SlideShare a Scribd company logo
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2342-2346 (2014) ISSN : 0975-0290
2342
Network Monitoring and Traffic Reduction
using Multi-Agent Technology
M.Subramanian,
Assistant Professor, Department of Information Technology,
Scad College of Engineering and Technology, Tirunelveli – 414.
Email : m.subramanian86@gmail.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
In this paper the algorithms which could improve Transmission band and Network Traffic reduction for
computer network has been shown. Problem solving is an area with which many Multiagent-based applications
are concerned. Multiagent systems are computational systems in which several agents interact or work together to
achieve some purposes. It includes distributed solutions to problems, solving distributed problems and distributed
techniques for problem solving. Multiagent using for maximizing group performance with planning, execution,
monitoring, communication and coordination. This paper also addresses some critical issues in developing
Multi agent-based traffic control and monitoring systems, such as interoperability, flexibility, and extendibility.
Finally, several future research directions toward the successful deployment of Multiagent technology in traffic
control and monitoring systems are discussed.
Keywords - Agent, Data compression, Efficiency algorithm, Multiagent system, Transmission band,
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: September 04, 2014 Date of Acceptance: November 13, 2014
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
MULTI AGENT-BASED computing is one of the
powerful technologies for the development of distributed
complex systems. The reason for the growing success of
agent technology in this area is that the inherent
distribution allows for a natural network traffic and
monitoring the system into multi agents that interact with
each other to achieve a desired global goal. Recently,
more and more agent-based traffic and transmission
applications have been reported. Our literature survey
shows that the techniques and methods resulting from the
field of agent system and MAS have been applied to many
aspects of reduce the traffic reduces and monitoring
systems. This paper reviews multi agent applications in
traffic reduction and transmission systems.
The network performance is being constantly
improved and this results in better usage of the traffic
control and transmission. There are several solutions to
improve usage of a traffic control and transmission band:
• Monitor the network and inform to the other
agents,
• Increase the size of transmission band,
advanced compression of data,
• Maximum transmission unit that can be
transmitted one frame.
The most significant influence on the behavior of
OSI layers has the human and the application. Network
Monitor is a network diagnostic tool that monitors local
area networks and provides a graphical display of network
statistics. Fig.1.
Fig. 1. Multiagent System
Human’s behavior is one of the most important sources of
data traffic in computer networks. The rest of the traffic
resources (system and protocols) give relatively small
contributions to this traffic. The network model should be
extended.
Network administrators can use these statistics to perform
routine trouble- shooting tasks, such as locating a server
that is down, or that is receiving a disproportionate
number of work requests. While collecting information
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2342-2346 (2014) ISSN : 0975-0290
2343
from the network's data stream, Network Monitor displays
the following types of information:
• The source address of the computer that sent a
frame onto the network. (This address is a unique
hexadecimal (or base-16) number that identifies
that computer on the network.)
• The destination address of the computer that
received the frame.
• The protocols used to send the frame.
• The data, or a portion of the message being sent.
Human behavior and user applications have to be
considered. This allows better analysis of the transmission
problem in computer networks. New issues considered in
the model determine the working of OSI layers. For
example, humans decide when and what will be sent
through the network. Analyzing and controlling human’s
behavior can significantly improve efficiency and
productivity of operation in computer networks.
II. BACKROUND
Network Traffic simulation is the principal approach for
ITS application. The Multi-agent model is, in our opinion
the most relevant computing model for network traffic
simulation, allowing more accurate and realistic solutions
behaviors to be simulated in s dynamic environment.
Recently, a number of agent-based application related to
its in different modes of transmission have been reported.
Agent-based approach for network traffic and transmission
band capacity allocation. In the next section, we present
our multi-agent system for network traffic simulations.
This system is based on network traffic reduction and
multi agent technology which enhance the extensibility of
the system.
III. MULTI AGENT-BASED TRAFFIC CONTROL
AND MONITORING SYSTEMS
The operation of multi agents is supported and
managed by distributed software platforms known as multi
agent systems. The name of MASs usually refers to
systems that support stationary agents, and web service
systems support multi agents. A multi agent system
provides mechanisms for agent management, agent
communication, and agent directory maintenance. A
mobile agent system provides additional mechanisms to
support the migration and execution of multi agents. In an
agent system, agencies are the major building blocks and
are installed in each node of a networked system, in which
agents reside and execute. To facilitate the interoperation
of agents and agent systems across heterogeneous agent
platforms, agencies designed to comply with agent
standards are highly desired. Although more and more
studies have been reported to apply agent approaches to
traffic and transportation systems, only few researches
address the system architecture and the platform issues of
agent-based traffic control and management systems. An
MAS to help traffic operators determine the best traffic
strategies for dealing with network traffic and monitoring
incidents. The multi agents in these two systems are
implemented using the Java agent development
Framework (JADE) agent platform [11], [12]. An
developed a monitoring system and designed an multi
agent-based real-time traffic control and management
system. Multi agent is originally developed to enhance the
distributed computing and information fusion capability
for a traffic-detection system. Although it is a general
purpose multi agent platform, Mobile-C is specifically
designed for real-time and resource-constrained
applications with interface to hardware.
Commonly used control architectures of multi agent
based systems can be classified into hierarchical,
hierarchical and hybrid. Generally, the hierarchical
approach decomposes the overall system into small
subsystems that have weak interaction with each other. On
the other hand, the hierarchical approach is a completely
decentralized approach in which agents communicate with
each other to make independent decisions. Since the
distributed agents only have a local view, it becomes
difficult to predict the network state from a global
perspective. The hybrid approach combines the features of
hierarchical and hierarchical approaches. Most reported
agent-based applications in traffic and transmission
systems focus on developing MASs that consists of
multiple distributed stationary agents. Mobile agent
technology has not been widely applied in this area. To
demonstrate the great value of mobile agents to intelligent
transportation systems (ITSs), Chen et al. [9] integrate
mobile agent technology with MASs to enhance the
flexibility and adaptability of large-scale traffic control
and management systems. Different from stationary
agents, mobile agents are able to migrate from one host in
a network to other hosts and resume execution in remote
hosts. Multi agents can be created dynamically at runtime
and dispatched to destination systems to perform tasks
with most updated code and algorithms. Multi agent offers
great opportunity to address challenges in traffic control
and management, such as quick incident diagnosis,
dynamic system configuration, new control-strategy
deployment, and data-transmission reduction. To achieve
flexible and intelligent control of traffic and transportation
systems, Wang [4], [5] developed multi agent based
networked traffic-management system. The multi agent-
based control decomposes a sophisticated control
algorithm into simple task-oriented multi agents that are
distributed over a network. The ability of dynamically
deploying and replacing control agents as needed allows
the network to operate in a “control on demand” mode to
adapt to various control scenarios.
The system architecture employs a three-level
hierarchical architecture. The highest level performs
reasoning and planning of task sequences for control
agents. The multi agents are represented by monitoring
agents that could migrate from remote traffic control
centers to field traffic devices or from one field device to
another. For the multi agent systems in network traffic
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2342-2346 (2014) ISSN : 0975-0290
2344
management developed a test bed to allow designers of
MASs to experiment with different strategies and examine
the applicability of developed systems. The test bed
consists of intelligent models for modeling intelligence of
agents, a world model for representing traffic process, and
an interaction model for modeling the interactions between
multi agents. The communication in the test bed conforms
to the FIPA standards.
IV. PACKING AND COMPRESSION USING
MULTI AGENT
The “HTTP Optimizer” agent ystem is
composed of an agent functioning on the server and an
agent (client application) which emulates typical web
browser operations.
The server-based agent (Server Agent class) has been
implemented as a subclass of the default servlet (Default
Servlet class), taking over its role, to assure a transparent
operation of the system. In the case of a typical request,
the agent uses the corresponding function of the Default
Server class and sends a default response. Mode, the
server-based agent packages all files from a WWW site
directory and sends them in segments of size equal to or
slightly smaller than 1500B (MTU: MSS + TCP/IP
headers). Unlike a typical browser, one HTTP GET
request concerning the HTML file is sent. For that reason,
HTTP headers are to be found only in the first response
package, thanks to which the MSS field can be used
mainly for file content purposes.
• Compressed packaging mode – a mode where, as
well as packaging, compression concerning whole MSS
segments is applied.
Regardless of the mode used, the whole WWW site
together with all its components is saved in a selected
destination folder. The server-based agent carries out the
process in the following way:
• In the packaging mode, file data sent in a stream are
separated by file size and name (Integer type). In this
way, coming across an integer type value (4 bytes) and
reading the file name (String), the client program can
specify the place where the file data end (fig. 2)
Fig.2. A segment of a packet in the packing mode.
In the compressed packaging mode, the process
consists of two stages. First, data are formatted in the same
way as in the packaging mode (size, filename, file data),
and then the whole stream is compressed and put in the
packet just after the compressed segment size.
In both cases it is the HTML file that is the first to be
packaged, regardless of its size. Such assumption has been
made for practical reasons so that the site can load even if
its components have not been downloaded yet. All the
packets (outgoing and incoming) concerning a particular
connection are traced and displayed in a special program
window to facilitate diagnostics of the preformed tests.
The algorithm test (local) serves to perform the packaging
algorithm tests on the local files. The packaging process is
performed on the basis of the User-defined MSS value and
the structure of each created packet is presented in the
graph. 4 websites have been used for the tests, varying not
only in components’ size but also in their compression
ratio.Fig.3.
Fig.3. A Segment of a packet in the compressed
packaging mode.
Each website has only one HTML file (index.html)
which contains the descriptions and references to the
images. The tested websites are:

Website1- a page containing very small images (icons)
in the PNG format which are 200B in size on average.
Those files have low compression ratio due to the PNG
format which already employs lossless data compression.
The compression ratios of all files do not exceed 1,1.
 Website 2 – a page containing relatively big-sized
photos (from 3KB to 20KB) in the JPEG format. The
JPEG format employs lossy data compression which
allows obtaining high compression ratios. The
compression ratios of all files do not exceed 1, 2.
 Website 3 – a page containing images of sizes 1.8
KB to 3.1 KB in the BMP format. The BMP files are
usually not compressed (although this format provides
lossless compression) and are typically of a large size. All
images have a high compression ratio (1,3-1,9).
Website 4 – a page which is a combination of
the above three pages. All files vary in terms of both size
and compression ratio. Network tests, the results of which
are presented below, have been performed in the local
network to eliminate any negative factors concerning
network congestion. In spite of that, after performing the
tests in the global Internet network between computers
separated by as many as 11 network nodes, the results
were very similar (Table 1).
Int. J. Advanced Networking and Applicatio
Volume: 6 Issue: 3 Pages: 2342-2346 (20
Types Web1 Web2 W
Amounts of Packets -
Web browser
298 223 9
Amount of Packets -
Packing
95 200 7
Amount of Packets –
Compressed packing
46 184 4
Coefficient E with
standard transmission
0.43 0.89
0
Coefficient E with
packing
0.84 0.91 0
Coefficient E with
compression and
packing
2.19 0.98 2
Table.1. Compression packets
The conception of “Compression” agent
In Agent technology information is being se
frequently than when user is sending a requ
[12]. The text document (XML and J
compressed without losing any data. P
documents in one like “HTTP optimizer” is
most cases because the interaction betw
website can be lost. shows an example of
agent technology with data compression.
Such requests cause the increase of traffic
sending small portions of information. The
user refreshes the website, the higher the
ends in a decrease of user`s information in t
information. That is a disadvantage for
efficiency. What makes AJAX more and m
that user becomes more interactive with a ta
such XML or JSON (JavaScript Object Not
to send data in asynchronous HTTP requ
they can be easily compressed To estimate
(E) of implemented improvements we can c
given protocol as
E
Where D is the data volume to be tr
DT is the volume of total transferred inf
coefficient E satisfies the relation E<1 an
ideal case (ideal protocol without compres
(when compression is implemented).
Network traffic analysis
Before beginning with the tests thems
some traffic captures with the purpose of f
way to distinguish the different uses that c
the protocol. We used several monitoring t
[7], ngrep [8] and wireshark [9]; these
analyze the packages in depth with help fro
Although this field was not present, it alw
the captures we took. For the content-typ
MIME type values are used, according
“Multipurpose Internet Mail Extensions
Two: Average Types”. This RFC define
xxx/yyy form, where xxx can be one of
ons
14) ISSN : 0975-0290
Web3 Web4
94 614
73 340
42 253
0.80 0.68
0.87 0.86
.40 1.21
end much more
uest to website
SON) can be
acking a few
s impossible in
ween user and
f website using
in network by
more often the
increase. That
otal transferred
r the network
more popular, is
ask. Documents
tation) are used
uest. Therefore
e the efficiency
alculate it for a
ransferred, and
formation. The
nd E=1 for the
ssion) and E>1
elves, we took
finding the best
can be given to
tools: tcpdump
allowed us to
om their filters.
ways existed in
pe field values
to RFC 2046,
(MIME) Part
es types of the
f the following
values: text, image, audio, video, ap
multipart or HTTP; and yyy is a specia
Traffic Classification
Then, in order to be able to classi
necessary to have a tool that allows
content. Filter is a sort key for Net fi
identifies packages based on the App
This tool has predefined filters and
define new filters. The LL7 filters are
which Were adapted to detect HT
different content-type values.
V. EXPERIMENTAL RESULT
In the experiment, simple two n
client - server configuration has been
was sent in three different ways: tradit
proposed two algorithms. The obt
compared.
File size
Distribution in percentage of file size
Ethernet protocol MTU).
Traffic was measured by TCP dump,
tool (see www.tcdump.org tool for
were used with the total size of 785919
size was 538 bytes, with a distribution
70 seconds to send unmodified info
(File Transfer Protocol) and 21935 pa
to transmit this information. When th
used the 1460 files were packed to 56
size of 825339 bytes (average 1460 by
files was reduced by to 38.7% (packe
case of algorithm 1 only 8498 packet
28 seconds were needed to transmit t
number of sent packets had been reduc
two numbers are identical, because th
and packets sent are proportional. In
linear function, because collisions a
transfer time was reduced to 40%.
0
20
40
60
80
100
1st Qtr 2nd Qtr 3rd Q
2345
pplication, message,
alization of that.
ify the traffic, it is
s defining filters by
lter from Linux that
plication layer data.
allows the user to
regular expressions,
TTP sessions with
TS
nodes network with
n used. Information
tional, and then with
tained results were
es (smaller then
, which is the linux
details). 1460 files
9 bytes. The average
n as on Fig. 7. It took
ormation using FTP
ackets were required
he algorithm 1 was
65 packets, at a total
ytes). The number of
ets with data). In the
ts were required and
the information. The
ced to 38.7%. These
he reduction of files
this experiment it is
are eliminated. The
Qtr 4th Qtr
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2342-2346 (2014) ISSN : 0975-0290
2346
Tab. 2. Coefficient of user data transmission efficiency
and transfer time with algorithm 1 and algorithm 2.
Transmission
method
Data
Transmission
Efficiency
Time(s) Packets
Standard 3.21 70 70
With
algorithm 1 2.15 28 41
With
algorithm 2 1.97 20 37
When the algorithm 2 was used the number of files was
reduced to 394 data packets, at a total size of 579276 bytes
(average 1472 bytes). Only 5930 packets were required
and only 20 seconds were needed to transmit the
information. The number of files as well as number of
packets sent was reduced to 27%. The transfer time was
reduced to 28.6%. Above results show an optimal usage of
size MTU packet in a reduced amount of time, although
the information sent was 5% bigger than the first one
(because the added tags identified files in packets). Also,
the number of sent packets had been reduced. The
experiment contained two parts: preparing the packets and
sending the information.
The algorithms were implemented in C++
language. In this case, the time to prepare the packets with
algorithm I was 13 seconds and for second algorithm 17
seconds were required. In this stage of investigations we
didn’t optimize the speed of computer programs. We
expect that after eliminating intermediate disk operations
in these programs they will run at least 10 times faster.
Anyway, in this experiment the total transmission times
were reduced to 58.6% and to 52.9% respectively. Time
needed to retrieve information on the receiving side (client
side) can be neglected in comparison with time required
for packet preparation. For the algorithm 1 (typically it
was less than 10ms) it is only time required for
localization file in unpacking packet and for algorithm 2
additional times for single compressing process of the
data part of packet (typically was less than 100 ms).
VI. CONCLUSION
This paper has presented a method to measure the
performance of network monitoring system operations
using traffic reduction and multi agent approach. The
initial results show that multi agent perform better when
the number of managed agent increase significantly. In
this paper, we have described techniques for compressing
the link structure of the agent, and have preliminary
experimental results on compression packet and access
speed. The performed tests have proved that the developed
multi agents system improves transmission band usage. As
a result, the number of transmitted packets (frames) has
been reduced several times.
VII. REFERENCES
[1]. M.Adler and M.Mitzenmacher,“Towards
compressing web graphs”, In Proc. of the IEEE
DCC, March 2001, pp. 203-212.
[2]. T. Suel, J. Yuan, “Compressing the Graph Structure
of the Web”, Proc. of the IEEE DCC, March 2001,
pp. 213-222.
[3]. R. Krashinsky, “Efficient Web Browsing for Mobile
Clients using HTTP Compression”, Technical Report
MIT-LCS-TR-882, MIT Lab for Computer Science,
Jan. 2003.
[4]. J. Nagle, “Congestion Control In TCP/IP
Internetworks”, RFC 896, 6 January 1984.
[5]. S. E. Spero, “Next Generation Hypertext Transport
Protocol”, InternetDraft, March 1995.
[6]. J. B. Postel, “Transmission Control Protocol”, RFC
793, September 1981
[7]. B. Choi, N. Bharade, Network traffic reduction by
hypertext compression, Proc. of the International
Conference on Internet Computing, 2002, pp. 877-
882.
[8]. E. Weigle, W. Fang, “A Comparison of TCP
Automatic Tuning Techniques for Distributed
Computing”, Proc. Of the 11th IEEE International
Symposium on HPDC, November 2002.
[9]. J. J. Garret, “Ajax: A New Approach to Web
Applications”,http://www.adaptivepath.com/ideas/es
says/archives/000385.php, February 2005.
[10]. T. Bartczak, S. Paszczyński, B. M. Wilamowski:
“Improvement the Computer Network Transmission
Band Usage by Packing Agent Technology”, in
Proc. of INDIN 2005 The 3rd International IEEE
Conference on Industrial Informatics, Perth,
Australia, 10-12 August 2005, pp. 209-214.
[11]. J. Nagle, “Congestion Control In TCP/IP
Internetworks”, RFC 896, 6 January 1984.
[12]. S. E. Spero, “Next Generation Hypertext Transport
Protocol”, Internet Draft, March 1995.
[13]. J. Huang et al., “A Close Examination of
Performance and Layer Characteristics of 4G LTE
Networks,” Proc. 10th Int’l Conf. Mobile Systems,
Applications, and Services (MobiSys 12), ACM,
2012, pp. 225– 238.
[14]. S. Dey, “Cloud Mobile Media: Opportunities,
Challenges, and Directions”, Proc. Int’l. Conf.
Computing,Network and Commun., 2012, pp. 929–
33.
[15]. K. Lu, Y. Qian, and H.-H. Chen, “A Secure and
Service- Oriented Network Control Framework for
WiMAX Networks,” IEEE Commun.Mag., vol. 45,
no. 5, May 2009,pp. 124–30.
[16]. M. Schlansker, Y. Turner, J. Tourrilhes, and A.
Karp, “Ensemble Routing for datacenter networks,”
in Proc. 2010 ACM/IEEE Symposium on
Architectures for Networking & Commns Systems
[17]. S. Bitam and A. Mellouk, “ITS-cloud: Cloud
computing for intelligent transportation system,” in
Proc. IEEE Global Network. Conf., Anaheim, CA,
USA, 2012, pp. 2054–2059.
[18]. Y. Zhang, B. Chen, and X. Lu, “Intelligent monitoring
system on Refrigerator trucks based on the internet of
things,” Wireless Communications and Applications.
Berlin, Germany: Springer-Verlag, 2012, pp. 201–206.

More Related Content

What's hot

HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
Prof Ansari
 
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEYSELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
IJNSA Journal
 
Report_Internships
Report_InternshipsReport_Internships
Report_Internships
Marta de la Cruz Martos
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manets
eSAT Publishing House
 
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
IJCNCJournal
 
C0941017
C0941017C0941017
C0941017
IOSR Journals
 
Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...
Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...
Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...
IDES Editor
 
Ieeepro techno solutions 2013 ieee embedded project decision making in coll...
Ieeepro techno solutions   2013 ieee embedded project decision making in coll...Ieeepro techno solutions   2013 ieee embedded project decision making in coll...
Ieeepro techno solutions 2013 ieee embedded project decision making in coll...
srinivasanece7
 
A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...
ijmnct
 
Ieeepro techno solutions 2013 ieee embedded project an integrated design fr...
Ieeepro techno solutions   2013 ieee embedded project an integrated design fr...Ieeepro techno solutions   2013 ieee embedded project an integrated design fr...
Ieeepro techno solutions 2013 ieee embedded project an integrated design fr...
srinivasanece7
 
communication in distributed systems
communication in distributed systemscommunication in distributed systems
communication in distributed systems
mohammed alrekabe
 
basics of computer network
basics of computer networkbasics of computer network
basics of computer network
Prof Ansari
 
11 vol3
11 vol311 vol3
An approach of software engineering through middleware
An approach of software engineering through middlewareAn approach of software engineering through middleware
An approach of software engineering through middleware
IAEME Publication
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
Conference Papers
 
A Network and Position Proposal Scheme using a Link-16 based C3I System
A Network and Position Proposal Scheme using a Link-16 based C3I SystemA Network and Position Proposal Scheme using a Link-16 based C3I System
A Network and Position Proposal Scheme using a Link-16 based C3I System
University of Piraeus
 
Unit 6
Unit 6Unit 6
An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...
An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...
An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...
CSCJournals
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN
Dhaya kanthavel
 
Data dissemination
Data disseminationData dissemination
Data dissemination
Vikram Nandini
 

What's hot (20)

HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEYSELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
 
Report_Internships
Report_InternshipsReport_Internships
Report_Internships
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manets
 
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
 
C0941017
C0941017C0941017
C0941017
 
Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...
Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...
Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...
 
Ieeepro techno solutions 2013 ieee embedded project decision making in coll...
Ieeepro techno solutions   2013 ieee embedded project decision making in coll...Ieeepro techno solutions   2013 ieee embedded project decision making in coll...
Ieeepro techno solutions 2013 ieee embedded project decision making in coll...
 
A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...
 
Ieeepro techno solutions 2013 ieee embedded project an integrated design fr...
Ieeepro techno solutions   2013 ieee embedded project an integrated design fr...Ieeepro techno solutions   2013 ieee embedded project an integrated design fr...
Ieeepro techno solutions 2013 ieee embedded project an integrated design fr...
 
communication in distributed systems
communication in distributed systemscommunication in distributed systems
communication in distributed systems
 
basics of computer network
basics of computer networkbasics of computer network
basics of computer network
 
11 vol3
11 vol311 vol3
11 vol3
 
An approach of software engineering through middleware
An approach of software engineering through middlewareAn approach of software engineering through middleware
An approach of software engineering through middleware
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
 
A Network and Position Proposal Scheme using a Link-16 based C3I System
A Network and Position Proposal Scheme using a Link-16 based C3I SystemA Network and Position Proposal Scheme using a Link-16 based C3I System
A Network and Position Proposal Scheme using a Link-16 based C3I System
 
Unit 6
Unit 6Unit 6
Unit 6
 
An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...
An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...
An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN
 
Data dissemination
Data disseminationData dissemination
Data dissemination
 

Viewers also liked

String Identifier in Multiple Medical Databases
String Identifier in Multiple Medical DatabasesString Identifier in Multiple Medical Databases
String Identifier in Multiple Medical Databases
Eswar Publications
 
Good presentation prezi
Good presentation preziGood presentation prezi
Good presentation prezilizbeth912
 
Retención patty prado pp
Retención patty prado ppRetención patty prado pp
Retención patty prado pppamelivar
 
Jamberry nails black & white look
Jamberry nails   black & white lookJamberry nails   black & white look
Jamberry nails black & white look
Mrz Treva
 
Problem solving 5x5 grid Dennis
Problem solving   5x5 grid DennisProblem solving   5x5 grid Dennis
Problem solving 5x5 grid Dennis
grade4biss
 
P1 e1 internet
P1 e1 internetP1 e1 internet
P1 e1 internet
Chemamiriam
 
Fotos para geo
Fotos para geoFotos para geo
Fotos para geoisavelar
 
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Eswar Publications
 
Hsc time table
Hsc time tableHsc time table
Hsc time table
Irfan Jaan
 
Grafico diario del s&p 500 para el 19 01 2012
Grafico diario del s&p 500 para el 19 01 2012Grafico diario del s&p 500 para el 19 01 2012
Grafico diario del s&p 500 para el 19 01 2012
Experiencia Trading
 
Cpdc ap 5º período
Cpdc ap   5º períodoCpdc ap   5º período
Cpdc ap 5º período
Joelma Oliveira
 
Mi vida en la escuela secundaria
Mi vida en la escuela secundariaMi vida en la escuela secundaria
Mi vida en la escuela secundaria
damarisram
 
Fuzzy System Model for Management of Driver Distractions in Motor Vehicles
Fuzzy System Model for Management of Driver Distractions in Motor VehiclesFuzzy System Model for Management of Driver Distractions in Motor Vehicles
Fuzzy System Model for Management of Driver Distractions in Motor Vehicles
Eswar Publications
 
Student 2
Student 2Student 2
Student 2
Connie Stone
 
2_A_Solution_for_preventing_SQL_Injection_in_web_based_applicationx
2_A_Solution_for_preventing_SQL_Injection_in_web_based_applicationx2_A_Solution_for_preventing_SQL_Injection_in_web_based_applicationx
2_A_Solution_for_preventing_SQL_Injection_in_web_based_applicationxOPENLANE
 

Viewers also liked (17)

String Identifier in Multiple Medical Databases
String Identifier in Multiple Medical DatabasesString Identifier in Multiple Medical Databases
String Identifier in Multiple Medical Databases
 
Good presentation prezi
Good presentation preziGood presentation prezi
Good presentation prezi
 
Retención patty prado pp
Retención patty prado ppRetención patty prado pp
Retención patty prado pp
 
Jamberry nails black & white look
Jamberry nails   black & white lookJamberry nails   black & white look
Jamberry nails black & white look
 
Problem solving 5x5 grid Dennis
Problem solving   5x5 grid DennisProblem solving   5x5 grid Dennis
Problem solving 5x5 grid Dennis
 
Flores
FloresFlores
Flores
 
P1 e1 internet
P1 e1 internetP1 e1 internet
P1 e1 internet
 
Fotos para geo
Fotos para geoFotos para geo
Fotos para geo
 
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
 
Hsc time table
Hsc time tableHsc time table
Hsc time table
 
Grafico diario del s&p 500 para el 19 01 2012
Grafico diario del s&p 500 para el 19 01 2012Grafico diario del s&p 500 para el 19 01 2012
Grafico diario del s&p 500 para el 19 01 2012
 
Cpdc ap 5º período
Cpdc ap   5º períodoCpdc ap   5º período
Cpdc ap 5º período
 
Mi vida en la escuela secundaria
Mi vida en la escuela secundariaMi vida en la escuela secundaria
Mi vida en la escuela secundaria
 
Fuzzy System Model for Management of Driver Distractions in Motor Vehicles
Fuzzy System Model for Management of Driver Distractions in Motor VehiclesFuzzy System Model for Management of Driver Distractions in Motor Vehicles
Fuzzy System Model for Management of Driver Distractions in Motor Vehicles
 
Enunciado ejercicio 4
Enunciado ejercicio 4Enunciado ejercicio 4
Enunciado ejercicio 4
 
Student 2
Student 2Student 2
Student 2
 
2_A_Solution_for_preventing_SQL_Injection_in_web_based_applicationx
2_A_Solution_for_preventing_SQL_Injection_in_web_based_applicationx2_A_Solution_for_preventing_SQL_Injection_in_web_based_applicationx
2_A_Solution_for_preventing_SQL_Injection_in_web_based_applicationx
 

Similar to Network Monitoring and Traffic Reduction using Multi-Agent Technology

C0848062312
C0848062312C0848062312
C0848062312
9000092400
 
SEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEM
SEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEMSEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEM
SEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEM
ijiert bestjournal
 
A Survey and Comparison of SDN Based Traffic Management Techniques
A Survey and Comparison of SDN Based Traffic Management TechniquesA Survey and Comparison of SDN Based Traffic Management Techniques
A Survey and Comparison of SDN Based Traffic Management Techniques
Associate Professor in VSB Coimbatore
 
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKSA SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
ijdpsjournal
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
Gyan Prakash
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Editor IJCATR
 
Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service management
tsysglobalsolutions
 
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
ijcsa
 
Intelligent Agents in Telecommunications
Intelligent Agents in TelecommunicationsIntelligent Agents in Telecommunications
Intelligent Agents in Telecommunications
IJCSIS Research Publications
 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical method
eSAT Publishing House
 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical method
eSAT Journals
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
Alexander Decker
 
A044030110
A044030110A044030110
A044030110
IJERA Editor
 
Its architecture
Its architectureIts architecture
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
IJMREMJournal
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
IJMREMJournal
 
Multi agent based network monitoring and management using jade
Multi agent based network monitoring and management using jadeMulti agent based network monitoring and management using jade
Multi agent based network monitoring and management using jade
Alexander Decker
 
Results of simulation modeling of technical parameters of a multiservice network
Results of simulation modeling of technical parameters of a multiservice networkResults of simulation modeling of technical parameters of a multiservice network
Results of simulation modeling of technical parameters of a multiservice network
TELKOMNIKA JOURNAL
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANET
ijsrd.com
 
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTA CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
IJwest
 

Similar to Network Monitoring and Traffic Reduction using Multi-Agent Technology (20)

C0848062312
C0848062312C0848062312
C0848062312
 
SEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEM
SEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEMSEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEM
SEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEM
 
A Survey and Comparison of SDN Based Traffic Management Techniques
A Survey and Comparison of SDN Based Traffic Management TechniquesA Survey and Comparison of SDN Based Traffic Management Techniques
A Survey and Comparison of SDN Based Traffic Management Techniques
 
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKSA SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
 
Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service management
 
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
 
Intelligent Agents in Telecommunications
Intelligent Agents in TelecommunicationsIntelligent Agents in Telecommunications
Intelligent Agents in Telecommunications
 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical method
 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical method
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
A044030110
A044030110A044030110
A044030110
 
Its architecture
Its architectureIts architecture
Its architecture
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
 
Multi agent based network monitoring and management using jade
Multi agent based network monitoring and management using jadeMulti agent based network monitoring and management using jade
Multi agent based network monitoring and management using jade
 
Results of simulation modeling of technical parameters of a multiservice network
Results of simulation modeling of technical parameters of a multiservice networkResults of simulation modeling of technical parameters of a multiservice network
Results of simulation modeling of technical parameters of a multiservice network
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANET
 
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTA CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
Eswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
Eswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
Eswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
Eswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Eswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
Eswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Eswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Eswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Eswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
Eswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Eswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
Eswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 

Recently uploaded (20)

