SlideShare a Scribd company logo
1 of 14
Download to read offline
NETWORK TOMOGRAPHY TO ENHANCE THE
PERFORMANCE OF SOFTWARE DEFINED
NETWORK MONITORING AND MANAGEMENT
K M Sabidur Rahman
with Chaitrali Joshi and Tanjila Ahmed (ECS 273)
9/23/20161
9/23/20162
Agenda
•Network Tomography and SDN
•MiniNet Data Collection
•EM algorithm
•Results from EM implementation in R
•Future work
9/23/20163
Network Tomography
“It is the study of a network’s internal characteristics using information
derived from end point data.”
- Wikipedia
• Statistical theory and algorithms are used to estimate internal
characteristics of the network topology
• Flexibility of SDN can be used to make better results
9/23/20164
Shortcomings of current measurement methods
• Impractical to measure packet delays at every router
• Proprietary routers are inflexible
• Geographic separation of routers
• Storing packet information at every node is expensive
• Memory constraints
• Causes congestion in communication
3/14/165
Experimental Setup
• Topology setup using Mininet
• Single source multiple
receiver
• Controller for SDN
• Python based POX
remote controller
S2
H2 S1
S3
H3 H4
H1
9/23/20166
EM Algorithm
•Iterative method for estimation of parameters in a statistical model
•It estimates the maximum likelihood of parameters
•Where the model depends on unobserved latent variable
•E step: Update the conditional expectation(log likelihood) of the parameter
by the given observation
•M step: Find the parameter that maximizes that quantity
9/23/20167
EM Algorithm
y = observed end-to-end delay data
z = unobserved link delay(latent variable)
p=probability of delays on link i
Complete data likelihood can be factorized as :
where we have to estimate and z from end-to-end delay y
9/23/20168
EM Algorithm
Complete data likelihood is dependent on likelihood of z as conditional pmf of y given z does
not have p parameter.
Where ,number of packets that faces delay j on link i
9/23/20169
EM Algorithm
E Step :
M step:
This is our updated estimate of Pij.
9/23/201610
Results
0
5
10
15
20
25
30
Data Link 1
EM
Numberofpackets
Delay (ms)
9/23/201611
Results
0
5
10
15
20
25
30
Data Link 2
EM Link 2
Numberofpackets
Delay (ms)
9/23/201612
Results
0
5
10
15
20
25
30
Data Link 3
EM
Numberofpackets
Delay (ms)
9/23/201613
Future
•Use more data 100,1000,2000
•Use more complex topology
•Use SDN control mechanism to find the minimum measurement needed for
a network
•Explore temporal effects on delays
9/23/201614

More Related Content

What's hot

Mesh Topology Design with Cisco Packet Tracer
Mesh Topology Design with Cisco Packet TracerMesh Topology Design with Cisco Packet Tracer
Mesh Topology Design with Cisco Packet TracerMaksudujjaman
 
APM project meeting - June 13, 2012 - LBNL, Berkeley, CA
APM project meeting - June 13, 2012 - LBNL, Berkeley, CAAPM project meeting - June 13, 2012 - LBNL, Berkeley, CA
APM project meeting - June 13, 2012 - LBNL, Berkeley, CAbalmanme
 
Wireless network setup
Wireless network setupWireless network setup
Wireless network setupMaksudujjaman
 
DNS Server configure with Cisco Packet Tracer
DNS Server configure with Cisco Packet TracerDNS Server configure with Cisco Packet Tracer
DNS Server configure with Cisco Packet TracerShofiqulIslam38
 
Mail Server Configure with Cisco Packet Tracer
Mail Server Configure with Cisco Packet TracerMail Server Configure with Cisco Packet Tracer
Mail Server Configure with Cisco Packet TracerShofiqulIslam38
 
Ring Topology design with Cisco Packet Tracer
Ring  Topology design with Cisco Packet TracerRing  Topology design with Cisco Packet Tracer
Ring Topology design with Cisco Packet TracerShofiqulIslam38
 
Bus Topology Design with Cisco Packet Tracer
Bus Topology Design with Cisco Packet TracerBus Topology Design with Cisco Packet Tracer
Bus Topology Design with Cisco Packet TracerMaksudujjaman
 
