Dissertations / Theses on the topic 'Network topology'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Network topology.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Oliveira, Olga Margarida Fajarda. "Network topology discovery." Doctoral thesis, Universidade de Aveiro, 2017. http://hdl.handle.net/10773/18692.
Full textA monitorização e avaliação do desempenho de uma rede são essenciais para detetar e resolver falhas no seu funcionamento. De modo a conseguir efetuar essa monitorização, e essencial conhecer a topologia da rede, que muitas vezes e desconhecida. Muitas das técnicas usadas para a descoberta da topologia requerem a cooperação de todos os dispositivos de rede, o que devido a questões e políticas de segurança e quase impossível de acontecer. Torna-se assim necessário utilizar técnicas que recolham, passivamente e sem a cooperação de dispositivos intermédios, informação que permita a inferência da topologia da rede. Isto pode ser feito recorrendo a técnicas de tomografia, que usam medições extremo-a-extremo, tais como o atraso sofrido pelos pacotes. Nesta tese usamos métodos de programação linear inteira para resolver o problema de inferir uma topologia de rede usando apenas medições extremo-a-extremo. Apresentamos duas formulações compactas de programação linear inteira mista (MILP) para resolver o problema. Resultados computacionais mostraram que a medida que o número de dispositivos terminais cresce, o tempo que as duas formulações MILP compactas necessitam para resolver o problema, também cresce rapidamente. Consequentemente, elaborámos duas heurísticas com base nos métodos Feasibility Pump e Local ranching. Uma vez que as medidas de atraso têm erros associados, desenvolvemos duas abordagens robustas, um para controlar o número máximo de desvios e outra para reduzir o risco de custo alto. Criámos ainda um sistema que mede os atrasos de pacotes entre computadores de uma rede e apresenta a topologia dessa rede.
Monitoring and evaluating the performance of a network is essential to detect and resolve network failures. In order to achieve this monitoring level, it is essential to know the topology of the network which is often unknown. Many of the techniques used to discover the topology require the cooperation of all network devices, which is almost impossible due to security and policy issues. It is therefore, necessary to use techniques that collect, passively and without the cooperation of intermediate devices, the necessary information to allow the inference of the network topology. This can be done using tomography techniques, which use end-to-end measurements, such as the packet delays. In this thesis, we used some integer linear programming theory and methods to solve the problem of inferring a network topology using only end-to-end measurements. We present two compact mixed integer linear programming (MILP) formulations to solve the problem. Computational results showed that as the number of end-devices grows, the time need by the two compact MILP formulations to solve the problem also grows rapidly. Therefore, we elaborate two heuristics based on the Feasibility Pump and Local Branching method. Since the packet delay measurements have some errors associated, we developed two robust approaches, one to control the maximum number of deviations and the other to reduce the risk of high cost. We also created a system that measures the packet delays between computers on a network and displays the topology of that network.
Norangshol, Roy Sindre. "Open network topology services." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-23100.
Full textGu, Yuwei Ph D. Massachusetts Institute of Technology. "Controlling polymer network topology." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122851.
Full textCataloged from PDF version of thesis.
Includes bibliographical references.
Chapter 1: Introduction to Polymer Network Topology on a (Macro)Molecular Level Polymer network topology, comprising the ways in which strands and junctions are connected in polymer networks, plays a critical role in dictating many material properties. Here we discuss classical challenges in the field and review existing strategies to characterize and manipulate polymer network topology from a (macro)molecular level. Chapter 2: Semibatch Monomer Addition as a General Method to Tune and Enhance the Mechanics of Polymer Networks via Loop-defect Control In this chapter we introduce semibatch monomer addition as a general strategy to reduce/control an important topological feature at short length scale-primary loops, thus providing materials with tunable and significantly improved mechanical properties without changing their composition.
Chapter 3: Leaving Groups as Traceless Topological Modifiers for Controlling Topological Structure in Chemically Identical Polymer Networks Here we report "traceless topological modification" as a general approach to control an important long length-scale topological feature-junction distribution. Using self-assembled structures as templates that are not themselves incorporated into the network, our method enables us to synthesize truly topologically isomeric networks with drastically different macroscopic properties. Chapter 4: Photoswitching Topology in Polymer Networks with Metal-Organic Cages as Crosslinks Based on our works in Chapter 2 and Chapter 3, we further explored topology as the central design principle to create novel functional materials.
