IP networks
536 Followers
Recent papers in IP networks
The novelty of the peer-to-peer (P2P) paradigm relies on two main concepts: cooperation among users and resource sharing. There are many applications based on peer-to-peer paradigm, but the most popular one is the file sharing. We can... more
The concept of energy-efficient networking has begun to spread in the past few years, gaining increasing popularity. Besides the widespread sensitivity to ecological issues, such interest also stems from economic needs, since both energy... more
Recent measurements show that BGP peering links can fail as frequently as intradomain links and usually for short periods of time. We propose a new fast-reroute technique where routers are prepared to react quickly to interdomain link... more
This paper applies to cross traffic estimation, a new methodology for analyzing and interpreting measurement collected over Internet. This new approach is based on inferring cross traffic characteristics that lead to the observed losses... more
Human error in configuring routers undermines attempts to provide reliable, predictable end-to-end performance on IP networks. Manual configuration, while expensive and errorprone, is the dominant mode of operation, especially for large... more
We present a model of energy consumption in IP networks. Using this model, we identify energy ldquohotspotsrdquo and estimate how energy consumption will grow with increasing network capacity. Todaypsilas Internet uses less than 1% of the... more
After a year of testing and demonstrating a Cisco mobile access router intended for terrestrial use onboard the low-Earth-orbiting UK-DMC satellite as part of a larger merged ground/space IP-based internetwork, we reflect on and discuss... more
This paper presents a real-time auditory and visual tracking of multiple objects for humanoid under real-world environments. Real-time processing is crucial for sensorimotor tasks in tracking, and multiple-object tracking is crucial for... more
Brute force and dictionary attacks on password-only remote login services are now widespread and ever increasing. Enabling convenient login for legitimate users while preventing such attacks is a difficult problem. Automated Turing Tests... more
The growing demand for link bandwidth and node capacity is a frequent phenomenon in IP network backbones. Within this context, traffic prediction is essential for the network operator. Traffic prediction can be undertaken based on link... more
Recently, the network management of sensor nodes has gained interest as more sensors are being networked with Internet technologies as opposed to traditional instrumentation and measurement networks. Sensor networking standardization... more
A virtual control environment for robot teleoperation via the Internet is presented. It comprises a Java3D-based real-time virtual representation of the robot and worksite, and uses a graphic panel, an environment for remote robot... more
This paper reflects different understandings and positions on IP/MPLS OAM functions and management applications, as perceived by representatives from industry and academia. There is a clear effort to improve the state-of-the-art and to... more
Knowledge of the up-to-date network topology (i.e. Layer 2 & Layer 3) is crucial for efficient network management. Issues like congestion avoidance, resource management, resource discovery, root-cause analysis and event correlation... more
Network planning for realtime services in traditional systems is normally performed based on a fixed traffic demand. Realtime services such as voice and video are currently being widely deployed over packet-based IP networks. Due to the... more
In this paper, in a laboratory environment, the performance of four network traffic generators (Iperf, Netperf, D-ITG and IP Traffic) are compared. Two computers with Windows operating systems were connected via a 100 Mbps link and for... more
This article examines how knowledge management (KM) affects innovation performance within biotechnology firms. This is an industry in which small-and medium-sized biotech enterprises live together with the biotech divisions of large... more
QoS (Quality of Service) označava sposobnost mreže da poboljša kvalitet mrežnog saobraćaja. QoS je tema koja zauzima veoma važnu ulogu kada su u pitanju tehnologije paketski baziranih mreža. U ovom radu je dat osvrt na neke od osnovnih... more
With the growing competition in the global marketplace, the call center has become an essential part for many companies. The outbound technology of call center plays a very important role in Customer Relationship Management (CRM) and... more
Open Shortest Path First (OSPF), a link state routing protocol, is a popular interior gateway protocol (IGP) in the Internet. Wide spread deployment and years of experience running the protocol have motivated continuous improvements in... more
