Повний текст джерела
Анотація:
The landscape of mobile gaming has evolved significantly over the years, with profound changes in network reliability and traffic patterns. In the early 2010s, mobile games faced challenges due to unreliable networks and primarily featured asynchronous gameplay. However, in the current era, modern mobile games benefit from robust network connectivity, mirroring PC gaming experiences by relying on persistent connections to game servers. This shift prompted us to conduct an in-depth traffic analysis of two mobile games that represent opposite ends of the genre spectrum: a massively multiplayer g
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Faisal, Mohammed, Jia Uddin, and Shimul Shil. "Performance of VoIP Networks Using MPLS Traffic Engineering." Advanced Materials Research 457-458 (January 2012): 927–30. http://dx.doi.org/10.4028/www.scientific.net/amr.457-458.927.

Повний текст джерела
Анотація:
The implementation of Voice over Internet Protocol (VoIP) technology is on the increase because of its ability to enhance operating efficiency and reduce infrastructure cost. Voice and data packets traverse over IP networks with fixed maximum capacity. But susceptibility to traffic congestion which results in delay and packet losses is still a major challenge of VoIP technology. Multiprotocol Label Switching Protocol (MPLS) with Traffic Engineering (TE) is an approved standard technology that has the capabilities to minimize network congestion and improve network performance by reducing delay
Стилі APA, Harvard, Vancouver, ISO та ін.
28

YIN, XIANG-LAN, HUA CHEN, and YANG SHEN. "PBQM: A PRIORITY-BASED QUEUE MANAGEMENT METHOD FOR WIRELESS SENSOR NETWORKS." International Journal of Information Acquisition 04, no. 01 (2007): 39–46. http://dx.doi.org/10.1142/s0219878907001149.

Повний текст джерела
Анотація:
Event detection is important in many sensor network applications. Traffic in these applications exhibits a many-to-one pattern, in which multiple source nodes send sensing data to a single sink node. Since bandwidth and storage capacity is highly constrained in sensor networks, packet loss is inevitable when a great deal of traffic rushes to sink. Based on the observation that the packets are not equal in the serving of event detection, we propose to employ priority-based queue management method (PBQM) to improve packet delivery ratio of more important packets. We put forward three priority ma
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Tervydis, Paulius, and Ramutis Rindzevičius. "INVESTIGATION OF BATCH DATA FLOW TRANSMISSION PARAMETERS." Technological and Economic Development of Economy 12, no. 4 (2006): 327–33. http://dx.doi.org/10.3846/13928619.2006.9637762.

Повний текст джерела
Анотація:
Rapid growth and increasing requirements for service quality, reliability, and efficiency have made traffic evaluation an essential consideration in design and operation of data transmission networks. In this paper we analyse performance measures of data transmission network servicing batch data flows. The article provides analysis of the one channel queuing system transmitting data packet flow general distributed. In this article we introduce queuing system with finite and infinite buffer capacity. In this article we analyse such data packets transmission performance parameters: average time
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Mohammed, Subhi A. "DESIGNING RULES TO IMPLEMENT RECONNAISSANCE AND UNAUTHORIZED ACCESS ATTACKS FOR INTRUSION DETECTION SYSTEM." Iraqi Journal of Information & Communications Technology 2, no. 2 (2019): 25–43. http://dx.doi.org/10.31987/ijict.2.2.67.

Повний текст джерела
Анотація:
Abstract- Network attacks are classified according to their objective into three types: Denial of Services (DOS), reconnaissance and unauthorized access. A base signature Intrusion Detection System (IDS) which gives an alarm when the monitor network traffic meets a previously specified set of criteria of attack traffic. This paper will focus on design, compose, and process IDS rules, and then to decide whether that packet is intrusive or not, by examining the signatures of the attacks in both incoming packets headers and payload to networks. Packet sniffer is performs capturing, decoding and r
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Su Khin, Chit, Aye Thandar Kyaw, Myo Myint Maw, and May Zin Oo. "Reducing Packet-In Messages in OpenFlow Networks." ECTI Transactions on Electrical Engineering, Electronics, and Communications 20, no. 1 (2022): 1–9. http://dx.doi.org/10.37936/ecti-eec.2022201.244944.

Повний текст джерела
Анотація:
In OpenFlow networks, several packet-in traffic messages are sent to the controller to request routes from any switch on the network. Executing these packet-in messages and replying to control messages may interfere with the controller performance. Therefore, a mechanism for lightening the load on the controller by reducing packet-in traffic between the controller and the switch is proposed in this research. The proposed system operates by responding to the two flow entries for each request and removing packet-in messages from some unused multicast traffic. The proposed system can thus not onl
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Khan, Fazeel Ahmed, and Adamu Abubakar Ibrahim. "Machine Learning-based Enhanced Deep Packet Inspection for IP Packet Priority Classification with Differentiated Services Code Point for Advance Network Management." Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 16, no. 2 (2024): 5–12. http://dx.doi.org/10.54554/jtec.2024.16.02.002.

Повний текст джерела
Анотація:
In modern networking, the efficient prioritization and classification of network traffic is paramount to ensure optimal network performance and optimization. This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). The DSCP resides inside the Differentiated Services (DS) field of the Internet Protocol (IP) packet header in an OSI or TCP/IP model, which prioritizes different types of packets for forwarding to the router b
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Domańska, J., D. R. Augustyn, and A. Domański. "The choice of optimal 3-rd order polynomial packet dropping function for NLRED in the presence of self-similar traffic." Bulletin of the Polish Academy of Sciences: Technical Sciences 60, no. 4 (2012): 779–86. http://dx.doi.org/10.2478/v10175-012-0090-x.

Повний текст джерела
Анотація:
Abstract Algorithms of queue management in IP routers determine which packet should be deleted when necessary. The article investigates the influence of the self-similarity on the optimal packet rejection probability function in a special case of NLRED queues. This paper describes another approach to the non-linear packet dropping function. We propose to use the solutions based on the polynomials with degree equals to 3. The process of obtaining the optimal dropping packets function has been presented. Our researches were carried out using the Discrete Event Simulator OMNET++. The AQM model wa
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Espinal, Albert, and V. Sanchez Padilla. "Queuing Delay Reduction based on Network Traffic Patterns: A Predictive QoS Framework For Point-To-Point Communications." Transport and Telecommunication Journal 26, no. 3 (2025): 237–49. https://doi.org/10.2478/ttj-2025-0018.

Повний текст джерела
Анотація:
Abstract Ensuring optimal quality of service (QoS) in computer networks requires a detailed assessment of performance metrics, with data network queuing delay within intermediate devices being critical parameters. This paper presents a predictive Quality of Service (QoS) model designed to reduce queuing delays by analyzing traffic patterns in intermediate devices in point-to-point network connections. The proposed novel Length Packet Queuing (LPQ) model leverages packet length analysis to predict and manage queuing delays without relying on traditional packet marking mechanisms. Through Poisso
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Hwang, Ren-Hung, Min-Chun Peng, Van-Linh Nguyen, and Yu-Lun Chang. "An LSTM-Based Deep Learning Approach for Classifying Malicious Traffic at the Packet Level." Applied Sciences 9, no. 16 (2019): 3414. http://dx.doi.org/10.3390/app9163414.

Повний текст джерела
Анотація:
Recently, deep learning has been successfully applied to network security assessments and intrusion detection systems (IDSs) with various breakthroughs such as using Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) to classify malicious traffic. However, these state-of-the-art systems also face tremendous challenges to satisfy real-time analysis requirements due to the major delay of the flow-based data preprocessing, i.e., requiring time for accumulating the packets into particular flows and then extracting features. If detecting malicious traffic can be done at the packe
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Khan, Anwar, Sayeed Ghani, and Shama Siddiqui. "A Preemptive Priority-Based Data Fragmentation Scheme for Heterogeneous Traffic in Wireless Sensor Networks." Sensors 18, no. 12 (2018): 4473. http://dx.doi.org/10.3390/s18124473.

