Academic literature on the topic 'Network topology discovery'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network topology discovery.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Network topology discovery"
Jian, Feng, and Zhu Li. "WebNMS-Based Topology Discovery in EPON Network." International Journal of Future Generation Communication and Networking 6, no. 6 (December 31, 2013): 161–68. http://dx.doi.org/10.14257/ijfgcn.2013.6.6.17.
Full textFU, Hua Sen. "Practical Enhanced Topology Discovery Algorithm for MANET." Advanced Materials Research 760-762 (September 2013): 599–606. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.599.
Full textGe, Jian Xia, and Wen Ya Xiao. "Network Layer Network Topology Discovery Algorithm Research." Applied Mechanics and Materials 347-350 (August 2013): 2071–76. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2071.
Full textGe, Jian Xia, and Wen Ya Xiao. "Network Layer Network Topology Discovery Algorithm Research." Applied Mechanics and Materials 380-384 (August 2013): 1327–32. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.1327.
Full textZhao, Ruiqin, Yuan Liu, Octavia A. Dobre, Haiyan Wang, and Xiaohong Shen. "An Efficient Topology Discovery Protocol with Node ID Assignment Based on Layered Model for Underwater Acoustic Networks." Sensors 20, no. 22 (November 18, 2020): 6601. http://dx.doi.org/10.3390/s20226601.
Full textWazirali, Raniyah, Rami Ahmad, and Suheib Alhiyari. "SDN-OpenFlow Topology Discovery: An Overview of Performance Issues." Applied Sciences 11, no. 15 (July 29, 2021): 6999. http://dx.doi.org/10.3390/app11156999.
Full textHe, Hui, Chi Xin Li, and Cheng Ying Gong. "Network Topology Discovery Algorithm Based on MIB." Applied Mechanics and Materials 496-500 (January 2014): 2134–37. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.2134.
Full textWenxing, Liao, Shi Xiaofei, and Chen Xinying. "The impacts of weak links on topology discovery process in large-scale wireless multi-hop networks." International Journal of Distributed Sensor Networks 16, no. 11 (November 2020): 155014772097452. http://dx.doi.org/10.1177/1550147720974526.
Full textLIAO chunsheng. "Complex Network Based Computer Network Topology Discovery Optimization Algorithm." Journal of Convergence Information Technology 8, no. 9 (May 15, 2013): 348–55. http://dx.doi.org/10.4156/jcit.vol8.issue9.44.
Full textChen, Song, Shan Wang, and Ming-tian Zhou. "A New Physical Network Topology Discovery Algorithm." JOURNAL OF ELECTRONICS INFORMATION & TECHNOLOGY 2010, no. 1 (February 8, 2010): 172–77. http://dx.doi.org/10.3724/sp.j.1146.2008.01783.
Full textDissertations / Theses on the topic "Network topology discovery"
Oliveira, Olga Margarida Fajarda. "Network topology discovery." Doctoral thesis, Universidade de Aveiro, 2017. http://hdl.handle.net/10773/18692.
Full textA monitorização e avaliação do desempenho de uma rede são essenciais para detetar e resolver falhas no seu funcionamento. De modo a conseguir efetuar essa monitorização, e essencial conhecer a topologia da rede, que muitas vezes e desconhecida. Muitas das técnicas usadas para a descoberta da topologia requerem a cooperação de todos os dispositivos de rede, o que devido a questões e políticas de segurança e quase impossível de acontecer. Torna-se assim necessário utilizar técnicas que recolham, passivamente e sem a cooperação de dispositivos intermédios, informação que permita a inferência da topologia da rede. Isto pode ser feito recorrendo a técnicas de tomografia, que usam medições extremo-a-extremo, tais como o atraso sofrido pelos pacotes. Nesta tese usamos métodos de programação linear inteira para resolver o problema de inferir uma topologia de rede usando apenas medições extremo-a-extremo. Apresentamos duas formulações compactas de programação linear inteira mista (MILP) para resolver o problema. Resultados computacionais mostraram que a medida que o número de dispositivos terminais cresce, o tempo que as duas formulações MILP compactas necessitam para resolver o problema, também cresce rapidamente. Consequentemente, elaborámos duas heurísticas com base nos métodos Feasibility Pump e Local ranching. Uma vez que as medidas de atraso têm erros associados, desenvolvemos duas abordagens robustas, um para controlar o número máximo de desvios e outra para reduzir o risco de custo alto. Criámos ainda um sistema que mede os atrasos de pacotes entre computadores de uma rede e apresenta a topologia dessa rede.
