Glenn Mansfield's research while affiliated with Tohoku University and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (43)
Rapid growth in networks and related services have resulted in demands for more effective, accessible, intelligent and scalable network management systems. Not only managers but also users need access to network management information. Traditional network management architectures are utterly inadequate to meet these requirements. In this work we de...
Unlike in the traditional QoS framework, in a Flexible QoS, intelligent network applications, and hence its users, adapt themselves to the dynamics of the network, thereby allowing a greater control over QoS. A ‘Flexible Network (FN) Layer’ in between the existing Application and Network Layers is proposed, enabling the applications and users to ge...
The Internet traffic being extremely variable and bursty in a wide
range of time scales is usually characterised by a self-similarity
parameter (β), which describes its statistics depending on the
scales of resolution. We study the characteristics on some previous data
and observe that it can have another parameter which is its fractal
dimension (D...
Measuring traffic at high resolution using standard mechanisms poses several problems. In t his paper we discuss the problems and then describe the impl ementation of a system that measures network traffic at very small intervals. Applications of the high resolution tra ffic measurement system are discussed.
Intrusions are in general characterized by some noise or indications. In the network context these signals may be seen in the TCP-RESET packets and the ICMP echo-response or destination/port unreachable packets. Analysis of network traffic has shown that the profiles of such signals due to intrusion attempts are distinctly different from those due...
The occurrence of a fault in the Internet is determined and recorded by a network fault management system. The symptom based packet aggregation technique using packet monitoring is employed for fault detection. The proposed technique is implemented using simple network management protocol (SNMP) based remote network monitoring (RMON) technology and...
The community and tools for illegal access are getting well organized and sophisticated. However, widely deployed defense systems like firewalls are moving toward isolating networks and sites. Attackers and intruders can be anywhere on the earth and deploy collaborating agents to attack any site on the Internet. To counter the threat posed, we need...
The network management usually polls its managed devices in network. Intermediate devices connected subnetworks relay polling packets to destination sub-networks, which causes network delay time and more traffic, called polling cost. Improper location of polling station, NMS, makes more cost and inefficient for network management operation, i.e. mo...
In a distributed network management environment, a NMS (Network Management Station) interacts with several agents in different sub-networks. In the network fault management context, the NMS detects symptoms that indicate some abnormality e.g. a surge in ICMP traffic, which may be caused by some network malfunction or misuse. The occurrence of a sym...
To design and develop user-oriented, flexible and distributed applications which can deal with various users' requirements, new technologies to manage, control and utilize the services of communication networks have to be provided. In this paper, the current challenges faced by large-scale distributed applications are discussed and a framework for...
Network applications such as FTP, WWW, Mirroring etc. are presently operated with little or no knowledge about the characteristics of the underlying network. These applications could operate more efficiently if the characteristics of the network are known and/or are made available to the concerned application. But network characteristics are hard t...
IMI provides a scalable and flexible measurement infrastructure.
It essentially uses RMON-type passive monitoring and on demand, active
probes. It is built on the SNMP framework: so all interactions are
through MIB-variables; security and access control is in place.
Detecting congestion is a challenge and diagnosing it is an even greater
challenge....
SUMMARY To design and develop user-oriented, flexible and distributed applications which can deal with various users' requirements, new technologies to manage, control and utilize the services of communication networks have to be provided.In this paper, the current challenges faced by large-scale distributed applications are discussed and a framewo...
Internet communication is increasingly becoming an important element in daily life. Keeping this network safe from malicious elements is an urgent task for network management. To maintain the security level networks are generally, monitored for indications of usage with ill-intentions. Such indications are events which need to be collated, correlat...
As computer networks expand, there is a pressing need for management systems capable of handling errors. This article proposes an approach based on management proxies to improve the dependability of fault management systems. An effective MIB to implement the proxies is presented, which allows their deployment at virtually no cost. As an example, a...
