ABSTRACT
Measurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. While active probe tools are commonly used to measure packet loss on end-to-end paths, there has been little analysis of the accuracy of these tools or their impact on the network. The objective of our study is to understand how to measure packet loss episodes accurately with end-to-end probes. We begin by testing the capability of standard Poisson- modulated end-to-end measurements of loss in a controlled laboratory environment using IP routers and commodity end hosts. Our tests show that loss characteristics reported from such Poisson-modulated probe tools can be quite inaccurate over a range of traffic conditions. Motivated by these observations, we introduce a new algorithm for packet loss measurement that is designed to overcome the deficiencies in standard Poisson-based tools. Specifically, our method entails probe experiments that follow a geometric distribution to 1) enable an explicit trade-off between accuracy and impact on the network, and 2) enable more accurate measurements than standard Poisson probing at the same rate. We evaluate the capabilities of our methodology experimentally by developing and implementing a prototype tool, called BADABING. The experiments demonstrate the trade-offs between impact on the network and measurement accuracy. We show that BADABING reports loss characteristics far more accurately than traditional loss measurement tools.
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE OF THE STUDY
1.5 LIMITATIONS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODOLOGY FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM MATTER
CHAPTER FOUR
4.0 THE FUTURES, IMPLICATIONS AND CHALLENGES OF THE SUBJECT MATTER FOR THE SOCIETY.
CHAPTER FIVE
5.0 SUMMARY, RECOMMENDATIONS AND CONCLUSION REFERENCE
CHAPTER ONE
1.0 INTRODUCTION
Measurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. While active probe tools are commonly used to measure packet loss on end-to-end paths, there has been little analysis of the accuracy of these tools or their impact on the network. The objective of our study is to understand how to measure packet loss episodes accurately with end-to-end probes. We begin by testing the capability of standard Poisson-modulated end-to-end measurements of loss in a controlled laboratory environment using IP routers and commodity end hosts. Our tests show that loss characteristics reported from such Poisson-modulated probe tools can be quite inaccurate over a range of traffic conditions. Motivated by these observations, we introduce a new algorithm for packet loss measurement that is designed to overcome the deficiencies in standard Poisson-based tools. Specifically, our method entails probe experiments that follow a geometric distribution to 1) enable an explicit trade-off between accuracy and impact on the network, and 2) enable more accurate measurements than standard Poisson probing at the same rate. We evaluate the capabilities of our methodology experimentally by developing and implementing a prototype tool, called BADABING.
The experiments demonstrate the trade-offs between impact on the network and measurement accuracy. We show that BADABING reports loss characteristics far more accurately than traditional loss measurement tools.
1.1 STATEMENT OF PROBLEM
The statutory duty of the federal active packet loss measurement, prevention and intelligence Bureau (FIIB) is active packet loss measurement, prevention and intelligence network which is solely based on information. This information received from conducted investigation, which should be supplied to the Bureau within minutes using electron communication. But this takes days or weeks and sometimes months if the investigation is carried in a distant area. The storage medium currently at disposal for information is susceptible to unauthorized access and damage. Most often, the recorded information is usually not within the reach when needed. Going by this high level of graft in the country, officers can easily remove: recorded information of a very serious crime activity by mere bribe offer. In view of the above problems w3hich have attracted the author’s attention, he has unequivocally, decided to design a computer base system which will correct this abnormalities.
1.2 Purpose of study
The main aim of this study is to efficient managing detection of network and its component using snmp in order to improve their transaction rate of services to their various customers.
1.3 Aims and objectives
- The present invention is to provide a method and system for generating a number stream that, using the most advanced cryptanalytic and statistical methods available.
- To provide a method and system for generating an asynchronous pin code number which is non-deterministic?
- The present invention is to provide a method and system for guaranteeing that no particular subsequence of an asynchronous pin code number or derivative value is used twice while at the same time eliminating vulnerabilities associated with keeping records of values generated.
- To provide a method and system for generating an asynchronous pin code number which is immune to attack and compromise.
- To provide a method and system for generating an asynchronous pin code number which utilizes the apparently automatic nature of ordered systems generally?
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks has speed up the assigning of number to both individuals. It has helped many organizations to easy the heavy burden associated with manual method of assigning number to their clients. It has helped in the generation, processing and storing of effective and reliable numbers.
1.4 Scope of the study
The research is for Ad-Hoc Networks as it is maintained with MTN Nigeria. It critically studies the current system in use defecting the problem facing the system, analysis of the problem and coming up with a modified system that well solve the current and further problem that may come up with little or no modification. This will do a lot of good.
1.5 Limitations
Our time and money was our major physical problem during the course of the project work. (or should I say my time and money) with my studies and exams at hand I just have limited time to carryout this research very extensively. However, I did a detailed research work.
1.6 Definition of terms
Asynchronous relating to or using an electronic communication method that sends data in one direction, one character at a time
COMPUTER is an electronic device used for to accept data inform of input and process the data, store the data and has the ability to retrieve stored data.
HARDWARE is the physical component of computer
SYSTEM is the collection of all part of computer including human being.
STAFF is the person working in an organization.
STORAGE is a media for storing data/information.
DATABASE is the collection of related files.
TELEPHONEis an instrument that sends and receives voice messages and data.
Telephone call a communication carried out using the telephone
Telephone booth an enclosed or partly enclosed space with a pay telephone in it
Telephone number the sequence of numbers that identifies a particular telephone and that must be dialed for a caller to be connected to it
HARDWARE: This is the electromechanical part of computer system.
INFORMATION: This is data that have been processed, interpreted and understood by the recipient of the message or report.
INTERNETis a collection of computer networks that operate to common standards and enable the computes and the prog re-ram they run to communicate directly.
SERVER: This is a process that provides requested services for clients.
SOFTWARE: This is a logically written program that hardware uses to perform it’s operation.
System is the collection of hardware, software, data information, procedures and people.
Website is a space or location customized by a company, organization or an individual which is locatable within an address on the internet.
DISCLAIMER: All project works, files and documents posted on this website, UniProjectTopics.com are the property/copyright of their respective owners. They are for research reference/guidance purposes only and some of the works may be crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a reference/citation/guidance purpose only and not copy the work word for word (verbatim). The paper should be used as a guide or framework for your own paper. The contents of this paper should be able to help you in generating new ideas and thoughts for your own study. UniProjectTopics.com is a repository of research works where works are uploaded for research guidance. Our aim of providing this work is to help you eradicate the stress of going from one school library to another in search of research materials. This is a legal service because all tertiary institutions permit their students to read previous works, projects, books, articles, journals or papers while developing their own works. This is where the need for literature review comes in. “What a good artist understands is that nothing comes from nowhere. All creative work builds on what came before. Nothing is completely original.” - Austin Kleon. The paid subscription on UniProjectTopics.com is a means by which the website is maintained to support Open Education. If you see your work posted here by any means, and you want it to be removed/credited, please contact us with the web address link to the work. We will reply to and honour every request. Please notice it may take up to 24 – 48 hours to process your request.