2,394 Hits in 5.0 sec

Performance impact of Web service migration in embedded environments

K.J. Ma, R. Bartos
2005 IEEE International Conference on Web Services (ICWS'05)  
While the benefits of our scheme are quite tangible, the performance impact of adding these features is not well known.  ...  We discuss the impact of these anomalies on the viability of our approach and address the broad issue of migrating Web Services to legacy embedded architectures.  ...  Conclusions This paper presents a look at the performance impacts of augmenting the standard Net-SNMP implementation of the legacy SNMPv2 protocol with a Web Service-based transport infrastructure.  ... 
doi:10.1109/icws.2005.91 dblp:conf/icws/MaB05 fatcat:7wet7e4tpfbo7jewbyaod34d54

Performance Evaluation of SNMPv1/2c/3 using Different Security Models on Raspberry Pi

Eric Gamess, Sergio Hernandez
2021 International Journal of Advanced Computer Science and Applications  
To help their integration into network management systems, it is essential to study the impact of the different versions and security models of SNMP on these SBCs.  ...  The Simple Network Management Protocol (SNMP) is one of the dominant protocols for network monitoring and configuration.  ...  ACKNOWLEDGMENT We are grateful to "Faculty Commons" and the "College of Science & Mathematics" at Jacksonville State University for partially funding this project.  ... 
doi:10.14569/ijacsa.2021.0121101 fatcat:dicbyxaaibc6tif6yf465ikkfu

Evaluation of the Resource Requirements of SNMP Agents on Constrained Devices [chapter]

Siarhei Kuryla, Jürgen Schönwälder
2011 Lecture Notes in Computer Science  
We investigate whether the monitoring and configuration of such constrained devices can be performed by adapting the Simple Network Management Protocol (SNMP) to the capabilities of these devices.  ...  To this end, we have implemented an SNMP agent under the Contiki operating system. We provide an analysis of its resource requirements and its runtime behaviour on an 8-bit AVR Raven platform.  ...  Using functions instead of macros could reduce the code size, but would negatively impact the performance.  ... 
doi:10.1007/978-3-642-21484-4_13 fatcat:xj6upappszh47oy6rcqr5yix3e

Healthcare Depends on Quality Network Management

Jeff Kabachinski
2010 Biomedical Instrumentation & Technology  
In addition, we'll look into the operation of the Simple Network Management Protocol (SNMP) as a model and a way to learn how this is accomplished.  ...  It focuses on risk management's means and processes for the entire life cycle of the medical IT network. We'll save the details of IEC 80001-1 for another IT World.  ...  n One of the most important aspects of network management lies in security management." " NEW!  ... 
doi:10.2345/0899-8205-44.6.490 pmid:21142517 fatcat:t4j7tcds4zbtzj7di3wh5temkm

E-Voting For Large Scale Elections Using Simple Network Management Protocol

Anil Pandit
2017 International Journal for Research in Applied Science and Engineering Technology  
The proposal of using Simple Network Management Protocol is a unique one because SNMP based NMS (Network Management System) could be implemented during voting, which manages, monitors and get the accurate  ...  SNMP operating server can be easily managed as wecan compile data for the number of voters from a particular region or state who had voted on the voting day, and the results or data cannot be tampered  ...  For example SNMP can be used to monitor performance on a router, tell what speed a connection is on the network, and even monitors the temperature of a switch used for sending the election data in and  ... 
doi:10.22214/ijraset.2017.10283 fatcat:3ynyvy2a4vbwrehx6avw74vzcu

Tools for Cloud for Resource Management: NOVA and SNMP

Sunita, Tarun Mahajan
2021 SN Computer Science  
It is discovered that security is a concern associated with both the tools. The investigation of NOVA and SNMP suggests that the SNMP mechanism is better as compared to NOVA.  ...  This paper presents the demonstration of two most commonly used network management tools including NOVA and SNMP.  ...  This article is part of the topical collection "Advances in Computational Approaches for Artificial Intelligence, Image Processing, IoT and Cloud Applications" guest edited by Bhanu Prakash K N and M.  ... 
doi:10.1007/s42979-020-00432-4 fatcat:al52yxlif5cdppgs2pt45gfeoy

Multiplatform management of a Hard Real-Time Ethernet Switch

Aleksander Pleszko, Joao Paulo Barraca, Joaquim Ferreira, Pedro Goncalves
2012 2012 IEEE Globecom Workshops  
The Hard Real-Time Ethernet Switch (HaRTES) allows using the same network to handle multiple traffic flows, without compromising the performance of real-time applications.  ...  This paper describes a multiprotocol (SNMP and NETCONF) management interface design, and implementation. It also presents a preliminary validation of the two management technologies.  ...  Since monitoring is not a time-critical activity and maintenance is performed offline, SNMP is well suited for these tasks in the case of the above mentioned RTE protocols.  ... 
doi:10.1109/glocomw.2012.6477683 dblp:conf/globecom/PleszkoBFG12 fatcat:ckjhvj4ygjgpphxscsxcsrskhu

Smart packets: applying active networks to network management

Beverly Schwartz, Alden W. Jackson, W. Timothy Strayer, Wenyi Zhou, R. Dennis Rockwell, Craig Partridge
2000 ACM Transactions on Computer Systems  
impact on router performance Summary of part 3 Virtual Machine is designed based on considerations of feature set, security and performance impact.  ...  ANEP Daemon Injection point for smart packets Reception point for smart packets Performing execution of the received programs on virtual machine Smart Packets Project Four Major Components  ... 
doi:10.1145/332799.332893 fatcat:u2frw3tarraqfenu5cr4nywzhu

