Agent-based Simulation Study of Behavioral Anticipation: Anticipatory Fault Management in Computer Networks
|
|
- Ralph Mosley
- 8 years ago
- Views:
Transcription
1 Agent-based Simulation Study of Behavioral Anticipation: Anticipatory Fault Management in Computer Networs Avdhoot Saple M&SNet: AMSL (The Auburn Modeling and Simulation Laboratory) Computer Science and Software Engineering Auburn University Auburn, AL, USA Levent Yilmaz M&SNet: AMSL (The Auburn Modeling and Simulation Laboratory) Computer Science and Software Engineering Auburn University Auburn, AL, USA ABSTRACT Networ fault management is concerned with the detection, isolation, and correction of anomalous conditions that occur in a computer networ. Present state of art in fault management classifies existing methodologies into two main categories: reactive rule based approaches and intelligent monitoring systems. In this paper we explore the concept of anticipatory behavior to develop an intelligent agent-based networ management model, which uses an anticipatory agent to proactively detect occurrence of faults using a predictive model pertaining to networ performance. To compare the effectiveness of the anticipatory technique, we build a simulation model of a networ using the DEVS framewor. Two reactive rule based fault management strategies are compared against the anticipatory approach. Results of the comparative analysis are presented to demonstrate the potential of the anticipatory technique in detecting networ anomalies. Categories and Subject Descriptors I.6.5 [Simulation and Modeling]: Model Development modeling methodologies. General Terms Measurement, Performance, Design, Experimentation. Keywords Intelligent agents, anticipatory agents, simulation, DEVS. 1. INTRODUCTION Networ fault management [8] entails the detection, isolation, and correction of anomalous conditions that occur in a networ. Fault management can be decomposed into three subtass: Permission to mae digital or hard copies of all or part of this wor for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ACM SE 06, March, 10-12, 2006, Melbourne, Florida, USA Copyright /06/0004 $5.00 fault identification [4], fault diagnosis [1], and fault remediation. Fault identification involves detecting deviation from normal behavior followed by identification of its nature, whereas fault diagnosis involves determining the root cause of the identified problem. Fault remediation is the formulation of a course of action that addresses the problem. All three stages of fault management involve reasoning and decision maing based on information about current and past states of the networ. Anticipatory fault management entails a novel approach of designing agents the precepts of which are based on the premise of anticipatory systems [9]. An anticipatory agent has a model of itself, and it uses this model to predict the future state. The predictions are then utilized to determine agent s behavior. An anticipatory agent is thus an entity which uses the nowledge of predicted future states to decide what action to be taen in the present. Our strategy consists of comparison of an anticipatory technique with two widely popular techniques: reactive rule based strategy and alarm correlation approach. We compare the three techniques based on the following networ performance metrics: throughput, turnaround time, and the drop rate of pacets. To facilitate the experiment, a simulation model of a computer networ is developed using the DEVS modeling and simulation framewor. Reactive and anticipatory agents are embedded into the networ for networ fault management. The reactive agent operates on a simple rule based engine that detects faults based on predefined fuzzy rule-base. We use a Naïve Bayesian classifier as part of the anticipatory agent. The Bayesian classifier acts as a predictive model for the anticipatory agent to facilitate prediction of faults based on past data. Our findings indicate that anticipatory fault management performs significantly better than the reactive and alarm correlation techniques under the experimental conditions the model is tested. The rest of the paper is organized as follows. Section 2 surveys the present state of art in fault management of computer networs. The design of anticipatory systems is described in section 3. In section 4, we discuss the agent based modeling of reactive and anticipatory control in computer networs. We describe the simulation and experimentation design followed by results in section 5 and 6, respectively. In section 7, we discuss open issues as well as planned future wor.