In this chapter we introduce topology switching via cooperative self-assembly as a design principle to reversibly alter multiple network properties simultaneously and enable the preparation of one material that can exist in multiple topological states. Chapter 5: Living Additive Manufacturing: Transformation of Parent Gels into Diversely Functionalized Daughter Gels Made Possible by Visible Light Photoredox Catalysis Our ability to control polymer network topology has been further enhanced by developing living additive manufacturing as an effective strategy to expand the original topology of parent networks in a photo-growth fashion. This approach enables us to transform the mechanical/physical properties of parent networks post-synthetically.
Chapter 6: polyMOF Nanoparticles: Dual Roles of a Multivalent polyMOF Ligand in Size Control and Surface Functionalization Here we present a novel approach to synthesizing well defined metal-organic framework nanoparticles (MOF NPs), where the size control and surface functionalization of MOF-5 NPs were simultaneously achieved using multivalent polyMOF ligands.
by Yuwei Gu.
Ph. D. in Organic Chemistry
Ph.D.inOrganicChemistry Massachusetts Institute of Technology, Department of Chemistry
Fard, Pedram J. "Dynamic reconfiguration of network topology in optical networks." College Park, Md. : University of Maryland, 2007. http://hdl.handle.net/1903/7412.
Full textThesis research directed by: Electrical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Yao, Ye. "Ad Hoc Networks Measurement Model and Methods Based on Network Tomography." Phd thesis, Université de Technologie de Belfort-Montbeliard, 2011. http://tel.archives-ouvertes.fr/tel-00636282.
Full textPfennig, Stefan, and Elke Franz. "Secure Network Coding: Dependency of Efficiency on Network Topology." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2013. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-128456.
Full textKhorramzadeh, Yasamin. "Network Reliability: Theory, Estimation, and Applications." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/64383.
Full textPh. D.
Jin, Xing. "Topology inference and tree construction for topology-aware overlay streaming /." View abstract or full-text, 2007. http://library.ust.hk/cgi/db/thesis.pl?CSED%202007%20JIN.
Full textLong, Weili. "On the topology design of hose-model VPN networks /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?ECED%202008%20LONG.
Full textDeccio, Casey T. "Network-layer Selective Security." Diss., CLICK HERE for online access, 2004. http://contentdm.lib.byu.edu/ETD/image/etd560.pdf.
Full textSigholm, Johan. "Automated Network Node Discovery and Topology Analysis." Thesis, Linköping University, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-10593.
Full textThis Master's Thesis describes the design and development of an architecture for automated network node discovery and topology analysis, implemented as an extension to the network management and provisioning system NETadmin. The architecture includes functionality for flexible network model assessment, using a method for versatile comparison between off-line database models and real-world models. These models are populated by current node data collected by network sensors.
The presented architecture supports (1) efficient creation and synchronization of network topology information (2) accurate recognition of new, replaced and upgraded nodes, including rogue nodes that may exhibit malicious behavior, and (3) provides an extension of an existing vendor-neutral enterprise network management and provisioning system.
An evaluation of the implementation shows evidence of accurate discovery and classification of unmatched hosts in a live customer production network with over 400 nodes, and presents data on performance and scalability levels.
The work was carried out at Netadmin System i Sverige AB, in Linköping, Sweden.
Dong, Yu-An 1974. "Statistical analysis of protein interaction network topology." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28925.
Full textIncludes bibliographical references (leaves 116-117).
Complex networks arise in diverse areas of natural and social sciences and network topology is a key determinant of such systems. In this work we investigate the protein-protein interaction network of the KSHV herpesvirus, which is the first viral system available, and compare it to a prototypical cellular system. On the local level, we investigated the relationship between interaction and sequence evolution, functional class, phylogenetic class, and expression profiles. On the global level, we focused on large-scale properties like small-world, scale-free, and attack tolerance. Major differences were discovered between viral and cellular systems, and we were able to pinpoint directions for further investigation, both theoretically and experimentally. New approaches to discover functional associations through interaction patterns were also presented and validated. To put the KSHV network in the context of host interactions, we were able to predict interactions between KSHV and human proteins and use them to connect the KSHV and human PPI networks. Though simulations, we show that the combined viral-host network is distinct from and superior to equivalent randomly combined networks. Our combined network provides the first-draft of a viral-host system, which is crucial to understanding viral pathogenicity. In a separate chapter, the results of a project combining experiments and bioinformatics are also presented. We were able to report [approximately]30 new yeast protein-protein interactions and pinpoint the biological significance of some of those interactions. The methodology of yeast two-hybrid itself is also tested and assessed.
by Yu-An Dong.
Ph.D.
Loe, Chuan. "On the topology Of network fine structures." Thesis, Imperial College London, 2015. http://hdl.handle.net/10044/1/28624.
Full textSaal, Oliver. "Visualisation of ATM network connectivity and topology." Master's thesis, University of Cape Town, 2001. http://hdl.handle.net/11427/6437.
Full textATM and dynamic reconfiguration allow for rapid changes in a virtual path network depending on traffic load and future demands. This technology improves the utilisation, lowers the call blocking probability and increases the overall performance of a network. However, it poses several management difficulties when user intervention is required to resolve complex routing problems. In this dissertation, we describe a visualisation approach which uses a network metaphor to aid administrators in managing dynamic ATM networks. Our metaphor scales well for networks of varying size, addresses the cluttering problem experienced by past metaphors and maintains the overall network context while providing additional support for navigation and interaction.
Liu, Yunhuai. "Probabilistic topology control in wireless sensor networks /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?CSED%202008%20LIU.
Full textRye, Erik C. "Evaluating the limits of network topology inference via virtualized network emulation." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45932.
Full textThe Internet measurement community is beset by a lack of ground truth, or knowledge of the real, underlying network in topology inference experiments. While better tools and methodologies can be developed, quantifying the effectiveness of these mapping utilities and explaining pathologies is difficult, if not impossible, without knowing the network topology being probed. In this thesis we present a tool that eliminates topological uncertainty in an emulated, virtualized environment. First, we automatically build topological ground truth according to various network generation models and create emulated Cisco router networks by leveraging and modifying existing emulation software. We then automate topological inference from one vantage point at a time for every vantage point in the network. Finally, we incorporate a mechanism to study common sources of network topology inference abnormalities by including the ability to induce link failures within the network. In addition, this thesis reexamines previous work in sampling Autonomous System-level Internet graphs to procure realistic models for emulation and simulation. We build upon this work by including additional data sets, and more recent Internet topologies to sample from, and observe divergent results from the authors of the original work. Lastly, we introduce a new technique for sampling Internet graphs that better retains particular graph metrics across multiple timeframes and data sets.
Komali, Ramakant S. "Game-Theoretic Analysis of Topology Control." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/28358.
Full textPh. D.
Mudali, Pragasen. "Topology control for wireless mesh networks and its effect on network performance." Thesis, University of Zululand, 2017. http://hdl.handle.net/10530/1565.
Full textInfrastructureWireless Mesh Networks (I-WMNs) are increasingly used to provide network connectivity and Internet access to previously under-served areas in the developing world. It is common for some of these deployments to be battery-powered due to a lack of electrical infrastructure in the targeted areas. Thus, the energy-efficiency of these networks gains additional importance. Topology Control (TC) has been previously reported to improve the energy-efficiency and network performance of wireless ad-hoc networks, including I-WMNs. However,simulation-based studies have been relied upon to reach these conclusions and the study of TC prototypes applicable to I-WMNs has largely been limited to design issues. Thus, the study of the efficacy of TC prototypes as a mechanism for improving energy-fficiency and network performance remains an open issue. The thesis addresses this knowledge gap by studying the dynamic, run-time behaviours and the network topologies created by two standards-compatible TC prototypes. This study provides unique insight into how the prototypes consume computational resources, maintain network connectivity, produce cumulative transceiver power savings and affect the workings of the routing protocol being employed. This study also documents the topology instability caused by transceiver power oscillations produced by the PlainTC prototype. A context-based solution to reduce transceiver power oscillations and the subsequent topology instability is proposed. This solution applies the Principal Component Analysis statistical method to historical network data in order to derive the weights associated with each of the identified context variables. A threshold value is defined that only permits a node to adjust its transceiver power output if the observed change in a node’s context exceeds the threshold. The threshold mechanism is incorporated into the PlainTC+ prototype and is shown to reduce topology instability whilst improving network performance when compared to PlainTC.The results obtained in this study suggest that I-WMN topologies formed by TC are able to closely match the performance of networks that do not employ TC. However, this study shows that TC negatively affects the energy efficiency of the network despite achieving cumulative transceiver power savings.