Exploiting SNMP-MIB Data to Detect Network Anomalies using Machine Learning Techniques [article]

Ghazi Al-Naymat, Mouhammd Al-kasassbeh, Eshraq Al-Hawari
2018 arXiv   pre-print
This paper also investigates the impact of SNMP-MIB data on network anomalies detection. Three classifiers, namely, Random Forest, AdaboostM1 and MLP are used to build the detection model.  ...  The exponential increase in the number of malicious threats on computer networks and Internet services due to a large number of attacks makes the network security at continuous risk.  ...  The first attempt to exploit SNMP for network security is performed by Cabrera et al. [16] .  ... 
arXiv:1809.02611v1 fatcat:ddhukhnafbdsfoehn3wjd3l27u

Management of resource constrained devices in the internet of things

Anuj Sehgal, Vladislav Perelman, Siarhei Kuryla, Jurgen Schonwalder
2012 IEEE Communications Magazine  
We present the resource requirements for SNMP and NETCONF on an 8-bit AVR based device. PREPRINT VERSION -© 2012 IEEE. Personal use of this material is permitted.  ...  The IPv6 protocol provides a suitable basis for interoperability in the IoT, due to its large address space and a number of existing protocols that function over IP and its flexibility.  ...  With session based transports and security mechanisms, such reinitializations have a big impact on the performance of the device since new sessions need to be established and thus they force additional  ... 
doi:10.1109/mcom.2012.6384464 fatcat:h67znqqthfe6lfvqced7mklnei

Using Internet Protocols to Implement IEC 60870-5 Telecontrol Functions

G. Sanchez, I. Gomez, J. Luque, J. Benjumea, O. Rivera
2010 IEEE Transactions on Power Delivery  
In this paper, the use of general standard protocols to perform the telecontrol of electrical networks is justified.  ...  This has removed many of their technical restrictions and made it possible to consider carrying out telecontrol tasks with general standard protocols instead of the specific ones that are used currently  ...  This has a significant impact on the security by increasing accountability for user actions.  ... 
doi:10.1109/tpwrd.2009.2037535 fatcat:hlg5dikrqjg5bfjrgpxc3kiy5m

Towards anomaly detection in smart grids by combining Complex Events Processing and SNMP objects [article]

Massimiliano Leone Itria, Enrico Schiavone, Nicola Nostro
2021 arXiv   pre-print
This solution has been applied in the context of smart grids, and in particular as part of a security and resilience component of the Information and Communication Technologies (ICT) Gateway, a middleware-based  ...  This paper describes the architecture and the fundamental methodology of an anomaly detector, which by continuously monitoring Simple Network Management Protocol data and by processing it as complex-events  ...  ACKNOWLEDGMENT This work has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 774145 for the Net2DG Project.  ... 
arXiv:2106.14508v1 fatcat:7bw7agq25jhjtpdhr4f5vqnrxi

Power Systems Monitoring and Control Using Telecom Network Management Standards

S. Diaz, J. Luque, M.C. Romero, J.I. Escudero
2005 IEEE Transactions on Power Delivery  
The former was characterized by proprietary solutions, while the latter has been involved for years in a strong standardization process guided by criteria of openness.  ...  This convergence leads us to suggest the application of well-established telecommunications management standards for power systems control.  ...  The mapping of usual telecontrol services to CMIP/SNMP protocol operations. D. Security against external network attacks. A.  ... 
doi:10.1109/tpwrd.2004.833918 fatcat:45e2a5xapzclbdpmda57e33nay

Adaptive Polling Rate for SNMP for Detecting Elusive DDOS

Yichiet Aun, Yen-Min Jasmina Khaw, Ming-Lee Gan, Vasaki Ponnusamy
2022 Journal of Cyber Security  
The equilibrium between scalability and accuracy is determined on the fly depending on the types of DDOS variants. 3D-SNMP also adds a vertical scaling to detect non-salient DDOS that falls below the detection  ...  Suppose a sign of DDOS is detected, 3D-SNMP scales down the poll rate for finer detection. As DDOS subsides, 3D-SNMP scales the poll rate up for faster DDOS detection.  ...  Acknowledgement: The authors expressed their utmost gratitude towards Centre of Internet and Big Data (CIoTBD) for endorsing the research works that leads to the finding published in this paper.  ... 
doi:10.32604/jcs.2022.027524 fatcat:4ersehuf2rg7vng2njksta5f74

Projecting advanced enterprise network and service management to active networks

R. Boutaba, A. Polyrakis
2002 IEEE Network  
This article discusses the impact of active networks on current network management practice by examining network management through the functional areas of fault, configuration, accounting, performance  ...  Packets may be classified and served on a per-application or per-user basis. Complex tasks and computations may be performed on the packets according to the content of the packets.  ...  In order to collect the data, most applications and tools depend on Simple Network Management Protocol (SNMP). This protocol provides a simple and uniform way to query the network devices.  ... 
doi:10.1109/65.980542 fatcat:t7f5wej3onhgzmei77g6ghjruy
« Previous Showing results 1 — 15 out of 2,394 results