MS MS - Management Station MNE - Managed Network Element. Link l LAN MNE MNE...
|
|
|
- Tamsin Wells
- 10 years ago
- Views:
Transcription
1 Analyzing Mobile Agent Scalability in Network Management Marcelo Gon alves Rubinstein and Otto Carlos Muniz Bandeira Duarte {rubi, Grupo de Teleinform tica e Automa o - GTA Universidade Federal do Rio de Janeiro COPPE/EE - Programa de Engenharia El trica P.O. Box Rio de Janeiro - RJ - Brazil Abstract This paper aims to investigate mobile agent scalability innetwork management, in order to nd when mobile agents can improve the management eciency. Mobile agent performance is compared with the SNMP one in management task simulations. Response time results show that the mobile agent is less sensitive to the latency and the bandwidth of a bottleneck link that connects the management station to a remote LAN, but the mobile agent is more inuenced by the task to be performed. The results also show that the mobile agent performs better when the number of managed network elements ranges between two limits: an inferior bound, associated with the number of messages that traverse the bottleneck link, and a superior bound, related to the incremental size of the mobile agent, which turns migration dicult. Moreover, the performance increases when the agent returns to the management station after visiting a xed number of nodes. 1 Introduction Agents are programs that help users to perform tasks, acting on behalf of these users. If these agents can execute their tasks on the network, they are called mobile agents. Mobile agents can move to the place where data are stored and select information the user wants by using intelligence saving bandwidth, time, and money. Network management can benet from the use of mobile agents, due to the fact that, in a general manner, this management is based on a centralized paradigm. SNMP (Simple Network Management Protocol) [1] and CMIP (Common Management Information Protocol) [2] use the This paper has been supported by UFRJ, FUJB, CNPq, CAPES, COFECUB, and REENGE.
2 client-server model, on which the manager centralizes information and gives orders to perform repair actions, and the agent collects and saves information in a database and executes manager orders. This centralized approach does not scale when the size or the complexity of the network increases and may not work well when there is a point of failure on the network or in the manager. Mobile agents decentralize processing and control, and, as a consequence, reduce the trac around the management station, turn asynchronous agent-manager communication (useful when there are unreliable or lossy links), distribute processing load, and increase the exibility of the management agents' behavior. Research activities related to mobile code in network management are still recent [3]. Management by Delegation (MbD) [4] has been the rst paradigm to address decentralization and automation of management tasks by dynamically delegating management functions to agents. Mobile agent applications in the OSI functional areas of network management are being developed by Pagurek et al. [5]. They have implemented a code mobility infrastructure and a suite of simple tools that interact with agents located on network components. Baldi et al. [6] evaluate the tradeos of mobile code design paradigms in network management applications by developing a quantitative model for traditional and mobile code design of management functionalities. Morin et al. [7] implement a management architecture that consists of a server and several managers communicating with SNMP agents located on the managed network elements. They perform measurements of bandwidth utilization for this architecture on an Ethernet LAN, while Rubinstein and Duarte [8] simulate management tasks performed by mobile agents and SNMP ones, comparing both the approaches, on topologies similar in shape to the Internet. This paper aims to investigate mobile agent scalability in network management. We analyze the performance of a management system and compare mobile agent and SNMP approaches. The performance is evaluated for: the latency and the data rate of the link that connects the management station to the managed LAN, the initial size of mobile agent, the task to be performed, and the gain due to the unload procedure of the mobile agent after visiting a xed number of nodes. This paper is organized as follows. Section 2 describes currently network management systems. Section 3 presents simulation results concerning the applicability of mobile agents in performing management tasks. At last, concluding remarks are presented in Section 4. 2 Network Management Systems Currently, most network management systems are centralized, but some steps towards decentralization have already been taken and new decentralized approaches are also being developed [9]. SNMP and CMIP protocols, proposed by the Internet Engineering Task Force (IETF) and the International Organization for Standardization (ISO), are based on the client-server model, on which the management station acts as a client that provides a user interface to the network manager and interacts with agents, which are servers that manage remote access to their local information.
