A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Nagaraja, G. S.
- Network Management Systems Simulation
Authors
1 Department of Computer Science and Engineeing, RVCE, Bangalore, IN
2 HEWLETT PACKARD, Bangalore, IN
Source
Networking and Communication Engineering, Vol 3, No 15 (2011), Pagination: 958-962Abstract
Today's network infrastructure becoming more complex and dynamic, a successful network management must ensure that the network and its applications are efficient. This requires setting up of a huge laboratory with multi-vendor network devices that require a huge cost investment. Moreover, networks are complicated and extremely expensive, and most vendors cannot afford to set up a real network. To resolve these issues NMS Simulation software that can simulate real networks, was introduced. This paper explains how NMS Simulation Toolkit can be used to evaluate of network management applications. A NMS simulator will simulates for Fault Detection, Accounting, Performance and Network Traffic. The NMS should discover the network inventory, monitor the health and status of device and provides alerts to condition that impact system performance.- Internet Shared Resources Framework
Authors
1 Department of Computer Science and Engineering at RV College of Engineering, Bangalore-59, IN
2 Dr. MGR University, Chennai, IN
Source
Networking and Communication Engineering, Vol 1, No 2 (2009), Pagination: 41-44Abstract
Resource sharing is also complicated by the absence of a complete and accurate level map of the internet. Without this map, an understanding of the distribution and usage patterns of network resources are limited. The location of routers and links and how they are shared are unknown and obtaining this map is difficult. Existing internet protocols were not explicitly designed for monitoring of further internet service providers (ISP’s).The local networks maps using are only known. In many cases active measurements and observations the network maps are inferred partially the internet’s size, hardware diversity and ISP policy make these maps incomplete and inaccurate. Also, active measurements are limited by administrators who confuse measurement probes for attacks and generate “ abuse reports “ and even legal threats curtail the scope of experiments. What can be done to improve the completeness and accuracy of the map of the internet without causing the ire of network administrators? It is possible to secure and discover shared internet resources without global protocol redeployment or architecture support.
The proposed work is focused on design and evaluation of protocols that secure the internet’s shared resources without requiring network support or global protocol redeployment. The notion of security varies with respect to the attack model. This work demonstrates security in three distinct user assumptions, Co-operative, selfish and malicious users. Novel techniques for increasing the accuracy and completeness of internet topology discovery are designed and evaluated. These techniques leverage existing protocol and hardware features and thus can be implemented on today’s internet.