SlideShare a Scribd company logo
1 of 14
Download to read offline
NETWORK TOMOGRAPHY TO ENHANCE THE
PERFORMANCE OF SOFTWARE DEFINED
NETWORK MONITORING AND MANAGEMENT
K M Sabidur Rahman
with Chaitrali Joshi and Tanjila Ahmed (ECS 273)
9/23/20161
9/23/20162
Agenda
•Network Tomography and SDN
•MiniNet Data Collection
•EM algorithm
•Results from EM implementation in R
•Future work
9/23/20163
Network Tomography
“It is the study of a network’s internal characteristics using information
derived from end point data.”
- Wikipedia
• Statistical theory and algorithms are used to estimate internal
characteristics of the network topology
• Flexibility of SDN can be used to make better results
9/23/20164
Shortcomings of current measurement methods
• Impractical to measure packet delays at every router
• Proprietary routers are inflexible
• Geographic separation of routers
• Storing packet information at every node is expensive
• Memory constraints
• Causes congestion in communication
3/14/165
Experimental Setup
• Topology setup using Mininet
• Single source multiple
receiver
• Controller for SDN
• Python based POX
remote controller
S2
H2 S1
S3
H3 H4
H1
9/23/20166
EM Algorithm
•Iterative method for estimation of parameters in a statistical model
•It estimates the maximum likelihood of parameters
•Where the model depends on unobserved latent variable
•E step: Update the conditional expectation(log likelihood) of the parameter
by the given observation
•M step: Find the parameter that maximizes that quantity
9/23/20167
EM Algorithm
y = observed end-to-end delay data
z = unobserved link delay(latent variable)
p=probability of delays on link i
Complete data likelihood can be factorized as :
where we have to estimate and z from end-to-end delay y
9/23/20168
EM Algorithm
Complete data likelihood is dependent on likelihood of z as conditional pmf of y given z does
not have p parameter.
Where ,number of packets that faces delay j on link i
9/23/20169
EM Algorithm
E Step :
M step:
This is our updated estimate of Pij.
9/23/201610
Results
0
5
10
15
20
25
30
Data Link 1
EM
Numberofpackets
Delay (ms)
9/23/201611
Results
0
5
10
15
20
25
30
Data Link 2
EM Link 2
Numberofpackets
Delay (ms)
9/23/201612
Results
0
5
10
15
20
25
30
Data Link 3
EM
Numberofpackets
Delay (ms)
9/23/201613
Future
•Use more data 100,1000,2000
•Use more complex topology
•Use SDN control mechanism to find the minimum measurement needed for
a network
•Explore temporal effects on delays
9/23/201614

More Related Content

What's hot

Mesh Topology Design with Cisco Packet Tracer
Mesh Topology Design with Cisco Packet TracerMesh Topology Design with Cisco Packet Tracer
Mesh Topology Design with Cisco Packet TracerMaksudujjaman
 
APM project meeting - June 13, 2012 - LBNL, Berkeley, CA
APM project meeting - June 13, 2012 - LBNL, Berkeley, CAAPM project meeting - June 13, 2012 - LBNL, Berkeley, CA
APM project meeting - June 13, 2012 - LBNL, Berkeley, CAbalmanme
 
Wireless network setup
Wireless network setupWireless network setup
Wireless network setupMaksudujjaman
 
DNS Server configure with Cisco Packet Tracer
DNS Server configure with Cisco Packet TracerDNS Server configure with Cisco Packet Tracer
DNS Server configure with Cisco Packet TracerShofiqulIslam38
 
Mail Server Configure with Cisco Packet Tracer
Mail Server Configure with Cisco Packet TracerMail Server Configure with Cisco Packet Tracer
Mail Server Configure with Cisco Packet TracerShofiqulIslam38
 
Ring Topology design with Cisco Packet Tracer
Ring  Topology design with Cisco Packet TracerRing  Topology design with Cisco Packet Tracer
Ring Topology design with Cisco Packet TracerShofiqulIslam38
 
