SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Municipal Colony, Gandhinagar, Katpadi, Tamil Nadu 632006
Phone:0416 606 6663
ON QUALITY OF MONITORING FOR MULTI-CHANNEL WIRELESS
INFRASTRUCTURE NETWORKS
ABSTRACT:
Passive monitoring utilizing distributed wireless sniffers is an effective technique to
monitor activities in wireless infrastructure networks for fault diagnosis, resource management
and critical path analysis. In this paper, we introduce a quality of monitoring (QoM) metric
defined by the expected number of active users monitored, and investigate the problem of
maximizing QoM by judiciously assigning sniffers to channels based on the knowledge of user
activities in a multi-channel wireless network. Two types of capture models are considered. The
user-centric model assumes frame-level capturing capability of sniffers such that the activities of
different users can be distinguished while the sniffer-centric model only utilizes the binary
channel information (active or not) at a sniffer. For the user-centric model, we show that the
implied optimization problem is NP-hard, but a constant approximation ratio can be attained via
polynomial complexity algorithms. For the sniffer-centric model, we devise stochastic inference
schemes to transform the problem into the user-centric domain, where we are able to apply our
polynomial approximation algorithms. The effectiveness of our proposed schemes and
algorithms is further evaluated using both synthetic data as well as real-world traces from an
operational WLAN.
Municipal Colony, Gandhinagar, Katpadi, Tamil Nadu 632006
Phone:0416 606 6663
EXISTING SYSTEM
There has been much work done on wireless monitoring from a system-level approach, in
an attempt to design complete systems, and address the interactions among the components of
such systems. The work uses AP, SNMP logs, and wired side traces to analyze Wi-Fi traffic
characteristics.
DISADVANTAGES OF EXISTING SYSTEM:
 Ideally, a network administrator would want to perform network monitoring on all
channels simultaneously. However, multi-radio sniffers are known to be large and
expensive to deploy.
 The basic problem underlying all of our models can be cast as finding an assignment of
sniffers to channels so as to maximize the QoM.
 The problem of sniffer assignment, in an attempt to maximize the QoM metric, is further
complicated by the dynamics of real-life systems such as: 1) the user population changes
over time (churn), 2) activities of a single user is dynamic, and 3) connectivity between
users and sniffers may vary due to changes in channel conditions or mobility.
PROPOSED SYSTEM:
In this paper, we focus on designing algorithms that aim at maximizing the QoM metric
with different granularities of a priori knowledge. The usage patterns are assumed to be
stationary during the decision period. We make the following contributions toward the design of
passive monitoring systems for multi-channel wireless infrastructure networks. We provide a
formal model for evaluating the quality of monitoring. We study two categories of monitoring
models that differ in the information capturing capability of passive monitoring systems. For
each of these models we provide algorithms and methods that optimize the quality of monitoring.
We unravel interactions between the two monitoring models by devising two methods to convert
Municipal Colony, Gandhinagar, Katpadi, Tamil Nadu 632006
Phone:0416 606 6663
the sniffer-centric model to the user-centric domain by exploiting the stochastic properties of
underlying user processes
ADVANTAGES OF PROPOSED SYSTEM:
The first approach, Quantized Linear ICA (QLICA), estimates the hidden structure by
applying a quantization process on the outcome of the traditional ICA, while the second
approach, Binary ICA (BICA), decomposes the observation data into OR mixtures of hidden
components and recovers the underlying structure. Finally, an extensive evaluation study is
carried out using both synthetic data as well as real-world traces from an operational WLAN.
HARDWARE & SOFTWARE REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Color.
 Mouse : Logitech.
 Ram : 512 MB.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP Professional.
 Coding Language : C#.NET
Municipal Colony, Gandhinagar, Katpadi, Tamil Nadu 632006
Phone:0416 606 6663
REFERENCE:
Hay Nguyen, Gabriel Scalosub and Rong Zheng,Senior Member, IEEE “On Quality of
Monitoring for Multi-channel Wireless Infrastructure Networks”- IEEE TRANSACTIONS ON
MOBILE COMPUTING, 2013.

Contenu connexe

Tendances

Hybrid nearest neighbour and feed forward neural networks algorithm for indoo...
Hybrid nearest neighbour and feed forward neural networks algorithm for indoo...Hybrid nearest neighbour and feed forward neural networks algorithm for indoo...
Hybrid nearest neighbour and feed forward neural networks algorithm for indoo...
Conference Papers
 
Handover Microsoft
Handover MicrosoftHandover Microsoft
Handover Microsoft
odcsss08
 
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
cscpconf
 

Tendances (19)

Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio NetworksMobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
 
Random broadcast based distributed consensus clock synchronization for mobile...
Random broadcast based distributed consensus clock synchronization for mobile...Random broadcast based distributed consensus clock synchronization for mobile...
Random broadcast based distributed consensus clock synchronization for mobile...
 
Hybrid nearest neighbour and feed forward neural networks algorithm for indoo...
Hybrid nearest neighbour and feed forward neural networks algorithm for indoo...Hybrid nearest neighbour and feed forward neural networks algorithm for indoo...
Hybrid nearest neighbour and feed forward neural networks algorithm for indoo...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
 
2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract
 
A fuzzy congestion controller to detect and balance congestion in wsn
A fuzzy congestion controller to detect and balance congestion in wsnA fuzzy congestion controller to detect and balance congestion in wsn
A fuzzy congestion controller to detect and balance congestion in wsn
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A historical beacon-aided localization algorithm for mobile sensor networks
A historical beacon-aided localization algorithm for mobile sensor networks A historical beacon-aided localization algorithm for mobile sensor networks
A historical beacon-aided localization algorithm for mobile sensor networks
 
ENSEIRB - Advanced Project
ENSEIRB - Advanced ProjectENSEIRB - Advanced Project
ENSEIRB - Advanced Project
 
Handover Microsoft
Handover MicrosoftHandover Microsoft
Handover Microsoft
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
 
C0361011014
C0361011014C0361011014
C0361011014
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
 
Implementation of a bpsk modulation based cognitive radio system using the en...
Implementation of a bpsk modulation based cognitive radio system using the en...Implementation of a bpsk modulation based cognitive radio system using the en...
Implementation of a bpsk modulation based cognitive radio system using the en...
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication Projects
 
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication Projects
 

En vedette

PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITESPRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
Shakas Technologies
 
Organizational ethnography mefe 2013 v2
Organizational ethnography mefe 2013 v2Organizational ethnography mefe 2013 v2
Organizational ethnography mefe 2013 v2
Shaheen Aftab
 
Wedding tourism in india
Wedding tourism in indiaWedding tourism in india
Wedding tourism in india
Saumyadip Maiti
 
Digital graphics evaluation pro forma (not done)
Digital graphics evaluation pro forma (not done)Digital graphics evaluation pro forma (not done)
Digital graphics evaluation pro forma (not done)
toby96
 

En vedette (18)

Cloud computing march 2015
Cloud computing   march 2015Cloud computing   march 2015
Cloud computing march 2015
 
My_resume
My_resumeMy_resume
My_resume
 
BIK-1809_FeaturesInsert_V3
BIK-1809_FeaturesInsert_V3BIK-1809_FeaturesInsert_V3
BIK-1809_FeaturesInsert_V3
 
MATERI TIK KELAS XI
MATERI TIK KELAS XIMATERI TIK KELAS XI
MATERI TIK KELAS XI
 
Aparnna ppt
Aparnna pptAparnna ppt
Aparnna ppt
 
Oikeusministeriön sähköiset demokratiapalvelut
Oikeusministeriön sähköiset demokratiapalvelutOikeusministeriön sähköiset demokratiapalvelut
Oikeusministeriön sähköiset demokratiapalvelut
 
Sarojkumar cv
Sarojkumar cvSarojkumar cv
Sarojkumar cv
 
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITESPRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
 
Pp
PpPp
Pp
 
Baltijos šalių mažmeninė prekyba: iššūkiai ir galimybės. Jekaterina Rojaka
Baltijos šalių mažmeninė prekyba: iššūkiai ir galimybės. Jekaterina RojakaBaltijos šalių mažmeninė prekyba: iššūkiai ir galimybės. Jekaterina Rojaka
Baltijos šalių mažmeninė prekyba: iššūkiai ir galimybės. Jekaterina Rojaka
 
Mikrobiologi ppt
Mikrobiologi pptMikrobiologi ppt
Mikrobiologi ppt
 
Organizational ethnography mefe 2013 v2
Organizational ethnography mefe 2013 v2Organizational ethnography mefe 2013 v2
Organizational ethnography mefe 2013 v2
 
Wedding tourism in india
Wedding tourism in indiaWedding tourism in india
Wedding tourism in india
 
Mughal architecture
Mughal architectureMughal architecture
Mughal architecture
 
Contratos Internacionales
Contratos InternacionalesContratos Internacionales
Contratos Internacionales
 
Tomorrowland Presentation
Tomorrowland PresentationTomorrowland Presentation
Tomorrowland Presentation
 
Digital graphics evaluation pro forma (not done)
Digital graphics evaluation pro forma (not done)Digital graphics evaluation pro forma (not done)
Digital graphics evaluation pro forma (not done)
 
Mandav
MandavMandav
Mandav
 

Similaire à On quality of monitoring for multi channel wireless

MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
ijwmn
 
Paper id 23201411
Paper id 23201411Paper id 23201411
Paper id 23201411
IJRAT
 
Final year project list for the year 2012
Final year project list for the year 2012Final year project list for the year 2012
Final year project list for the year 2012
Muhammad Farhan
 
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
IJCNCJournal
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
ijtsrd
 

Similaire à On quality of monitoring for multi channel wireless (20)

Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
 
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
 
Paper id 23201411
Paper id 23201411Paper id 23201411
Paper id 23201411
 
JPN1402 A Study on False Channel Condition Reporting Attacks in Wireless Ne...
JPN1402   A Study on False Channel Condition Reporting Attacks in Wireless Ne...JPN1402   A Study on False Channel Condition Reporting Attacks in Wireless Ne...
JPN1402 A Study on False Channel Condition Reporting Attacks in Wireless Ne...
 
IEEE Mobile computing Title and Abstract 2016
IEEE Mobile computing Title and Abstract 2016 IEEE Mobile computing Title and Abstract 2016
IEEE Mobile computing Title and Abstract 2016
 
Matlab 2013 14 papers astract
Matlab 2013 14 papers astractMatlab 2013 14 papers astract
Matlab 2013 14 papers astract
 
PhD Thesis Network Simulator Projects
PhD Thesis Network Simulator ProjectsPhD Thesis Network Simulator Projects
PhD Thesis Network Simulator Projects
 
Final year project list for the year 2012
Final year project list for the year 2012Final year project list for the year 2012
Final year project list for the year 2012
 
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
 
A Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSNA Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSN
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach to
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
 
WSN-Proposal
WSN-ProposalWSN-Proposal
WSN-Proposal
 
Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes Net
 
Paper id 26201429
Paper id 26201429Paper id 26201429
Paper id 26201429
 

Plus de Shakas Technologies

Plus de Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Dernier

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Dernier (20)

SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 

On quality of monitoring for multi channel wireless

  • 1. Municipal Colony, Gandhinagar, Katpadi, Tamil Nadu 632006 Phone:0416 606 6663 ON QUALITY OF MONITORING FOR MULTI-CHANNEL WIRELESS INFRASTRUCTURE NETWORKS ABSTRACT: Passive monitoring utilizing distributed wireless sniffers is an effective technique to monitor activities in wireless infrastructure networks for fault diagnosis, resource management and critical path analysis. In this paper, we introduce a quality of monitoring (QoM) metric defined by the expected number of active users monitored, and investigate the problem of maximizing QoM by judiciously assigning sniffers to channels based on the knowledge of user activities in a multi-channel wireless network. Two types of capture models are considered. The user-centric model assumes frame-level capturing capability of sniffers such that the activities of different users can be distinguished while the sniffer-centric model only utilizes the binary channel information (active or not) at a sniffer. For the user-centric model, we show that the implied optimization problem is NP-hard, but a constant approximation ratio can be attained via polynomial complexity algorithms. For the sniffer-centric model, we devise stochastic inference schemes to transform the problem into the user-centric domain, where we are able to apply our polynomial approximation algorithms. The effectiveness of our proposed schemes and algorithms is further evaluated using both synthetic data as well as real-world traces from an operational WLAN.
  • 2. Municipal Colony, Gandhinagar, Katpadi, Tamil Nadu 632006 Phone:0416 606 6663 EXISTING SYSTEM There has been much work done on wireless monitoring from a system-level approach, in an attempt to design complete systems, and address the interactions among the components of such systems. The work uses AP, SNMP logs, and wired side traces to analyze Wi-Fi traffic characteristics. DISADVANTAGES OF EXISTING SYSTEM:  Ideally, a network administrator would want to perform network monitoring on all channels simultaneously. However, multi-radio sniffers are known to be large and expensive to deploy.  The basic problem underlying all of our models can be cast as finding an assignment of sniffers to channels so as to maximize the QoM.  The problem of sniffer assignment, in an attempt to maximize the QoM metric, is further complicated by the dynamics of real-life systems such as: 1) the user population changes over time (churn), 2) activities of a single user is dynamic, and 3) connectivity between users and sniffers may vary due to changes in channel conditions or mobility. PROPOSED SYSTEM: In this paper, we focus on designing algorithms that aim at maximizing the QoM metric with different granularities of a priori knowledge. The usage patterns are assumed to be stationary during the decision period. We make the following contributions toward the design of passive monitoring systems for multi-channel wireless infrastructure networks. We provide a formal model for evaluating the quality of monitoring. We study two categories of monitoring models that differ in the information capturing capability of passive monitoring systems. For each of these models we provide algorithms and methods that optimize the quality of monitoring. We unravel interactions between the two monitoring models by devising two methods to convert
  • 3. Municipal Colony, Gandhinagar, Katpadi, Tamil Nadu 632006 Phone:0416 606 6663 the sniffer-centric model to the user-centric domain by exploiting the stochastic properties of underlying user processes ADVANTAGES OF PROPOSED SYSTEM: The first approach, Quantized Linear ICA (QLICA), estimates the hidden structure by applying a quantization process on the outcome of the traditional ICA, while the second approach, Binary ICA (BICA), decomposes the observation data into OR mixtures of hidden components and recovers the underlying structure. Finally, an extensive evaluation study is carried out using both synthetic data as well as real-world traces from an operational WLAN. HARDWARE & SOFTWARE REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Color.  Mouse : Logitech.  Ram : 512 MB. SOFTWARE REQUIREMENTS:  Operating system : Windows XP Professional.  Coding Language : C#.NET
  • 4. Municipal Colony, Gandhinagar, Katpadi, Tamil Nadu 632006 Phone:0416 606 6663 REFERENCE: Hay Nguyen, Gabriel Scalosub and Rong Zheng,Senior Member, IEEE “On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks”- IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013.