Design and Implementation of a Network Behavior Analysis-oriented IP Network Measurement System

Size: px
Start display at page:

Download "Design and Implementation of a Network Behavior Analysis-oriented IP Network Measurement System"

Transcription

1 The 9th International Conference for Young Computer Scientists Design and Implementation of a Network Behavior Analysis-oriented IP Network Measurement System Bin Zeng 1, Dafang Zhang 2, Wenwei Li 2, Gaogang Xie 3,Guangxing Zhang 3 1 College of Computer and Communication, Hunan University, Changsha, , China 2 Software School, Hunan University, Changsha, , China 3 Institute of Computing Technology, Chinese Academy of Science, Beijing, , China {zengbin604, dfzhang,liww}@hnu.cn, {xie, guangxing}@ict.ac.cn Abstract Analyzing the characteristic of network behavior provides scientific basis for designing, building, and managing the next generation Internet, and is especially important for monitoring network behavior. This paper establishes a system of metrics that evaluates the behavior of IP networks with respect to the need of analyzing network behavior, introduces the design and implementation of network monitoring system that focuses on the analysis of the characteristics of network behavior, analyzes crucial problems on system design, builds an experiment environment and runs tests on it. The results show that our system satisfies all requirements imposed by real time monitoring network behavior, therefore is able to help the decision making in operating and managing networks. Keywords: Network behavior, network measurement system, packet capture, behavior metrics. 1. Introduction With the development of processing capability of network device, link speed is continuously increasing and various new applications continue to emerge, which make network characteristic a great deal of changes. The emerging of information society and knowledge of globalization also has made new demands for the Internet. The quality of service is becoming an enormous challenge to the Internet. In order to solve the problem concerning the IP quality of service on the IP network management, from the beginning of the 1990s, people gradually carried out a research on the network behavior. Network behavior refers to the study of operation of network behavior characteristics. Through finding out various behavioral patterns from network, we can find the key factors which led to the change of behavior and explain the causes for the various phenomena of network. Network behavior plays a key role for the research of trend analysis, monitoring hotspots (the path of over loading), congestion avoiding and so on. At present network behavior research with the common methods of the following three categories: the first method is model analysis, which use a mathematical method to establish the network model, such as the self-similar traffic model [1] [2] [3] [4], Gilbert packet loss model [5] [6], TCP throughput model[7]. As the network becomes more complicated, more and more factors should be considered, and the establishment of the network model is more and more difficult, which means this method will face enormous challenges. The second method is simulation. Through establish the statistical model of network links and simulates network traffic transmission, simulation software acquires network behavior data which network designing or optimizing needs [8]. However, the complexity of the network environment restricts its application. The third method is measurement and analysis. Network measurement put performance testing on the actual operations of network, capturing the measurement data of the Internet and its activities quantitative to obtain network's history, status and trend forecast [9]. Network measurement is becoming the chief method for analysis of network behavior, resulting from the increasing complexity of the Internet and increasing difficult to establish mathematical model. At present, there are many methods and achievement about network measurement. The data reflecting the network state can be collected by network management system. However, the analysis of collected data is far behind the collection technique, and the characteristics of network can t be obtained from real and historical data. Meanwhile, a large number of theoretical models about network behavior are proposed, which are separated from real network environment and lacking conviction. In this paper, on /08 $ IEEE DOI /ICYCS

2 the basis of relevant work [10-13], we design and implement a network monitoring systems for the analysis of the behavior characteristics of network. Network behavior is partitioned into traffic behavior, end-to-end behavior, routing, and application behavior. The system can integrate network monitoring technology and network data analysis technique organically to provide a unified analysis platform for the various behavior of network. 2. Monitoring and analyzing metrics To overall understand running status of the Internet, We determine the following five ways of network behavior measurement parameters: traffic behavior, end-to-end behavior, routing behavior, application behavior and network element behavior. Let s make detailed introduction in the following. Traffic behavior : Through disposing packet capture tools in key points of network, network traffic analysis metrics are available. The metrics can be divided into packet-level and flow-level. Packet-level metrics include the flow of link layer (rate), packet size distribution, traffic of 280 kinds of protocol, the port traffic information of top N flow; flow-level metrics include concurrent Flow number of a measurement cycle, the number of new flow, the number of aging flow, flow size distribution, the duration of flow distribution, the flow information of top N flow size and flow duration. End-to-end behavior:from the measuring source point to the end point, the routers and links between the two points compose an end-to-end path. Through sending specifically detecting data packages from the measuring end to the measured end and observing the respond of network, Speculate the service quality of end-to-end path. The metrics of evaluating end-to-end path include connectivity, one-way/round-trip, packet loss, one-way delay, round-trip delay, delay jitter, bottleneck bandwidth, available bandwidth, and TCP throughput. Routing behavior: The BGP/OSPF simulator constructed by Zebra is used to collect router information, and collect the end-to-end routing data with the aid of traceroute. The monitoring of routing behavior includes the inefficient routing analysis, routing stability analysis, routing convergence analysis, morbidity advertisement analysis, routing circulation analysis, routing policy analysis, routing oscillation analysis, whether running distributed, no routing circulation, running as needed, safety and time complexity, communication complexity, routing efficiency and so on. Application behavior: A methodology which can monitor the end-to-end user applications is used, termed active application probing mode. By sending requests from the client to the server and observing the response from server, the methodology can reflect the performance of the end-to-end applications without knowing the state of the network devices. The application performance metric can be divided in two sub categories: network/server accessibility and efficiency. Network element behavior: The SNMP protocol can be applied to collect network control information like routing update and MIB status on relevant devices and so on. It is specifically includes automatic discovery and maintenance of network topology, properties of major network devices, operating status, device traffic, SNMP capability information. 3. System design The key of network behavior monitor is the realtime acquirement and analysis of network behavior data. The IP network monitor system which is network behavior characteristic analysis oriented must satisfy this requirement that is the kernel of the design of system has to be the data of network behavior. Monitor system can test on real time or for long term based on configuration, collect behavior data, and show network behavior guide line in fact in intelligible means for user. The function of system is partitioned by data, and figure 1 shows the situation. Figure1.system function partition 3.1. System composing Based on the analysis forenamed, IP network monitor system which is network behavior oriented is showed as figure 2 in order to support needs of various network behaviors. The system can be divided into three layers: measurement plat, control plat and analysis plat. Measurement Platform: The main function is showed as following: collection tools which is used to save various network behavior data, including traffic capturer, p2p measurement tools, router simulator, operation emulator, SNMP agent; measuring or 375