Kasthurirathna, Dharshana Mahesh. "The influence of topology and information diffusion on networked game dynamics." Thesis, The University of Sydney, 2015. http://hdl.handle.net/2123/14570.
Full textSpring, Neil Timothy. "Efficient discovery of network topology and routing policy in the Internet /." Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6985.
Full textTerelius, Håkan, Guodong Shi, Jim Dowling, Amir Payberah, Ather Gattami, and Karl Henrik Johansson. "Converging an Overlay Network to a Gradient Topology." KTH, Reglerteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-46515.
Full text© 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. QC 20111124
Li, Yuhong. "Disruption Information, Network Topology and Supply Chain Resilience." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/78352.
Full textPh. D.
Dhanapalan, Manojprasadh. "Topology-aware Correlated Network Anomaly Detection and Diagnosis." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1339742606.
Full textElshqeirat, Basima Ahmad Haroun. "Optimizing reliable network topology design using dynamic programming." Thesis, Curtin University, 2015. http://hdl.handle.net/20.500.11937/823.
Full textPerera, Pannilage Supun Sachinthaka. "Topological Approach for Modelling the Structure, Dynamics and Robustness of Supply Chain Networks." Thesis, The University of Sydney, 2018. http://hdl.handle.net/2123/20418.
Full textKamei, Hiroko. "Interplay between network topology and synchrony-breaking bifurcation : homogeneous four-cell coupled networks." Thesis, University of Warwick, 2008. http://wrap.warwick.ac.uk/2126/.
Full textTran, Thi-Minh-Dung. "Methods for finite-time average consensus protocols design, network robustness assessment and network topology reconstruction." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAT023/document.
Full textConsensus of Multi-agent systems has received tremendous attention during the last decade. Consensus is a cooperative process in which agents interact in order to reach an agreement. Most of studies are committed to analysis of the steady-state behavior of this process. However, during the transient of this process a huge amount of data is produced. In this thesis, our aim is to exploit data produced during the transient of asymptotic average consensus algorithms in order to design finite-time average consensus protocols, assess the robustness of the graph, and eventually recover the topology of the graph in a distributed way. Finite-time Average Consensus guarantees a minimal execution time that can ensure the efficiency and the accuracy of sophisticated distributed algorithms in which it is involved. We first focus on the configuration step devoted to the design of consensus protocols that guarantee convergence to the exact average in a given number of steps. By considering networks of agents modelled with connected undirected graphs, we formulate the problem as the factorization of the averaging matrix and investigate distributed solutions to this problem. Since, communicating devices have to learn their environment before establishing communication links, we suggest the usage of learning sequences in order to solve the factorization problem. Then a gradient backpropagation-like algorithm is proposed to solve a non-convex constrained optimization problem. We show that any local minimum of the cost function provides an accurate factorization of the averaging matrix. By constraining the factor matrices to be as Laplacian-based consensus matrices, it is now well known that the factorization of the averaging matrix is fully characterized by the nonzero Laplacian eigenvalues. Therefore, solving the factorization of the averaging matrix in a distributed way with such Laplacian matrix constraint allows estimating the spectrum of the Laplacian matrix. Since that spectrum can be used to compute some robustness indices (Number of spanning trees and Effective graph Resistance also known as Kirchoff index), the second part of this dissertation is dedicated to Network Robustness Assessment through distributed estimation of the Laplacian spectrum. The problem is posed as a constrained consensus problem formulated in two ways. The first formulation (direct approach) yields a non-convex optimization problem solved in a distributed way by means of the method of Lagrange multipliers. The second formulation (indirect approach) is obtained after an adequate re-parameterization. The problem is then convex and solved by using the distributed subgradient algorithm and the alternating direction method of multipliers. Furthermore, three cases are considered: the final average value is perfectly known, noisy, or completely unknown. We also provide a way for computing the multiplicities of the estimated eigenvalues by means of an Integer programming. In this spectral approach, given the Laplacian spectrum, the network topology can be reconstructed through estimation of Laplacian eigenvector. The efficiency of the proposed solutions is evaluated by means of simulations. However, in several cases, convergence of the proposed algorithms is slow and needs to be improved in future works. In addition, the indirect approach is not scalable to very large graphs since it involves the computation of roots of a polynomial with degree equal to the size of the network. However, instead of estimating all the spectrum, it can be possible to recover only a few number of eigenvalues and then deduce some significant bounds on robustness indices
Srivastava, Gaurav. "Efficient topology control algorithms for ad hoc networks." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20080506.144718/index.html.