Bus Topology Design with Cisco Packet Tracer
Bus Topology Design with Cisco Packet TracerBus Topology Design with Cisco Packet Tracer
Bus Topology Design with Cisco Packet TracerMaksudujjaman
 
Star Topology design with Cisco Packet Tracer
Star Topology design with Cisco Packet TracerStar Topology design with Cisco Packet Tracer
Star Topology design with Cisco Packet TracerShofiqulIslam38
 
Tree Topology design with Cisco Packet Tracer
Tree Topology design with Cisco Packet TracerTree Topology design with Cisco Packet Tracer
Tree Topology design with Cisco Packet TracerShofiqulIslam38
 
Network Simulators Comparison Research Help
Network Simulators Comparison Research HelpNetwork Simulators Comparison Research Help
Network Simulators Comparison Research HelpMatlab Simulation
 
Star Topology Design with Cisco Packet Tracer
Star Topology Design with Cisco Packet TracerStar Topology Design with Cisco Packet Tracer
Star Topology Design with Cisco Packet TracerMaksudujjaman
 
Hybrid Topology Design with Cisco Packet Tracer
Hybrid Topology Design with Cisco Packet TracerHybrid Topology Design with Cisco Packet Tracer
Hybrid Topology Design with Cisco Packet TracerMaksudujjaman
 
Ring Topology Design with Cisco Packet Tracer
Ring Topology Design with Cisco Packet TracerRing Topology Design with Cisco Packet Tracer
Ring Topology Design with Cisco Packet TracerMaksudujjaman
 

What's hot (20)

Mesh Topology Design with Cisco Packet Tracer
Mesh Topology Design with Cisco Packet TracerMesh Topology Design with Cisco Packet Tracer
Mesh Topology Design with Cisco Packet Tracer
 
APM project meeting - June 13, 2012 - LBNL, Berkeley, CA
APM project meeting - June 13, 2012 - LBNL, Berkeley, CAAPM project meeting - June 13, 2012 - LBNL, Berkeley, CA
APM project meeting - June 13, 2012 - LBNL, Berkeley, CA
 
Wireless network setup
Wireless network setupWireless network setup
Wireless network setup
 
DNS Server configure with Cisco Packet Tracer
DNS Server configure with Cisco Packet TracerDNS Server configure with Cisco Packet Tracer
DNS Server configure with Cisco Packet Tracer
 
Ftp server
Ftp serverFtp server
Ftp server
 
Mail Server Configure with Cisco Packet Tracer
Mail Server Configure with Cisco Packet TracerMail Server Configure with Cisco Packet Tracer
Mail Server Configure with Cisco Packet Tracer
 
Ring Topology design with Cisco Packet Tracer
Ring  Topology design with Cisco Packet TracerRing  Topology design with Cisco Packet Tracer
Ring Topology design with Cisco Packet Tracer
 
Bus Topology Design with Cisco Packet Tracer
Bus Topology Design with Cisco Packet TracerBus Topology Design with Cisco Packet Tracer
Bus Topology Design with Cisco Packet Tracer
 
Bus Topology
Bus TopologyBus Topology
Bus Topology
 
Star Topology design with Cisco Packet Tracer
Star Topology design with Cisco Packet TracerStar Topology design with Cisco Packet Tracer
Star Topology design with Cisco Packet Tracer
 
Tree Topology design with Cisco Packet Tracer
Tree Topology design with Cisco Packet TracerTree Topology design with Cisco Packet Tracer
Tree Topology design with Cisco Packet Tracer
 
Ring Topology
Ring TopologyRing Topology
Ring Topology
 
Network Simulators Comparison Research Help
Network Simulators Comparison Research HelpNetwork Simulators Comparison Research Help
Network Simulators Comparison Research Help
 
MAN
MANMAN
MAN
 
LAN
LANLAN
LAN
 
Mesh Topology
Mesh TopologyMesh Topology
Mesh Topology
 
Star Topology Design with Cisco Packet Tracer
Star Topology Design with Cisco Packet TracerStar Topology Design with Cisco Packet Tracer
Star Topology Design with Cisco Packet Tracer
 
