메뉴 건너뛰기




Volumn , Issue , 2004, Pages 135-148

Class-of-Service mapping for QoS: A statistical signature-based approach to IP traffic classification

Author keywords

Class of Service (CoS); Quality of Service (QoS); Statistical Signatures; Traffic Classification

Indexed keywords

ALGORITHMS; DATA TRANSFER; ERROR ANALYSIS; INTERNET; LOCAL AREA NETWORKS; NETWORK PROTOCOLS; SERVERS; STATISTICAL METHODS; TELECOMMUNICATION TRAFFIC; WIDE AREA NETWORKS;

EID: 14944383480     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (471)

References (36)
  • 1
    • 0003336357 scopus 로고    scopus 로고
    • TCP congestion control
    • IETF Network Working Group
    • M. Allman, V. Paxson, and W. Stevens. TCP congestion control. IETF Network Working Group RFC 2581, 1999.
    • (1999) RFC , vol.2581
    • Allman, M.1    Paxson, V.2    Stevens, W.3
  • 3
    • 0000264695 scopus 로고    scopus 로고
    • A stochastic model of TCP/IP with stationary random losses
    • E. Altman, K. Avrachenkov, and C. Barakat. A stochastic model of TCP/IP with stationary random losses. In SIGCOMM'2000, 2000.
    • (2000) SIGCOMM'2000
    • Altman, E.1    Avrachenkov, K.2    Barakat, C.3
  • 4
    • 0003292666 scopus 로고    scopus 로고
    • Generating representative web workloads for network and server performance evaluation
    • June
    • P. Barford and M. Crovella. Generating Representative Web Workloads for Network and Server Performance Evaluation. In Proceedings of ACM Sigmetrics, June 1998.
    • (1998) Proceedings of ACM Sigmetrics
    • Barford, P.1    Crovella, M.2
  • 11
    • 1142267334 scopus 로고    scopus 로고
    • Gigascope: A stream database for network applications
    • June
    • C. Cranor, T. Johnson, and O. Spatscheck. Gigascope: a stream database for network applications. In SIGMOD, June 2003.
    • (2003) SIGMOD
    • Cranor, C.1    Johnson, T.2    Spatscheck, O.3
  • 13
    • 14944346102 scopus 로고    scopus 로고
    • Automatically inferring patterns of resource consumption in network traffic
    • Karlsruhe, Germany
    • C. Estan, S. Savage, and C. Varghese. Automatically inferring patterns of resource consumption in network traffic. In ACM SIGCOMM, Karlsruhe, Germany, 2003.
    • (2003) ACM SIGCOMM
    • Estan, C.1    Savage, S.2    Varghese, C.3
  • 14
    • 0030189675 scopus 로고    scopus 로고
    • Simulation-based comparisons of Tahoe, Reno, and SACK TCP
    • K. Fall and S. Floyd. Simulation-based comparisons of Tahoe, Reno, and SACK TCP. Computer Communication Review, 26(3):5-21, 1996. Available at http://www.aciri.org/floyd/papers.html.
    • (1996) Computer Communication Review , vol.26 , Issue.3 , pp. 5-21
    • Fall, K.1    Floyd, S.2
  • 16
    • 0001994082 scopus 로고
    • Connections with multiple congested gateways in packet-switched networks, part I: One way traffic
    • S. Floyd. Connections with multiple congested gateways in packet-switched networks, part I: One way traffic. Computer Communications Review, 21(5), 1991.
    • (1991) Computer Communications Review , vol.21 , Issue.5
    • Floyd, S.1
  • 20
    • 14944367111 scopus 로고    scopus 로고
    • IANA. Internet Assigned Numbers Authority (IANA). http://www.iana.org/ assignments/port-numbers.
  • 21
    • 85013623251 scopus 로고
    • Congestion avoidance and control
    • V. Jacobson. Congestion avoidance and control. Communication Review, 18(4):314-329, 1988. Available at ftp://ftp.ee.lbl.gov/papers/congavoid.ps.Z.
    • (1988) Communication Review , vol.18 , Issue.4 , pp. 314-329
    • Jacobson, V.1
  • 22
  • 23
    • 8144224553 scopus 로고    scopus 로고
    • Profile-based traffic chacterization of commercial web sites
    • J.Charzinski, R.Lehnert, and P.Tan-Gia, editors, Berlin, Germany
    • Z. Liu, M. S. Squillante, C. H. Xia, S. zheng Yu, and L. Zhang. Profile-based traffic chacterization of commercial web sites. In J.Charzinski, R.Lehnert, and P.Tan-Gia, editors, Proceedings of the 18th International Teletraffic Congress (ITC-18), volume 5a, pages 231-240, Berlin, Germany, 2003.