Повний текст джерела
Анотація:
Prioritizing the heterogeneous traffic for Wireless Sensor Networks (WSNs) imposes an important performance challenge for Internet of Things (IoT) applications. Most past preemptive MAC schemes are based on scheduling the high priority packets earlier than those of lower priority. However, in a majority of these schemes, high priority traffic must wait for the ongoing transmission of lower priority traffic due to the non-availability of an interruption mechanism. This paper presents the design and high-level implementation details of a fragmentation scheme (FROG-MAC) for heterogeneous traffic
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Ko, Jongbin, Jungtaek Seo, Eui-Jik Kim, and Taeshik Shon. "Monitoring Agent for Detecting Malicious Packet Drops for Wireless Sensor Networks in the Microgrid and Grid-Enabled Vehicles." International Journal of Advanced Robotic Systems 9, no. 1 (2012): 31. http://dx.doi.org/10.5772/50256.

Повний текст джерела
Анотація:
Of the range of wireless communication technologies, wireless sensor networks (WSN) will be one of the most appropriate technologies for the Microgrid and Grid-enabled Vehicles in the Smartgrid. To ensure the security of WSN, the detection of attacks is more efficient than their prevention because of the lack of computing power. Malicious packet drops are the easiest means of attacking WSNs. Thus, the sensors used for constructing a WSN require a packet drop monitoring agent, such as Watchdog. However, Watchdog has a partial drop problem such that an attacker can manipulate the packet dropping
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Ezema, Chukwuedozie N., Chinazam Ezemab C. Ezemab, and Chukwuebuka B. Umezinwac. "TRAFFIC DESIGN MODEL FOR OPTIMUM PERFORMANCE ENHANCEMENTS OF IEEE 802.11B QOS PARAMETERS." European Journal of Technology 1, no. 2 (2017): 91. http://dx.doi.org/10.47672/ejt.228.

Повний текст джерела
Анотація:
Purpose: The objective of this research is to design a traffic model for optimum performance analysis and enhancements of IEEE 802.11b QOS parameters. It investigated the effect of traffic distribution on the quality of service parameter on WLAN, in other to establish enhanced WLAN Performance. In order to evaluate the mean packet delay and network throughput performance, this research has presented a traffic loading for MAC DCF which supports WLAN’s QOS Parameters.Methodology: Based on this model, a computer simulation model over a MATLAB Simulink was developed.Results: In this research, resu
Стилі APA, Harvard, Vancouver, ISO та ін.
39

PL, Subramanian. "Network Sniffing Tool." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem48681.

Повний текст джерела
Анотація:
Abstract -In today's interconnected digital landscape, network security and traffic monitoring are critical for ensuring the integrity, confidentiality, and availability of data. A Network Sniffing Tool is a utility designed to capture, analyze, and log packets transmitted over a network. This project presents the design and implementation of a lightweight and efficient network sniffing tool capable of real-time packet inspection, protocol analysis, and traffic visualization. Developed using Python and libraries such as Scapy and Wireshark’s TShark backend, the tool provides insights into netw
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Lamzabi, S., S. Lazfi, H. Ez-Zahraouy, A. Benyoussef, A. Rachadi, and S. Ziti. "Pair-dependent rejection rate and its impact on traffic flow in a scale-free network." International Journal of Modern Physics C 25, no. 07 (2014): 1450019. http://dx.doi.org/10.1142/s0129183114500193.

Повний текст джерела
Анотація:
In this paper, we propose a pair-dependent rejection rate of packet information between routers in the framework of the minimal traffic model applied to scale-free networks. We have shown that the behavior of the transition point from the phase where the system balances the inflow of new information packets with successful delivery of the old ones to the congested phase depends on the underlying mechanism of packet rejection. It is possible to achieve larger values for the critical load by varying the rejection of the packets issued from a given node by its neighbors. We have proposed an asymm
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Thipparthi Upendra Chari and B Srinivasa S P Kumar. "RBP: a website fingerprinting obfuscation method against intelligent fingerprintingattacks." international journal of engineering technology and management sciences 6, no. 6 (2022): 398–403. http://dx.doi.org/10.46647/ijetms.2022.v06i06.071.