3 IETF and ISO have taken some steps towards decentralization. In event notication, SNMP agents notify the management station upon the occurrence of a few signicant events by using traps, i.e., messages sent without an explicit request from the management station. The ISO approach uses more complex agents that have higher processing capacity. In both cases, the agent is only responsible for the notication of an event. SNMPv2 adopts a decentralized approach where there are multiple top-level management stations, the management servers. Each such server is responsible for managing agents, but it can delegate responsibility to an intermediate manager. The intermediate manager, also called proxy agent, plays the role of a manager, in order to monitor and control the agents under its responsibility and it also plays theroleofanagenttoprovide information and accept control from a higher-level management server. SNMPv3 makes additional minor functional changes to the SNMPv2 and incorporates a new security approach [1]. IETF has also proposed RMON (Remote MONitoring) [1] that uses network monitoring devices called monitors or probes. By monitoring packet trac and analyzing the headers, the probes provide information about links, connections among stations, trac patterns, and status of network nodes. A probe can detect failures, misbehaviors, and identify complex events even when not in contact with the management station. New decentralized architectures are also being developed and some of them use mobile agents to decentralize processing and control from the management station [8]. 2.1 Network Management Using Mobile Agents Mobile agents are created to perform their tasks in dierent network computers. A mobile agent can interrupt its execution and migrate from a machine to another, carrying data about agent's state that include information obtained from previous task executions. As the number of visited nodes grows, mobile agent size also increases, turning migration harder. One possible solution to this problem is to visit a xed number of nodes, return or send all data to the agent home (reducing mobile agent size), and continue the task on the remaining nodes (Section 3.4). The initial size of a mobile agent also aects agent performance because the larger the size, the more dicult the migration (Section 3.2). This initial size depends on the task to be carried out (Section 3.3) and on the language used to implementit. Lots of advantages [11] may justify agent utilization in network management, such as: Reduced cost: since management functions require the transfer of a great volume of data on the network, it may be better to send an agent to perform the task directly on management agents, where data are stored. Thus, the agent can lter and select just the relevant information and transmit them to the management station. Asynchronous processing: an agent can be sent through the network to perform tasks on other nodes, and while the agent is out of its home node, this node can be out of operation. Distributed processing: low capacity computers can be eciently used in order to perform simple management tasks, distributing processing previously concentrated on the management station.
4 Flexibility: a new behavior for the management agents can be determined by the management station by sending a mobile agent with a new execution code, substituting in real-time the old one. For the SNMP, network management does not scale when the size or the complexity of the network increases because of the centralized processing and control. Mobile agents can be used in order to solve this problem and it is important to investigate when they improve the management eciency. 