ABSTRACT Measurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. While active probe tools are commonly used to measure packet loss on end-to-end paths, there has been little analysis of the accuracy of these tools or their impact on the network. The objective of our study is to understand how to measure packet loss episodes accurately with end-to-end probes. We begin by testing the capability of standard Poisson- modulated end-to-end measurements of loss in a controlled laboratory environment using IP routers and commodity end hosts. Our tests show that loss characteristics reported from such Poisson-modulated probe tools can be quite inaccurate over a range of traffic conditions. Motivated by these observations, we introduce a new algorithm for packet loss measurement that is designed to overcome the deficiencies in standard Poisson-based tools. Specifically, our method entails probe experiments that follow a geometric distribution to 1) enable an explicit trade-off between accuracy and impact on the network, and 2) enable more accurate measurements than standard Poisson probing at the same rate. We evaluate the capabilities of our methodology experimentally by developing and implementing a prototype tool, called BADABING. The experiments demonstrate the trade-offs between impact on the network and measurement accuracy. We show that BADABING reports loss characteristics far more accurately than traditional loss measurement tools.
TABLE OF CONTENT TITLE PAGE CERTIFICATION APPROVAL DEDICATION ACKNOWLEDGEMENT ABSTRACT
TABLE OF CONTENT CHAPTER ONE 1.0 INTRODUCTION 1.1 STATEMENT OF PROBLEM 1.2 PURPOSE OF STUDY 1.3 AIMS AND OBJECTIVES 1.4 SCOPE OF THE STUDY 1.5 LIMITATIONS 1.6 DEFINITION OF TERMS
CHAPTER TWO 2.0 LITERATURE REVIEW
CHAPTER THREE 3.0 METHODOLOGY FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM MATTER
CHAPTER FOUR 4.0 THE FUTURES, IMPLICATIONS AND CHALLENGES OF THE SUBJECT MATTER FOR THE SOCIETY.
CHAPTER FIVE 5.0 SUMMARY, RECOMMENDATIONS AND CONCLUSION REFERENCE
A GEOMETRIC APPROACH TO IMPROVING ACTIVE PACKET LOSS MEASUREMENT
ABSTRACT The Transmission Control Protocol (TCP) wad designed to provide reliable end-to-end delivery of data over unreliable networks. In practice most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad hoc Network can lead to TCP implementations with poor performance. In order to... Continue Reading
ABSTRACT This study was aimed at developing a rational approach to septic tank design in order to reduce health risks associated with improperly treated effluent especially in developing countries. To this end, several research tools including questionnaires, pilot scale study and model formulation were employed. Questionnaires were used to... Continue Reading
TABLE OF CONTENTS CHAPTER ONE 1.0 Introduction 1.1 Statement of the Problem 1.2 Purpose of the Study 1.3 Scope of the Study 1.4 Limitations of the Study 1.5 Significance of the Study CHAPTER TWO Literature Review 2.0 Concept of Cost Control 2.1 What is Cost... Continue Reading
TABLE OF CONTENTS CHAPTER ONE 1.0 Introduction 1.1 Statement of the Problem 1.2 Purpose of the Study 1.3 Scope of the Study 1.4 Limitations of the Study 1.5 Significance of the Study CHAPTER TWO Literature Review 2.0 Concept of Cost Control 2.1 What is Cost... Continue Reading
ABSTRACT Virtual Queue-based marking schemes have been recently proposed for AQM (Active Queue Management) in Internet routers. We consider a particular scheme, which we call the Adaptive Virtual Queue (AVQ), and study its following properties: stability in the presence of feedback delays, its ability to maintain small queue lengths and its... Continue Reading
ABSTRACT Network administrators need a thorough understanding of both types of addressing to administer Transmission Control Protocol/Internet Protocol (STACK IP) networks and troubleshoot STACK IP-based communication. This chapter discusses in detail the types of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) addresses,... Continue Reading
ABSTRACT This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastructure, using various forms of denial of service attacks, have led to an increased need for developing techniques for analyzing network traffic. If efficient... Continue Reading
Abstract Induction machine account for about 60percent of the electrical consumption in industrial countries; hence a huge energy savings could be achieved by even a small increment in the machine efficiency. Improving the designs of induction machines requires accurate quantification of the machine losses. A significant portion of the losses in... Continue Reading
CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF STUDY 1.1.1 CORROSION Corrosion is defined as a natural process, which converts refined metal to their more stable oxide. It is the gradual destruction or degradation of materials (usually metals) by chemical reaction with their environment which are most likely inevitable. Corrosion is a natural and... Continue Reading
ABSTRACT` To improve the overall efficiency of the power system, the performance of transmission system must be improved. Some of the vital ways of achieving this objective is by reducing power losses in the system and also improving voltage profile. An important method of controlling bus voltage is by shunt capacitor banks in the transmission... Continue Reading