Results 1 - 10
of
517
On Improving Ethernet LAN Security
"... the area of data communications security, importance of internal LAN security is still underestimated. This paper proposes a prospective solution for building of secure encrypted Ethernet LANs. The architecture presented allows for employment of the existing office network infrastructure, does not r ..."
Abstract
- Add to MetaCart
the area of data communications security, importance of internal LAN security is still underestimated. This paper proposes a prospective solution for building of secure encrypted Ethernet LANs. The architecture presented allows for employment of the existing office network infrastructure, does
Self-Similarity Through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level
- IEEE/ACM TRANSACTIONS ON NETWORKING
, 1997
"... A number of recent empirical studies of traffic measurements from a variety of working packet networks have convincingly demonstrated that actual network traffic is self-similar or long-range dependent in nature (i.e., bursty over a wide range of time scales) -- in sharp contrast to commonly made tr ..."
Abstract
-
Cited by 743 (24 self)
- Add to MetaCart
analyses of real-time traffic measurements from Ethernet LAN's at the level of individual sources. This paper is an extended version of [53] and differs from it in significant ways. In particular, we develop here the mathematical results concerning the superposition of strictly alternating ON
Selective Back-Pressure In Switched Ethernet Lans
- PROCEEDINGS OF IEEE GLOBECOM
, 1999
"... Although switched LANs are usually over-provisioned, their characteristics (short RTT, link speed mismatches) lead to increased burstiness, and thus to the occurrence of transient congestion. In order to fully utilize the potential of large switched LANs, a link layer back-pressure mechanism may be ..."
Abstract
-
Cited by 18 (1 self)
- Add to MetaCart
Although switched LANs are usually over-provisioned, their characteristics (short RTT, link speed mismatches) lead to increased burstiness, and thus to the occurrence of transient congestion. In order to fully utilize the potential of large switched LANs, a link layer back-pressure mechanism may
Using Low-power Modes for Energy Conservation in Ethernet LANs
"... Abstract—Most Ethernet interfaces available for deployment in switches and hosts today can operate in a variety of different low power modes. However, currently these modes have very limited usage models. They do not take advantage of periods of inactivity, when the links remain idle or under-utiliz ..."
Abstract
-
Cited by 38 (0 self)
- Add to MetaCart
-utilized. In this study, we propose methods that allow for detection of such periods to obtain energy savings with little impact on loss or delay. We evaluate our methods on a wide range of real-time traffic traces collected at a high-speed backbone switch within our campus LAN. Our results show that Ethernet interfaces
On the Self-similar Nature of Ethernet Traffic (Extended Version)
, 1994
"... We demonstrate that Ethernet LAN traffic is statistically self-similar, that none of the commonly used traffic models is able to capture this fractal-like behavior, that such behavior has serious implications for the design, control, and analysis of high-speed, cell-based networks, and that aggrega ..."
Abstract
-
Cited by 2213 (46 self)
- Add to MetaCart
We demonstrate that Ethernet LAN traffic is statistically self-similar, that none of the commonly used traffic models is able to capture this fractal-like behavior, that such behavior has serious implications for the design, control, and analysis of high-speed, cell-based networks
Comparative Throughput of WiFi & Ethernet LANs using OPNET MODELER
"... The comparison between the performance of both wired and wireless networks is based on various performance parameters. The performance of the wired Ethernet is very sensitive to the number of users and the offered load. When the number of users/offered load is high then the collisions increase resul ..."
Abstract
- Add to MetaCart
resulting in larger wastage of the medium and lowering overall throughput. The aim of this research is to compare the throughput of LANs using Ethernet and WiFi under three different scenarios: 25, 50 and 100 users using simulator OPNET-MODELER. By analyzing the graphs, it is concluded that throughput
SBM protocol for providing real-time QoS in Ethernet LANs
- In Proc. International Symposium on Computer Architecture
, 1999
"... This paper deals with the performance evaluation of LAN-Integrated Service protocol called SBM (Subnetwork Bandwidth Manager), a solution to handle QoS requirements over Local Area Networks. SBM is an RSVP-based protocol, which consists in electing a manager over a LAN segment to map RSVPflows into ..."
Abstract
- Add to MetaCart
This paper deals with the performance evaluation of LAN-Integrated Service protocol called SBM (Subnetwork Bandwidth Manager), a solution to handle QoS requirements over Local Area Networks. SBM is an RSVP-based protocol, which consists in electing a manager over a LAN segment to map RSVPflows
Design and Implementation of Client Server Network Management System for Ethernet LAN
"... Abstract—Network Management Systems have played a great important role in information systems. Management is very important and essential in any fields. There are many managements such as configuration management, fault management, performance management, security management, accounting management a ..."
Abstract
- Add to MetaCart
and etc. Among them, configuration, fault and security management is more important than others. Because these are essential and useful in any fields. Configuration management is to monitor and maintain the whole system or LAN. Fault management is to detect and troubleshoot the system. Security management
Design and Implementation of Client Server Network Management System for Ethernet LAN
"... Abstract—Network Management Systems have played a great important role in information systems. Management is very important and essential in any fields. There are many managements such as configuration management, fault management, performance management, security management, accounting management a ..."
Abstract
- Add to MetaCart
and etc. Among them, configuration, fault and security management is more important than others. Because these are essential and useful in any fields. Configuration management is to monitor and maintain the whole system or LAN. Fault management is to detect and troubleshoot the system. Security management
Results 1 - 10
of
517