Network configuration information can be very effectively used for network traffic optimization and improving network performance. Various approaches have been explored to provide a workable and scalable mechanism by which a user or an application can estimate the network cost factor corresponding to several servers. By choosing the server with the...
this paper we have utilised a novel MIB-based naming scheme. The premises on which this scheme is based are as follows:
From the perspective of fault management, traffic characteristics contain symptoms of faults in the network. Symptoms of faults aggregate and are manifested in the aggregate traffic characteristics generally observed by a traffic monitor. It is very difficult for a manager or an NMS to isolate the symptoms manifested in the aggregate traffic charac...
In today's Internet environment, the same service is generally
available in many places and the redundancy is increasing with Web and
FTP-server mirroring. Retrieving information from the closest server is
desirable. Otherwise, it is inefficient for users as it will take more
time to fetch the desired information. It is also common today for users...
Network fault management systems are mission-critical, for they are most needed during periods when part of the network is faulty. Distributed system-level diagnosis offers a practical and theoretically sound solution for fault-tolerant fault monitoring. It guarantees that faults don’t impair the fault management process. Recently, results from the...
Network configuration information is useful in producing a visual
map of the network complete in all details. The visual map is an
essential component for network management and operations. It is also
possible to generate an inventory report of a network. The inventory
report describes the nodes, networks, interfaces, addresses, protocols,
speeds,...
Configuring a network management system involves the delicate art of balancing the requirement of the management system with the available network resources. Of particular importance is the speed of the communication links, the computing power of the nodes to be managed and the computing power of the management station itself. For effective managem...
In order to achieve a more convenient and intelligent handling of LOTOS specifications, an approach is proposed wherein specifications are translated into an appropriate equational logic language and interpreted. LOTOS has an excellent formal model for describing communication processes and equational logic languages have the capability of inferenc...
There is a need for a Network Map containing infrastructural and service related information about communication networks which is accessible from all places and at all times in a reasonably efficient manner and with reasonable accuracy. However generation and maintenance of such a map is a non-trivial problem as is evidenced by the lack of a map o...
We introduce a nonprofit satellite based academic computer
network, the PARTNERS computer network, that aims to bring the Internet
within the reach of the Asia-Pacific region. The PARTNERS computer
network is a part of the PARTNERS project, launched by the Ministry of
Post and Telecommunications in 1991. In the PARTNERS project, an
experimental sat...
File retrieval constitutes a major component of the traffic in the Internet. In the Internet the same file is in general offered by several servers and this redundancy gives rise to a lot of avoidable non-optimality. In this work, a study is carried out to examine and estimate this non-optimality. It is shown that the non-optimality stems from the...
The X.500 directory provides a powerful mechanism for storing and retrieving information about objects of interest. To interpret the information stored in the directory, the schema must be known to all the components of the directory. The rapid increase in the number of schemas and the relatively slow pace of standardization and subsequent publicat...
Network configuration information can be very effectively used for network traffic optimization and improving network performance. FTP traffic, one of the largest consumers of network bandwidth, is taken as a case study of how effectively network configuration information can be used. The idea is essentially to provide a workable and scalable mecha...
In this paper two naming schemes for the X.500 Directory are proposed. One proposal (Network Elements) concernes the representation of computer networks, the other (IP namespace) provides a mapping algorithm for IP addresses to nodes. 1 Network Elements For representing networks in the Directory we model a network as follows. A network comprises of...
There is a need for a framework wherein the infrastructural and service related information about communication networks can be made accessible from all places and at all times in a reasonably efficient manner and with reasonable accuracy. The use of such a map is manifold. A Project (by AIC Systems Lab., Tohoku University Sendai, WIDE Internet Jap...
The authors discuss their idea of an intelligent network
management system. In order to simulate intelligence, the reasoning and
judgement of the human manager are modeled into a knowledge base. The
human managers' view of the network is limited to the Management
Information Base (MIB); thus, the MIB provides the starting point for
the design of th...
This document describes the objects necessary to include information about IP networks and IP numbers in the X.500 Directory. It extends the work "Charting networks in the Directory" [ND] where a general frame work is presented for representing networks in the Diretory by applying it to IP networks. This application of the Directory is intended to...
The authors expand on their experience in a practical network
management system by using the simple network management protocol (SNMP)
in the context of a large-scale open systems interconnection (OSI)-based
campus-network. Various aspects of network management are examined and
the importance of time is shown. The network management infrastructure...
