Agent-based Simulation Study of Behavioral Anticipation: Anticipatory Fault Management in Computer Networks

Size: px
Start display at page:

Download "Agent-based Simulation Study of Behavioral Anticipation: Anticipatory Fault Management in Computer Networks"

Transcription

1 Agent-based Simulation Study of Behavioral Anticipation: Anticipatory Fault Management in Computer Networs Avdhoot Saple M&SNet: AMSL (The Auburn Modeling and Simulation Laboratory) Computer Science and Software Engineering Auburn University Auburn, AL, USA Levent Yilmaz M&SNet: AMSL (The Auburn Modeling and Simulation Laboratory) Computer Science and Software Engineering Auburn University Auburn, AL, USA ABSTRACT Networ fault management is concerned with the detection, isolation, and correction of anomalous conditions that occur in a computer networ. Present state of art in fault management classifies existing methodologies into two main categories: reactive rule based approaches and intelligent monitoring systems. In this paper we explore the concept of anticipatory behavior to develop an intelligent agent-based networ management model, which uses an anticipatory agent to proactively detect occurrence of faults using a predictive model pertaining to networ performance. To compare the effectiveness of the anticipatory technique, we build a simulation model of a networ using the DEVS framewor. Two reactive rule based fault management strategies are compared against the anticipatory approach. Results of the comparative analysis are presented to demonstrate the potential of the anticipatory technique in detecting networ anomalies. Categories and Subject Descriptors I.6.5 [Simulation and Modeling]: Model Development modeling methodologies. General Terms Measurement, Performance, Design, Experimentation. Keywords Intelligent agents, anticipatory agents, simulation, DEVS. 1. INTRODUCTION Networ fault management [8] entails the detection, isolation, and correction of anomalous conditions that occur in a networ. Fault management can be decomposed into three subtass: Permission to mae digital or hard copies of all or part of this wor for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ACM SE 06, March, 10-12, 2006, Melbourne, Florida, USA Copyright /06/0004 $5.00 fault identification [4], fault diagnosis [1], and fault remediation. Fault identification involves detecting deviation from normal behavior followed by identification of its nature, whereas fault diagnosis involves determining the root cause of the identified problem. Fault remediation is the formulation of a course of action that addresses the problem. All three stages of fault management involve reasoning and decision maing based on information about current and past states of the networ. Anticipatory fault management entails a novel approach of designing agents the precepts of which are based on the premise of anticipatory systems [9]. An anticipatory agent has a model of itself, and it uses this model to predict the future state. The predictions are then utilized to determine agent s behavior. An anticipatory agent is thus an entity which uses the nowledge of predicted future states to decide what action to be taen in the present. Our strategy consists of comparison of an anticipatory technique with two widely popular techniques: reactive rule based strategy and alarm correlation approach. We compare the three techniques based on the following networ performance metrics: throughput, turnaround time, and the drop rate of pacets. To facilitate the experiment, a simulation model of a computer networ is developed using the DEVS modeling and simulation framewor. Reactive and anticipatory agents are embedded into the networ for networ fault management. The reactive agent operates on a simple rule based engine that detects faults based on predefined fuzzy rule-base. We use a Naïve Bayesian classifier as part of the anticipatory agent. The Bayesian classifier acts as a predictive model for the anticipatory agent to facilitate prediction of faults based on past data. Our findings indicate that anticipatory fault management performs significantly better than the reactive and alarm correlation techniques under the experimental conditions the model is tested. The rest of the paper is organized as follows. Section 2 surveys the present state of art in fault management of computer networs. The design of anticipatory systems is described in section 3. In section 4, we discuss the agent based modeling of reactive and anticipatory control in computer networs. We describe the simulation and experimentation design followed by results in section 5 and 6, respectively. In section 7, we discuss open issues as well as planned future wor.