3 Simulation Results The applicability of mobile agents in carrying out network management tasks is assessed by comparing the mobile agent performance with the SNMP one. The topology used in these simulations consists of a LAN of Managed Network Elements (MNEs) connected to the management station by a bottleneck link called l (Figure 1). For the Ethernet LAN, the number of nodes is 25, the data rate is 1 Mbps, and the latency is 1 s. The considered performance parameters are bandwidth consumption on link l, evaluated by the number of bytes transmitted and received by a management station, and response time in retrieving SNMP variables (MIB-II objects [12]). MS MS - Management Station MNE - Managed Network Element Link l LAN MNE MNE MNE... MNE Figure 1: Topology used in all simulations. The Network Simulator (NS) [13] is used in this paper. This discrete-event simulator provides several implemented protocols and mechanisms to simulate computer networks with node and link abstractions. In these simulations, wehave used UDP and Ethernet implemented functions, but some UDP modules of the NS have had to be modied in order to eectively receive a packet, sending it to the next layer. The simulation model assumes that links and nodes have no load, links are error-free, and processing time in application layer is not taken into account. UDP is used in all simulations
5 and UDP and IP headers are also considered. The Maximum Transmission Unit (MTU) used for all links is 15 bytes, therefore, there is no fragmentation of SNMP messages since they are small. Every request/response of a variable is sent on a dierent message. SNMP sends requests to all elements to be managed (one after receiving the response from the other) the mobile agent goesto an element to be managed, gathers the variable, and visits all other elements. After nishing, the mobile agent returns to the management station. Various experiments are carried out in order to evaluate the eect on management performance of: the latency and the data rate of the link l, the initial size of mobile agent, the task to be performed, and the gain due to the unload procedure of the mobile agent after visiting a xed number of nodes. 3.1 Eect of the Latency and Data Rate of the Link l In this section, we evaluate the eect of the latency and data rate of the link l, when retrieving an SNMP variable named ifinerrors, which denotes the number of received packets discarded because of errors, from interfaces of LAN stations. Three dierent values for the latency and the data rate of the link l are used, as in Table 1, and the mobile agent size is 5kbytes. Table 1: Values for the latency and the data rate of the link l. Link l Values Latency (ms) Data Rate (Mbps) v v v SNMP-Link v1 SNMP-Link v2 SNMP-Link v3 Response Time (s) Figure 2: Response time for the SNMP.
6 6 5 MA-Link v1 MA-Link v2 MA-Link v3 Response Time (s) Figure 3: Response time for the mobile agent. Figure 3 shows that mobile agent's behavior does not change signicantly with the topology, but for the SNMP, the dierence of performance among response times for the three topologies increases faster when the number of MNEs is large (Figure 2), due to the fact that SNMP packets traverse oftentimes the link l. Response time for the SNMP grows approximately linearly with the number of MNEs. For the mobile agent, the response time increases faster when the number of MNEs grows, due to the incremental size of the mobile agent. For the link v 3 (Table 1), the SNMP performs better than the mobile agent mainly because the link latency is small, but for the link v 1, the mobile agent has a smaller response time since the link latency is large. If the latency is medium (link v 2 ), the mobile agent performs better when the number of MNEs ranges between two limits (Section 3.2). 3.2 Eect of the Initial Size of Mobile Agent The eect of the initial size of mobile agent is also analyzed for a link l value equal to v 2 (Table 1). Five dierent initial sizes of mobile agent are used (1, 3, 5, 7, and 9 kbytes). The task is the same of the previous experiment. For a small number of MNEs, the SNMP uses fewer bytes than the mobile agent to perform the task, but as the number of MNEs increases, the overhead associated with several retrievals (PDU GetRequest, UDP, and IP's headers) turns mobile agent utilization more suitable (Figure 4). As mobile agent size increases, the number of bytes associated with the management station increases proportionally. For the response time, as the number of MNEs increases, the performance dierence among the various mobile agent sizes increases faster (Figure 5). Analyzing the curves MA-5kB and SNMP, for a small number of MNEs, the mobile agent performs better, but when the number of MNEs is greater than 2, SNMP performance is better since the mobile agent size is signicant.
