scholarly journals Prototype Implementation Of A Demand Driven Network Monitoring Architecture

2008 ◽  
pp. 85-96 ◽  
Author(s):  
Augusto Ciuffoletti ◽  
Yari Marchetti ◽  
Antonis Papadogiannakis ◽  
Michalis Polychronakis

Research community interacts by means of multi-domain networks. Operating policies, set of hardware components, customers, bandwidth configuration varies from network to network. Hard failures like fiber cut, power failures are easy to detect while soft failures which result in packet loss and degrade the throughput are difficult to detect. Present network monitoring tools are subject to single administrative domain. Hence, network cannot be monitored over multiple domains. Performance focused Service Oriented Network monitoring ARchitecture (perfSONAR) is designed and developed by open source community which supports advanced level of network monitoring across multi domain network. In this paper, I have focused on the importance of multi-domain network monitoring and reviewed the work of perfSONAR proposed by various researchers.


2021 ◽  
Vol 253 ◽  
pp. 108889
Author(s):  
Yadvinder Malhi ◽  
Cécile Girardin ◽  
Daniel B. Metcalfe ◽  
Christopher E. Doughty ◽  
Luiz E.O.C. Aragão ◽  
...  

2021 ◽  
Vol 1 (2) ◽  
pp. 340-364
Author(s):  
Rui Araújo ◽  
António Pinto

Along with the use of cloud-based services, infrastructure, and storage, the use of application logs in business critical applications is a standard practice. Application logs must be stored in an accessible manner in order to be used whenever needed. The debugging of these applications is a common situation where such access is required. Frequently, part of the information contained in logs records is sensitive. In this paper, we evaluate the possibility of storing critical logs in a remote storage while maintaining its confidentiality and server-side search capabilities. To the best of our knowledge, the designed search algorithm is the first to support full Boolean searches combined with field searching and nested queries. We demonstrate its feasibility and timely operation with a prototype implementation that never requires access, by the storage provider, to plain text information. Our solution was able to perform search and decryption operations at a rate of, approximately, 0.05 ms per line. A comparison with the related work allows us to demonstrate its feasibility and conclude that our solution is also the fastest one in indexing operations, the most frequent operations performed.


Author(s):  
Tao Li ◽  
Hani Salah ◽  
Mu He ◽  
Thorsten Strufe ◽  
Silvia Santini

Author(s):  
P. Kousha ◽  
Kamal Raj S. D. ◽  
H. Subramoni ◽  
D. K. Panda ◽  
H. Na ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document