Star Topology design with Cisco Packet Tracer
Star Topology design with Cisco Packet TracerStar Topology design with Cisco Packet Tracer
Star Topology design with Cisco Packet TracerShofiqulIslam38
 
Tree Topology design with Cisco Packet Tracer
Tree Topology design with Cisco Packet TracerTree Topology design with Cisco Packet Tracer
Tree Topology design with Cisco Packet TracerShofiqulIslam38
 
Network Simulators Comparison Research Help
Network Simulators Comparison Research HelpNetwork Simulators Comparison Research Help
Network Simulators Comparison Research HelpMatlab Simulation
 
Star Topology Design with Cisco Packet Tracer
Star Topology Design with Cisco Packet TracerStar Topology Design with Cisco Packet Tracer
Star Topology Design with Cisco Packet TracerMaksudujjaman
 
Hybrid Topology Design with Cisco Packet Tracer
Hybrid Topology Design with Cisco Packet TracerHybrid Topology Design with Cisco Packet Tracer
Hybrid Topology Design with Cisco Packet TracerMaksudujjaman
 
Ring Topology Design with Cisco Packet Tracer
Ring Topology Design with Cisco Packet TracerRing Topology Design with Cisco Packet Tracer
Ring Topology Design with Cisco Packet TracerMaksudujjaman
 

What's hot (20)

Mesh Topology Design with Cisco Packet Tracer
Mesh Topology Design with Cisco Packet TracerMesh Topology Design with Cisco Packet Tracer
Mesh Topology Design with Cisco Packet Tracer
 
APM project meeting - June 13, 2012 - LBNL, Berkeley, CA
APM project meeting - June 13, 2012 - LBNL, Berkeley, CAAPM project meeting - June 13, 2012 - LBNL, Berkeley, CA
APM project meeting - June 13, 2012 - LBNL, Berkeley, CA
 
Wireless network setup
Wireless network setupWireless network setup
Wireless network setup
 
DNS Server configure with Cisco Packet Tracer
DNS Server configure with Cisco Packet TracerDNS Server configure with Cisco Packet Tracer
DNS Server configure with Cisco Packet Tracer
 
Ftp server
Ftp serverFtp server
Ftp server
 
Mail Server Configure with Cisco Packet Tracer
Mail Server Configure with Cisco Packet TracerMail Server Configure with Cisco Packet Tracer
Mail Server Configure with Cisco Packet Tracer
 
Ring Topology design with Cisco Packet Tracer
Ring  Topology design with Cisco Packet TracerRing  Topology design with Cisco Packet Tracer
Ring Topology design with Cisco Packet Tracer
 
Bus Topology Design with Cisco Packet Tracer
Bus Topology Design with Cisco Packet TracerBus Topology Design with Cisco Packet Tracer
Bus Topology Design with Cisco Packet Tracer
 
Bus Topology
Bus TopologyBus Topology
Bus Topology
 
Star Topology design with Cisco Packet Tracer
Star Topology design with Cisco Packet TracerStar Topology design with Cisco Packet Tracer
Star Topology design with Cisco Packet Tracer
 
Tree Topology design with Cisco Packet Tracer
Tree Topology design with Cisco Packet TracerTree Topology design with Cisco Packet Tracer
Tree Topology design with Cisco Packet Tracer
 
Ring Topology
Ring TopologyRing Topology
Ring Topology
 
Network Simulators Comparison Research Help
Network Simulators Comparison Research HelpNetwork Simulators Comparison Research Help
Network Simulators Comparison Research Help
 
MAN
MANMAN
MAN
 
LAN
LANLAN
LAN
 
Mesh Topology
Mesh TopologyMesh Topology
Mesh Topology
 
Star Topology Design with Cisco Packet Tracer
Star Topology Design with Cisco Packet TracerStar Topology Design with Cisco Packet Tracer
Star Topology Design with Cisco Packet Tracer
 
Star Topology
Star Topology Star Topology
Star Topology
 
Hybrid Topology Design with Cisco Packet Tracer
Hybrid Topology Design with Cisco Packet TracerHybrid Topology Design with Cisco Packet Tracer
Hybrid Topology Design with Cisco Packet Tracer
 
Ring Topology Design with Cisco Packet Tracer
Ring Topology Design with Cisco Packet TracerRing Topology Design with Cisco Packet Tracer
Ring Topology Design with Cisco Packet Tracer
 

Viewers also liked

Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...iosrjce
 
Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...
Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...
Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...Banking at Ho Chi Minh city
 
5 продвинутых технологий VMware, которые нужно знать
5 продвинутых технологий VMware, которые нужно знать5 продвинутых технологий VMware, которые нужно знать
5 продвинутых технологий VMware, которые нужно знатьSkillFactory
 
Distributed Network Monitoring - Interopnet class by NetBeez
Distributed Network Monitoring - Interopnet class by NetBeezDistributed Network Monitoring - Interopnet class by NetBeez
Distributed Network Monitoring - Interopnet class by NetBeezNetBeez, Inc.
 
Network processing by pid
Network processing by pidNetwork processing by pid
Network processing by pidNuno Martins
 
Архитектура Cisco для сетей мобильного бэкхола.
Архитектура Cisco для сетей мобильного бэкхола.Архитектура Cisco для сетей мобильного бэкхола.
Архитектура Cisco для сетей мобильного бэкхола.Cisco Russia
 
Эволюция транспортной инфраструктуры оператора связи: Cisco Carrier Packet Tr...
Эволюция транспортной инфраструктуры оператора связи: Cisco Carrier Packet Tr...Эволюция транспортной инфраструктуры оператора связи: Cisco Carrier Packet Tr...
Эволюция транспортной инфраструктуры оператора связи: Cisco Carrier Packet Tr...Cisco Russia
 
Виртуализация в сетях мобильной связи
Виртуализация в сетях мобильной связиВиртуализация в сетях мобильной связи
Виртуализация в сетях мобильной связиCisco Russia
 
Защищаем сеть от DDoS-атак
Защищаем сеть от DDoS-атакЗащищаем сеть от DDoS-атак
Защищаем сеть от DDoS-атакSkillFactory
 
Архитектура Cisco EPN для сетей Carrier Ethernet и Mobile Backhaul
Архитектура Cisco EPN для сетей Carrier Ethernet и Mobile BackhaulАрхитектура Cisco EPN для сетей Carrier Ethernet и Mobile Backhaul
Архитектура Cisco EPN для сетей Carrier Ethernet и Mobile BackhaulCisco Russia
 
DDoS-атаки вчера, сегодня, завтра
DDoS-атаки вчера, сегодня, завтраDDoS-атаки вчера, сегодня, завтра
DDoS-атаки вчера, сегодня, завтраQrator Labs
 
[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and ITSite24x7
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring Savvius, Inc
 
04 gsm bss network kpi (tch call drop rate) optimization manual
04 gsm bss network kpi (tch call drop rate) optimization manual04 gsm bss network kpi (tch call drop rate) optimization manual
04 gsm bss network kpi (tch call drop rate) optimization manualtharinduwije
 
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...PerformanceVision (previously SecurActive)
 
Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Duane Bodle
 
измерительное оборудование Ethernet
измерительное оборудование Ethernetизмерительное оборудование Ethernet
измерительное оборудование Etherneteucariot
 
Computer Network Monitoring & Performance
Computer Network Monitoring & PerformanceComputer Network Monitoring & Performance
Computer Network Monitoring & PerformanceDmitry Ponomarenko
 
Ethernet on fpga
Ethernet on fpgaEthernet on fpga
Ethernet on fpgaeucariot
 
Обзор оборудования для построения сетей операторов связи.
Обзор оборудования для построения сетей операторов связи.Обзор оборудования для построения сетей операторов связи.
Обзор оборудования для построения сетей операторов связи.Cisco Russia
 

Viewers also liked (20)

Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
 
Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...
Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...
Ibm tivoli monitoring for network performance v2.1 the mainframe network mana...
 
5 продвинутых технологий VMware, которые нужно знать
5 продвинутых технологий VMware, которые нужно знать5 продвинутых технологий VMware, которые нужно знать
5 продвинутых технологий VMware, которые нужно знать
 
Distributed Network Monitoring - Interopnet class by NetBeez
Distributed Network Monitoring - Interopnet class by NetBeezDistributed Network Monitoring - Interopnet class by NetBeez
Distributed Network Monitoring - Interopnet class by NetBeez
 
Network processing by pid
Network processing by pidNetwork processing by pid
Network processing by pid
 
Архитектура Cisco для сетей мобильного бэкхола.
Архитектура Cisco для сетей мобильного бэкхола.Архитектура Cisco для сетей мобильного бэкхола.
Архитектура Cisco для сетей мобильного бэкхола.
 
Эволюция транспортной инфраструктуры оператора связи: Cisco Carrier Packet Tr...
Эволюция транспортной инфраструктуры оператора связи: Cisco Carrier Packet Tr...Эволюция транспортной инфраструктуры оператора связи: Cisco Carrier Packet Tr...
Эволюция транспортной инфраструктуры оператора связи: Cisco Carrier Packet Tr...
 
Виртуализация в сетях мобильной связи
Виртуализация в сетях мобильной связиВиртуализация в сетях мобильной связи
Виртуализация в сетях мобильной связи
 
Защищаем сеть от DDoS-атак
Защищаем сеть от DDoS-атакЗащищаем сеть от DDoS-атак
Защищаем сеть от DDoS-атак
 
Архитектура Cisco EPN для сетей Carrier Ethernet и Mobile Backhaul
Архитектура Cisco EPN для сетей Carrier Ethernet и Mobile BackhaulАрхитектура Cisco EPN для сетей Carrier Ethernet и Mobile Backhaul
Архитектура Cisco EPN для сетей Carrier Ethernet и Mobile Backhaul
 
DDoS-атаки вчера, сегодня, завтра
DDoS-атаки вчера, сегодня, завтраDDoS-атаки вчера, сегодня, завтра
DDoS-атаки вчера, сегодня, завтра
 
[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring
 
04 gsm bss network kpi (tch call drop rate) optimization manual
04 gsm bss network kpi (tch call drop rate) optimization manual04 gsm bss network kpi (tch call drop rate) optimization manual
04 gsm bss network kpi (tch call drop rate) optimization manual
 
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
 
Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...
 
измерительное оборудование Ethernet
измерительное оборудование Ethernetизмерительное оборудование Ethernet
измерительное оборудование Ethernet
 
Computer Network Monitoring & Performance
Computer Network Monitoring & PerformanceComputer Network Monitoring & Performance
Computer Network Monitoring & Performance
 
Ethernet on fpga
Ethernet on fpgaEthernet on fpga
Ethernet on fpga
 
Обзор оборудования для построения сетей операторов связи.
Обзор оборудования для построения сетей операторов связи.Обзор оборудования для построения сетей операторов связи.
Обзор оборудования для построения сетей операторов связи.
 

Similar to Network tomography to enhance the performance of software defined network monitoring and management

Esri Scotland Conf 2016 SP Energy Networks
Esri Scotland Conf 2016   SP Energy NetworksEsri Scotland Conf 2016   SP Energy Networks
Esri Scotland Conf 2016 SP Energy NetworksEsri UK
 
Rustam Pirmagomedov
Rustam PirmagomedovRustam Pirmagomedov
Rustam PirmagomedovAlexMinov
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETEditor IJCATR
 
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNsA DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNsPriyanka Jacob
 
Odessa Enabling Interactive Perception Applications on Mobile Devices
Odessa Enabling Interactive Perception Applications on Mobile DevicesOdessa Enabling Interactive Perception Applications on Mobile Devices
Odessa Enabling Interactive Perception Applications on Mobile DevicesMiro Cupak
 
Intelligent Routing Algorithm Using Antnet
Intelligent Routing Algorithm Using AntnetIntelligent Routing Algorithm Using Antnet
Intelligent Routing Algorithm Using Antnetijtsrd
 
2009.08 grid peer-slides
2009.08 grid peer-slides2009.08 grid peer-slides
2009.08 grid peer-slidesYehia El-khatib
 
Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetGyan Prakash
 
Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...
Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...
Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...Thiago Genez
 
THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...
THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...
THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...SyafiqahMohamad84
 
Traffic data fusion methodology
Traffic data fusion methodologyTraffic data fusion methodology
Traffic data fusion methodologyJumpingJaq
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
 
Lightweight Routing with QoS Support in Wireless Sensor and Actor Networks (L...
Lightweight Routing with QoS Support in Wireless Sensor and Actor Networks (L...Lightweight Routing with QoS Support in Wireless Sensor and Actor Networks (L...
Lightweight Routing with QoS Support in Wireless Sensor and Actor Networks (L...M. Ilhan Akbas
 
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...ijwmn
 
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...IJECEIAES
 
Clustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow DetectionClustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow DetectionAPNIC
 
Paper id 23201411
Paper id 23201411Paper id 23201411
Paper id 23201411IJRAT
 
Introducing a novel fault tolerant routing protocol in wireless sensor networ...
Introducing a novel fault tolerant routing protocol in wireless sensor networ...Introducing a novel fault tolerant routing protocol in wireless sensor networ...
Introducing a novel fault tolerant routing protocol in wireless sensor networ...ijcsit
 
IRJET- Smart Railway System using Trip Chaining Method
IRJET- Smart Railway System using Trip Chaining MethodIRJET- Smart Railway System using Trip Chaining Method
IRJET- Smart Railway System using Trip Chaining MethodIRJET Journal
 

Similar to Network tomography to enhance the performance of software defined network monitoring and management (20)

Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Esri Scotland Conf 2016 SP Energy Networks
Esri Scotland Conf 2016   SP Energy NetworksEsri Scotland Conf 2016   SP Energy Networks
Esri Scotland Conf 2016 SP Energy Networks
 
Rustam Pirmagomedov
Rustam PirmagomedovRustam Pirmagomedov
Rustam Pirmagomedov
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
 
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNsA DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
 
Odessa Enabling Interactive Perception Applications on Mobile Devices
Odessa Enabling Interactive Perception Applications on Mobile DevicesOdessa Enabling Interactive Perception Applications on Mobile Devices
Odessa Enabling Interactive Perception Applications on Mobile Devices
 
Intelligent Routing Algorithm Using Antnet
Intelligent Routing Algorithm Using AntnetIntelligent Routing Algorithm Using Antnet
Intelligent Routing Algorithm Using Antnet
 
2009.08 grid peer-slides
2009.08 grid peer-slides2009.08 grid peer-slides
2009.08 grid peer-slides
 
Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes Net
 
Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...
Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...
Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...
 
THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...
THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...
THE EFFECTS OF PAUSE TIME ON THE PERFORMANCE OF DSR PROTOCOL IN MOBILE ADHOC ...
 
Traffic data fusion methodology
Traffic data fusion methodologyTraffic data fusion methodology
Traffic data fusion methodology
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
Lightweight Routing with QoS Support in Wireless Sensor and Actor Networks (L...
Lightweight Routing with QoS Support in Wireless Sensor and Actor Networks (L...Lightweight Routing with QoS Support in Wireless Sensor and Actor Networks (L...
Lightweight Routing with QoS Support in Wireless Sensor and Actor Networks (L...
 
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
 
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
 
Clustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow DetectionClustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow Detection
 
Paper id 23201411
Paper id 23201411Paper id 23201411
Paper id 23201411
 
Introducing a novel fault tolerant routing protocol in wireless sensor networ...
Introducing a novel fault tolerant routing protocol in wireless sensor networ...Introducing a novel fault tolerant routing protocol in wireless sensor networ...
Introducing a novel fault tolerant routing protocol in wireless sensor networ...
 