2 2. FAULT MANAGEMENT IN COMPUTER NETWORKS Various techniques such as machine learning [5] and state space modeling [10] are used for fault management. A fault is defined as a malfunction in some component of the networ, either hardware or software. At an abstract level, fault identification can be devised as a function, I, with inputs and outputs. The input to the function is a description of networ state, S, and the output is a set of hypothesis, H, concerning the existence of n different faults. Each hypothesis may specify the indications in S of the corresponding fault and may contain diagnosis information. That is, identification and diagnosis are rarely totally decoupled. Fault identification, therefore is a process of function that maps from networ states to fault hypothesis: I: S H Different approaches to fault identification define S in a distinct manner [8]. 2.1 Rule based approaches Early wor in the area of fault or anomaly detection is based on expert systems. In expert systems, an exhaustive database containing the rules of behavior of the faulty system is used to determine fault occurrence by matching predefined rules of networ anomalies. However, rule based systems are not only often slow for real time applications, but also depend on prior nowledge about the fault conditions of the networ. The identification of faults depends on symptoms that are specific to a particular manifestation of a fault. Examples of these symptoms are excessive utilization of bandwidth, number of open TCP connections, total throughput exceeded etc. [12]. An expert system model using fuzzy cognitive maps (FCMs) [7] can be used to obtain an intelligent modeling of the propagation and interaction of networ faults. 2.2 correlation using State Machines A fault is a disorder occurring in the managed networ. Faults happen within the managed networs while alarms are external manifestations of faults [10]. Finite state machines model alarm sequences that occur during and prior to fault events. For instance, a probabilistic finite state machine model is built for a nown networ fault using historical data [6]. State machines are designed with the intention of not just detecting an anomaly but also possibly identifying and diagnosing the problem. The sequences of alarms obtained from the different points in the networ are modeled as states of a finite state machine. The alarms are assumed to contain information such as the device name as well as the symptom and time of occurrence. The transitions between the states are measured using prior events [4], [10], [2]. 2.3 Pattern Matching This approach describes anomalies as deviations from normal behavior and attempts to deal with the variability in the networ environment [3]. Online learning is used to build a traffic profile for a given networ. Traffic profiles are built using symptom specific feature vectors such as lin utilization, pacet loss and number of collisions. 2.4 Statistical Analysis As the networ evolves, each of the methods described above require significant recalibration or retraining. However, using statistical approaches [12], it is possible to continuously trac the behavior of a networ. Statistical analysis has been used to detect both anomalies corresponding to networ failures [11] as well as networ intrusions. Each of these failure scenarios differ in their manifestations as well as their characteristics. Thus, it is necessary to obtain a rich set of networ information that could cover a wide variety of networ operations. 3. ANTICIPATORY SYSTEMS Anticipation is an important characteristic of intelligence. Proactive behavior requires anticipatory abilities. A seminal wor on anticipatory systems is the one written by Rosen [9]. A brief introduction to and serious concerns about anticipation follows: Strictly speaing, an anticipatory system is one in which present change of state depends upon future circumstances, rather than merely on the present or past. As such, anticipation has routinely been excluded from any ind of systematic study, on the grounds that it violates the causal foundation on which all of theoretical science must rest, and on the grounds that it introduces a telic element which is scientifically unacceptable. Nevertheless, biology is replete with situations in which organisms can generate and maintain internal predictive models of themselves and their environments, and utilize the predictions of these models about the future for purpose of control in the present. Many of the unique properties of organisms can really be understood only if these internal models are taen into account. Thus, the concept of a system with an internal predictive model seemed to offer a way to study anticipatory systems in a scientifically rigorous way" [9]. Perception ability is a required characteristic of agents. Hence, they can be designed to perceive current state of self and others. They can also be designed to create current image(s) of future state(s). Perception requires mechanisms that enable interpretive capabilities. Perception invariably involves sensory qualities, and introspection entails accessing sensations and perceptions the agent would introspect. Perceptions are derived as a result of interpretation of sensory inputs within the context of the current world and agent s self model. The prototype inference, orientation accounting, and situational classification mechanisms could be used to realize the interpretation capabilities of an agent. The interpretation process results in perceptions. An anticipatory agent needs to deliberate upon perceptions through introspection and reflection to anticipate. Figure 1. Basic Components for Anticipatory Agents
