AZƏRBAYCAN MİLLİ ELMLƏR AKADEMİYASI
KOMPÜTER ŞƏBƏKƏLƏRİNİN MONİTORİNQİ ÜSULLARININ İNKİŞAFI MEYLLƏRİNİN ANALİZİ (rus.)
Şıxəliyev Ramiz H.

Bu gün kompüter şəbəkələrinin (KŞ) idarə olunması üçün effektiv qərarların qəbul edilməsi onları monitorinq etmədən mümkün deyil. KŞ-lərin müxtəlif göstəricilərinin mönitorinqi onların vəziyyəti haqqında lazımi informasiyanın əldə edilməsinə imkan verir. İşdə KŞ-lərin mönitorinqi üsullarının inkişafına, KŞ-lərin özlərinin inkişafı kontekstində baxılır. KŞ-lərin mönitorinqi problemlərinə monitorinqin paylanmış arxitekturasının yaradılması, monitorinq üsullarının intelletuallaşdırılması, böyük həcmdə şəbəkə verilənlərinin toplanması, saxlanması və analizi, şəbəkə trafikinin klassifikasiyası və klasterizasiyası, şəbəkə monitoriniqinin vizuallaşdırılması, QoS (Quality of Service) monitorinq Wi-Fi şəbəkələrin monitorinqi kimi aspektlərdən baxılmış və bu problemlərin həllərinə mövcud yanaşmalar qısa şərh edilmişdir. (səh. 75-87)

Açar sözlər: kompüter şəbəkələri, monitorinq, monitorinqin paylanmış arxitekturası, ölçmə və monitorinq üsullarının intelletuallaşdırılması, şəbəkə trafikinin klassifikasiyası və klasterizasiyası, şəbəkə monitoriniqinin vizuallaşdırılması, QoS monitorinq, Wi-Fi şəbəkələrin monitorinqi.
DOI : 10.25045/jpit.v07.i2.08
Ədəbiyyat
  • Vokorokos L., Adam N., Balaґz A., Application of intrusion detection systems in distributed computer systems and dynamic networks // Computer Science and Technology Research Survey, 2008, pp.19–24.
  • www3.nd.edu/~dwang5/courses/fall15/pdf/evolution.pdf
  • Poulton S., Packet Switching and x.25 networks, Taylor & Francis e-Library, 2003, 236 p.
  • http://en.wikipedia.org/wiki/ARPANET
  • http://en.wikipedia.org/wiki/World_Wide_Web
  • Clark D.D., Pogran K.T. and Reed D.P, An introduction to local area networks // Proceedings of the IEEE, 1978, vol.66, no.11, pp.1497–1517.
  • Boggs D.R. and Metcalfe R.M., Ethernet: Distributed packet switching for local computer networks // Communications of the ACM, 1976, vol.19, no.7, pp.395–404.
  • http://en.wikipedia.org/wiki/NetWare
  • Swift C., Machine Features for a More Automatic Monitoring System on Digital Computers // ACM (JACM), 1957, vol.4, no.2, pp.172–173.
  • Schulman F. Hardware measurement device for IBM system/360 time sharing evaluation / Proceedings of the 22nd national conference ACM Annual Conference/Annual Meeting, 1967, pp.103–109.
  • Grochow J., The graph display as an aid in the monitoring of a time shared computer system. Technical Report: TR-54, 1968.
  • Pikerton T., Performance monitoring in a time-sharing system // Communications of the ACM, November 1969, vol.12, no.11, pp.608–610.
  • Barton B., Switlik J., A real-time expert system for computer network monitor and control / // ACM SIGMIS Database, 1988, vol.19, no.2, pp.35–38.
  • Hitson B., Knowledge-based monitoring and control: an approach to understanding behavior of TCP/IP network protocols // ACM SIGCOMM Computer Communication Review, 1988, vol.18, no.4, pp.210–221.
  • Waldbusser S., Remote Network Monitoring Management Information Base. RFC 1757, Feb. 1995.
  • Cheikhrouhou M. M., Conti P., Labetoulle J., Intelligent Agents in Network Management: A State-of-the-art // Networking and Information Systems, 1998, vol.no.1, pp.9–38.
