SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
A Geometric Approach to Improving Active Packet Loss Measurement
Institute of Electrical and Electronics Engineering
Abstract:
Measurement and estimation of packet loss characteristics are challenging due to the relatively rare
occurrence and typically short duration of packet loss episodes. While active probe tools are commonly
used to measure packet loss on end-to-end paths, there has been little analysis of the accuracy of these
tools or their impact on the network. The objective of our study is to understand how to measure packet
loss episodes accurately with end-to-end probes. We begin by testing the capability of standard Poisson-
modulated end-to-end measurements of loss in a controlled laboratory environment using IP routers
and commodity end hosts. Our tests show that loss characteristics reported from such Poisson-
modulated probe tools can be quite inaccurate over a range of traffic conditions. Motivated by these
observations, we introduce a new algorithm for packet loss measurement that is designed to overcome
the deficiencies in standard Poisson-based tools. Specifically, our method entails probe experiments that
follow a geometric distribution to 1) enable an explicit trade-off between accuracy and impact on the
network, and 2) enable more accurate measurements than standard Poisson probing at the same rate.
We evaluate the capabilities of our methodology experimentally by developing and implementing a
prototype tool, called BADABING. The experiments demonstrate the trade-offs between impact on the
network and measurement accuracy. We show that BADABING reports loss characteristics far more
accurately than traditional loss measurement tools.
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
System Architecture
TECHNIQUE USED:
Poisson modulated process
We begin by using our capabilities to evaluate the simple Poisson-modulated loss probe measurements
using the ZING tool. ZING measures packet loss in one direction on an end-to-end path. The ZING sender
emits packets at Poisson-modulated intervals with timestamps and unique sequence numbers and the
receiver logs the probe packet arrivals. We specify the mean probe rate, the probe packet size, and the
number of packets in a “flight.”
BADABING
Moreover, simple techniques allows us to validate the measurement output are introduced. We
implemented this method in a new tool, BADABING, which we tested in our laboratory. Our tests
demonstrate that BADABING, in most cases, accurately estimates loss frequencies and durations over a
range of cross traffic conditions. For the same overall packet rate, our results show that BADABING is
significantly more accurate than Poisson probing for measuring loss episode characteristics.
Our methodology involves dispatching a sequence of probes, each consisting of one or more very closely
spaced packets. The aim of a probe is to obtain a snapshot of the state of the network at the instant of
A Geometric Approach to Improving Active Packet Loss Measurement
File Loading Receiving
Packets from
Sender
Receiving
Packets from
Queue
Packet
Separation
Sending Packets
to Queue
Creating Packet
loss
Sending Packets
to Receiver
Packet loss
Measurement
Calculations
Result
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
probing. As such, the record for each probe indicates whether or not it encountered a loss episode, as
evidenced by either the loss or sufficient delay of any of the packets within a probe.
The probes themselves are organized into what we term basic experiments, each of which comprises a
number of packets sent in rapid succession. The aim of the basic experiment is to determine the
dynamics of transitions between the congested and un-congested state of the network, i.e., beginnings
and endings of loss episodes. Below we show how this enables us to estimate the duration of loss
episodes.
A full experiment comprises a sequence of basic experiments generated according to some rule. The
sequence may be terminated after some specified number of basic experiments, or after a given
duration, or in an open-ended adaptive fashion, e.g., until estimates of desired accuracy for a loss
characteristic have been obtained, or until such accuracy is determined impossible.
Advantages:
The advantage of our study is to understand how to accurately measure loss characteristics on end-to-
end paths with probes. We are interested in two specific characteristics of packet loss: loss episode
frequency, and loss episode duration. Thus we improve the accuracy in measuring the packet loss. This
is the major advantage of our work.
Applications:
We can measure the packet loss more accurately than before. Thus we can find the networks
performance by calculating the packet loss. By finding the networks performance we can use the
network according to our needs. Thus we can evaluate the network performance by calculating the
packet loss. We can measure packet loss in military networks, hospital networks, etc. These kind of
networks transfers more important data, thus its performance should be high. So the measurement of
packet loss should be negligible or nothing.
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
Sender’s Side
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
Conclusion:
In this paper, we have studied the problem of combating Internet worms. To that end, we have
developed a branching process model to characterize the propagation of Internet worms. Unlike
deterministic epidemic models studied in the literature, this model allows us to characterize the early
phase of worm propagation. Using the branching process model, we are able to provide a precise bound
M on the total number of scans that ensure that the worm will eventually die out. Further, from our
model, we also obtain the probability that the total number of hosts that the worm infects is below a
certain level, as a function of the scan limit. The insights gained from analyzing this model also allow us
to develop an effective and automatic worm containment strategy that does not let the worm
propagate beyond the early stages of infection. Our strategy can effectively contain both fast scan
worms and slow scan worms without knowing the worm signature in advance or needing to explicitly
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
detect the worm. We show via simulations and real trace data that the containment strategy is both
effective and non-intrusive.