7 Number of kbytes SNMP MA-1kB MA-3kB MA-5kB MA-7kB MA-9kB Figure 4: Number of bytes for dierent mobile agent sizes. Response Time (s) SNMP MA-1kB MA-3kB MA-5kB MA-7kB MA-9kB Figure 5: Response time for dierent mobile agent sizes. 3.3 Eect of the Task to Be Performed An analysis related to mobile agent and SNMP's behavior for dierent tasks is performed. Three tasks are used: task t 1 is the same task used in previous sections task t 2 is related to the retrieval of the SNMP variable named syscontact, which is the name of contact person and how to contact them and task t 3 is related to the SNMP variable called sysdescr, which is a textual description of the system. Request and response packet sizes for the tasks, including all overhead (PDU GetRequest/GetResponse, UDP, and IP headers) are in Table 2. The link l value is the same of the previous experiment, and the mobile agent sizeis 5 kbytes. Figure 6 shows that the number of bytes varies with the task to be performed because the greater the number of bytes of every request/response, the larger the total number of bytes transmitted
8 Table 2: Request and response packet sizes for the tasks. Task Request (bytes) Response (bytes) t t t Number of kbytes SNMP-Task t1 SNMP-Task t2 SNMP-Task t3 MA-Task t1 MA-Task t2 MA-Task t Figure 6: Number of bytes for dierent tasks. Response Time (s) SNMP-Task t1 SNMP-Task t2 SNMP-Task t3 MA-Task t1 MA-Task t2 MA-Task t Figure 7: Response time for dierent tasks. and received by the management station. All mobile agentcurves start at 1 kbytes since agents traverse the bottleneck link two times and their initial size is 5 kbytes. In Figure 7, response time varies in a dierent way when using the mobile agent or the SNMP. For the SNMP, the task does not have a great inuence due to the fact that the numberofbytes exchanged between
9 the management station and the MNEs is small but for the mobile agent, as the number of exchanged bytes increases (e.g., from task t 1 to task t 3 ), the response time also increases since the mobile agent will move with higher diculty. 3.4 Eect of Returning to the Management Station It has been shown in the previous sections that the mobile agent size increases with the number of visited nodes and, as a consequence, migration becomes dicult. In this section, we evaluate the performance gain of the strategy of returning to the management station when the mobile agent size becomes large. The simulations consider that the mobile agent visits a xed number of nodes per trip, i.e., the number of visited MNEs before returning to the management station to unload. The considered tasks are the three previous ones but their purpose is to retrieve the variables from all 25 MNEs. The link l value and the mobile agent size are the same of the previous experiment. The number of visited nodes per trip varies from 1 to MA-Task t1 MA-Task t2 MA-Task t3 Response Time (s) Number of Elements Managed per Trip Figure 8: Response time when returning to the management station. Figure 8 shows that the response time decreases sharply when the number of elements managed per trip is small since the agent visits few nodes and returns to the management station. As the number of nodes visited per trip goes on increasing, response time decreases up to a point when it starts to increase due to agent migration diculty related to the agent size. The optimum point varies with the task for tasks t 1 and t 2, visiting 5 nodes and then returning to the management station provides the best result, while for task t 3,25isthenumber of nodes to be visited per trip. For the number of bytes, it decreases when the number of elements managed per trip increases, as in Figure 9, because the more the mobile agent returns to the management station, the larger the number of bytes transmitted and received by this station.
10 3 25 MA-Task t1 MA-Task t2 MA-Task t3 Number of kbytes Number of Elements Managed per Trip Figure 9: Number of bytes when returning to the management station. 4 Conclusion This paper has analyzed the scalability of mobile agents in network management tasks. The performance of mobile agents has been compared with the SNMP one in several simulations. Response time results show that the mobile agent is less sensitive to the latency and the bandwidth of the bottleneck link that connects the management station to the remote LAN, due to the fact that SNMP packets traverse oftentimes the bottleneck link, but it is more inuenced by the task to be performed, since, for the SNMP, the number of bytes exchanged between the management station and the managed network elements is small. The results also show that the mobile agent performs better than the SNMP when the number of managed network elements ranges between two limits: an inferior bound, associated with the number of messages that traverse the bottleneck link, and a superior bound, related to the incremental size of mobile agent, which turns migration dicult. Moreover, the mobile agent performance increases when the agent returns to the management station, after visiting a xed number of nodes. For the number of bytes, the mobile agent performs better than the SNMP when the number of managed network elements exceeds a value related to the overhead of several SNMP retrievals. We conclude that the mobile agent paradigm signicantly improves the network management performance when most of the agent movement is inside high bandwidth LANs in other words, when only a small percentage of the agent movement concerns the management station and wide area links that are bottlenecks.
