Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/99508.99562acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free access

Efficient use of workstations for passive monitoring of local area networks

Published: 01 August 1990 Publication History

Abstract

Effective management of a local area network (LAN) requires not only a protocol to manage the active entities, but also a means to monitor the LAN channel. This is especially true in shared-channel LANs, such as Ethernet, where the behavior of the LAN as a whole may be impractical to deduce from the states of the individual hosts. Passive monitoring can be done using either a dedicated system or a general-purpose system. Dedicated monitors have been favored for several reasons, but recent workstations, when carefully programmed, are sufficiently powerful to serve this function. Using a workstation offers high-performance graphics and a more flexible environment for collecting and presenting LAN behavior.

References

[1]
Andreas Bechtolsheim, Forest Baskett, and Vaughn Pratt. The SUN workstation architecture. Technical Report 229, Computer Systems Laboratory, Departments of Computer Science and Electrical Engineering, Stanford University, March, 1982.
[2]
David Boggs, John Shoch, Edward Taft, Robert Metcalfe. Pup: An lnternetwork Architecture. Technical Report CSL-79-10, Xerox Palo Alto Research Center, July, 1979.
[3]
Robert Braden. A Pseudo-Machine for Packet Monitoring and Statistics. In Proc. SIGCOMM '88 Symposium on Communications Architectures and Protocols, pages 200-209. SIGCOMM, Stanford, CA, August, 1988.
[4]
Robert T. Braden and Annette L. DeSchon. NNStat: lnternet Statistics Collection Package -- Introduction and User Guide Release 2.3 edition, USC / Information Sciences Institute, Marina del Rey, CA, 1989.
[5]
David R. Cheriton. The V Kernel: A software base for distributed systems. IEEE Software 1 (2): 19-42, April, 1984.
[6]
Peter Eades. A heuristic for graph drawing. Congressus Numerantium 42:149-160, 1984.
[7]
C. Esposito. Graph Graphics: Theory and Practice. Comput. Math. Applic. 15(4):247-253, 1988.
[8]
LANWatch User' s Guide Version 1.2 edition, FTP Software, Inc., Cambridge, MA, 1988.
[9]
Bruce L. Hitson. Knowledge-Based Monitoring and Control: An Approach to Understanding the Behavior of TCP/IP Network Protocols. In Proc. SIGCOMM '88 Symposium on Communications Architectures and Protocols, pages 210-221. Stanford, CA, August, 1988.
[10]
Van Jacobson. Congestion Avoidance and Control. In Proc. SIGCOMM '88 Symposium on Communications Architectures and Protocols, pages 314-329. Stanford, CA. August, 1988.
[11]
Van Jacobson, Craig Leres, and Steve McCanne. tcpdump (manual page) Lawrence Berkeley Laboratory, Berkeley, CA, 1988.
[12]
Tomihisa Kamada and Satoru Kawai. An Algorithm for Drawing General Undirected Graphs. Information Processing Letters 31:7-15, 1989.
[13]
Gerry Kane. MIPS R2000 RISC Architecture. Prentice-Hall, Englewood Cliffs, NJ, 1987.
[14]
Robert M. Metcalfe and David R. Boggs. Ethemet: Distributed Packet Switching for Local Computer Networks. Communications of the ACM 19(7):395-404, July, 1976.
[15]
Jeffrey C. Mogul, Richard F. Rashid, Michael J. Accetta. The Packet Filter: An Efficient Mechanism for User-Level Network Code. In Proc. 11th Symposium on Operating Systems Principles, pages 39-51. Austin, Texas, November, 1987.
[16]
John F. Schoch and Jon A. Hupp. Measured Performance of an Ethernet Local Network. Communications of the ACM 23(12):711-721, December, 1980.
[17]
Michael D. Schroeder, Andrew D. Birrell, Michael Burrows, Hal Murray, Roger M. Needham, Thomas L. Rodeheffer, Edwin H. Satterthwaite, and Charles P. Thacker. Autonet: a High-speed, Self-configuring Local Area Network Using Point-to-point Links. Research Report 59, Digital Equipment Corporation Systems Research Center, April, 1990.
[18]
SunOS Reference Manual Revision A edition, Sun Microsystems, Inc., Mountain View, CA, 1988. Part #800-1751-10.
[19]
C.P. Thacker, E. M. McCreight, B. W. Lampson, R. F. Sproull, and D. R. Boggs. Alto: A personal computer. In D. P. Siewiorek, C. G. Bell, and A. Newell (editor), Computer Structures: Principles and Examples, pages 549-572. McGraw-Hill, 1982. Also CSL-79-11, Xerox Palo Alto Research Center.
[20]
Songnian Zhou. EtherTap. Source code. 1989

Cited By

View all
  • (2017)Randomization Can’t Stop BPF JIT SprayNetwork and System Security10.1007/978-3-319-64701-2_17(233-247)Online publication date: 26-Jul-2017
  • (2015)HELM: Conflict-free active measurement scheduling for shared network resource management2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)10.1109/INM.2015.7140283(113-121)Online publication date: May-2015
  • (2010)Virtual worlds, real trafficProceedings of the first annual ACM SIGMM conference on Multimedia systems10.1145/1730836.1730873(305-316)Online publication date: 22-Feb-2010
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGCOMM '90: Proceedings of the ACM symposium on Communications architectures & protocols
August 1990
318 pages
ISBN:0897914058
DOI:10.1145/99508
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 1990

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

SIGCOMM90
Sponsor:
SIGCOMM90: Communications Architectures & Protocols
September 26 - 28, 1990
Pennsylvania, Philadelphia, USA

Acceptance Rates

Overall Acceptance Rate 462 of 3,389 submissions, 14%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)118
  • Downloads (Last 6 weeks)18
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Randomization Can’t Stop BPF JIT SprayNetwork and System Security10.1007/978-3-319-64701-2_17(233-247)Online publication date: 26-Jul-2017
  • (2015)HELM: Conflict-free active measurement scheduling for shared network resource management2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)10.1109/INM.2015.7140283(113-121)Online publication date: May-2015
  • (2010)Virtual worlds, real trafficProceedings of the first annual ACM SIGMM conference on Multimedia systems10.1145/1730836.1730873(305-316)Online publication date: 22-Feb-2010
  • (2004)VivaldiACM SIGCOMM Computer Communication Review10.1145/1030194.101547134:4(15-26)Online publication date: 30-Aug-2004
  • (2004)VivaldiProceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications10.1145/1015467.1015471(15-26)Online publication date: 30-Aug-2004
  • (2002)Reliable network connectionsProceedings of the 8th annual international conference on Mobile computing and networking10.1145/570645.570657(95-106)Online publication date: 23-Sep-2002
  • (2002)Difficult-path branch prediction using subordinate microthreadsACM SIGARCH Computer Architecture News10.1145/545214.54525030:2(307-317)Online publication date: 1-May-2002
  • (2002)Queue pair IPACM SIGARCH Computer Architecture News10.1145/545214.54524330:2(247-256)Online publication date: 1-May-2002
  • (2002)Timekeeping in the memory systemACM SIGARCH Computer Architecture News10.1145/545214.54523930:2(209-220)Online publication date: 1-May-2002
  • (2002)Going the distance for TLB prefetchingACM SIGARCH Computer Architecture News10.1145/545214.54523730:2(195-206)Online publication date: 1-May-2002
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media