3 importing various data; sending coded measurement results to control plat, and saving results. Control Platform: the major function of control platform is to dispatch the data collection tasks and send the measurement commands. The data collecting module, data analysis module and data visualization module work together to accomplish the measurement tasks; and the enormous data of network behavior monitoring will be stored into database after simplified. Analysis Platform: The processing of forming visualization data gotten from original data is a procedure of analyzing and abstracting data. The analysis platform is used to get rid of a large number of data unrelated to network behavior measurement, construct the metric data set of network behavior and take charge of analysis of all data. to system control and measurement program which will invoke the relevant measurement tools to implement the measurement after configured the parameters. And then the control and measurement program will take pipeline to transfer the result to data analysis engineer who will displays the analyzed result in graphic and prepares next measurement at the same time when the entire measurement finished. Figure3 sketch map of Measurement control Figure 2 system architecture The architecture adopts the manner of centralized management and distributed measurement, with good openness and scalability. The system can be used for flexible measurement and analysis of network behavior and is suitable for mass deployment by easily adding measurement tool. And the network performance can be easily evaluated by analyzing the data comprehensively through analysis engineering System design and realization Figure 3 shows a sketch map of Measurement control. The main functions of analysis platform are the configuration of task parameters, and analyzing of measurement result. The measurement task is assigned The main function of control platform is controlling and managing measurement tasks. The control module will firstly collect and analyze the user configured parameters, then create a thread and send the parameters to measurement tool, and at last, it will store the measurement results into the database, analyze the result and send the results back to analysis platform after the measurement finished. The measurement platform carries on the specific measurement work. After receiving measurement task, the system control module will create a corresponding measurement thread according to measurement type and measurement parameters. The thread will start one measurement tool among five measurement tool modules. The figure 4 describes the information and data process inside the system in detail. The system program mainly includes three threads: management and control thread, measurement thread, analysis and visual display thread. Management and control thread takes charge of creating two threads: one is used to manage measurement task by users, another is used to control measurement tool and task. Such as assign task to measurement thread, store and analyze measurement data and so on; Measurement thread takes charge of receiving measurement task from management and control thread and creating 376

4 measurement thread and starting measurement tool to measure. Measurement thread will send results to analysis and visualization thread which will show the result to user by graphic. Pipeline is used for the communication between threads. packets buffer after completing packet processing and analysis. Figure5.shared memory method architecture Figure 4 information and data process inside the system 3.3. Crucial technology Probe used in the system is achieved based on common hardware platform. Therefore, high efficient packet capture and less system resources for the flow characteristics of acquisition method is the key to guarantee the accuracy of the systems. We implement a new traffic capture method based on shared memory to improve the efficiency. The key of this method is using shared memory which is between kernel space and user space as packet buffer to reduce the number of system calls and implement packet zero-copy. Take the advantage of share memory, packet receive path from NIC driver buffer to user level application has been shorten. Figure 5 show that, packet capture method based on shared memory for high-speed network consists of three parts: the packet capture driver module, the shared memory management module and the upperclass application API interface. The process of packet capture are as follows: 1 access to the packet capture drive module, through the revision of Driver Program; 2 through shared memory management module inspect packet buffer memory space, if still available will write data packets through DMA (Directly Memory Access) channel to the shared memory and return, otherwise discarded packets directly; 3 flow monitoring and analysis application procedures call upper API interface to access package in the shared memory buffer, and then release of The establishment of shared memory space is the key to implement packet capture for high-speed network. The packet capture driver module is responsible for writing packets to the shared memory. Flow monitoring and analysis procedure call API interface reading of the packet for statistics and analysis. Through access to the packet capture driver module for writing packet into shared memory directly and circularly, the applications in the user space call API interface to access shared memory, implement packet zero-copy and eliminate the system calls. 4. Application of the system We did measurement and analysis on a campus network in order to verify the effect of the system. The probe was deployed on the joint of connect link which was paid attention to. And then according to advanced enactment, the control and analysis plat which was deployed on network manage center collected the monitor and analysis results periodically which was gained by probes. Figure 6 shows the topological graph of testing network, from which we can locate brokendown instrument and broken-down link quickly. We selected the kernel router ( ) from figure 6, deployed probe on it and monitored the traffic by port image. Figure 7 shows the traffic continuously changing instance of the kernel router in one month ( to ). From the figure, the change of link traffic has definite character on day, and daily change assumes parabola shape which inosculates active rule of human beings. To analyzing the data of one day, the total traffic of network link is low, because its average traffic is 300Mbps (the physical bandwidth is 1000Mbps), and its average 377

