Filters








12 Hits in 3.5 sec

Ntop: Beyond Ping and Traceroute [chapter]

Luca Deri, Stefano Suin
1999 Lecture Notes in Computer Science  
Most of network monitoring and diagnostic tools such as ping and traceroute are suitable just for tackling simple connectivity problems.  ...  http://www-serra.unipi.it/-ntop/ The task of network management is becoming iiicreasingly complex due to the increasing mmber of networked computers running different operating systems and speaking various  ...  Due to this, the latest releases of popular operating systems still offer no more than ping and traceroute.  ... 
doi:10.1007/3-540-48100-1_21 fatcat:tpc437qj2nhbdfnqx4ejhfyyne

Challenges for Management Research [chapter]

Rolf Stadler
1999 Lecture Notes in Computer Science  
As the requirements for networks and services keep changing at a rapid pace, so does the demand for management solutions and for the technologies to provide them.  ...  end-to-end service management, from management of single services to integrated management of multi-service environments, from managing relatively static systems to the management of highly adaptable and  ...  Ntop: Beyond Ping and Traceroute Luca Deri and Stefan0 Suin Centro Sera, University of Pisa, Lungarno Pacinotti 43, Pisa, Italy.  ... 
doi:10.1007/3-540-48100-1_23 fatcat:xys3vvkodbhknjeclpgejlum24

Are Programmable Networks Unmanageable? [chapter]

Morris Soloman
1999 Lecture Notes in Computer Science  
is a need to be able to program network components to adapt to application requirements for quality of service, specialized application dependent routing, to increase efficiency, to support mobility and  ...  Ntop: Beyond Ping and Traceroute Luca Deri and Stefan0 Suin Centro Sera, University of Pisa, Lungarno Pacinotti 43, Pisa, Italy.  ...  Most of network monitoring and diagnostic tools such as ping and traceroute are suitable just for tackling simple connectivity problems.  ... 
doi:10.1007/3-540-48100-1_17 fatcat:i42dphoxuze7lpcii2pzqqnthi

Providing Managed Services to End-Users [chapter]

Metin Feridun, Burkhard Stiller
1999 Lecture Notes in Computer Science  
End-users, whether at home, within an enterprise, or mobile, require managed Internet services, specially in a model, where Internet Service Providers (ISP) are characterized as service sellers and end-users  ...  Ntop: Beyond Ping and Traceroute Luca Deri and Stefan0 Suin Centro Sera, University of Pisa, Lungarno Pacinotti 43, Pisa, Italy.  ...  Most of network monitoring and diagnostic tools such as ping and traceroute are suitable just for tackling simple connectivity problems.  ... 
doi:10.1007/3-540-48100-1_7 fatcat:mp5cr7ouwbbq7k437cj5rmytky

Internet performance monitoring

T.M. Chen, L. Hu
2002 Proceedings of the IEEE  
At each protocol layer, the strengths and limitations of the methods are highlighted. Finally, issues and challenges for future research are reviewed.  ...  The tools and methods are discussed according to their protocol layer, starting from the network layer (ATM, MPLS) to IP/ICMP and transport/application layers.  ...  Jabbari, the guest editors, and anonymous reviewers for their many constructive comments which have been invaluable for improving an earlier version of this paper.  ... 
doi:10.1109/jproc.2002.802006 fatcat:nj6c4qljjbccvpymmwv5qodmau

Network attacks: Taxonomy, tools and systems

N. Hoque, Monowar H. Bhuyan, R.C. Baishya, D.K. Bhattacharyya, J.K. Kalita
2014 Journal of Network and Computer Applications  
This paper also presents a comprehensive and structured survey of existing tools and systems that can support both attackers and network defenders.  ...  We discuss pros and cons of such tools and systems for better understanding of their capabilities.  ...  ., 2006) , Gulp (Satten, 2007) , Ntop (Deri et al., 2001) , etc.  ... 
doi:10.1016/j.jnca.2013.08.001 fatcat:gfvxtbbki5c7xis2wjaj37izsm

The networking philosopher's problem

Jennifer Rexford
2011 Computer communication review  
This position paper, a summary of a talk I gave at the CoNext'10 Student Workshop, captures my current frustrations and hopes about the field.  ...  While computer networking is an exciting research field, we are far from having a clear understanding of the core concepts and questions that define our discipline.  ...  Thanks also to the students in my graduate networking class and the CoNext'10 workshop attendees for valuable discussions.  ... 
doi:10.1145/2002250.2002252 fatcat:imgjlkegpjdyhf3sx75lsswf3y

Measuring IP and TCP behavior on edge nodes with Tstat

M. Mellia, R. Lo Cigno, F. Neri
2005 Computer Networks  
Field measurements have always been the starting point for network design and planning; however, their statistical analysis beyond simple traffic volume estimation is not so common.  ...  Besides briefly discussing its rationale and use, we present part of the performance figures that can be obtained, and we highlight the insight that such figures can give on TCP/IP protocols and the Internet  ...  We would also like to thank the people of the international research community who downloaded Tstat and gave us valuable feedbacks that helped in developing the tool and in removing bugs.  ... 
doi:10.1016/j.comnet.2004.06.026 fatcat:milufhj5ovch7gqfvfv2h6qeti

Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX

Rick Hofstede, Pavel Celeda, Brian Trammell, Idilio Drago, Ramin Sadre, Anna Sperotto, Aiko Pras
2014 IEEE Communications Surveys and Tutorials  
Flow monitoring embraces the complete chain of packet observation, flow export using protocols such as NetFlow and IPFIX, data collection, and data analysis.  ...  Otherwise, flow data artifacts and data loss can be the consequence, potentially without being observed.  ...  ACKNOWLEDGMENT The authors would like to thank Cyndi Mills, Benoit Claise (Cisco Systems Inc.) and Nevil Brownlee (University of Auckland) for their valuable contributions.  ... 
doi:10.1109/comst.2014.2321898 fatcat:eefcoigarrfwhkikqiib2svvga

Active mapping: resisting NIDS evasion without altering traffic

U. Shankar, V. Paxson
Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405)  
We also present results on the performance impact of using Active Mapping in terms of time and memory.  ...  We discuss the capabilities and limitations of Active Mapping in detail, including real-world challenges.  ...  As detailed in [HKP01] , these changes can break some mechanisms, like traceroute and Path MTU discovery.  ... 
doi:10.1109/secpri.2003.1199327 dblp:conf/sp/ShankarP03 fatcat:woqldikcqvft5lgf4z2ivwufda

Proceedings of the Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communications (IITM), Summer Semester 2016 [article]

Georg Carle, Daniel Raumer, Lukas Schwaighofer, Chair For Network Architectures
2016
We will however allow ping and traceroute for troubleshooting purposes.  ...  The ICMPv4 types 0 and 8 used for ping and type 11 used for traceroute are not essential to communication as stated by Albin [2] but are used widely for host location and troubleshooting.  ... 
doi:10.2313/net-2016-09-1 fatcat:hxo2i6lmafcwxbtad7pnq34rva

Classification and Analysis of Computer Network Traffic

Tomasz Bujlow, Tomasz Bujlow
2014 unpublished
and proposing a general algorithm.  ...  Statistical classifiers based on Machine Learning Algorithms (MLAs) were shown to be fast and accurate. At the same time, they do not consume a lot of resources and do not cause privacy concerns.  ...  in Poland, and to Bredbånd Nord A/S.  ... 
fatcat:t5qtwjvzv5gtzins7uc3oocyqy