Low latency via redundancy
Low latency is critical for interactive networked applications. But while we know how to scale
systems to increase capacity, reducing latency---especially the tail of the latency distribution …
systems to increase capacity, reducing latency---especially the tail of the latency distribution …
More is less: reducing latency via redundancy
Low latency is critical for interactive networked applications. But while we know how to scale
systems to increase capacity, reducing latency---especially the tail of the latency distribution …
systems to increase capacity, reducing latency---especially the tail of the latency distribution …
Linkscope: Toward detecting target link flooding attacks
A new class of target link flooding attacks (LFAs) can cut off the Internet connections of a
target area without being detected, because they employ legitimate flows to congest …
target area without being detected, because they employ legitimate flows to congest …
Towards detecting target link flooding attack
A new class of target link flooding attacks (LFA) can cut off the Internet connections of a
target area without being detected because they employ legitimate flows to congest selected …
target area without being detected because they employ legitimate flows to congest selected …
Non-cooperative diagnosis of submarine cable faults
Submarine cable faults are not uncommon events in the Internet today. However, their
impacts on end-to-end path quality have received almost no attention. In this paper, we …
impacts on end-to-end path quality have received almost no attention. In this paper, we …
[PDF][PDF] 一种基于控制平面测量的光突发交换网络动态偏置时间算法
牛大伟, 彭来献, 于卫波, 米志超, 赵文栋, 王海 - 电子与信息学报, 2012 - edit.jeit.ac.cn
该文提出一种基于控制平面背景流量测量方法的动态偏置时间算法. 该算法以控制平面的探测突
发丢失率为依据, 估计瓶颈核心节点的背景流量, 并据此动态设置偏置时间 …
发丢失率为依据, 估计瓶颈核心节点的背景流量, 并据此动态设置偏置时间 …
[图书][B] Latency-bandwidth tradeoffs in Internet applications
A Vulimiri - 2015 - search.proquest.com
Wide-area Internet links are slow, expensive, and unreliable. This affects applications in two
distinct ways. Back-end data processing applications, which need to transfer large amounts …
distinct ways. Back-end data processing applications, which need to transfer large amounts …
[PDF][PDF] Network Path Monitoring
BB Halis, F Wiedner, M Helm - Network, 2022 - net.in.tum.de
Network path monitoring is an important feature of modern networks. It enables to
understand the behavior of the network. However, a network is a complex structure, and …
understand the behavior of the network. However, a network is a complex structure, and …
Network attack detection method
It is described a network attack detection method. A topol ogy analysis on network is
conducted to obtain a probing path set containing at least one probing path. A first probing …
conducted to obtain a probing path set containing at least one probing path. A first probing …
Network attack detection method
It is described a network attack detection method. A topology analysis on network is
conducted to obtain a probing path set containing at least one probing path. A first probing …
conducted to obtain a probing path set containing at least one probing path. A first probing …