• No results found

multimedia packet data traffic

Performance Analysis of Multimedia Traffic over MPLS Communication Networks with Traffic Engineering

Performance Analysis of Multimedia Traffic over MPLS Communication Networks with Traffic Engineering

... optimized data paths to the detriment of other links, which frequently remain ...arriving data flows on various ingress interfaces on the same node that are bound for the same destination are always ...

9

Performance Evaluation of High Speed Data Networks with Different Transmission Modes

Performance Evaluation of High Speed Data Networks with Different Transmission Modes

... tagged packet, u 1,k is the system contents of multimedia data traffic class at the beginning of slot k and f 1,k is defined as the total number of multimedia class packets that arrive ...

6

Testing an IP-based Multimedia Gateway

Testing an IP-based Multimedia Gateway

... IP-based multimedia gateway, using free software resources, to the identification, classification and forwarding of different traffic flows (elastic, more sensitive to packet loss, and stream, more ...

5

Distributed traffic of multimedia files on hadoop

Distributed traffic of multimedia files on hadoop

... output packet number, byte number and number of ...distributed data process. As a increase in network traffic and in data of multimedia system, this system can be a critical one for ...

6

Predicting Multimedia Traffic in Wireless Networks: A Performance Evaluation of Cognitive Techniques

Predicting Multimedia Traffic in Wireless Networks: A Performance Evaluation of Cognitive Techniques

... the data packet size using the VoIP session as ...both data packet size and arrival ...for multimedia traffic estimations based on our ...

7

A Packet Priority Approach to Mitigate Starvation in Wireless Mesh Network with Multimedia Traffic

A Packet Priority Approach to Mitigate Starvation in Wireless Mesh Network with Multimedia Traffic

... Based on ad-hoc networks, Wireless Mesh Network (WMN) transfers data to and from an Access Point (AP) that is linked to the Internet by a wired/ wireless network. These AP do not need to be within reach of network ...

5

Admission control schemes for bursty multimedia traffic

Admission control schemes for bursty multimedia traffic

... Proceedings The Conference on Computer Communications Volume 3 of 3 Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies Twenty years into the communicatio[r] ...

6

QoS Supportive MAC Protocols for WSNs: Review and Evaluation

QoS Supportive MAC Protocols for WSNs: Review and Evaluation

... Similar to other hybrid protocols discussed in this paper, the scheme proposed by the author in [17] also tries to optimize an already existing protocol. However, the OGTS (Optimization- Based GTS) scheme focuses mainly ...

8

Complex Networks: Traffic Dynamics, Network Performance, and Network Structure

Complex Networks: Traffic Dynamics, Network Performance, and Network Structure

... state, packet loss starts to increase abruptly. It also shows that packet loss depends on in- coming traffic and network structure, but is independent of queuing ...highest packet loss under ...

9

EVALUATION OF ARCHITECTURE STYLES 
		FOR CLOUD COMPUTING APPLICATIONS

EVALUATION OF ARCHITECTURE STYLES FOR CLOUD COMPUTING APPLICATIONS

... QoS specification is above all the components and arranges ease to applications in the specification of flow requirements using a small number of criterions QoS mapping works assuming QoS specification and it extracts ...

16

An Efficient Directional Routing Algorithm For Network On Chip

An Efficient Directional Routing Algorithm For Network On Chip

... incoming data packet based on the routing decisions done by the routing algorithm, adaptivity in the routers will take care of turn models and odd- even ...

6

AN EFFECTIVE TECHNIQUE FOR BRAIN TUMOUR SEGMENTATION AND DETECTION USING 
CUCKOO BASED NEURO FUZZY CLASSIFIER

AN EFFECTIVE TECHNIQUE FOR BRAIN TUMOUR SEGMENTATION AND DETECTION USING CUCKOO BASED NEURO FUZZY CLASSIFIER

... the packet to the node with high probability, same steps are repeated till reaching the ...earlier packet is lost or the acknowledgment not reached to source within a certain period of ...

11

Cisco Packetized Voice And Data Integration pdf

Cisco Packetized Voice And Data Integration pdf

... low-speed data traffic, and have a 56-kbps port speed with 32-kbps CIR on their PVCs back to the ...of data and use a 256-kbps port speed with 128-kbps ...the data remote sites. Frame-relay ...

346

Analysis Of Network Traffic Characteristics:End-To-End Performance On The University Intra-Domain Links

Analysis Of Network Traffic Characteristics:End-To-End Performance On The University Intra-Domain Links

... automatic traffic rerouting and could be traced to application mix and user ...campus data centre network [Figure 1.0] consist of packet nodes is one of autonomous decentralized ...a traffic ...

5

BlindBox:  Deep  Packet  Inspection  over  Encrypted  Traffic

BlindBox: Deep Packet Inspection over Encrypted Traffic

... Detection. The middlebox receives the SSL-encrypted traf- fic and the encrypted tokens. The detect module will search for matchings between the encrypted rules and the encrypted tokens using BlindBox Detect (Sec. 3.2). ...

22

Improving Quality-of-Service in LoRa Low-Power Wide-Area Networks through optimized radio resource management

Improving Quality-of-Service in LoRa Low-Power Wide-Area Networks through optimized radio resource management

... (QoS); Data Extraction Rate; Packet Collision Rate; Energy Consumption; Energy Efficiency; N etwork P erformance; P rotocol O verhead; P erformance E valuation; Performance ...

24

Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor Network

Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor Network

... if traffic is ...busy traffic. In this method if the traffic in a system is low then the protocol uses a contention-based CSMA mechanism that provides low delay with scattered transmissions and if ...

5

ASSESSMENT OF THE PROSPECTS OF GLOBAL SYSTEM FOR MOBILE COMMUNICATION (GSM) IN A DEPRESSED ECONOMY (A CASE STUDY OF EKITI STATE)

ASSESSMENT OF THE PROSPECTS OF GLOBAL SYSTEM FOR MOBILE COMMUNICATION (GSM) IN A DEPRESSED ECONOMY (A CASE STUDY OF EKITI STATE)

... The introduction of Global System for Mobile communication (GSM) has positive impacts on the lives of users. This cut across almost every spheres of life ranging from improved state of economy of the user to his ...

8

SDN ENABLED PACKET BASED LOAD-BALANCING (PLB) TECHNIQUE IN DATA CENTER NETWORKS

SDN ENABLED PACKET BASED LOAD-BALANCING (PLB) TECHNIQUE IN DATA CENTER NETWORKS

... The Topology contains Core Switches and Edge Switches to balance the traffic flowing through the network as shown in Figure-3. The controller gathers the information such as links, flows rules, ports statistics ...

7

chapter9_firewalls_IPS.pdf

chapter9_firewalls_IPS.pdf

...  stateful inspection packet firewall tightens rules for stateful inspection packet firewall tightens rules for TCP traffic using a directory of TCP connections. TCP traffic using a di[r] ...

25

Show all 10000 documents...

Related subjects