2012 IEEE Symposium on Wireless Technology and Applications (ISWTA) 2012
DOI: 10.1109/iswta.2012.6373866
|View full text |Cite
|
Sign up to set email alerts
|

Bandwidth gain analysis for HTTP and HTTPs traffic on IP based network

Abstract: This paper presented a bandwidth gain analysis on HTTP and HTTPs traffic in an IP Based network. A framework model to run the analysis has been setup which caters about 40 thousand concurrent users to the internet that included wired and wireless access users in a university. All traffic flow to one access Virtual Local area Network (VLAN) is configured. Five bandwidth collectors (BC) are setup in the running framework. Network traffic then is filtered according to the identified policies that are based on typ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
2
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…The main purpose of this study was to offer network/system administrators a clear answer or approach to some of the problems that insured institutions encounter in properly managing their bandwidth. M. Kasim et al [10] discuss network bandwidth management, which is one of the issues now facing computer engineering applications and systems. An in-depth analysis of published articles is provided in order to delve deeper into the IP-based network, which is an important field of study for network capacity control.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The main purpose of this study was to offer network/system administrators a clear answer or approach to some of the problems that insured institutions encounter in properly managing their bandwidth. M. Kasim et al [10] discuss network bandwidth management, which is one of the issues now facing computer engineering applications and systems. An in-depth analysis of published articles is provided in order to delve deeper into the IP-based network, which is an important field of study for network capacity control.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The assumption in this work is that the traffic demand is log-normally distributed (as it has been shown in [27,28] that the Internet traffic demand can be described by this distribution that exhibits skewness (asymmetric bandwidth demand) and long-tails (high expected-to peak-rate ratio)). It is also assumed that historical traffic demand information is available for several source-destination pairs (connections) and that each connection can be described by its own traffic demand distribution.…”
Section: Traffic Modelingmentioning
confidence: 99%
“…Several works in the literature [23]- [26] addressed precisely this problem, where authors examined several spectrum assignment policies for timevarying traffic that included spectrum reduction/expansion and re-allocation. This work examines the attack-aware RSA (Aa-RSA) problem when the traffic demand is stochastic and varies with time [27,28]. The objective is to minimize the interactions among lightpaths in order to minimize the crosstalk effect and thus minimize the impact of a jamming attack.…”
Section: Introductionmentioning
confidence: 99%
“…In general, bandwidth management is a process of implementing various techniques, technologies, tools and policies to control and measure the rate of data transmission in a network [3]. It is the amount of data that can be carried from one point to another in a given period (bits per second) that running on the network layer in allocating its resources to critical applications on a network [4]. Bandwidth management is needed for network capacity to improve the performance of Internet connectivity with the most efficient use of its bandwidth resources.…”
Section: Introductionmentioning
confidence: 99%
“…Bandwidth management is needed for network capacity to improve the performance of Internet connectivity with the most efficient use of its bandwidth resources. Otherwise, this unmanaged bandwidth will cause certain applications or users to take control of all available bandwidth and prevent others from using the network [4].…”
Section: Introductionmentioning
confidence: 99%