  • Koch F.L., Westphall C.B., Decentralized Network Management Using Distributed Artificial Intelligence // Network and Systems Management, 2001, vol.9, no.4, pp.375–388.
  • Yuming J., Chen-Khong T., Chi-Chung K., A Web-Based Real-Time Traffic Monitoring Scheme Using CORBA / Proceedings of the 2nd IFIP/IEEE International. Conference on Management of Multimedia Networks and Services, 1998, pp.16–18.
  • www.ois.com/Products/what-is-corba.html
  • Kamangar F., Levine D., Záruba G.V., and Chitturi N., Distributed network monitoring using mobile agents paradigm / Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003, pp. 951–957.
  • Li L., Thottan M., Sanjoy B.Y.P., Distributed network monitoring with bounded link utilization in IP networks / Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. 2003, vol. 2, pp.1189–1198.
  • Liu X., Yin J., Cai Z., Lu X., Chen S., Optimizing the distributed network monitoring model with bounded bandwidth and delay constraints by neural networks / Advances in Neural Networks – ISNN 2005, volume 3496 of the series Lecture Notes in Computer Science, 805–810.
  • Du X., Toward efficient distributed network monitoring / IEEE International Conference on Performance, Computing, and Communications, 2004, pp.87–94.
  • Elsen L., Kohn F., Decker C., Wattenhofer R., goProbe: a scalable distributed network monitoring solution / IEEE International Conference on Peer-to-Peer Computing, 2015, pp.1–10.
  • Lee Y., Kang W., Son H., An Internet Traffic Analysis Method with MapReduce / Proceedings of the Network Operations and Management Symposium Workshops (NOMS Wksps), 2010 IEEE/IFIP, 2010, pp.357–361.
  • Aceto G., Botta A., Pescape A., Westphal C., Efficient Storage and Processing of
    High-Volume Network Monitoring Data // IEEE Transactions on Network and Service Management, 2013, vol.10, no.2, pp.162–175.
  • Aceto G., Botta A., de Donato W., Pescape A., Cloud Monitoring: A Survey // Computer Networks, 2013, vol.57, no.9, pp.2093–2115.
  • Deri L., Cardigliano A., Fusco F., 10 Gbit Line Rate Packet-to-Disk Using n2disk / Proceedings IEEE INFOCOM, 2013, pp. 3399–3404.
  • Banks D., Custom Full Packet Capture System, SANS, 2013.
  • Francois J., State R., Engel T., Aggregated Representations and Metrics for Scalable Flow Analysis / IEEE Conference on Communications and Network Security (CNS), 2013, 478–482.
  • Sivashakthi T., Prabakaran N., A Survey on Storage Techniques in Cloud Computing // International Journal of Emerging Technology and Advanced Engineering, 2013, vol.3, no.12, pp.125–128.
  • Spoorthy V., Mamatha M., Santhosh Kumar B., A Survey on Data Storage and Security in Cloud Computing // International Journal of Computer Science and Mobile Computing, 2014, vol.3, no.6, pp.306–313.
  • Шыхалиев Р.Г. О применении интеллектуальных технологий в мониторинге компьютерных сетей // Искусственный интеллект, 2011, №1, с.124–132.
  • Kim H., Fomenkov M., Barman D., Faloutsos M., and Lee K., Internet traffic classification demystified: myths, Caveats, and the Best Practices // Proceedings of the 4th Conference on Emerging Network Experiment and Technology, December 09–12, 2008, pp.112–124.
  • Karagiannis T., Broido A., Brownlee N., and Claffy K., Is P2P dying or just hiding? / Proceedings of the 47th annual IEEE Global Telecommunications Conference, 2004, vol.3, pp.1532–1538.
  • Silver B., Netman: A learning network traffic controller / Proceedings of the Third International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, Association for Computing Machinery, 1990, vol. 2, pp.923–931.
  • Frank J., Machine learning and intrusion detection: Current and future directions / Proceedings of the National 17th Computer Security Conference, 1994, pp.22–33.
  • Shikhaliyev R.H., About Methods for Visualizing Network Monitoring / Proceedings of the 4th International Conference Problems of Cybernetics and Informatics, Baku, Azerbaijan, September 12-14, 2012, vol.1. pp.69–70.