2 2. FAULT MANAGEMENT IN COMPUTER NETWORKS Various techniques such as machine learning [5] and state space modeling [10] are used for fault management. A fault is defined as a malfunction in some component of the networ, either hardware or software. At an abstract level, fault identification can be devised as a function, I, with inputs and outputs. The input to the function is a description of networ state, S, and the output is a set of hypothesis, H, concerning the existence of n different faults. Each hypothesis may specify the indications in S of the corresponding fault and may contain diagnosis information. That is, identification and diagnosis are rarely totally decoupled. Fault identification, therefore is a process of function that maps from networ states to fault hypothesis: I: S H Different approaches to fault identification define S in a distinct manner [8]. 2.1 Rule based approaches Early wor in the area of fault or anomaly detection is based on expert systems. In expert systems, an exhaustive database containing the rules of behavior of the faulty system is used to determine fault occurrence by matching predefined rules of networ anomalies. However, rule based systems are not only often slow for real time applications, but also depend on prior nowledge about the fault conditions of the networ. The identification of faults depends on symptoms that are specific to a particular manifestation of a fault. Examples of these symptoms are excessive utilization of bandwidth, number of open TCP connections, total throughput exceeded etc. [12]. An expert system model using fuzzy cognitive maps (FCMs) [7] can be used to obtain an intelligent modeling of the propagation and interaction of networ faults. 2.2 correlation using State Machines A fault is a disorder occurring in the managed networ. Faults happen within the managed networs while alarms are external manifestations of faults [10]. Finite state machines model alarm sequences that occur during and prior to fault events. For instance, a probabilistic finite state machine model is built for a nown networ fault using historical data [6]. State machines are designed with the intention of not just detecting an anomaly but also possibly identifying and diagnosing the problem. The sequences of alarms obtained from the different points in the networ are modeled as states of a finite state machine. The alarms are assumed to contain information such as the device name as well as the symptom and time of occurrence. The transitions between the states are measured using prior events [4], [10], [2]. 2.3 Pattern Matching This approach describes anomalies as deviations from normal behavior and attempts to deal with the variability in the networ environment [3]. Online learning is used to build a traffic profile for a given networ. Traffic profiles are built using symptom specific feature vectors such as lin utilization, pacet loss and number of collisions. 2.4 Statistical Analysis As the networ evolves, each of the methods described above require significant recalibration or retraining. However, using statistical approaches [12], it is possible to continuously trac the behavior of a networ. Statistical analysis has been used to detect both anomalies corresponding to networ failures [11] as well as networ intrusions. Each of these failure scenarios differ in their manifestations as well as their characteristics. Thus, it is necessary to obtain a rich set of networ information that could cover a wide variety of networ operations. 3. ANTICIPATORY SYSTEMS Anticipation is an important characteristic of intelligence. Proactive behavior requires anticipatory abilities. A seminal wor on anticipatory systems is the one written by Rosen [9]. A brief introduction to and serious concerns about anticipation follows: Strictly speaing, an anticipatory system is one in which present change of state depends upon future circumstances, rather than merely on the present or past. As such, anticipation has routinely been excluded from any ind of systematic study, on the grounds that it violates the causal foundation on which all of theoretical science must rest, and on the grounds that it introduces a telic element which is scientifically unacceptable. Nevertheless, biology is replete with situations in which organisms can generate and maintain internal predictive models of themselves and their environments, and utilize the predictions of these models about the future for purpose of control in the present. Many of the unique properties of organisms can really be understood only if these internal models are taen into account. Thus, the concept of a system with an internal predictive model seemed to offer a way to study anticipatory systems in a scientifically rigorous way" [9]. Perception ability is a required characteristic of agents. Hence, they can be designed to perceive current state of self and others. They can also be designed to create current image(s) of future state(s). Perception requires mechanisms that enable interpretive capabilities. Perception invariably involves sensory qualities, and introspection entails accessing sensations and perceptions the agent would introspect. Perceptions are derived as a result of interpretation of sensory inputs within the context of the current world and agent s self model. The prototype inference, orientation accounting, and situational classification mechanisms could be used to realize the interpretation capabilities of an agent. The interpretation process results in perceptions. An anticipatory agent needs to deliberate upon perceptions through introspection and reflection to anticipate. Figure 1. Basic Components for Anticipatory Agents

