Results 1 - 10
of
4,730
Automatic end-host configuration
"... Abstract In scientific environments inter-domain networks are spanned around the globe. These networks are usually built for a certain time-frame. Setting up of the network takes a huge amount of time. In the future it is desirable to build these networks more dynamically. An important issue is the ..."
Abstract
- Add to MetaCart
is the configuration of the end-hosts attached to the network. They need a IP-address and the ability to find the other servers. Because no DHCP-server or DNSserver is present this has to be done manually. In this research project, research is done on automatic end-host configuration which is also known as Zeroconf
Profiling the end host
- In PAM
, 2007
"... Abstract. Profiling is emerging as a useful tool for a variety of diagnosis and security applications. Existing profiles are often narrowly focused in terms of the data they capture or the application they target. In this paper, we seek to design general end-host profiles capable of capturing and re ..."
Abstract
-
Cited by 17 (6 self)
- Add to MetaCart
Abstract. Profiling is emerging as a useful tool for a variety of diagnosis and security applications. Existing profiles are often narrowly focused in terms of the data they capture or the application they target. In this paper, we seek to design general end-host profiles capable of capturing
Fair end-to-end window-based congestion control
- IEEE/ACM TRANS. ON NETWORKING
, 2000
"... In this paper, we demonstrate the existence of fair end-to-end window-based congestion control protocols for packetswitched networks with first come-first served routers. Our definition of fairness generalizes proportional fairness and includes arbitrarily close approximations of max-min fairness. T ..."
Abstract
-
Cited by 676 (3 self)
- Add to MetaCart
. The protocols use only information that is available to end hosts and are designed to converge reasonably fast. Our study is based on a multiclass fluid model of the network. The convergence of the protocols is proved using a Lyapunov function. The technical challenge is in the practical implementation
End-host Controlled Multicast Routing
- ELSEVIER COMPUTER NETWORKS, SPECIAL ISSUE ON OVERLAY DISTRIBUTION STRUCTURES AND THEIR APPLICATIONS
, 2006
"... The last decade has seen a deluge of proposals for supporting multicast in the Internet. These proposals can be categorized as either infrastructure-based, with the multicast functionality provided by specialized network nodes, or host-based, with the multicast functionality provided by the member ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
by the members of the multicast group itself. In this paper, we present the design and evaluation of a hybrid multicast architecture wherein the infrastructure provides packet forwarding, and the end-hosts implement the control plane. End-hosts build multicast trees by setting up forwarding state
Emulating AQM from end hosts
, 2007
"... In this paper, we show that end-host based congestion pre-diction is more accurate than previously characterized. How-ever, it may not be possible to entirely eliminate the un-certainties in congestion prediction. To address these un-certainties, we propose Probabilistic Early Response TCP (PERT). P ..."
Abstract
-
Cited by 21 (5 self)
- Add to MetaCart
In this paper, we show that end-host based congestion pre-diction is more accurate than previously characterized. How-ever, it may not be possible to entirely eliminate the un-certainties in congestion prediction. To address these un-certainties, we propose Probabilistic Early Response TCP (PERT
End-host Architecture for QoS-Adaptive Communication
- In IEEE Real-Time Technology and Applications Symposium
, 1998
"... The proliferation of communication-intensive real-time applications with "elastic" real-time constraints, such as streaming stored video, and the advent of differential services over the Internet require a new design for end-host communication subsystems. The design should (i) provide per- ..."
Abstract
-
Cited by 79 (16 self)
- Add to MetaCart
The proliferation of communication-intensive real-time applications with "elastic" real-time constraints, such as streaming stored video, and the advent of differential services over the Internet require a new design for end-host communication subsystems. The design should (i) provide per
Flow Scheduling for End-host Multihoming
- In Proceedings of IEEE INFOCOM
, 2006
"... Fueled by the competing DSL and Cable technologies, residential broadband access has seen a significant spread in availability to the point that many users have a choice from several ISPs. At the same time, 802.11 networks have spread rapidly in the residential area, and it is common for neighbors t ..."
Abstract
-
Cited by 46 (3 self)
- Add to MetaCart
of flow scheduling algorithms in PERM, a framework for practical end-host multihoming. PERM scheduler employs automated on-line analysis of the endusers ' networking behaviors, and exploits the recognized patterns to achieve high-performance scheduling at flow level. We verify our models of end
End-Host Mobility and Multi-Homing with Host Identity
- Protocol”, IETF Internet Draft draft-nikander-hip-mm-00.txt
, 2003
"... This memo defines an Experimental Protocol for the Internet community. It does not specify an Internet standard of any kind. Discussion and suggestions for improvement are requested. Distribution of this memo is unlimited. This document defines mobility and multihoming extensions to the Host Identit ..."
Abstract
-
Cited by 64 (10 self)
- Add to MetaCart
by which a host dynamically changes the primary locator that it uses to receive packets. While the same LOCATOR parameter can also be used to support end-host multihoming, detailed procedures are left for further study.
Application Traffic Classification at End Host Level
"... Classifying application traffic shows the composition of traffic in terms of number of flows and size. In this work, we classify traffic at end host level to understand characteristics of end host traffic generation. We explain how traffic is composed with number of application categories at end hos ..."
Abstract
- Add to MetaCart
Classifying application traffic shows the composition of traffic in terms of number of flows and size. In this work, we classify traffic at end host level to understand characteristics of end host traffic generation. We explain how traffic is composed with number of application categories at end
Predicting Internet Network Distance with Coordinates-Based Approaches
- In INFOCOM
, 2001
"... In this paper, we propose to use coordinates-based mechanisms in a peer-to-peer architecture to predict Internet network distance (i.e. round-trip propagation and transmission delay) . We study two mechanisms. The first is a previously proposed scheme, called the triangulated heuristic, which is bas ..."
Abstract
-
Cited by 631 (6 self)
- Add to MetaCart
is based on relative coordinates that are simply the distances from a host to some special network nodes. We propose the second mechanism, called Global Network Positioning (GNP), which is based on absolute coordinates computed from modeling the Internet as a geometric space. Since end hosts maintain
Results 1 - 10
of
4,730