11 References [1] W. Stallings, SNMP and SNMPv2: The infrastructure for network management, IEEE Communications Magazine, vol. 36, no. 3, pp. 3743, Mar [2] Y. Yemini, The OSI network management model, IEEE Communications Magazine, vol. 31, no. 5, pp. 229, May [3] V. A. Pham and A. Karmouch, Mobile software agents: An overview, IEEE Communications Magazine, vol. 36, no. 7, pp. 2637, July [4] G. Goldszmidt and Y. Yemini, Delegated agents for network management, IEEE Communications Magazine, vol. 36, no. 3, pp. 667, Mar [5] A. Bieszczad, B. Pagurek and T. White, Mobile agents for network management, IEEE Communications Surveys, vol. 1, no. 1, Sept [6] M. Baldi and G. P. Picco, Evaluating the tradeos of mobile code design paradigms in network management applications, in Proceedings of the 2th International Conference on Software Engineering (ICSE'98), Kyoto, Japan, pp , Apr [7] A. Sahai and C. Morin, Towards distributed and dynamic network management, in Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS'98), New Orleans, USA, Feb [8] M. G. Rubinstein and O. C. M. B. Duarte, Evaluating the performance of mobile agents in network management, in Proceedings of the IEEE Global Telecommunications Conference GLOBECOM'99, RiodeJaneiro, Brazil, Dec [9] M. Kahani and H. W. P. Beadle, Decentralised approaches for network management, Computer Communications Review, vol. 27, no. 3, pp. 3647, July [1] S. Waldbusser, Remote network monitoring management information base. RFC 1757, Feb [11] H. S. Nwana, Software agents: an overview, Knowledge Engineering Review, vol. 11, no. 3, pp. 14, Sept [12] K. McCloghrie and M. Rose, Management information base for network management of TCP/IP-based internets: MIB-II. RFC 1213, Mar [13] K. Fall and K. Varadhan, NS Notes and Documentation, tech. rep., The VINT Project, Jan
A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS
A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria
Role of Agents in Distributed Network Management: A Review
Abstract Role of Agents in Distributed Networ Management: A Review Atul Mishra, A.K.Sharma Department of Comp. Engg. YMCA University of Science and Technology, Faridabad, India [email protected], [email protected]
Network Management - SNMP
Network Management - SNMP Simple Network Management Protocol Networks are indispensable More complexity makes failure more likely Require automatic network management tools Standards required to allow
SNMP Network Management Concepts
SNMP Network Management Concepts Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Background Basic Concepts Summary The Origins of TCP/IP Starts at 1969, and founded
SNMP -overview. Based on: W.Stallings Data and Computer Communications
SNMP -overview Based on: W.Stallings Data and Computer Communications Network Management -SNMP Simple Network Management Protocol (not so simple ) Dominant standardized network management scheme in use
Lecture 5: Foundation of Network Management
Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information
SNMP....Simple Network Management Protocol...