Star Topology
Star Topology Star Topology
Star Topology
 
Hybrid Topology Design with Cisco Packet Tracer
Hybrid Topology Design with Cisco Packet TracerHybrid Topology Design with Cisco Packet Tracer
Hybrid Topology Design with Cisco Packet Tracer
 
Ring Topology Design with Cisco Packet Tracer
Ring Topology Design with Cisco Packet TracerRing Topology Design with Cisco Packet Tracer
Ring Topology Design with Cisco Packet Tracer
 

Viewers also liked

Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...iosrjce
 
Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...
Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...
Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...Banking at Ho Chi Minh city
 
5 продвинутых технологий VMware, которые нужно знать
5 продвинутых технологий VMware, которые нужно знать5 продвинутых технологий VMware, которые нужно знать
5 продвинутых технологий VMware, которые нужно знатьSkillFactory
 
Distributed Network Monitoring - Interopnet class by NetBeez
Distributed Network Monitoring - Interopnet class by NetBeezDistributed Network Monitoring - Interopnet class by NetBeez
Distributed Network Monitoring - Interopnet class by NetBeezNetBeez, Inc.
 
Network processing by pid
Network processing by pidNetwork processing by pid
Network processing by pidNuno Martins
 
Архитектура Cisco для сетей мобильного бэкхола.
Архитектура Cisco для сетей мобильного бэкхола.Архитектура Cisco для сетей мобильного бэкхола.
Архитектура Cisco для сетей мобильного бэкхола.Cisco Russia
 
Эволюция транспортной инфраструктуры оператора связи: Cisco Carrier Packet Tr...
Эволюция транспортной инфраструктуры оператора связи: Cisco Carrier Packet Tr...Эволюция транспортной инфраструктуры оператора связи: Cisco Carrier Packet Tr...
Эволюция транспортной инфраструктуры оператора связи: Cisco Carrier Packet Tr...Cisco Russia
 
Виртуализация в сетях мобильной связи
Виртуализация в сетях мобильной связиВиртуализация в сетях мобильной связи
Виртуализация в сетях мобильной связиCisco Russia
 
Защищаем сеть от DDoS-атак
Защищаем сеть от DDoS-атакЗащищаем сеть от DDoS-атак
Защищаем сеть от DDoS-атакSkillFactory
 
Архитектура Cisco EPN для сетей Carrier Ethernet и Mobile Backhaul
Архитектура Cisco EPN для сетей Carrier Ethernet и Mobile BackhaulАрхитектура Cisco EPN для сетей Carrier Ethernet и Mobile Backhaul
Архитектура Cisco EPN для сетей Carrier Ethernet и Mobile BackhaulCisco Russia
 
DDoS-атаки вчера, сегодня, завтра
DDoS-атаки вчера, сегодня, завтраDDoS-атаки вчера, сегодня, завтра
DDoS-атаки вчера, сегодня, завтраQrator Labs
 
[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and ITSite24x7
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring Savvius, Inc
 
04 gsm bss network kpi (tch call drop rate) optimization manual
04 gsm bss network kpi (tch call drop rate) optimization manual04 gsm bss network kpi (tch call drop rate) optimization manual
04 gsm bss network kpi (tch call drop rate) optimization manualtharinduwije
 
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...PerformanceVision (previously SecurActive)
 
Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Duane Bodle
 
измерительное оборудование Ethernet
измерительное оборудование Ethernetизмерительное оборудование Ethernet
измерительное оборудование Etherneteucariot
 
Computer Network Monitoring & Performance
Computer Network Monitoring & PerformanceComputer Network Monitoring & Performance
Computer Network Monitoring & PerformanceDmitry Ponomarenko
 
Ethernet on fpga
Ethernet on fpgaEthernet on fpga
Ethernet on fpgaeucariot
 
Обзор оборудования для построения сетей операторов связи.
Обзор оборудования для построения сетей операторов связи.Обзор оборудования для построения сетей операторов связи.
Обзор оборудования для построения сетей операторов связи.Cisco Russia
 

Viewers also liked (20)

Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
 
Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...
Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...
Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...
 