Mais conteúdo relacionado

Semelhante a A geometric approach to improving active packet loss measurement

Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetGyan Prakash
 
Catching packet droppers and modifiers
Catching packet droppers and modifiersCatching packet droppers and modifiers
Catching packet droppers and modifiersIMPULSE_TECHNOLOGY
 
Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 2   50+ AbstNcct   Ieee Software Abstract Collection Volume 2   50+ Abst
Ncct Ieee Software Abstract Collection Volume 2 50+ Abstncct
 
Anomalous payload based network intrusion detection
Anomalous payload based network intrusion detectionAnomalous payload based network intrusion detection
Anomalous payload based network intrusion detectionUltraUploader
 
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...IRJET Journal
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java ProjectsVijay Karan
 
Enhanced DV Hop Localization Algorithm for Wireless Sensor Networks
Enhanced DV Hop Localization Algorithm for Wireless Sensor NetworksEnhanced DV Hop Localization Algorithm for Wireless Sensor Networks
Enhanced DV Hop Localization Algorithm for Wireless Sensor Networksijtsrd
 
Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance csandit
 
презентация за варшава
презентация за варшавапрезентация за варшава
презентация за варшаваValeriya Simeonova
 
Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17redpel dot com
 
Data mining projects topics for java and dot net
Data mining projects topics for java and dot netData mining projects topics for java and dot net
Data mining projects topics for java and dot netredpel dot com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...IJNSA Journal
 
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...IJNSA Journal
 
Neural Network Based Individual Classification System
Neural Network Based Individual Classification SystemNeural Network Based Individual Classification System
Neural Network Based Individual Classification SystemIRJET Journal
 
Principle Component Analysis for Classification of the Quality of Aromatic Rice
Principle Component Analysis for Classification of the Quality of Aromatic RicePrinciple Component Analysis for Classification of the Quality of Aromatic Rice
Principle Component Analysis for Classification of the Quality of Aromatic RiceIJCSIS Research Publications
 
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor NetworksEfficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor Networkspaperpublications3
 
EEG Classification using Semi Supervised Learning
EEG Classification using Semi Supervised LearningEEG Classification using Semi Supervised Learning
EEG Classification using Semi Supervised Learningijtsrd
 
Top Cited Articles in Signal & Image Processing 2021-2022
Top Cited Articles in Signal & Image Processing 2021-2022Top Cited Articles in Signal & Image Processing 2021-2022
Top Cited Articles in Signal & Image Processing 2021-2022sipij
 

Semelhante a A geometric approach to improving active packet loss measurement (20)

Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes Net
 
Catching packet droppers and modifiers
Catching packet droppers and modifiersCatching packet droppers and modifiers
Catching packet droppers and modifiers
 
Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 2   50+ AbstNcct   Ieee Software Abstract Collection Volume 2   50+ Abst
Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
 
Anomalous payload based network intrusion detection
Anomalous payload based network intrusion detectionAnomalous payload based network intrusion detection
Anomalous payload based network intrusion detection
 
