The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays we are witnessing a strong interest from the network operators towards provisioning all-IP services. The user demands and the effort of the operators to address them with traditional network management processes push the networks to a complexity where traditional network management methods do not scale and cannot guarantee error-free configurations, optimal resource utilization and dynamic...
Recently, the variety and vastness of computer networks have increased rapidly. To keep networks stable and reliable, network administrators have to understand the nature of network traffic flows. We have developed a cardinality-analysis method that analyzes cardinalities in TCP/IP headers. The cardinalities can be used to detect abnormal traffic such as DDoS attacks and Internet worms. However there...
A large number of intelligent components for managing the Future Internet have been proposed recently or are currently being investigated. However, before these network components can be deployed in real-life networks, they need to be thoroughly validated through realistic and large scale experiments. Testbed facilities provide a means to set up large scale network topologies but offer only a limited...
Identifying heavy hitters is essential for network monitoring, management, charging and etc. Existing methods in the literature have some limitations. How to reduce the memory consumption effectively without compromising identification accuracy is still challenging. In this paper, an adaptive method combining sampling and data streaming counting is proposed, called FSPLC(feedback sampling probabilistic...
Monitoring and measuring the dynamic changes of the traffic patterns are important for network management. In this paper, we propose the bidirectional flow model to aggregate the traffic packets, which is more efficacious to reflect the alternation character of the users. Then we select the one order and second order connection degree to capture the characteristic of the traffic patterns. The K-L...
With the development of the computer network, and the great change in the demands of network management, any Network Management System is a process of development and perfection. Therefore, designing a rational system structure is the foundation to ensure the good scalability of the system. The main issues and characteristics of Network Management in Campus Network at present were analyzed in the...
In its 5th decade, the Internet's future evolution is hampered by the increasing complexity and sophistication of the processes managing its infrastructure. Management costs require a technically skilled human intellect, amounting to a substantial part of total cost of ownership. Self-management is positioned as a key capacity towards a scalable future Internet architecture. Herein we present key...
This paper describes the RUCA project, the work done on its second phase and preliminary work for the third phase. RUCA is part of the UCA ("Um Computador por Aluno" A Computer per Student) Project, and deals with the technical aspects of it (in contrast to the pedagogical aspects of deploying laptops at schools, covered by UCA). It began as a project to study the mesh network capabilities...
Nowadays Internet become more and more important in our life maintenance, the security of network was put into an important place. The valid data of the network traffic monitor not only enables network administrators to obtain the most direct information of the network movement in time; at the same time, completes the supervision of the traffic, and is also a necessary method of network management...
While the current Internet is successful in many aspects, management of the current Internet has a set of associated systemic and business problems. This paper discusses those problems and presents a summary of management research efforts on the future Internet. We present the design requirements for future Internet management such as architecture, protocol, knowledge representation, and market aspects.
This work proposes a probabilistic management paradigm for solving some major challenges of decentralized network management. Specifically, we show how to cope with 1) the overhead of redundant information gathering and processing, 2) the decentralized management in dynamic and unpredictable environments, and 3) the considerable effort required for decentralized coordination of management functions...
As the Internet continues to grow; it becomes more and more apparent that the network is playing a more and more vital role. The traditional network managements just monitor the network movements and the network devices. But the network servers occupy to the core status in the network. Aiming at the network server monitor and management, we proposed a server monitor solution which is based on the...
The advances of network technology bring many more kinds of network form, such as SDH network, PON network, video network, power network and so on. On the one hand it leads to the network complication and on the other hand also puts forward higher requirement on business network management system. Database-centric network management would improve network security and reliability; provide effective,...
As a opening global network, Internet now is facing more and more attacks and complex methods of attack, which causes the network security problem becoming the focal point that people pay attention to.The single firewall strategy can not satisfy the need of network security, intrusion detection system which is used at present has very high rate of false alarm. However, intrusion detection system based...
Analyzing the characteristic of network behavior provides scientific basis for designing, building, and managing the next generation Internet, and is especially important for monitoring network behavior. This paper establishes a system of metrics that evaluates the behavior of IP networks with respect to the need of analyzing network behavior, introduces the design and implementation of network monitoring...
This work presents SAPOTI (Dependable TCP/IP application servers - in portuguese: servidores de aPlicacoes cOnfiaveis Tcp/Ip), a distributed tool that guarantees the availability of TCP/IP application servers, in particular of Web servers. The tool is based on the SNMP framework and is executed on a group of Web servers running on a set of hosts that are monitored by a dependable distributed network...
Peer-to-peer file-sharing systems have gained tremendous popularity in the past few years. More users are continually joining such systems and more objects are being made available, seducing even more users to join. Today, the traffic generated by P2P systems accounts for a major fraction of the Internet traffic and is bound to increase. An accurate mapping of traffic to their applications can be...
System and network security are significant challenges facing the Internet community today. Hi-tech crime is on the increase and is a threat to a budding online business environment. Reconnaissance technologies that enable the security community to keep abreast of new threats have been developed and deployed. These technologies monitor illegitimate Internet traffic but appropriate data analysis is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.