3 Introspection is deliberate and attentive because higher-order intentional states are themselves attentive and deliberate. An introspective agent should have access mechanisms to its internal representation, operations, behavioral potentials, and beliefs about its context. Reflection uses the introspective mechanisms to deliberate its situation in relation to the embedding environmental context. These features collectively result in anticipation capabilities that orient and situate an agent for accurate future projections. Figure 1 presents interpretation and introspection as critical components within the micro-architecture of an anticipatory agent. Due to lac of space, in section 4.3, we only provide a brief synopsis of the type of the predictive model used in our wor. 4. AGENT-BASED MODELING OF REACTIVE AND ANTICIPATORY CONTROL The overall architecture of the simulation is primarily composed of the following components (see Figure 2). Networ model: The first component is a basic model of a typical computer networ. The networ model is the basis of the design and experimentation of the fault management techniques. The networ model is designed on a simulation framewor and comprises of basic networ components that would include switches, routers, hosts, and lins. Figure 2. Reactive and Anticipatory Control Monitoring layer: The monitoring layer comprises of multiple monitoring agents that are embedded over individual networ components or on a group of components. (Eg: a monitoring agent is allocated for each subnet). The monitoring agents may have disjoint functions or potentially overlapping responsibilities for increased reliability. Management layer: The management layer comprises of the reactive or the anticipatory agents according to the technique being used. The reactive agent wors on a general rule based approach (if then else). It interprets the data acquired from the monitoring agents and communicates with the control layer to tae corrective action [9]. Control layer: The control layer is responsible for carrying out corrective action with respect to the information it gets from the management layer. 4.1 DEVS Networ model The Networ model is developed in the DEVS (Discrete Event System Specification) formalism. A brief description of the simulated networ components is as follows: Lins: Simulation of lins is carried out on crucial connections in the networ. A lin is looed upon as a processor and its overloading is simulated as the increase in processing time of the processor Switch: A switch forms a connection between different subnets to facilitate forwarding of pacets among them. Router: A router follows certain routing algorithms for forwarding of pacets among hosts. We use the Distance Vector routing strategy, by which the pacets are forwarded to the best nown distance to each destination (the distance is measured in terms of processing time of hosts). Hosts: Hosts are entities that process jobs or payload. They can be networ clients, servers, printers, plotters etc. Monitoring agents: The monitoring agents record performance metrics lie networ throughput, latency and the pacet drop rate. It reports this data to the management layer where the reactive agents infer them as rules and the anticipatory agent updates its predictive model. Management agents: The management agents are the reactive and the anticipatory agents. They receive data from the monitoring agents and induce the control agent to tae respective action. 4.2 Reactive Agents Fuzzy reactive agents are used in the determination of the proneness of failure. The antecedent variables (one or more variables that represent the conditions to be met before any conclusion can be made) are the Throughput and Latency. The consequents which are set of output (proneness of failure or state) for each of the networ components. A sample set of fuzzy rules that are comprised in the reactive agent for a networ component (for instance, a host) can be outlined as follows: If Throughput = High and Latency = Low, Fault_proneness = Low If Throughput = Moderate and Latency = Low, Fault_proneness = Low If Throughput = Low and Latency = Low, Fault_proneness = moderate If Throughput = High and Latency = Moderate, Fault_proneness = Low If Throughput = Moderate and Latency = Moderate, Fault_proneness = Moderate If Throughput = Low and Latency = Moderate, Fault_proneness = Moderate 4.3 Anticipatory Agents The architectural framewor of the Anticipatory agent, shown in Figure 1, consists of a predictive model and an anticipator.