Monitoring and evaluating the performance of a network is essential to detect and resolve network failures. In order to achieve this monitoring level, it is essential to know the topology of the network which is often unknown. Many of the techniques used to discover the topology require the cooperation of all network devices, which is almost impossible due to security and policy issues. It is therefore, necessary to use techniques that collect, passively and without the cooperation of intermediate devices, the necessary information to allow the inference of the network topology. This can be done using tomography techniques, which use end-to-end measurements, such as the packet delays. In this thesis, we used some integer linear programming theory and methods to solve the problem of inferring a network topology using only end-to-end measurements. We present two compact mixed integer linear programming (MILP) formulations to solve the problem. Computational results showed that as the number of end-devices grows, the time need by the two compact MILP formulations to solve the problem also grows rapidly. Therefore, we elaborate two heuristics based on the Feasibility Pump and Local Branching method. Since the packet delay measurements have some errors associated, we developed two robust approaches, one to control the maximum number of deviations and the other to reduce the risk of high cost. We also created a system that measures the packet delays between computers on a network and displays the topology of that network.
Sigholm, Johan. "Automated Network Node Discovery and Topology Analysis." Thesis, Linköping University, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-10593.
Full textThis Master's Thesis describes the design and development of an architecture for automated network node discovery and topology analysis, implemented as an extension to the network management and provisioning system NETadmin. The architecture includes functionality for flexible network model assessment, using a method for versatile comparison between off-line database models and real-world models. These models are populated by current node data collected by network sensors.
The presented architecture supports (1) efficient creation and synchronization of network topology information (2) accurate recognition of new, replaced and upgraded nodes, including rogue nodes that may exhibit malicious behavior, and (3) provides an extension of an existing vendor-neutral enterprise network management and provisioning system.
An evaluation of the implementation shows evidence of accurate discovery and classification of unmatched hosts in a live customer production network with over 400 nodes, and presents data on performance and scalability levels.
The work was carried out at Netadmin System i Sverige AB, in Linköping, Sweden.
Spring, Neil Timothy. "Efficient discovery of network topology and routing policy in the Internet /." Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6985.
Full textBaltra, Guillermo P. "Efficient strategies for active interface-level network topology discovery." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37583.
Full textAs a piece of critical infrastructure, the Internet brings both benefits and security concerns. Recent cyber-security episodes such as route hijacks and Denial-of-Service attacks might have been mitigated and prevented with better knowledge of the network_s logical topology; i.e., router nodes and links. Current production public active mapping systems; e.g., Ark, Rocketfuel, and iPlane, produce valuable inferences of the Internet_s topology, as well as facilitating longitudinal analysis. We examine the extent to which the techniques utilized by these existing systems can be improved, in particular by attempting to reduce their high probing load. Our methodology divides the discovery process into three steps: destination selection, monitor assignment, and stop criterion. We implement and evaluate alternative designs for each step. The complete system runs in real-time on a production system to probe 500 randomly selected Internet subnetworks and gather real-world network maps. As compared to datasets from existing measurement platforms, we find that our method is able to generate 80% of the amount of data with 69% less load.
Barthel, Alexander. "Analysis, Implementation and Enhancement of Vendor dependent and independent Layer-2 Network Topology Discovery." Master's thesis, Universitätsbibliothek Chemnitz, 2005. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200500455.
Full textDiese Arbeit zeigt und implementiert Möglichkeiten zur OSI Layer-2 Netzwerk Topologie Erkennung basierend auf Informationen des Cisco Discovery Protocol, Spanning Tree Protocol und Switch Filter Datenbanken
Bodvill, Jonatan. "Enterprise network topology discovery based on end-to-end metrics : Logical site discovery in enterprise networks based on application level measurements in peer- to-peer systems." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-227803.
