Analysis of network management protocols in optical networks
Lim, Kok Seng
McEachen, John C.
Borchardt, Randy L.
MetadataShow full item record
In this thesis, the scalability issues of Simple Network Management Protocol (SNMP) in optical network management are explored. It is important to understand the effect of varying the number of nodes, the request inter-arrival times and the polling interval on the performance of SNMP and number of nodes that can be effectively managed. The current study explored the effect of varying these parameters in a controlled test environment using the OPNET simulation package. In addition, traffic analysis was performed on measured SNMP traffic and statistics were developed from the traffic analysis. With this understanding of SNMP traffic, an SNMPv1 model was defined and integrated into an OPNET network model to study the performance of SNMP. The simulation results obtained were useful in providing needed insight into the allowable number of nodes an optical network management system can effectively manage.
Approved for public release, distribution is unlimited
Showing items related by title, author, creator and subject.
A performance analysis of management information due to data traffic provisioning in a SONET/SDH communications network Tay, Yeong Kiang Winston. (Monterey California. Naval Postgraduate School, 2005-06);An evaluation of the performance of a SONET management system was conducted to better understand its management capabilities due to network disruptions in the presence of a traffic load. This study analyzed the Cisco ...
Walker, T. Owen, III (Monterey, California. Naval Postgraduate School, 2009-09);This dissertation pioneers the concept of traffic-adaptive, flow-specific medium access and demonstrates that it outperforms contention, non-contention and hybrid techniques. The novel traffic-adaptive Cooperative Wireless ...
Performance Impact of Connectivity Restrictions and Increased Vulnerability Presence on Automated Attack Graph Generation Cullum, James; Irvine, Cynthia E.; Levin, Tim (International Conference on Warfare and Security (ICIW) Naval Postgraduate School , Monterey, California, USA 8-9 March 2007 pp.33-46, 2007-03-00);The current generation of network vulnerability detection software uses databases of known vulnerabilities and scans target networks for these weaknesses. The results can be voluminous and difficult to assess. Thus, the ...