Minimising Attacks Using ATPG On Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 8
Abstract
Today's networks require much human involvement to keep them working. Everyday network engineers struggle with router mis-configurations, fibercuts, faulty interfaces, mislabelled cables, software bugs, intermittent links that cause networks to misbehave or fail completely. The most basic tools ping and trace route and track down root causes using a combination of accrued knowledge and perception. We propose an automated and systematic approach for testing and debugging networks called “Automatic Test Packet Generation” (ATPG).ATPG reads router configurations and generates a deviceindependent model. The model is used to generate a minimum set of test packets to (minimally) exercise every link in the network or (maximally) exercise every rule in the network. Test packets are sent periodically, and detected failures start a separate mechanism to localize the fault.
Authors and Affiliations
G. Ankitha, N. Praveena
Design of Low Power FPGA using Autonomous Power Gating and LEDR Encoding
The most important key challenge in the IC scaling era is to deliver high performance solutions in the process of minimizing power, area and cost. The main objective of this paper is to reduce power consumption by co...
Investigation of Ionospheric Mapping Function Error for GAGAN Application
The positional accuracy of Indian Space Based Augmentation System known as GPS Aided GEO Augmented Navigation (GAGAN) suffers from atmospheric errors which include large gradients, intense irregularities and equatoria...
Real Time Digital Signal Processing Based On Optical OFDM
The adaptability provided for Eventually Tom's perusing OFDM may be connected as transfer speed granularity to the clients. Done such an approach that every about them will make guaranteed An certain level for servic...
A Novel Protocol To Implement The Solution On Mobile And Desktop Machine For Location Based Queries
We put into practice an answer on a desktop machine and a mobile device to measure the competence of our protocol. We also bring in a safety replica and examine the safety in the circumstance of our protocol. At leng...
Proficient User Revocation On Cloud Computing
In today's Computing world Cloud enlisting is one of the best advancement which uses advanced computational power and it upgrades data sharing and data securing capacities. Essential inconvenience in appropriated fig...