Measurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. While active probe tools are commonly used to measure packet loss on end-to-end paths, there has been little analysis of the accuracy of these tools or their impact on the network. The objective of our study is to understand how to measure packet loss episodes accurately with end-to-end probes. We begin by testing the capability of standard Poisson-modulated end-to-end measurements of loss in a controlled laboratory environment using IP routers and commodity end hosts. Our tests show that loss characteristics reported from such Poisson-modulated probe tools can be quite inaccurate over a range of traffic conditions. Motivated by these observations, we introduce a new algorithm for packet loss measurement that is designed to overcome the deficiencies in standard Poisson-based tools. Specifically, our method entails probe experiments that follow a geometric distribution to 1) enable an explicit trade-off between accuracy and impact on the network, and 2) enable more accurate measurements than standard Poisson probing at the same rate. We evaluate the capabilities of our methodology experimentally by developing and implementing a prototype tool, called BADABING.
The experiments demonstrate the trade-offs between impact on the network and measurement accuracy. We show that BADABING reports loss characteristics far more accurately than traditional loss measurement tools.
1.1 STATEMENT OF PROBLEM
The statutory duty of the federal active packet loss measurement, prevention and intelligence Bureau (FIIB) is active packet loss measurement, prevention and intelligence network which is solely based on information. This information received from conducted investigation, which should be supplied to the Bureau within minutes using electron communication. But this takes days or weeks and sometimes months if the investigation is carried in a distant area. The storage medium currently at disposal for information is susceptible to unauthorized access and damage. Most often, the recorded information is usually not within the reach when needed. Going by this high level of graft in the country, officers can easily remove: recorded information of a very serious crime activity by mere bribe offer. In view of the above problems w3hich have attracted the author’s attention, he has unequivocally, decided to design a computer base system which will correct this abnormalities.
1.2 Purpose of study
The main aim of this study is to efficient managing detection of network and its component using snmp in order to improve their transaction rate of services to their various customers.
1.3 Aims and objectives
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks has speed up the assigning of number to both individuals. It has helped many organizations to easy the heavy burden associated with manual method of assigning number to their clients. It has helped in the generation, processing and storing of effective and reliable numbers.
1.4 Scope of the study
The research is for Ad-Hoc Networks as it is maintained with MTN Nigeria. It critically studies the current system in use defecting the problem facing the system, analysis of the problem and coming up with a modified system that well solve the current and further problem that may come up with little or no modification. This will do a lot of good.
1.5 Limitations
Our time and money was our major physical problem during the course of the project work. (or should I say my time and money) with my studies and exams at hand I just have limited time to carryout this research very extensively. However, I did a detailed research work.
1.6 Definition of terms
Asynchronous relating to or using an electronic communication method that sends data in one direction, one character at a time
COMPUTER is an electronic device used for to accept data inform of input and process the data, store the data and has the ability to retrieve stored data.
HARDWARE is the physical component of computer
SYSTEM is the collection of all part of computer including human being.
STAFF is the person working in an organization.
STORAGE is a media for storing data/information.
DATABASE is the collection of related files.
TELEPHONEis an instrument that sends and receives voice messages and data.
Telephone call a communication carried out using the telephone
Telephone booth an enclosed or partly enclosed space with a pay telephone in it
Telephone number the sequence of numbers that identifies a particular telephone and that must be dialed for a caller to be connected to it
HARDWARE: This is the electromechanical part of computer system.
INFORMATION: This is data that have been processed, interpreted and understood by the recipient of the message or report.
INTERNETis a collection of computer networks that operate to common standards and enable the computes and the prog re-ram they run to communicate directly.
SERVER: This is a process that provides requested services for clients.
SOFTWARE: This is a logically written program that hardware uses to perform it’s operation.
System is the collection of hardware, software, data information, procedures and people.
Website is a space or location customized by a company, organization or an individual which is locatable within an address on the internet