Citations


Contact Us

For Marketing, Sales and Subscriptions Inquiries
Rockefeller Center, 45 Rockefeller Plaza
20th Flr Unit #5, New York, NY 10111
United States

Conference List

Review of Computer Engineering Research

December 2020, Volume 7, 2, pp 54-61

Quality Assessment and Monitoring of Networks Using Passive Technique

Abiola Olawale Ilori

,

Omoniyi Ajoke Gbadamosi

,

Oluwafemi Clement Adeusi

Abiola Olawale Ilori 1

Omoniyi Ajoke Gbadamosi 2 Oluwafemi Clement Adeusi 2 

  1. Department of Physical Sciences, Olusegun Agagu University of Science and Technology, Okitipupa, Nigeria. 1

  2. Department of Mathematical Sciences, Olusegun Agagu University of Science and Technology, Okitipupa, Nigeria. 2

Pages: 54-61

DOI: 10.18488/journal.76.2020.72.54.61

Share :

Article History:

Received: 13 July, 2020
Revised: 17 August, 2020
Accepted: 03 September, 2020
Published: 24 September, 2020


Abstract:

Continuous evaluation and monitoring of the network are essential for assessing the network's performance level, and at the same time, it helps to identify and locate problems within the network. This study focuses on the general state of passive network measuring techniques, principally due to its reputation in terms of assessing and monitoring with a high level of accuracy. Olusegun Agagu University of Science and Technology Okitipupa Nigeria network was used as a real-life case study of how the network is being passively monitored and evaluated. For the study, Capsa network analyzer and a double network card splitter were used as the passive tool. Packet size, one-way delay, and packet fragmentation were metrics assessed on the University’s network. Although the capturing device was synchronized with the network, captures are quite short, with some negative values, so the clocks are not simultaneous in the process. However, passive tools were reported to assess and monitor the network's performance efficiently and effectively.
Contribution/ Originality
This study is one of the very few studies which have investigated passive measuring techniques as a tool in the assessment and monitoring of networks. The study reported values with a high level of accuracy. Hence, passive tools are effective in the assessment and monitoring of the network's performance.

Keywords:

Assessment, Computer, Monitor tools, Network , Passive measurement, Performance.

Reference:

[1]          P. Owezarski, IP network monitoring and measurements: Techniques and experiences (Tutorial). In: Boavida F., Monteiro E., Orvalho J. (eds) protocols and systems for interactive distributed multimedia. IDMS 2002. Lecture notes in computer science vol. 2515. Berlin, Heidelberg: Springer, 2002.

[2]          A. J. Karim, "The significance of management information systems for enhancing strategic and tactical planning," Journal of Information Systems and Technology Management, vol. 8, pp. 459-470, 2011.Available at: https://doi.org/10.4301/s1807-17752011000200011.

[3]          O. Icha and E. Agwu, "Effectiveness of social media networks as a strategic tool for organizational marketing management," J Internet Bank Commer, vol. 21, pp. 1-19, 2015.

[4]          A. Scharnhorst, "Complex networks and the web: Insights from nonlinear physics," Journal of Computer-Mediated Communication, vol. 8, p. JCMC845, 2003.Available at: https://doi.org/10.1111/j.1083-6101.2003.tb00222.x.

[5]          C. Rotsos, D. King, A. Farshad, J. Bird, L. Fawcett, N. Georgalas, M. Gunkel, K. Shiomoto, A. Wang, and A. Mauthe, "Network service orchestration standardization: A technology survey," Computer Standards & Interfaces, vol. 54, pp. 203-215, 2017.Available at: https://doi.org/10.1016/j.csi.2016.12.006.

[6]          H. Takabi, J. B. Joshi, and G.-J. Ahn, "Security and privacy challenges in cloud computing environments," IEEE Security & Privacy, vol. 8, pp. 24-31, 2010.Available at: https://doi.org/10.1109/msp.2010.186.

[7]          R. Boutaba, M. A. Salahuddin, N. Limam, S. Ayoubi, N. Shahriar, F. Estrada-Solano, and O. M. Caicedo, "A comprehensive survey on machine learning for networking: evolution, applications and research opportunities," Journal of Internet Services and Applications, vol. 9, pp. 1-99, 2018.Available at: https://doi.org/10.1186/s13174-018-0087-2.

[8]          D. Zhou, Z. Yan, Y. Fu, and Z. Yao, "A survey on network data collection," Journal of Network and Computer Applications, vol. 116, pp. 9-23, 2018.

[9]          A. W. Moore, J. Hall, C. Kreibich, E. Harris, and I. Pratt, "The architecture of a network monitor," In Passive & Active Measurement Workshop (PAM 2003), LaJolla, CA2003.

[10]        H. Tabrizchi and R. Kuchaki, "A survey on security challenges in cloud computing: Issues, threats, and solutions," The Journal of Supercomputing, pp. 1-40, 2020.

[11]        B. Xi, G. Michailidis, and V. N. Nair, "Estimating network loss rates using active tomography," Journal of the American Statistical Association, vol. 101, pp. 1430-1448, 2006.Available at: https://doi.org/10.1198/016214506000000366.

[12]        T. Garrett, L. E. Setenareski, L. M. Peres, L. C. Bona, and E. P. Duarte, "Monitoring network neutrality: A survey on traffic differentiation detection," IEEE Communications Surveys & Tutorials, vol. 20, pp. 2486-2517, 2018.Available at: https://doi.org/10.1109/comst.2018.2812641.