SNMP...Simple Network Management Protocol... Outline of the SNMP Framework SNMP Transport Architecture UDP unreliable transport layer Manager process SNMP UDP IP Physical protocol Agent process SNMP UDP
How To Understand Network Performance Monitoring And Performance Monitoring Tools
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_traffic_monitors2/ind... 1 of 11 SNMP and Beyond: A Survey of Network Performance Monitoring Tools Paul Moceri, [email protected] Abstract The growing
Mobile Software Agents: an Overview
Mobile Software Agents: an Overview Authors : From: Vu Anh Pham and Ahmed Karmouch University of Ottawa, Ontario Presented by: Luba Sakharuk Agenda for the Overview of Mobile Agents Abstract The Mobile
Challenges and Approaches in Providing QoS Monitoring
Challenges and Approaches in Providing QoS Monitoring Yuming Jiang, Chen-Khong Tham, Chi-Chung Ko Department of Electrical Engineering National University of Singapore 10 Kent Ridge Crescent, Singapore
A Satellite Network Management Architecture based on Mobile Agents and SNMP
2012 4th International Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Singapore A Satellite Network Management Architecture based on Mobile Agents and SNMP Jianli
Network Management & Security (CS 330) RMON
Network Management & Security (CS 330) RMON Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan November 08, 2013 CS 330 RMON 1/13 1 / 13 Outline Remote Network
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
of moving the data to the location of the management application code, as in clientserver
Unifying WBEM and Mobile Agents Approaches for Systems Management Marco Antonio C. Simões 1,2, André Luis de M. Santos 1 1 Centro de Informática Universidade Federal de Pernambuco P.O. Box 7851, ZIP: 50732-970
Chapter 18. Network Management Basics
Network Management Basics > FCAPS Model Chapter 18. Network Management Basics This chapter covers the following topics: FCAPS Model Network Management Architecture Network Management Protocols An Introduction
Monitoring Network QoS in a Dynamic Real-Time System 1
Monitoring Network QoS in a Dynamic Real-Time System Hong Chen, Brett Tjaden, Lonnie Welch, Carl Bruggeman, Lu Tong, Barbara Pfarr School of Electrical Engineering and Computer Science Ohio University,
Only a few years ago, most networks
By Timon C. Du, Eldon Y. Li, and An-Pin Chang s IN DISTRIBUTED NETWORK MANAGEMENT By helping to disperse centralized network management tasks to subnet hosts, mobile agent technology helps conserve network
Using SNMP for Remote Measurement and Automation
Using SNMP for Remote Measurement and Automation Nikolay Kakanakov, Elena Kostadinova Department of Computer Systems and Technologies, Technical University of Sofia, branch Plovdiv, 61 St. Petersburg Blvd.,
TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT. Aiko Pras [email protected]
TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT 9 July 1996 Aiko Pras [email protected] http://wwwtios.cs.utwente.nl/~pras http://wwwtios.cs.utwente.nl/ http://wwwsnmp.cs.utwente.nl/ Copyright
R07. IV B.Tech. II Semester Regular Examinations, April, 2011. NETWORK MANAGEMENT SYSTEMS (Information Technology)
Set No. 1 1. a) Discus about network management goals and functions in detail. b) Explain in detail about current status and future of network management. 2. a) Explain the SNMP network management architecture.
SNMP Basics BUPT/QMUL 2015-05-12
SNMP Basics BUPT/QMUL 2015-05-12 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction
TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)
1/28 2/28 TE in action S-38.3192 Verkkopalvelujen tuotanto S-38.3192 Network Service Provisioning Networking laboratory 3/28 4/28 Concept of Traffic Engineering (TE) Traffic Engineering (TE) (Traffic Management)
LOW OVERHEAD CONTINUOUS MONITORING OF IP NETWORK PERFORMANCE
LOW OVERHEAD CONTINUOUS MONITORING OF IP NETWORK PERFORMANCE Mandis Beigi, Raymond Jennings, and Dinesh Verma IBM Thomas J. Watson Research Center 30 Saw Mill River Road, Hawthorne, NY 10532 e-mail: {mandis,
Simple Network Management Protocol
56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange
Simple Network Management Protocol
A Seminar Report on Simple Network Management Protocol Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: SUBMITTED BY: www.studymafia.org www.studymafia.org
A Summary of Network Traffic Monitoring and Analysis Techniques
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_monitoring/index.html 1 of 9 A Summary of Network Traffic Monitoring and Analysis Techniques Alisha Cecil, [email protected] Abstract As company intranets
Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016
Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
SNMP Extensions for a Self Healing Network
SNMP Extensions for a Self Healing Network Background Patent 6,088,141: This is a self healing network depending on additional hardware. It requires a second ring of connection to handle recovery operations.
