Active Traffic Monitoring for Heterogeneous Environments

نویسندگان

  • Hélder Veiga
  • Teresa Pinho
  • José Luís Oliveira
  • Rui Valadas
  • Paulo Salvador
  • António Nogueira
چکیده

Traffic management of IP networks comprises increasing challenges due to the occurrence of sudden and deep traffic variations that can be mainly attributed to the combined effects of several factors, like the great diversity of supported applications and services, different user’s behaviors and different mechanisms of traffic generation and control. In this context, active traffic monitoring is particularly important as it enables characterizing essential aspects in network operation, like for example, quality of service as measured in terms of packet delays and losses. The main goal of this work is to carry out active measurements in a real operational network consisting in a heterogeneous environment that includes both wired and wireless LANs. In order to perform this task, a measurement methodology, and its corresponding measurement platform, will be proposed. The measurement methodology is based on the One-Way Active Measurement Protocol (OWAMP), a recent proposal from the Internet2 and IETF IPPM groups for active measurements of delays and losses in a single direction. The measurement platform was implemented, tested and conveniently validated. This paper begins by a brief presentation of the measurements that we intend to perform, then it describes the OWAMP protocol and the developed measurement system, including its implementation, test and validation through its application to different network scenarios. keywords: Network management, traffic monitoring, active measurement, OWAMP.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Active Bot Networks Based on DNS Traffic Analysis

Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...

متن کامل

A Novel Method for Tracking Moving Objects using Block-Based Similarity

Extracting and tracking active objects are two major issues in surveillance and monitoring applications such as nuclear reactors, mine security, and traffic controllers. In this paper, a block-based similarity algorithm is proposed in order to detect and track objects in the successive frames. We define similarity and cost functions based on the features of the blocks, leading to less computati...

متن کامل

Implementation of Random Forest Algorithm in Order to Use Big Data to Improve Real-Time Traffic Monitoring and Safety

Nowadays the active traffic management is enabled for better performance due to the nature of the real-time large data in transportation system. With the advancement of large data, monitoring and improving the traffic safety transformed into necessity in the form of actively and appropriately. Per-formance efficiency and traffic safety are considered as an im-portant element in measuring the pe...

متن کامل

Modeling CPU Demand in Heterogeneous Active Networks

Active-network technology envisions deploying execution environments in network elements so that application-specific processing can be applied to network traffic. To provide safety and efficiency, individual nodes must include mechanisms to manage resource use. This implies nodes must understand resource demands associated with specific traffic. Wellaccepted metrics exist for expressing bandwi...

متن کامل

How Much CPU Time? Expressing Meaningful Processing Requirements among Heterogeneous Nodes in an Active Network

Active Network technology envisions deployment of virtual execution environments within network elements, such as switches and routers, so that nonhomogeneous processing can be applied to network traffic associated with services, flows, or even individual packets. To use such a technology safely and efficiently, individual nodes must provide mechanisms to enforce resource limits associated with...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005