3 Introspection is deliberate and attentive because higher-order intentional states are themselves attentive and deliberate. An introspective agent should have access mechanisms to its internal representation, operations, behavioral potentials, and beliefs about its context. Reflection uses the introspective mechanisms to deliberate its situation in relation to the embedding environmental context. These features collectively result in anticipation capabilities that orient and situate an agent for accurate future projections. Figure 1 presents interpretation and introspection as critical components within the micro-architecture of an anticipatory agent. Due to lac of space, in section 4.3, we only provide a brief synopsis of the type of the predictive model used in our wor. 4. AGENT-BASED MODELING OF REACTIVE AND ANTICIPATORY CONTROL The overall architecture of the simulation is primarily composed of the following components (see Figure 2). Networ model: The first component is a basic model of a typical computer networ. The networ model is the basis of the design and experimentation of the fault management techniques. The networ model is designed on a simulation framewor and comprises of basic networ components that would include switches, routers, hosts, and lins. Figure 2. Reactive and Anticipatory Control Monitoring layer: The monitoring layer comprises of multiple monitoring agents that are embedded over individual networ components or on a group of components. (Eg: a monitoring agent is allocated for each subnet). The monitoring agents may have disjoint functions or potentially overlapping responsibilities for increased reliability. Management layer: The management layer comprises of the reactive or the anticipatory agents according to the technique being used. The reactive agent wors on a general rule based approach (if then else). It interprets the data acquired from the monitoring agents and communicates with the control layer to tae corrective action [9]. Control layer: The control layer is responsible for carrying out corrective action with respect to the information it gets from the management layer. 4.1 DEVS Networ model The Networ model is developed in the DEVS (Discrete Event System Specification) formalism. A brief description of the simulated networ components is as follows: Lins: Simulation of lins is carried out on crucial connections in the networ. A lin is looed upon as a processor and its overloading is simulated as the increase in processing time of the processor Switch: A switch forms a connection between different subnets to facilitate forwarding of pacets among them. Router: A router follows certain routing algorithms for forwarding of pacets among hosts. We use the Distance Vector routing strategy, by which the pacets are forwarded to the best nown distance to each destination (the distance is measured in terms of processing time of hosts). Hosts: Hosts are entities that process jobs or payload. They can be networ clients, servers, printers, plotters etc. Monitoring agents: The monitoring agents record performance metrics lie networ throughput, latency and the pacet drop rate. It reports this data to the management layer where the reactive agents infer them as rules and the anticipatory agent updates its predictive model. Management agents: The management agents are the reactive and the anticipatory agents. They receive data from the monitoring agents and induce the control agent to tae respective action. 4.2 Reactive Agents Fuzzy reactive agents are used in the determination of the proneness of failure. The antecedent variables (one or more variables that represent the conditions to be met before any conclusion can be made) are the Throughput and Latency. The consequents which are set of output (proneness of failure or state) for each of the networ components. A sample set of fuzzy rules that are comprised in the reactive agent for a networ component (for instance, a host) can be outlined as follows: If Throughput = High and Latency = Low, Fault_proneness = Low If Throughput = Moderate and Latency = Low, Fault_proneness = Low If Throughput = Low and Latency = Low, Fault_proneness = moderate If Throughput = High and Latency = Moderate, Fault_proneness = Low If Throughput = Moderate and Latency = Moderate, Fault_proneness = Moderate If Throughput = Low and Latency = Moderate, Fault_proneness = Moderate 4.3 Anticipatory Agents The architectural framewor of the Anticipatory agent, shown in Figure 1, consists of a predictive model and an anticipator.

4 Table 1. Sample set of evidence to be processed by the Naïve Bayesian Classifier Obs. Networ Subnet1 Subnet2 Router1 Host1 Host2 Host3 Router2 Host4 Host5 Host6 No 1 High High Normal No Yes No Yes No No No No 2 High High Normal Yes Yes No No No No No No 3 Normal Normal High No No No No Yes No No No 4 Normal Normal Normal No Yes No Yes No No No No 5 High High High Yes No Yes No Yes No No Yes 6 Normal Normal Normal No No No No No No No No 7 High Normal High No No No No No Yes No No 8 Normal High Normal No No No Yes No No No No 9 Normal High Normal No Yes No No No No No No 10. Normal Normal High No No No No No No Yes No 11. High High High No Yes No Yes No Yes No No 12. High High Normal Yes Yes No No No No No No 13. Normal High Normal No No No No No No No No 14. High Normal High No No No No Yes No No Yes We mae use of a Naïve Bayesian Classifier for constructing the predictive model of the anticipatory agent. The strength of the Naïve Bayesian Classifier is that it provides a theoretical framewor for combining statistical data with the prior nowledge about the problem domain for maing future projections. The following example shows how a fault is detected by the anticipatory agent by maing use of the Naïve Bayesian classifier. Consider the sample of evidence specified in Table 1. The Networ taes value High if there is abnormality above a certain threshold in a single or both the subnets and is Normal otherwise. The subnet 1 and subnet 2 tae value High if any of the component in the respective subnets have failed and is Normal otherwise. The probability that there can be a fault in host 1 provided we have evidence that subnet 1 is high is given by p(host1 = yes Subnet1 = High) = (# of times Host1= yes & Subnet1= High) / (# of times Sunbet1 = High) = 5 / 8 Similarly the probability that there can be a fault in host 1 provided we have evidence that subnet 1 is high and networ is high is given by p(host1 = yes Sunbet1= High, Networ = high) = (# of times Host1 = yes & Subnet1 = high & Networ = high) / (# of times Subnet1 = High & Networ = High) = 4/5 But the number of conditional probabilities in a data set can be very high. The Naïve Bayesian classifier model states that Result = arg max C [ p( C ) Πp( A C )], where p(a i C ) = (# of A C ) / (# of C ) It can be illustrated by the following example. Suppose we are given that (subnet1 = High, and Networ = High) and we need to now if there is a fault on host 1? From the above Naïve Bayesian Classifier equation: Result (host1 =yes) = p (Host1 = Yes) * p (Subnet = High Host1 = Yes) * p (Networ = High Host1 = Yes) = (6/14)*(1)*(3/6) = Result (host1 =no) = p (Host1 = No) * p (Subnet = High Host1 = No) * p (Networ = High Host1 = No) = (8/14)*(3/8)*(3/8) = Hence we see that Result (host1 =yes) > Result (host1 =no), and hence the predictive model predicts the potential of fault in host 1. The Anticipator thereby notifies the control layer to tae respective corrective action for host 1. Note that, the set of evidence to the Bayesian classifier is continuously updated according to the events taing place in the networ. After a fixed interval of time (say 5 time units), the classifier computes the result (Result = arg max C[ p( C ) Π p( Ai C )]) based on the state of the components at that time instant. 5. SIMULATION DESIGN The DEVS-based networ model comprises two subnets. Each subnet includes a router and 3 hosts. An experimental frame i i