5 utility of bandwidth is about 30%. The busy periods of link are period 9:00~17:00 and period 20:00~22 :00; other periods are spare time. The in and out traffic is smoothness on the whole. In it, there are just 2 outbursts, one on 8:00~9:00 pm and one on 9: 00~10:00 am. The changing rule of daily traffic is the same, except that the traffic grows a little on Friday and Saturday evenings. Figure 8 application types distribution Figure 6 the topological graph of testing network To see from TOPN of service flow, most traffic of network is produced by some correlative IP, either by byte traffic or by data packets traffic. This basically accords with 20/80 rule. For example in figure 9, the frequency of appearance of flows reference with IP is very high in TOPN and the ratio of its byte traffic and data packets traffic is also high. Figure9 traffic TOP N Figure 7 traffic changing instance To examine the history data during this period, as figure 8 shows, bursting out operations are based on P2P operation and flow media operation, and there is also little the traditional operation which is based on HTTP. To analysis on byte traffic of link, from high to low by ratio of traffic, those are P2P (44.73%) flow media(23.09%) basic applications(18.22%) private protocols(9.49%) VoIP online telephone(3.85%) online games(0.3%) instant communications(0.32%). P2P application will become more and more popular. Either illegal application or legal application, manager should know the traffic characters of P2P application, and to conduct and control it through proper strategy. The analysis of system experiment above shows the characters of network, and points out the basic character of these actions and the positions where frequently appear congestions. The analysis is important to the maintenance and natural performance of network. Those characters are hard to be showed by common network monitor system. This point has instructional meanings for enhancing the network performance. 5. Conclusions To reflect Internet running behavior characteristic roundly, we design a network monitoring systems for the analysis of the behavior characteristics, and realize performance monitoring of network. This system mainly monitors and analyzes traffic behavior, end-to- 378

6 end behavior, routing, and application behavior characteristic. In the course of realization, we present measurement and analysis metrics, which roundly reflect network characteristics; then we discuss the material measurement and analysis method and introduce the crucial technologies which is used in the system; In the end, we validate the system in Campus LAN and gain good effect. In the following work, we need to make further study on the predictability of network performance. Acknowledgment This research is funded by National Natural Science Foundation of China with grant no , and Thanks to our team in ICT for their efforts to develop the monitoring and measurement system, especially thanks to Jian Yang, Dunxing Zhang etc. References [1]W. Leland, M. Taqqu, W. Willinger, and D. Wilson, On the self-similar nature of Ethernet Traffic, IEEE/ACM Transactions on Networking, 1994, pp [2]Matthew Roughan and Darryl Veitch, Measuring Long- Range Dependence under Changing Traffic Conditions, INFOCOM '99, New York, NY, 1999, pp [3]Thomas Karagiannis, Mart Molle, Michalis Faloutsos, Long-Range Dependence: Ten Years of Internet Traffic Modeling, IEEE Internet Computing, 8(5),2004, pp [4] Gaogang Xie, Guangxing Zhang, etc, The Survey on Traffic of Metro Area Network with Measurement On-line, Proceedings of the 20th International Teletraffic Congress, Ottawa, Canada, 2007, pp [5]Y.Zhang, N.Duffield, V.Paxson and S.Shenker, On the Constancy of Internet Path Properties, In ACM SIGCOMM Internet Measurement Workshop, 2001, pp [6]Xunqi Yu, James W. Modestino, Xusheng Tian, The accuracy of Gilbert models in predicting packet-loss statistics for a single-multiplexer network model, INFOCOM 2005, pp [7]M.Goyal, R.Guerin and R.Rajan, Predicting TCP Throughput From Non-invasive Network Sampling, INFOCOM2002, pp [8]MA Wei-min, LI Zhong-cheng,Wang Jun-feng, XIE Gao- Gang, An Analysis of the Characteristics of High-speed Network Traffic Based on Simulation, Journal of system simulation, 2004, 16(4), pp [9]Zhang Hong-Li, Fang Bin-Xing, Hu Ming-Zeng, etc, A Survey on Internet Measurement and Analysis, Journal of Software, 2003, 14(1), pp [10]Li Wenwei, Zhang Dafang, Yang Jinmin, Xie Gaogang. On Evaluating the Differences of TCP and ICMP in Network Measurement, Computer Communications, 2007, 30(2), pp [11]Guangxing Zhang, Gaogang Xie, etc, Self-Similar Characteristic of Traffic in Current Metro Area Network, 15th IEEE Workshop on Local and Metropolitan Area Networks, June 10-13, 2007, Princeton NJ, USA. [12]LI Wen-Wei, ZHANG Da-Fang, XIE Gao-Gang, YANG Jin-Min. A High Precision Approach of Network Delay Measurement Based on General PC, Journal of Software, 2006, 17(2), pp [13]Fan Chao,Xie Gaogang,Zhang Dafang,Li Zhongcheng, Performance Analysis of HTTP Service Based on Network Active Measuremnet, Journal of Computer Research and Development,2005,42(3), pp