Full textHammarström, Emil. "Network optimisation and topology control of Free Space Optics." Thesis, Linköpings universitet, Kommunikations- och transportsystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-124546.
Full textNordkvist, Tobias. "Network optimisation and topology control of Free Space Optics." Thesis, Linköpings universitet, Kommunikations- och transportsystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-130003.
Full textScheidemantel, Austin, Ibrahim Alnasser, Benjamin Carpenter, Paul Frost, Shivhan Nettles, and Chelsie Morales. "Situational Wireless Awareness Network." International Foundation for Telemetering, 2010. http://hdl.handle.net/10150/604295.
Full textThe purpose of this paper is to explain the process to implementing a wireless sensor network in order to improve situational awareness in a dense urban environment. Utilizing a system of wireless nodes with Global Positioning System (GPS) and heart rate sensors, a system was created that was able to give both position and general health conditions. By linking the nodes in a mesh network line of sight barriers were overcome to allow for operation even in an environment full of obstruction.
Weighill, Deborah A. "Exploring the topology of complex phylogenomic and transcriptomic networks." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/95800.
Full textENGLISH ABSTRACT: This thesis involved the development and application of network approaches for the construction, analysis and visualization of phylogenomic and transcriptomic networks. A co-evolutionary network model of grapevine genes was constructed based on three mechanisms of evolution. The investigation of local neighbourhoods of this network revealed groups of functionally related genes, illustrating that the multi-mechanism evolutionary model was identifying groups of potentially co-evolving genes. An extended network definition, namely 3-way networks, was investigated, in which edges model relationships between triplets of objects. Strategies for weighting and pruning these 3-way networks were developed and applied to a phylogenomic dataset of 211 bacterial genomes. These 3-way bacterial networks were compared to standard 2-way network models constructed from the same dataset. The 3-way networks modelled more complex relationships and revealed relationships which were missed by the two-way network models. Network meta-modelling was explored in which global network and node-bynode network comparison techniques were applied in order to investigate the effect of the similarity metric chosen on the topology of multiple types of networks, including transcriptomic and phylogenomic networks. Two new network comparison techniques were developed, namely PCA of Topology Profiles and Cross-Network Topological Overlap. PCA of Topology Profiles compares networks based on a selection of network topology indices, whereas Cross- Network Topological Overlap compares two networks on a node-by-node level, identifying nodes in two networks with similar neighbourhood topology and thus highlighting areas of the networks with conflicting topologies. These network comparison methods clearly indicated how the similarity metric chosen to weight the edges of the network influences the resulting network topology, consequently influencing the biological interpretation of the networks.
AFRIKAANSE OPSOMMING: Hierdie tesis hou verband met die ontwikkeling en toepassing van netwerk benaderings vir die konstruksie, analise en visualisering van filogenomiese en transkriptomiese netwerke. 'n Mede-evolusionêre netwerk model van wingerdstok gene is gebou, gebaseerd op drie meganismes van evolusie. Die ondersoek van plaaslike omgewings van die netwerk het groepe funksioneel verwante gene aan die lig gebring, wat daarop dui dat die multi-meganisme evolusionêre model groepe van potensieele mede-evolusieerende gene identifiseer. 'n Uitgebreide netwerk definisie, naamliks 3-gang netwerke, is ondersoek, waarin lyne die verhoudings tussen drieling voorwerpe voorstel. Strategieë vir weeg en snoei van hierdie 3-gang netwerke was ontwikkel en op 'n filogenomiese datastel van 211 bakteriële genome toegepas. Hierdie 3-gang bakteriële netwerke is met die standaard 2-gang netwerk modelle wat saamgestel is uit dieselfde datastel vergelyk. Die 3-gang netwerke het meer komplekse verhoudings gemodelleer en het verhoudings openbaar wat deur die tweerigting-netwerk modelle gemis is. Verder is netwerk meta-modellering ondersoek waarby globalle netwerk en punt-vir-punt netwerk vergelykings tegnieke toegepas is, met die doel om die effek van die ooreenkoms-maatstaf wat gekies is op die topologie van verskeie tipes netwerke, insluitend transcriptomic en filogenomiese netwerke, te bepaal. Twee nuwe netwerk-vergelyking tegnieke is ontwikkel, naamlik "PCA of Topology Profiles" en"Cross-Network Topological Overlap". PCA van Topologie Profiele vergelyk netwerke gebaseer op 'n seleksie van netwerk topologie indekse, terwyl Cross-netwerk Topologiese Oorvleuel vergelyk twee netwerke op 'n punt-vir-punt vlak, en identifiseer punte in twee netwerke met soortgelyke lokale topologie en dus lê klem op gebiede van die netwerke met botsende topologieë. Hierdie netwerk-vergelyking metodes dui duidelik aan hoe die ooreenkoms maatstaf wat gekies is om die lyne van die netwerk gewig te gee, die gevolglike netwerk topologie beïnvloed, wat weer die biologiese interpretasie van die netwerke kan beïnvloed.