4 Table 1. Sample set of evidence to be processed by the Naïve Bayesian Classifier Obs. Networ Subnet1 Subnet2 Router1 Host1 Host2 Host3 Router2 Host4 Host5 Host6 No 1 High High Normal No Yes No Yes No No No No 2 High High Normal Yes Yes No No No No No No 3 Normal Normal High No No No No Yes No No No 4 Normal Normal Normal No Yes No Yes No No No No 5 High High High Yes No Yes No Yes No No Yes 6 Normal Normal Normal No No No No No No No No 7 High Normal High No No No No No Yes No No 8 Normal High Normal No No No Yes No No No No 9 Normal High Normal No Yes No No No No No No 10. Normal Normal High No No No No No No Yes No 11. High High High No Yes No Yes No Yes No No 12. High High Normal Yes Yes No No No No No No 13. Normal High Normal No No No No No No No No 14. High Normal High No No No No Yes No No Yes We mae use of a Naïve Bayesian Classifier for constructing the predictive model of the anticipatory agent. The strength of the Naïve Bayesian Classifier is that it provides a theoretical framewor for combining statistical data with the prior nowledge about the problem domain for maing future projections. The following example shows how a fault is detected by the anticipatory agent by maing use of the Naïve Bayesian classifier. Consider the sample of evidence specified in Table 1. The Networ taes value High if there is abnormality above a certain threshold in a single or both the subnets and is Normal otherwise. The subnet 1 and subnet 2 tae value High if any of the component in the respective subnets have failed and is Normal otherwise. The probability that there can be a fault in host 1 provided we have evidence that subnet 1 is high is given by p(host1 = yes Subnet1 = High) = (# of times Host1= yes & Subnet1= High) / (# of times Sunbet1 = High) = 5 / 8 Similarly the probability that there can be a fault in host 1 provided we have evidence that subnet 1 is high and networ is high is given by p(host1 = yes Sunbet1= High, Networ = high) = (# of times Host1 = yes & Subnet1 = high & Networ = high) / (# of times Subnet1 = High & Networ = High) = 4/5 But the number of conditional probabilities in a data set can be very high. The Naïve Bayesian classifier model states that Result = arg max C [ p( C ) Πp( A C )], where p(a i C ) = (# of A C ) / (# of C ) It can be illustrated by the following example. Suppose we are given that (subnet1 = High, and Networ = High) and we need to now if there is a fault on host 1? From the above Naïve Bayesian Classifier equation: Result (host1 =yes) = p (Host1 = Yes) * p (Subnet = High Host1 = Yes) * p (Networ = High Host1 = Yes) = (6/14)*(1)*(3/6) = Result (host1 =no) = p (Host1 = No) * p (Subnet = High Host1 = No) * p (Networ = High Host1 = No) = (8/14)*(3/8)*(3/8) = Hence we see that Result (host1 =yes) > Result (host1 =no), and hence the predictive model predicts the potential of fault in host 1. The Anticipator thereby notifies the control layer to tae respective corrective action for host 1. Note that, the set of evidence to the Bayesian classifier is continuously updated according to the events taing place in the networ. After a fixed interval of time (say 5 time units), the classifier computes the result (Result = arg max C[ p( C ) Π p( Ai C )]) based on the state of the components at that time instant. 5. SIMULATION DESIGN The DEVS-based networ model comprises two subnets. Each subnet includes a router and 3 hosts. An experimental frame i i
5 generates the pacets to be processed by the networ components on the basis of a specific inter-arrival time. A fault injection mechanism is also embedded in the experimental frame which generates fault pacets at a random rate. A fault pacet when encountered by a networ component, induces a certain level of degradation in the throughput and latency of the component. The intervals obtained for the reactive vs. alarm correlation technique for all the three parameters comprises of zero. Hence the difference between their means is not statistically significant. Monitoring agents are deployed throughout the networ over each of the networ components to record the performance metrics (throughput, latency and the drop rate) throughout the simulation. The throughput is defined as the average rate of job departures from the architecture, estimated by the number of jobs processed during the observation interval, divided by the length of the interval. A job s turnaround time is the length of time between its arrival to the processor and its departure as a completed job. The drop rate of pacets is defined as the percentage of pacets dropped due to networ faults. A sample screen shot of the DEVS environment is shown in figure 3. The model is comprised of 2 subnets with each of the subnet comprising of networ components (routers and hosts). 