An Internet router level topology automatically discovering system

An Internet router level topology automatically discovering system 2002 12 Vol.23 No.12 23 12 JOURNAL OF CHINA INSTITUTE OF COMMUNICATIONS October 2002 1 Internet 1,2 1,2 1,2,3 1,2 (1. 150001 2. 150001 3., 100031) Internet CERNET IP Internet Internet TP393.02 B 1000-436X(2002)12-0054-09

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

TM ALGORITHM TO IMPROVE PERFORMANCE OF OPTICAL BURST SWITCHING (OBS) NETWORKS

TM ALGORITHM TO IMPROVE PERFORMANCE OF OPTICAL BURST SWITCHING (OBS) NETWORKS INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 232-7345 TM ALGORITHM TO IMPROVE PERFORMANCE OF OPTICAL BURST SWITCHING (OBS) NETWORKS Reza Poorzare 1 Young Researchers Club,

More information

Research Article. Three-dimensional modeling of simulation scene in campus navigation system

Research Article. Three-dimensional modeling of simulation scene in campus navigation system Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2013, 5(12):103-107 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Three-dimensional modeling of simulation scene

More information

Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology

Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology 2010 China International Conference on Electricity Distribution 1 Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology Zhang Hong-tao, Ye Ying, An Qing China Zhoukou Power

More information

Research on the Establishment and Analysis of Small Business Networks

Research on the Establishment and Analysis of Small Business Networks 2018 2nd International Conference on Systems, Computing, and Applications (SYSTCA 2018) Research on the Establishment and Analysis of Small Business Networks Guozhen Sang 1 School of Network Security and

More information

A Dynamic Adaptive Algorithm Based on HTTP Streaming Media Technology

A Dynamic Adaptive Algorithm Based on HTTP Streaming Media Technology 2016 International Conference on Electronic Information Technology and Intellectualization (ICEITI 2016) ISBN: 978-1-60595-364-9 A Dynamic Adaptive Algorithm Based on HTTP Streaming Media Technology Zhufeng

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

A New Method Of VPN Based On LSP Technology

A New Method Of VPN Based On LSP Technology 2nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 2017) A New Method Of VPN Based On LSP Technology HaiJun Qing 1, 2 1, 2, ChaoXiang Liang, LiPing

More information

Performance Comparison and Analysis of Power Quality Web Services Based on REST and SOAP

Performance Comparison and Analysis of Power Quality Web Services Based on REST and SOAP 5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017) Performance Comparison and Analysis of Power Quality Web Services Based on REST and SOAP Suxia

More information

Multicast Transport Protocol Analysis: Self-Similar Sources *

Multicast Transport Protocol Analysis: Self-Similar Sources * Multicast Transport Protocol Analysis: Self-Similar Sources * Mine Çağlar 1 Öznur Özkasap 2 1 Koç University, Department of Mathematics, Istanbul, Turkey 2 Koç University, Department of Computer Engineering,

More information

Congestion Propagation among Routers in the Internet

Congestion Propagation among Routers in the Internet Congestion Propagation among Routers in the Internet Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology, Osaka University -, Yamadaoka, Suita, Osaka,

More information

The ESB dynamic routing strategy in the low bandwidth network environment

The ESB dynamic routing strategy in the low bandwidth network environment Journal of Network Computing and Applications (2016) 1: 26-32 Clausius Scientific Press, Canada The ESB dynamic routing strategy in the low bandwidth network environment Wei Huang1,a, Kangyi Luo1, Baocheng

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

Ashortage of IPv4 address space has

Ashortage of IPv4 address space has INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2005; 15: 411 419 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/nem.582 A measurement study of network

More information

Research Article. ISSN (Print) *Corresponding author Chen Hao

Research Article. ISSN (Print) *Corresponding author Chen Hao Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 215; 3(6):645-65 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)

More information

Research on Firewall in Software Defined Network

Research on Firewall in Software Defined Network Advances in Computer, Signals and Systems (2018) 2: 1-7 Clausius Scientific Press, Canada Research on Firewall in Software Defined Cunqun Fan a, Manyun Lin, Xiangang Zhao, Lizi Xie, Xi Zhang b,* National

More information

A Design of Remote Monitoring System based on 3G and Internet Technology

A Design of Remote Monitoring System based on 3G and Internet Technology National Conference on Information Technology and Computer Science (CITCS 2012) A Design of Remote Monitoring System based on 3G and Internet Technology Shouxian WEN Lei XU Xingguo SUN Xiaohui LI* Abstract

