Network Performance Analysis Using Packets Probe for Passive Monitoring

被引:0
|
作者
Alkenani J. [1 ]
Nassar K.A. [2 ]
机构
[1] Department of Computer Science, Shatt Al-Arab University College, Basra
[2] College of Computer Science and Information Technology, Computer Information Systems Department, University of Basrah, Basrah
来源
Informatica (Slovenia) | 2022年 / 46卷 / 07期
关键词
GUI; !text type='Java']Java[!/text; Network Performance; Packets Probe; Passive monitoring;
D O I
10.31449/inf.v46i7.4307
中图分类号
学科分类号
摘要
Measuring network performance is essential in computer networks, and benchmarking may not be effective for installation in peripheral devices, resulting in replacing those devices and thus increasing cost. In light of this, it is better to have a software system for the network to see its performance rather than the actual design. In this paper, we developed negative network tomography techniques to infer correlation-level aberrations such as excessive loss rates and delays from path-level measurements. Our system involves placing packet probes in passive monitoring devices on strategic links within the network to learn about network performance with the identification of missing and transmitted packets, and to keep the cost of monitoring and communications infrastructure low. A graphical user interface (GUI) represents provided a variety of data, metrics. this work can be a useful guide for network researchers or other programmers to analyze their networks and understand how to calculate network performance, where it has been compared to the network performance measurement and evaluation system (NPMES), the results of the system were the accuracy of 94%. © 2022 Slovene Society Informatika. All rights reserved.
引用
收藏
页码:153 / 160
页数:7
相关论文
共 50 条
  • [31] A Study on the Performance of Wavelet Packets for Spectral Analysis
    Lakshmanan, M. K.
    Ariananda, D. D.
    Nikookar, H.
    2010 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS (SPCOM), 2010,
  • [32] Network monitoring: Probe-subset selection using the constrained coverage problem
    Ozmutlu, HC
    Barton, R
    Gautam, N
    Hery, WJ
    PERFORMANCE AND CONTROL OF NETWORK SYSTEMS III, 1999, 3841 : 239 - 247
  • [33] Tracking performance analysis for distributed active-passive sensors' network
    Zhou, Bin
    Han, Chongzhao
    Yuan, Xianghui
    Sun, Jun
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 3102 - 3106
  • [34] Performance analysis of a novel hierarchical encryption mechanism in passive optical network
    Yin, Aihan
    Guo, Jianwei
    ICIC Express Letters, 2014, 8 (09): : 2451 - 2455
  • [35] Portable Network Monitoring System for Passive Optical Network (PON)
    Ng, Boonchuan
    Ab-Rahman, Mohammad Syuhaimi
    Premadi, Aswir
    Jumari, Kasmiran
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT, VOL 2, 2009, : 176 - 180
  • [36] Privacy-Aware Passive Network Monitoring
    Gogoulos, Fotios
    Antonakopoulou, Anna
    Mousas, Aziz S.
    Lioudakis, Georgios V.
    Kaklamani, Dimitra I.
    Venieris, Iakovos S.
    13TH PANHELLENIC CONFERENCE ON INFORMATICS, PROCEEDINGS, 2009, : 171 - 175
  • [37] Graphical analysis of captured network packets for detection of suspicious network nodes
    Aryeh, Felix Larbi
    Alese, Boniface Kayode
    Olasehinde, Olayemi
    2020 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA 2020), 2020,
  • [38] Indirect probe of quantum gravity using molecular wave-packets
    Villalpando, Carlos
    Modak, Sujoy K.
    CLASSICAL AND QUANTUM GRAVITY, 2019, 36 (21)
  • [39] Passive Optical Network Monitoring: Challenges and Requirements
    Rad, Mohammad M.
    Fouli, Kerim
    Fathallah, Habib A.
    Rusch, Leslie A.
    Maier, Martin
    IEEE COMMUNICATIONS MAGAZINE, 2011, 49 (02) : S45 - S52
  • [40] Performance comparison analysis of SSHMIPv6 and HMIPv6 lost packets using network simulator NS-2
    Alrashdan M.
    Ismail M.
    Jumari K.
    Abed G.A.
    Hassan S.
    Information Technology Journal, 2011, 10 (10) : 1989 - 1993