Agent Mobility for Large-scale Network Monitoring
#1

[attachment=3929]
Agent Mobility for Large-scale Network Monitoring System

Synopsis

This project contains a detailed description of the congestion control algorithm of tree-based reliable multicast protocol. This algorithm takes advantage of regular acknowledgements from the receivers that propagate back to the sender via the repair tree. This scalable feedback mechanism is used to collect receiver credits. Complementing the windowing mechanism, packet transmission is smoothed by using a data rate commensurate with the window size. Additional details, such as how to prune slow receivers, and how to implement the rate scheduler on non-real-time systems are also discussed. The performance of the congestion control algorithm is then evaluated in extended LANs, and wide area networks. The fairness of bandwidth sharing with other (TCP) traffic is also evaluated.
Scalability
The protocol should be able to work under a variety of conditions
include multiple network topologies
variable page link speeds
receiver set size can be to the order of at least 1000 - 10000
It is more important to have a good understanding of how and when a protocol breaks than when it works.
Project Architecture



System Configuration

H/W System Configuration
Processor - Pentium “III
Speed - 1.1 Ghz
RAM - 256 MB(min)
Hard Disk - 20 GB
Floppy Drive - 1.44 MB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA

Software Requirements :-

Language : Java RMI, SWING
O/S : WIN2000 Server , TCP/IP
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: scale free network topology, federal agent mobility agreement, large scale submarine models, barabasi scale free network, scale free network model, large scale submarine modelss paper date 5 11 2015, network management agent,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Exploring the design space of social network-based Sybil defenses 1 937 15-02-2017, 02:55 PM
Last Post: jaseela123d
  Critical State-Based Filtering System for Securing SCADA Network Protocols 1 871 14-02-2017, 12:48 PM
Last Post: jaseela123d
  Remote Server Monitoring System For Corporate Data Centers smart paper boy 3 2,878 28-03-2016, 02:51 PM
Last Post: dhanabhagya
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,280 19-09-2014, 12:52 AM
Last Post: [email protected]
  darknet monitoring using honeypot erhhk 0 935 12-09-2014, 06:09 PM
Last Post: erhhk
  LGI Monitoring System full report seminar presentation 1 4,441 18-03-2014, 05:06 AM
Last Post: MichaelPn
  alert based monitoring of stock trading systems project topics 4 3,527 09-02-2014, 12:58 PM
Last Post: Guest
  IEEE Project on Network Simulation using OMNeT++ 3.2 for M.Tech and B.Tech VickyBujju 3 3,066 03-06-2013, 11:13 AM
Last Post: computer topic
  Revisiting Defenses against Large-Scale Online Password Guessing Attacks Projects9 5 3,952 18-03-2013, 12:25 PM
Last Post: computer topic
  DISTRIBUTED MOBILITY MANAGEMENT FOR TARGET TACKING IN MOBILE SENSOR NETWORKS computer science technology 4 3,956 22-02-2013, 03:05 PM
Last Post: seminar details

Forum Jump: