Results 1 - 10
of
479
Difficulties in Simulating the Internet
- IEEE/ACM Transactions on Networking
, 2001
"... Simulating how the global Internet behaves is an immensely challenging undertaking because of the network's great heterogeneity and rapid change. The heterogeneity ranges from the individual links that carry the network's traffic, to the protocols that interoperate over the links, to the & ..."
Abstract
-
Cited by 341 (8 self)
- Add to MetaCart
Simulating how the global Internet behaves is an immensely challenging undertaking because of the network's great heterogeneity and rapid change. The heterogeneity ranges from the individual links that carry the network's traffic, to the protocols that interoperate over the links, to the "mix" of different applications used at a site, to the levels of congestion seen on different links. We discuss two key strategies for developing meaningful simulations in the face of these difficulties: searching for invariants, and judiciously exploring the simulation parameter space. We finish with a brief look at a collaborative effort within the research community to develop a common network simulator. 1 Introduction Due to the network's complexity, simulation plays a vital role in attempting to characterize both the behavior of the current Internet and the possible effects of proposed changes to its operation. Yet modeling and simulating the Internet is not an easy task. The goal of this paper ...
Internet QoS: A Big Picture
, 1999
"... In this article we present a framework for the emerging Internet quality of service (QoS). All the important components of this framework --- integrated services, RSVP, differentiated services, multiprotocol label switching (MPLS), and constraintbased routing --- are covered. We describe what integr ..."
Abstract
-
Cited by 290 (2 self)
- Add to MetaCart
(Show Context)
In this article we present a framework for the emerging Internet quality of service (QoS). All the important components of this framework --- integrated services, RSVP, differentiated services, multiprotocol label switching (MPLS), and constraintbased routing --- are covered. We describe what integrated services and differentiated services are, how they can be implemented, and the problems they have. We then describe why MPLS and constraint-based routing have been introduced into this framework, how they differ from and relate to each other, and where they fit into the differentiated services architecture. Two likely service architectures are presented, and the end-to-end service deliveries in these two architectures are illustrated. We also compare ATM networks to router networks with differentiated services and MPLS. Putting all these together, we give the readers a grasp of the big picture of the emerging Internet QoS. 12 IEEE Network . March/April 1999 9 and differenti...
RTP profile for audio and video conferences with minimal control
, 2000
"... This document is an Internet-Draft. Internet-Drafts are working ..."
Abstract
-
Cited by 261 (28 self)
- Add to MetaCart
(Show Context)
This document is an Internet-Draft. Internet-Drafts are working
Performance Enhancing Proxies Intended to Mitigate Link-Related Degradations", RFC 3135
, 2001
"... Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2001). All Rights Reserved. This document is a survey of Performance Enhan ..."
Abstract
-
Cited by 178 (1 self)
- Add to MetaCart
(Show Context)
Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2001). All Rights Reserved. This document is a survey of Performance Enhancing Proxies (PEPs) often employed to improve degraded TCP performance caused by characteristics of specific link environments, for example, in satellite, wireless WAN, and wireless LAN environments. Different types of Performance Enhancing Proxies are described as well as the mechanisms used to improve performance. Emphasis is put on proxies operating with TCP. In addition, motivations for their development and use are described along with some of the consequences of using
Definitions of the differentiated service field (DS field
- in the Ipv4 and Ipv6 headers. IETF RFC 2474
, 1998
"... This document is an Internet-Draft. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six ..."
Abstract
-
Cited by 121 (0 self)
- Add to MetaCart
This document is an Internet-Draft. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." To view the entire list of current Internet-Drafts, please check the "1id-abstracts.txt " listing contained in the Internet-Drafts Shadow Directories on ftp.is.co.za (Africa), ftp.nordu.net (Northern
Overview and Principles of Internet Traffic Engineering", RFC 3272
, 2002
"... Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice ..."
Abstract
-
Cited by 113 (4 self)
- Add to MetaCart
(Show Context)
Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice
An Expedited Forwarding PHB (Per-Hop Behavior)", RFC 3246
, 2002
"... Status of this Memo ..."
(Show Context)
Assured forwarding PHB group
- IETF RFC 2597
, 1999
"... This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this pro ..."
Abstract
-
Cited by 100 (0 self)
- Add to MetaCart
This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (1999). All Rights Reserved. This document defines a general use Differentiated Services (DS) [Blake] Per-Hop-Behavior (PHB) Group called Assured Forwarding (AF). The AF PHB group provides delivery of IP packets in four independently forwarded AF classes. Within each AF class, an IP packet can be assigned one of three different levels of drop precedence. A DS node does not reorder IP packets of the same microflow if they belong to the same AF class.
Transporting Real–Time Video over the Internet: Challenges and Approaches
- Proceedings of the IEEE
, 2000
"... Abstract|Delivering real-time video over the Internet is an important component of many Internet multimedia ap-plications. Transmission of real-time video has bandwidth, delay and loss requirements. However, the current Inter-net does not oer any quality of service (QoS) guarantees to video transmis ..."
Abstract
-
Cited by 100 (10 self)
- Add to MetaCart
(Show Context)
Abstract|Delivering real-time video over the Internet is an important component of many Internet multimedia ap-plications. Transmission of real-time video has bandwidth, delay and loss requirements. However, the current Inter-net does not oer any quality of service (QoS) guarantees to video transmission over the Internet. In addition, the heterogeneity of the networks and end-systems makes it dif-cult to multicast Internet video in an eÆcient and
ex-ible way. Thus, designing protocols and mechanisms for Internet video transmission poses many challenges. In this paper, we take a holistic approach to these challenges and present solutions from both transport and compression per-spectives. With the holistic approach, we design a frame-work for transporting real-time Internet video, which in-cludes two components, namely, congestion control and er-ror control. Specically, congestion control consists of rate control, rate adaptive encoding, and rate shaping; error con-trol consists of forward error correction (FEC), retransmis-sion, error-resilience and error concealment. For the design of each component in the framework, we classify approaches and summarize representative research work. We point out there exists a design space which can be explored by video application designers, and suggest that the synergy of both transport and compression could provide good solutions.
SAVE: Source address validity enforcement protocol”, in
- Proc. of INFOCOM,
, 2001
"... ABSTRACT Many network attacks forge the source address in their IP packets to block traceback. Recently, research activity has focused on packet-tracing mechanisms to counter this deception. Unfortunately, these mechanisms are either too expensive or ineffective against distributed attacks where tr ..."
Abstract
-
Cited by 90 (11 self)
- Add to MetaCart
(Show Context)
ABSTRACT Many network attacks forge the source address in their IP packets to block traceback. Recently, research activity has focused on packet-tracing mechanisms to counter this deception. Unfortunately, these mechanisms are either too expensive or ineffective against distributed attacks where traffic comes from multiple directions, and the volume in each direction is small. We believe that the fundamental solution to the problem of source address forging is to validate source addresses throughout the network. We have developed a source address filtering protocol that establishes and maintains valid incoming interface information on source addresses at each router, thus allowing all packets carrying improper source addresses to be immediately identified. Our protocol works correctly in the presence of asymmetric routing. We will describe the protocol that gathers the information to validate source addresses and use simulation to demonstrate that it is effective and has reasonable costs.