Dissertations / Theses on the topic 'Network topology discovery'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 22 dissertations / theses for your research on the topic 'Network topology discovery.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Oliveira, Olga Margarida Fajarda. "Network topology discovery." Doctoral thesis, Universidade de Aveiro, 2017. http://hdl.handle.net/10773/18692.
Full textA monitorização e avaliação do desempenho de uma rede são essenciais para detetar e resolver falhas no seu funcionamento. De modo a conseguir efetuar essa monitorização, e essencial conhecer a topologia da rede, que muitas vezes e desconhecida. Muitas das técnicas usadas para a descoberta da topologia requerem a cooperação de todos os dispositivos de rede, o que devido a questões e políticas de segurança e quase impossível de acontecer. Torna-se assim necessário utilizar técnicas que recolham, passivamente e sem a cooperação de dispositivos intermédios, informação que permita a inferência da topologia da rede. Isto pode ser feito recorrendo a técnicas de tomografia, que usam medições extremo-a-extremo, tais como o atraso sofrido pelos pacotes. Nesta tese usamos métodos de programação linear inteira para resolver o problema de inferir uma topologia de rede usando apenas medições extremo-a-extremo. Apresentamos duas formulações compactas de programação linear inteira mista (MILP) para resolver o problema. Resultados computacionais mostraram que a medida que o número de dispositivos terminais cresce, o tempo que as duas formulações MILP compactas necessitam para resolver o problema, também cresce rapidamente. Consequentemente, elaborámos duas heurísticas com base nos métodos Feasibility Pump e Local ranching. Uma vez que as medidas de atraso têm erros associados, desenvolvemos duas abordagens robustas, um para controlar o número máximo de desvios e outra para reduzir o risco de custo alto. Criámos ainda um sistema que mede os atrasos de pacotes entre computadores de uma rede e apresenta a topologia dessa rede.
Monitoring and evaluating the performance of a network is essential to detect and resolve network failures. In order to achieve this monitoring level, it is essential to know the topology of the network which is often unknown. Many of the techniques used to discover the topology require the cooperation of all network devices, which is almost impossible due to security and policy issues. It is therefore, necessary to use techniques that collect, passively and without the cooperation of intermediate devices, the necessary information to allow the inference of the network topology. This can be done using tomography techniques, which use end-to-end measurements, such as the packet delays. In this thesis, we used some integer linear programming theory and methods to solve the problem of inferring a network topology using only end-to-end measurements. We present two compact mixed integer linear programming (MILP) formulations to solve the problem. Computational results showed that as the number of end-devices grows, the time need by the two compact MILP formulations to solve the problem also grows rapidly. Therefore, we elaborate two heuristics based on the Feasibility Pump and Local Branching method. Since the packet delay measurements have some errors associated, we developed two robust approaches, one to control the maximum number of deviations and the other to reduce the risk of high cost. We also created a system that measures the packet delays between computers on a network and displays the topology of that network.
Sigholm, Johan. "Automated Network Node Discovery and Topology Analysis." Thesis, Linköping University, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-10593.
Full textThis Master's Thesis describes the design and development of an architecture for automated network node discovery and topology analysis, implemented as an extension to the network management and provisioning system NETadmin. The architecture includes functionality for flexible network model assessment, using a method for versatile comparison between off-line database models and real-world models. These models are populated by current node data collected by network sensors.
The presented architecture supports (1) efficient creation and synchronization of network topology information (2) accurate recognition of new, replaced and upgraded nodes, including rogue nodes that may exhibit malicious behavior, and (3) provides an extension of an existing vendor-neutral enterprise network management and provisioning system.
An evaluation of the implementation shows evidence of accurate discovery and classification of unmatched hosts in a live customer production network with over 400 nodes, and presents data on performance and scalability levels.
The work was carried out at Netadmin System i Sverige AB, in Linköping, Sweden.
Spring, Neil Timothy. "Efficient discovery of network topology and routing policy in the Internet /." Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6985.
Full textBaltra, Guillermo P. "Efficient strategies for active interface-level network topology discovery." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37583.
Full textAs a piece of critical infrastructure, the Internet brings both benefits and security concerns. Recent cyber-security episodes such as route hijacks and Denial-of-Service attacks might have been mitigated and prevented with better knowledge of the network_s logical topology; i.e., router nodes and links. Current production public active mapping systems; e.g., Ark, Rocketfuel, and iPlane, produce valuable inferences of the Internet_s topology, as well as facilitating longitudinal analysis. We examine the extent to which the techniques utilized by these existing systems can be improved, in particular by attempting to reduce their high probing load. Our methodology divides the discovery process into three steps: destination selection, monitor assignment, and stop criterion. We implement and evaluate alternative designs for each step. The complete system runs in real-time on a production system to probe 500 randomly selected Internet subnetworks and gather real-world network maps. As compared to datasets from existing measurement platforms, we find that our method is able to generate 80% of the amount of data with 69% less load.
