CFP last date
22 April 2024
Reseach Article

Smart Home Network Monitoring and Troubleshooting System

by Debajyoti Pal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 35 - Number 11
Year of Publication: 2011
Authors: Debajyoti Pal
10.5120/4449-6217

Debajyoti Pal . Smart Home Network Monitoring and Troubleshooting System. International Journal of Computer Applications. 35, 11 ( December 2011), 42-46. DOI=10.5120/4449-6217

@article{ 10.5120/4449-6217,
author = { Debajyoti Pal },
title = { Smart Home Network Monitoring and Troubleshooting System },
journal = { International Journal of Computer Applications },
issue_date = { December 2011 },
volume = { 35 },
number = { 11 },
month = { December },
year = { 2011 },
issn = { 0975-8887 },
pages = { 42-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume35/number11/4449-6217/ },
doi = { 10.5120/4449-6217 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:21:44.570571+05:30
%A Debajyoti Pal
%T Smart Home Network Monitoring and Troubleshooting System
%J International Journal of Computer Applications
%@ 0975-8887
%V 35
%N 11
%P 42-46
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The complexity of home networks has evolved to a greater level of sophistication and complicacy in the recent times comprising of heterogeneous components like at least two computers, web-enabled high-definition television sets, net-enabled blue ray disc players, iPods and many other such devices. Troubleshooting such a sophisticated smart home network in case of a malfunction by the novice end users seems to be very demanding. The paper proposes a Smart Home Network Monitoring System that provides a centralized, general-purpose, automatic and convergent logging facility with the purpose to auto-detect and possibly correct all such failure issues by having a well-defined set of adaptive and incremental rule engine that needs to be applied to the entire network in general. Logging of all events that happened before trouble appeared may give a greater insight and hence help in providing an effective and permanent troubleshooting mechanism. This paper also reports the initial experience of deploying such a facility.

References
  1. R. Grinter, W.Edwards, M.Newman and N.Ducheneaut. 2005. The work to make a Home Network Work in Proceedings of European Conference on Computer Supported Co-operative Work, Volume 18, page 22, Springer Publication.
  2. Erika Sheehan, Marshini Chetty, Rebecca E. Grinter and Warren Keith Edwards. 2008. More Than Meets the Eye: Transforming the User Experience of Home Network Management in Proceedings of ACM Conference on Designing Interactive Systems (DIS 2008), Cape Town, South Africa.
  3. J.Y.S Marshini Chetty and R.E Grinter. 2007. How Smart Homes Learn: The evolution of the networked home and household in Proceedings of Ubicomp, Innsbruk, Austria.
  4. K. Calvert, W. Edwards and R. Grinter. 2007. Moving towards the Middle: The Case against the End-To-End Argument in Home Networking in Proceedings of 6th ACM Workshop on Hot Topics in Networks (Hotnets-VI), Atlanta, CA.
  5. Erika Sheehan Poole, Marshini Chetty, Tom Morgan, Rebecca E. Grinter and W. Keith. 2009. Computer Help at Home: Methods and Motivations for informal technical support in Proceedings of ACM Conference on Human Factors in Computing Systems (CHI 2009), Boston, MA.
  6. B. Agarwal, R. Bhagwan, T. Das, S. Eswaran, V. N. Padmanabhan and G. Voelkar. 2009. Netprints: Diagonising Home Network Misconfigurations using shared Knowledge in Proceedings of 6th USENIX NSDI, Boston, M.A.
  7. M. bin Tariq, M. Motiwala, N. Feamster and M. Ammar. 2009. Detecting Network Neutrality Violations with casual Inference in Proceedings CoNEXT.
  8. S. Hao, N, Syed, N. Feamster, A. Gray and S. Krasser.2009. Detecting Spammers with SNARE: Spatio-temporal Network-Level Automatic Reputation Engine in Proceedings of 18th USENIX Security Symposium, Montreal, Quebec, Canada.
  9. R. Perdisci, W. Lee and N. Feamster. 2010. Behavioural Clustering of HTTP-Based malware in Proceedings of 7th USENIX NSDI, San Jose, CA.
  10. A. Ramachandran, N. Feamster and S. Vempala. 2007. Filtering spam with behavioural blacklisting in proceedings of 14th ACM Conference on Computer and Communications Security, Alexandria, VA.
  11. M.Allman and V. Paxson. 2007. Issues and Etiquette Concerning Use of Shared Measurement Data in Proceedings of ACM Internet Measurement Conference, pages 135-140, San Diego.
  12. M. Chetty, R. Banks, R.Harper, T.Reagan, A.Sellen, C.Gkantsidis, T.Karagiannis and P.Key. 2010. Who’s Hogging the Bandwidth? In Proceedings of ACM Human Factors in Computing Systems (CHI) Conference, Atlanta, GA.
  13. J. Yang. 2009. Eden Home Network Management System, Ph.D. dissertation, Georgia Tech.
  14. K. L. Calvert, W. K. Edwards, Nick Feamster, R. E. Grinter, Ye Deng and Xuzi Zhou. 2010. Instrumenting Home Networks in Proceedings of ACM SIGCOMM Workshop on Home Networks, Home Nets ’10, pages 55-60, New York, USA.
  15. S.Kandula, R. Mahajan, P. Verkaik, S. Agarwal, J. Padhye and P. Bhal. 2009. Detailed Diagnosis in Enterprise Networks in Proceedings of ACM SIGCOMM, Barcelona, Spain.
Index Terms

Computer Science
Information Sciences

Keywords

Smart Home Network Monitoring System General-purpose logging facility Adaptive and Incremental Rule-Engine Event Troubleshooting