Computer Science ›› 2014, Vol. 41 ›› Issue (Z6): 265-269.

Previous Articles     Next Articles

Method for Probing Sources Selection Based on General Dispersity of Sources in Network Topology Discovery

YANG Xu,QIU Han,ZHU Jun-hu and WANG Qing-xian   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Due to the significant effect on the discovery result,probing sources selection plays a vital role in unauthori-zed target network topology discovery.Thus,properly selecting a fixed number of probing sources would dramatically increase the coverage of discovered network.For this,a novel indicator,GDS(General Dispersity of Sources),depicting the logic distance of a set of probing sources was designed.Meanwhile,experiment shows that probing source set with a larger GDS tends to get a wider topology coverage.Subsequently,maximum GDS selection which represents screening the probing source set with maximum GDS out of the whole probing source collection was proposed.Moreover,the HGSAA (Hybrid Genetic Simulated Annealing Algorithm) often used in the field of power grid formulation was tailed-made to accurately screen out the probing source set with maximum GDS.On the basis of experiments,it is demonstrated the probing source set selected by the method based on maximum GDS selection results in more router interfaces and links compared with the ones of SDIS selection,low degree selection and random selection.

Key words: Network topology discovery,Probing source,Logic distance,General dispersity of sources,Anchor point set,Hybrid genetic simulated annealing algorithm

[1] Donnet B.et al.Internet Topology Discovery[M]//Data Traffic Monitoring and Analysis.Berlin Heidelberg:Springer,2013:44-81
[2] Donnet B,Friedman T.Internet Topology iscovery:a Survey[J].Communications Surveys & Tutorials,IEEE,2007,9(4):2-15
[3] 张宏莉,方滨兴,胡铭曾,等.Internet测量与分析综述[J].软件学报,2003,4(1):110-116
[4] 庄锁法.网络拓扑发现综述[J].计算机技术与发展,2007,0(17):80-83
[5] Chen M,Xu M,Xu K.A Delay-Guiding Source Selection Method in Network Topology Discovery[C]∥2011IEEE International Conference on Communications (ICC).2011:1-6
[6] King A J.Efficient Internet Topology Discovery Techniques[D].The University of Waikato,2010
[7] Dall’Asta L,Alvarez-Hamelin I,Barrat A,et al.Exploring networks with traceroute-like probes:theory and simulations[J]. Theoretical Computer Science,2006,355(6):6-24
[8] Han WXu K.A method for placing traceroute-like topology discovery instrumentation[C]∥11th Proceedings International Conference on Communication Systems(ICCS 2008).IEEE,2008
[9] Zou X,Qiao Z,Zhou G,et al.A logic distance-based method for deploying probing sources in the topology discovery[C]∥IEEE GLOBECOM.2009
[10] 行文训,谢金星.现代优化计算方法(第2版)[M].北京:清华大学出版社,2005
[11] 包海龙.基于混合遗传-模拟退火算法的多目标电网规划[D].上海:上海交通大学,2000
[12] CAIDA Skitter tool.http://www.caida.org/tools/measurement/skitter/

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!