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java Projects
 
Enhanced DV Hop Localization Algorithm for Wireless Sensor Networks
Enhanced DV Hop Localization Algorithm for Wireless Sensor NetworksEnhanced DV Hop Localization Algorithm for Wireless Sensor Networks
Enhanced DV Hop Localization Algorithm for Wireless Sensor Networks
 
Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance
 
презентация за варшава
презентация за варшавапрезентация за варшава
презентация за варшава
 
Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17
 
Data mining projects topics for java and dot net
Data mining projects topics for java and dot netData mining projects topics for java and dot net
Data mining projects topics for java and dot net
 
M41028892
M41028892M41028892
M41028892
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
 
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
 
Neural Network Based Individual Classification System
Neural Network Based Individual Classification SystemNeural Network Based Individual Classification System
Neural Network Based Individual Classification System
 
Principle Component Analysis for Classification of the Quality of Aromatic Rice
Principle Component Analysis for Classification of the Quality of Aromatic RicePrinciple Component Analysis for Classification of the Quality of Aromatic Rice
Principle Component Analysis for Classification of the Quality of Aromatic Rice
 
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor NetworksEfficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
 
EEG Classification using Semi Supervised Learning
EEG Classification using Semi Supervised LearningEEG Classification using Semi Supervised Learning
EEG Classification using Semi Supervised Learning
 
Top Cited Articles in Signal & Image Processing 2021-2022
Top Cited Articles in Signal & Image Processing 2021-2022Top Cited Articles in Signal & Image Processing 2021-2022
Top Cited Articles in Signal & Image Processing 2021-2022
 

Mais de Harshal Ladhe

RGB Image Compression using Two-dimensional Discrete Cosine Transform
RGB Image Compression using Two-dimensional Discrete Cosine TransformRGB Image Compression using Two-dimensional Discrete Cosine Transform
RGB Image Compression using Two-dimensional Discrete Cosine TransformHarshal Ladhe
 
A robust watermarking algorithm based on image normalization and dc coefficients
A robust watermarking algorithm based on image normalization and dc coefficientsA robust watermarking algorithm based on image normalization and dc coefficients
A robust watermarking algorithm based on image normalization and dc coefficientsHarshal Ladhe
 
Image compression using discrete wavelet transform
Image compression using discrete wavelet transformImage compression using discrete wavelet transform
Image compression using discrete wavelet transformHarshal Ladhe
 
Adaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancementAdaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancementHarshal Ladhe
 
Bilateral filtering for gray and color images
Bilateral filtering for gray and color imagesBilateral filtering for gray and color images
Bilateral filtering for gray and color imagesHarshal Ladhe
 
Phase locked loop techniques for fm demodulation and modulation
Phase locked loop techniques for fm demodulation and modulationPhase locked loop techniques for fm demodulation and modulation
Phase locked loop techniques for fm demodulation and modulationHarshal Ladhe
 
Design of iir notch filters and narrow and wide band filters
Design of iir notch filters and narrow and wide band filtersDesign of iir notch filters and narrow and wide band filters
Design of iir notch filters and narrow and wide band filtersHarshal Ladhe
 
Genetic algorithm for the design of optimal iir digital filters
Genetic algorithm for the design of optimal iir digital filtersGenetic algorithm for the design of optimal iir digital filters
Genetic algorithm for the design of optimal iir digital filtersHarshal Ladhe
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksHarshal Ladhe
 
Study & simulation of O.F.D.M. system
Study & simulation of O.F.D.M. systemStudy & simulation of O.F.D.M. system
Study & simulation of O.F.D.M. systemHarshal Ladhe
 
A simulation and analysis of ofdm system for 4 g communications
A simulation and analysis of ofdm system for 4 g communicationsA simulation and analysis of ofdm system for 4 g communications
A simulation and analysis of ofdm system for 4 g communicationsHarshal Ladhe
 
Speech compression using voiced excited loosy predictive coding (lpc)
Speech compression using voiced excited loosy predictive coding (lpc)Speech compression using voiced excited loosy predictive coding (lpc)
Speech compression using voiced excited loosy predictive coding (lpc)Harshal Ladhe
 