[13]        C. e. a. Fraleigh, Design and deployment of a passive monitoring infrastructure. In: Palazzo S. (eds) evolutionary trends of the internet. IWDC 2001. Lecture notes in computer science vol. 2170. Berlin, Heidelberg: Springer, 2001.

[14]        J. Hall, "Multi-layer network monitoring and analysis. Retrieved from: https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-571.pdf, " 2003.

[15]        J. Gonzalez and M. Papa, "Passive scanning in modbus networks. In: Goetz E., Shenoi S. (eds) critical infrastructure protection. ICCIP 2007," International Federation for Information Processing, vol. 253, pp. 175 – 187, 2008.Available at: https://doi.org/10.1007/978-0-387-75462-8_13.

[16]        G. Gürkan, B. Şerif, and A. Fatih, "Modeling and cimulation of computer networks and systems," Methodologies and Applications, vol. 1, pp. 861-898, 2015.

[17]        P. Arlos, M. Fiedler, and A. A. Nilsson, "A distributed passive measurement infrastructure. In: Dovrolis C. (eds) passive and active network measurement," Lecture Notes in Computer Science, vol. 3431, pp. 215-227, 2005.

[18]        S. Gorlatch, P. Fragopoulou, and T. Priol, On the integration of passive and active network monitoring in grid systems. In: Gorlatch S., Danelutto M. (eds) Integrated Research in GRID Computing. Boston, MA: Springer, 2007.

[19]        V. Mohan, Y. J. Reddy, and K. Kalpana, "Active and passive network measurements: A survey," International Journal of Computer Science and Information Technologies, vol. 2, pp. 1372-1385, 2011.

[20]        B. Yu, "Based on the network sniffer implement network monitoring," in 2010 International Conference on Computer Application and System Modeling, 7, V7-1 - V7-3, 2010.

[21]        P. Asrodia and H. Patel, "Network traffic analysis using packet sniffer," International Journal of Engineering Research and Applications, vol. 2, pp. 854-856, 2012.

[22]        S. Amit, "Sniffers – the threat to ntwork scenarios and associated dimensions," International Refereed Journal of Reviews and Research, vol. 4, pp. 1-13, 2016.

[23]        M. Natarajan, R. A. Sumanth, and A. M. Loretta, "Tools and techniques for network forensics," International Journal of Network Security & Its Applications (IJNSA), vol. 1, pp. 14 – 25, 2009.

Statistics:

Google Scholor ideas Microsoft Academic Search bing Google Scholor

Funding:

This study received no specific financial support.

Competing Interests:

The authors declare that they have no competing interests.

Acknowledgement:

All authors contributed equally to the conception and design of the study.

Related Article

( 1 ) Interactive Algorithms for the Verification of the Equality between Complex and Simplified Boolean-Algebra Expressions in Digital Decoders
( 2 ) Quality Assessment and Monitoring of Networks Using Passive Technique
( 3 ) A Case Study in Teaching: The Factors Determining of Assessmenting the Competence of Technology-Based
( 5 ) A Comprehensive Review of Semiconductor-Type Gas Sensors for Environmental Monitoring
( 6 ) Intensive Patient Monitoring Using LabVIEW
( 8 ) Automatic Gas Leakage Monitoring System Using MQ-5 Sensor
( 9 ) An Unified Approach by Implementing the Secured Authentication Protocol Scheme in Wireless Sensor Networks
( 10 ) Performance Analysis of Routing Protocols for CBR Traffic in Mobile Ad-Hoc Networks
( 12 ) Investigate of Mechanical Fuse in Cardan Shaft Using FEM
( 13 ) Vlsi Architecture of Mimo Detector Using Fixed Complexity Sphere Decoding
( 14 ) Predict Survival of Patients with Lung Cancer Using an Ensemble Feature Selection Algorithm and Classification Methods in Data Mining
( 15 ) Postbuckling Analysis of Functionally Graded Beams Using Hyperbolic Shear Deformation Theory
( 16 ) A Detailed Analysis of Software Cost Estimation Using Cosmic-FFP
( 17 ) Received Signal Strength in a Macrocell in Lagos Environs Using Finite Element Method
( 18 ) RLS Fixed-Lag Smoother Using Covariance Information Based on Innovation Approach in Linear Continuous Stochastic Systems
( 19 ) Lossless Image Compression and Decompression to Improve the PSNR and MSE Values Using Architecture
( 20 ) PAPR Reduction Using Eight Factors Rotating Phase Shift Technique Based on Local Search Algorithm in OFDM
( 21 ) Using ICT Policy Framework as a Panacea for Economic Recession and Instability in Nigeria
( 22 ) Detection and Prevention of Phishing Attack Using Linkguard Algorithm
( 23 ) A Survey on Efficient Power Management Using Smart Socket and IoT
( 24 ) Characterisation of Propagation Loss for a 3G Cellular Network in a Crowded Market Area Using CCIR Model
( 25 ) Network Traffic Analysis Using Queuing Model and Regression Technique
( 26 ) Stability Analysis of Type-2 Fuzzy Process Control Using LMI
( 29 ) An Overview of Advances in Image Colorization Using Computer Vision and Deep Learning Techniques