Realistic traffic generation capability for SAAM testbed
MetadataShow full item record
Traffic modeling is an important component of the design of any communication network. This is even more crucial emerging networks, which are expected to operate in high speed and high bandwidth environments. As the design of a network depends to a great extent on the types of traffic it is expected to carry, it is essential to characterize the traffic that a network expected to carry. This is where traffic models are very important. They can be used to produce artificial traffic input that exhibits essential characteristics of real network loads. This thesis describes a design and implementation of a general- purpose traffic generator for a test bed of the Server a Agent Based Active Network Management (SAAM) architecture. The traffic generator is easy to use and implements the four most important traffic models (Constant Bit Rate (CBR), Poisson, Packet-Train, and Self-Similar). With this traffic generator, SAAM project now has the capability of simulating and testing the system components in more accurate and more realistic environments.
Showing items related by title, author, creator and subject.
Sambanis, Konstantinos (2001-03);In recent decades, the networking community has been looking for strategies to converge over a single common network infrastructure carrying voice, video and data. The pervasive and ubiquitous packet-based IP network ...
A best effort traffic management solution for server and agent-based active network management (SAAM) Wofford, Corey D. (Monterey, California. Naval Postgraduate School, 2002-03);Server and Agent-based Active Network Management (SAAM) is a promising network management solution for the Internet of tomorrow, "Next Generation Internet (NGI)." SAAM is a new network architecture that incorporates many ...
Hughes, Jason J. (Monterey, California: Naval Postgraduate School, 2014-03);Computer networks are constantly being actively probed in attempts to build topological maps of intermediate nodes and discover endpoints, either for academic research or nefarious schemes. While some networks employ ...