Speech compression using loosy predictive coding (lpc)
Speech compression using loosy predictive coding (lpc)Speech compression using loosy predictive coding (lpc)
Speech compression using loosy predictive coding (lpc)Harshal Ladhe
 
Noise analysis & qrs detection in ecg signals
Noise analysis & qrs detection in ecg signalsNoise analysis & qrs detection in ecg signals
Noise analysis & qrs detection in ecg signalsHarshal Ladhe
 

Mais de Harshal Ladhe (15)

RGB Image Compression using Two-dimensional Discrete Cosine Transform
RGB Image Compression using Two-dimensional Discrete Cosine TransformRGB Image Compression using Two-dimensional Discrete Cosine Transform
RGB Image Compression using Two-dimensional Discrete Cosine Transform
 
A robust watermarking algorithm based on image normalization and dc coefficients
A robust watermarking algorithm based on image normalization and dc coefficientsA robust watermarking algorithm based on image normalization and dc coefficients
A robust watermarking algorithm based on image normalization and dc coefficients
 
Image compression using discrete wavelet transform
Image compression using discrete wavelet transformImage compression using discrete wavelet transform
Image compression using discrete wavelet transform
 
Adaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancementAdaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancement
 
Bilateral filtering for gray and color images
Bilateral filtering for gray and color imagesBilateral filtering for gray and color images
Bilateral filtering for gray and color images
 
Phase locked loop techniques for fm demodulation and modulation
Phase locked loop techniques for fm demodulation and modulationPhase locked loop techniques for fm demodulation and modulation
Phase locked loop techniques for fm demodulation and modulation
 
Design of iir notch filters and narrow and wide band filters
Design of iir notch filters and narrow and wide band filtersDesign of iir notch filters and narrow and wide band filters
Design of iir notch filters and narrow and wide band filters
 
Genetic algorithm for the design of optimal iir digital filters
Genetic algorithm for the design of optimal iir digital filtersGenetic algorithm for the design of optimal iir digital filters
Genetic algorithm for the design of optimal iir digital filters
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
 
Study & simulation of O.F.D.M. system
Study & simulation of O.F.D.M. systemStudy & simulation of O.F.D.M. system
Study & simulation of O.F.D.M. system
 
A simulation and analysis of ofdm system for 4 g communications
A simulation and analysis of ofdm system for 4 g communicationsA simulation and analysis of ofdm system for 4 g communications
A simulation and analysis of ofdm system for 4 g communications
 
Speech compression using voiced excited loosy predictive coding (lpc)
Speech compression using voiced excited loosy predictive coding (lpc)Speech compression using voiced excited loosy predictive coding (lpc)
Speech compression using voiced excited loosy predictive coding (lpc)
 
Speech compression using loosy predictive coding (lpc)
Speech compression using loosy predictive coding (lpc)Speech compression using loosy predictive coding (lpc)
Speech compression using loosy predictive coding (lpc)
 
Noise analysis & qrs detection in ecg signals
Noise analysis & qrs detection in ecg signalsNoise analysis & qrs detection in ecg signals
Noise analysis & qrs detection in ecg signals
 
GIS
GISGIS
GIS
 

Último

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 

Último (20)

