A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Characterization and Measurements of Enterprise Network Traffic with RMON2
[chapter]
1999
Lecture Notes in Computer Science
Section 2 presents an overview of RMON and RMON2 [4]. Sections 3,4,5 and 6 present the results of the study. Section 3 describes how to monitor user activities on the network. ...
With such information, these administrators can redefine network traffic flows aiming at better resources usage. ...
With such information a manager knows the amount of traffic that enters and leaves each monitored device, but he is unaware of the behavior of this traffic in the local network as a whole. ...
doi:10.1007/3-540-48100-1_18
fatcat:crejq73v5ndonhtua2lyghkvtq
Enterprise network control and management: traffic flow models
1999
Multimedia Systems and Applications II
The next generation communication networks must support legacy and emerging network traffic while providing user negotiated levels of QoS. ...
To evaluate network architectures and performance, it is essential to understand the network traffic characteristics. ...
MEASUREMENT METHODOLOGY The selected network statistics consist of traffic volume categorized by bytes, packets and flows. ...
doi:10.1117/12.371221
fatcat:vhnzadltivbmlnf7il4abtx6la
Measurement and Analysis of HTTP Traffic
2005
Journal of Network and Systems Management
This article is reporting on the measurement and analysis of HTTP traffic collected on the student access network at the Blekinge Institute of Technology in Karlskrona, Sweden. ...
To tackle these parameters and to improve the overall performance of the system, it is important to understand and to characterize the application level characteristics. ...
ACKNOWLEDGMENT The authors gratefully acknowledge Dragos Ilie and David Erman at BIT, whose comments were helpful for handling various practical issues. ...
doi:10.1007/s10922-005-9000-y
fatcat:e2wpxrt6lfd2dcmcwbeag5gk3i
Expert System Based Network Testing
[chapter]
2011
Expert Systems for Human, Materials and Automation
Monitoring (RMON) protocol [2] , [3] , which allows continuous monitoring of network traffic, enabling observation of decodes and keeping statistics on traffic that is present on the medium. ...
up with network traffic only on low and moderately loaded networks. ...
: +86-21-62489820 Fax: +86-21-62489821 The ability to create intelligent machines has intrigued humans since ancient times, and today with the advent of the computer and 50 years of research into AI programming ...
doi:10.5772/20557
fatcat:xmezoh2kwneobhbjuygbufnzry
Local area networks—Evolving from shared to switched access
1995
IBM Systems Journal
Bridges and rout- ers are used to build large enterprise networks. Bridges act as address filters, thus allowing LANs to be interconnected with only nonlocal traffic be- ing forwarded between LANs. ...
This scaling of speed that is possible with ATM is one of the big benefits that the user can leverage in expanding an enterprise network. ...
doi:10.1147/sj.343.0347
fatcat:sxtguqncarb5vhg7htckhqtqby
Network Organization and Governance
[chapter]
2018
CRC Handbook of Modern Telecommunications
A network can offer different types of service to users, where a service may be characterized by measurable, prespecified service requirements. ...
Figure 2 usually shared with other applications, leading to potential traffic congestion. Bandwidth-on-demand solutions are rare with measurement probes. ...
Before deciding for or against outsourcing, enterprises should evaluate the following criteria very carefully: 1. The present asset value of networking components and network management. 2. ...
doi:10.1201/9781420078084-9
fatcat:eyixyd27nzbmthwoqybadgqz2e
An architecture for distributed and flexible management of high-layer protocols and network services
2001
Journal of the Brazilian Computer Society
This paper proposes an architecture for distributed management of high-layer protocols and network services. ...
Based on the IETF Script MIB, the Trace architecture provides mechanisms for the delegation of management tasks to mid-level managers (MLMs), which interact with monitoring and action agents to have them ...
The ntop [1] is designed for traffic measurement and monitoring, and includes features for per-protocol network traffic characterization and usage. ...
doi:10.1590/s0104-65002001000100008
fatcat:ns6mdckzqrb2fealocslqtmorm
Internal Audit of Cybercrimes in Information Technologies of Enterprises Accounting
2021
SHS Web of Conferences
The article is devoted to the problem's research of cybercrimes at the enterprise and the efficient methods of its solvation. ...