Full textI dataintensiva applikationer i företagsnätverk, speciellt applikationer som använder sig av peer-to-peer teknologi, är lokalitet viktigt. Klienter bör försöka maximera datautbyte med andra klienter där nätverkskopplingen är som bäst. För att klienterna ska kunna göra sådana val måste information om vilka klienter som befinner sig vara vara tillgänglig som klienterna kan basera sina val på. Denna information är inte trivial att framställa då det inte finns någon färdig global information om vilka klienter som har bra uppkoppling med andra klienter och att låta varje klient prova sig fram blint tills de hittar de bästa partnerna är kostsamt och sänker applikationens lokalitet innan den konvergerar. I denna rapport presenteras en lösning som skapar en logisk vy över ett peer-to-peer nätverk, vilken grupperar klienter i kluster baserat på deras uppkopplingskvalitet. Denna vy kan sedan användas för att förbättra lokaliteten i peerto-peer applikationen. En grafmodell av systemet skapas, där klienter modelleras som hörn och kopplingar mellan klienter modelleras som kanter med en vikt i relation till uppkopplingskvaliteten. Problemet formuleras sedan som ett riktat grafklusterproblem vilket är ett väldokumenterat forskningsområde med mycket arbete publicerat kring. De mest framstående grafklusteralgoritmerna är sedan studerade, utvalda baserat på kravspecifikationer, optimerade för det aktuella problemet och implementerade. Resultaten som produceras av att algoritmerna körs på strömdata är evaluerade mot känd information. Resultaten visar att oövervakade grafklusteralgoritmer skapar användbar information kring nätverkens uppkopplingsstruktur och kan användas i peer-to-peerapplikationssammanhang för att hitta de bästa partnerna att utbyta data med.
Jovanovic, Mihajlo A. "Modeling Large-scale Peer-to-Peer Networks and a Case Study of Gnutella." University of Cincinnati / OhioLINK, 2001. http://rave.ohiolink.edu/etdc/view?acc_num=ucin989967592.
Full textMallery, Christopher Jerry. "Location and topology discovery in wireless sensor networks." Pullman, Wash. : Washington State University, 2009. http://www.dissertations.wsu.edu/Dissertations/Spring2009/c_mallery_1050509.pdf.
Full textTitle from PDF title page (viewed on June 15, 2009). "School of Electrical Engineering and Computer Science." Includes bibliographical references (p. 108-117).
Kandoi, Rajat. "Deploying Software-Defined Networks: a Telco Perspective." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172354.
Full textGonzalez, Valenzuela Sergio. "A service-oriented approach to topology formation and resource discovery in wireless ad-hoc networks." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/745.
Full textBook chapters on the topic "Network topology discovery"
Donnet, Benoit, Timur Friedman, and Mark Crovella. "Improved Algorithms for Network Topology Discovery." In Lecture Notes in Computer Science, 149–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31966-5_12.
Full textXu, Chongyang, Yi Man, Luona Song, and Yinglei Teng. "Network Topology Discovery Based on Classification Algorithm." In Advances in Artificial Intelligence and Security, 276–86. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78618-2_22.
Full textLi, Dancheng, Tianyi Yin, Cheng Liu, Chunyan Han, and Yixian Liu. "An Approach for IPSecVPN Network Topology Discovery Based on Layer 3 Topology." In Communications in Computer and Information Science, 223–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23214-5_30.
Full textSkoura, Angeliki, Vasileios Megalooikonomou, Athanasios Diamantopoulos, George C. Kagadis, and Dimitrios Karnabatidis. "Classification of Tree and Network Topology Structures in Medical Images." In Data Mining for Biomarker Discovery, 79–90. Boston, MA: Springer US, 2012. http://dx.doi.org/10.1007/978-1-4614-2107-8_5.
Full textSidibé, Guéréguin Der Sylvestre, Hamadoun Tall, Raphael Bidaud, Marie-Françoise Servajean, and Michel Misson. "Topology Discovery Delay Evaluation in Star Topology Network with Switched-Beam Antenna Sink." In Ad-Hoc, Mobile, and Wireless Networks, 62–73. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31831-4_5.
