期刊文献+

一种基于二分搜索的网络拓扑探测方法 被引量:4

Network topology probe method based on binary search
下载PDF
导出
摘要 网络拓扑测量是人们对网络进行管理的基础,对网络仿真与建模、网络协议设计、网络算法优化等有重要意义,网络拓扑测量的关键在于其采用的方法。通过分析制约传统的Traceroute方法和DoubleTree算法性能的关键因素,基于二分搜索的思想,提出了一种网络拓扑探测方法 BisearchTrace。实验结果表明,该方法有效地降低了网络负载,加快了拓扑探测的速度,提高了网络拓扑测量的效率,具有良好的实用性。 Network topology measurement is the basis of network management.It is significant to network modeling and network simulation,network protocol design,network algorithm optimization.The method that it takes is critical.According to the key factor of limiting the performance of traditional Traceroute method and DoubleTree algorithm analysis,this paper presented a network topology probe method called BisearchTrace based on the idea of binary search.Experimental results show that BisearchTrace reduces the network load more efficiently and increases the speed of topology probe.BisearchTrace which is very practical improves efficiency of the network topology measurement.
出处 《计算机应用研究》 CSCD 北大核心 2011年第11期4296-4298,共3页 Application Research of Computers
基金 国家自然科学基金面上项目(61070199)
关键词 网络测量 拓扑探测 二分搜索 network measurement topology probe binary search
  • 相关文献

参考文献5

  • 1DONNET B, RAOULT P, FRIEDMAN T, et al. Efficient algorithms for large-scale topology discovery [ C ]//Proc of the 2005 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. New York : ACM,2005 : 327- 338.
  • 2LUCKIE M, HYUN Y, HUFFAKER B. Traceroute probe method and forward IP path inference[C ]//Proc of the 8th ACM SIG COMM conference on Internet measaremeat. NewYork : ACM ,2008:311-323.
  • 3HUFFAKER B, PLUMMER D, MOORE D, et al. Topology discovery by active probing[ C ]//Proc of 2002 symposium on Applications and the Intenaet (SAINT) Workshops. Washington DC : IEEE Computer Society, 2002 : 90 - 96.
  • 4JIN Cheng, WANG Hai-ning, SHIN G K. Hop-Count filtering: an effective defense against spoofed DDos traffic[ C l// Proc of the 10th ACM Conference on Computer and Communications Security. New York :ACM,2003:30-41.
  • 5宰家斌,杨立身,刘小虎.大规模网络拓扑发现方法分析研究[J].计算机仿真,2008,25(1):130-133. 被引量:4

二级参考文献1

共引文献3

同被引文献47

  • 1刘捷,徐利.以太网拓扑结构自动探测算法[J].信息安全与通信保密,2006,28(10):123-124. 被引量:2
  • 2陈娟,陈崚.求解多重序列比对问题的蚁群算法[J].计算机应用研究,2007,24(1):25-30. 被引量:3
  • 3LUCKIE M, HYUN Y, HUFFAKER B. Traceroute Probe Method and Forward IP Path Inference[C]. USA: ACM, 2008:311-323.
  • 4DONNET B, RAOULT P, FRIEDMAN T, et al. Efficient Algorithms for Large-scale Topology Discovery [C]. USA: ACM, 2005:327-338.
  • 5DONNET B, FRIEDMAN T, CR0VELLA M.Improved Algorithms for Network Topology Discovery[C]. USA: [s. n.]. 2005:149-162.
  • 6BAUD L, NGUYEN P, BELLOT P. Robust overlay network withself-adaptive topology : protocol description [C]//Proc of IEEE Inter-national Conference on Digital Object Identifier. 2008 : 154-160.
  • 7AUGUSTIN B, FRIEDMAN T,TEIXEIRA R. Measuring load ba-lanced paths in the Internet [G] //Proc of the 7th ACM SIGCOMMConference on Internet Measurement. 2007 : 149-160.
  • 8VIGER F, AUGUSTIN B, CUVELLIER X, et al Detection, under-standing ,and prevention of traceroute measurement artifacts [J].Computer Network,2008,52(5) :998-1018.
  • 9DONNET B, RAOULT P, FRIEDMAN T, et al. Deployment of analgorithm for large-scale topology discovery [J]. IEEE Journal OilSelected Areas in Communications,2006,24( 12) :2210-2220.
  • 10LUCKIE M, DHAMDHERE A, CLAFFY K, et al. Measured impactof crooked traceroute [J]. ACM SIGCOMM Computer Communi-cation Review,2011,41 (1) ;14-21.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部