5 generates the pacets to be processed by the networ components on the basis of a specific inter-arrival time. A fault injection mechanism is also embedded in the experimental frame which generates fault pacets at a random rate. A fault pacet when encountered by a networ component, induces a certain level of degradation in the throughput and latency of the component. The intervals obtained for the reactive vs. alarm correlation technique for all the three parameters comprises of zero. Hence the difference between their means is not statistically significant. Monitoring agents are deployed throughout the networ over each of the networ components to record the performance metrics (throughput, latency and the drop rate) throughout the simulation. The throughput is defined as the average rate of job departures from the architecture, estimated by the number of jobs processed during the observation interval, divided by the length of the interval. A job s turnaround time is the length of time between its arrival to the processor and its departure as a completed job. The drop rate of pacets is defined as the percentage of pacets dropped due to networ faults. A sample screen shot of the DEVS environment is shown in figure 3. The model is comprised of 2 subnets with each of the subnet comprising of networ components (routers and hosts). 6. SIMULATION RESULTS Each of the fault management techniques (reactive and anticipatory) are simulated by varying the levels of the lin delay and the complexity of the networ. The number of replications for each fault management technique is 270. This results from the sum of the replications under each combination of configuration levels (i.e., lin delay, networ complexity). The t test is performed with respect to the mean values obtained for throughput, turnaround time and the drop rate of pacets for each of the fault management technique and the confidence intervals are recorded. From the confidence intervals obtained at 95 percent level we observe that the intervals obtained for the reactive vs. anticipatory and anticipatory vs. alarm correlation for all the three parameters does not contain zero and hence the difference in their mean values is statistically significant. Figure 3. Simulated model in DEVS environment Figure 4 shows the responses obtained for each of the dependent variables. Table 2. Confidence Intervals for performance metrics Correlation Anticipat ory Reactive (-0.025,- Reactive (-0.001,0.019) 0.006) (-0.035,- Correlation (-0.019,0.001) ) Anticipatory (0.006,0.025) (0.014,0.035) : Performance of networ throughput Anticipat Reactive Correlation ory (25.11, 70.19) Reactive (-38.69,15.55) (33.62, Correlation (-15.55, 38.69) ) Anticipatory (-70.19, ) (-84.81, ) : Performance of networ turnaround time Reactive Correlation Anticipat ory (5.67, 9.59) Reactive (-8.54, 1.96) (5.9, Correlation (-1.96,8.54) ) Anticipatory (-9.59, -5.67) (-15.93, -5.9) : Performance with respect to drop rate of pacets