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
A Tool for Multimedia Quality Assessment in NS3: QoE Monitor
A Tool for Multimedia Quality Assessment in NS3: QoE Monitor D. Saladino, A. Paganelli, M. Casoni Department of Engineering Enzo Ferrari, University of Modena and Reggio Emilia via Vignolese 95, 41125
Limitations on Monitored Lines
Limitations on Monitored Lines Version 1.0 April 7, 2014 1009 Pruitt Road The Woodlands, TX 77380 WWW.BROADSOFT.COM Table of Contents 1. MONITORING LINES... 1 2. HOW MONITORING WORKS... 1 3. SIP MESSAGE
Network Virtualization for Large-Scale Data Centers
Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
Introduction to Simple Network Management Protocol (SNMP)
Introduction to Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) is an application layer protocol for collecting information about devices on the network. It is part
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation
Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation Fu-Min Chang #1, I-Ping Hsieh 2, Shang-Juh Kao 3 # Department of Finance, Chaoyang University of Technology
www.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
SQL*Net PERFORMANCE TUNING UTILIZING UNDERLYING NETWORK PROTOCOL
SQL*Net PERFORMANCE TUNING UTILIZING UNDERLYING NETWORK PROTOCOL Gamini Bulumulle ORACLE CORPORATION 5955 T.G. Lee Blvd., Suite 100 Orlando, FL 32822 USA Summary Oracle client/server architecture is a
Network Management for Picture Archiving and Communication Systems (PACS)
Network Management for Picture Archiving and Communication Systems (PACS) Edwood Yiu M.Eng. project presentation November 21, 2006 School of Engineering Science Simon Fraser University Road map Purpose
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
CONTROL SYSTEM FOR INTERNET BANDWIDTH BASED ON JAVA TECHNOLOGY
CONTROL SYSTEM FOR INTERNET BANDWIDTH BASED ON JAVA TECHNOLOGY SEIFEDINE KADRY, KHALED SMAILI Lebanese University-Faculty of Sciences Beirut-Lebanon E-mail: [email protected] ABSTRACT This paper presents
Load Balancing among Access Points
among Access Points Master Thesis Department of Informatics MSc in Computer Science Athens University of Economics and Business Mmlab Meeting, June 2010 Outline Introduction 1 Introduction Objectives The
From Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas
ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos ([email protected]) ([email protected])
A Framework for End-to-End Proactive Network Management
A Framework for End-to-End Proactive Network Management S. Hariri, Y. Kim, P. Varshney, Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244 {hariri, yhkim,varshey}@cat.syr.edu
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade
Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489
Comparison of SNMP. Versions 1, 2 and 3
Comparison of SNMP 1 Comparison of SNMP Versions 1, 2 and 3 Eddie Bibbs Brandon Matt ICTN 4600-001 Xin Tang April 17, 2006 Comparison of SNMP 2 During its development history, the communities of researchers,
ICS 153 Introduction to Computer Networks. Inst: Chris Davison [email protected]
ICS 153 Introduction to Computer Networks Inst: Chris Davison [email protected] 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture
A Hybrid approach to Network Performance Monitoring based on Mobile Agents and CORBA
A Hybrid approach to Network Performance Monitoring based on Mobile Agents and CORBA Christos Bohoris, George Pavlou, Antonio Liotta Centre for Communication Systems Research, School of Electronics, Computing
SNMP and SNMPv2: The Infrastructure for Network Management
SNMP and SNMPv2: The Infrastructure for Network Management William Stallings ABSTRACT The Simple Network Management Protocol is the most widely used protocol for the management of -based networks and internets.
