نتایج جستجو برای: http traffic analysis
تعداد نتایج: 2996689 فیلتر نتایج به سال:
The identification of application flows is a critical task in order to manage bandwidth requirements of different kind of services (i.e. VOIP, Video, ERP). As network security functions spread, an increasing amount of traffic is natively encrypted due to privacy issues (e.g. VPN). This makes ineffective current traffic classification systems based on ports and payload inspection, e.g. even powe...
In this paper, we present an end-to-end QoS simulation studies on internetworking of remote LAN and long range communications over LEOIridium satellites constellation taking SuperJARING network in Malaysia as an example. A macro level network simulation scenario based on actual network topology in Malaysia is implemented as Diffserv network model using the Network Simulator-2 (NS-2). Web traffi...
Background: The first effect of the any natural, artificial and social crises is on the traffic flow and the cut-off of the vital transport arteries. In this effect, various sectors involving in rescue, safety, and evacuation of the wounded and injured people, as well as many decisions made by crisis managers, face a lot of challenges. Therefore, the aim of this study is to investigate the read...
Censorship circumvention systems that use HTTP as cover traffic make tradeoffs between deniability and performance by offering either deniability at the expense of performance (e.g., Infranet) or performance at the expense of deniability (e.g., StegoTorus). These systems do so because HTTP is typically very asymmetric, with very little capacity to carry covert data in each HTTP GET request; hig...
Android and iOS devices are leading the mobile device market. While various user experiences have been reported from the general user community about their differences, such as battery lifetime, display, and touchpad control, few in-depth reports can be found about their comparative performance when receiving the increasingly popular Internet streaming services. Today, video traffic starts to d...
20.1 Fundamentals of Network Traffic Monitoring and Analysis . . . . . . . . . . . . . . . . . . 384 20.1.1 What Are the Traffic Measurement Problems? . . . . . . . . . . . . . . . . . . . . . . . . . . 384 20.1.2 Traffic Matrix Measurement . . . . . . . . . . 385 20.1.3 Traffic VolumeMeasurement . . . . . . . . . 385 20.1.4 Traffic Dynamics Measurement . . . . . . . 385 20.1.5 Traffic Mixture ...
چکیده ندارد.
background road traffic accident (rta) victims also suffer from different types of injuries and disabilities, which can affect their quality of life. they usually face with various physical, mental, and social problems. most traffic accident victims had difficulty to return to normal life. objectives this study aimed to understand the experiences of return to normal life in rta victims. patient...
We compare the performance of HTTP/1.0 and 1.1 on a high latency, low bandwidth wireless network. HTTP/1.0 is known to have low throughput and consume excessive network and server resources on today's graphics-intensive web pages. A high latency, low bandwidth network only magniies these problems. HTTP/1.1 was developed to remedy these problems. We show that on a Ricochet wireless network, HTTP...
Accurate cross-layer information is very useful for optimizing and monitoring mobile networks for specific applications. However, the wide adoption of end-to-end encryption and the absence of common standards has made it very difficult to obtain such information by deep packet inspection (DPI) or cross-layer signaling. In this paper, we present a traffic profiling system as an alternative solut...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید