SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
A Geometric Approach to Improving Active Packet Loss Measurement
Institute of Electrical and Electronics Engineering
Abstract:
Measurement and estimation of packet loss characteristics are challenging due to the relatively rare
occurrence and typically short duration of packet loss episodes. While active probe tools are commonly
used to measure packet loss on end-to-end paths, there has been little analysis of the accuracy of these
tools or their impact on the network. The objective of our study is to understand how to measure packet
loss episodes accurately with end-to-end probes. We begin by testing the capability of standard Poisson-
modulated end-to-end measurements of loss in a controlled laboratory environment using IP routers
and commodity end hosts. Our tests show that loss characteristics reported from such Poisson-
modulated probe tools can be quite inaccurate over a range of traffic conditions. Motivated by these
observations, we introduce a new algorithm for packet loss measurement that is designed to overcome
the deficiencies in standard Poisson-based tools. Specifically, our method entails probe experiments that
follow a geometric distribution to 1) enable an explicit trade-off between accuracy and impact on the
network, and 2) enable more accurate measurements than standard Poisson probing at the same rate.
We evaluate the capabilities of our methodology experimentally by developing and implementing a
prototype tool, called BADABING. The experiments demonstrate the trade-offs between impact on the
network and measurement accuracy. We show that BADABING reports loss characteristics far more
accurately than traditional loss measurement tools.
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
System Architecture
TECHNIQUE USED:
Poisson modulated process
We begin by using our capabilities to evaluate the simple Poisson-modulated loss probe measurements
using the ZING tool. ZING measures packet loss in one direction on an end-to-end path. The ZING sender
emits packets at Poisson-modulated intervals with timestamps and unique sequence numbers and the
receiver logs the probe packet arrivals. We specify the mean probe rate, the probe packet size, and the
number of packets in a “flight.”
BADABING
Moreover, simple techniques allows us to validate the measurement output are introduced. We
implemented this method in a new tool, BADABING, which we tested in our laboratory. Our tests
demonstrate that BADABING, in most cases, accurately estimates loss frequencies and durations over a
range of cross traffic conditions. For the same overall packet rate, our results show that BADABING is
significantly more accurate than Poisson probing for measuring loss episode characteristics.
Our methodology involves dispatching a sequence of probes, each consisting of one or more very closely
spaced packets. The aim of a probe is to obtain a snapshot of the state of the network at the instant of
A Geometric Approach to Improving Active Packet Loss Measurement
File Loading Receiving
Packets from
Sender
Receiving
Packets from
Queue
Packet
Separation
Sending Packets
to Queue
Creating Packet
loss
Sending Packets
to Receiver
Packet loss
Measurement
Calculations
Result
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
probing. As such, the record for each probe indicates whether or not it encountered a loss episode, as
evidenced by either the loss or sufficient delay of any of the packets within a probe.
The probes themselves are organized into what we term basic experiments, each of which comprises a
number of packets sent in rapid succession. The aim of the basic experiment is to determine the
dynamics of transitions between the congested and un-congested state of the network, i.e., beginnings
and endings of loss episodes. Below we show how this enables us to estimate the duration of loss
episodes.
A full experiment comprises a sequence of basic experiments generated according to some rule. The
sequence may be terminated after some specified number of basic experiments, or after a given
duration, or in an open-ended adaptive fashion, e.g., until estimates of desired accuracy for a loss
characteristic have been obtained, or until such accuracy is determined impossible.
Advantages:
The advantage of our study is to understand how to accurately measure loss characteristics on end-to-
end paths with probes. We are interested in two specific characteristics of packet loss: loss episode
frequency, and loss episode duration. Thus we improve the accuracy in measuring the packet loss. This
is the major advantage of our work.
Applications:
We can measure the packet loss more accurately than before. Thus we can find the networks
performance by calculating the packet loss. By finding the networks performance we can use the
network according to our needs. Thus we can evaluate the network performance by calculating the
packet loss. We can measure packet loss in military networks, hospital networks, etc. These kind of
networks transfers more important data, thus its performance should be high. So the measurement of
packet loss should be negligible or nothing.
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
Sender’s Side
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
Conclusion:
In this paper, we have studied the problem of combating Internet worms. To that end, we have
developed a branching process model to characterize the propagation of Internet worms. Unlike
deterministic epidemic models studied in the literature, this model allows us to characterize the early
phase of worm propagation. Using the branching process model, we are able to provide a precise bound
M on the total number of scans that ensure that the worm will eventually die out. Further, from our
model, we also obtain the probability that the total number of hosts that the worm infects is below a
certain level, as a function of the scan limit. The insights gained from analyzing this model also allow us
to develop an effective and automatic worm containment strategy that does not let the worm
propagate beyond the early stages of infection. Our strategy can effectively contain both fast scan
worms and slow scan worms without knowing the worm signature in advance or needing to explicitly
Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
detect the worm. We show via simulations and real trace data that the containment strategy is both
effective and non-intrusive.

Contenu connexe

Similaire à A geometric approach to improving active packet loss measurement

Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetGyan Prakash
 
Catching packet droppers and modifiers
Catching packet droppers and modifiersCatching packet droppers and modifiers
Catching packet droppers and modifiersIMPULSE_TECHNOLOGY
 
Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 2   50+ AbstNcct   Ieee Software Abstract Collection Volume 2   50+ Abst
Ncct Ieee Software Abstract Collection Volume 2 50+ Abstncct
 
Anomalous payload based network intrusion detection
Anomalous payload based network intrusion detectionAnomalous payload based network intrusion detection
Anomalous payload based network intrusion detectionUltraUploader
 
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...IRJET Journal
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java ProjectsVijay Karan
 
Enhanced DV Hop Localization Algorithm for Wireless Sensor Networks
Enhanced DV Hop Localization Algorithm for Wireless Sensor NetworksEnhanced DV Hop Localization Algorithm for Wireless Sensor Networks
Enhanced DV Hop Localization Algorithm for Wireless Sensor Networksijtsrd
 
Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance csandit
 
презентация за варшава
презентация за варшавапрезентация за варшава
презентация за варшаваValeriya Simeonova
 
Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17redpel dot com
 
Data mining projects topics for java and dot net
Data mining projects topics for java and dot netData mining projects topics for java and dot net
Data mining projects topics for java and dot netredpel dot com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...IJNSA Journal
 
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...IJNSA Journal
 
Neural Network Based Individual Classification System
Neural Network Based Individual Classification SystemNeural Network Based Individual Classification System
Neural Network Based Individual Classification SystemIRJET Journal
 
Principle Component Analysis for Classification of the Quality of Aromatic Rice
Principle Component Analysis for Classification of the Quality of Aromatic RicePrinciple Component Analysis for Classification of the Quality of Aromatic Rice
Principle Component Analysis for Classification of the Quality of Aromatic RiceIJCSIS Research Publications
 
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor NetworksEfficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor Networkspaperpublications3
 
EEG Classification using Semi Supervised Learning
EEG Classification using Semi Supervised LearningEEG Classification using Semi Supervised Learning
EEG Classification using Semi Supervised Learningijtsrd
 
Top Cited Articles in Signal & Image Processing 2021-2022
Top Cited Articles in Signal & Image Processing 2021-2022Top Cited Articles in Signal & Image Processing 2021-2022
Top Cited Articles in Signal & Image Processing 2021-2022sipij
 

Similaire à A geometric approach to improving active packet loss measurement (20)

Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes Net
 
Catching packet droppers and modifiers
Catching packet droppers and modifiersCatching packet droppers and modifiers
Catching packet droppers and modifiers
 
Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 2   50+ AbstNcct   Ieee Software Abstract Collection Volume 2   50+ Abst
Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
 
Anomalous payload based network intrusion detection
Anomalous payload based network intrusion detectionAnomalous payload based network intrusion detection
Anomalous payload based network intrusion detection
 
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
Saliency Based Hookworm and Infection Detection for Wireless Capsule Endoscop...
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java Projects
 
Enhanced DV Hop Localization Algorithm for Wireless Sensor Networks
Enhanced DV Hop Localization Algorithm for Wireless Sensor NetworksEnhanced DV Hop Localization Algorithm for Wireless Sensor Networks
Enhanced DV Hop Localization Algorithm for Wireless Sensor Networks
 
Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance
 
презентация за варшава
презентация за варшавапрезентация за варшава
презентация за варшава
 
Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17
 
Data mining projects topics for java and dot net
Data mining projects topics for java and dot netData mining projects topics for java and dot net
Data mining projects topics for java and dot net
 
M41028892
M41028892M41028892
M41028892
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
 
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
 
Neural Network Based Individual Classification System
Neural Network Based Individual Classification SystemNeural Network Based Individual Classification System
Neural Network Based Individual Classification System
 
Principle Component Analysis for Classification of the Quality of Aromatic Rice
Principle Component Analysis for Classification of the Quality of Aromatic RicePrinciple Component Analysis for Classification of the Quality of Aromatic Rice
Principle Component Analysis for Classification of the Quality of Aromatic Rice
 
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor NetworksEfficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
 
EEG Classification using Semi Supervised Learning
EEG Classification using Semi Supervised LearningEEG Classification using Semi Supervised Learning
EEG Classification using Semi Supervised Learning
 
Top Cited Articles in Signal & Image Processing 2021-2022
Top Cited Articles in Signal & Image Processing 2021-2022Top Cited Articles in Signal & Image Processing 2021-2022
Top Cited Articles in Signal & Image Processing 2021-2022
 

Plus de Harshal Ladhe

RGB Image Compression using Two-dimensional Discrete Cosine Transform
RGB Image Compression using Two-dimensional Discrete Cosine TransformRGB Image Compression using Two-dimensional Discrete Cosine Transform
RGB Image Compression using Two-dimensional Discrete Cosine TransformHarshal Ladhe
 
A robust watermarking algorithm based on image normalization and dc coefficients
A robust watermarking algorithm based on image normalization and dc coefficientsA robust watermarking algorithm based on image normalization and dc coefficients
A robust watermarking algorithm based on image normalization and dc coefficientsHarshal Ladhe
 
Image compression using discrete wavelet transform
Image compression using discrete wavelet transformImage compression using discrete wavelet transform
Image compression using discrete wavelet transformHarshal Ladhe
 
Adaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancementAdaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancementHarshal Ladhe
 
Bilateral filtering for gray and color images
Bilateral filtering for gray and color imagesBilateral filtering for gray and color images
Bilateral filtering for gray and color imagesHarshal Ladhe
 
Phase locked loop techniques for fm demodulation and modulation
Phase locked loop techniques for fm demodulation and modulationPhase locked loop techniques for fm demodulation and modulation
Phase locked loop techniques for fm demodulation and modulationHarshal Ladhe
 
Design of iir notch filters and narrow and wide band filters
Design of iir notch filters and narrow and wide band filtersDesign of iir notch filters and narrow and wide band filters
Design of iir notch filters and narrow and wide band filtersHarshal Ladhe
 
Genetic algorithm for the design of optimal iir digital filters
Genetic algorithm for the design of optimal iir digital filtersGenetic algorithm for the design of optimal iir digital filters
Genetic algorithm for the design of optimal iir digital filtersHarshal Ladhe
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksHarshal Ladhe
 
Study & simulation of O.F.D.M. system
Study & simulation of O.F.D.M. systemStudy & simulation of O.F.D.M. system
Study & simulation of O.F.D.M. systemHarshal Ladhe
 
A simulation and analysis of ofdm system for 4 g communications
A simulation and analysis of ofdm system for 4 g communicationsA simulation and analysis of ofdm system for 4 g communications
A simulation and analysis of ofdm system for 4 g communicationsHarshal Ladhe
 
Speech compression using voiced excited loosy predictive coding (lpc)
Speech compression using voiced excited loosy predictive coding (lpc)Speech compression using voiced excited loosy predictive coding (lpc)
Speech compression using voiced excited loosy predictive coding (lpc)Harshal Ladhe
 
