Random early detection gateways for congestion avoidance
IEEE/ACM Transactions on Networking (TON)
The macroscopic behavior of the TCP congestion avoidance algorithm
ACM SIGCOMM Computer Communication Review
Modeling TCP throughput: a simple model and its empirical validation
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Explicit allocation of best-effort packet delivery service
IEEE/ACM Transactions on Networking (TON)
Understanding and improving TCP performance over networks with minimum rate guarantees
IEEE/ACM Transactions on Networking (TON)
Dynamics of IP traffic: a study of the role of variability and the impact of control
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Promoting the use of end-to-end congestion control in the Internet
IEEE/ACM Transactions on Networking (TON)
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites
Proceedings of the 11th international conference on World Wide Web
Controlling high bandwidth aggregates in the network
ACM SIGCOMM Computer Communication Review
Realizing Throughput Guarantees in a Differentiated Services Network
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
How to Make Assured Service More Assured
ICNP '99 Proceedings of the Seventh Annual International Conference on Network Protocols
A scalable monitoring approach for service level agreements validation
ICNP '00 Proceedings of the 2000 International Conference on Network Protocols
Multicast-based inference of network-internal loss characteristics
IEEE Transactions on Information Theory
On detecting service violations and bandwidth theft in QoS network domains
Computer Communications
The use of end-to-end multicast measurements for characterizing internal network behavior
IEEE Communications Magazine
OCGRR: A New Scheduling Algorithm for Differentiated Services Networks
IEEE Transactions on Parallel and Distributed Systems
Management of Digital Video Broadcasting services in open delivery platforms
International Journal of Mobile Communications
SLA-based complementary approach for network intrusion detection
Computer Communications
Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse
Journal of Network and Systems Management
A Study on Adaptive Time Token Priority-Based Queuing Scheme
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Increased performance, fairness, and security remain important goals for service providers. In this work, we design an integrated distributed monitoring, traffic conditioning, and flow control system for higher performance and security of network domains. Edge routers monitor (using tomography techniques) a network domain to detect quality of service (QoS) violations--possibly caused by underprovisioning--as well as bandwidth theft attacks. To bound the monitoring overhead, a router only verifies service level agreement (SLA) parameters such as delay, loss, and throughput when anomalies are detected. The marking component of the edge router uses TCP flow characteristics to protect 'fragile' flows. Edge routers may also regulate unresponsive flows, and may propagate congestion information to upstream domains. Simulation results indicate that this design increases application-level throughput of data applications such as large FTP transfers; achieves low packet delays and response times for Telnet and WWW traffic; and detects bandwidth theft attacks and service violations.