More information

SamKnows test methodology

SamKnows test methodology SamKnows test methodology Download and Upload (TCP) Measures the download and upload speed of the broadband connection in bits per second. The transfer is conducted over one or more concurrent HTTP connections

More information

Research and Implementation of Server Load Balancing Strategy in Service System

Research and Implementation of Server Load Balancing Strategy in Service System Journal of Electronics and Information Science (2018) 3: 16-21 Clausius Scientific Press, Canada Research and Implementation of Server Load Balancing Strategy in Service System Yunpeng Zhang a, Liwei Liu

More information

Application of Nonlinear Later TV Edition in Gigabit Ethernet. Hong Ma

Application of Nonlinear Later TV Edition in Gigabit Ethernet. Hong Ma 3rd International Conference on Science and Social Research (ICSSR 2014) Application of Nonlinear Later TV Edition in Gigabit Ethernet Hong Ma Education and Training Department, Shaanxi Vocational and

More information

Preliminary Research on Distributed Cluster Monitoring of G/S Model

Preliminary Research on Distributed Cluster Monitoring of G/S Model Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 860 867 2012 International Conference on Solid State Devices and Materials Science Preliminary Research on Distributed Cluster Monitoring

More information

Network Bandwidth Utilization Prediction Based on Observed SNMP Data

Network Bandwidth Utilization Prediction Based on Observed SNMP Data 160 TUTA/IOE/PCU Journal of the Institute of Engineering, 2017, 13(1): 160-168 TUTA/IOE/PCU Printed in Nepal Network Bandwidth Utilization Prediction Based on Observed SNMP Data Nandalal Rana 1, Krishna

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Autonomous System Network Topology Discovery Algorithm Based On OSPF Protocol

Autonomous System Network Topology Discovery Algorithm Based On OSPF Protocol 3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Autonomous System Network Topology Discovery Algorithm Based On OSPF Protocol Xingchao Ma 1, a *, Geming

More information

Effects of Applying High-Speed Congestion Control Algorithms in Satellite Network

Effects of Applying High-Speed Congestion Control Algorithms in Satellite Network Effects of Applying High-Speed Congestion Control Algorithms in Satellite Network Xiuchao Wu, Mun Choon Chan, and A. L. Ananda School of Computing, National University of Singapore Computing 1, Law Link,

More information

A new Class of Priority-based Weighted Fair Scheduling Algorithm

A new Class of Priority-based Weighted Fair Scheduling Algorithm Available online at www.sciencedirect.com Physics Procedia 33 (2012 ) 942 948 2012 International Conference on Medical Physics and Biomedical Engineering A new Class of Priority-based Weighted Fair Scheduling

More information

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority To cite this article:

More information

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Zhili Zhao Dept. of Elec. Engg., 214 Zachry College Station, TX 77843-3128 A. L. Narasimha Reddy

More information

Application of Redundant Backup Technology in Network Security

Application of Redundant Backup Technology in Network Security 2018 2nd International Conference on Systems, Computing, and Applications (SYSTCA 2018) Application of Redundant Backup Technology in Network Security Shuwen Deng1, Siping Hu*, 1, Dianhua Wang1, Limin

More information

Simulation and Realization of Wireless Emergency Communication System of Digital Mine

Simulation and Realization of Wireless Emergency Communication System of Digital Mine Simulation and Realization of Wireless Emergency Communication System of Digital Mine Yi Sun Department of Telecommunication and Information Engineering Xi an University of Science and Technology, Xi an

More information

A NEW APPROACH FOR BROADBAND BACKUP LINK TO INTERNET IN CAMPUS NETWORK ENVIRONMENT

A NEW APPROACH FOR BROADBAND BACKUP LINK TO INTERNET IN CAMPUS NETWORK ENVIRONMENT A NEW APPROACH FOR BROADBAND BACKUP LINK TO INTERNET IN CAMPUS NETWORK ENVIRONMENT Mohd Nazri Ismail Faculty of MIIT, University of Kuala Lumpur (UniKL), MALAYSIA, mnazrii@miit.unikl.edu.my Abstract Most

More information

CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture

CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture Yuan-ni Liu Hong Tang, Guo-feng Zhao The School of Communication and Information Engineering of ChongQing University of Posts and

More information

Research Article A Novel Solution based on NAT Traversal for High-speed Accessing the Campus Network from the Public Network

Research Article A Novel Solution based on NAT Traversal for High-speed Accessing the Campus Network from the Public Network Research Journal of Applied Sciences, Engineering and Technology 7(2): 221-226, 2014 DOI:10.19026/rjaset.7.244 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted: March

More information

Design of Physical Education Management System Guoquan Zhang

Design of Physical Education Management System Guoquan Zhang 2nd International Conference on Education, Management and Information Technology (ICEMIT 2015) Design of Physical Education Management System Guoquan Zhang Department of Physical Education, Bohai University,

More information

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

Configuring Cisco IOS IP SLAs Operations

Configuring Cisco IOS IP SLAs Operations CHAPTER 39 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service

More information

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI 1 Yongxian SONG, 2 Rongbiao ZHANG and Fuhuan