The main trends of the cybercrime's development in the national and the global scope are defined. The analysis of the normative-legal acts on cybercrime is made. ...
allow recognize the structure of the different network protocols with the aim of catching and analyzing traffic of the enterprise's networks, -namely: to examine the caught packages and to decode them ...
doi:10.1051/shsconf/202110001006
fatcat:c6uswct7o5d4zn6vrzvkz5bshm
A Knowledge-Based Strategy for the Automated Support to Network Management Tasks
2010
IEICE transactions on information and systems
Experimental results confirm a marked reduction in the management-overhead of the network administrator, as compared to the manual network management techniques, in terms of the time-taken and effort-done ...
For the proof of concept, an experimental network system has been implemented in our laboratory, and the deployment of some test-bed scenarios is performed. ...
Acknowledgements This research has been partially supported by the Japan's MEXT "21st-Century COE (Center Of Excellence) Program [System Construction of Global-Network-Oriented Information Electronics] ...
doi:10.1587/transinf.e93.d.774
fatcat:kot24e4oefhzra425d2ozmxiaa
What Can Web Services Bring to Integrated Management?
[chapter]
2008
Handbook of Network and System Administration
Can it help us manage networks, systems and services with unprecedented flexibility, robustness and/or scalability? ...
We propose a fine-grained Web service mapping of SNMP operations and managed objects, and show that the same management tasks can be performed with this new middleware to implement network monitoring. ...
Early versions of this material were published in [24] , [54] and [77] . ...
doi:10.1016/b978-044452198-9.50013-6
fatcat:4sv72n36z5ddthu2gpit2kxwqq
Enterprise network control and management: traffic flow models
MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)
The next generation communication networks must support legacy and emerging network traffic while providing user negotiated levels of QoS. ...
To evaluate network architectures and performance, it is essential to understand the network traffic characteristics. ...
MEASUREMENT METHODOLOGY The selected network statistics consist of traffic volume categorized by bytes, packets and flows. ...
doi:10.1109/milcom.1999.821384
fatcat:qnevjd2j4vdltenmkkyoz7pva4
The ATLAS Data Acquisition and High Level Trigger system
2016
Journal of Instrumentation
The format and organization of these data are sub-detector specific as well. Event data are associated with an L1 identifier (L1Id) and a bunch-crossing identifier (BCId). ...
For test and calibration purposes these partitions can be operated in parallel, with the LTP modules generating triggers instead of the CTP. ...
Acknowledgments We thank CERN for the very successful operation of the LHC, as well as the support staff from our institutions without whom ATLAS could not be operated efficiently. -127 - ...
doi:10.1088/1748-0221/11/06/p06008
fatcat:wmldwzaqqnhrdgkjn3rdm4mvey
Traffic Flooding Attack Detection Using SNMP MIB Variables and Decision Tree Classifier
2017
International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2017 IJSRCSEIT
unpublished
The proposed system deals with Simple network management protocol based detection system to detect TCP and UDP flooding attacks effectively. ...
The Internet has become an important source for information, entertainment, and a major means of communication at home and at work. ...
Detecting flood-based denial-of-service attacks with snmp/rmon. In Workshop on Statistical and Machine Data
Networking. ...
fatcat:5pcvwqvijnbx3mc5yqqelhx7uu
Using mobile agents for network performance management
NOMS 2000. 2000 IEEE/IFIP Network Operations and Management Symposium 'The Networked Planet: Management Beyond 2000' (Cat. No.00CB37074)
A lot of research is currently being carried out trying to assess their applicability to network management and control environments. ...
monitoring agents are sent to execute within network elements and stay there until their task is accomplished. ...
Acknowledgments This work was undertaken in the ACTS MIAMI project, which is partially funded by the Commission of the European Union. ...
doi:10.1109/noms.2000.830419
dblp:conf/noms/BohorisPC00
fatcat:53gl3ulqnvdtdczf6pr6ltvi2a
ISP traffic management via flow optimization
2019
One typical example of such a trend, which has a profound effect on traffic volume, traffic composition, traffic dynamics, overall network performance and user experience, is Peer-to-Peer (P2P). ...
network conditions, iv) mismatch between P2P overlay and ISP underlay, v) high management traffic, vi) high proportion of cross-AS neighbor-relationships and cross-AS traffic, vii) a data flow between ...
Instead of immediately upgrading those links in the topology that appear to be congested, an ISP can use our proposed cost-effective, fast and straight-forward approach to engineer the traffic flow and ...
doi:10.14279/depositonce-7871
fatcat:nr6wi5mvmje2ha2yev4cgmvuoe
« Previous
Showing results 1 — 15 out of 22 results