5 продвинутых технологий VMware, которые нужно знать
5 продвинутых технологий VMware, которые нужно знать5 продвинутых технологий VMware, которые нужно знать
5 продвинутых технологий VMware, которые нужно знать
 
Distributed Network Monitoring - Interopnet class by NetBeez
Distributed Network Monitoring - Interopnet class by NetBeezDistributed Network Monitoring - Interopnet class by NetBeez
Distributed Network Monitoring - Interopnet class by NetBeez
 
Network processing by pid
Network processing by pidNetwork processing by pid
Network processing by pid
 
Архитектура Cisco для сетей мобильного бэкхола.
Архитектура Cisco для сетей мобильного бэкхола.Архитектура Cisco для сетей мобильного бэкхола.
Архитектура Cisco для сетей мобильного бэкхола.
 
Эволюция транспортной инфраструктуры оператора связи: Cisco Carrier Packet Tr...
Эволюция транспортной инфраструктуры оператора связи: Cisco Carrier Packet Tr...Эволюция транспортной инфраструктуры оператора связи: Cisco Carrier Packet Tr...
Эволюция транспортной инфраструктуры оператора связи: Cisco Carrier Packet Tr...
 
Виртуализация в сетях мобильной связи
Виртуализация в сетях мобильной связиВиртуализация в сетях мобильной связи
Виртуализация в сетях мобильной связи
 
Защищаем сеть от DDoS-атак
Защищаем сеть от DDoS-атакЗащищаем сеть от DDoS-атак
Защищаем сеть от DDoS-атак
 
Архитектура Cisco EPN для сетей Carrier Ethernet и Mobile Backhaul
Архитектура Cisco EPN для сетей Carrier Ethernet и Mobile BackhaulАрхитектура Cisco EPN для сетей Carrier Ethernet и Mobile Backhaul
Архитектура Cisco EPN для сетей Carrier Ethernet и Mobile Backhaul
 
DDoS-атаки вчера, сегодня, завтра
DDoS-атаки вчера, сегодня, завтраDDoS-атаки вчера, сегодня, завтра
DDoS-атаки вчера, сегодня, завтра
 
[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring
 
04 gsm bss network kpi (tch call drop rate) optimization manual
04 gsm bss network kpi (tch call drop rate) optimization manual04 gsm bss network kpi (tch call drop rate) optimization manual
04 gsm bss network kpi (tch call drop rate) optimization manual
 
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
 
Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...
 
измерительное оборудование Ethernet
измерительное оборудование Ethernetизмерительное оборудование Ethernet
измерительное оборудование Ethernet
 
Computer Network Monitoring & Performance
Computer Network Monitoring & PerformanceComputer Network Monitoring & Performance
Computer Network Monitoring & Performance
 
Ethernet on fpga
Ethernet on fpgaEthernet on fpga
Ethernet on fpga
 
Обзор оборудования для построения сетей операторов связи.
Обзор оборудования для построения сетей операторов связи.Обзор оборудования для построения сетей операторов связи.
Обзор оборудования для построения сетей операторов связи.
 

Similar to Network tomography to enhance the performance of software defined network monitoring and management

Esri Scotland Conf 2016 SP Energy Networks
Esri Scotland Conf 2016   SP Energy NetworksEsri Scotland Conf 2016   SP Energy Networks
Esri Scotland Conf 2016 SP Energy NetworksEsri UK
 
Rustam Pirmagomedov
Rustam PirmagomedovRustam Pirmagomedov
Rustam PirmagomedovAlexMinov
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETEditor IJCATR
 
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNsA DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNsPriyanka Jacob
 
Odessa Enabling Interactive Perception Applications on Mobile Devices
Odessa Enabling Interactive Perception Applications on Mobile DevicesOdessa Enabling Interactive Perception Applications on Mobile Devices
Odessa Enabling Interactive Perception Applications on Mobile DevicesMiro Cupak
 
Intelligent Routing Algorithm Using Antnet
Intelligent Routing Algorithm Using AntnetIntelligent Routing Algorithm Using Antnet
Intelligent Routing Algorithm Using Antnetijtsrd
 