El presente artículo muestra la definición y la contextualización de los tipos de tráfico elástico y no elástico en las redes de comunicaciones IP. Para hacer la explicación del concepto, se modelan simulaciones que muestres como es el... more
Transport layer protocols provide for end-to-end communication between two or more hosts. This paper presents a tutorial on transport layer concepts and terminology, and a survey of transport layer services and protocols. The transport... more
The research community has begun looking for IP traffic classification techniques that do not rely on 'well known' TCP or UDP port numbers, or interpreting the contents of packet payloads. New work is emerging on the use of statistical... more
Information technology is immensely causing a positive impact in the field of communications such as telecommunication, data transfer, radio transmission and television transmission. This drastic change is happening globally and has... more
is an International Standard for connectivity and interface of digital photography devices. In this paper we describe how PTP can be extended to work over generic TCP/IP networks. As digital cameras and printers becomes wireless, PTP/IP... more
E d i t o r : B a r r y L e i b a • l e i b a @ c o m p u t e r.o r g Applications Engineer (Ref#: SJ50)
Video security is becoming more and more vital today due to rapid development of hardware equipments as the number of installed cameras can confirm. This paper presents the system architecture of IVSS, an Intelligent Video Surveillance... more
Corruption in construction is a fiduciary crime that is believed to slowly penetrate the construction sectors in countries around the world. It that can reduce the efficiency, effectiveness and equity of infrastructure services that... more
Services for video content distribution over the Internet, live and on-demand, are increasing in popularity with the dissemination of broadband access networks. This work identifies two orthogonal approaches to the great challenge of... more
A recurring topic in LTE radio planning pertains to the maximum acceptable LTE radio interface load, up to which a targeted user data rate can be maintained. We explore this topic by using Queuing Theory elements to express the downlink... more
These days a massive deployment of VoIP is taking place over IP networks. VoIP deployment is a challenging task for network researchers and engineers. This paper presents a detailed simulation approach for deploying VoIP successfully. The... more
The KUKA Control Toolbox (KCT) is a collection of MATLAB functions developed at the University of Siena, for motion control of KUKA robot manipulators. The toolbox, which is compatible with all 6 DOF small and low-payload KUKA robots that... more
This article describes the main features of Multiprotocol Label Switching (MPLS), a standard architecture proposed by the IETF that integrates label swapping forwarding with network layer routing. The role of MPLS in overcoming... more
Voice over IP (VoIP) services will play an important role in future IP networks, promising cost savings and new revenue sources to operators and service providers. To provide quality of service guarantees, certain mechanisms need to be... more
The study of network topology has attracted a great deal of attention in the last decade, but has been hampered by a lack of accurate data. Existing methods for measuring topology have flaws, and arguments about the importance of these... more
Nowadays, Direct Memory Access (DMA) is one of the most used mechanisms for data transfer between a processor and its peripherals. Another possibility is to map peripherals directly in the memory space, which has the disadvantage of... more
In this paper, we propose a Progressive Differential Thresholding (PDT) framework for coordinated network anomaly detection. Under the proposed framework, nodes present on a packet's path progressively encode their opinion (malicious or... more
This article introduces an approach to anomaly intrusion detection based on a combination of supervised and unsupervised machine learning algorithms. The main objective of this work is an effective modeling of the TCP/IP network traffic... more
Currently multimedia is either downloaded before viewing, or streamed over a network. However, streaming real-time or near real-time applications with a specified Quality of Service (QoS) over best-effort IP networks is not yet a solved... more
Over the last years the IP Multimedia Subsystem (IMS) has continuously gained in importance as the next generation communication network. The Session Initiation Protocol (SIP) was chosen the signaling protocol for session establishment... more
The TCP/IP network in South Korea started in May 1982, one of the earliest Internet deployments in the world. The initial TCP/IP network, called SDN, consisted of two nodes with 1200 bps bandwidth. SDN served the research and education... more