首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 234 毫秒
1.
拓扑特征分析和拓扑图生成是因特网拓扑研究的一个重要研究方向.dK特征序列被证明是一种有效的系统化拓扑特征分析方法,2K图已经能够在各种重要的拓扑度量方面与实际因特网拓扑图保持一致.在使用dK特征序列分析因特网拓扑时是用无向图来对因特网拓扑进行抽象的,然而对于自治系统(AS)级拓扑,由于AS之间存在复杂的商业关系,使用AS关系标注的拓扑图才能更精确地描述AS级拓扑特征.对dK特征序列进行了改进,提出了能够分析AS关系标注的拓扑图的dK'特征序列,并给出了生成满足指定2K'特征的拓扑图的算法.分析实验结果发现,2K'特征已经能够描述AS关系标注的拓扑图的各种重要特征.  相似文献   

2.
研究拓扑特征之间的关联性对于简化拓扑建模具有重要的意义。dK特征序列理论上能够计算得到所有的网络拓扑特征,因此可以用来进行拓扑特征的关联性研究。在分析dK序列定义的基础上,推导出一些重要的网络拓扑特征与dK序列之间的关系,这些关系可以用来简化拓扑图特征比较,因此有助于减少因特网拓扑建模研究的模型验证部分的工作量。  相似文献   

3.
针对二维工程CAD图拓扑关系完整性认证问题,提出一种基于哈希的拓扑完整性认证算法。该算法首先提取图纸的拓扑关系生成拓扑图;其次对图中的组件进行编码,并提出一种局部拓扑量化模式(LTQP),实现各组件拓扑特征的量化;然后将组件按照其编码分成5类,基于各组件的LTQP值,利用离散余弦变换生成每类组件的哈希序列;最后将每类组件的哈希序列进行合并,得到完整的图纸哈希序列。实验结果表明,该算法对旋转、缩放和平移等非恶意操作具有鲁棒性,同时对恶意拓扑攻击具有脆弱性,采用将组件分类来生成哈希序列的方式,能够对受到拓扑攻击的组件的种类进行定位。  相似文献   

4.
刘海华  王萍萍 《微机发展》2008,18(5):101-104
随着大规模交换网络的发展,网络拓扑发现的研究由网络层拓展到数据链路层。链路层的拓扑发现能够发现网络层拓扑发现无法发现的局域网内部的详细的物理连接情况,对网络配置管理具有重要意义。研究了目前基于地址转发表(AFT)的方法,针对现有算法的不足作了一定分析,提出了一种基于生成树算法(STA)的链路层网络拓扑发现算法,利用SNMP获得网桥MIB中的生成树信息,通过分析这些信息计算出链路层的网络拓扑。该算法相比其它算法更简单、高效,有应用价值。  相似文献   

5.
基于生成树算法的链路层拓扑发现研究   总被引:2,自引:0,他引:2  
随着大规模交换网络的发展,网络拓扑发现的研究由网络层拓展到数据链路层.链路层的拓扑发现能够发现网络层拓扑发现无法发现的局域网内部的详细的物理连接情况,对网络配置管理具有重要意义.研究了目前基于地址转发表(AFT)的方法,针对现有算法的不足作了一定分析,提出了一种基于生成树算法(STA)的链路层网络拓扑发现算法,利用SNMP获得网桥MIB中的生成树信息,通过分析这些信息计算出链路层的网络拓扑.该算法相比其它算法更简单、高效,有应用价值.  相似文献   

6.
本文首先介绍了网络管理中网络拓扑结构发现技术的研究现状,并分析了现有的各种方法的优点和不足,然后提出了一种发现网络层的拓扑结构的改进的算法,并对基于Web的网络管理中的拓扑结构的拓扑图的构造和显示问题进行了研究,提出了一种方法。实验结果表明,该方法具有一定的可行性和有效性。  相似文献   

7.
大型ISP网络拓扑多点测量及其特征分析实例   总被引:25,自引:2,他引:25       下载免费PDF全文
深入了解Internet拓扑的结构性质有利于更好地设计和发展Internet.由于Internet规模巨大,以及获得完整的路由器级Internet拓扑方面的困难,目前无法研究整个路由器级Internet拓扑.因此,分别研究每个国家级或跨国因特网服务供应商(Internet service provider,简称ISP)网络拓扑结构成为了解Internet拓扑特征的一种可选方法.以中国教育科研网为例,简要描述了多点测量其路由器级拓扑结构的测量结果.分析了该实例拓扑图的节点度分布特征、较大特征值的有关性质以及谱密度分布特征.分析了该实例拓扑图的无符号拉普拉斯谱(SLS)、规格化拉普拉斯谱(NLS)以及群集系数等度量特征.分析结果表明,大型ISP拓扑确实具有某些幂律特征;不同于自治系统级拓扑的情形,对ISP拓扑的节点度补累积分布来说,幂律分布未必拟合得最好;ISP拓扑是一种无标度图,但不符合Barabasi-Albert(BA)生长模型;SLS和NLS具有区分不同的路由器级拓扑结构的能力;Internet路由器级拓扑的发展可能遵循一种不同于BA模型的生长过程.  相似文献   

