International Journal of Information Technology and Computer Science(IJITCS)
ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)
Published By: MECS Press
IJITCS Vol.6, No.1, Dec. 2013
A New Fault Detection Method Using End-to-End Data and Sequential Testing for Computer Networks
Full Text (PDF, 344KB), PP.93-100
Fault localization, a central part of network fault management, is a process of deducing the exact source of a failure from a set of observed failure indications. in the network, end systems and hosts communicate through routers and links connecting them. When a link or a router faces with a fault, the information sent through these components will be damaged. Hence, faulty components in a network need to be detected and repaired to sustain the health of the network. In this paper we introduce an end to end method that detect and repair the faulty components in the network. The proposed method is a heuristic algorithm that uses the embedded information retrieved from disseminated data over the network to detect and repair faulty components. Simulation results show that our heuristic scheme only requires testing a very small set of network components to detect and repair all faults in the network.
Cite This Paper
Mohammad Sadeq Garshasbi, Shahram Jamali,"A New Fault Detection Method Using End-to-End Data and Sequential Testing for Computer Networks", International Journal of Information Technology and Computer Science(IJITCS), vol.6, no.1, pp.93-100, 2014. DOI: 10.5815/ijitcs.2014.01.11
A. Adams, T. Bu, R. Caceres, N. Duffield, T. Friedman, J. Horowitz F. L. Presti, S. Moon, V. Paxson, and D. Towsley. The use of end-to-end multicast measurements for characterizing internal network behavior. IEEE Communications Magazine, May 2000.
Xin Zhang, Zongwei Zhou, Geoff Hasker, Adrian Perrig and Virgil Gligor, “Network Fault Localization with Small TCB” Network Protocols (ICNP), 2011 19th IEEE International Conference on.
Bing Wang, Wei Wei, Hieu Dinh, Wei Zeng, "Fault Localization Using Passive End-to-End Measurements and Sequential Testing for Wireless Sensor Networks", IEEE TRANSACTIONS ON MOBILE COMPUTING, March 2012, 439 – 452.
Ma łgorzata Steinder, Adarshpal S. Sethi, " A survey of fault localization techniques in computer networks ", Elsevier Science of Computer Programming Volume 53, Issue 2, November 2004, Pages 165–194.
Dipt. di Ing. Elettron. e dell'Inf., Univ. of Perugia, Perugia, " Fault localization in data networks", Communications Letters, IEEE, March 2009.
A.T. Bouloutas, S. Calo, A. Finkel, "Alarm correlation and fault identification in communication networks", IEEE Transactions on Communications, 42 (2–4) (1994), pp. 523–533.
N. Duffield. Network tomography of binary network performancecharacteristics. IEEE Transactions on Information Theory, 52(12),December 2006.
H. X. Nguyen and P. Thiran. Using end-to-end data to infer lossy links in sensor networks. In Proc. of IEEE INFOCOM, April 2006.
K. R. Pattipati and M. G. Alexandridis. Application of heuristic search and information theory to sequential fault diagnosis. IEEE Transactions on Systems, Man and Cybernetics, 20(4):872–887, 1990.
P. P. Lee, V. Misra, and D. Rubenstein. Toward optimal network fault correction in externally managed overlay networks. IEEE Transactions on Parallel and Distributed Systems, 21(3):354–366, March 2010.
A. T. Mizrak, Y.-C. Cheng, K. Marzullo, and S. Savage. Fatih: Detecting and Isolating Malicious Routers. In Proc. of the IEEE Conference on Dependable Systems and Networks (DSN), June 2005.
S. Q. Zhuang, D. Geels, I. Stoica, and R. H. Katz. On Failure Detection Algorithms in Overlay Networks. In Proc. of IEEE INFOCOM, March 2005.
Natu Maitreya, Sethi Adarshpal S. Probabilistic fault diagnosis using adaptive probing. Lecture Notes in Computer Science 2007;4875:38–49.
Jakobson G, Weissman M. Alarm correlation. IEEE Network 1993;7(6):52–9.
Steinder M, Sethi Adarshpal S. A survey of fault localization techniques in computer networks. Science of Computer Programming 2004;52(2):165–94.
Mohamed Abduljalil, Basir Otman. Fusion based approach for distributed alarm correlation in computer networks. In: Second international conference on communication software and networks. Singapore; February 2010. p. 318–24.
Tang Yongning, Al-Shaer Ehab. Overlay fault diagnosis based on evidential reasoning. In: Proceedings of the IEEE INFOCOM. Rio de Janeiro, Brazil; April 2009. p. 2596–600.
Cheng Lu, Qiu Xuesong, Meng Luoming, Qiao Yan, Boutaba Raouf. Efficient active probing for fault diagnosis in large scale and noisy networks. In: Proceedings of the IEEE INFOCOM. San Diego, CA; March 2010. p. 1–9.
Chu LW, Zou SH, Chen SD. Wang WD, Tian CQ. Internet service fault management using active probing in uncertain and noisy environment. In: 4th international conference on communications and networks in China. Xian, China; August 2009. p. 1–5.
Nguyen Hung X, Teixeira Renata, Thiran Patrick, Diot Christophe. Minimizing probing cost for detecting interface failures: algorithms and scalability analysis. In: Proceedings of the IEEE INFOCOM. Rio de Janeiro, Brazil; April 2009. p. 1386–94.
Harvey Nicholas JA, Patrascu Miai, Wen Yonggang, Yekhanin Sergey, Chan Vincent WS. Non-adaptive fault diagnosis for all-optical networks via combi- natorial group testing on graphs. In: Proceedings of the IEEE INFOCOM. Anchorage, AK; May 2007. p. 697–705.
Barfod Paul, Duffield Nick, Ron Amos, Sommers Joel. Network performance anomaly detection and localization. In: Proceedings of the IEEE INFOCOM. Rio de Janeiro, Brazil; April 2009. p. 1377–85.
Zhao Yao, Zhu Zhaosheng, Chen Yan, Pei Dan, Wang Jia. Towards efficient large-scale VPN monitoring and diagnosis under operational constraints. In: Proceedings of the IEEE INFOCOM. Rio de Janeiro, Brazil; April 2009. p. 531–9.
Li Cheng, Zou Shihong, Chu Lingwei. Online learning based internet service fault diagnosis using active probing. In: International conference on network- ing, sensing and control. Okayama, Japan; March 2009. p. 773–8.
Lu Lu,ZhengguoXu, WenhaiWang,YouxianSun, A new fault detection method for computer networks, Reliability Engineering and System Safety 114 (2013) 45–51.