More information

Header Compression Capacity Calculations for Wireless Networks

Header Compression Capacity Calculations for Wireless Networks Header Compression Capacity Calculations for Wireless Networks Abstract Deployment of wireless transport in a data-centric world calls for a fresh network planning approach, requiring a balance between

More information

Network redundancy flow research work include: network data fetching platform, data. Keywords: Network; redundant; flow analysis

Network redundancy flow research work include: network data fetching platform, data. Keywords: Network; redundant; flow analysis Analysis of Redundant Flow in Network 1 Yan Liu, 2 Yulong Yang 1, 2 Southwest University of Science and Technology ABSTRACT It is information society nowadays, with the rapidly growing popularity of the

More information

Web Data mining-a Research area in Web usage mining

Web Data mining-a Research area in Web usage mining IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 1 (Jul. - Aug. 2013), PP 22-26 Web Data mining-a Research area in Web usage mining 1 V.S.Thiyagarajan,

More information

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Veselin Rakocevic School of Engineering and Mathematical Sciences City University London EC1V HB, UK V.Rakocevic@city.ac.uk

More information

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Ekta Barkhodia 1, Parulpreet Singh 2, Gurleen Kaur Walia 3 Lovely Professional University, Phagwara, India ektab0@gmail.com,

More information

Improvement of the Communication Protocol Conversion Equipment Based on Embedded Multi-MCU and μc/os-ii

Improvement of the Communication Protocol Conversion Equipment Based on Embedded Multi-MCU and μc/os-ii Improvement of the Communication Protocol Conversion Equipment Based on Embedded Multi-MCU and μc/os-ii P. Sai Chaitanya & T. Sandeep ECE Department, Varadha Reddy College of Engineering, Hasanparthy,

More information

A Multicast Routing Algorithm for 3D Network-on-Chip in Chip Multi-Processors

A Multicast Routing Algorithm for 3D Network-on-Chip in Chip Multi-Processors Proceedings of the World Congress on Engineering 2018 ol I A Routing Algorithm for 3 Network-on-Chip in Chip Multi-Processors Rui Ben, Fen Ge, intian Tong, Ning Wu, ing hang, and Fang hou Abstract communication

More information

Design and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b

Design and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b 2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) Design and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b 1

More information

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts

More information

Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3

Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Han Zhi-nan Yan Wei Zhang Li Wang Yue Computer Network Laboratory Department of Computer Science & Technology, Peking University

More information

CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture

CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture Yuan-ni Liu Hong Tang, Guo-feng Zhao The School of Communication and Information Engineering of ChongQing University of Posts and

More information

Snmp Implementaton on Hp Routers with Ovpi (Openview Performance Insight) and Network Management

Snmp Implementaton on Hp Routers with Ovpi (Openview Performance Insight) and Network Management IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 3, Ver. II (May-Jun. 2016), PP 75-88 www.iosrjournals.org Snmp Implementaton on Hp Routers with Ovpi

More information

Design of Smart Home System Based on ZigBee Technology and R&D for Application

Design of Smart Home System Based on ZigBee Technology and R&D for Application Energy and Power Engineering, 2016, 8, 13-22 Published Online January 2016 in SciRes. http://www.scirp.org/journal/epe http://dx.doi.org/10.4236/epe.2016.81002 Design of Smart Home System Based on ZigBee

More information

A Method and System for Thunder Traffic Online Identification

A Method and System for Thunder Traffic Online Identification 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Method and System for Thunder Traffic Online Identification Jinfu Chen Institute of Information

More information

Analysis and Application of Frame Relay

Analysis and Application of Frame Relay Journal of Networking and Telecomunications (2018) Original Research Article Analysis and Application of Frame Relay Dongyue Cheng,Guoyou Han,Yuanguo Pan Information Engineering College, Xining University

More information

Research on Multi-service Unified Bearing Electric Power Communication Access Network Bao Feng1,a, Yang Li1, Yang Hu1, Yan Long2, Yongzhong Xie3

Research on Multi-service Unified Bearing Electric Power Communication Access Network Bao Feng1,a, Yang Li1, Yang Hu1, Yan Long2, Yongzhong Xie3 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Research on Multi-service Unified Bearing Electric Power Communication Access Bao Feng1,a, Yang

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN 2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen

More information

A Scheme of Dynamic Bandwidth Allocation for Switching FC-AE-1553 Network

A Scheme of Dynamic Bandwidth Allocation for Switching FC-AE-1553 Network 4th Internatio Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Dynamic Bandwidth Allocation for Switching FC-AE-1553 Network Shaojun WU1,3*, Liqian WANG2,Yueying ZHAN1,

More information

A Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction

A Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction A Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction Hanghang Tong 1, Chongrong Li 2, and Jingrui He 1 1 Department of Automation, Tsinghua University, Beijing 100084,

More information

Geospatial Information Service Based on Ad Hoc Network

Geospatial Information Service Based on Ad Hoc Network I. J. Communications, Network and System Sciences, 2009, 2, 91-168 Published Online May 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Geospatial Information Service Based on Ad Hoc Network Fuling

More information

A Finite State Mobile Agent Computation Model

A Finite State Mobile Agent Computation Model A Finite State Mobile Agent Computation Model Yong Liu, Congfu Xu, Zhaohui Wu, Weidong Chen, and Yunhe Pan College of Computer Science, Zhejiang University Hangzhou 310027, PR China Abstract In this paper,