6 Figure 4. Response Surfaces We observe that the throughput obtained in each of the techniques is significantly better at a lower value of lin delay while throughput is less dependent on the complexity of the networ. There is a considerable improvement in the turnaround time at higher levels of complexity. For the drop rate of pacets, the percentage is significantly less at lower values of lin delay; also, there is a significant reduction of drop rate of pacets at higher values of complexity. As shown in Figure 4, performance parameters for the alarm correlation technique shows a linear dependency with respect to variation of the lin delay. Also, reactive and anticipatory techniques are less prone to lin delay until a certain threshold. The linearity exhibited by the alarm correlation technique can be explained by the fact that the fault patterns are recorded before hand and hence the variation of the performance metrics is linear, whereas for the other two techniques this is not the case. 7. CONCLUSIONS AND FUTURE WORK In this paper, we discussed how agent-based behavioral anticipation can be applied to fault management in computer networs. For future wor we intend to improve on the learning criteria of the Bayesian classifier Another improvement involves the extension of the notion of reactive agent to an improved alarm correlation technique by which the sequence of degradation in various networ components can be studied and the data can be used to effectively induce corrective action prior to failure. This technique, if combined with the anticipatory model would result in a high degree of improvement of networ fault management. 8. REFERENCES [1] Agre, J. A message-based fault diagnosis procedure. In Proceedings of the ACM SIGCOMM Conference on Communications architectures & protocols, Vol 6 Issue 3, Aug [2] Bouloutas, A. Hart, G., and Schwartz, M. On the design of observers for failure detection of discrete event systems. In Networ Management and Control. New Yor: Plenum, [3] Feather, F. and Maxion, R. Fault detection in an ethernet networ using anomaly signature matching. In Proc. ACM SIGCOMM, vol. 23, San Francisco, CA, Sept. 1993, pp [4] Katzela, I. and Schwarz, M. Schemes for fault identification in communication networs. IEEE/ACM Trans. Networing, vol. 3, pp , Dec [5] Langley, P. and Simon A. H. Herbert. Applications of Machine Learning. Communications of the ACM. Vol.38. No [6] Lazar, A., Wang, W., and Deng, R. Models and algorithms for networ fault detection and identification: A review. In Proc. IEEE Int. Contr. Conf., [7] Ndousse, D. T.and Ouda, T. Computational intelligence for distributed fault management in networs using fuzzy cognitive maps. In Proc. IEEE ICC, Dallas, TX, Jun. 1996, pp [8] Oates, T. Fault identification in Computer Networs: A Review and a New Approach. CS-TR [9] Rosen, R. Anticipatory Systems Philosophical, Mathematical and Methodological Foundations. Pergamon Press, New Yor. [10] Rouvellou I. and Hart, G. Automatic alarm correlation for fault identification. In Proc. IEEE INFOCOM, Boston, MA, Apr. 1995, pp [11] Thottan, M. Fault detection in ip networs. Ph.D. dissertation, Rensselaer Polytech. Inst., Troy, NY, Under patent with RPI. [12] Thottan, M. and Ji C. Anomaly detection in IP Networs. IEEE Transactions on signal processing, vol.51, No.8, August 2003.

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of

More information

Web Hosting Service Level Agreements

Web Hosting Service Level Agreements Chapter 5 Web Hosting Service Level Agreements Alan King (Mentor) 1, Mehmet Begen, Monica Cojocaru 3, Ellen Fowler, Yashar Ganjali 4, Judy Lai 5, Taejin Lee 6, Carmeliza Navasca 7, Daniel Ryan Report prepared

More information

Network Performance Monitoring at Small Time Scales

Network Performance Monitoring at Small Time Scales Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA dina@sprintlabs.com Electrical and Computer Engineering Department University

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

Application of Virtual Instrumentation for Sensor Network Monitoring

Application of Virtual Instrumentation for Sensor Network Monitoring Application of Virtual Instrumentation for Sensor etwor Monitoring COSTATI VOLOSECU VICTOR MALITA Department of Automatics and Applied Informatics Politehnica University of Timisoara Bd. V. Parvan nr.

More information

Analysis of Internet Topologies

Analysis of Internet Topologies Analysis of Internet Topologies Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418 An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. Vijay9908914010@gmail.com

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

Anomaly Detection in IP Networks

Anomaly Detection in IP Networks IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 51, NO. 8, AUGUST 2003 2191 Anomaly Detection in IP Networks Marina Thottan and Chuanyi Ji Abstract Network anomaly detection is a vibrant research area. Researchers

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

T ) > λ declare alarm

T ) > λ declare alarm MIB Variable Based Fault Classication: The Next Step Towards Proactive Management Experience Paper Marina Thottan Bell Laboratories Room 4F-609 0 Crawfords Corner Road Holmdel, NJ 07733-3030 email:marinat@lucent.com