6. SIMULATION RESULTS Each of the fault management techniques (reactive and anticipatory) are simulated by varying the levels of the lin delay and the complexity of the networ. The number of replications for each fault management technique is 270. This results from the sum of the replications under each combination of configuration levels (i.e., lin delay, networ complexity). The t test is performed with respect to the mean values obtained for throughput, turnaround time and the drop rate of pacets for each of the fault management technique and the confidence intervals are recorded. From the confidence intervals obtained at 95 percent level we observe that the intervals obtained for the reactive vs. anticipatory and anticipatory vs. alarm correlation for all the three parameters does not contain zero and hence the difference in their mean values is statistically significant. Figure 3. Simulated model in DEVS environment Figure 4 shows the responses obtained for each of the dependent variables. Table 2. Confidence Intervals for performance metrics Correlation Anticipat ory Reactive (-0.025,- Reactive (-0.001,0.019) 0.006) (-0.035,- Correlation (-0.019,0.001) ) Anticipatory (0.006,0.025) (0.014,0.035) : Performance of networ throughput Anticipat Reactive Correlation ory (25.11, 70.19) Reactive (-38.69,15.55) (33.62, Correlation (-15.55, 38.69) ) Anticipatory (-70.19, ) (-84.81, ) : Performance of networ turnaround time Reactive Correlation Anticipat ory (5.67, 9.59) Reactive (-8.54, 1.96) (5.9, Correlation (-1.96,8.54) ) Anticipatory (-9.59, -5.67) (-15.93, -5.9) : Performance with respect to drop rate of pacets
6 Figure 4. Response Surfaces We observe that the throughput obtained in each of the techniques is significantly better at a lower value of lin delay while throughput is less dependent on the complexity of the networ. There is a considerable improvement in the turnaround time at higher levels of complexity. For the drop rate of pacets, the percentage is significantly less at lower values of lin delay; also, there is a significant reduction of drop rate of pacets at higher values of complexity. As shown in Figure 4, performance parameters for the alarm correlation technique shows a linear dependency with respect to variation of the lin delay. Also, reactive and anticipatory techniques are less prone to lin delay until a certain threshold. The linearity exhibited by the alarm correlation technique can be explained by the fact that the fault patterns are recorded before hand and hence the variation of the performance metrics is linear, whereas for the other two techniques this is not the case. 7. CONCLUSIONS AND FUTURE WORK In this paper, we discussed how agent-based behavioral anticipation can be applied to fault management in computer networs. For future wor we intend to improve on the learning criteria of the Bayesian classifier Another improvement involves the extension of the notion of reactive agent to an improved alarm correlation technique by which the sequence of degradation in various networ components can be studied and the data can be used to effectively induce corrective action prior to failure. This technique, if combined with the anticipatory model would result in a high degree of improvement of networ fault management. 8. REFERENCES [1] Agre, J. A message-based fault diagnosis procedure. In Proceedings of the ACM SIGCOMM Conference on Communications architectures & protocols, Vol 6 Issue 3, Aug [2] Bouloutas, A. Hart, G., and Schwartz, M. On the design of observers for failure detection of discrete event systems. In Networ Management and Control. New Yor: Plenum, [3] Feather, F. and Maxion, R. Fault detection in an ethernet networ using anomaly signature matching. In Proc. ACM SIGCOMM, vol. 23, San Francisco, CA, Sept. 1993, pp [4] Katzela, I. and Schwarz, M. Schemes for fault identification in communication networs. IEEE/ACM Trans. Networing, vol. 3, pp , Dec [5] Langley, P. and Simon A. H. Herbert. Applications of Machine Learning. Communications of the ACM. Vol.38. No [6] Lazar, A., Wang, W., and Deng, R. Models and algorithms for networ fault detection and identification: A review. In Proc. IEEE Int. Contr. Conf., [7] Ndousse, D. T.and Ouda, T. Computational intelligence for distributed fault management in networs using fuzzy cognitive maps. In Proc. IEEE ICC, Dallas, TX, Jun. 1996, pp [8] Oates, T. Fault identification in Computer Networs: A Review and a New Approach. CS-TR [9] Rosen, R. Anticipatory Systems Philosophical, Mathematical and Methodological Foundations. Pergamon Press, New Yor. [10] Rouvellou I. and Hart, G. Automatic alarm correlation for fault identification. In Proc. IEEE INFOCOM, Boston, MA, Apr. 1995, pp [11] Thottan, M. Fault detection in ip networs. Ph.D. dissertation, Rensselaer Polytech. Inst., Troy, NY, Under patent with RPI. [12] Thottan, M. and Ji C. Anomaly detection in IP Networs. IEEE Transactions on signal processing, vol.51, No.8, August 2003.
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of
More informationWeb Hosting Service Level Agreements
Chapter 5 Web Hosting Service Level Agreements Alan King (Mentor) 1, Mehmet Begen, Monica Cojocaru 3, Ellen Fowler, Yashar Ganjali 4, Judy Lai 5, Taejin Lee 6, Carmeliza Navasca 7, Daniel Ryan Report prepared
More informationNetwork Performance Monitoring at Small Time Scales
Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA dina@sprintlabs.com Electrical and Computer Engineering Department University
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationApplication of Virtual Instrumentation for Sensor Network Monitoring
Application of Virtual Instrumentation for Sensor etwor Monitoring COSTATI VOLOSECU VICTOR MALITA Department of Automatics and Applied Informatics Politehnica University of Timisoara Bd. V. Parvan nr.