Advanced Network Monitoring Applications Based on Mobile/Intelligent Agent Technology
Advanced Network Monitoring Applications Based on Mobile/Intelligent Agent Technology Damianos Gavalas, Dominic Greenwood *, Mohammed Ghanbari, Mike O Mahony Communication Networks Research Group, Electronic
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
Packet Sampling and Network Monitoring
Packet Sampling and Network Monitoring CERN openlab Monthly Technical Meeting 13 th November, 2007 Milosz Marian Hulboj [email protected] Ryszard Erazm Jurga [email protected] What is Network
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
10/100/1000 Ethernet MAC with Protocol Acceleration MAC-NET Core
1 Introduction The implements, in conjunction with a triple speed 10/100/1000 MAC, Layer 3 network acceleration functions, which are designed to accelerate the processing of various common networking protocols
Introduction to Network Management
Introduction to Network Management Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network Management Requirement SNMP family OSI management function
PART OF THE PICTURE: The TCP/IP Communications Architecture
PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals
A Novel Technique for SNMP Bandwidth Reduction: Simulation and Evaluation
208 A Novel Technique for SNMP Bandwidth Reduction: Simulation and Evaluation O. Said Computer Science Department, Faculty of Computers and Information Systems, Taif University, KSA. Abstract One of the
A PPENDIX L TCP/IP and OSI
A PPENDIX L TCP/IP and OSI William Stallings Copyright 2010 L.1 PROTOCOLS AND PROTOCOL ARCHITECTURES...2! L.2 THE TCP/IP PROTOCOL ARCHITECTURE...5! TCP/IP Layers...5! TCP and UDP...7! Operation of TCP/IP...7!
Network Management (NETW-1001)
Network Management (NETW-1001) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Spring 2016 TOC 1 Architecture of NMSs 2 OSI Network Management 3 Telecom Management Network 4 SNMP 5 SMI and MIB Remote Management
Using Logs to Increase Availability in Real-Time. Tiina Niklander and Kimmo Raatikainen. University of Helsinki, Department of Computer Science
Using Logs to Increase Availability in Real-Time Main-Memory Tiina Niklander and Kimmo Raatikainen University of Helsinki, Department of Computer Science P.O. Box 26(Teollisuuskatu 23), FIN-14 University
PROFINET the Industrial Ethernet standard. Siemens AG 2013. Alle Rechte vorbehalten.
the Industrial Ethernet standard is 100% Ethernet is Ethernet Ethernet is the established standard in the IT world for fast exchange of data (IEEE 802.3) is always full duplex simultaneous communication
A Study of the Behaviour of the Simple Network Management Protocol
A Study of the Behaviour of the Simple Network Management Protocol Colin Pattinson School of Computing, Leeds Metropolitan University, Beckett Park, Leeds LS6 3QS UK E-Mail : [email protected] The
SNMP. Simple Network Management Protocol
SNMP Simple Network Management Protocol Introduction SNMP Simple Network Management Protocol A set of standards for network management Protocol Database structure specification Data objects A set of standardized
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
Outline of the SNMP Framework
2 SNMP--A Management Protocol and Framework Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Outline of the SNMP Framework Management Program
How To Monitor Performance On Eve
Performance Monitoring on Networked Virtual Environments C. Bouras 1, 2, E. Giannaka 1, 2 Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet applications,
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
Network Management Functions RMON1, RMON2. Network Management
Network Management Functions RMON1, RMON2 Network Management 30.5.2013 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management
SOFTWARE AGENTS IN NETWORK MANAGEMENT
SOFTWARE AGENTS IN NETWORK MANAGEMENT Rui Pedro Lopes ESTiG IPB,Campus de St. Apolónia P-5300 Bragança, [email protected] José Luís Oliveira Universidade de Aveiro, DET/INESC, P-3810 Aveiro, [email protected] Key
Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University
Network Monitoring Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network monitoring architecture Performance monitoring Fault monitoring Accounting
Presented by Aurang Zeb 14CS-03. Network Management System
Presented by Aurang Zeb 14CS-03 Network Management System INTRODUCTION o We can define network management as monitoring, testing, configuring, and troubleshooting network components to meet a set of requirements.
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
