Results 1 - 10
of
3,070
Capacity of Ad Hoc Wireless Networks
"... Early simulation experience with wireless ad hoc networks suggests that their capacity can be surprisingly low, due to the requirement that nodes forward each others’ packets. The achievable capacity depends on network size, traffic patterns, and detailed local radio interactions. This paper examine ..."
Abstract
-
Cited by 636 (14 self)
- Add to MetaCart
forwarding and the effect on capacity for several simple configurations and traffic patterns. While 802.11 discovers reasonably good schedules, we nonetheless observe capacities markedly less than optimal for very simple chain and lattice networks with very regular traffic patterns. We validate some
LIFE CYCLE ASSESSMENT OF MEANS OF TRANSPORT FOR GOODS TRAFFIC
"... 26-01-2009 26-01-09 2 H.Mötzl ..."
The Performance of TCP/IP for Networks with High Bandwidth-Delay Products and Random Loss.
- IEEE/ACM Trans. Networking,
, 1997
"... Abstract-This paper examines the performance of TCP/IP, the Internet data transport protocol, over wide-area networks (WANs) in which data traffic could coexist with real-time traffic such as voice and video. Specifically, we attempt to develop a basic understanding, using analysis and simulation, ..."
Abstract
-
Cited by 465 (6 self)
- Add to MetaCart
Abstract-This paper examines the performance of TCP/IP, the Internet data transport protocol, over wide-area networks (WANs) in which data traffic could coexist with real-time traffic such as voice and video. Specifically, we attempt to develop a basic understanding, using analysis and simulation
Analyzing Peer-to-Peer Traffic Across Large Networks
- IEEE/ACM Transactions on Networking
, 2002
"... Abstract—The use of peer-to-peer (P2P) applications is growing dramatically, particularly for sharing large video/audio files and software. In this paper, we analyze P2P traffic by measuring flowlevel information collected at multiple border routers across a large ISP network, and report our investi ..."
Abstract
-
Cited by 383 (3 self)
- Add to MetaCart
). All three P2P systems exhibit significant dynamics at short time scale and particularly at the IP address level. Still, the fraction of P2P traffic contributed by each prefix is more stable than the corresponding distribution of either Web traffic or overall traffic. The high volume and good stability
High-Rate Codes that are Linear in Space and Time
- IEEE Trans. Inform. Theory
, 2000
"... Multiple-antenna systems that operate at high rates require simple yet effective space-time transmission schemes to handle the large traffic volume in real time. At rates of tens of bits/sec/Hz, V-BLAST, where every antenna transmits its own independent substream of data, has been shown to have good ..."
Abstract
-
Cited by 422 (13 self)
- Add to MetaCart
Multiple-antenna systems that operate at high rates require simple yet effective space-time transmission schemes to handle the large traffic volume in real time. At rates of tens of bits/sec/Hz, V-BLAST, where every antenna transmits its own independent substream of data, has been shown to have
DRAFT GOODS TRAFFIC ON HIGH SPEED RAILWAY LINE BETWEEN LISBON AND MADRID
, 2009
"... The content in this paper is in pre-published, draft form. It has not been peer-reviewed and should be used for informational purposes only. The authors warn that the paper may contain typos, misquotes, incomplete, and possibly incorrect content. It is intended that the paper will be revised and ele ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
The content in this paper is in pre-published, draft form. It has not been peer-reviewed and should be used for informational purposes only. The authors warn that the paper may contain typos, misquotes, incomplete, and possibly incorrect content. It is intended that the paper will be revised and elevated to “published ” status, at which point the quality caveat will be lifted. seari.mit.edu SEAri WP-2009-3-1
Characteristics of WWW Client-based Traces
, 1995
"... The explosion of WWW traffic necessitates an accurate picture of WWW use, and in particular requires a good understanding of client requests for WWW documents. To address this need, we have collectedtraces of actual executions of NCSA Mosaic, reflecting over half a million user requests for WWW docu ..."
Abstract
-
Cited by 313 (31 self)
- Add to MetaCart
The explosion of WWW traffic necessitates an accurate picture of WWW use, and in particular requires a good understanding of client requests for WWW documents. To address this need, we have collectedtraces of actual executions of NCSA Mosaic, reflecting over half a million user requests for WWW
An Integrated Congestion Management Architecture for Internet Hosts
- In Proc. ACM SIGCOMM
, 1999
"... This paper presents a novel framework for managing network congestion from an end-to-end perspective. Our work is motivated by several trends in traffic patterns that threaten the long-term stability of the Internet. These trends include the use of multiple independent concurrent flows by Web app ..."
Abstract
-
Cited by 295 (24 self)
- Add to MetaCart
This paper presents a novel framework for managing network congestion from an end-to-end perspective. Our work is motivated by several trends in traffic patterns that threaten the long-term stability of the Internet. These trends include the use of multiple independent concurrent flows by Web
Traffic Matrix Estimation: Existing Techniques and New Directions
, 2002
"... Very few techniques have been proposed for estimating traffic matrices in the context of Internet traffic. Our work on POP-to-POP traffic matrices (TM) makes two contributions. The primary contribution is the outcome of a detailed comparative evaluation of the three existing techniques. We evaluate ..."
Abstract
-
Cited by 208 (14 self)
- Add to MetaCart
Very few techniques have been proposed for estimating traffic matrices in the context of Internet traffic. Our work on POP-to-POP traffic matrices (TM) makes two contributions. The primary contribution is the outcome of a detailed comparative evaluation of the three existing techniques. We evaluate
Traffic engineering with traditional IP routing protocols
- IEEE Communications Magazine
, 2002
"... Traffic engineering involves adapting the routing of traffic to the network conditions, with the joint goals of good user performance and efficient use of network resources. In this paper, we describe an approach to intradomain traffic engineering that works within the existing deployed base of Inte ..."
Abstract
-
Cited by 182 (21 self)
- Add to MetaCart
Traffic engineering involves adapting the routing of traffic to the network conditions, with the joint goals of good user performance and efficient use of network resources. In this paper, we describe an approach to intradomain traffic engineering that works within the existing deployed base
Results 1 - 10
of
3,070