2009.08 grid peer-slides
2009.08 grid peer-slides2009.08 grid peer-slides
2009.08 grid peer-slidesYehia El-khatib
 
Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetGyan Prakash
 
Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...
Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...
Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...Thiago Genez
 
THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...
THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...
THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...SyafiqahMohamad84
 
Traffic data fusion methodology
Traffic data fusion methodologyTraffic data fusion methodology
Traffic data fusion methodologyJumpingJaq
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
 
Lightweight Routing with QoS Support in Wireless Sensor and Actor Networks (L...
Lightweight Routing with QoS Support in Wireless Sensor and Actor Networks (L...Lightweight Routing with QoS Support in Wireless Sensor and Actor Networks (L...
Lightweight Routing with QoS Support in Wireless Sensor and Actor Networks (L...M. Ilhan Akbas
 
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...ijwmn
 
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...IJECEIAES
 
Clustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow DetectionClustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow DetectionAPNIC
 
Paper id 23201411
Paper id 23201411Paper id 23201411
Paper id 23201411IJRAT
 
Introducing a novel fault tolerant routing protocol in wireless sensor networ...
Introducing a novel fault tolerant routing protocol in wireless sensor networ...Introducing a novel fault tolerant routing protocol in wireless sensor networ...
Introducing a novel fault tolerant routing protocol in wireless sensor networ...ijcsit
 
IRJET- Smart Railway System using Trip Chaining Method
IRJET- Smart Railway System using Trip Chaining MethodIRJET- Smart Railway System using Trip Chaining Method
IRJET- Smart Railway System using Trip Chaining MethodIRJET Journal
 

Similar to Network tomography to enhance the performance of software defined network monitoring and management (20)

Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Esri Scotland Conf 2016 SP Energy Networks
Esri Scotland Conf 2016   SP Energy NetworksEsri Scotland Conf 2016   SP Energy Networks
Esri Scotland Conf 2016 SP Energy Networks
 
Rustam Pirmagomedov
Rustam PirmagomedovRustam Pirmagomedov
Rustam Pirmagomedov
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
 
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNsA DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
 
Odessa Enabling Interactive Perception Applications on Mobile Devices
Odessa Enabling Interactive Perception Applications on Mobile DevicesOdessa Enabling Interactive Perception Applications on Mobile Devices
Odessa Enabling Interactive Perception Applications on Mobile Devices
 
Intelligent Routing Algorithm Using Antnet
Intelligent Routing Algorithm Using AntnetIntelligent Routing Algorithm Using Antnet
Intelligent Routing Algorithm Using Antnet
 
2009.08 grid peer-slides
2009.08 grid peer-slides2009.08 grid peer-slides
2009.08 grid peer-slides
 
Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes Net
 
Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...
Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...
Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...
 
THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...
THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...
THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...
 
Traffic data fusion methodology
Traffic data fusion methodologyTraffic data fusion methodology
Traffic data fusion methodology
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
Lightweight Routing with QoS Support in Wireless Sensor and Actor Networks (L...
Lightweight Routing with QoS Support in Wireless Sensor and Actor Networks (L...Lightweight Routing with QoS Support in Wireless Sensor and Actor Networks (L...
Lightweight Routing with QoS Support in Wireless Sensor and Actor Networks (L...
 
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
 
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
 
Clustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow DetectionClustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow Detection
 
Paper id 23201411
Paper id 23201411Paper id 23201411
Paper id 23201411
 
Introducing a novel fault tolerant routing protocol in wireless sensor networ...
Introducing a novel fault tolerant routing protocol in wireless sensor networ...Introducing a novel fault tolerant routing protocol in wireless sensor networ...
Introducing a novel fault tolerant routing protocol in wireless sensor networ...
 