Obenaus, Stefan Thomas Henning. "Topology of a high speed free-space photonic network." Thesis, McGill University, 1995. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=22867.
Full textWe find that deflection routing is a very suitable routing strategy since it does not require expensive buffers at network nodes, and it does not experience deadlock.
After reviewing current research in deflection routing for a variety of network topologies, we conclude that the 11 $ times$ 11-torus, the 5-symbol star graph, and the 7-dimensional hypercube are attractive candidates for a photonic network of approximately 120 nodes.
Then, we determine efficient embeddings of these three networks into an optical hyperplane which hosts the communication channels of the network in one and two dimensions. While trying to embed the 5-star into the two-dimensional hyperplane, we discover an embedding strategy which allows any n-star to be embedded into any d-dimensional grid of size at most ${ underbrace{n times ... times n} sb{d-1}} times (n!/d!)$ without any bends between neighbours in the n-star.
Through simulation, we determine that for a network size of about 120 nodes, the hypercube in seven dimensions offers the most dependable behaviour since its throughput is always above 99.6% and the delay is never greater than 20% of the average distance. However, when we allocate an equal number of communication channels to each node, we find that the star graph offers superior performance due to its low degree and diameter, and when we assign an equal number of communication channels to the three topologies as a whole, the torus outperforms the star and cube due to its efficient embeddings in the hyperplane.
Trassare, Samuel T. "A Technique for Presenting a Deceptive Dynamic Network Topology." Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32911.
Full textAdversaries scan Department of Defense networks looking for vulnerabilities that allow surveillance or the embedding of destructive malware weapons. In cyberspace, adversaries either actively probe or passively observe defended computer networks in attempts to determine, among other attributes, the topology of the network. We develop a novel strategic deceptive methodology, based on principles of military deception, for deceiving a malicious traceroute probe in defense of a physical data communications network. We construct a proof-of-concept network to show that a remote adversary who uses traceroute to map the defended network_s topology can be presented with a false route of the defender_s choosing. Akin to military deception operations in the field and at sea, a network that employs a deception scheme implemented on an intelligent border router can present a deceptive topology to an adversary. Our experiments show that a defender using our technique can successfully deceive a traceroute probe, the first in a sequence of steps to mount a credible deception scheme against an adversary.
Hughes, Jason J. "Employing deceptive dynamic network topology through software-defined networking." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/41392.
Full textComputer networks are constantly being actively probed in attempts to build topological maps of intermediate nodes and discover endpoints, either for academic research or nefarious schemes. While some networks employ recommended conventional countermea-sures to simply block such probing at the boundary or shunt such traffic to honey pot systems, other networks remain completely open either by design or neglect. Our research builds on previous work on the concept of presenting a deceptive network topology, which goes beyond conventional network security countermeasures of detecting and blocking network probe traffic. By employing the technologies from the emerging field of Software-Defined Networking and the OpenFlow protocol, we constructed a custom-built SDN controller to listen for network probes and craft customized deceptive replies to those probes. Through employment of various network probing utilities against our custom-built SDN controller in a test network environment, we are able to present a believable deceptive representation of the network topology to an adversary. Therefore, this work demonstrates that the primitives of the expand-ing OpenFlow protocol show strong potential for constructing an enterprise-grade dynamic deceptive network topology solution to protect computer networks.
Baltra, Guillermo P. "Efficient strategies for active interface-level network topology discovery." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37583.
