Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Cynthia S. Hood is active.

Publication


Featured researches published by Cynthia S. Hood.


international conference on computer communications | 1997

Proactive network fault detection

Cynthia S. Hood; Chuanyi Ji

The increasing role of communication networks in todays society results in a demand for higher levels of network availability and reliability. At the same time, fault management is becoming more difficult due to the dynamic nature and heterogeneity of networks. We propose an intelligent monitoring system using adaptive statistical techniques. The system continually learns the normal behavior of the network and detects deviations from the norm. Within the monitoring system, the measurements are segmented, and features extracted from the segments are used to describe the normal behavior of the measurement variables. This information is combined in the structure of a Bayesian network. The proposed system is thereby able to detect unknown or unseen faults. Experimental results on real network data demonstrate that the proposed system can detect abnormal behavior before a fault actually occurs.


2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks | 2006

Spectral Occupancy and Interference Studies in support of Cognitive Radio Technology Deployment

Dennis Roberson; Cynthia S. Hood; Joseph L. LoCicero; John T. MacDonald

This paper describes the high value of cognitive radio technology and characterizes the opportunity space in four distinct classes. A Chicago-based spectrum occupancy study illustrates the opportunity showing that 82.6% of the spectral capacity is unused. A set of spectral signatures is presented for common devices in the unlicensed frequency band with the view that this technique can be widely deployed across the spectrum. The limitations of current network simulation tools in an interference environment are identified. Finally, the paper briefly discusses several of the non-technology related issues that impact the deployment of cognitive radio techniques.


local computer networks | 2002

Reliable file transfer in Grid environments

Ravi K. Madduri; Cynthia S. Hood; William E. Allcock

Grid-based computing environments are becoming increasingly popular for scientific computing. One of the key issues for scientific computing is the efficient transfer of large amounts of data across the Grid. In this paper we present a reliable file transfer (RFT) service that significantly improves the efficiency of large-scale file transfer. RFT can detect a variety of failures and restart the file transfer from the point of failure. It also has capabilities for improving transfer performance through TCP tuning.


IEEE Internet Computing | 1998

Intelligent agents for proactive fault detection

Cynthia S. Hood; Chuanyi Ji

As the Internet becomes a critical component of our society, a key challenge is to maintain network availability and reliability. Intelligent processing agents that reside at network nodes use an adaptive learning method to detect abnormal network behavior before a fault actually occurs. In a test at Rensselaer Polytechnic Institute, an agent on a router detected a file server failure 12 minutes before it occurred.


local computer networks | 2003

Exploring the relationship between parallel application run-time and network performance in clusters

J.J. Evans; W.D. Groop; Cynthia S. Hood

Highly variable parallel application execution time is a persistent issue in cluster computing environments, and can be particularly acute in systems composed of networks of workstations (NOWs). We are looking at this issue in terms of consistency. In particular, we are focusing on network performance. Before we can use techniques from fault management to attain consistency, this paper presents our preliminary analysis of run-time variability from logs and experiments, exposing important issues related to systemic inconsistency in NOW clusters. The characterization of application sensitivity can be used to set network performance goals, thereby defining operational requirements. Network performance depends on the virtual topology imposed by the schedulers allocation of nodes and the communication patterns of the set of running applications. Therefore it is important to look at both the network and the clusters centralized node mapper (scheduler) as critical subsystems.


technical symposium on computer science education | 2005

Teaching programming and language concepts using LEGOs

Cynthia S. Hood; Dennis J. Hood

In this paper we describe an innovative method for using LEGO® bricks to teach programming and other computing concepts. LEGO® bricks are used to express a special purpose language to build creations out of LEGOs®. Using this language, students can execute and create programs. Both fundamental and more advanced concepts can be taught. The use of LEGOs® increases the tactile and kinesthetic aspects of the learning experience and helps to make abstract concepts more concrete. We have used this method to teach a variety of concepts to college freshmen, K-12 teachers, and K-12 students.


global communications conference | 1996

Probabilistic network fault detection

Cynthia S. Hood; Chuanyi Ji

To improve network management in todays high-speed communication networks, we propose an intelligent system using adaptive learning machines. The system learns the normal behavior of the network. Deviations from the norm are detected and the information is combined in the probabilistic framework of a Bayesian network. The proposed system is thereby able to detect unknown or unseen faults. As demonstrated on real network data, this method can detect abnormal behavior before a fault actually occurs, giving the network management system (human or automated) the ability to avoid a potentially serious problem.


integrated network management | 1997

Automated proactive anomaly detection

Cynthia S. Hood; Chuanyi Ji

To address the increasing complexities of fault management, we propose an automated, proactive monitoring system using adaptive statistical techniques. Requiring only a minimal amount of network specific information a priori, the system continually collects data, uses the data to learn the normal behavior of the network, and detects deviations from the norm. The proposed system is thereby able to detect unknown or unseen faults. Experimental results on real network data demonstrate that the proposed system can detect abnormal behavior before a fault actually occurs.


International Journal of Network Management | 2002

Integrated networks that overflow speech and data between component networks

Susan Lincke-Salecker; Cynthia S. Hood

As cellular networks diversify by expanding the number of services, cell sizes, and generations of technologies supported, it becomes possible to overflow dual-mode terminals using vertical handovers to other cellular networks or ‘component networks’. This study varies call placement algorithms, by defining, modeling, and evaluating Overflow and Return policies.


cluster computing and the grid | 2005

Network performance variability in NOW clusters

Jeffrey J. Evans; Cynthia S. Hood

Performance management of clusters and grids poses many challenges. Sharing large distributed sets of resources can provide efficiencies, but it also introduces complexity in terms of providing and maintaining adequate performance. Current application requirements focus on the amount of resources needed without explicitly characterizing the performance required from those resources. In clusters and grids, inconsistent or highly variable application run-time is an indication of systemic inconsistency, with ramifications for those running the application and those managing the resources. We are focusing on the contribution of the interconnection network to application run-time variability. This work presents experimental results characterizing parallel application run-time sensitivity to communication performance variability using an application communication emulator (ACE).

Collaboration


Dive into the Cynthia S. Hood's collaboration.

Top Co-Authors

Avatar

Joseph Kroculick

Illinois Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Susan Lincke-Salecker

Illinois Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Chuanyi Ji

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Ezzat Kirmani

St. Cloud State University

View shared research outputs
Top Co-Authors

Avatar

Alana Platt

University of Wisconsin–Whitewater

View shared research outputs
Top Co-Authors

Avatar

Dennis Roberson

Illinois Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Jacek Dzikowski

Illinois Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Michael J. North

Argonne National Laboratory

View shared research outputs
Researchain Logo
Decentralizing Knowledge