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 

Network Monitoring and Traffic Reduction using Multi-Agent Technology

  • 1. Int. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: 2342-2346 (2014) ISSN : 0975-0290 2342 Network Monitoring and Traffic Reduction using Multi-Agent Technology M.Subramanian, Assistant Professor, Department of Information Technology, Scad College of Engineering and Technology, Tirunelveli – 414. Email : m.subramanian86@gmail.com -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- In this paper the algorithms which could improve Transmission band and Network Traffic reduction for computer network has been shown. Problem solving is an area with which many Multiagent-based applications are concerned. Multiagent systems are computational systems in which several agents interact or work together to achieve some purposes. It includes distributed solutions to problems, solving distributed problems and distributed techniques for problem solving. Multiagent using for maximizing group performance with planning, execution, monitoring, communication and coordination. This paper also addresses some critical issues in developing Multi agent-based traffic control and monitoring systems, such as interoperability, flexibility, and extendibility. Finally, several future research directions toward the successful deployment of Multiagent technology in traffic control and monitoring systems are discussed. Keywords - Agent, Data compression, Efficiency algorithm, Multiagent system, Transmission band, -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: September 04, 2014 Date of Acceptance: November 13, 2014 -------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION MULTI AGENT-BASED computing is one of the powerful technologies for the development of distributed complex systems. The reason for the growing success of agent technology in this area is that the inherent distribution allows for a natural network traffic and monitoring the system into multi agents that interact with each other to achieve a desired global goal. Recently, more and more agent-based traffic and transmission applications have been reported. Our literature survey shows that the techniques and methods resulting from the field of agent system and MAS have been applied to many aspects of reduce the traffic reduces and monitoring systems. This paper reviews multi agent applications in traffic reduction and transmission systems. The network performance is being constantly improved and this results in better usage of the traffic control and transmission. There are several solutions to improve usage of a traffic control and transmission band: • Monitor the network and inform to the other agents, • Increase the size of transmission band, advanced compression of data, • Maximum transmission unit that can be transmitted one frame. The most significant influence on the behavior of OSI layers has the human and the application. Network Monitor is a network diagnostic tool that monitors local area networks and provides a graphical display of network statistics. Fig.1. Fig. 1. Multiagent System Human’s behavior is one of the most important sources of data traffic in computer networks. The rest of the traffic resources (system and protocols) give relatively small contributions to this traffic. The network model should be extended. Network administrators can use these statistics to perform routine trouble- shooting tasks, such as locating a server that is down, or that is receiving a disproportionate number of work requests. While collecting information
  • 2. Int. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: 2342-2346 (2014) ISSN : 0975-0290 2343 from the network's data stream, Network Monitor displays the following types of information: • The source address of the computer that sent a frame onto the network. (This address is a unique hexadecimal (or base-16) number that identifies that computer on the network.) • The destination address of the computer that received the frame. • The protocols used to send the frame. • The data, or a portion of the message being sent. Human behavior and user applications have to be considered. This allows better analysis of the transmission problem in computer networks. New issues considered in the model determine the working of OSI layers. For example, humans decide when and what will be sent through the network. Analyzing and controlling human’s behavior can significantly improve efficiency and productivity of operation in computer networks. II. BACKROUND Network Traffic simulation is the principal approach for ITS application. The Multi-agent model is, in our opinion the most relevant computing model for network traffic simulation, allowing more accurate and realistic solutions behaviors to be simulated in s dynamic environment. Recently, a number of agent-based application related to its in different modes of transmission have been reported. Agent-based approach for network traffic and transmission band capacity allocation. In the next section, we present our multi-agent system for network traffic simulations. This system is based on network traffic reduction and multi agent technology which enhance the extensibility of the system. III. MULTI AGENT-BASED TRAFFIC CONTROL AND MONITORING SYSTEMS The operation of multi agents is supported and managed by distributed software platforms known as multi agent systems. The name of MASs usually refers to systems that support stationary agents, and web service systems support multi agents. A multi agent system provides mechanisms for agent management, agent communication, and agent directory maintenance. A mobile agent system provides additional mechanisms to support the migration and execution of multi agents. In an agent system, agencies are the major building blocks and are installed in each node of a networked system, in which agents reside and execute. To facilitate the interoperation of agents and agent systems across heterogeneous agent platforms, agencies designed to comply with agent standards are highly desired. Although more and more studies have been reported to apply agent approaches to traffic and transportation systems, only few researches address the system architecture and the platform issues of agent-based traffic control and management systems. An MAS to help traffic operators determine the best traffic strategies for dealing with network traffic and monitoring incidents. The multi agents in these two systems are implemented using the Java agent development Framework (JADE) agent platform [11], [12]. An developed a monitoring system and designed an multi agent-based real-time traffic control and management system. Multi agent is originally developed to enhance the distributed computing and information fusion capability for a traffic-detection system. Although it is a general purpose multi agent platform, Mobile-C is specifically designed for real-time and resource-constrained applications with interface to hardware. Commonly used control architectures of multi agent based systems can be classified into hierarchical, hierarchical and hybrid. Generally, the hierarchical approach decomposes the overall system into small subsystems that have weak interaction with each other. On the other hand, the hierarchical approach is a completely decentralized approach in which agents communicate with each other to make independent decisions. Since the distributed agents only have a local view, it becomes difficult to predict the network state from a global perspective. The hybrid approach combines the features of hierarchical and hierarchical approaches. Most reported agent-based applications in traffic and transmission systems focus on developing MASs that consists of multiple distributed stationary agents. Mobile agent technology has not been widely applied in this area. To demonstrate the great value of mobile agents to intelligent transportation systems (ITSs), Chen et al. [9] integrate mobile agent technology with MASs to enhance the flexibility and adaptability of large-scale traffic control and management systems. Different from stationary agents, mobile agents are able to migrate from one host in a network to other hosts and resume execution in remote hosts. Multi agents can be created dynamically at runtime and dispatched to destination systems to perform tasks with most updated code and algorithms. Multi agent offers great opportunity to address challenges in traffic control and management, such as quick incident diagnosis, dynamic system configuration, new control-strategy deployment, and data-transmission reduction. To achieve flexible and intelligent control of traffic and transportation systems, Wang [4], [5] developed multi agent based networked traffic-management system. The multi agent- based control decomposes a sophisticated control algorithm into simple task-oriented multi agents that are distributed over a network. The ability of dynamically deploying and replacing control agents as needed allows the network to operate in a “control on demand” mode to adapt to various control scenarios. The system architecture employs a three-level hierarchical architecture. The highest level performs reasoning and planning of task sequences for control agents. The multi agents are represented by monitoring agents that could migrate from remote traffic control centers to field traffic devices or from one field device to another. For the multi agent systems in network traffic
  • 3. Int. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: 2342-2346 (2014) ISSN : 0975-0290 2344 management developed a test bed to allow designers of MASs to experiment with different strategies and examine the applicability of developed systems. The test bed consists of intelligent models for modeling intelligence of agents, a world model for representing traffic process, and an interaction model for modeling the interactions between multi agents. The communication in the test bed conforms to the FIPA standards. IV. PACKING AND COMPRESSION USING MULTI AGENT The “HTTP Optimizer” agent ystem is composed of an agent functioning on the server and an agent (client application) which emulates typical web browser operations. The server-based agent (Server Agent class) has been implemented as a subclass of the default servlet (Default Servlet class), taking over its role, to assure a transparent operation of the system. In the case of a typical request, the agent uses the corresponding function of the Default Server class and sends a default response. Mode, the server-based agent packages all files from a WWW site directory and sends them in segments of size equal to or slightly smaller than 1500B (MTU: MSS + TCP/IP headers). Unlike a typical browser, one HTTP GET request concerning the HTML file is sent. For that reason, HTTP headers are to be found only in the first response package, thanks to which the MSS field can be used mainly for file content purposes. • Compressed packaging mode – a mode where, as well as packaging, compression concerning whole MSS segments is applied. Regardless of the mode used, the whole WWW site together with all its components is saved in a selected destination folder. The server-based agent carries out the process in the following way: • In the packaging mode, file data sent in a stream are separated by file size and name (Integer type). In this way, coming across an integer type value (4 bytes) and reading the file name (String), the client program can specify the place where the file data end (fig. 2) Fig.2. A segment of a packet in the packing mode. In the compressed packaging mode, the process consists of two stages. First, data are formatted in the same way as in the packaging mode (size, filename, file data), and then the whole stream is compressed and put in the packet just after the compressed segment size. In both cases it is the HTML file that is the first to be packaged, regardless of its size. Such assumption has been made for practical reasons so that the site can load even if its components have not been downloaded yet. All the packets (outgoing and incoming) concerning a particular connection are traced and displayed in a special program window to facilitate diagnostics of the preformed tests. The algorithm test (local) serves to perform the packaging algorithm tests on the local files. The packaging process is performed on the basis of the User-defined MSS value and the structure of each created packet is presented in the graph. 4 websites have been used for the tests, varying not only in components’ size but also in their compression ratio.Fig.3. Fig.3. A Segment of a packet in the compressed packaging mode. Each website has only one HTML file (index.html) which contains the descriptions and references to the images. The tested websites are:  Website1- a page containing very small images (icons) in the PNG format which are 200B in size on average. Those files have low compression ratio due to the PNG format which already employs lossless data compression. The compression ratios of all files do not exceed 1,1.  Website 2 – a page containing relatively big-sized photos (from 3KB to 20KB) in the JPEG format. The JPEG format employs lossy data compression which allows obtaining high compression ratios. The compression ratios of all files do not exceed 1, 2.  Website 3 – a page containing images of sizes 1.8 KB to 3.1 KB in the BMP format. The BMP files are usually not compressed (although this format provides lossless compression) and are typically of a large size. All images have a high compression ratio (1,3-1,9). Website 4 – a page which is a combination of the above three pages. All files vary in terms of both size and compression ratio. Network tests, the results of which are presented below, have been performed in the local network to eliminate any negative factors concerning network congestion. In spite of that, after performing the tests in the global Internet network between computers separated by as many as 11 network nodes, the results were very similar (Table 1).
  • 4. Int. J. Advanced Networking and Applicatio Volume: 6 Issue: 3 Pages: 2342-2346 (20 Types Web1 Web2 W Amounts of Packets - Web browser 298 223 9 Amount of Packets - Packing 95 200 7 Amount of Packets – Compressed packing 46 184 4 Coefficient E with standard transmission 0.43 0.89 0 Coefficient E with packing 0.84 0.91 0 Coefficient E with compression and packing 2.19 0.98 2 Table.1. Compression packets The conception of “Compression” agent In Agent technology information is being se frequently than when user is sending a requ [12]. The text document (XML and J compressed without losing any data. P documents in one like “HTTP optimizer” is most cases because the interaction betw website can be lost. shows an example of agent technology with data compression. Such requests cause the increase of traffic sending small portions of information. The user refreshes the website, the higher the ends in a decrease of user`s information in t information. That is a disadvantage for efficiency. What makes AJAX more and m that user becomes more interactive with a ta such XML or JSON (JavaScript Object Not to send data in asynchronous HTTP requ they can be easily compressed To estimate (E) of implemented improvements we can c given protocol as E Where D is the data volume to be tr DT is the volume of total transferred inf coefficient E satisfies the relation E<1 an ideal case (ideal protocol without compres (when compression is implemented). Network traffic analysis Before beginning with the tests thems some traffic captures with the purpose of f way to distinguish the different uses that c the protocol. We used several monitoring t [7], ngrep [8] and wireshark [9]; these analyze the packages in depth with help fro Although this field was not present, it alw the captures we took. For the content-typ MIME type values