    • (2003) Proceedings of the 18th International Teletraffic Congress (ITC-18) , vol.5 A , pp. 231-240
    • Liu, Z.1    Squillante, M.S.2    Xia, C.H.3    Yu, S.Z.4    Zhang, L.5
  • 24
    • 0031175629 scopus 로고    scopus 로고
    • The macroscopic behavior of the TCP congestion avoidance algorithm
    • July
    • M. Mathis, J. Semke, J. Mahdavi, and T. Ott. The macroscopic behavior of the TCP congestion avoidance algorithm. Computer Communication Review, 27(3):67-82, July 1997. Available at http://www.psc.edu/networking/tcp_friendly. html#performance.
    • (1997) Computer Communication Review , vol.27 , Issue.3 , pp. 67-82
    • Mathis, M.1    Semke, J.2    Mahdavi, J.3    Ott, T.4
  • 26
    • 85084161486 scopus 로고    scopus 로고
    • Inferring internet denial of service activity
    • Washington D.C., August
    • D. Moore, G. Voelker, and S. Savage. Inferring Internet Denial of Service Activity. In Proc. of the USENIX Security Symposium, Washington D.C., August 2001. Available at http://www.cs. ucsd.edu/~savage/papers/UsenixSec01.pdf.
    • (2001) Proc. of the USENIX Security Symposium
    • Moore, D.1    Voelker, G.2    Savage, S.3
  • 28
    • 0003310342 scopus 로고    scopus 로고
    • Modeling TCP throughput: A simple model and its empirical validation
    • J. Padhye, V. Firoin, D. Towsley, and J. Kurose. Modeling TCP throughput: A simple model and its empirical validation. In ACM SIGCOMM'98, 1998. Available at http://www.psc.edu/networking/tcp_friendly.html#performance.
    • (1998) ACM SIGCOMM'98
    • Padhye, J.1    Firoin, V.2    Towsley, D.3    Kurose, J.4
  • 29
    • 0028491368 scopus 로고
    • Empirically derived analytic models of wide-area TCP connections
    • V. Paxson. Empirically derived analytic models of wide-area TCP connections. IEEE/ACM Transactions on Networking, 2(4):316-336, 1994.
    • (1994) IEEE/ACM Transactions on Networking , vol.2 , Issue.4 , pp. 316-336
    • Paxson, V.1
  • 30
    • 0029323403 scopus 로고
    • Wide-area traffic: The failure of Poisson modeling
    • June
    • V. Paxson and S. Floyd. Wide-area traffic: The failure of Poisson modeling. IEEE/ACM Transactions on Networking, 3(3):226-244, June 1995.
    • (1995) IEEE/ACM Transactions on Networking , vol.3 , Issue.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 31
    • 85135017619 scopus 로고    scopus 로고
    • Summary of WWW characterizations
    • J. E. Pitkow. Summary of WWW characterizations. W3J, 2:3-13, 1999.
    • (1999) W3J , vol.2 , pp. 3-13
    • Pitkow, J.E.1
  • 33
    • 0039043105 scopus 로고
    • Strips displaying empirical distributions: I. Textured dot strips
    • Bellcore Technical Memorandum
    • J. Tukey and P. Tukey. Strips displaying empirical distributions: I. textured dot strips. Technical report, Bellcore Technical Memorandum, 1990.
    • (1990) Technical Report
    • Tukey, J.1    Tukey, P.2
  • 35
    • 85013592037 scopus 로고
    • Self-similarity through high-variability: Statistical analysis of Ethernet LAN traffic at the source level
    • W. Willinger, M. S. Taqqu, R. Sherman, and D. V. Wilson. Self-similarity through high-variability: Statistical analysis of Ethernet LAN traffic at the source level. Proceedings of the ACM SIGCOMM'95, 1995. Available at http://www.acm.org/sigcomm/sigcomm95/sigcpapers.html.
    • (1995) Proceedings of the ACM SIGCOMM'95
    • Willinger, W.1    Taqqu, M.S.2    Sherman, R.3    Wilson, D.V.4
  • 36
    • 85084162889 scopus 로고    scopus 로고
    • Detecting backdoors
    • Denver, Colorado, USA
    • Y. Zhang and V. Paxson. Detecting backdoors. In Proc. USENIX, Denver, Colorado, USA, 2000.
    • (2000) Proc. USENIX
    • Zhang, Y.1    Paxson, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.