AZERBAIJAN NATIONAL ACADEMY OF SCIENCES
ANALYSING THE DEVELOPMENT TENDENCIES OF MONITORING METHODS OF THE COMPUTER NETWORKS
Ramiz H. Shikhaliyev

Today, the adoption of effective solutions for the management of computer networks (CN) is not possible without their monitoring. Monitoring of various parameters allows the CN to receive the necessary information about their condition. The paper deals with the development of methods for monitoring in the context of the development of the CN. The problems of the CN monitoring in various aspects, such as the construction of a distributed monitoring architecture, intellectualization of monitoring methods, collection, storage and analysis of large volumes of network data, network traffic classification and clustering, network monitoring visualization, QoS monitoring, Wi-Fi networks monitoring, and summarizing of the existing approaches to address these problems (pp.63-73).

Keywords: computer networks, monitoring, distributed monitoring architecture, intellectualization of monitoring techniques, network traffic classification and clustering, network monitoring visualization, QoS monitoring, Wi-Fi networks monitoring.
DOI : 10.25045/jpit.v07.i2.08
References
  1. Vokorokos L., Adam N., Balaґz A., Application of intrusion detection systems in distributed computer systems and dynamic networks // Computer Science and Technology Research Survey, 2008, pp. 19–24.
  2. http://www3.nd.edu/~dwang5/courses/fall15/pdf/evolution.pdf
  3. Poulton S., Packet Switching and x.25 networks, Taylor & Francis e-Library, 2003, 236 p.
  4. http://en.wikipedia.org/wiki/ARPANET
  5. http://en.wikipedia.org/wiki/World_Wide_Web
  6. Clark D.D., Pogran K.T. and Reed D.P, An introduction to local area networks // Proceedings of the IEEE, 1978, vol. 66, no. 11, pp. 1497–1517.
  7. Boggs D.R. and Metcalfe R.M., Ethernet: Distributed packet switching for local computer networks // Communications of the ACM, 1976, vol.19, no. 7, pp. 395–404.
  8. http://en.wikipedia.org/wiki/NetWare
  9. Swift C., Machine Features for a More Automatic Monitoring System on Digital Computers // ACM (JACM), 1957, vol. 4, no. 2, pp. 172–173.
  10. Schulman F. Hardware measurement device for IBM system/360 time sharing evaluation / Proceedings of the 22nd national conference ACM Annual Conference/Annual Meeting, 1967, pp.103–109.
  11. Grochow J., The graph display as an aid in the monitoring of a time shared computer system. Technical Report: TR-54, 1968.
  12. Pikerton T., Performance monitoring in a time-sharing system // Communications of the ACM, November 1969, vol. 12, no. 11, pp. 608–610.
  13. Barton B., Switlik J., A real-time expert system for computer network monitor and control / // ACM SIGMIS Database, 1988, vol.19, no. 2, pp. 35–38.
  14. Hitson B., Knowledge-based monitoring and control: an approach to understanding behavior of TCP/IP network protocols // ACM SIGCOMM Computer Communication Review, 1988, vol. 18, no. 4, pp, 210–221.
  15. Waldbusser S., Remote Network Monitoring Management Information Base. RFC 1757, Feb. 1995.
  16. Cheikhrouhou M. M., Conti P., Labetoulle J., Intelligent Agents in Network Management: A State-of-the-art // Networking and Information Systems, 1998, vol. no.1, pp. 9–38.
  17. Koch F.L., Westphall C.B., Decentralized Network Management Using Distributed Artificial Intelligence // Network and Systems Management, 2001, vol.9, no.4, pp. 375–388.
  18. Yuming J., Chen-Khong T., Chi-Chung K., A Web-Based Real-Time Traffic Monitoring Scheme Using CORBA / Proceedings of the 2nd IFIP/IEEE International. Conference on Management of Multimedia Networks and Services, 1998, pp. 16–18.
