2022
DOI: 10.1109/access.2022.3194115
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Traffic Engineering Considering Service Grade in Integrated Service Network

Abstract: This study proposes a dynamic traffic engineering method to improve network resource utilization efficiency without affecting important services in an integrated service network where multiple grades of service are accommodated. Network resource utilization is biased over time because future fluctuations in traffic demand are unpredictable. Although a service network provider prefers to re-optimize network resource utilization using a dynamic traffic engineering, it is often superfluous for users who do not wa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(15 citation statements)
references
References 37 publications
0
15
0
Order By: Relevance
“…Once individual flows are observed in fine-grained by the Fast xFlow Proxy, an analysis of whether the current behavior of the flow is similar compared to its normal state can be performed. We demonstrated that this simple autoregressive analysis based on correlation values can detect anomalies with high accuracy [4].…”
Section: Introductionmentioning
confidence: 89%
See 1 more Smart Citation
“…Once individual flows are observed in fine-grained by the Fast xFlow Proxy, an analysis of whether the current behavior of the flow is similar compared to its normal state can be performed. We demonstrated that this simple autoregressive analysis based on correlation values can detect anomalies with high accuracy [4].…”
Section: Introductionmentioning
confidence: 89%
“…We proposed the Fast xFlow Proxy, which enables finegrained measurement of flows in large-scale wide-area IP networks [3], and devised an algorithm to detect anomalies such as service failures and rapid increases in traffic caused by cyber-attacks [4]. The results from flow measurement protocols are usually presented as macroflows superimposed of various communication flows.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, efficient methods based on probabilistic data structures have been proposed, such as flow radar [12] using a Bloom filter, MV-sketch [13] using a count-min sketch structure, and HashFlow [14], which identifies elephant flows and focuses on their observations. By observing communication flows using these methods, network operators can properly assess service failures or apply traffic engineering [5] to their networks.…”
Section: Time-series Traffic Analysismentioning
confidence: 99%
“…5(d), the anomaly is difficult to detect because it occurs only in a portion of the observed traffic. Using this time-series traffic data as input, the correlation was computed as an evaluation index using (5) in Section IV.B. noise components at the rates of 1%, 5%, and 30%, respectively.…”
Section: A Aims and Conditionsmentioning
confidence: 99%
See 1 more Smart Citation