Full textAs a piece of critical infrastructure, the Internet brings both benefits and security concerns. Recent cyber-security episodes such as route hijacks and Denial-of-Service attacks might have been mitigated and prevented with better knowledge of the network_s logical topology; i.e., router nodes and links. Current production public active mapping systems; e.g., Ark, Rocketfuel, and iPlane, produce valuable inferences of the Internet_s topology, as well as facilitating longitudinal analysis. We examine the extent to which the techniques utilized by these existing systems can be improved, in particular by attempting to reduce their high probing load. Our methodology divides the discovery process into three steps: destination selection, monitor assignment, and stop criterion. We implement and evaluate alternative designs for each step. The complete system runs in real-time on a production system to probe 500 randomly selected Internet subnetworks and gather real-world network maps. As compared to datasets from existing measurement platforms, we find that our method is able to generate 80% of the amount of data with 69% less load.
Ali, Baraa Saeed. "HIGH LEVEL SYNTHSIS FOR A NETWORK ON CHIP TOPOLOGY." OpenSIUC, 2013. https://opensiuc.lib.siu.edu/theses/1079.
Full textZhou, Yuanyuan. "Energy-efficient protocols and topologies for sensor and personal-area networks." Online access for everyone, 2007. http://www.dissertations.wsu.edu/Dissertations/Summer2007/y_zhou_072307.pdf.
Full textPennington, Nicholas. "Network Properties of Optically Linked Planetary Satellite Systems." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/theses/2702.
Full textWightman, Rojas Pedro Mario. "Topology Control in Wireless Sensor Networks." Scholar Commons, 2010. https://scholarcommons.usf.edu/etd/1807.
Full textDavis, Joseph A. Sr. "An analysis of network and sensor performance within IEEE 802.x wireless MESH networks in the Tactical Network Topology (TNT)." Thesis, Monterey California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/2297.
Full textThe objective of this research is to analyze the network performance and sensor functionality, efficacy and usability of IEEE 802.x wireless MESH networks within a DoD Tactical network environment. Multiple sensor configurations operating with wireless MESH network technologies will be researched and analyzed for performance in expeditionary environment situations. Specifically, this thesis will attempt establish the foundation for the development of wireless MESH "network health" models by examining the performance of sensors operating within a MESH network and define which network performance metrics equate to good quality of service. This research will experiment with different application, sensor, and network configurations of currently available COTS components, such as, voice, video and data hardware. This thesis will lay the groundwork for wireless network MESH predictability, which will enable the optimal use of sensors within a tactical network environment.
Lieutenant Commander, United States Navy
Davis, Joseph A. "An analysis of network and sensor performance within IEEE 802.x wireless MESH networks in the Tactical Network Topology (TNT) /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FDavis.pdf.
Full textThesis Advisor(s): Alexander Bordetsky. Includes bibliographical references (p. 49-50). Also available online.
Pucci, Lorenzo, and Lorenzo Pucci. "Development of a Simulation Platform for Wireless Network Topology Inference." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019.
Find full textKakkar, Aditya. "Theoretical Investigation of a new OFDM Access-Network Topology (OTONES)." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-128712.
Full textTseng, Li-Ching, and 曾麗青. "Network Topology Display Problem." Thesis, 1994. http://ndltd.ncl.edu.tw/handle/48736757097714084161.
Full text國立交通大學
資訊管理研究所
82
Since networks continue to grow at a rapid pace and with greater complexity, to have an efficient network management system becomes more important than ever. The network topology display service is one of the essential services that Configuration Management provides. For most existing network management systems, this service is supported by either an X-window based drawing tool or an automatic detection and drawing procedure. When the network grows larger and becomes more complicate, user must spend a great deal of time in adjusting network devices’ ICON, so as to get a good graphic layout. How to acquire a symmetric network topology display is called the Network Topology Display Problem (NTDP). Usually, NTDP is solved by a two-step procedure. In the first step, Intra-subnetwork algorithms are developed according to the types of the subnetwork. such as Ring、Bus etc.. In the second step, the inter-subnetworks algorithm is used to adjust the relative position between subnetworks. A Heuristic method had been proposed to handle the inter-subnetworks display problem. However, this method has difficulties in solving large size problems. The purpose of this paper is to find an efficient and effectiveness inter-subnetworks algorithm. Three methods, Modified Heuristic Method、Operations Research Method, and Neural Network Methods, are proposed Computational results obtained from these four methods are analyzed with respect to their effectiveness, running speed, and complexity. From the analysis, the following conclusions can be drawn. The Modified Heuristic Method performs best when the number of subnetworks is less than 50. However, once the number of subnetworks is over 50, the Operations Research Method has the best result in both running time and effectiveness.
