In this work, we present several end-to-end protection switching mechanisms for application in multiprotocol label switching (MPLS). In case of local outages in the network, they deviate the traffic around the failed ...
详细信息
In this work, we present several end-to-end protection switching mechanisms for application in multiprotocol label switching (MPLS). In case of local outages in the network, they deviate the traffic around the failed element over backup paths. They are easy to implement and reduce the additional capacity to maintain the quality of service (QoS) on the backup paths. We study the capacity savings of the presented methods for various protection schemes with different traffic matrices. We further test the influence of different resilience constraints such as the set of protected failure scenarios, bandwidth reuse restrictions due to optical communication, and traffic reduction due to failed border routers.
Engineering a large software project involves tracking the impact of development and maintenance changes on the software performance. An approach for tracking the impact is regression benchmarking, which involves auto...
详细信息
Engineering a large software project involves tracking the impact of development and maintenance changes on the software performance. An approach for tracking the impact is regression benchmarking, which involves automated benchmarking and evaluation of performance at regular intervals. Regression benchmarking must tackle the nondeterminism inherent to contemporary computersystems and execution environments and the impact of the nondeterminism on the results. On the example of a fully automated regression benchmarking environment for the mono open-source project, we show how the problems associated with nondeterminism can be tackled using statistical methods.
The increased need for people and organizations to continue collaborating whilst changing physical location and crossing organizational boundaries has resulted in a wave of new supporting technologies, and generated i...
The increased need for people and organizations to continue collaborating whilst changing physical location and crossing organizational boundaries has resulted in a wave of new supporting technologies, and generated interest in tackling some of the difficult research issues arsing in such a context. The latter was the subject of the Third IEEE International Workshop on distributed and Mobile Collaboration (DMC) at WETICE 2005, summirized here. The DMC Workshop included 10 full papers on topics grouped into four areas: Web-based collaboration, Formal description and consistency checking of collaborative processes, Models and architectures for collaborative services, and P2P collaborative infrastructures. The discussions at the workshop outlined several important issues regarding the field of distributed collaborative applications.
In 2000, the Defense Advanced Research Projects Agency (DARPA) Software-Enabled Control (SEC) program started work on the advancement of control software design and implementation of autonomous vehicles. Using the fix...
详细信息
In 2000, the Defense Advanced Research Projects Agency (DARPA) Software-Enabled Control (SEC) program started work on the advancement of control software design and implementation of autonomous vehicles. Using the fixed-wing and rotary-wing aircraft, the technologies were demonstrated on their autonomous helicopters test-bed in Georgia Tech and University of California (UC) at Berkeley. The same technology was implemented on different platforms, including micro air vehicles and full-size helicopters to achieve the autonomous behavior with a re-usable control software infrastructure.
Among other things, Peer-to-Peer (P2P) systems are very useful for managing large amounts of widely distributed data. distributed Hash Tables (DHT) offer a highly scalable and self-organizing approach for efficient an...
详细信息
Today's markets are characterized by increasing turbulence, which forces industrial companies world wide to become more and more flexible. This flexibility is needed in all levels of industry and especially within...
详细信息
To achieve Quality of Service (QoS) in Next Generation Networks (NGNs), the Differentiated Services architecture implements appropriate Per Hop Behavior (PHB) for service differentiation. Common recommendations to enf...
详细信息
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to determine how to generate realistic workloa...
详细信息
ISBN:
(纸本)1581136730
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to determine how to generate realistic workloads for nIDS performance evaluation. We develop a workload model that appears to provide reasonably accurate estimates compared to real workloads. The model attempts to emulate a traffic mix of different applications, reflecting characteristics of each application and the way these interact with the system. We have implemented this model as part of a traffic generator that can be extended and tuned to reflect the needs of different scenarios. We also present an approach to measuring the capacity of a nIDS that does not require the setup of a full network testbed. security, intrusion detection, workload characterization and generation.
Peer-to-peer (P2P) networks are generally considered to be free havens for pirated content, in particular with respect to music. We describe a solution for the problem of copyright infringement in P2P networks for mus...
详细信息
暂无评论