Speech compression using loosy predictive coding (lpc)
Speech compression using loosy predictive coding (lpc)Speech compression using loosy predictive coding (lpc)
Speech compression using loosy predictive coding (lpc)Harshal Ladhe
 
Noise analysis & qrs detection in ecg signals
Noise analysis & qrs detection in ecg signalsNoise analysis & qrs detection in ecg signals
Noise analysis & qrs detection in ecg signalsHarshal Ladhe
 

Plus de Harshal Ladhe (15)

RGB Image Compression using Two-dimensional Discrete Cosine Transform
RGB Image Compression using Two-dimensional Discrete Cosine TransformRGB Image Compression using Two-dimensional Discrete Cosine Transform
RGB Image Compression using Two-dimensional Discrete Cosine Transform
 
A robust watermarking algorithm based on image normalization and dc coefficients
A robust watermarking algorithm based on image normalization and dc coefficientsA robust watermarking algorithm based on image normalization and dc coefficients
A robust watermarking algorithm based on image normalization and dc coefficients
 
Image compression using discrete wavelet transform
Image compression using discrete wavelet transformImage compression using discrete wavelet transform
Image compression using discrete wavelet transform
 
Adaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancementAdaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancement
 
Bilateral filtering for gray and color images
Bilateral filtering for gray and color imagesBilateral filtering for gray and color images
Bilateral filtering for gray and color images
 
Phase locked loop techniques for fm demodulation and modulation
Phase locked loop techniques for fm demodulation and modulationPhase locked loop techniques for fm demodulation and modulation
Phase locked loop techniques for fm demodulation and modulation
 
Design of iir notch filters and narrow and wide band filters
Design of iir notch filters and narrow and wide band filtersDesign of iir notch filters and narrow and wide band filters
Design of iir notch filters and narrow and wide band filters
 
Genetic algorithm for the design of optimal iir digital filters
Genetic algorithm for the design of optimal iir digital filtersGenetic algorithm for the design of optimal iir digital filters
Genetic algorithm for the design of optimal iir digital filters
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
 
Study & simulation of O.F.D.M. system
Study & simulation of O.F.D.M. systemStudy & simulation of O.F.D.M. system
Study & simulation of O.F.D.M. system
 
A simulation and analysis of ofdm system for 4 g communications
A simulation and analysis of ofdm system for 4 g communicationsA simulation and analysis of ofdm system for 4 g communications
A simulation and analysis of ofdm system for 4 g communications
 
Speech compression using voiced excited loosy predictive coding (lpc)
Speech compression using voiced excited loosy predictive coding (lpc)Speech compression using voiced excited loosy predictive coding (lpc)
Speech compression using voiced excited loosy predictive coding (lpc)
 
Speech compression using loosy predictive coding (lpc)
Speech compression using loosy predictive coding (lpc)Speech compression using loosy predictive coding (lpc)
Speech compression using loosy predictive coding (lpc)
 
Noise analysis & qrs detection in ecg signals
Noise analysis & qrs detection in ecg signalsNoise analysis & qrs detection in ecg signals
Noise analysis & qrs detection in ecg signals
 