are used, according “Multipurpose Internet Mail Extensions Two: Average Types”. This RFC define xxx/yyy form, where xxx can be one of ons 14) ISSN : 0975-0290 Web3 Web4 94 614 73 340 42 253 0.80 0.68 0.87 0.86 .40 1.21 end much more uest to website SON) can be acking a few s impossible in ween user and f website using in network by more often the increase. That otal transferred r the network more popular, is ask. Documents tation) are used uest. Therefore e the efficiency alculate it for a ransferred, and formation. The nd E=1 for the ssion) and E>1 elves, we took finding the best can be given to tools: tcpdump allowed us to om their filters. ways existed in pe field values to RFC 2046, (MIME) Part es types of the f the following values: text, image, audio, video, ap multipart or HTTP; and yyy is a specia Traffic Classification Then, in order to be able to classi necessary to have a tool that allows content. Filter is a sort key for Net fi identifies packages based on the App This tool has predefined filters and define new filters. The LL7 filters are which Were adapted to detect HT different content-type values. V. EXPERIMENTAL RESULT In the experiment, simple two n client - server configuration has been was sent in three different ways: tradit proposed two algorithms. The obt compared. File size Distribution in percentage of file size Ethernet protocol MTU). Traffic was measured by TCP dump, tool (see www.tcdump.org tool for were used with the total size of 785919 size was 538 bytes, with a distribution 70 seconds to send unmodified info (File Transfer Protocol) and 21935 pa to transmit this information. When th used the 1460 files were packed to 56 size of 825339 bytes (average 1460 by files was reduced by to 38.7% (packe case of algorithm 1 only 8498 packet 28 seconds were needed to transmit t number of sent packets had been reduc two numbers are identical, because th and packets sent are proportional. In linear function, because collisions a transfer time was reduced to 40%. 0 20 40 60 80 100 1st Qtr 2nd Qtr 3rd Q 2345 pplication, message, alization of that. ify the traffic, it is s defining filters by lter from Linux that plication layer data. allows the user to regular expressions, TTP sessions with TS nodes network with n used. Information tional, and then with tained results were es (smaller then , which is the linux details). 1460 files 9 bytes. The average n as on Fig. 7. It took ormation using FTP ackets were required he algorithm 1 was 65 packets, at a total ytes). The number of ets with data). In the ts were required and the information. The ced to 38.7%. These he reduction of files this experiment it is are eliminated. The Qtr 4th Qtr
  • 5. Int. J. Advanced Networking and Applications Volume: 6 Issue: 3 Pages: 2342-2346 (2014) ISSN : 0975-0290 2346 Tab. 2. Coefficient of user data transmission efficiency and transfer time with algorithm 1 and algorithm 2. Transmission method Data Transmission Efficiency Time(s) Packets Standard 3.21 70 70 With algorithm 1 2.15 28 41 With algorithm 2 1.97 20 37 When the algorithm 2 was used the number of files was reduced to 394 data packets, at a total size of 579276 bytes (average 1472 bytes). Only 5930 packets were required and only 20 seconds were needed to transmit the information. The number of files as well as number of packets sent was reduced to 27%. The transfer time was reduced to 28.6%. Above results show an optimal usage of size MTU packet in a reduced amount of time, although the information sent was 5% bigger than the first one (because the added tags identified files in packets). Also, the number of sent packets had been reduced. The experiment contained two parts: preparing the packets and sending the information. The algorithms were implemented in C++ language. In this case, the time to prepare the packets with algorithm I was 13 seconds and for second algorithm 17 seconds were required. In this stage of investigations we didn’t optimize the speed of computer programs. We expect that after eliminating intermediate disk operations in these programs they will run at least 10 times faster. Anyway, in this experiment the total transmission times were reduced to 58.6% and to 52.9% respectively. Time needed to retrieve information on the receiving side (client side) can be neglected in comparison with time required for packet preparation. For the algorithm 1 (typically it was less than 10ms) it is only time required for localization file in unpacking packet and for algorithm 2 additional times for single compressing process of the data part of packet (typically was less than 100 ms). VI. CONCLUSION This paper has presented a method to measure the performance of network monitoring system operations using traffic reduction and multi agent approach. The initial results show that multi agent perform better when the number of managed agent increase significantly. In this paper, we have described techniques for compressing the link structure of the agent, and have preliminary experimental results on compression packet and access speed. The performed tests have proved that the developed multi agents system improves transmission band usage. As a result, the number of transmitted packets (frames) has been reduced several times. VII. REFERENCES [1]. M.Adler and M.Mitzenmacher,“Towards compressing web graphs”, In Proc. of the IEEE DCC, March 2001, pp. 203-212. [2]. T. Suel, J. Yuan, “Compressing the Graph Structure of the Web”, Proc. of the IEEE DCC, March 2001, pp. 213-222. [3]. R. Krashinsky, “Efficient Web Browsing for Mobile Clients using HTTP Compression”, Technical Report MIT-LCS-TR-882, MIT Lab for Computer Science, Jan. 2003. [4]. J. Nagle, “Congestion Control In TCP/IP Internetworks”, RFC 896, 6 January 1984. [5]. S. E. Spero, “Next Generation Hypertext Transport Protocol”, InternetDraft, March 1995. [6]. J. B. Postel, “Transmission Control Protocol”, RFC 793, September 1981 [7]. B. Choi, N. Bharade, Network traffic reduction by hypertext compression, Proc. of the International Conference on Internet Computing, 2002, pp. 877- 882. [8]. E. Weigle, W. Fang, “A Comparison of TCP Automatic Tuning Techniques for Distributed Computing”, Proc. Of the 11th IEEE International Symposium on HPDC, November 2002. [9]. J. J. Garret, “Ajax: A New Approach to Web Applications”,http://www.adaptivepath.com/ideas/es says/archives/000385.php, February 2005. [10]. T. Bartczak, S. Paszczyński, B. M. Wilamowski: “Improvement the Computer Network Transmission Band Usage by Packing Agent Technology”, in Proc. of INDIN 2005 The 3rd International IEEE Conference on Industrial Informatics, Perth, Australia, 10-12 August 2005, pp. 209-214. [11]. J. Nagle, “Congestion Control In TCP/IP Internetworks”, RFC 896, 6 January 1984. [12]. S. E. Spero, “Next Generation Hypertext Transport Protocol”, Internet Draft, March 1995. [13]. J. Huang et al., “A Close Examination of Performance and Layer Characteristics of 4G LTE Networks,” Proc. 10th Int’l Conf. Mobile Systems, Applications, and Services (MobiSys 12), ACM, 2012, pp. 225– 238. [14]. S. Dey, “Cloud Mobile Media: Opportunities, Challenges, and Directions”, Proc. Int’l. Conf. Computing,Network and Commun., 2012, pp. 929– 33. [15]. K. Lu, Y. Qian, and H.-H. Chen, “A Secure and Service- Oriented Network Control Framework for WiMAX Networks,” IEEE Commun.Mag., vol. 45, no. 5, May 2009,pp. 124–30. [16]. M. Schlansker, Y. Turner, J. Tourrilhes, and A. Karp, “Ensemble Routing for datacenter networks,” in Proc. 2010 ACM/IEEE Symposium on Architectures for Networking & Commns Systems [17]. S. Bitam and A. Mellouk, “ITS-cloud: Cloud computing for intelligent transportation system,” in Proc. IEEE Global Network. Conf., Anaheim, CA, USA, 2012, pp. 2054–2059. [18]. Y. Zhang, B. Chen, and X. Lu, “Intelligent monitoring system on Refrigerator trucks based on the internet of things,” Wireless Communications and Applications. Berlin, Germany: Springer-Verlag, 2012, pp. 201–206.