22 Hits in 4.7 sec

Characterization and Measurements of Enterprise Network Traffic with RMON2 [chapter]

Luciano Paschoal Gaspary, Liane Rockenbach Tarouco
1999 Lecture Notes in Computer Science  
Section 2 presents an overview of RMON and RMON2 [4]. Sections 3,4,5 and 6 present the results of the study. Section 3 describes how to monitor user activities on the network.  ...  With such information, these administrators can redefine network traffic flows aiming at better resources usage.  ...  With such information a manager knows the amount of traffic that enters and leaves each monitored device, but he is unaware of the behavior of this traffic in the local network as a whole.  ... 
doi:10.1007/3-540-48100-1_18 fatcat:crejq73v5ndonhtua2lyghkvtq

Enterprise network control and management: traffic flow models

William Maruyama, Mark S. George, Eileen Hernandez, Keith LoPresto, Yea Uang, Andrew G. Tescher, Bhaskaran Vasudev, V. Michael Bove, Jr., Barbara Derryberry
1999 Multimedia Systems and Applications II  
The next generation communication networks must support legacy and emerging network traffic while providing user negotiated levels of QoS.  ...  To evaluate network architectures and performance, it is essential to understand the network traffic characteristics.  ...  MEASUREMENT METHODOLOGY The selected network statistics consist of traffic volume categorized by bytes, packets and flows.  ... 
doi:10.1117/12.371221 fatcat:vhnzadltivbmlnf7il4abtx6la

Measurement and Analysis of HTTP Traffic

Yogesh Bhole, Adrian Popescu
2005 Journal of Network and Systems Management  
This article is reporting on the measurement and analysis of HTTP traffic collected on the student access network at the Blekinge Institute of Technology in Karlskrona, Sweden.  ...  To tackle these parameters and to improve the overall performance of the system, it is important to understand and to characterize the application level characteristics.  ...  ACKNOWLEDGMENT The authors gratefully acknowledge Dragos Ilie and David Erman at BIT, whose comments were helpful for handling various practical issues.  ... 
doi:10.1007/s10922-005-9000-y fatcat:e2wpxrt6lfd2dcmcwbeag5gk3i

Expert System Based Network Testing [chapter]

Vlatko Lipovac
2011 Expert Systems for Human, Materials and Automation  
Monitoring (RMON) protocol [2] , [3] , which allows continuous monitoring of network traffic, enabling observation of decodes and keeping statistics on traffic that is present on the medium.  ...  up with network traffic only on low and moderately loaded networks.  ...  : +86-21-62489820 Fax: +86-21-62489821 The ability to create intelligent machines has intrigued humans since ancient times, and today with the advent of the computer and 50 years of research into AI programming  ... 
doi:10.5772/20557 fatcat:xmezoh2kwneobhbjuygbufnzry

Local area networks—Evolving from shared to switched access

K. J. Christensen, L. C. Haas, F. E. Noel, N. C. Strole
1995 IBM Systems Journal  
Bridges and rout- ers are used to build large enterprise networks. Bridges act as address filters, thus allowing LANs to be interconnected with only nonlocal traffic be- ing forwarded between LANs.  ...  This scaling of speed that is possible with ATM is one of the big benefits that the user can leverage in expanding an enterprise network.  ... 
doi:10.1147/sj.343.0347 fatcat:sxtguqncarb5vhg7htckhqtqby

Network Organization and Governance [chapter]

2018 CRC Handbook of Modern Telecommunications  
A network can offer different types of service to users, where a service may be characterized by measurable, prespecified service requirements.  ...  Figure 2 usually shared with other applications, leading to potential traffic congestion. Bandwidth-on-demand solutions are rare with measurement probes.  ...  Before deciding for or against outsourcing, enterprises should evaluate the following criteria very carefully: 1. The present asset value of networking components and network management. 2.  ... 
doi:10.1201/9781420078084-9 fatcat:eyixyd27nzbmthwoqybadgqz2e

An architecture for distributed and flexible management of high-layer protocols and network services

Luciano Gaspary, Luis F. Balbinot, Roberto Storch, Fabrício Wendt, Liane Tarouco
2001 Journal of the Brazilian Computer Society  
This paper proposes an architecture for distributed management of high-layer protocols and network services.  ...  Based on the IETF Script MIB, the Trace architecture provides mechanisms for the delegation of management tasks to mid-level managers (MLMs), which interact with monitoring and action agents to have them  ...  The ntop [1] is designed for traffic measurement and monitoring, and includes features for per-protocol network traffic characterization and usage.  ... 
doi:10.1590/s0104-65002001000100008 fatcat:ns6mdckzqrb2fealocslqtmorm

Internal Audit of Cybercrimes in Information Technologies of Enterprises Accounting

Ruslan Dutchak, Olha Kondratiuk, Olena Rudenko, Andrii Shaikan, Elizaveta Shubenko, S. Hushko, V. Solovieva, A. Shaikan, I. Khvostina, S. Semerikov
2021 SHS Web of Conferences  
The article is devoted to the problem's research of cybercrimes at the enterprise and the efficient methods of its solvation.  ...  The main trends of the cybercrime's development in the national and the global scope are defined. The analysis of the normative-legal acts on cybercrime is made.  ...  allow recognize the structure of the different network protocols with the aim of catching and analyzing traffic of the enterprise's networks, -namely: to examine the caught packages and to decode them  ... 
doi:10.1051/shsconf/202110001006 fatcat:c6uswct7o5d4zn6vrzvkz5bshm

