Network Performance Analysis Using Packets Probe For Passive Monitoring
DOI:
https://doi.org/10.31449/inf.v46i7.4307Abstract
Measuring network performance is essential in computer networks, and benchmarking may not be effective for installation in peripheral devices, resulting in replacing those devices and thus increasing cost. In light of this, it is better to have a software system for the network to see its performance rather than the actual design. In this paper, we have developed negative network tomography techniques to infer correlation-level aberrations such as excessive loss rates and delays from path-level measurements. Our system involves placing packet probes in passive monitoring devices on strategic links within the network to learn about network performance with the identification of missing and transmitted packets, and to keep the cost of monitoring and communications infrastructure low. An intuitive graphical user interface(GUI) represents this work provided along with a variety of data, metrics, and statistics related to network results, and this work can be a useful guide for network researchers or other programmers to analyze their networks and understand how to calculate network performance.References
L. Ye et al., “PUFF: A Passive and Universal Learning-based Framework for Intra-domain Failure Detection,” in 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC), 2021, pp. 1–8.
M. Abbasi, A. Shahraki, and A. Taherkordi, “Deep learning for network traffic monitoring and analysis (NTMA): A survey,” Comput. Commun., vol. 170, pp. 19–41, 2021.
P. Manzanares-Lopez, J. P. Muñoz-Gea, and J. Malgosa-Sanahuja, “Passive in-band network telemetry systems: The potential of programmable data plane on network-wide telemetry,” IEEE Access, vol. 9, pp. 20391–20409, 2021.
D. Perdices, D. Muelas, L. de Pedro, and J. E. L. de Vergara, “Network performance monitoring with flexible models of multi-point passive measurements,” in 2018 14th International Conference on Network and Service Management (CNSM), 2018, pp. 1–9.
L. Rosenfeldt, L. Hansen, and H. Kersten, “The Use of Passive Thermal Probes for the Determination of Energy Fluxes in Atmospheric Pressure Plasmas,” IEEE Trans. Plasma Sci., vol. 49, no. 11, pp. 3325–3335, 2021.
S. H. Shetty, “Trace File Analysis To Obtain Congestion Window, Throughput And PDR,” Eur. J. Mol. Clin. Med., vol. 7, no. 08, p. 2020.
A. Begum, Z. R. Zahid, and N. Nancy, “Comparative performance evaluation of mobile ad-hoc network routing protocols using NS2 simulator,” Int. J. Recent Technol. Eng., vol. 9, no. 3, pp. 707–713, 2020.
K. K. Ofosu, J.-D. Abdulai, and F. A. Katsriku, “Performance evaluation of Mobile IP on mobile ad hoc networks using NS2,” Comput. Sci. Inf. Technol. (CS IT), pp. 15–27, 2018.
I. S. Ibrahim, P. J. B. King, and H.-W. Loidl, “NsGTFA: A GUI Tool to Easily Measure Network Performance through the Ns2 Trace File,” J. Intell. Syst., vol. 24, no. 4, pp. 467–477, 2015.
S. Chettibi, Y. Labeni, and A. Boulkour, “Trace file analyzer for ad hoc routing protocols simulation with NS2,” in 2015 First International Conference on New Technologies of Information and Communication (NTIC), 2015, pp. 1–6.
A. M. M. Habbal, S. Hassan, and A. M. Jabbar, “JDNA: JAVABASED NS-2 ANALYZER,” Wulfenia J, vol. 19, no. 9, 2012.
S. Agrawal, K. V. M. Naidu, and R. Rastogi, “Diagnosing link-level anomalies using passive probes,” Proc. - IEEE INFOCOM, pp. 1757–1765, 2007, doi: 10.1109/INFCOM.2007.205.
A. U. Salleh, Z. Ishak, N. M. Din, and M. Z. Jamaludin, “Trace analyzer for ns-2,” in 2006 4th Student Conference on Research and Development, 2006, pp. 29–32.
J. Alkenani, K. A. Nassar, I. Technology, and C. Information, “Network Monitoring Measurements for Quality of Service : A Review,” no. May, 2022, doi: 10.37917/ijeee.18.2.5.
I. S. Alshawi, Z. A. Abbood, and A. A. Alhijaj, “Extending lifetime of heterogeneous wireless sensor networks using spider monkey optimization routing protocol,” Telkomnika, vol. 20, no. 1, 2022.
K. A. Nassar and A. A. Abdullah, “End-to-End Fuzzy RED to Reduce Packet Loss in Virtual Circuit Network,” J. Univ. Babylon, vol. 25, no. 3, 2017.
B. Constantine, G. Forget, R. Geib, and R. Schrage, “Framework for TCP throughput testing,” Internet Eng. Task Force, vol. 2011, pp. 1–27, 2011.
V. Mohan, Y. R. J. Reddy, and K. Kalpana, “Active and Passive Network Measurements : A Survey,” Comput. Sci. Inf. Technol., vol. 2, no. 4, pp. 1372–1385, 2011.
D. Perdices, D. Muelas, I. Prieto, L. de Pedro, and J. E. L. de Vergara, “On the modeling of multi-point RTT passive measurements for network delay monitoring,” IEEE Trans. Netw. Serv. Manag., vol. 16, no. 3, pp. 1157–1169, 2019.
D. H. Hagos, P. E. Engelstad, A. Yazidi, and Ø. Kure, “General TCP state inference model from passive measurements using machine learning techniques,” IEEE Access, vol. 6, pp. 28372–28387, 2018.
E. Browning, R. Gibb, P. Glover-Kapfer, and K. E. Jones, “Passive acoustic monitoring in ecology and conservation.,” 2017.
A. G. Castro et al., “Near-optimal probing planning for in-band network telemetry,” IEEE Commun. Lett., vol. 25, no. 5, pp. 1630–1634, 2021.
T. Hou, T. Wang, Z. Lu, and Y. Liu, “Combating adversarial network topology inference by proactive topology obfuscation,” IEEE/ACM Trans. Netw., vol. 29, no. 6, pp. 2779–2792, 2021.
Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika