GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)
DOI: 10.1109/glocom.2003.1258932
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of ADSL traffic on an IP backbone link

Abstract: Measurements from an Internet backbone link carrying TCP traffic towards different ADSL areas are analyzed in this paper. For traffic analysis, we adopt a flow based approach and the popular mice/elephants dichotomy. The originality of the experimental data reported in this paper, when compared with previous measurements from very high speed backbone links, is in that commercial traffic comprises a significant part generated by peer-to-peer applications. This kind of traffic exhibits some remarkable properties… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(27 citation statements)
references
References 10 publications
0
27
0
Order By: Relevance
“…It permits traffic from the trusted location to untrusted locations and it does not need any external configuration. The main purpose of firewall is maintaining the untrusted or non-requested users from accessing our computers [6]. A firewall may be a software or hardware and it is normally placed at the network with the range and safeguards the incoming and outgoing connections.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It permits traffic from the trusted location to untrusted locations and it does not need any external configuration. The main purpose of firewall is maintaining the untrusted or non-requested users from accessing our computers [6]. A firewall may be a software or hardware and it is normally placed at the network with the range and safeguards the incoming and outgoing connections.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Often r plays the role of the access rate, see for instance Ben Fredj et al [5]; supported by extensive measurements D is often assumed to have a power-law tail, see for instance Crovella and Bestavros [2]. We also refer to the detailed study by Ben Azzouna et al [7] and the references therein.…”
Section: B M/g/∞ Trafficmentioning
confidence: 99%
“…Note that we have focused on traffic from and to the access network (that is, to and from the core network (Internet), respectively), i.e., traffic that is sent over the 'uplink'. LAN traffic as well as backbone traffic, has been subject of various other studies, see e.g., [1], [7].…”
Section: Test Casesmentioning
confidence: 99%
See 2 more Smart Citations