WeCreativez WhatsApp Support
Frank Umeadi - Administrator (Online, WhatsApp)
My name is Frank Umeadi. I am online and ready to help you via WhatsApp chat. Let me know if you need my assistance.

Download the complete Computer Science project topic and material (chapter 1-5) titled A GEOMETRIC APPROACH TO IMPROVING ACTIVE PACKET LOSS MEASUREMENT here on PROJECTS.ng. See below for the abstract, table of contents, list of figures, list of tables, list of appendices, list of abbreviations and chapter one. Click the DOWNLOAD NOW button to get the complete project work instantly.

3,000.00

The Project File Details

  • Name: A GEOMETRIC APPROACH TO IMPROVING ACTIVE PACKET LOSS MEASUREMENT
  • Type: PDF and MS Word (DOC)
  • Size: [33 KB]
  • Length: [38] Pages

 

ABSTRACT

Measurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. While active probe tools are commonly used to measure packet loss on end-to-end paths, there has been little analysis of the accuracy of these tools or their impact on the network. The objective of our study is to understand how to measure packet loss episodes accurately with end-to-end probes. We begin by testing the capability of standard Poisson- modulated end-to-end measurements of loss in a controlled laboratory environment using IP routers and commodity end hosts. Our tests show that loss characteristics reported from such Poisson-modulated probe tools can be quite inaccurate over a range of traffic conditions. Motivated by these observations, we introduce a new algorithm for packet loss measurement that is designed to overcome the deficiencies in standard Poisson-based tools. Specifically, our method entails probe experiments that follow a geometric distribution to 1) enable an explicit trade-off between accuracy and impact on the network, and 2) enable more accurate measurements than standard Poisson probing at the same rate. We evaluate the capabilities of our methodology experimentally by developing and implementing a prototype tool, called BADABING. The experiments demonstrate the trade-offs between impact on the network and measurement accuracy. We show that BADABING reports loss characteristics far more accurately than traditional loss measurement tools.

 

 

TABLE OF CONTENTS

TITLE PAGE

CERTIFICATION

APPROVAL

DEDICATION

ACKNOWLEDGEMENT

ABSTRACT

TABLE OF CONTENT

CHAPTER ONE

1.0    INTRODUCTION

1.1    STATEMENT OF PROBLEM

1.2    PURPOSE OF STUDY

1.3    AIMS AND OBJECTIVES

1.4    SCOPE OF THE STUDY

1.5    LIMITATIONS

1.6    DEFINITION OF TERMS

CHAPTER TWO

2.0    LITERATURE REVIEW

CHAPTER THREE

3.0    METHODOLOGY FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM MATTER

CHAPTER FOUR

4.0    THE FUTURES, IMPLICATIONS AND CHALLENGES OF THE SUBJECT MATTER FOR THE SOCIETY.

CHAPTER FIVE

5.0    SUMMARY, RECOMMENDATIONS AND CONCLUSION

REFERENCE

 

CHAPTER ONE

1.0 INTRODUCTION

Measurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. While active probe tools are commonly used to measure packet loss on end-to-end paths, there has been little analysis of the accuracy of these tools or their impact on the network. The objective of our study is to understand how to measure packet loss episodes accurately with end-to-end probes. We begin by testing the capability of standard Poisson-modulated end-to-end measurements of loss in a controlled laboratory environment using IP routers and commodity end hosts. Our tests show that loss characteristics reported from such Poisson-modulated probe tools can be quite inaccurate over a range of traffic conditions. Motivated by these observations, we introduce a new algorithm for packet loss measurement that is designed to overcome the deficiencies in standard Poisson-based tools. Specifically, our method entails probe experiments that follow a geometric distribution to 1) enable an explicit trade-off between accuracy and impact on the network, and 2) enable more accurate measurements than standard Poisson probing at the same rate. We evaluate the capabilities of our methodology experimentally by developing and implementing a prototype tool, called BADABING.

The experiments demonstrate the trade-offs between impact on the network and measurement accuracy. We show that BADABING reports loss characteristics far more accurately than traditional loss measurement tools.

 

 

1.1   STATEMENT OF PROBLEM

The statutory duty of the federal active packet loss measurement, prevention and intelligence Bureau (FIIB) is active packet loss measurement, prevention and intelligence network which is solely based on information.  This information received from conducted investigation, which should be supplied to the Bureau within minutes using electron communication.  But this takes days or weeks and sometimes months if the investigation is carried in a distant area.  The storage medium currently at disposal for information is susceptible to unauthorized access and damage.  Most often, the recorded information is usually not within the reach when needed.  Going by this high level of graft in the country, officers can easily remove: recorded information of a very serious crime activity by mere bribe offer.  In view of the above problems w3hich have attracted the author’s attention, he has unequivocally, decided to design a computer base system which will correct this abnormalities.

 

1.2 Purpose of study

The main aim of this study is to efficient managing detection of network and its component using snmp in order to improve their transaction rate of services to their various customers.

 

1.3 Aims and objectives

  1. The present invention is to provide a method and system for generating a number stream that, using the most advanced cryptanalytic and statistical methods available.
  2. To provide a method and system for generating an asynchronous pin code number which is non-deterministic?
  3. The present invention is to provide a method and system for guaranteeing that no particular subsequence of an asynchronous pin code number or derivative value is used twice while at the same time eliminating vulnerabilities associated with keeping records of values generated.
  4. To provide a method and system for generating an asynchronous pin code number which is immune to attack and compromise.
  5. To provide a method and system for generating an asynchronous pin code number which utilizes the apparently automatic nature of ordered systems generally?

XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks has speed up the assigning of number to both individuals. It has helped many organizations to easy the heavy burden associated with manual method of assigning number to their clients. It has helped in the generation, processing and storing of effective and reliable numbers.

 

1.4 Scope of the study

The research is for Ad-Hoc Networks as it is maintained with MTN Nigeria. It critically studies the current system in use defecting the problem facing the system, analysis of the problem and coming up with a modified system that well solve the current and further problem that may come up with little or no modification. This will do a lot of good.

 

1.5   Limitations

Our time and money was our major physical problem during the course of the project work. (or should I say my time and money) with my studies and exams at hand I just have limited time to carryout this research very extensively. However, I did a detailed research work.

 

1.6   Definition of terms

Asynchronous relating to or using an electronic communication method that sends data in one direction, one character at a time

COMPUTER is an electronic device used for to accept data inform of input and process the data, store the data and has the ability to retrieve stored data.

HARDWARE is the physical component of computer

SYSTEM is the collection of all part of computer including human being.

STAFF is the person working in an organization.

STORAGE is a media for storing data/information.

DATABASE is the collection of related files.

TELEPHONE is an instrument that sends and receives voice messages and data.

Telephone call a communication carried out using the telephone

Telephone booth an enclosed or partly enclosed space with a pay telephone in it

Telephone number the sequence of numbers that identifies a particular telephone and that must be dialed for a caller to be connected to it

HARDWARE: This is the electromechanical part of computer system.

INFORMATION: This is data that have been processed, interpreted and understood by the recipient of the message or report.

INTERNET is a collection of computer networks that operate to common standards and enable the computes and the prog re-ram they run to communicate directly.

SERVER: This is a process that provides requested services for clients.

SOFTWARE: This is a logically written program that hardware uses to perform it’s operation.

System is the collection of hardware, software, data information, procedures and people.

Website is a space or location customized by a company, organization or an individual which is locatable within an address on the internet.

 

 

GET THE FULL WORK