Li, Xiaozhou. "Ranch: a dynamic network topology." Thesis, 2004. http://hdl.handle.net/2152/1238.
Full textLi, Xiaozhou Plaxton C. Greg. "Ranch a dynamic network topology /." 2004. http://wwwlib.umi.com/cr/utexas/fullcit?p3143301.
Full text苗育本. "Topology of Hierarchiccal-Ring Network." Thesis, 1997. http://ndltd.ncl.edu.tw/handle/61050460376012937312.
Full textAnsari, Almas Yuan Xin. "Topology aggregation for networks with two additive metrics." 2004. http://etd.lib.fsu.edu/theses/available/etd-07122004-144319.
Full textAdvisor: Dr. Xin Yuan, Florida State University, College ofArts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed Sept. 24, 2004). Includes bibliographical references.
Costa, Fábio Rafael Azevedo. "Internet tomography : network topology discovery and network performance evaluation." Master's thesis, 2013. http://hdl.handle.net/1822/27830.
Full textDue to the security threats and complexity of network services, such as video conferencing, internet telephony or online gaming, which require high QoS guarantees, the need for monitoring and evaluating network performance, in order to promptly detect and face security threats and malfunctions, is crucial to the correct operation of networks and network-based services. As the internet evolves in size and diversity, these tasks become difficult and demanding. Moreover, administrative limitations can restrict the position and the scope of the links to be monitored, while legislation imposes limitations on the information that can be collected and exported for monitoring purposes and almost all organization can't monitor or have knowledge or evaluate the performance of the entire network. They only can do this to part of the network, which corresponds to their own network. In this thesis, we propose the use of tomographic techniques for network topology discovery and performance evaluation. Network tomography studies the internal characteristics of the network using end-to-end probes, ie, it does not need the cooperation of the internal nodes of the network and can be successfully adopted in almost all scenarios. Thus, it is possible to have knowledge of the network characteristics out of the administrative borders. In this thesis we propose a new approach to Probe Packet Sandwich, where we use TTL-limited probes to infer the delay of a path hop-by-hop. We have shown that this approach is more effective than existing ones. This work was developed under the ERASMUS student mobility program, in the Telecommunication Networks Research Group, Dept. of Information Engineering, University of Pisa.
Devido às ameaças de segurança e complexidade dos serviços de rede, tais como videoconferência, telefonia via Internet ou jogos on-line, que exigem altas garantias de QoS, a necessidade de monotorização e avaliação de desempenho da rede, a fim de detectar prontamente e enfrentar as ameaças de segurança e mau funcionamento, é crucial para o correto funcionamento das redes e serviços baseados em rede. À medida que a Internet evolui em tamanho e diversidade, essas tarefas tornam-se difíceis e exigentes. Além disso, as limitações administrativas podem restringir a posição e o alcance dos links a serem monitorizados, enquanto a legislação impõe limitações sobre as informações que podem ser coletadas e exportadas para fins de monotorização e quase todas as organizações não podem controlar ou ter conhecimento ou avaliar o desempenho de toda a rede. Eles só podem fazer isso a parte da rede, o que corresponde à sua própria rede. Neste trabalho, nós propomos o uso de técnicas tomográficas para a descoberta da topologia da rede e avaliação de desempenho. A tomografia de rede estuda as características internas da rede usando medições fim-a-fim, ou seja, não necessita da ajuda dos nós internos da rede, podendo ser adoptadas com sucesso em quase todos os cenários. Desta maneira é possível obter conhecimento das características da rede para além dos limites administrativos. Neste tranalho propomos uma nova abordagem do Packet Sandwich Probe, onde utilizamos pacotes TTL-Limited para inferir o delay de um path hop-by-hop. Nós mostramos que esta abordagem é mais eficaz que outras já existentes. Este trabalho foi desenvolvido no âmbito do programa de mobilidade de estudantes ERASMUS, no Grupo de Investigação em Redes de Telecomunicações, Departamento de Engenharia de Informação da Universidade de Pisa.