Повний текст джерела
Анотація:
A significant danger to website privacy and web security is posed by website fingerprinting (WF), a passive traffic analysis attack. It gathers the network packets created when a user accesses a website and then employs a number of approaches to identify patterns in the network packets that can be used to determine the kind of website the user is accessing. Numerous anonymous networks, like Tor, can satisfy the need to conceal identify from users while participating in network activities, but they are also vulnerable to WF assaults. In this research, we present Random Bidirectional Padding, a
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Setthawong, Pisai, and Surat Tanterdtid. "Non-Flooding Bridging Solutions for Resilient Packet Rings." ECTI Transactions on Electrical Engineering, Electronics, and Communications 6, no. 1 (2007): 38–46. http://dx.doi.org/10.37936/ecti-eec.200861.171753.

Повний текст джерела
Анотація:
Resilient Packet Ring (RPR) is one of the IP-based technologies that have been proposed to replace SONET/SDH in metropolitan area networks because it is well-adapted to handle diverse tra±c, including multimedia traffic, found in present-day networks. Additionally, the RPR network is used efficiently with nodes transmitting simultaneously as long as the paths of the packets do not overlap. However, when bridging RPR networks, packets are flooded on the bridged RPR network if the packet destination is on a remote network other than the source network. As a result, the network is used inefficien
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Haywood, Gregor Tamati, and Saleem Noel Bhatti. "Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths." Cryptography 8, no. 2 (2024): 22. http://dx.doi.org/10.3390/cryptography8020022.

Повний текст джерела
Анотація:
As more network communication is encrypted to provide data privacy for users, attackers are focusing their attention on traffic analysis methods for side-channel attacks on user privacy. These attacks exploit patterns in particular features of communication flows such as interpacket timings and packet sizes. Unsupervised machine learning approaches, such as Hidden Markov Models (HMMs), can be trained on unlabelled data to estimate these flow attributes from an exposed packet flow, even one that is encrypted, so it is highly feasible for an eavesdropper to perform this attack. Traditional defen
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Nguyen, VanDung, Tran Anh Khoa, Thant Zin Oo, Nguyen H. Tran, Choong Seon Hong, and Eui-Nam Huh. "Time Slot Utilization for Efficient Multi-Channel MAC Protocol in VANETs." Sensors 18, no. 9 (2018): 3028. http://dx.doi.org/10.3390/s18093028.

Повний текст джерела
Анотація:
In vehicular ad hoc networks (VANETs), many schemes for a multi-channel media access control (MAC) protocol have been proposed to adapt to dynamically changing vehicle traffic conditions and deliver both safety and non-safety packets. One such scheme is to employ both time-division multiple access (TDMA) and carrier-sense multiple access (CSMA) schemes (called a hybrid TDMA/CSMA scheme) in the control channel (CCH) interval. The scheme can adjust the length of the TDMA period depending on traffic conditions. In this paper, we propose a modified packet transmitted in the TDMA period to reduce t
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Bikmukhamedo, Radion F., and Adel F. Nadeev. "Generative transformer framework for network traffic generation and classification." T-Comm 14, no. 11 (2020): 64–71. http://dx.doi.org/10.36724/2072-8735-2020-14-11-64-71.

Повний текст джерела
Анотація:
for generating and classification tasks. Only packet size and inter-packet time sequences are used as flow features to unify the inputs for the two tasks. The source feature space is scaled and clustered with K-Means to form discrete sequences as model inputs. The model can be trained in two modes: (i) autoregressively, for network traffic generating, where the first token of training sequence represents a flow class, (ii) as a network flow classifier. The evaluation of generated traffic by means of Kolmogorov-Smirnov statistic demonstrated that its quality is on par with the first-order Marko
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Razouqi, Qutaiba, Ahmed Boushehri, Mohamed Gaballa, Lina Alsaleh, and Maysam Abbod. "Extended Comparison and Performance Analysis for Mobile Ad-Hoc Networks Routing Protocols Based on Different Traffic Load Patterns and Performance Metrics." Electronics 13, no. 14 (2024): 2877. http://dx.doi.org/10.3390/electronics13142877.