More informationAnalysis of Internet Topologies
Analysis of Internet Topologies Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British
More informationQuantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
More informationG.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418
An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. Vijay9908914010@gmail.com
More informationArchitecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern
More informationAnomaly Detection in IP Networks
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 51, NO. 8, AUGUST 2003 2191 Anomaly Detection in IP Networks Marina Thottan and Chuanyi Ji Abstract Network anomaly detection is a vibrant research area. Researchers
More informationAn Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems
More informationT ) > λ declare alarm
MIB Variable Based Fault Classication: The Next Step Towards Proactive Management Experience Paper Marina Thottan Bell Laboratories Room 4F-609 0 Crawfords Corner Road Holmdel, NJ 07733-3030 email:marinat@lucent.com
More informationDetection of DDoS Attack Scheme
Chapter 4 Detection of DDoS Attac Scheme In IEEE 802.15.4 low rate wireless personal area networ, a distributed denial of service attac can be launched by one of three adversary types, namely, jamming
More informationAnalysis of Internet Topologies: A Historical View
Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,
More informationUniversity of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP
University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications
More informationDetecting Anomalies in Network Traffic Using Maximum Entropy Estimation
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop
More informationKalman Filter Applied to a Active Queue Management Problem
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 9, Issue 4 Ver. III (Jul Aug. 2014), PP 23-27 Jyoti Pandey 1 and Prof. Aashih Hiradhar 2 Department
More informationA Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration
Int. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V (2010), No. 5, pp. 862-870 A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration
More informationComparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information
More informationTime-Frequency Detection Algorithm of Network Traffic Anomalies
2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore Time-Frequency Detection Algorithm of Network Traffic Anomalies
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationPerformance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
More informationEntropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
More informationENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks
ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi (faa6@sfu.ca) Ehsan Arman (eaa14@sfu.ca) http://www.sfu.ca/~faa6
More informationDESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER M.Vishwashanthi 1, S.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Anurag Group
More informationCHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
More informationA TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
More informationAN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM. Dr. T.Ravichandran, B.E (ECE), M.E(CSE), Ph.D., MISTE.,
AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM K.Kungumaraj, M.Sc., B.L.I.S., M.Phil., Research Scholar, Principal, Karpagam University, Hindusthan Institute of Technology, Coimbatore
More informationANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)
More informationUsing Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
More informationEstablishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student
More information2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment
R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI
More informationSelf-Adjusted Network Transmission for Multimedia Data
Self-Adusted etwor ransmission for Multimedia Data Mei-Ling Shyu Department of Electrical and Computer Engineering University of Miami Coral Gables, FL 334 USA shyu@miami.edu Shu-Ching Chen School of Computer
More informationIntrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department
More informationA NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK
A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK S.Veni 1 and Dr.G.M.Kadhar Nawaz 2 1 Research Scholar, Barathiar University, Coimbatore, India venii_k@yahoo.com 2 Director, Dept. of MCA, Sona College
More informationBandwidth Measurement in xdsl Networks
Bandwidth Measurement in xdsl Networks Liang Cheng and Ivan Marsic Center for Advanced Information Processing (CAIP) Rutgers The State University of New Jersey Piscataway, NJ 08854-8088, USA {chengl,marsic}@caip.rutgers.edu
More informationpacket retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
More information5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. stadler@ee.kth.