Full textEhounou, Wilfried Joseph, Dominique Barth, and Arnaud De Moissac. "Discovery of Energy Network Topology from Uncertain Flow Measurements." In Algorithmic Decision Theory, 355–60. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67504-6_27.
Full textWang, Chen, Huaixi Wang, Nina Shu, and Han Wang. "Complex Network Approaches to Analyze the Topology of China High Speed Railway Network." In Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery, 841–51. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70665-4_91.
Full textLi, Dancheng, Chen Zheng, Chunyan Han, and Yixian Liu. "Research and Application of Multiple Spanning Tree Network Topology Discovery Algorithm." In Lecture Notes in Electrical Engineering, 165–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25541-0_22.
Full textLi, Dancheng, Chen Zheng, Chunyan Han, and Yixian Liu. "Research and Application of Heterogeneous Network Topology Discovery Algorithm Based on Multiple Spanning Tree Protocol." In Advances in Intelligent and Soft Computing, 437–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27708-5_60.
Full textDolev, Shlomi, Omri Liba, and Elad M. Schiller. "Self-stabilizing Byzantine Resilient Topology Discovery and Message Delivery." In Networked Systems, 42–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40148-0_4.
Full textConference papers on the topic "Network topology discovery"
Ge, Jianxia, and Wenya Xiao. "Network layer network topology discovery algorithm research." In 2nd International Symposium on Computer, Communication, Control and Automation. Paris, France: Atlantis Press, 2013. http://dx.doi.org/10.2991/isccca.2013.136.
Full textYao Zhao, Jianliang Yan, and Hua Zou. "Study on network topology discovery in IP networks." In Multimedia Technology (IC-BNMT 2010). IEEE, 2010. http://dx.doi.org/10.1109/icbnmt.2010.5705077.
Full textFarrell, Ryan, and Larry S. Davis. "Decentralized discovery of camera network topology." In 2008 Second ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC). IEEE, 2008. http://dx.doi.org/10.1109/icdsc.2008.4635696.
Full textJun, Li, Zhang Xuefeng, Shen Weihong, and Zou Qilin. "Network Topology Discovery Based on SNMP." In 2013 Ninth International Conference on Computational Intelligence and Security (CIS). IEEE, 2013. http://dx.doi.org/10.1109/cis.2013.48.
Full textHuang, Lisheng, Mingyong Yin, Changchun Li, and Xin Wang. "Passive mode discovery of network topology." In International Conference on Communication Technology. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/icct130831.
Full textHao, He, Daniel Silvestre, and Carlos Silvestre. "Source Localization and Network Topology Discovery in Infection Networks." In 2018 37th Chinese Control Conference (CCC). IEEE, 2018. http://dx.doi.org/10.23919/chicc.2018.8482274.
Full textYun-Sheng Yen, Tung-Lung Chan, Chia-Yi Liu, and Chwan-Yi Shiah. "Topology discovery service in the universal network." In 2011 3rd International Conference on Computer Research and Development (ICCRD). IEEE, 2011. http://dx.doi.org/10.1109/iccrd.2011.5764028.
Full textLi, Bo, Jingsha He, and Henghua Shi. "Improving the Efficiency of Network Topology Discovery." In 2008 3rd International Conference on Grid and Pervasive Computing Workshops (GPC Workshops). IEEE, 2008. http://dx.doi.org/10.1109/gpc.workshops.2008.34.
Full textAhmed, Adnan, and Behrouz Far. "Mobile Agent System for Network Topology Discovery." In 2006 Canadian Conference on Electrical and Computer Engineering. IEEE, 2006. http://dx.doi.org/10.1109/ccece.2006.277680.
Full textWang Yong, Pan Nan, and Tao Xiaoling. "Network topology discovery algorithm based on OSPF." In 2010 International Conference on Intelligent Computing and Integrated Systems (ICISS). IEEE, 2010. http://dx.doi.org/10.1109/iciss.2010.5656788.
Full text