GIS
GISGIS
GIS
 

Dernier

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 

Dernier (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 

A geometric approach to improving active packet loss measurement

  • 1. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413 A Geometric Approach to Improving Active Packet Loss Measurement Institute of Electrical and Electronics Engineering Abstract: Measurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. While active probe tools are commonly used to measure packet loss on end-to-end paths, there has been little analysis of the accuracy of these tools or their impact on the network. The objective of our study is to understand how to measure packet loss episodes accurately with end-to-end probes. We begin by testing the capability of standard Poisson- modulated end-to-end measurements of loss in a controlled laboratory environment using IP routers and commodity end hosts. Our tests show that loss characteristics reported from such Poisson- modulated probe tools can be quite inaccurate over a range of traffic conditions. Motivated by these observations, we introduce a new algorithm for packet loss measurement that is designed to overcome the deficiencies in standard Poisson-based tools. Specifically, our method entails probe experiments that follow a geometric distribution to 1) enable an explicit trade-off between accuracy and impact on the network, and 2) enable more accurate measurements than standard Poisson probing at the same rate. We evaluate the capabilities of our methodology experimentally by developing and implementing a prototype tool, called BADABING. The experiments demonstrate the trade-offs between impact on the network and measurement accuracy. We show that BADABING reports loss characteristics far more accurately than traditional loss measurement tools.
  • 2. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413 System Architecture TECHNIQUE USED: Poisson modulated process We begin by using our capabilities to evaluate the simple Poisson-modulated loss probe measurements using the ZING tool. ZING measures packet loss in one direction on an end-to-end path. The ZING sender emits packets at Poisson-modulated intervals with timestamps and unique sequence numbers and the receiver logs the probe packet arrivals. We specify the mean probe rate, the probe packet size, and the number of packets in a “flight.” BADABING Moreover, simple techniques allows us to validate the measurement output are introduced. We implemented this method in a new tool, BADABING, which we tested in our laboratory. Our tests demonstrate that BADABING, in most cases, accurately estimates loss frequencies and durations over a range of cross traffic conditions. For the same overall packet rate, our results show that BADABING is significantly more accurate than Poisson probing for measuring loss episode characteristics. Our methodology involves dispatching a sequence of probes, each consisting of one or more very closely spaced packets. The aim of a probe is to obtain a snapshot of the state of the network at the instant of A Geometric Approach to Improving Active Packet Loss Measurement File Loading Receiving Packets from Sender Receiving Packets from Queue Packet Separation Sending Packets to Queue Creating Packet loss Sending Packets to Receiver Packet loss Measurement Calculations Result
  • 3. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413 probing. As such, the record for each probe indicates whether or not it encountered a loss episode, as evidenced by either the loss or sufficient delay of any of the packets within a probe. The probes themselves are organized into what we term basic experiments, each of which comprises a number of packets sent in rapid succession. The aim of the basic experiment is to determine the dynamics of transitions between the congested and un-congested state of the network, i.e., beginnings and endings of loss episodes. Below we show how this enables us to estimate the duration of loss episodes. A full experiment comprises a sequence of basic experiments generated according to some rule. The sequence may be terminated after some specified number of basic experiments, or after a given duration, or in an open-ended adaptive fashion, e.g., until estimates of desired accuracy for a loss characteristic have been obtained, or until such accuracy is determined impossible. Advantages: The advantage of our study is to understand how to accurately measure loss characteristics on end-to- end paths with probes. We are interested in two specific characteristics of packet loss: loss episode frequency, and loss episode duration. Thus we improve the accuracy in measuring the packet loss. This is the major advantage of our work. Applications: We can measure the packet loss more accurately than before. Thus we can find the networks performance by calculating the packet loss. By finding the networks performance we can use the network according to our needs. Thus we can evaluate the network performance by calculating the packet loss. We can measure packet loss in military networks, hospital networks, etc. These kind of networks transfers more important data, thus its performance should be high. So the measurement of packet loss should be negligible or nothing.
  • 4. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413 Sender’s Side
  • 5. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
  • 6. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413
  • 7. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413 Conclusion: In this paper, we have studied the problem of combating Internet worms. To that end, we have developed a branching process model to characterize the propagation of Internet worms. Unlike deterministic epidemic models studied in the literature, this model allows us to characterize the early phase of worm propagation. Using the branching process model, we are able to provide a precise bound M on the total number of scans that ensure that the worm will eventually die out. Further, from our model, we also obtain the probability that the total number of hosts that the worm infects is below a certain level, as a function of the scan limit. The insights gained from analyzing this model also allow us to develop an effective and automatic worm containment strategy that does not let the worm propagate beyond the early stages of infection. Our strategy can effectively contain both fast scan worms and slow scan worms without knowing the worm signature in advance or needing to explicitly
  • 8. Base paper: - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4456413 detect the worm. We show via simulations and real trace data that the containment strategy is both effective and non-intrusive.