  • A.Keim, Information Visualization and visual data mining // IEEE Transactions on visualization and computer graphics, 2002, vol.7, no. 1, pp. 100–107.
  • Oetiker T., and Rand D., Multi Router Traffic Grapher. www.mrtg.org
  • Oetiker T., Round Robin Database Tool. www.rrdtool.org
  • Keim D. A., Mansmann F., Schneidewind J., and Schreck T., Monitoring Network Traffic with Radial Traffic Analyzer / IEEE Symposium On Visual Analytics Science And Technology, 2006, pp.123–128.
  • Шыхалиев Р.Г., О методах мониторинга и управления QoS компьютерных сетей // Проблемы информационных технологий, 2013, № 1, с. 15–23.
  • ITU-T, Support of IP-based services using IP transfer capabilities, Tech. Rep. Rec. Y.1241, 200.
  • Firoiu V. et al., Theories and Models for Internet Quality of Service // Proc. of IEEE, Special issue on Internet Technology, 2002, vol.90, no.9, pp.1565–1591.
  • Soldatos J., Vayias E., Kormentzas G., On the Building Blocks of Quality of Service in Heterogeneous Ip Networks // IEEE Communications Surveys & Tutorials, 2005, vol.7, no.1, pp.70–89.
  • Karam F., Jensen T., A Survey on QoS in Next Generation Networks // Advances in Information Sciences and Service Sciences, 2010, vol.2, no.4, pp.91–102.
  • Aurrecoechea C., Campbell A., and Hauw L., A Survey of QoS Architectures // Multimedia Systems Journal, 1998, vol.6, no.3, pp.138–151.
  • Braden R., Clark D., and Shenker S., Integrated Services in the Internet Architecture: an Overview, IETF RFC 1633, Tech. Rep., 1994. ftp://ftp.isi.edu/in-notes/rfc1633.txt
  • Li T. and Rekhter Y., A Provider Architecture for Differentiated Services and Traffic Engineering (PASTE), IETF RFC 2430, Tech. Rep., 1998. ftp://ftp.isi.edu/in-notes/rfc2430.txt
  • Blake S., Black D., Carlson M., Davies E., Wang Z., and Weiss W., An Architecture for Differentiated Services, IETF RFC 2475, Tech. Rep., 1998. ftp://ftp.isi.edu/in-notes/rfc2475.txt
  • Jiang Y., Tham C.K., Ko C.C., A QoS distribution monitoring scheme for performance management of multimedia networks / Proc. of IEEE GLOBECOM’99, Brazil, Dec. 1999, Vol. 1A, pp. 64–68.
  • Foster I., Roy A., Sander V., and Winkler L., End-to-End Quality of Service for High-End Applications, Technical Report, Mathematics and Computer Science Division, Argonne National Laboratory, Argonne, 1999. www.mcs.anl.gov/qos/end to end.pdf
  • Stallings W., SNMP, SNMPv2 and RMON: Practical Network Management, 2nd edition, Addison-Wesley, 1996.
  • Jiang Y., Tham C.K., Ko C.C., Challenges and approaches in providing QoS monitoring. International Journal of Network Management, 2000, vol.10, no.6, pp.323–334.
  • irtf.org/raim-2015-papers/raim-2015-paper42.pdf
  • Postel J., Internet control message protocol, RFC 792, 1981, http://www.ietf.org/rfc/rfc792.txt
  • Hinden R. M., A Host Monitoring Protocol, RFC 869, 1983, http://tools.ietf.org/html/rfc869
  • Case J., Fedor , Schoffstall M., Davin J., A Simple Network Management Protocol, RFC 1067, 1988, http://tools.ietf.org/html/rfc1067
  • Case J., Fedor , Schoffstall M., Davin J., A Simple Network Management Protocol, RFC 1157, 1990,  http://www.ietf.org/rfc/rfc1157.txt
  • McCloghrie K., Rose M., Management Information Base for Network Management of TCP/IP-based internets, RFC 1156, 1990, www.ietf.org/rfc/rfc1156.txt