5 Performance Management for Web Services Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se April 2008 Overview Service Management Performance Mgt QoS Mgt
More informationPerformance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
More informationTRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing
TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 info@mushroomnetworks.com
More informationChapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)
Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic
More informationFault-Tolerant Framework for Load Balancing System
Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:
More informationIntelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationDeveloping an Agent-based Backup Protection System for Transmission Networks
Power Systems and Communications Infrastructures for the Future, Beijing, September 2002 Developing an Agent-based Backup Protection System for Transmission Networks X. R. Wang* Member IEEE, K. M. Hopkinson**
More informationApplication of Adaptive Probing for Fault Diagnosis in Computer Networks 1
Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: natu@cis.udel.edu
More informationInternational Journal of Applied Science and Technology Vol. 2 No. 3; March 2012. Green WSUS
International Journal of Applied Science and Technology Vol. 2 No. 3; March 2012 Abstract 112 Green WSUS Seifedine Kadry, Chibli Joumaa American University of the Middle East Kuwait The new era of information
More informationPLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure
Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling
More informationRouter Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic
Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort
More informationStochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection
2003 IEEE International Workshop on Information Assurance March 24th, 2003 Darmstadt, Germany Stochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection Juan M. Estévez-Tapiador (tapiador@ugr.es)
More informationAnother Look at Sensitivity of Bayesian Networks to Imprecise Probabilities
Another Look at Sensitivity of Bayesian Networks to Imprecise Probabilities Oscar Kipersztok Mathematics and Computing Technology Phantom Works, The Boeing Company P.O.Box 3707, MC: 7L-44 Seattle, WA 98124
More informationMANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL
MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College
More informationCHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT
81 CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT 5.1 INTRODUCTION Distributed Web servers on the Internet require high scalability and availability to provide efficient services to
More informationCiscoWorks Internetwork Performance Monitor 4.0
CiscoWorks Internetwork Performance Monitor 4.0 Product Overview The CiscoWorks Internetwork Performance Monitor (IPM) is a network response-time and availability troubleshooting application. Included
More informationInfluence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
More informationSmart Queue Scheduling for QoS Spring 2001 Final Report
ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang(hfanga@sfu.ca) & Liu Tang(llt@sfu.ca)
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationAN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationDDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India maharudra90@gmail.com,
More informationTRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing
TRUFFLE Broadband Bonding Network Appliance BBNA6401 A Frequently Asked Question on Link Bonding vs. Load Balancing LBRvsBBNAFeb15_08b 1 Question: What's the difference between a Truffle Broadband Bonding
More informationPERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
More informationImplementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko
Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems Christopher Roblee Vincent Berk George Cybenko These slides are based on the paper Implementing Large-Scale Autonomic Server
More information4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
More informationSUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN
SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN
More informationCOMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
More informationA Multi-Agent-based Approach to Improve Intrusion Detection Systems False Alarm Ratio by Using Honeypot
A Multi-Agent-based Approach to Improve Intrusion Detection Systems False Alarm Ratio by Using Honeypot Babak Khosravifar Dept. Comp. Eng. Concordia University, Montreal, Canada b khosr@encs.concordia.ca
More informationA Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
More informationA SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
More informationSelf-Compressive Approach for Distributed System Monitoring
Self-Compressive Approach for Distributed System Monitoring Akshada T Bhondave Dr D.Y Patil COE Computer Department, Pune University, India Santoshkumar Biradar Assistant Prof. Dr D.Y Patil COE, Computer
More informationQuick Detection of Stealthy SIP Flooding Attacks in VoIP Networks
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 211 proceedings Quick Detection of Stealthy SIP Flooding Attacks
More informationScaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
More informationAdaptive Multi-task Monitoring System Based on Overhead Prediction
Adaptive Multi-tas Monitoring System Based on Overhead Prediction Imed Lassoued, Chadi Baraat Planete Project-Team, INRIA Sophia-Antipolis, France {Imed.Lassoued, Chadi.Baraat}@sophia.inria.fr ABSTRACT
More informationFlexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com
More informationMaximizing return on plant assets
Maximizing return on plant assets Manufacturers in nearly every process industry face the need to improve their return on large asset investments. Effectively managing assets, however, requires a wealth
More informationHyper Node Torus: A New Interconnection Network for High Speed Packet Processors
2011 International Symposium on Computer Networks and Distributed Systems (CNDS), February 23-24, 2011 Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors Atefeh Khosravi,
More informationA Stock Pattern Recognition Algorithm Based on Neural Networks
A Stock Pattern Recognition Algorithm Based on Neural Networks Xinyu Guo guoxinyu@icst.pku.edu.cn Xun Liang liangxun@icst.pku.edu.cn Xiang Li lixiang@icst.pku.edu.cn Abstract pattern respectively. Recent
More informationPerformance Workload Design
Performance Workload Design The goal of this paper is to show the basic principles involved in designing a workload for performance and scalability testing. We will understand how to achieve these principles
More informationAdaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks
Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks Akshay Kumar *, R. K. Ghosh, Maitreya Natu *Student author Indian Institute of Technology, Kanpur, India Tata Research
More informationOptimizing Data Center Networks for Cloud Computing
PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,
More informationIntrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No., February 8 7 Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms Y.Dhanalakshmi and Dr.I. Ramesh
More informationHow To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
More informationA Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India Sharmasakshi1009@gmail.com,
More informationB.Sc. degree in Computer Science, with honors, 1986 Technion, Israel Institute of Technology (IIT), Haifa, Israel
Education: D.Sc. degree in Computer Science,1994 Research subject: Protocols for Spatial and Slot Reuse in Bus Networks Research: Distributed algorithms, MAC protocols for wired and wireless networks.