Barthel, Alexander. "Analysis, Implementation and Enhancement of Vendor dependent and independent Layer-2 Network Topology Discovery." Master's thesis, Universitätsbibliothek Chemnitz, 2005. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200500455.
Full textDiese Arbeit zeigt und implementiert Möglichkeiten zur OSI Layer-2 Netzwerk Topologie Erkennung basierend auf Informationen des Cisco Discovery Protocol, Spanning Tree Protocol und Switch Filter Datenbanken
Bodvill, Jonatan. "Enterprise network topology discovery based on end-to-end metrics : Logical site discovery in enterprise networks based on application level measurements in peer- to-peer systems." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-227803.
Full textI dataintensiva applikationer i företagsnätverk, speciellt applikationer som använder sig av peer-to-peer teknologi, är lokalitet viktigt. Klienter bör försöka maximera datautbyte med andra klienter där nätverkskopplingen är som bäst. För att klienterna ska kunna göra sådana val måste information om vilka klienter som befinner sig vara vara tillgänglig som klienterna kan basera sina val på. Denna information är inte trivial att framställa då det inte finns någon färdig global information om vilka klienter som har bra uppkoppling med andra klienter och att låta varje klient prova sig fram blint tills de hittar de bästa partnerna är kostsamt och sänker applikationens lokalitet innan den konvergerar. I denna rapport presenteras en lösning som skapar en logisk vy över ett peer-to-peer nätverk, vilken grupperar klienter i kluster baserat på deras uppkopplingskvalitet. Denna vy kan sedan användas för att förbättra lokaliteten i peerto-peer applikationen. En grafmodell av systemet skapas, där klienter modelleras som hörn och kopplingar mellan klienter modelleras som kanter med en vikt i relation till uppkopplingskvaliteten. Problemet formuleras sedan som ett riktat grafklusterproblem vilket är ett väldokumenterat forskningsområde med mycket arbete publicerat kring. De mest framstående grafklusteralgoritmerna är sedan studerade, utvalda baserat på kravspecifikationer, optimerade för det aktuella problemet och implementerade. Resultaten som produceras av att algoritmerna körs på strömdata är evaluerade mot känd information. Resultaten visar att oövervakade grafklusteralgoritmer skapar användbar information kring nätverkens uppkopplingsstruktur och kan användas i peer-to-peerapplikationssammanhang för att hitta de bästa partnerna att utbyta data med.
Jovanovic, Mihajlo A. "Modeling Large-scale Peer-to-Peer Networks and a Case Study of Gnutella." University of Cincinnati / OhioLINK, 2001. http://rave.ohiolink.edu/etdc/view?acc_num=ucin989967592.
Full textMallery, Christopher Jerry. "Location and topology discovery in wireless sensor networks." Pullman, Wash. : Washington State University, 2009. http://www.dissertations.wsu.edu/Dissertations/Spring2009/c_mallery_1050509.pdf.
Full textTitle from PDF title page (viewed on June 15, 2009). "School of Electrical Engineering and Computer Science." Includes bibliographical references (p. 108-117).
Kandoi, Rajat. "Deploying Software-Defined Networks: a Telco Perspective." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172354.
Full textGonzalez, Valenzuela Sergio. "A service-oriented approach to topology formation and resource discovery in wireless ad-hoc networks." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/745.
Full textOchoa, Aday Leonardo. "Contributions to topology discovery, self-healing and VNF placement in software-defined and virtualized networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2019. http://hdl.handle.net/10803/665397.
Full textCosta, Fábio Rafael Azevedo. "Internet tomography : network topology discovery and network performance evaluation." Master's thesis, 2013. http://hdl.handle.net/1822/27830.
Full textDue to the security threats and complexity of network services, such as video conferencing, internet telephony or online gaming, which require high QoS guarantees, the need for monitoring and evaluating network performance, in order to promptly detect and face security threats and malfunctions, is crucial to the correct operation of networks and network-based services. As the internet evolves in size and diversity, these tasks become difficult and demanding. Moreover, administrative limitations can restrict the position and the scope of the links to be monitored, while legislation imposes limitations on the information that can be collected and exported for monitoring purposes and almost all organization can't monitor or have knowledge or evaluate the performance of the entire network. They only can do this to part of the network, which corresponds to their own network. In this thesis, we propose the use of tomographic techniques for network topology discovery and performance evaluation. Network tomography studies the internal characteristics of the network using end-to-end probes, ie, it does not need the cooperation of the internal nodes of the network and can be successfully adopted in almost all scenarios. Thus, it is possible to have knowledge of the network characteristics out of the administrative borders. In this thesis we propose a new approach to Probe Packet Sandwich, where we use TTL-limited probes to infer the delay of a path hop-by-hop. We have shown that this approach is more effective than existing ones. This work was developed under the ERASMUS student mobility program, in the Telecommunication Networks Research Group, Dept. of Information Engineering, University of Pisa.