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

A Relative Bandwidth Allocation Method Enabling Fast Convergence in XCP

A Relative Bandwidth Allocation Method Enabling Fast Convergence in XCP A Relative Bandwidth Allocation Method Enabling Fast Convergence in XCP Hanh Le Hieu,KenjiMasui 2, and Katsuyoshi Iida 2 Graduate School of Science and Engineering, Tokyo Institute of Technology 2 Global

More information

Realization of Time Synchronization Server Based on C/S

Realization of Time Synchronization Server Based on C/S Computer System Networking and Telecommunications Original Research Article Realization of Time Synchronization Server Based on C/S Jidong Zhou,Yanyan Zheng,Yonghui Guo School of Computer and Information,

More information

Design and Implementation of Real-Time Data Exchange Software of Maneuverable Command Automation System

Design and Implementation of Real-Time Data Exchange Software of Maneuverable Command Automation System Design and Implementation of Real-Time Data Exchange Software of Maneuverable Command Automation System Shi Chuan, Zhang Yang and Zhou Yuefei 1 Introduction Command automation system provides an effective

More information

End-to-End Mechanisms for QoS Support in Wireless Networks

End-to-End Mechanisms for QoS Support in Wireless Networks End-to-End Mechanisms for QoS Support in Wireless Networks R VS Torsten Braun joint work with Matthias Scheidegger, Marco Studer, Ruy de Oliveira Computer Networks and Distributed Systems Institute of

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2

A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2 5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang

More information

A Test Sequence Generation Method Based on Dependencies and Slices Jin-peng MO *, Jun-yi LI and Jian-wen HUANG

A Test Sequence Generation Method Based on Dependencies and Slices Jin-peng MO *, Jun-yi LI and Jian-wen HUANG 2017 2nd International Conference on Advances in Management Engineering and Information Technology (AMEIT 2017) ISBN: 978-1-60595-457-8 A Test Sequence Generation Method Based on Dependencies and Slices

More information

The Research and Design of the Application Domain Building Based on GridGIS

The Research and Design of the Application Domain Building Based on GridGIS Journal of Geographic Information System, 2010, 2, 32-39 doi:10.4236/jgis.2010.21007 Published Online January 2010 (http://www.scirp.org/journal/jgis) The Research and Design of the Application Domain

More information

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 1 Hui Deng 2Xiaolong Huang 3Kai Zhang 3 Zhisheng Niu 1Masahiro Ojima 1R&D Center Hitachi (China) Ltd. Beijing 100004, China 2Dept.

More information

Application Research of Wavelet Fusion Algorithm in Electrical Capacitance Tomography

Application Research of Wavelet Fusion Algorithm in Electrical Capacitance Tomography , pp.37-41 http://dx.doi.org/10.14257/astl.2013.31.09 Application Research of Wavelet Fusion Algorithm in Electrical Capacitance Tomography Lanying Li 1, Yun Zhang 1, 1 School of Computer Science and Technology

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

Octoshape. Commercial hosting not cable to home, founded 2003

Octoshape. Commercial hosting not cable to home, founded 2003 Octoshape Commercial hosting not cable to home, founded 2003 Broadcasting fee is paid by broadcasters Free for consumers Audio and Video, 32kbps to 800kbps Mesh based, bit-torrent like, Content Server

More information

Towards Connecting Base Stations over Metro Gigabit Ethernets

Towards Connecting Base Stations over Metro Gigabit Ethernets Towards Connecting Base Stations over Metro Gigabit Ethernets Rainer Baumann and Ulrich Fiedler Computer Engineering and Networks Laboratory ETH Zurich, Switzerland baumann,fiedler@tik.ee.ethz.ch Abstract

More information

Computer Life (CPL) ISSN: Research on the Construction of Network and Information Security. Architecture in Campus

Computer Life (CPL) ISSN: Research on the Construction of Network and Information Security. Architecture in Campus Computer Life (CPL) ISSN: 1819-4818 DELIVERING QUALITY SCIENCE TO THE WORLD Research on the Construction of Network and Information Security Architecture in Campus Zhaoyong Zhou 1, a, Xiaoli Zhang 1, Yuan

More information

A Communication Middleware with Unified Data Transmission Interface

A Communication Middleware with Unified Data Transmission Interface Communications and Network, 2013, 5, 34-38 doi:10.4236/cn.2013.51b009 Published Online February 2013 (http://www.scirp.org/journal/cn) A Communication Middleware with Unified Data Transmission Interface

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Landslide Monitoring Point Optimization. Deployment Based on Fuzzy Cluster Analysis.

