Network Monitoring as a Key to the Success of Traffic Engineering Techniques
نویسندگان
چکیده
In this paper we propose a model for measurementbased network configuration. In the model, resource allocation is based on provisioning cycles, whereby monitoring is used to build a matrix with expected traffic patterns. Such a matrix drives the subsequent network configuration phase, which is performed via a hybrid Traffic Engineering approach, combining both off-line and on-line algorithms. Furthermore, a policy-based strategy is suggested in order to enforce configuration onto network devices. The paper aims at demonstrating how measurement-based management of networks represents a good example of crossfertilization between two distinct research areas in the networking community: monitoring on one side and traffic engineering on the other.
منابع مشابه
An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation
Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...
متن کاملBehavioral Analysis of Traffic Flow for an Effective Network Traffic Identification
Fast and accurate network traffic identification is becoming essential for network management, high quality of service control and early detection of network traffic abnormalities. Techniques based on statistical features of packet flows have recently become popular for network classification due to the limitations of traditional port and payload based methods. In this paper, we propose a metho...
متن کاملشیوه های توزیع بار در مهندسی ترافیک
Because of rapidly rising network traffic, ISP providers are trying to create new network structures and extend more resources to control the growth of demands. It is important to efficiently split the network bandwidth among different sources so that each user has enough bandwidth. Traffic engineering is used to achieve this goal. Performing reliable and efficient network ope...
متن کاملLocation-allocation of traffic police patrols in the suburban network
Nowadays, due to population increase and expansion of the transportation networks, the monitoring of this network, control, and prevention of accidents and crimes are very important. The main tasks of traffic patrols, like other emergency-security facilities, are the monitoring and prevention of crime as well as handling and fining in the case of committing crimes. Traffic patrols should be pre...
متن کاملDetecting Active Bot Networks Based on DNS Traffic Analysis
Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004