Devido às ameaças de segurança e complexidade dos serviços de rede, tais como videoconferência, telefonia via Internet ou jogos on-line, que exigem altas garantias de QoS, a necessidade de monotorização e avaliação de desempenho da rede, a fim de detectar prontamente e enfrentar as ameaças de segurança e mau funcionamento, é crucial para o correto funcionamento das redes e serviços baseados em rede. À medida que a Internet evolui em tamanho e diversidade, essas tarefas tornam-se difíceis e exigentes. Além disso, as limitações administrativas podem restringir a posição e o alcance dos links a serem monitorizados, enquanto a legislação impõe limitações sobre as informações que podem ser coletadas e exportadas para fins de monotorização e quase todas as organizações não podem controlar ou ter conhecimento ou avaliar o desempenho de toda a rede. Eles só podem fazer isso a parte da rede, o que corresponde à sua própria rede. Neste trabalho, nós propomos o uso de técnicas tomográficas para a descoberta da topologia da rede e avaliação de desempenho. A tomografia de rede estuda as características internas da rede usando medições fim-a-fim, ou seja, não necessita da ajuda dos nós internos da rede, podendo ser adoptadas com sucesso em quase todos os cenários. Desta maneira é possível obter conhecimento das características da rede para além dos limites administrativos. Neste tranalho propomos uma nova abordagem do Packet Sandwich Probe, onde utilizamos pacotes TTL-Limited para inferir o delay de um path hop-by-hop. Nós mostramos que esta abordagem é mais eficaz que outras já existentes. Este trabalho foi desenvolvido no âmbito do programa de mobilidade de estudantes ERASMUS, no Grupo de Investigação em Redes de Telecomunicações, Departamento de Engenharia de Informação da Universidade de Pisa.
Delport, Johannes Petrus. "Link layer topology discovery in an uncooperative ethernet environment." Diss., 2008. http://hdl.handle.net/2263/27589.
Full textDissertation (MSc)--University of Pretoria, 2008.
Computer Science
unrestricted
Du, Ming Bin, and 杜明斌. "A Study of the Network Management System: Network Topology Discovery." Thesis, 1994. http://ndltd.ncl.edu.tw/handle/90951518664996726352.
Full text中原大學
資訊工程研究所
82
From a network manager's point of view, to discover topology of Internet is the foundation for the network management. A network topology refers to the relationships between entities in a network. The optimization problem of Network Topology Discovery type I (NTD type I) is to minimize accessing operations to discover the network topology, where every agent maintains pure topology- information, and the manager can access one record per operation. The optimization problem of Network Topology Discovery type II (NTD type II) is to minimize the accessed agent, with minimal accessing operations simultaneously, where every agent maintains mixed topology- information, and the manager can access one or more records per operation. We prove that both the problems are NP-complete, and have to be solved on-line. The problems of NTD type I/II is mapped into an on-line graph problem called On-line Weighted Vertex Cover. The approximation algorithms we proposed guarantee a performance ratio of O(log D), and can be delivered in O(n^2) where n is the number of vertices, and D is the maximal degree of graph. Our experiment shows they outperform other reported off-line heuristics. We present the algorithms of NTD type I/II by SNMP and MIB-II, and can discover the topology of TCP/IP network in exterior-gateway and interior- gateway level.
Lai, Hsin-Liang, and 賴信良. "Automatic Link Layer Topology Discovery of IP Network." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/97924561321417414869.
Full text國立清華大學
資訊工程學系
87
Network topology information is useful for network administration and planning. Techniques for automatic generation of the network layer topology maps of IP networks can be found in [2,3,7]. The devices in a subnet can be found using a network layer topology discovery tool. However, the link layer topology of the subnet can not be obtained by a network layer topology discovery tool. An algorithm for automatic discovery of the link layer topology of an IP subnet is proposed in this paper. The algorithm uses the link layer topology configuration information obtained from various sources including the MIBs in routers, bridges, and switches, the Internet Control Message Protocol (ICMP), the Domain Name System (DNS), and etc. to produce the link layer topology map. The proposed link layer topology discovery algorithm has been implemented based on the Tcl/Tk [4,5,6] and Scotty [8] environment.
Gunes, Mehmet Hadi. "Complex network discovery : Router-Level internet topology mapping /." 2008. http://proquest.umi.com/pqdweb?did=1597608471&sid=2&Fmt=2&clientId=10361&RQT=309&VName=PQD.
Full textIslam, Z. M. Faizul. "OLSR-based network discovery in situational awareness system for tactical MANETs." Thesis, 2012. http://hdl.handle.net/10155/211.
Full textUOIT
Li, Chen-Tai, and 李成泰. "The Implement of Repository-Based TCP/IP Network Topology Discovery and Management System." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/94983649322492890798.
Full text輔仁大學
資訊管理學系
88
As the repaid development of network technology, the computer environment becomes more and more complexity. In order to keep network performance in normal operation, the integrated network management system is the most important tool. The general scope of network management consists of from managing any kind of network systems and devices of a network to the configuration management of a local area network in the enterprise and the performance management of a network connecting to the Internet. We propose a network fault management expert system, it includes three parts: network topology discovery and management system(NTMS), distributed network traffic flow collection and analytic system(DNTS), and distributed network fault management system(DNFS). The NTMS discoveries, records, and manages the devices residing in a network, and then uses graphic user interface to display the network topology, so that a network manager can monitor the network status and manage the network. The DNTS collects and analyzes the traffic flow in the network,and then generate alarm for the DNFS to analyze the fault events of the network. The DNFS analyzes the alarms, infers network fault events, and gives solution or suggestion to solve the problems raised in the network. It uses cased-based reasoning to increase the knowledge base. It also has self-learning capability to adapt more and more complicate network environments in the future. Many network management systems send ICMP packets to identify an alive device in a netowrk and what kind of the device is. Through this way, they find out the relationship of connectity of the devices and analyze the network topology. We propose another suggestion through the inofrmatoion provided in management information base (MIB) in a network device to analyze the network topology. The topology interface can be used to manage the network. We implement this system in Java language and test this system in the Fu-Jen University campus network. Our system also compares with other famous network management tools. The result shows that our system has the advantage over most of similar products in network fault management with providing history information. Our system has the same network topology output as that provided by other tools, but the GUI is not good enough. We are going to enhance it in the future.
Lehman, Li-wei, and Steven Lerman. "PALM: Predicting Internet Network Distances Using Peer-to-Peer Measurements." 2003. http://hdl.handle.net/1721.1/3965.
Full textSingapore-MIT Alliance (SMA)
Yi-Fan, Wang, and 王逸凡. "Web-based Distributed Topology Discovery of IP Networks." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/12994234894823231292.
Full textChan, Tung-Lung, and 詹東隆. "Cross-Layer Topology Discovery Algorithm in IP-Based Networks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/31537764475800237995.
Full text佛光大學
資訊學系
99
The current progress of network technique and the complication of network structure make administrators must spend more time and mind to maintain the system and the network under normal operation. With continuously increasing dependence on the network, it seems to be a knotty matter to know how to effectively manage all equipments on the network and to make sure they whether run it rightly or not. To make a comprehensive survey of present administrator’s management mode, administrators have to quite understand themselves rule network’s each equipmental IP and the entire topology structure to rapidly and efficiently tend more and more complicated network environment, which work fine in most small-scale network environments, but not in slightly large-scale enironments that reveal the vitalness of leading into automation management to relieve the burden of administrator towards network management. This essay’s presenting an ACLTD Algorithm (Automatic Cross-Layer Topology Discovery) that can work on network layer and data-link layer based on Simple Network Management Protocol (SNMP) that is widely used by each network administrator nowadays. It can be automatic exploration through random knotted dot, and possesses the feature of cross-layer and multiple protocols to support exploration of heterogeneous network, possesses quicker and more effective explorative ability of topology resource. The implement way will rely on the standard of the mutual communicative protocol to automatically discover the entire network topology and all network equipped link dot from integration to open source code’s network-managed system to prove the ACLTD Algorithm is effective.
Ye, Chen-Shin, and 葉陳欣. "Automatic Topology Discovery and Virtual Connection Trace for ATM Networks Using SNMP." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/15783124447445256618.
Full text國立清華大學
資訊工程學系
86
The topology of an ATM network is referred to as the map of the network consisting of the devices in the network and the connections among them. Network topology information is useful for network administration and planning.Entering the network topology information manually is a tedious task if the number of network devices is large. Therefore, a tool for generating the network topology automatically is desirable. In ATMnetworks, the value of VPI and VCI have only local significance. It does notexplicitly reveal information about the source, destination, and path of thevirtual onnection. The source, destination, and path for a virtual connection can be found by tracing the VPIs and VCIs in the atm switches.In this paper, algorithms for discovering the topologies of ATM networks and tracing the paths of virtual connections automaticallyusing the Simple Network Management Protocol (SNMP) are proposed.