Scalable Probe Tool Design for Active Packet Loss Measurement using Geometric Distribution
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 1
Abstract
Packet loss due to congestion is a fundamental problem in wide-area packet switched networks. Researchers have expanded much effort in characterizing this phenomenon and designing protocols that operate effectively in lossy environments, but the Internet’s dynamic nature requires continued empirical evaluation of packet loss behavior. The packet loss estimation is quite challenging due to the rare occurrence and typically short duration of the packet loss episodes. Network operators have the ability to passively monitor nodes within their network for packet loss on routers using Simple network Management Protocol (SNMP). Most of the existing network probing tools work based on Poisson Arrival See Time Averages (PASTA) approach. The limitation of this approach is that it requires higher moments of measurement to report accurate results. Increasing the probe rate leads to the situation that the probes themselves may skew the result. The proposed approach mainly focuses on the design and development of a one-way UDP based active packet loss measurement tool. Among all discrete probability distributions supported on a set of events the geometric distribution the one with the largest entropy where entropy is a measure of the uncertainty associated with a random variable. The probes are generated at the sender and are dispatched to the queue at geometrically distributed interval. The aim of each probe is to record the loss frequency and the delay that is experienced along the path. It is also aimed to get the network statistics at the time of probing. The First in First Out queuing mechanism is used for buffering the packets and queue is forced to introduce the packet loss as the packet loss is a rare event in the network.
Authors and Affiliations
Gayathri c, Suma B
Extended Public Key Cryptosystem and Aggregate Key for Secure data Sharing In Cloud
Information sharing is a basic usefulness in cloud storage. We exhibit how to immovably, powerfully, and straight forwardly impart information to others in cloud storage. Cryptographic frameworks are more versatile a...
Intrusion Detection System (IDS) for Wireless Ad-hoc Networks using Evolution Identification on Streaming Network Data for Detecting Unknown Network Attacks
Over last few decades design of Network Intrusion Detection System (NIDS) has been a challenging problem faced by research community. Although various approaches have been proposed to design efficient NIDS the engin...
A Glance At Malicious Attacks In Web
Web usage is one of the great important to all users in this era. For each and every need internet or web is made use of. Users make use of the area as a medium for searching information, performing business transacti...
Secure Authentication Schemes
There are different authentication methods to provide security. The most commonly used are textual passwords, but are commonly susceptible to brute -force attacks. Recognition and Recall-based techniques on graphical...
Secure Data Aggregation In Wireless Networks
Security threat is originated by node capture attacks in hierarchical data aggregation where a hacker achieves full control over a sensor node through direct physical access in wireless sensor networks. It makes a hig...