• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 3,379
Next 10 →

Traffic Types and Growth in Backbone Networks

by Re Gerber, Robert Doverspike
"... ..."
Abstract - Cited by 16 (1 self) - Add to MetaCart
Abstract not found

Mobile Backbone Networks -- Construction and Maintenance

by Anand Srinivas , Gil Zussman, Eytan Modiano , 2006
"... We study a novel hierarchical wireless networking approach in which some of the nodes are more capable than others. In such networks, the more capable nodes can serve as Mobile Backbone Nodes and provide a backbone over which end-toend communication can take place. Our approach consists of controlli ..."
Abstract - Cited by 11 (1 self) - Add to MetaCart
We study a novel hierarchical wireless networking approach in which some of the nodes are more capable than others. In such networks, the more capable nodes can serve as Mobile Backbone Nodes and provide a backbone over which end-toend communication can take place. Our approach consists

Energy-aware Backbone Networks: a Case Study

by Luca Chiaraviglio, Marco Mellia, Fabio Neri - First Int. Workshop on Green Communications (GreenComm’09 , 2009
"... Abstract—Power consumption of ICT is becoming more and more a sensible problem, which is of interest for both the research community, for ISPs and for the general public. In this paper we consider a real IP backbone network and a real traffic profile. We evaluate the energy cost of running it, and, ..."
Abstract - Cited by 47 (4 self) - Add to MetaCart
Abstract—Power consumption of ICT is becoming more and more a sensible problem, which is of interest for both the research community, for ISPs and for the general public. In this paper we consider a real IP backbone network and a real traffic profile. We evaluate the energy cost of running it, and

On the Correlation of TCP Traffic in Backbone Networks

by H. Nguyen, P. Thiran, C. Barakat , 2004
"... In this paper, we study the second order statistics of traffic in an Internet backbone. We model the traffic at the flow level by a Poisson shot noise process. This model is quite parasimonious, and is driven only by variables that can be easily obtained from measurements, namely flow sizes, duratio ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
In this paper, we study the second order statistics of traffic in an Internet backbone. We model the traffic at the flow level by a Poisson shot noise process. This model is quite parasimonious, and is driven only by variables that can be easily obtained from measurements, namely flow sizes

Diversity Investigation of Satellite Backbone Network for BFWA Systems

by Péter Kántor, Gábor Tóth, Árpád Drozdy, János Bitó
"... networks are terrestrial systems operating at high carrier frequencies (above 20 GHz), therefore one of the most harmful circumstantial factors in these systems is the attenuation caused by precipitation, especially by rain. Employing site diversity is a well-known method to improve the signal to in ..."
Abstract - Add to MetaCart
to interference plus noise ratio conditions within the BFWA network. The backbone network of a BFWA system can be wired or wireless terrestrial, however the connection between base stations and the operator’s core network can be also established by high frequency satellite links. Applying a satellite backbone

Characterization of Failures in an Operational IP Backbone Network

by Athina Markopoulou, Gianluca Iannaccone, Supratik Bhattacharyya, Chen-nee Chuah, Yashar Ganjali, Christophe Diot
"... Abstract—As the Internet evolves into a ubiquitous communication infrastructure and supports increasingly important services, its dependability in the presence of various failures becomes critical. In this paper, we analyze IS-IS routing updates from the Sprint IP backbone network to characterize fa ..."
Abstract - Cited by 42 (0 self) - Add to MetaCart
Abstract—As the Internet evolves into a ubiquitous communication infrastructure and supports increasingly important services, its dependability in the presence of various failures becomes critical. In this paper, we analyze IS-IS routing updates from the Sprint IP backbone network to characterize

Optimization of Mobile Backbone Networks: Improved Algorithms and Approximation

by Emily M. Craparo, Jonathan P. How, Eytan Modiano
"... Abstract — This paper presents new algorithms for throughput optimization in mobile backbone networks. This hierarchical sensing approach combines mobile backbone nodes, which have superior mobility and communication capability, with regular nodes, which are constrained in mobility and communication ..."
Abstract - Cited by 6 (5 self) - Add to MetaCart
Abstract — This paper presents new algorithms for throughput optimization in mobile backbone networks. This hierarchical sensing approach combines mobile backbone nodes, which have superior mobility and communication capability, with regular nodes, which are constrained in mobility

Anomaly Extraction in Backbone Networks using Association Rules

by Daniela Brauckhoff, Xenofontas Dimitropoulos, Arno Wagner, Kavè Salamatian , 2009
"... Anomaly extraction is an important problem essential to several applications ranging from root cause analysis, to attack mitigation, and testing anomaly detectors. Anomaly extraction is preceded by an anomaly detection step, which detects anomalous events and may identify a large set of possible ass ..."
Abstract - Cited by 33 (8 self) - Add to MetaCart
and summarize the event flows. Using rich traffic data from a backbone network (SWITCH/AS559), we show that we can reduce the classification cost, in terms of items (flows or rules) that need to be classified, by several orders of magnitude. Further, we show that our techniques effectively isolate event flows

Operational Experiences with Anomaly Detection in Backbone Networks

by unknown authors
"... Although network security is a crucial aspect for network operators, there are still very few works that have examined the anomalies present in large backbone networks and evaluated the performance of existing anomaly detection solutions in operational environments. The objective of this work is to ..."
Abstract - Add to MetaCart
Although network security is a crucial aspect for network operators, there are still very few works that have examined the anomalies present in large backbone networks and evaluated the performance of existing anomaly detection solutions in operational environments. The objective of this work

Simultaneous Placement and Assignment for Exploration in Mobile Backbone Networks

by Emily M. Craparo, Jonathan P. How, Eytan Modiano
"... Abstract — This paper presents new algorithms for conducting cooperative sensing using a mobile backbone network. This hierarchical sensing approach combines backbone nodes, which have superior mobility and communication capability, with regular nodes, which are constrained in mobility and communica ..."
Abstract - Cited by 4 (2 self) - Add to MetaCart
Abstract — This paper presents new algorithms for conducting cooperative sensing using a mobile backbone network. This hierarchical sensing approach combines backbone nodes, which have superior mobility and communication capability, with regular nodes, which are constrained in mobility
Next 10 →
Results 11 - 20 of 3,379
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University