Faults Identification by Passing Test Packets Through Efficient Tool In Network
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
ATPG comprehends router designs and produces a device autonomous model. The reproduction is utilized to deliver a base arrangement of test packets to negligibly put into impact each connection in the network or maximally practice each standard in the network. Test packets are post at normal interims, and notification failures trigger a gap instrument to limit the issue. ATPG can see both functional e.g., off base firewall tenet and execution issues e.g., congested queue. ATPG adjusts however past prior work in static goes checking which can't distinguish liveness or execution faults or fault confinement which just limits faults given liveness results. We clarify our model ATPG working and results on two genuine information sets: Stanford University's backbone system and Internet2. We find that a moment numeral of test packets be adequate to test all standards in these systems.
Authors and Affiliations
A. Manikyamba, G. Kumari, B. S. N. V. Ramanamurthy
Multivariate Link Analysis Approach Against DOS Attacks
Over the net, in our regular life we keep an eye on zone unit working with interconnect frameworks like web servers, data servers, and distributed computing servers. These region unit the frameworks that region unit...
AIDA : Minimizing Communication Overhead And Enhance Privacy of Shared Data
An algorithm for anonymous sharing of private data among parties is developed. Top-down refinement masks a given table to satisfy broad range of anonymity requirements without sacrificing significantly the usefulness...
http://www.ijrcct.org/index.php/ojs/article/view/604/pdf
Mobile Ad hoc Network (MANET) is a self creating, self-configuring and self healing network that is formed automatically by a collection of mobile nodes without the help of a fixed infrastructure or centralized manag...
Secure Data Aggregation In Wireless Networks
Security threat is originated by node capture attacks in hierarchical data aggregation where a hacker achieves full control over a sensor node through direct physical access in wireless sensor networks. It makes a hig...
Applications of MVS on Hierarchical Clustering Algorithms
Clustering is a valuable method that arranges a large quantity of unordered text documents into a small number of expressive and coherent clusters, thereby offering a basis for instinctive and informative steering an...