Повний текст джерела
Анотація:
A mobile ad-hoc network (MANET) is a network of mobile nodes that dynamically form a transitory network lacking any existence of infrastructure and any form of centralized management. Nodes in ad hoc networks are powered by batteries with a limited lifespan and communicate in a restricted bandwidth. The unpredictable environment of a MANET may run into a major concern in the routing mechanism, therefore the need for a routing protocol with robust performance is still one of the key challenges in MANET deployment. In this work, a comparative comparison and extensive simulation analysis have bee
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Lozhkovskyi, A.G. "CALCULATION THE SERVICE WAITING PROBABILITY WITH SELF-SIMILAR NETWORK TRAFFIC." Journal of Engineering Science XXVI (2) (June 18, 2019): 35–39. https://doi.org/10.5281/zenodo.3249178.

Повний текст джерела
Анотація:
Calculation of the service quality characteristics in a single-channel system with queue for the packet network is often reduced to the determination of the Hurst exponent for self-similar traffic, after which using the known Norros formula calculated average number of packets in the system. However, this method does not allow for the set value of the Hurst exponent calculated yet very important characteristics of quality of service, such as the average delay time of packets in the storage buffer and the service waiting probability of packet. In this work we propose a method for approximating
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Byeon, James K., Nurul I. Sarkar, and Jairo A. Gutiérrez. "The Impact of Traffic Type and Node Mobility on an 802.16 Mobile WiMAX for Varying Network Sizes." International Journal of Advanced Pervasive and Ubiquitous Computing 5, no. 4 (2013): 63–80. http://dx.doi.org/10.4018/ijapuc.2013100105.

Повний текст джерела
Анотація:
While WiMAX handoff characteristics and quality of service (QoS) provisioning have been explored by many network researchers, the effect of traffic type, node mobility and network size on WiMAX has not been fully explored yet. This paper therefore reports on a study of the impact of traffic type and node mobility on the performance of a typical mobile 802.16 WiMAX for varying network sizes. The authors consider small, medium and large network scenarios under four different traffic types (FTP, HTTP, VoIP and Videoconferencing) with node speeds of up to 90 km/hour. The authors developed an exten
Стилі APA, Harvard, Vancouver, ISO та ін.
49

MONDRAGÓN C., RAÚL J. "A MODEL OF PACKET TRAFFIC USING A RANDOM WALL MODEL." International Journal of Bifurcation and Chaos 09, no. 07 (1999): 1381–92. http://dx.doi.org/10.1142/s021812749900095x.

Повний текст джерела
Анотація:
We consider the problem of modeling self-similar bursty packet traffic using chaotic maps. In particular, we introduce a family of maps to overcome the difficulties of describing the self-similar statistics of the packet traffic as a function of the maps' parameters. The packet traffic that can be modeled with these maps varies from Poisson to bursty traffic with different decay tails in the ON and OFF regions. In contrast with Fractional Brownian Models, these maps have a multifractal spectrum so they can generate packet traffic with the same mean, variance and self-similar parameter but diff
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Fauzan, Rifqi, Syariful Ikhwan, and Jafaruddin Gusti Amri Ginting. "ANALYSIS PERFORMANCE IN SOFTWARE DEFINED NETWORK (SDN) USING ARUBA VAN CONTROLLER." Jurnal Informatika: Jurnal Pengembangan IT 5, no. 3 (2020): 64–69. http://dx.doi.org/10.30591/jpit.v5i3.1937.

Повний текст джерела
Анотація:
SDN technology is a new architecture in the network that separates the control plan from the data plan. Aruba VAN Controller provides centralized control in a network architecture that runs on the OpenFlow protocol. This study conducted an SDN network simulation using the Aruba VAN Controller by applying the Narmox Spear application to simplify network configuration. IP addressing with DHCP server, for testing scenarios using UDP protocol packet delivery with packets sent at 1000 Bytes, the number of packets sent is 100 packets/s, then given background traffic variations of 50 Mbps, 100 Mbps,
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!