Gianluca Mardente

Learn More
We focus on the definition and identification of " Web user-sessions " , an aggregation of several TCP connections generated by the same source host on the basis of TCP connection opening time. The identification of a user session is non trivial; traditional approaches rely on threshold based mechanisms, which are very sensitive to the value assumed for the(More)
— We focus on the identification and definition of " Web user-sessions " , an aggregation of several TCP connections generated by the same source host on the basis of TCP connection opening time. The identification of a user session is non trivial; traditional approaches rely on threshold based mechanisms, which are very sensitive to the value assumed for(More)
This paper focuses on the definition and identification of "Web user-sessions", aggregations of several TCP connections generated by the same source host. The identification of a user-session is non trivial. Traditional approaches rely on threshold based mechanisms. However, these techniques are very sensitive to the value chosen for the threshold, which(More)
— We define an analytical approach and a methodology to determine the set of Service Level Agreements (SLA) that can be effectively supported by a DiffServ IP network. We consider the Assured Forwarding (AF) Per Hop Behavior (PHB), and, based on the SLA probabilistic description, we derive a worst-case mathematical formulation for the over-booking(More)
— In this paper we propose several heuristic algorithms that, using MPLS capabilities, provide network operators with a control framework for the routing plane. In particular, a monitoring block collects real-time measurements, such as the link load, and feeds them to a centralized decision block which runs a routing optimization algorithm. The output of(More)
— In this paper we consider a Differentiated Service Domain, in which the domain administrator has to decide if to accept or to reject Service Level Agreements (SLAs) requested by users. After introducing the admission criteria which is used to verify if there are enough resources to satisfy the SLA request, we focus our attention to the problem of the SLA(More)
  • 1