A Design of an Efficient, Robust, Autonomous and a well Coordinated Distributed Network Monitory System for Large Computer Networks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 4
Abstract
Information security assurance over networks is one of the key major issues facing the network infrastructure of organizations and information systems in today’s world. Data security and access control to information are issues of great importance in large scale networks. Network performance tracking and tracking of malicious activities over networks are of key importance in network management and network security. Because most organizations do not have a coordinated and autonomous network monitory centers at nodes within large computer networks, remote tracking of data becomes a challenge for them. Some organizations do real-time monitory over large networks from a centralized system and this affects the performance of the entire network and in some cases turned to be inefficient. Monitory and analysis of large data passing through nodes becomes a challenge if it is supposed to be done remotely over the network. This paper seeks to propose a method for designing efficient, robust, autonomous and a well coordinated distributed network monitory system for large computer Networks. The system consists of units or centers. These monitory centers are designed to have the capability of monitoring large amount of data passively and autonomously. They will also have the capability of collecting and analyzing data of interest as well as passing of information over to a parent monitory center for analysis if necessary. They can be used to monitor network performance and to passively monitor activities of targeted systems over the network.
Authors and Affiliations
Quist-Aphetsi Kester
Energy Aware Congestion Control Multipath Routing: A Survey
Mobile An ad hoc network (MANET) is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. The life time of the network is an im...
An Approach for Storage Security in Cloud Computing- A Survey
The many advantages of cloud computing are increasingly attracting individuals and organizations to outsource their data from local to remote cloud servers. In addition to cloud infrastructure and platform provider...
Cloud Service Negotiation Techniques
Cloud computing is a subscription based service from which the networked storage space and the resources can be obtained. Collaborations in multiple institutions are increasing due to the world wide deployment of more cl...
LEARNING BEHAVIOR OF ANALYSIS OF HIGHER STUDIES USING DATA MINING
The main concern of providing higher education is to provide quality education to the students and to produce technically qualified professionals. The knowledge is hidden among the educational data set and it i...
Review on an Underwater Acoustic Networks
For the enhancement of underwater acoustic network the current research is focus on communication between various remote instruments to improve the high-rate reliable communication, energy efficiency and robust...