More informationSimulating the Structural Evolution of Software
Simulating the Structural Evolution of Software Benjamin Stopford 1, Steve Counsell 2 1 School of Computer Science and Information Systems, Birkbeck, University of London 2 School of Information Systems,
More informationMEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect ashutosh_shinde@hotmail.com Validating if the workload generated by the load generating tools is applied
More informationAnalysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
More informationDevelopment of a Network Configuration Management System Using Artificial Neural Networks
Development of a Network Configuration Management System Using Artificial Neural Networks R. Ramiah*, E. Gemikonakli, and O. Gemikonakli** *MSc Computer Network Management, **Tutor and Head of Department
More informationIntroduction. Chapter 1
Chapter 1 Introduction The area of fault detection and diagnosis is one of the most important aspects in process engineering. This area has received considerable attention from industry and academia because
More informationNetwork Selection Using TOPSIS in Vertical Handover Decision Schemes for Heterogeneous Wireless Networks
www.ijcsi.org 400 Network Selection Using TOPSIS in Vertical Handover Decision Schemes for Heterogeneous Wireless Networks K.Savitha 1, DR.C.Chandrasekar 2 1 Research Scholar, Periyar University Salem,
More informationAnalysis of TCP Performance Over Asymmetric Wireless Links
Virginia Tech ECPE 6504: Wireless Networks and Mobile Computing Analysis of TCP Performance Over Asymmetric Kaustubh S. Phanse (kphanse@vt.edu) Outline Project Goal Notions of Asymmetry in Wireless Networks
More informationMonitoring Large Flows in Network
Monitoring Large Flows in Network Jing Li, Chengchen Hu, Bin Liu Department of Computer Science and Technology, Tsinghua University Beijing, P. R. China, 100084 { l-j02, hucc03 }@mails.tsinghua.edu.cn,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
More informationAn Agent-Based Concept for Problem Management Systems to Enhance Reliability
An Agent-Based Concept for Problem Management Systems to Enhance Reliability H. Wang, N. Jazdi, P. Goehner A defective component in an industrial automation system affects only a limited number of sub
More informationRobust Router Congestion Control Using Acceptance and Departure Rate Measures
Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {ganeshg@microsoft.com}, Microsoft Corporation,
More informationAdaptive Sampling for Network Performance Measurement Under Voice Traffic
Sampling for Network Performance Measurement Under Voice Traffic Wenhong Ma and Changcheng Huang Optical Networks Laboratory Department of Systems and Computer Engineering, Carleton University 1125 Colonel
More informationIP Forwarding Anomalies and Improving their Detection using Multiple Data Sources
IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources Matthew Roughan (Univ. of Adelaide) Tim Griffin (Intel Research Labs) Z. Morley Mao (Univ. of Michigan) Albert Greenberg,
More informationVoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK V.Rakocevic@city.ac.uk
More informationImplementation of Video Voice over IP in Local Area Network Campus Environment
Implementation of Video Voice over IP in Local Area Network Campus Environment Mohd Nazri Ismail Abstract--In this research, we propose an architectural solution to integrate the video voice over IP (V2oIP)
More informationVirtualized Security: The Next Generation of Consolidation
Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the
More informationSPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING. (1)Radi ROMANSKY
1 SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING (1)Radi ROMANSKY (1)Department of Computer Systems, Technical University Sofia e-mail address: rrom@tu-sofia.bg Bulgaria
More information