  19. http://www.ois.com/Products/what-is-corba.html
  20. Kamangar F., Levine D., Záruba G. V., and Chitturi N., Distributed network monitoring using mobile agents paradigm / Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003, pp. 951–957.
  21. Li L., Thottan M., Sanjoy B. Y. P., Distributed network monitoring with bounded link utilization in IP networks / Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. 2003, vol. 2, pp. 1189–1198.
  22. Liu X., Yin J., Cai Z., Lu X., Chen S., Optimizing the distributed network monitoring model with bounded bandwidth and delay constraints by neural networks / Advances in Neural Networks – ISNN 2005, volume 3496 of the series Lecture Notes in Computer Science, pp. 805–810.
  23. Du X., Toward efficient distributed network monitoring / IEEE International Conference on Performance, Computing, and Communications, 2004, pp. 87–94.
  24. Elsen L., Kohn F., Decker C., Wattenhofer R., goProbe: a scalable distributed network monitoring solution / IEEE International Conference on Peer-to-Peer Computing, 2015, pp. 1–10.
  25. Lee Y., Kang W., Son H., An Internet Traffic Analysis Method with MapReduce / Proceedings of the Network Operations and Management Symposium Workshops (NOMS Wksps), 2010 IEEE/IFIP, 2010, pp. 357–361.
  26. Aceto G., Botta A., Pescape , Westphal C., Efficient Storage and Processing of High-Volume Network Monitoring Data // IEEE Transactions on Network and Service Management, 2013, vol. 10, no. 2, pp. 162–175.
  27. Aceto G., Botta A., de Donato W., Pescape A., Cloud Monitoring: A Survey // Computer Networks, 2013, vol. 57, no. 9, pp. 2093–2115.
  28. Deri L., Cardigliano A., Fusco F., 10 Gbit Line Rate Packet-to-Disk Using n2disk / Proceedings IEEE INFOCOM, 2013, pp. 3399–3404.
  29. Banks D., Custom Full Packet Capture System, SANS, 2013.
  30. Francois J., State R., Engel T., Aggregated Representations and Metrics for Scalable Flow Analysis / IEEE Conference on Communications and Network Security (CNS), 2013, pp. 478–482.
  31. Sivashakthi T., Prabakaran N., A Survey on Storage Techniques in Cloud Computing // International Journal of Emerging Technology and Advanced Engineering, 2013, vol. 3, no. 12, pp. 125–128.
  32. Spoorthy V., Mamatha M., Santhosh Kumar B., A Survey on Data Storage and Security in Cloud Computing // International Journal of Computer Science and Mobile Computing, 2014, vol.3, no.6, pp. 306–313.
  33. Shikhaliyev R.G. About the application of intelligent technologies for computer networks monitoring // Artificial Intelligence, 2011, No 1, pp. 124-132.
  34. Kim H., Fomenkov M., Barman D., Faloutsos M., and Lee K., Internet traffic classification demystified: myths, Caveats, and the Best Practices // Proceedings of the 4th Conference on Emerging Network Experiment and Technology, December 09 - 12, 2008, pp. 112–124.
  35. Karagiannis T., Broido A., Brownlee N., and Claffy K., Is P2P dying or just hiding? / Proceedings of the 47th annual IEEE Global Telecommunications Conference, 2004, vol. 3, pp.1532–1538.
  36. Silver B., Netman: A learning network traffic controller / Proceedings of the Third International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, Association for Computing Machinery, 1990, vol. 2, pp. 923–931.
  37. Frank J., Machine learning and intrusion detection: Current and future directions / Proceedings of the National 17th Computer Security Conference, 1994, pp. 22–33.
  38. Shikhaliyev R.H., About Methods for Visualizing Network Monitoring / Proceedings of the 4th International Conference Problems of Cybernetics and Informatics, Baku, Azerbaijan, September 12-14, 2012, vol. 1. pp. 69–70.
  39. A.Keim, Information Visualization and visual data mining // IEEE Transactions on visualization and computer graphics, 2002, vol. 7, no. 1, pp. 100–107.