IRJET- Smart Railway System using Trip Chaining Method
IRJET- Smart Railway System using Trip Chaining MethodIRJET- Smart Railway System using Trip Chaining Method
IRJET- Smart Railway System using Trip Chaining Method
 

More from Sabidur Rahman

Smart city- services and technologies
Smart city- services and technologiesSmart city- services and technologies
Smart city- services and technologiesSabidur Rahman
 
Blockchain technology and its’ usecases in computer networks
Blockchain technology and its’ usecases in computer networksBlockchain technology and its’ usecases in computer networks
Blockchain technology and its’ usecases in computer networksSabidur Rahman
 
T-SDN Controllers for Transport Network
T-SDN Controllers for Transport NetworkT-SDN Controllers for Transport Network
T-SDN Controllers for Transport NetworkSabidur Rahman
 
5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewed5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewedSabidur Rahman
 
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...Sabidur Rahman
 
Akamai Edge 2017 reviewed
Akamai Edge 2017 reviewedAkamai Edge 2017 reviewed
Akamai Edge 2017 reviewedSabidur Rahman
 
Understanding mobile service usage and user behavior pattern for mec resource...
Understanding mobile service usage and user behavior pattern for mec resource...Understanding mobile service usage and user behavior pattern for mec resource...
Understanding mobile service usage and user behavior pattern for mec resource...Sabidur Rahman
 
Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MECSabidur Rahman
 
Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...Sabidur Rahman
 
Migration of groups of virtual machines in distributed data centers to reduce...
Migration of groups of virtual machines in distributed data centers to reduce...Migration of groups of virtual machines in distributed data centers to reduce...
Migration of groups of virtual machines in distributed data centers to reduce...Sabidur Rahman
 
Big data and machine learning for network research problems
Big data and machine learning for network research problemsBig data and machine learning for network research problems
Big data and machine learning for network research problemsSabidur Rahman
 
Cost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learningCost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learningSabidur Rahman
 
IoT Mobility Forensics
IoT Mobility ForensicsIoT Mobility Forensics
IoT Mobility ForensicsSabidur Rahman
 
Approximation techniques used for general purpose algorithms
Approximation techniques used for general purpose algorithmsApproximation techniques used for general purpose algorithms
Approximation techniques used for general purpose algorithmsSabidur Rahman
 
Computer Security: Worms
Computer Security: WormsComputer Security: Worms
Computer Security: WormsSabidur Rahman
 

More from Sabidur Rahman (15)

Smart city- services and technologies
Smart city- services and technologiesSmart city- services and technologies
Smart city- services and technologies
 
Blockchain technology and its’ usecases in computer networks
Blockchain technology and its’ usecases in computer networksBlockchain technology and its’ usecases in computer networks
Blockchain technology and its’ usecases in computer networks
 
T-SDN Controllers for Transport Network
T-SDN Controllers for Transport NetworkT-SDN Controllers for Transport Network
T-SDN Controllers for Transport Network
 
5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewed5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewed
 
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
 
Akamai Edge 2017 reviewed
Akamai Edge 2017 reviewedAkamai Edge 2017 reviewed
Akamai Edge 2017 reviewed
 
Understanding mobile service usage and user behavior pattern for mec resource...
Understanding mobile service usage and user behavior pattern for mec resource...Understanding mobile service usage and user behavior pattern for mec resource...
Understanding mobile service usage and user behavior pattern for mec resource...
 
Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MEC
 
Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...
 
Migration of groups of virtual machines in distributed data centers to reduce...
Migration of groups of virtual machines in distributed data centers to reduce...Migration of groups of virtual machines in distributed data centers to reduce...
Migration of groups of virtual machines in distributed data centers to reduce...
 
Big data and machine learning for network research problems
Big data and machine learning for network research problemsBig data and machine learning for network research problems
Big data and machine learning for network research problems
 
Cost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learningCost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learning
 
IoT Mobility Forensics
IoT Mobility ForensicsIoT Mobility Forensics
IoT Mobility Forensics
 
Approximation techniques used for general purpose algorithms
Approximation techniques used for general purpose algorithmsApproximation techniques used for general purpose algorithms
Approximation techniques used for general purpose algorithms
 
Computer Security: Worms
Computer Security: WormsComputer Security: Worms
Computer Security: Worms
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Network tomography to enhance the performance of software defined network monitoring and management