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 

A geometric approach to improving active packet loss measurement

  • 1. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413 A Geometric Approach to Improving Active Packet Loss Measurement Institute of Electrical and Electronics Engineering Abstract: Measurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. While active probe tools are commonly used to measure packet loss on end-to-end paths, there has been little analysis of the accuracy of these tools or their impact on the network. The objective of our study is to understand how to measure packet loss episodes accurately with end-to-end probes. We begin by testing the capability of standard Poisson- modulated end-to-end measurements of loss in a controlled laboratory environment using IP routers and commodity end hosts. Our tests show that loss characteristics reported from such Poisson- modulated probe tools can be quite inaccurate over a range of traffic conditions. Motivated by these observations, we introduce a new algorithm for packet loss measurement that is designed to overcome the deficiencies in standard Poisson-based tools. Specifically, our method entails probe experiments that follow a geometric distribution to 1) enable an explicit trade-off between accuracy and impact on the network, and 2) enable more accurate measurements than standard Poisson probing at the same rate. We evaluate the capabilities of our methodology experimentally by developing and implementing a prototype tool, called BADABING. The experiments demonstrate the trade-offs between impact on the network and measurement accuracy. We show that BADABING reports loss characteristics far more accurately than traditional loss measurement tools.
  • 2. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413 System Architecture TECHNIQUE USED: Poisson modulated process We begin by using our capabilities to evaluate the simple Poisson-modulated loss probe measurements using the ZING tool. ZING measures packet loss in one direction on an end-to-end path. The ZING sender emits packets at Poisson-modulated intervals with timestamps and unique sequence numbers and the receiver logs the probe packet arrivals. We specify the mean probe rate, the probe packet size, and the number of packets in a “flight.” BADABING Moreover, simple techniques allows us to validate the measurement output are introduced. We implemented this method in a new tool, BADABING, which we tested in our laboratory. Our tests demonstrate that BADABING, in most cases, accurately estimates loss frequencies and durations over a range of cross traffic conditions. For the same overall packet rate, our results show that BADABING is significantly more accurate than Poisson probing for measuring loss episode characteristics. Our methodology involves dispatching a sequence of probes, each consisting of one or more very closely spaced packets. The aim of a probe is to obtain a snapshot of the state of the network at the instant of A Geometric Approach to Improving Active Packet Loss Measurement File Loading Receiving Packets from Sender Receiving Packets from Queue Packet Separation Sending Packets to Queue Creating Packet loss Sending Packets to Receiver Packet loss Measurement Calculations Result
  • 3. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413 probing. As such, the record for each probe indicates whether or not it encountered a loss episode, as evidenced by either the loss or sufficient delay of any of the packets within a probe. The probes themselves are organized into what we term basic experiments, each of which comprises a number of packets sent in rapid succession. The aim of the basic experiment is to determine the dynamics of transitions between the congested and un-congested state of the network, i.e., beginnings and endings of loss episodes. Below we show how this enables us to estimate the duration of loss episodes. A full experiment comprises a sequence of basic experiments generated according to some rule. The sequence may be terminated after some specified number of basic experiments, or after a given duration, or in an open-ended adaptive fashion, e.g., until estimates of desired accuracy for a loss characteristic have been obtained, or until such accuracy is determined impossible. Advantages: The advantage of our study is to understand how to accurately measure loss characteristics on end-to- end paths with probes. We are interested in two specific characteristics of packet loss: loss episode frequency, and loss episode duration. Thus we improve the accuracy in measuring the packet loss. This is the major advantage of our work. Applications: We can measure the packet loss more accurately than before. Thus we can find the networks performance by calculating the packet loss. By finding the networks performance we can use the network according to our needs. Thus we can evaluate the network performance by calculating the packet loss. We can measure packet loss in military networks, hospital networks, etc. These kind of networks transfers more important data, thus its performance should be high. So the measurement of packet loss should be negligible or nothing.
  • 4. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413 Sender’s Side
  • 5. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
  • 6. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
  • 7. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413 Conclusion: In this paper, we have studied the problem of combating Internet worms. To that end, we have developed a branching process model to characterize the propagation of Internet worms. Unlike deterministic epidemic models studied in the literature, this model allows us to characterize the early phase of worm propagation. Using the branching process model, we are able to provide a precise bound M on the total number of scans that ensure that the worm will eventually die out. Further, from our model, we also obtain the probability that the total number of hosts that the worm infects is below a certain level, as a function of the scan limit. The insights gained from analyzing this model also allow us to develop an effective and automatic worm containment strategy that does not let the worm propagate beyond the early stages of infection. Our strategy can effectively contain both fast scan worms and slow scan worms without knowing the worm signature in advance or needing to explicitly
  • 8. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413 detect the worm. We show via simulations and real trace data that the containment strategy is both effective and non-intrusive.