The Study of Dynamic Threshold Strategy Based-On Error Correction

  • Zhimin Yang
  • Jie Li
  • Gaofeng Han
  • Yue Wang
  • Songnan Zhao
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 269)

Abstract

Currently, the threshold control for the monitor and management of network equipment functionality adopts both static and dynamic threshold strategies. In traditional dynamic threshold computation methods, there is no support for error data correction and data sampling time interval is long. With these methods, the computed baseline value keeps unchanged within each sampling time interval. Hence, the calculated baseline value is not good at describing the changing trend of network equipment functionality. In other words, it has worse support to applications with real time and dynamic requirement. In this paper, a novel approach for computing dynamic threshold is proposed based on error correction. It improves the traditional dynamic threshold computation model. With the developed system for the monitor and management of network equipment functionality, we prove the feasibility of the dynamic threshold computation based on error correction. Through the experiment, we demonstrate that the dynamic threshold computation based on error correction can improve the threshold predicting accuracy with better support to real time and dynamic requirement. It has excellent performance in describing the changing trend of network equipment functionality.

Keywords

Dynamic threshold Network equipment functionality Development trend Error correction Linear regression 

References

  1. 1.
    Wang Y, Yang Z (2012) Study and implementation of network performance management system based on the dynamic threshold. In: Master Thesis of Shandong UniversityGoogle Scholar
  2. 2.
    James FK, Keith WR (2004) Computer networking a top-down approach featuring the internet, Addison-Wesley, BostonGoogle Scholar
  3. 3.
    Qing H (2008) Study and implementation of network performance management system based on SNMP. J Neimenggu UnivGoogle Scholar
  4. 4.
    Hu M (2009) Design and implementation of an adaptive SNMP System. J SE Normal UnivGoogle Scholar
  5. 5.
    Wang S (2008) Study of abnormal network functional data checking technique based on SNMP. Harbin Eng UnivGoogle Scholar
  6. 6.
  7. 7.
  8. 8.
  9. 9.
    Xie X (2004) Computer networks (the 4th version)Google Scholar
  10. 10.
    Yunsheng L (1994) Real Time database systems. Comput Sci 21(3):42–46Google Scholar
  11. 11.
    Owens M (2006) The definitive guide to SQLite. Apress, New YorkGoogle Scholar
  12. 12.
    Walls C, Breidenbach R (2005) Spring in action. Dreamtech Press, New DelhiGoogle Scholar
  13. 13.
    Elliott J, O’Brien TM, Fowler R (2008) Harnessing hibernate. O’Reilly Media, New YorkGoogle Scholar
  14. 14.
    Holdener III AT (2008) Ajax: the definitive guide. O’Reilly Media, New YorkGoogle Scholar
  15. 15.
    Wu Y (2007) Management monitoring and malfunction prediction based on statistic analysis. J Zhongshan UnivGoogle Scholar
  16. 16.
    Vivek C, Bakore A, Eaves J (2004) Professional Apache Tomcat 5Google Scholar
  17. 17.
    Advanced Mathematics (2007) Department of Tongji University, 6th edn. Advanced Education Publishing House, New DelhiGoogle Scholar
  18. 18.
    Fredrick S, Ramsay C, Blades S (2008) Learning Ext JS. Packt Publishing Limited, MumbaiGoogle Scholar
  19. 19.
    Weathersby J, Bondur T, Chatalbasheva I (2011) Integrating and extending birt. Addison-Wesley Professional, BostonGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  • Zhimin Yang
    • 1
  • Jie Li
    • 2
  • Gaofeng Han
    • 2
  • Yue Wang
    • 1
  • Songnan Zhao
    • 1
  1. 1.Department of Computer ScienceShandong University at WeihaiWeihaiPeople’s Republic of China
  2. 2.Department of Computer ScienceAnhui Wenda Information and Technology CollegeHefeiPeople’s Republic of China

Personalised recommendations