More information

Detection of DDoS Attack Scheme

Detection of DDoS Attack Scheme Chapter 4 Detection of DDoS Attac Scheme In IEEE 802.15.4 low rate wireless personal area networ, a distributed denial of service attac can be launched by one of three adversary types, namely, jamming

More information

Analysis of Internet Topologies: A Historical View

Analysis of Internet Topologies: A Historical View Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,

More information

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications

More information

Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation

Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop

More information

Kalman Filter Applied to a Active Queue Management Problem

Kalman Filter Applied to a Active Queue Management Problem IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 9, Issue 4 Ver. III (Jul Aug. 2014), PP 23-27 Jyoti Pandey 1 and Prof. Aashih Hiradhar 2 Department

More information

A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration

A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration Int. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V (2010), No. 5, pp. 862-870 A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration

More information

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information

More information

Time-Frequency Detection Algorithm of Network Traffic Anomalies

Time-Frequency Detection Algorithm of Network Traffic Anomalies 2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore Time-Frequency Detection Algorithm of Network Traffic Anomalies

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Performance Evaluation of Linux Bridge

Performance Evaluation of Linux Bridge Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet

More information

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,

More information

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi (faa6@sfu.ca) Ehsan Arman (eaa14@sfu.ca) http://www.sfu.ca/~faa6

More information

DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER

DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER M.Vishwashanthi 1, S.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Anurag Group

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of

More information

AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM. Dr. T.Ravichandran, B.E (ECE), M.E(CSE), Ph.D., MISTE.,

AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM. Dr. T.Ravichandran, B.E (ECE), M.E(CSE), Ph.D., MISTE., AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM K.Kungumaraj, M.Sc., B.L.I.S., M.Phil., Research Scholar, Principal, Karpagam University, Hindusthan Institute of Technology, Coimbatore

More information

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student

More information

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI

More information

Self-Adjusted Network Transmission for Multimedia Data

Self-Adjusted Network Transmission for Multimedia Data Self-Adusted etwor ransmission for Multimedia Data Mei-Ling Shyu Department of Electrical and Computer Engineering University of Miami Coral Gables, FL 334 USA shyu@miami.edu Shu-Ching Chen School of Computer

More information

Intrusion Detection via Machine Learning for SCADA System Protection

Intrusion Detection via Machine Learning for SCADA System Protection Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department

More information

A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK

A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK S.Veni 1 and Dr.G.M.Kadhar Nawaz 2 1 Research Scholar, Barathiar University, Coimbatore, India venii_k@yahoo.com 2 Director, Dept. of MCA, Sona College

More information

Bandwidth Measurement in xdsl Networks

Bandwidth Measurement in xdsl Networks Bandwidth Measurement in xdsl Networks Liang Cheng and Ivan Marsic Center for Advanced Information Processing (CAIP) Rutgers The State University of New Jersey Piscataway, NJ 08854-8088, USA {chengl,marsic}@caip.rutgers.edu

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. stadler@ee.kth.

5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. stadler@ee.kth. 5 Performance Management for Web Services Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se April 2008 Overview Service Management Performance Mgt QoS Mgt

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 info@mushroomnetworks.com

More information

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic

More information

Fault-Tolerant Framework for Load Balancing System

Fault-Tolerant Framework for Load Balancing System Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Developing an Agent-based Backup Protection System for Transmission Networks

Developing an Agent-based Backup Protection System for Transmission Networks Power Systems and Communications Infrastructures for the Future, Beijing, September 2002 Developing an Agent-based Backup Protection System for Transmission Networks X. R. Wang* Member IEEE, K. M. Hopkinson**

More information

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: natu@cis.udel.edu

More information

International Journal of Applied Science and Technology Vol. 2 No. 3; March 2012. Green WSUS

International Journal of Applied Science and Technology Vol. 2 No. 3; March 2012. Green WSUS International Journal of Applied Science and Technology Vol. 2 No. 3; March 2012 Abstract 112 Green WSUS Seifedine Kadry, Chibli Joumaa American University of the Middle East Kuwait The new era of information

More information

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling

More information

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort

More information

Stochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection 2003 IEEE International Workshop on Information Assurance March 24th, 2003 Darmstadt, Germany Stochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection Juan M. Estévez-Tapiador (tapiador@ugr.es)

More information

Another Look at Sensitivity of Bayesian Networks to Imprecise Probabilities

Another Look at Sensitivity of Bayesian Networks to Imprecise Probabilities Another Look at Sensitivity of Bayesian Networks to Imprecise Probabilities Oscar Kipersztok Mathematics and Computing Technology Phantom Works, The Boeing Company P.O.Box 3707, MC: 7L-44 Seattle, WA 98124