Landslide Monitoring Point Optimization. Deployment Based on Fuzzy Cluster Analysis. Journal of Geoscience and Environment Protection, 2017, 5, 118-122 http://www.scirp.org/journal/gep ISSN Online: 2327-4344 ISSN Print: 2327-4336 Landslide Monitoring Point Optimization Deployment Based

More information

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud 2016 International Conference on Service Science, Technology and Engineering (SSTE 2016) ISBN: 978-1-60595-351-9 Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous

More information

Architecture Design and Experimental Platform Demonstration of Optical Network based on OpenFlow Protocol

Architecture Design and Experimental Platform Demonstration of Optical Network based on OpenFlow Protocol Journal of Physics: Conference Series PAPER OPEN ACCESS Architecture Design and Experimental Platform Demonstration of Optical Network based on OpenFlow Protocol To cite this article: Fangyuan Xing et

More information

Configuring Cisco IOS IP SLAs Operations

Configuring Cisco IOS IP SLAs Operations CHAPTER 50 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service

More information

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience. NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility

More information

Configuring Cisco IOS IP SLA Operations

Configuring Cisco IOS IP SLA Operations CHAPTER 58 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLA) on the switch. Cisco IP SLA is a part of Cisco IOS software that allows Cisco customers to analyze IP service levels

More information

Tuning RED for Web Traffic

Tuning RED for Web Traffic Tuning RED for Web Traffic Mikkel Christiansen, Kevin Jeffay, David Ott, Donelson Smith UNC, Chapel Hill SIGCOMM 2000, Stockholm subsequently IEEE/ACM Transactions on Networking Vol. 9, No. 3 (June 2001)

More information

TCM Health-keeping Proverb English Translation Management Platform based on SQL Server Database

TCM Health-keeping Proverb English Translation Management Platform based on SQL Server Database 2019 2nd International Conference on Computer Science and Advanced Materials (CSAM 2019) TCM Health-keeping Proverb English Translation Management Platform based on SQL Server Database Qiuxia Zeng1, Jianpeng

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

The principle of a fulltext searching instrument and its application research Wen Ju Gao 1, a, Yue Ou Ren 2, b and Qiu Yan Li 3,c

The principle of a fulltext searching instrument and its application research Wen Ju Gao 1, a, Yue Ou Ren 2, b and Qiu Yan Li 3,c International Conference on Education, Management, Commerce and Society (EMCS 2015) The principle of a fulltext searching instrument and its application research Wen Ju Gao 1, a, Yue Ou Ren 2, b and Qiu

More information

Construction and Application of Cloud Data Center in University

Construction and Application of Cloud Data Center in University International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2014) Construction and Application of Cloud Data Center in University Hong Chai Institute of Railway Technology,

More information

Coordinated and Unified Control Scheme of IP and Optical Networks for Smart Power Grid

Coordinated and Unified Control Scheme of IP and Optical Networks for Smart Power Grid IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Coordinated and Unified Control Scheme of IP and Optical Networks for Smart Power Grid To cite this article: Zhibin Yin et al 2018

More information

Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks

Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks 1 T.R.Gopalakrishnan Nair (SM-IEEE), 2 R. Selvarani, 3 Vaidehi M. 1 Director Research & Industry

More information

Discrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation

Discrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation Discrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation Jay Aikat*, Shaddi Hasan +, Kevin Jeffay*, and F. Donelson Smith* *University of North Carolina at Chapel

More information

Design of Underground Current Detection Nodes Based on ZigBee

Design of Underground Current Detection Nodes Based on ZigBee MATEC Web of Conferences 22, 0104 5 ( 2015) DOI: 10.1051/ matecconf/ 20152201045 C Owned by the authors, published by EDP Sciences, 2015 Design of Underground Current Detection Nodes Based on ZigBee Deyu

More information

Realization on the interactive remote video conference system based on

Realization on the interactive remote video conference system based on Realization on the interactive remote video conference system based on multi-agent Yan ZHENG 1, a, Wen Ting LI 2, Li ZENG 3, Yu GE 1, Xiao Yan CAI 1, Xian Yu MENG 1 1 Military Information Room, Wuhan Ordnance

More information

(a) Figure 1: Inter-packet gaps between data packets. (b)

(a) Figure 1: Inter-packet gaps between data packets. (b) Performance Evaluation of Transport Protocols for Internet-Based Teleoperation Systems Jae-young Lee, Shahram Payandeh, and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada

More information

A Framework For Managing Emergent Transmissions In IP Networks

A Framework For Managing Emergent Transmissions In IP Networks A Framework For Managing Emergent Transmissions In IP Networks Yen-Hung Hu Department of Computer Science Hampton University Hampton, Virginia 23668 Email: yenhung.hu@hamptonu.edu Robert Willis Department

More information

R.Srinivasan, PhD. Dean, Research and PG studies RNS Institute of Technology Bangalore India

R.Srinivasan, PhD. Dean, Research and PG studies RNS Institute of Technology Bangalore India Optimizing Routes using Genetic Algorithms based on Throughput or Delay Sensitivity of Applications using SNMP for Automatic Discovery of Network Topology M.Mohamed Surputheen Research Scholar Dr. M.G.R

More information

Visualization of Internet Traffic Features

Visualization of Internet Traffic Features Visualization of Internet Traffic Features Jiraporn Pongsiri, Mital Parikh, Miroslova Raspopovic and Kavitha Chandra Center for Advanced Computation and Telecommunications University of Massachusetts Lowell,

More information

A priority based dynamic bandwidth scheduling in SDN networks 1

A priority based dynamic bandwidth scheduling in SDN networks 1 Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems

More information