8.
作为一种典型的网络拓扑推断方法,网络层析成像技术可以被攻击者用来准确推断目标网络的拓扑结构,进而向关键节点或链路发起有针对性的攻击行为。为了有效隐藏真实的网络拓扑结构等信息,提出了一种基于主动欺骗方式对抗多源网络层析成像探测的拓扑混淆机制AntiMNT。AntiMNT针对多源网络层析成像的探测过程,策略性地构建虚假拓扑结构,并据此混淆攻击者对目标网络的端到端测量数据,使其形成错误的拓扑推断结果。为了高效生成具有高欺骗特征的混淆网络拓扑,AntiMNT随机生成候选混淆拓扑集,并在此基础上用多目标优化算法搜索具有高安全性和可信度的最优混淆拓扑。基于几种真实网络拓扑的实验分析表明,AntiMNT可以生成高欺骗性和安全性的混淆网络拓扑,从而能够有效防御基于网络层析成像的网络侦察。  相似文献   

9.
拓扑建模是进行网络性能研究的基础.PLOD是一种基于幂率的网络拓扑生成算法,但该算法不能保证生成拓扑图的连通性,且存在"出度贷款过剩"现象.对PLOD算法进行了改进,在节点连接时添加了连通性检测,并对出度大的节点实行优先连接,较好地解决了PLOD算法存在的问题.实验结果表明了PLOD 算法的可行性和有效性.  相似文献   

10.
拓扑建模是进行网络性能研究的基础。PLOD是一种基于幂率的网络拓扑生成算法,但该算法不能保证生成拓扑图的连通性,且存在“出度贷款过剩”现象。对PLOD算法进行了改进,在节点连接时添加了连通性检测,并对出度大的节点实行优先连接,较好地解决了PLOD算法存在的问题。实验结果表明了PLOD+算法的可行性和有效性。  相似文献   

11.
杨国正  陆余良  夏阳  朱峰 《计算机工程》2009,35(16):104-106
针对网络拓扑测量中存在的匿名路由器问题,依据Internet网络的主要特征建立一个匿名路由器网络模型,采用类似traceroute的探测机制抽样该网络模型中的路径信息,根据匿名路由器的处理程度分别构造不同的抽样拓扑图,通过研究这些抽样拓扑中的不同属性量化分析匿名路由器问题的影响,其中,拓扑属性包括网络大小、节点度分布、网络路径长度和介数等。  相似文献   

12.
The AS-level topology of the Internet has been quite a hot research topic in the last few years. However, only a small number of studies have been developed that give a structural interpretation of this graph. Such an interpretation is crucially important in order to test protocols and optimal routing algorithms, to design efficient networks, and for failure detection purposes. Moreover, most research does not highlight the role that IXPs have on the AS-level structure of the Internet, although their role is recognized as fundamental.The initial contribution of this study is an analysis of the most important AS-level topologies that are publicly found on the web and an analysis of the topology obtained when they are merged. We compiled structural information from this topology making considerable use of the k-core decomposition technique to delineate various particular classes of nodes. Next, we associated node properties with a reasonable modus operandi of the ASs on the Internet. The second contribution is a study of the impact that ASs connected to IXPs and BGP connections crossing IXPs have on the AS-level topology. To achieve this, we developed a procedure to gather reliable information related to IXPs and their participants.  相似文献   

13.
This paper addresses a distributed consensus optimisation problem over networks with time-varying topologies based on Zero-Gradient-Sum (ZGS) algorithm. First, the exponential convergence of the algorithm is guaranteed under a new condition on network topologies, called cooperatively connected. This condition does not require the topology constantly connected or jointly connected but only requires the integral of the Laplacian matrix of the network topology over a period of time is connected. Hence, it is suitable for more general time-varying topologies. Second, by establishing a key mathematical lemma, we develop a convergence analysis technique which is based on the difference of the Lyapunov function rather than its differentiation. Finally, a simulation example is also provided to verify the results obtained in this paper.  相似文献   

14.
徐野  赵海  张文波 《计算机科学》2008,35(12):34-38
针对路由级Internet宏拓扑结构进行了谱密度分布分析与无符号拉普拉斯谱(SLS)分布分析.首先通过对拓扑结构各异的5种采样拓扑图,分别进行谱密度-特征值分布分析,发现5组分析结果表现出高度的一致性,证明了Internet拓扑结构的自相似性,也证明了采样拓扑可以再现局部Internet拓扑结构特征.然后通过采样拓扑图的谱密度-特征值分布函数与ER图、BA无尺度网络拓扑图进行比较,发现三者具有明显区别,得出谱密度-特征值分布函数可作为分辨图谱拓扑结构有效方法的结论.最后通过4组3000点采样拓扑进行SLS分布分析,发现尽管4组3000点采样路由与连接互不相同,但SLS谱分布却非常相似,4组采样拓扑在特征值λ=1处重数均较高,重数次高的特征值都群聚在λ=2处.在特征值从2~103变化过程中表现出较明显的幂律分布特性,其幂指数值保持在3.2813至3.8013之间,特征指数接近.该结论为Internet宏观拓扑结构建模研究提供了量化判据,是Internet拓扑建模研究的重要内容.  相似文献   

15.
In this paper, we study the problem of distributed containment control of a group of mobile autonomous agents with multiple stationary or dynamic leaders under both fixed and switching directed network topologies. First, when the leaders are stationary and all followers share an inertial coordinate frame, we present necessary and sufficient conditions on the fixed or switching directed network topology such that all followers will ultimately converge to the stationary convex hull formed by the stationary leaders for arbitrary initial states in a space of any finite dimension. When the directed network topology is fixed, we partition the (nonsymmetric) Laplacian matrix and explore its properties to derive the convergence results. When the directed network topology is switching, the commonly adopted decoupling technique based on the Kronecker product in a high-dimensional space can no longer be applied and we hence present an important coordinate transformation technique to derive the convergence results. The proposed coordinate transformation technique also has potential applications in other high-dimensional distributed control scenarios and might be used to simplify the analysis of a high-dimensional system to that of a one-dimensional system when the decoupling technique based on the Kronecker product cannot be applied. Second, when the leaders are dynamic and all followers share an inertial coordinate frame, we propose a distributed tracking control algorithm without velocity measurements. When the directed network topology is fixed, we derive conditions on the network topology and the control gain to guarantee that all followers will ultimately converge to the dynamic convex hull formed by the dynamic leaders for arbitrary initial states in a space of any finite dimension. When the directed network topology is switching, we derive conditions on the network topology and the control gain such that all followers will ultimately converge to the minimal hyperrectangle that contains the dynamic leaders and each of its hyperplanes is normal to one axis of the inertial coordinate frame in any high-dimensional space. We also show via some counterexamples that it is, in general, impossible to find distribute containment control algorithms without velocity measurements to guarantee that all followers will ultimately converge to the convex hull formed by the dynamic leaders under a switching network topology in a high-dimensional space. Simulation results are presented as a proof of concept.  相似文献   

16.
The architecture of several data centers have been proposed as alternatives to the conventional three-layer one. Most of them employ commodity equipment for cost reduction. Thus, robustness to failures becomes even more important, because commodity equipment is more failure-prone. Each architecture has a different network topology design with a specific level of redundancy. In this work, we aim at analyzing the benefits of different data center topologies taking the reliability and survivability requirements into account. We consider the topologies of three alternative data center architecture: Fat-tree, BCube, and DCell. Also, we compare these topologies with a conventional three-layer data center topology. Our analysis is independent of specific equipment, traffic patterns, or network protocols, for the sake of generality. We derive closed-form formulas for the Mean Time To Failure of each topology. The results allow us to indicate the best topology for each failure scenario. In particular, we conclude that BCube is more robust to link failures than the other topologies, whereas DCell has the most robust topology when considering switch failures. Additionally, we show that all considered alternative topologies outperform a three-layer topology for both types of failures. We also determine to which extent the robustness of BCube and DCell is influenced by the number of network interfaces per server.  相似文献   

17.
Network virtualization aims to provide a way to overcome ossification of the Internet. However, making efficient use of substrate resources requires effective techniques for embedding virtual networks: mapping virtual nodes and virtual edges onto substrate networks. Previous research has presented several heuristic algorithms, which fail to consider that the attributes of the substrate topology and virtual networks affect the embedding process. In this paper, for the first time, we introduce complex network centrality analysis into the virtual network embedding, and propose virtual network embedding algorithms based on closeness centrality. Due to considering of the attributes of nodes and edges in the topology, our studies are more reasonable than existing work. In addition, with the guidance of topology quantitative evaluation, the proposed network embedding approach largely improves the network utilization efficiency and decreases the embedding complexity. We also investigate our algorithms on real network topologies (e.g., AT&T, DFN) and random network topologies. Experimental results demonstrate the usability and capability of the proposed approach.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号