  40. T. Oetiker, and D. Rand, Multi Router Traffic Grapher. http://www.mrtg.org
  41. T. Oetiker, Round Robin Database Tool. http://www.rrdtool.org
  42. Keim D. A., Mansmann F., Schneidewind J., and Schreck T., Monitoring Network Traffic with Radial Traffic Analyzer / IEEE Symposium On Visual Analytics Science And Technology, 2006, pp. 123–128.
  43. Shikhaliyev R.G. About the methods of monitoring and QoS management of computer networks // Problems of Information Technologies, 2013, No 1, pp. 15-23.
  44. ITU-T, Support of IP-based services using IP transfer capabilities, Tech. Rep. Rec. Y.1241, 200.
  45. Firoiu V. et al., Theories and Models for Internet Quality of Service // Proc. of IEEE, Special issue on Internet Technology, 2002, Vol. 90, Is. 9 pp. 1565–1591.
  46. Soldatos J., Vayias E., Kormentzas G., On the Building Blocks of Quality of Service in Heterogeneous Ip Networks // IEEE Communications Surveys & Tutorials, 2005, vol. 7, No.1, pp.70–89.
  47. Karam F., Jensen T., A Survey on QoS in Next Generation Networks // Advances in Information Sciences and Service Sciences, 2010, Vol. 2, No. 4, pp. 91–102.
  48. Aurrecoechea C., Campbell A., and Hauw L., A Survey of QoS Architectures // Multimedia Systems Journal, 1998, Vol. 6, No. 3, pp. 138–151.
  49. Braden R., Clark D., and Shenker S., Integrated Services in the Internet Architecture: an Overview, IETF RFC 1633, Tech. Rep., 1994. ftp://ftp.isi.edu/in-notes/rfc1633.txt
  50. Li T. and Rekhter Y., A Provider Architecture for Differentiated Services and Traffic Engineering (PASTE), IETF RFC 2430, Tech. Rep., 1998. ftp://ftp.isi.edu/in-notes/rfc2430.txt
  51. Blake S., Black D., Carlson M., Davies E., Wang Z., and Weiss W., An Architecture for Differentiated Services, IETF RFC 2475, Tech. Rep., 1998. ftp://ftp.isi.edu/in-notes/rfc2475.txt
  52. Jiang Y., Tham C.K., Ko C.C., A QoS distribution monitoring scheme for performance management of multimedia networks / Proc. of IEEE GLOBECOM’99, Brazil, Dec. 1999, Vol. 1A, pp. 64–68.
  53. Foster I., Roy A., Sander V., and Winkler L., End-to-End Quality of Service for High-End Applications, Technical Report, Mathematics and Computer Science Division, Argonne National Laboratory, Argonne, 1999. www.mcs.anl.gov/qos/end to end.pdf
  54. Stallings W., SNMP, SNMPv2 and RMON: Practical Network Management, 2nd edition, Addison-Wesley, 1996.
  55. Jiang Y., Tham C.K., Ko C.C., Challenges and approaches in providing QoS monitoring. International Journal of Network Management, 2000, Vol. 10, No.6, pp. 323–334.
  56. http://irtf.org/raim-2015-papers/raim-2015-paper42.pdf
  57. Postel J., Internet control message protocol, RFC 792, 1981, http://www.ietf.org/rfc/rfc792.txt
  58. Hinden R. M., A Host Monitoring Protocol, RFC 869, 1983, http://tools.ietf.org/html/rfc869
  59. Case J., Fedor , Schoffstall M., Davin J., A Simple Network Management Protocol, RFC 1067, 1988, http://tools.ietf.org/html/rfc1067
  60. Case J., Fedor M., Schoffstall M., Davin J., A Simple Network Management Protocol, RFC 1157, 1990, http://www.ietf.org/rfc/rfc1157.txt
  61. McCloghrie K., Rose M., Management Information Base for Network Management of TCP/IP-based internets, RFC 1156, 1990, http://www.ietf.org/rfc/rfc1156.txt