• No results found

Passive application network traffic in terms of utilized re-

Exploring the Translation Strategies Utilized for the Rendition of Economic Terms from English into Persian

Exploring the Translation Strategies Utilized for the Rendition of Economic Terms from English into Persian

... in terms of frequency of use, the ranks of all four translation procedures was the same from one Lexicographer to the ...procedure utilized by all three Lexicographers was literal translation, followed by ...

17

Using Passive Traces of Application Traffic in a Network Monitoring System

Using Passive Traces of Application Traffic in a Network Monitoring System

... monitor network traffic to verify the operation of network protocols and to charac- terize application traffic ...a network tap that sits at the link device layer and collects ...

10

Using Passive Traces of Application Traffic in a Network Monitoring System

Using Passive Traces of Application Traffic in a Network Monitoring System

... monitor network traffic to verify the operation of network protocols and to charac- terize application traffic ...a network tap that sits at the link device layer and collects ...

10

Comparing Passive Network Monitoring of Grid Application Traffic with Active Probes

Comparing Passive Network Monitoring of Grid Application Traffic with Active Probes

... and passive monitoring tech- niques to reduce the need for intrusive measurements with- out sacrificing the accuracy of the ...Wren network measurement system that will reduce the burden on the ...

8

Network State Estimation Via Passive Traffic Monitoring

Network State Estimation Via Passive Traffic Monitoring

... software application, like FTP, to send data between two computers, the application layer hands data off to the transport ...the network layer, where an IP (Internet Protocol) header is ...the ...

134

LOBSTER: A European Platform for Passive Network Traffic Monitoring

LOBSTER: A European Platform for Passive Network Traffic Monitoring

... an application for network traffic ...of network traffic we use three different approaches for different kind of ...the application message for applications-specific protocol ...

10

An Infrastructure for Passive Network Monitoring of Application Data Streams

An Infrastructure for Passive Network Monitoring of Application Data Streams

... 5.1 Packet Capture Host Issues Our currently deployed packet capture hosts are based on FreeBSD with a SuperMicro 370DL motherboard with a single P-III Xeon 933MHz CPU, PCI 64bit/66MHz IO bus, 133 MHz DIMMs, and two ...

8

Appmon: An Application for Accurate per Application Network Traffic Characterization

Appmon: An Application for Accurate per Application Network Traffic Characterization

... of traffic categorization for effective network management and traffic engineering and aiming at gaining a better understanding of Internet traffic, we have developed appmon, a passive ...

6

Appmon: An Application for Accurate Per-Application Network Traffic Characterization

Appmon: An Application for Accurate Per-Application Network Traffic Characterization

... documented application level protocols that operate through well known control ports, but use a dynamically assigned ports for data ex- ...in passive FTP, control messages are exchanged through port 21, but ...

82

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems

... Active network measurement often collects IP address, transportation port, request port and sharing resources of other nodes, as well as topology structure, packet delay, upload speed and download speed of P2P ...

5

Can Passive Mobile Application Traffic be Identified using Machine Learning Techniques

Can Passive Mobile Application Traffic be Identified using Machine Learning Techniques

... IP traffic classification system must be capable of running in real-time on a live ...real-time traffic classification the ML system must be lean, for example, the system must meet the following ...

105

Application of network traffic flow model to road maintenance

Application of network traffic flow model to road maintenance

... NTFM Traffic flow complexity is introduced through the use of junction sub-models, when separate lanes are modelled on the road links and the flow capacity and the capacitance on each lane are considered, instead ...

17

Application of network traffic flow model to road maintenance

Application of network traffic flow model to road maintenance

... NTFM Traffic flow complexity is introduced through the use of junction sub-models, when separate lanes are modelled on the road links and the flow capacity and the capacitance on each lane are considered, instead ...

18

The Application of Cluster Analysis for Division of the Territory of Poland into Homogenous Groups in Terms of Traffic

The Application of Cluster Analysis for Division of the Territory of Poland into Homogenous Groups in Terms of Traffic

... road network (increasing the density of freeways and expressways from ...road network system and perform critical role for road ...Daily Traffic (AADT) which represents the average number of vehicles ...

5

Towards an SDN network control application for differentiated traffic routing

Towards an SDN network control application for differentiated traffic routing

... the network is completely unloaded, all links have the same cost, ...VoIP traffic corresponds to the shortest path in terms of number of hops from H 1 to H 5 ...the network links costs shown ...

6

Popular backup/archival service and its application for the archival of the network traffic in the academic network PIONIER

Popular backup/archival service and its application for the archival of the network traffic in the academic network PIONIER

... data traffic can be distributed among ...in terms of storage space and number of files stored in the system increases with growing number of the Storage Nodes and storage devices (disk arrays, tape system ...

9

Introduction to Passive Network Traffic Monitoring

Introduction to Passive Network Traffic Monitoring

... A managed device is a node that has an SNMP agent and resides on a managed network. These devices can be routers and access servers, switches and bridges, hubs, computer hosts, or printers. An agent is a software ...

31

Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,

Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,

... the network, packet payloads need to be ...to network level data with added ...of network traffic by helping to identify the types of services available on a network and if they are ...

7

Issues in the Passive Approach of Network Traffic Monitoring

Issues in the Passive Approach of Network Traffic Monitoring

... during network traffic monitoring performed by the passive approach of ...of network traffic, which are usually measured during their monitoring, as well as different approaches for the ...

6

Index Terms:- Mobile Phone Network, Traffic Congestion, Urban Traffic Network.

Index Terms:- Mobile Phone Network, Traffic Congestion, Urban Traffic Network.

... The description of the sections of the research paper: The Section-I of this research paper is the introduction about the UTN and MPN. The GSM network has been discussed in brief at Section-II. Description of few ...

6

Show all 10000 documents...

Related subjects