Sciweavers

900 search results - page 14 / 180
» Controlling Inbound Traffic
Sort
View
WETICE
2007
IEEE
14 years 2 months ago
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics
Skype is a popular peer-to-peer (P2P) voice over IP (VoIP) application evolving quickly since its launch in 2003. However, the ability to traverse network address translation (NAT...
Chun-Ming Leung, Yuen-Yan Chan
CIC
2006
104views Communications» more  CIC 2006»
13 years 9 months ago
Closed-Loop Congestion Control Protocol Design for Elastic Traffic
In the present paper, we outline few characteristics that every viable congestion control protocol for elastic traffic should satisfy. We provide and outline ways by which these c...
Omar Ait-Hellal
CCR
2002
105views more  CCR 2002»
13 years 7 months ago
Adaptive packet sampling for flow volume measurement
Traffic measurement and monitoring are an important component of network management and traffic engineering. With high-speed Internet backbone links, efficient and effective packe...
Baek-Young Choi, Jaesung Park, Zhi-Li Zhang
JNW
2007
88views more  JNW 2007»
13 years 7 months ago
Integrated Proactive Admission Control Technique For both UDP And TCP Traffic Flows
—Real time traffic adopting UDP at the transport layer needs some quality of service. It is offered through an admission control scheme. This paper adopts one such scheme which i...
Lakshmanan Senthilkumar, Venkadachalam Sankaranara...
SECON
2010
IEEE
13 years 5 months ago
Deconstructing Interference Relations in WiFi Networks
Abstract--Wireless interference is the major cause of degradation of capacity in 802.11 wireless networks. We present an approach to estimate the interference between nodes and lin...
Anand Kashyap, Utpal Paul, Samir R. Das