259,567 research outputs found

    Multi-path Probabilistic Available Bandwidth Estimation through Bayesian Active Learning

    Full text link
    Knowing the largest rate at which data can be sent on an end-to-end path such that the egress rate is equal to the ingress rate with high probability can be very practical when choosing transmission rates in video streaming or selecting peers in peer-to-peer applications. We introduce probabilistic available bandwidth, which is defined in terms of ingress rates and egress rates of traffic on a path, rather than in terms of capacity and utilization of the constituent links of the path like the standard available bandwidth metric. In this paper, we describe a distributed algorithm, based on a probabilistic graphical model and Bayesian active learning, for simultaneously estimating the probabilistic available bandwidth of multiple paths through a network. Our procedure exploits the fact that each packet train provides information not only about the path it traverses, but also about any path that shares a link with the monitored path. Simulations and PlanetLab experiments indicate that this process can dramatically reduce the number of probes required to generate accurate estimates

    Performance Evaluation of Optimized Predictive Model for Software Defined Network Traffic Management using Machine Learning

    Get PDF
    Communication channel is essential in any type of engagement for delivering and receiving data via the internet. To determine the most efficient and safe way through which network data may travel while minimizing the danger of network breaches or cyber-attacks. The objective is to build an optimized network traffic management predictive model that can predict the ideal path in real-time while accounting through the dynamic nature of software defined network traffic and the continuously changing danger of landscaping. To design a robust model of the data and scalable system that can suggest accurate suggestions of route to the network managers, a thorough grasp of network’s infrastructure, data analysis, and machine learning techniques are applied. Choosing the optimum path route data from the sdn based network traffic dataset, the model suggests an optimal path to avoid network communication traffic and congestion. Here nine Machine Learning algorithms are explored and analysed their performance by using the percentage split, resampling and cross validation which originally recorded as 92.76% and after training with cross validation it improved to 98.40% providing the best optimal path with minimum congestions. Building the optimized network traffic management model not only provide network security but also contribute to environmental sustainability. Their capacity to properly filter and manage network traffic helps to decrease energy usage by predicting the optimal routes for software defined network traffic

    Communication Over a Wireless Network With Random Connections

    Get PDF
    A network of nodes in which pairs communicate over a shared wireless medium is analyzed. We consider the maximum total aggregate traffic flow possible as given by the number of users multiplied by their data rate. The model in this paper differs substantially from the many existing approaches in that the channel connections in this network are entirely random: rather than being governed by geometry and a decay-versus-distance law, the strengths of the connections between nodes are drawn independently from a common distribution. Such a model is appropriate for environments where the first-order effect that governs the signal strength at a receiving node is a random event (such as the existence of an obstacle), rather than the distance from the transmitter. It is shown that the aggregate traffic flow as a function of the number of nodes n is a strong function of the channel distribution. In particular, for certain distributions the aggregate traffic flow is at least n/(log n)^d for some d≫0, which is significantly larger than the O(sqrt n) results obtained for many geometric models. The results provide guidelines for the connectivity that is needed for large aggregate traffic. The relation between the proposed model and existing distance-based models is shown in some cases

    Defending Tor from Network Adversaries: A Case Study of Network Path Prediction

    Full text link
    The Tor anonymity network has been shown vulnerable to traffic analysis attacks by autonomous systems and Internet exchanges, which can observe different overlay hops belonging to the same circuit. We aim to determine whether network path prediction techniques provide an accurate picture of the threat from such adversaries, and whether they can be used to avoid this threat. We perform a measurement study by running traceroutes from Tor relays to destinations around the Internet. We use the data to evaluate the accuracy of the autonomous systems and Internet exchanges that are predicted to appear on the path using state-of-the-art path inference techniques; we also consider the impact that prediction errors have on Tor security, and whether it is possible to produce a useful overestimate that does not miss important threats. Finally, we evaluate the possibility of using these predictions to actively avoid AS and IX adversaries and the challenges this creates for the design of Tor

    A tutorial on recursive models for analyzing and predicting path choice behavior

    Full text link
    The problem at the heart of this tutorial consists in modeling the path choice behavior of network users. This problem has been extensively studied in transportation science, where it is known as the route choice problem. In this literature, individuals' choice of paths are typically predicted using discrete choice models. This article is a tutorial on a specific category of discrete choice models called recursive, and it makes three main contributions: First, for the purpose of assisting future research on route choice, we provide a comprehensive background on the problem, linking it to different fields including inverse optimization and inverse reinforcement learning. Second, we formally introduce the problem and the recursive modeling idea along with an overview of existing models, their properties and applications. Third, we extensively analyze illustrative examples from different angles so that a novice reader can gain intuition on the problem and the advantages provided by recursive models in comparison to path-based ones
    • …
    corecore