More information

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College

More information

CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT

CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT 81 CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT 5.1 INTRODUCTION Distributed Web servers on the Internet require high scalability and availability to provide efficient services to

More information

CiscoWorks Internetwork Performance Monitor 4.0

CiscoWorks Internetwork Performance Monitor 4.0 CiscoWorks Internetwork Performance Monitor 4.0 Product Overview The CiscoWorks Internetwork Performance Monitor (IPM) is a network response-time and availability troubleshooting application. Included

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

Smart Queue Scheduling for QoS Spring 2001 Final Report

Smart Queue Scheduling for QoS Spring 2001 Final Report ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang(hfanga@sfu.ca) & Liu Tang(llt@sfu.ca)

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS

AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India maharudra90@gmail.com,

More information

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing TRUFFLE Broadband Bonding Network Appliance BBNA6401 A Frequently Asked Question on Link Bonding vs. Load Balancing LBRvsBBNAFeb15_08b 1 Question: What's the difference between a Truffle Broadband Bonding

More information

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of

More information

Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko

Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems Christopher Roblee Vincent Berk George Cybenko These slides are based on the paper Implementing Large-Scale Autonomic Server

More information

4 Internet QoS Management

4 Internet QoS Management 4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control

More information

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

A Multi-Agent-based Approach to Improve Intrusion Detection Systems False Alarm Ratio by Using Honeypot

A Multi-Agent-based Approach to Improve Intrusion Detection Systems False Alarm Ratio by Using Honeypot A Multi-Agent-based Approach to Improve Intrusion Detection Systems False Alarm Ratio by Using Honeypot Babak Khosravifar Dept. Comp. Eng. Concordia University, Montreal, Canada b khosr@encs.concordia.ca

More information

A Fast Path Recovery Mechanism for MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.

More information

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet

More information

Self-Compressive Approach for Distributed System Monitoring

Self-Compressive Approach for Distributed System Monitoring Self-Compressive Approach for Distributed System Monitoring Akshada T Bhondave Dr D.Y Patil COE Computer Department, Pune University, India Santoshkumar Biradar Assistant Prof. Dr D.Y Patil COE, Computer

More information

Quick Detection of Stealthy SIP Flooding Attacks in VoIP Networks

Quick Detection of Stealthy SIP Flooding Attacks in VoIP Networks This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 211 proceedings Quick Detection of Stealthy SIP Flooding Attacks

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

Adaptive Multi-task Monitoring System Based on Overhead Prediction

Adaptive Multi-task Monitoring System Based on Overhead Prediction Adaptive Multi-tas Monitoring System Based on Overhead Prediction Imed Lassoued, Chadi Baraat Planete Project-Team, INRIA Sophia-Antipolis, France {Imed.Lassoued, Chadi.Baraat}@sophia.inria.fr ABSTRACT

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

Maximizing return on plant assets

Maximizing return on plant assets Maximizing return on plant assets Manufacturers in nearly every process industry face the need to improve their return on large asset investments. Effectively managing assets, however, requires a wealth

More information

Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors

Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors 2011 International Symposium on Computer Networks and Distributed Systems (CNDS), February 23-24, 2011 Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors Atefeh Khosravi,

More information

A Stock Pattern Recognition Algorithm Based on Neural Networks

A Stock Pattern Recognition Algorithm Based on Neural Networks A Stock Pattern Recognition Algorithm Based on Neural Networks Xinyu Guo guoxinyu@icst.pku.edu.cn Xun Liang liangxun@icst.pku.edu.cn Xiang Li lixiang@icst.pku.edu.cn Abstract pattern respectively. Recent

More information

Performance Workload Design

Performance Workload Design Performance Workload Design The goal of this paper is to show the basic principles involved in designing a workload for performance and scalability testing. We will understand how to achieve these principles

More information

Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks

Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks Akshay Kumar *, R. K. Ghosh, Maitreya Natu *Student author Indian Institute of Technology, Kanpur, India Tata Research

More information

Optimizing Data Center Networks for Cloud Computing

Optimizing Data Center Networks for Cloud Computing PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,

More information

Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms

Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms IJCSNS International Journal of Computer Science and Network Security, VOL.8 No., February 8 7 Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms Y.Dhanalakshmi and Dr.I. Ramesh

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

A Review on Network Intrusion Detection System Using Open Source Snort

A Review on Network Intrusion Detection System Using Open Source Snort , pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India Sharmasakshi1009@gmail.com,

More information

B.Sc. degree in Computer Science, with honors, 1986 Technion, Israel Institute of Technology (IIT), Haifa, Israel

B.Sc. degree in Computer Science, with honors, 1986 Technion, Israel Institute of Technology (IIT), Haifa, Israel Education: D.Sc. degree in Computer Science,1994 Research subject: Protocols for Spatial and Slot Reuse in Bus Networks Research: Distributed algorithms, MAC protocols for wired and wireless networks.