A Knowledge-Based Strategy for the Automated Support to Network Management Tasks

Sameera ABAR, Tetsuo KINOSHITA
2010 IEICE transactions on information and systems  
Experimental results confirm a marked reduction in the management-overhead of the network administrator, as compared to the manual network management techniques, in terms of the time-taken and effort-done  ...  For the proof of concept, an experimental network system has been implemented in our laboratory, and the deployment of some test-bed scenarios is performed.  ...  Acknowledgements This research has been partially supported by the Japan's MEXT "21st-Century COE (Center Of Excellence) Program [System Construction of Global-Network-Oriented Information Electronics]  ... 
doi:10.1587/transinf.e93.d.774 fatcat:kot24e4oefhzra425d2ozmxiaa

What Can Web Services Bring to Integrated Management? [chapter]

Aiko Pras, Jean-Philippe Martin-Flatin
2008 Handbook of Network and System Administration  
Can it help us manage networks, systems and services with unprecedented flexibility, robustness and/or scalability?  ...  We propose a fine-grained Web service mapping of SNMP operations and managed objects, and show that the same management tasks can be performed with this new middleware to implement network monitoring.  ...  Early versions of this material were published in [24] , [54] and [77] .  ... 
doi:10.1016/b978-044452198-9.50013-6 fatcat:4sv72n36z5ddthu2gpit2kxwqq

Enterprise network control and management: traffic flow models

W. Maruyama, M. George, E. Hernandez, K. LoPresto, Y. Uang
MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)  
The next generation communication networks must support legacy and emerging network traffic while providing user negotiated levels of QoS.  ...  To evaluate network architectures and performance, it is essential to understand the network traffic characteristics.  ...  MEASUREMENT METHODOLOGY The selected network statistics consist of traffic volume categorized by bytes, packets and flows.  ... 
doi:10.1109/milcom.1999.821384 fatcat:qnevjd2j4vdltenmkkyoz7pva4

The ATLAS Data Acquisition and High Level Trigger system

2016 Journal of Instrumentation  
The format and organization of these data are sub-detector specific as well. Event data are associated with an L1 identifier (L1Id) and a bunch-crossing identifier (BCId).  ...  For test and calibration purposes these partitions can be operated in parallel, with the LTP modules generating triggers instead of the CTP.  ...  Acknowledgments We thank CERN for the very successful operation of the LHC, as well as the support staff from our institutions without whom ATLAS could not be operated efficiently. -127 -  ... 
doi:10.1088/1748-0221/11/06/p06008 fatcat:wmldwzaqqnhrdgkjn3rdm4mvey

Traffic Flooding Attack Detection Using SNMP MIB Variables and Decision Tree Classifier

J Princy, Juliet Sc, Mrs Carolene, Praveena Sc, M Phil
2017 International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2017 IJSRCSEIT   unpublished
The proposed system deals with Simple network management protocol based detection system to detect TCP and UDP flooding attacks effectively.  ...  The Internet has become an important source for information, entertainment, and a major means of communication at home and at work.  ...  Detecting flood-based denial-of-service attacks with snmp/rmon. In Workshop on Statistical and Machine Data Networking.  ... 

Using mobile agents for network performance management

C. Bohoris, G. Pavlou, H. Cruickshank
NOMS 2000. 2000 IEEE/IFIP Network Operations and Management Symposium 'The Networked Planet: Management Beyond 2000' (Cat. No.00CB37074)  
A lot of research is currently being carried out trying to assess their applicability to network management and control environments.  ...  monitoring agents are sent to execute within network elements and stay there until their task is accomplished.  ...  Acknowledgments This work was undertaken in the ACTS MIAMI project, which is partially funded by the Commission of the European Union.  ... 
doi:10.1109/noms.2000.830419 dblp:conf/noms/BohorisPC00 fatcat:53gl3ulqnvdtdczf6pr6ltvi2a

ISP traffic management via flow optimization

Emmanuel Obi Akonjang, Technische Universität Berlin, Technische Universität Berlin, Georgios Smaragdakis, Anja Feldmann
One typical example of such a trend, which has a profound effect on traffic volume, traffic composition, traffic dynamics, overall network performance and user experience, is Peer-to-Peer (P2P).  ...  network conditions, iv) mismatch between P2P overlay and ISP underlay, v) high management traffic, vi) high proportion of cross-AS neighbor-relationships and cross-AS traffic, vii) a data flow between  ...  Instead of immediately upgrading those links in the topology that appear to be congested, an ISP can use our proposed cost-effective, fast and straight-forward approach to engineer the traffic flow and  ... 
doi:10.14279/depositonce-7871 fatcat:nr6wi5mvmje2ha2yev4cgmvuoe
« Previous Showing results 1 — 15 out of 22 results