The authors examine the design issues of a practical network
management system using the simple network management protocol (SNMP) in
the context of a large-scale open systems interconnection (OSI)-based
campus-network called TAINS. Various design aspects are examined and the
importance of time-management is examined. In the proposed design,
intell...
TAINS (Tohoku University Academic Information Network System) is an open systems interconnection (OSI)-based large-scale information network. A very large number of the users of TAINS are using personal computers (PCs). Few of them, however, have any sort of network interface, therefore PCs are connected to TAINS via a communication adaptor called...
AMLOG is an equational logic programming language based on the concept introduced by Fribourg. In this language, an amalgamation of logic programming and equational programming is achieved by combining, in the computation procedure, the capability of inferring solutions by means of goal reduction as in logic programming and the term rewriting featu...
An abstract is not available.
Citations
... Keto et. al. [11] proposed an approach to detect port scanning attack by identifying connection attempts resulting RST+ACK packets, 15 minute time window is utilized to capture traffic. However work is limited to TCP port scanning attack techniques due to the fact that closed systems/UDP scan generate ICMP error instead of RST + ACK Packets. ...
... Thanks to the active network monitoring, it allows a quick failure diagnosis, which leads to the failure's shortening. The system is designed mostly for people who want to automatize the process of failure diagnosis and remotely configure and control the status of network devices [3,9,11]. The NMS allows managing network by sharing a variety of functions: automatic networks scanning in the search of devices (SNMP agents ...
... To address these concerns, we have attempted to estimate the network characteristics by analyzing network application logs and network traffic data. We have introduced a method to calculate throughput of a network path by analyzing network application logs and by analyzing network traffic, we have estimated the network congestion pattern [1]. ...
... Nevertheless when there is no reply from the tested node, it is impossible for the tester to determine whether it is the link or the node that has failed or is slow. The test in an arbitrary topology network is thus said to be ambiguous [13]. If a node i sends a test request to node j and times out on the reply, then it is impossible for node i to determine if node j has crashed or alternatively if link ði; jÞ is faulty. ...
... For ftp-retrievals[3], the number of router hops to each server was measured, and by comparing this hop count, a decision was made on the proximity of a server. This method showed some improvement on the choice of the closest server. ...
... 13. The ICMP Echo Request targeting a non-active (13(a)) and an active host (13(b)) hosts [69, 70]. It is abundantly used on Windows and Linux machines by invoking the 'ping' command. ...
Reference: Cyber Scanning: A Comprehensive Survey
... Los ataques a partir de sitios remotos de internet se han convertido en una amenaza cada vez mayos en comparación con los ataques desde sistemas internos, los cuales están decreciendo. [6] Esto se puede determinar al evaluar la relación entre la sofisticación de los ataques comparado contra el nivel de conocimiento técnico del atacante como podemos apreciar en la siguiente grafica: Ante este panorama de alto riesgo de seguridad se busca el desarrollo y permanente evolución de los IDS 9 [5,14,[17][18][19][20][21][22]30] ...
... Diagnosis algorithms for arbitrary topology networks, on the other hand, usually rely on periodic tests or heartbeats, which could lead to battery depletion in sensor nodes. This family is represented by algorithms such as [13], [14], [15], [16], [17], [18]. ...
Reference: System-level diagnosis for WSN: A heuristic
... After networks have been designed and installed, some network management stations (NMS), or a network manager, may be started managing them. The NMS manages its network in two styles -polling and event reporting [1]. NMS usually periodically polls information from Management Information Base (MIB) for managed objects [2], [3]. ...
... A potentially interesting area to investigate would be stream based audio applications and the use of a UDP stream analyser to consider the effects of network congestion. Other specialist analysers that might be of value would be a port to application mapping analyser (a development of ideas in [38]), an anomalous usage analyser (based on ideas in [52]) and a fault history analyser that would be able to feed back into the diagnostic cycle and offer a capability to predict potential faults within a domain based on its configuration. Such a tool might well adopt recent developments in telecommunications networks using data mining and machine learning techniques [9] [35]. ...