Timing analysis of rate-constrained traffic in TTEthernet using network calculus.
Luxi ZhaoPaul PopQiao LiJunyan ChenHuagang XiongPublished in: Real Time Syst. (2017)
Keyphrases
- network traffic
- traffic analysis
- network resources
- telecommunication networks
- traffic load
- rate constrained
- internet traffic
- network conditions
- traffic volume
- peer to peer
- traffic data
- transportation networks
- resource utilization
- traffic patterns
- dos attacks
- origin destination
- intrusion detection
- network traffic monitoring
- packet size
- real time
- atm networks
- network monitoring
- network management
- rate distortion
- three dimensional
- neural network
- network layer
- ddos attacks
- network devices
- network configuration
- intrusion detection system