IRJET- Smart Railway System using Trip Chaining Method
IRJET- Smart Railway System using Trip Chaining MethodIRJET- Smart Railway System using Trip Chaining Method
IRJET- Smart Railway System using Trip Chaining Method
 

More from Sabidur Rahman

Smart city- services and technologies
Smart city- services and technologiesSmart city- services and technologies
Smart city- services and technologiesSabidur Rahman
 
Blockchain technology and its’ usecases in computer networks
Blockchain technology and its’ usecases in computer networksBlockchain technology and its’ usecases in computer networks
Blockchain technology and its’ usecases in computer networksSabidur Rahman
 
T-SDN Controllers for Transport Network
T-SDN Controllers for Transport NetworkT-SDN Controllers for Transport Network
T-SDN Controllers for Transport NetworkSabidur Rahman
 
5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewed5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewedSabidur Rahman
 
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...Sabidur Rahman
 
Akamai Edge 2017 reviewed
Akamai Edge 2017 reviewedAkamai Edge 2017 reviewed
Akamai Edge 2017 reviewedSabidur Rahman
 
Understanding mobile service usage and user behavior pattern for mec resource...
Understanding mobile service usage and user behavior pattern for mec resource...Understanding mobile service usage and user behavior pattern for mec resource...
Understanding mobile service usage and user behavior pattern for mec resource...Sabidur Rahman
 
Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MECSabidur Rahman
 
Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...Sabidur Rahman
 
Migration of groups of virtual machines in distributed data centers to reduce...
Migration of groups of virtual machines in distributed data centers to reduce...Migration of groups of virtual machines in distributed data centers to reduce...
Migration of groups of virtual machines in distributed data centers to reduce...Sabidur Rahman
 
Big data and machine learning for network research problems
Big data and machine learning for network research problemsBig data and machine learning for network research problems
Big data and machine learning for network research problemsSabidur Rahman
 
Cost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learningCost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learningSabidur Rahman
 
IoT Mobility Forensics
IoT Mobility ForensicsIoT Mobility Forensics
IoT Mobility ForensicsSabidur Rahman
 
Approximation techniques used for general purpose algorithms
Approximation techniques used for general purpose algorithmsApproximation techniques used for general purpose algorithms
Approximation techniques used for general purpose algorithmsSabidur Rahman
 
Computer Security: Worms
Computer Security: WormsComputer Security: Worms
Computer Security: WormsSabidur Rahman
 

More from Sabidur Rahman (15)

Smart city- services and technologies
Smart city- services and technologiesSmart city- services and technologies
Smart city- services and technologies
 
Blockchain technology and its’ usecases in computer networks
Blockchain technology and its’ usecases in computer networksBlockchain technology and its’ usecases in computer networks
Blockchain technology and its’ usecases in computer networks
 
T-SDN Controllers for Transport Network
T-SDN Controllers for Transport NetworkT-SDN Controllers for Transport Network
T-SDN Controllers for Transport Network
 
5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewed5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewed
 
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
Meeting the requirements to deploy cloud RAN over optical networks - elastic ...
 
Akamai Edge 2017 reviewed
Akamai Edge 2017 reviewedAkamai Edge 2017 reviewed
Akamai Edge 2017 reviewed
 
Understanding mobile service usage and user behavior pattern for mec resource...
Understanding mobile service usage and user behavior pattern for mec resource...Understanding mobile service usage and user behavior pattern for mec resource...
Understanding mobile service usage and user behavior pattern for mec resource...
 
Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MEC
 
Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...Dynamic workload migration over optical backbone network to minimize data cen...
Dynamic workload migration over optical backbone network to minimize data cen...
 
Migration of groups of virtual machines in distributed data centers to reduce...
Migration of groups of virtual machines in distributed data centers to reduce...Migration of groups of virtual machines in distributed data centers to reduce...
Migration of groups of virtual machines in distributed data centers to reduce...
 
Big data and machine learning for network research problems
Big data and machine learning for network research problemsBig data and machine learning for network research problems
Big data and machine learning for network research problems
 
Cost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learningCost savings from auto-scaling of network resources using machine learning
Cost savings from auto-scaling of network resources using machine learning
 
IoT Mobility Forensics
IoT Mobility ForensicsIoT Mobility Forensics
IoT Mobility Forensics
 
Approximation techniques used for general purpose algorithms
Approximation techniques used for general purpose algorithmsApproximation techniques used for general purpose algorithms
Approximation techniques used for general purpose algorithms
 
Computer Security: Worms
Computer Security: WormsComputer Security: Worms
Computer Security: Worms
 

Recently uploaded

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Network tomography to enhance the performance of software defined network monitoring and management