scholarly journals Characteristics and Temporal Behavior of Internet Backbone Traffic

2018 ◽  
Vol 6 (3) ◽  
pp. 1-8 ◽  
Author(s):  
Artan Salihu ◽  
Muharrem Shefkiu ◽  
Arianit Maraj

With the rapid increase demand for data usage, Internet has become complex and harder to analyze. Characterizing the Internet traffic might reveal information that are important for Network Operators to formulate policy decisions, develop techniques to detect network anomalies, help better provision network resources (capacity, buffers) and use workload characteristics for simulations (typical packet sizes, flow durations, common protocols). In this paper, using passive monitoring and measurements, we show collected data traffic at Internet backbone routers. First, we reveal main observations on patterns and characteristics of this dataset including packet sizes, traffic volume for inter and intra domain and protocol composition. Second, we further investigate independence structure of packet size arrivals using both visual and computational statistics. Finally, we show the temporal behavior of most active destination IP and Port addresses.

2020 ◽  
Vol 8 (6) ◽  
pp. 5643-5646

Since last decade, the exponential growth of the internet users and the size of data over the internet is increasing day by day, which lead to increase the complexity of the systems by implementing policies and security to avoid attacks on systems and networks. It is very important to understand and analyses the real time data traffic of the communication systems. The purpose of this paper to design a customized Java based application which enables analysts to capture the traffic at the bottleneck under the mean field communication environment where a large number of devices are communicating with each other. The sending data for further processing for analysis the trend to overcome vulnerabilities or to manage the effectiveness of the communication systems. The proposed application enables to capture 8 different types of protocol traffic such as HTTP, HTTPS, SMTP, UDP, TCP, ICMP and POP3. The application allows for analysis of the incoming/outgoing traffic in the visual to understand the nature of communication networks which lead to improve the performance of the networks with respect to hardware, software, data storage, security and reliability.


Author(s):  
Sampoornam K. P.

This book chapter presents the role of telecommunications network in voice and data transmission. Switching, signaling and transmission are the technologies used to carry out this process. In landline call establishment, calls are routed from subscriber handset to a remote switching unit (RSU), a main switching unit (MSU), and to the internet protocol trunk automated exchange (IPTAX). Then, it is directed to the National Internet Backbone (NIB). On the receiver side, the IPTAX receives this signal from the NIB and directs to it to the MSU and RSU, respectively. The receiver side RSU delivers the information to the destination subscriber. In order to transmit the information from one place to other, it undergoes various process like modulation, demodulation, line coding, equalization, error control, bit synchronization and multiplexing, digitizing an analog message signal, and compression. This chapter also discusses the various services provided by BSNL and agencies governing the internet. Finally, it focuses on the National Internet Backbone facility of BSNL, India.


Author(s):  
Sobana Sikkanan ◽  
Kasthuri M.

The internet is designed for processing and forwarding of any packet in a best effort manner. The packets carried by the internet may be malicious or not. Most of the time, internet architecture provides an unregulated path to victims. Denial-of-service (DoS) attack is the most common critical threat that causes devastating effects on the internet. The Botnet-based DoS attack aims to exhaust both the target resources and network bandwidth, thereby making the network resources unavailable for its valid users. The resources are utilized by either injecting a computer virus or flooding the network with useless traffic. This chapter provides a systematic analysis of the causes of DoS attacks, including motivations and history, analysis of different attacks, detection and protection techniques, various mitigation techniques, the limitations and challenges of DoS research areas. Finally, this chapter discusses some important research directions which will need more attention in the near future to guarantee the successful defense against DoS attacks.


2004 ◽  
pp. 63-77
Author(s):  
Joan E. Ricart-Costa ◽  
Brian Subirana ◽  
Josep Valor-Sabatier

2019 ◽  
Vol 32 (5) ◽  
pp. 253-258
Author(s):  
Riyad B. Abu-Laban ◽  
Sharla Drebit ◽  
Brandy Svendson ◽  
Natalie Chan ◽  
Kendall Ho ◽  
...  

We describe the process undertaken to inform the development of the recently launched British Columbia (BC) Emergency Medicine Network (EM Network). Five methods were undertaken: (1) a scoping literature review, (2) a survey of BC emergency practitioners and EM residents, (3) key informant interviews, (4) focus groups in sites across BC, and (5) establishment of a brand identity. There were 208 survey respondents: 84% reported consulting Internet resources once or more per emergency department shift; however, 26% reported feeling neutral, somewhat unsatisfied, or very unsatisfied with searching for information on the Internet to support their practice. Enthusiasm was expressed for envisioned EM Network resources, and the key informant interviews and focus group results helped identify and refine key desired components of the EM Network. In describing this, we provide guidance and lessons learned for health leaders and others who aspire to establish similar clinical networks, whether in EM or other medical disciplines.


Author(s):  
Ravindra Kumar Singh Rajput ◽  
Dinesh Goyal

Every software application has its own minimum set of requirements like CPU, storage, memory, networking, and power. These have to be integrated into a specific configuration to allow the smooth functioning of the software application. When data traffic becomes higher than expected, higher resources are required. There may not be enough time to provision new resources manually; in such cases, an auto-scaling system is required for managing these situations. Cloud computing means using data, programs, and other resources pooled in the data center and accessed through the internet instead of the user's computer. In the chapter, the authors discussed some aspects related to cloud computing like cloud workload, load balancing, load balancing algorithms, scaling techniques, and auto-scaling to fulfill cloud workload balancing requirements.


Author(s):  
Marios Iliofotou ◽  
Hyun-chul Kim ◽  
Michalis Faloutsos ◽  
Michael Mitzenmacher ◽  
Prashanth Pappu ◽  
...  

2006 ◽  
Vol 29 (18) ◽  
pp. 3957-3969 ◽  
Author(s):  
P. Giacomazzi ◽  
L. Musumeci ◽  
G. Saddemi ◽  
G. Verticale

Sign in / Sign up

Export Citation Format

Share Document