Results 11 - 20
of
1,287
1 Error-Resilient Packet Header Compression
"... Network traffic statistics show that, because shorter packets predominate in many applications, headers impose a considerable overhead. But the header content is largely repetitive, thus in the past 15 years many packet header compression techniques have been proposed and studied. Header compression ..."
Abstract
- Add to MetaCart
Network traffic statistics show that, because shorter packets predominate in many applications, headers impose a considerable overhead. But the header content is largely repetitive, thus in the past 15 years many packet header compression techniques have been proposed and studied. Header
Analysis Of Packet Header Effects In Rate Allocation For Packet Video
, 2002
"... The packet header is often ignored in bit allocation problem of forward error correction (FEC) based packet video transmission schemes. In this paper, we show that the packet header has significant influence on the system performance. We balance the effect of the packet header and the efficiency of ..."
Abstract
- Add to MetaCart
The packet header is often ignored in bit allocation problem of forward error correction (FEC) based packet video transmission schemes. In this paper, we show that the packet header has significant influence on the system performance. We balance the effect of the packet header and the efficiency
Fast Compression State Lookup of Internet Packet Headers
"... The focus of this paper is on the engineering of a work efficient IPv6 header compressor. We introduce a new adaptive data structure, the move-to-root Patricia tree, with favorable properties for this particular application. Considerable effort has been devoted to an efficient implementation in the ..."
Abstract
- Add to MetaCart
lookup. Our results indicate that we can perform lookup on approximately 100,000 headers per second. Assuming an average packet size of 125 bytes, this translates into a link capacity of 100 Mbits per second. 1. Introduction In today's Internet, a widely used method for increasing the bandwidth
Packet header compression formal notation requirements
"... Abstract: Robust header compression (ROHC) [1] is recently developed to be used in wireless last hop links of global Internet. It is built around an extensible core framework that can be tailored to compress new protocol stacks by adding additional ROHC profiles. The role of formal notation is to pr ..."
Abstract
- Add to MetaCart
Abstract: Robust header compression (ROHC) [1] is recently developed to be used in wireless last hop links of global Internet. It is built around an extensible core framework that can be tailored to compress new protocol stacks by adding additional ROHC profiles. The role of formal notation
v CODING TECHNIQUES FOR RESILIENT PACKET HEADER COMPRESSION
, 2005
"... I express my sincere gratitude and appreciation to my advisor Dr. Aria Nosratinia. Without his unwavering patience and confidence in me, this thesis would not have been possible. For the past two years being a part of his research group has been an exciting challenge and privilege. I also thank Dr. ..."
Abstract
- Add to MetaCart
I express my sincere gratitude and appreciation to my advisor Dr. Aria Nosratinia. Without his unwavering patience and confidence in me, this thesis would not have been possible. For the past two years being a part of his research group has been an exciting challenge and privilege. I also thank Dr. Andrea Fumagalli and Dr. Hlaing Minn to agree on serving my supervisory committee. Doing research at MCL also gave me the opportunity to make many friends. Todd, Ahmad, Mohammad, Ramakrishna, Shahab, Harsh, Name, Ramy, Negar and Ali, thank you all for your help. In particular, I would like to thank Ramakrishna and Harsh for providing me with software for my experiments. It has been an absolute pleasure working with all of you guys. I cannot express in words how deeply I feel about the support and confidence my parents have shown in me over the years. Everything seems insignificant compared to the sacrifices they have made to educate their children. Thank you, thank you very much. Also I express my heartfelt thanks to my girlfriend Mangala for her love, support and understanding. Thank you for enduring my absence. Finally, I would like to thank my friends, cricket buddies and especially my roommates. Living away from home and family is never a joy; thank you guys for the good times.
PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic
, 2001
"... We describe an experimental packet header anomaly detector (PHAD) that learns the normal range of values for 33 fields of the Ethernet, IP, TCP, UDP, and ICMP protocols. On the 1999 DARPA off-line intrusion detection evaluation data set (Lippmann et al. 2000), PHAD detects 72 of 201 instances (29 of ..."
Abstract
-
Cited by 54 (4 self)
- Add to MetaCart
We describe an experimental packet header anomaly detector (PHAD) that learns the normal range of values for 33 fields of the Ethernet, IP, TCP, UDP, and ICMP protocols. On the 1999 DARPA off-line intrusion detection evaluation data set (Lippmann et al. 2000), PHAD detects 72 of 201 instances (29
NetPDL: An Extensible XML-Based Language for Packet Header Description
"... Although several applications need to know the format of network packets to perform their tasks, till now, each application uses its own packet description database. This paper addresses this problem by proposing the NetPDL, an XML-based language for describing packet headers, which has the potentia ..."
Abstract
-
Cited by 15 (7 self)
- Add to MetaCart
Although several applications need to know the format of network packets to perform their tasks, till now, each application uses its own packet description database. This paper addresses this problem by proposing the NetPDL, an XML-based language for describing packet headers, which has
Statistical Techniques for Detecting Traffic Anomalies Through Packet Header Data
"... Abstract—This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastructure, using various forms of denial of service attacks, have led to an increased need for developing techniqu ..."
Abstract
-
Cited by 11 (0 self)
- Add to MetaCart
Abstract—This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastructure, using various forms of denial of service attacks, have led to an increased need for developing
Resilient Packet Header Compression through Coding,” Global Telecommunications Conference
- GLOBECOM ’04. IEEE
, 2004
"... Abstract — Header compression saves bandwidth, but it also introduces error propagation whenever packets are lost. In this work we propose to use error correcting codes on the compressed packet headers. The result is an overall system that maintains most of the bandwidth savings of header compressio ..."
Abstract
-
Cited by 5 (4 self)
- Add to MetaCart
Abstract — Header compression saves bandwidth, but it also introduces error propagation whenever packets are lost. In this work we propose to use error correcting codes on the compressed packet headers. The result is an overall system that maintains most of the bandwidth savings of header
Exploiting Packet Header Redundancy for Zero Cost Dissemination of Dynamic Resource Information
- In Proceedings of the 6th Workshop on Languages, Compilers, and Run-time Systems for Scalable Computer (LCR
, 2002
"... Packet headers exhibit considerable coding redundancy from both a theoretical and a practical standpoint. We propose to exploit this redundancy to create an additional communication channel between hosts as a by-product of normal packet transfers. This channel would be zero cost: the number and s ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
Packet headers exhibit considerable coding redundancy from both a theoretical and a practical standpoint. We propose to exploit this redundancy to create an additional communication channel between hosts as a by-product of normal packet transfers. This channel would be zero cost: the number
Results 11 - 20
of
1,287