نتایج جستجو برای: packet reordering

تعداد نتایج: 45196  

Journal: :Math. Meth. of OR 2008
Marc Lelarge

An important characteristic of any TCP connection is the sequencing of packets within that connection. Out-of sequence packets indicate that the connection suffers from loss, duplication or reordering. More generally, in many distributed applications information integrity requires that data exchanges between different nodes of a system be performed in a specific order. However, due to random de...

Journal: :Computer Communications 2007
Vic Grout John N. Davies John McGinn

The difficulty of efficiently reordering the rules in an Access Control List is considered and the essential optimisation problem formulated. The complexity of exact and sophisticated heuristics is noted along with their unsuitability for real time implementation embedded in the hardware of the network device. A simple alternative is proposed, in which a very limited rule reordering is consider...

2013
Giovane Cesar Moreira Moura Aiko Pras Tiago Fioreze Pieter-Tjerk de Boer

Self-management is one of the most popular research topics in network and systems management. Little is known, however, regarding the costs, in particular with respect to performance, of self-management solutions. The goal of this paper is therefore to analyze such hidden performance costs. Our analysis will be performed within the context of a specific example, namely automatically moving elep...

2005
Errin W. Fulp

This paper introduces a new method to improve the performance of list oriented firewall systems. Specifically, the paper addresses reordering a firewall rule set to minimize the average number of comparisons to determine the action, while maintaining the integrity of the original policy. Integrity is preserved if the reordered and original rules always arrive at the same result given a packet. ...

Journal: :CoRR 2012
Sanjay Goyal Tan Le Amith Chincholi Tariq Elkourdi Alpaslan Demir

The use of heterogeneous networks with multiple radio access technologies (RATs) is a system concept that both academia and industry are studying. In such system, integrated use of available multiple RATs is essential to achieve beyond additive throughput and connectivity gains using multi-dimensional diversity. This paper considers an aggregation module called opportunistic multi-MAC aggregati...

2007
Muhammad Ali Awais Adnan Michael Welzl

Network on a chip (NoC) has been proposed to address the inefficiency of buses in the current System on Chips (SoC). However as the chip scales, the probability of errors is also increasing, thus, making fault tolerance a key concern in scaling chips. Transient faults are becoming a major cause of errors in a packet based NoC. A transient error can either corrupt the header or the payload of pa...

Journal: :IMA Journal of Numerical Analysis 2009

2016
Ravi Kiran Varma Penmatsa Valli Kumari Vatsavayi Srinivas Kumar Samayamantula

A firewall is the most essential component of network perimeter security. Due to human error and the involvement of multiple administrators in configuring firewall rules, there exist common anomalies in firewall rulesets such as Shadowing, Generalization, Correlation, and Redundancy. There is a need for research on efficient ways of resolving such anomalies. The challenge is also to see that th...

Journal: :IEEE ACM Transactions on Networking 2022

Packet replication and elimination functions are used by time-sensitive networks (as in the context of IEEE TSN IETF DetNet) to increase reliability network. Packets replicated onto redundant paths a function. Later merge again an function removes duplicates. This redundancy scheme has effect on timing behavior many challenges arise from conducting analyses. The can induce burstiness along repl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید