By Topic

Workshop on End-to-End Monitoring Techniques and Services, 2005.

15-15 May 2005

Filter Results

Displaying Results 1 - 21 of 21
  • 3rd IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services (IEEE Cat. No. 05EX1107)

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (524 KB)
    Freely Available from IEEE
  • 3rd IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services

    Publication Year: 2005, Page(s): 0_2
    Request permission for commercial reuse | PDF file iconPDF (189 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Copyright page

    Publication Year: 2005, Page(s): 0_3
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2005, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (191 KB) | HTML iconHTML
    Freely Available from IEEE
  • Workshop co-chairs

    Publication Year: 2005, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Autonomous end to end QoS monitoring

    Publication Year: 2005, Page(s):1 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1846 KB) | HTML iconHTML

    Verifying that each flow in the network satisfies its QoS requirements is one of the biggest scalability challenges in the current DiffServ architecture. This task is usually performed by a centralized allocation entity that monitors the flows' QoS parameters. Efficient detection of problematic flows is even more challenging when considering aggregated information such as the end to end delay suff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Management interface for programmable end-to-end 'data connectivity' provisioning

    Publication Year: 2005, Page(s):17 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1984 KB) | HTML iconHTML

    The paper describes a management-oriented model for cost-effective 'data connectivity' provisioning between the peer entities of a networked multimedia application. The 'connectivity' service provider (SP) may maintain multiple protocol mechanisms to support its clientele: ranging between bandwidth-reserved paths to bandwidth-shared paths. Client applications prescribe the required QoS obligations... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • InTraBase: integrated traffic analysis based on a database management system

    Publication Year: 2005, Page(s):32 - 46
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1929 KB) | HTML iconHTML

    Internet traffic analysis as a research area has attracted lots of interest over the last decade. The traffic data collected for analysis are usually stored in plain files and the analysis tools consist of customized scripts each tailored for a specific task. As data are often collected over a longer period of time or from different vantage points, it is important to keep metadata that describe th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • nCap: wire-speed packet capture and transmission

    Publication Year: 2005, Page(s):47 - 55
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1106 KB) | HTML iconHTML

    With the increasing network speed, it is no longer possible to capture and transmit network packets at wire-speed using general-purpose operating systems. Many companies tried to tackle this problem by manufacturing costly network adapters able to keep up at high network speeds. This paper describes a new approach to wire-speed packet capture and transmission named nCap based on commercial network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An inline measurement method for capacity of end-to-end network path

    Publication Year: 2005, Page(s):56 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3703 KB) | HTML iconHTML

    We previously proposed a new version of TCP, called inline measurement TCP (ImTCP), in Cao Le Thanh Man et al. (2004). The ImTCP sender adjusts the transmission intervals of data packets and then utilizes the arrival intervals of ACK packets for available bandwidth estimation. This type of active measurement is preferred because the obtained results are as accurate as those of other conventional t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of active measurement tools for bandwidth estimation in real environment

    Publication Year: 2005, Page(s):71 - 85
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2370 KB) | HTML iconHTML

    Available bandwidth - as well as capacity or achievable bandwidth - on a path or a link is one of the very important parameters to measure or estimate in a network: it is of high interest for many networking functions (routing, admission and congestion control, load balancing, etc). Active probing techniques provide the easiest and the more flexible approach, for estimating available bandwidth. In... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontimemeasure: a scalable framework for scheduling active measurements

    Publication Year: 2005, Page(s):86 - 100
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4366 KB) | HTML iconHTML

    In order to satisfy and maintain service level agreements (SLAs), which demand high network availability and good network health, ISPs have started instrumenting their networks with network measurement infrastructures (NMIs) that are composed of dedicated measurement servers. Active measurements are frequently used in NMIs to regularly monitor network health and analyze the experience of end-user ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracerouting peer-to-peer networks

    Publication Year: 2005, Page(s):101 - 114
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2162 KB) | HTML iconHTML

    As peer-to-peer (P2P) networks are being developed and deployed on the Internet at a fast pace, the need for a traceroute like mechanism at the application layer surfaces. Such mechanism, once implemented and deployed, will significantly reduce the complexity involved in developing, researching and evolving P2P networks. It will also help users understand how their queries are handled in P2P netwo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing dynamics measurement and detection for next step Internet signaling protocol

    Publication Year: 2005, Page(s):115 - 126
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1356 KB) | HTML iconHTML

    A next step in signaling (NSIS) protocol is currently under standardization by the Internet Engineering Task Force (IETF) to support various applications that need to manipulate control information along the flow path. This paper addresses the NSIS protocol and IP routing interaction problem. We conducted routing measurement experiments to characterize the current Internet path dynamics, and discu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CARENA: a tool to capture and replay Web navigation sessions

    Publication Year: 2005, Page(s):127 - 141
    Cited by:  Papers (2)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2680 KB) | HTML iconHTML

    Web user behavior has widely changed over the last years. To perform precise and up-to-date Web user behavior characterization is important to carry out representative Web performance studies. In this sense, it is valuable to capture detailed information about the user's experience, which permits to perform a fine grain characterization. Two main types of tools are distinguishable: complex commerc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • End-to-end monitoring service for multicast-based high-quality real-time media delivery

    Publication Year: 2005, Page(s):142 - 151
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2212 KB) | HTML iconHTML

    As the demand for high-quality real-time media service through multicast-enabled AG (access grid) increases, the end-to-end QoS (quality of service) provisioning of the media service has become very important. To guarantee the end-to-end QoS, it is essential to monitor the time-varying status of both network (i.e., delay, jitter and loss) and system metrics (i.e., CPU and memory utilization). In t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Utilizing higher order statistics of packet interarrival times for bottleneck detection

    Publication Year: 2005, Page(s):152 - 163
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3205 KB) | HTML iconHTML

    This paper introduces a new approach for determining bottleneck link locations in a network. The considered measurement model is passive monitoring of a backbone link. We analyze the properties of packet interarrival time (PIT) distribution functions of network segments and make decisions whether the extracted properties of a link suggest bottleneck behavior or not. The correlation between bottlen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection and analysis of packet loss on underutilized enterprise network links

    Publication Year: 2005, Page(s):164 - 176
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3470 KB) | HTML iconHTML

    ISPs and enterprises usually overprovision their networks as a means of supporting QoS. In spite of that, the service quality of QoS-sensitive applications such as VoIP, video conferencing and streaming media may not be up to expectations. We believe this is due to sporadic but non-negligible packet losses due to traffic bursts even in underutilized links. Our earlier work attempted to detect and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual dropping for endpoint admission control

    Publication Year: 2005, Page(s):177 - 186
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1306 KB) | HTML iconHTML

    Endpoint admission control is a scalable QoS mechanism that relies on measuring the amount of lost or marked packets of a probing stream before allowing user data flows to enter the network. The existing approaches can be classified based on whether or not they use a separate traffic class for probing traffic, and whether or not they rely on a marking mechanism. Approaches that use a separate traf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.