Show simple item record

An extensible architecture for monitoring and modeling network systems.

dc.contributor.authorWinters, Gerald Andrewen_US
dc.contributor.advisorTeorey, Toby J.en_US
dc.date.accessioned2014-02-24T16:24:20Z
dc.date.available2014-02-24T16:24:20Z
dc.date.issued1995en_US
dc.identifier.other(UMI)AAI9610268en_US
dc.identifier.urihttp://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:9610268en_US
dc.identifier.urihttps://hdl.handle.net/2027.42/104885
dc.description.abstractThis dissertation presents an architecture for monitoring and modeling network systems: a client/server protocol for controlling and monitoring data collection and Management Information Bases (MIBs), designed specifically to support modeling. A prototype system based on this architecture demonstrates its ability to enhance network capacity planning, configuration, and troubleshooting. Prototype implementations are applied to real network problems and the results are analyzed in detail. The network problems used in our examples cannot be solved using current monitoring and modeling technologies; however, we find that network management is improved by providing additional methods not currently available to analyze network troubleshooting problems. Advances in network monitoring protocols, such as SNMP and RMON, combined with their widespread availability from commercial vendors, have led to the development of tools that enable system administrators to effectively manage problem domains, such as network configuration and troubleshooting. The abundance of monitoring and data-gathering tools presents an opportunity to combine network monitoring and modeling technologies to provide enhanced network management capabilities. For example, a network administrator can monitor an existing internetwork and use this information as a basis for capacity-planning projections. Alternative configurations can be compared using "live" network data to characterize the traffic streams, which is superior to using "back-of-the-envelope" estimates. We investigate the feasibility of combining monitoring and modeling technologies, as well as uncovering the difficulties of this combination, by implementing and applying a prototype architecture to a configuration/capacity planning problem. We implement an initial network configuration, collect monitored data on the initial configuration, and then show the change in performance due to different configurations by modeling changes to the initial configuration. We then implement the configuration changes to the network, measure performance results, and compare them to our modeled projected results. The monitored and projected results are shown to be quite close. Our proposed architecture is designed to use commonly available resources and can be tailored for use with many different tools for monitoring, modeling, and data storage, making our approach economically feasible. We also show how monitored data can be made available remotely, possibly to other network administrators, for use in joint problem solving.en_US
dc.format.extent111 p.en_US
dc.subjectEngineering, System Scienceen_US
dc.subjectComputer Scienceen_US
dc.titleAn extensible architecture for monitoring and modeling network systems.en_US
dc.typeThesisen_US
dc.description.thesisdegreenamePhDen_US
dc.description.thesisdegreedisciplineComputer Science and Engineeringen_US
dc.description.thesisdegreegrantorUniversity of Michigan, Horace H. Rackham School of Graduate Studiesen_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/104885/1/9610268.pdf
dc.description.filedescriptionDescription of 9610268.pdf : Restricted to UM users only.en_US
dc.owningcollnameDissertations and Theses (Ph.D. and Master's)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.