Javascript must be enabled to continue!
Load shedding in network monitoring applications
View through CrossRef
Monitoring and mining real-time network data streams are crucial operations for managing and operating data networks. The information that network operators desire to extract from the network traffic is of different size, granularity and accuracy depending on the measurement task (e.g., relevant data for capacity planning and intrusion detection are very different). To satisfy these different demands, a new class of monitoring systems is emerging to handle multiple and arbitrary monitoring applications.
Such systems must inevitably cope with the effects of continuous overload situations due to the large volumes, high data rates and bursty nature of the network traffic. These overload situations can severely compromise the accuracy and effectiveness of monitoring systems, when their results are most valuable to network operators.
In this thesis, we propose a technique called load shedding as an effective and low-cost alternative to over-provisioning in network monitoring systems.
It allows these systems to handle efficiently overload situations in the presence of multiple, arbitrary and competing monitoring applications. We present the design and evaluation of a predictive load shedding scheme that can shed excess load in front of extreme traffic conditions and maintain the accuracy of the monitoring applications within bounds defined by end users, while assuring a fair allocation of computing resources to non-cooperative applications.
The main novelty of our scheme is that it considers monitoring applications as black boxes, with arbitrary (and highly variable) input traffic and processing cost. Without any explicit knowledge of the application internals, the proposed scheme extracts a set of features from the traffic streams to build an on-line prediction model of the resource requirements of each monitoring application, which is used to anticipate overload situations and control the overall resource usage by sampling the input packet streams. This way, the monitoring system preserves a high degree of flexibility, increasing the range of applications and network scenarios where it can be used.
Since not all monitoring applications are robust against sampling, we then extend our load shedding scheme to support custom load shedding methods defined by end users, in order to provide a generic solution for arbitrary monitoring applications. Our scheme allows the monitoring system to safely delegate the task of shedding excess load to the applications and still guarantee fairness of service with non-cooperative users.
We implemented our load shedding scheme in an existing network monitoring system and deployed it in a research ISP network. We present experimental evidence of the performance and robustness of our system with several concurrent monitoring applications during long-lived executions and using real-world traffic traces.
Title: Load shedding in network monitoring applications
Description:
Monitoring and mining real-time network data streams are crucial operations for managing and operating data networks.
The information that network operators desire to extract from the network traffic is of different size, granularity and accuracy depending on the measurement task (e.
g.
, relevant data for capacity planning and intrusion detection are very different).
To satisfy these different demands, a new class of monitoring systems is emerging to handle multiple and arbitrary monitoring applications.
Such systems must inevitably cope with the effects of continuous overload situations due to the large volumes, high data rates and bursty nature of the network traffic.
These overload situations can severely compromise the accuracy and effectiveness of monitoring systems, when their results are most valuable to network operators.
In this thesis, we propose a technique called load shedding as an effective and low-cost alternative to over-provisioning in network monitoring systems.
It allows these systems to handle efficiently overload situations in the presence of multiple, arbitrary and competing monitoring applications.
We present the design and evaluation of a predictive load shedding scheme that can shed excess load in front of extreme traffic conditions and maintain the accuracy of the monitoring applications within bounds defined by end users, while assuring a fair allocation of computing resources to non-cooperative applications.
The main novelty of our scheme is that it considers monitoring applications as black boxes, with arbitrary (and highly variable) input traffic and processing cost.
Without any explicit knowledge of the application internals, the proposed scheme extracts a set of features from the traffic streams to build an on-line prediction model of the resource requirements of each monitoring application, which is used to anticipate overload situations and control the overall resource usage by sampling the input packet streams.
This way, the monitoring system preserves a high degree of flexibility, increasing the range of applications and network scenarios where it can be used.
Since not all monitoring applications are robust against sampling, we then extend our load shedding scheme to support custom load shedding methods defined by end users, in order to provide a generic solution for arbitrary monitoring applications.
Our scheme allows the monitoring system to safely delegate the task of shedding excess load to the applications and still guarantee fairness of service with non-cooperative users.
We implemented our load shedding scheme in an existing network monitoring system and deployed it in a research ISP network.
We present experimental evidence of the performance and robustness of our system with several concurrent monitoring applications during long-lived executions and using real-world traffic traces.
Related Results
Crane Load Moment System For Offshore Crane Operations
Crane Load Moment System For Offshore Crane Operations
Abstract
History has shown that dependency upon the crane operator to monitor loads and boom angle or load radius do not allow the margin necessary to perform the...
A hybrid approach of artificial neural network-particle swarm optimization algorithm for optimal load shedding strategy
A hybrid approach of artificial neural network-particle swarm optimization algorithm for optimal load shedding strategy
This paper proposes an under-frequency load shedding (UFLS) method by using the optimization technique of artificial neural network (ANN) combined with particle swarm optimization ...
Solar-Powered Wireless Load Cell Application in Kuwait's Field
Solar-Powered Wireless Load Cell Application in Kuwait's Field
Abstract
Artificial-lift systems account for a major portion of Kuwait's heavy-oil production infrastructure. Among these, the sucker rod pump remains the most ec...
A Binary Archimedes Optimization Algorithm and Weighted Sum Method for UFLS in Islanded Distribution Systems Considering the Stability Index and Load Priority
A Binary Archimedes Optimization Algorithm and Weighted Sum Method for UFLS in Islanded Distribution Systems Considering the Stability Index and Load Priority
This study proposes an under-frequency load-shedding (UFLS) scheme based on a binary Archimedes Optimization Algorithm (BAOA) and the Weighted Sum Method (WSM) to maintain the stab...
SARS-CoV-2 viral load peaks prior to symptom onset: a systematic review and individual-pooled analysis of coronavirus viral load from 66 studies
SARS-CoV-2 viral load peaks prior to symptom onset: a systematic review and individual-pooled analysis of coronavirus viral load from 66 studies
Abstract
Background
Since the emergence of COVID-19, tens of millions of people have been infected, and the global death toll a...
Study of Load Shedding by IEC61850 Implementation
Study of Load Shedding by IEC61850 Implementation
The main purpose of this paper is to study the implementation of load shedding under the condition of IEC61850 (Communication Networks and Systems in Substations) communication exc...
Non-Intrusive Monitoring Algorithm for Resident Loads with Similar Electrical Characteristic
Non-Intrusive Monitoring Algorithm for Resident Loads with Similar Electrical Characteristic
Non-intrusive load monitoring is a vital part of an overall load management scheme. One major disadvantage of existing non-intrusive load monitoring methods is the difficulty to ac...
Network Automation
Network Automation
Purpose: The article "Network Automation in the Contemporary Economy" explores the concepts and methods of effective network management. The application stack, Jinja template engin...