More information

Simulating the Structural Evolution of Software

Simulating the Structural Evolution of Software Simulating the Structural Evolution of Software Benjamin Stopford 1, Steve Counsell 2 1 School of Computer Science and Information Systems, Birkbeck, University of London 2 School of Information Systems,

More information

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect ashutosh_shinde@hotmail.com Validating if the workload generated by the load generating tools is applied

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Development of a Network Configuration Management System Using Artificial Neural Networks

Development of a Network Configuration Management System Using Artificial Neural Networks Development of a Network Configuration Management System Using Artificial Neural Networks R. Ramiah*, E. Gemikonakli, and O. Gemikonakli** *MSc Computer Network Management, **Tutor and Head of Department

More information

Introduction. Chapter 1

Introduction. Chapter 1 Chapter 1 Introduction The area of fault detection and diagnosis is one of the most important aspects in process engineering. This area has received considerable attention from industry and academia because

More information

Network Selection Using TOPSIS in Vertical Handover Decision Schemes for Heterogeneous Wireless Networks

Network Selection Using TOPSIS in Vertical Handover Decision Schemes for Heterogeneous Wireless Networks www.ijcsi.org 400 Network Selection Using TOPSIS in Vertical Handover Decision Schemes for Heterogeneous Wireless Networks K.Savitha 1, DR.C.Chandrasekar 2 1 Research Scholar, Periyar University Salem,

More information

Analysis of TCP Performance Over Asymmetric Wireless Links

Analysis of TCP Performance Over Asymmetric Wireless Links Virginia Tech ECPE 6504: Wireless Networks and Mobile Computing Analysis of TCP Performance Over Asymmetric Kaustubh S. Phanse (kphanse@vt.edu) Outline Project Goal Notions of Asymmetry in Wireless Networks

More information

Monitoring Large Flows in Network

Monitoring Large Flows in Network Monitoring Large Flows in Network Jing Li, Chengchen Hu, Bin Liu Department of Computer Science and Technology, Tsinghua University Beijing, P. R. China, 100084 { l-j02, hucc03 }@mails.tsinghua.edu.cn,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

An Agent-Based Concept for Problem Management Systems to Enhance Reliability

An Agent-Based Concept for Problem Management Systems to Enhance Reliability An Agent-Based Concept for Problem Management Systems to Enhance Reliability H. Wang, N. Jazdi, P. Goehner A defective component in an industrial automation system affects only a limited number of sub

More information

Robust Router Congestion Control Using Acceptance and Departure Rate Measures

Robust Router Congestion Control Using Acceptance and Departure Rate Measures Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {ganeshg@microsoft.com}, Microsoft Corporation,

More information

Adaptive Sampling for Network Performance Measurement Under Voice Traffic

Adaptive Sampling for Network Performance Measurement Under Voice Traffic Sampling for Network Performance Measurement Under Voice Traffic Wenhong Ma and Changcheng Huang Optical Networks Laboratory Department of Systems and Computer Engineering, Carleton University 1125 Colonel

More information

IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources

IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources Matthew Roughan (Univ. of Adelaide) Tim Griffin (Intel Research Labs) Z. Morley Mao (Univ. of Michigan) Albert Greenberg,

More information

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK V.Rakocevic@city.ac.uk

More information

Implementation of Video Voice over IP in Local Area Network Campus Environment

Implementation of Video Voice over IP in Local Area Network Campus Environment Implementation of Video Voice over IP in Local Area Network Campus Environment Mohd Nazri Ismail Abstract--In this research, we propose an architectural solution to integrate the video voice over IP (V2oIP)

More information

Virtualized Security: The Next Generation of Consolidation

Virtualized Security: The Next Generation of Consolidation Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the

More information

SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING. (1)Radi ROMANSKY

SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING. (1)Radi ROMANSKY 1 SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING (1)Radi ROMANSKY (1)Department of Computer Systems, Technical University Sofia e-mail address: rrom@tu-sofia.bg Bulgaria

More information