4,915 research outputs found
Active Learning of Multiple Source Multiple Destination Topologies
We consider the problem of inferring the topology of a network with
sources and receivers (hereafter referred to as an -by- network), by
sending probes between the sources and receivers. Prior work has shown that
this problem can be decomposed into two parts: first, infer smaller subnetwork
components (i.e., -by-'s or -by-'s) and then merge these components
to identify the -by- topology. In this paper, we focus on the second
part, which had previously received less attention in the literature. In
particular, we assume that a -by- topology is given and that all
-by- components can be queried and learned using end-to-end probes. The
problem is which -by-'s to query and how to merge them with the given
-by-, so as to exactly identify the -by- topology, and optimize a
number of performance metrics, including the number of queries (which directly
translates into measurement bandwidth), time complexity, and memory usage. We
provide a lower bound, , on the number of
-by-'s required by any active learning algorithm and propose two greedy
algorithms. The first algorithm follows the framework of multiple hypothesis
testing, in particular Generalized Binary Search (GBS), since our problem is
one of active learning, from -by- queries. The second algorithm is called
the Receiver Elimination Algorithm (REA) and follows a bottom-up approach: at
every step, it selects two receivers, queries the corresponding -by-, and
merges it with the given -by-; it requires exactly steps, which is
much less than all possible -by-'s. Simulation results
over synthetic and realistic topologies demonstrate that both algorithms
correctly identify the -by- topology and are near-optimal, but REA is
more efficient in practice
Active Topology Inference using Network Coding
Our goal is to infer the topology of a network when (i) we can send probes
between sources and receivers at the edge of the network and (ii) intermediate
nodes can perform simple network coding operations, i.e., additions. Our key
intuition is that network coding introduces topology-dependent correlation in
the observations at the receivers, which can be exploited to infer the
topology. For undirected tree topologies, we design hierarchical clustering
algorithms, building on our prior work. For directed acyclic graphs (DAGs),
first we decompose the topology into a number of two-source, two-receiver
(2-by-2) subnetwork components and then we merge these components to
reconstruct the topology. Our approach for DAGs builds on prior work on
tomography, and improves upon it by employing network coding to accurately
distinguish among all different 2-by-2 components. We evaluate our algorithms
through simulation of a number of realistic topologies and compare them to
active tomographic techniques without network coding. We also make connections
between our approach and alternatives, including passive inference, traceroute,
and packet marking
Recommended from our members
A Survey on Cooperative Longitudinal Motion Control of Multiple Connected and Automated Vehicles
The Pandora multi-algorithm approach to automated pattern recognition of cosmic-ray muon and neutrino events in the MicroBooNE detector
The development and operation of Liquid-Argon Time-Projection Chambers for
neutrino physics has created a need for new approaches to pattern recognition
in order to fully exploit the imaging capabilities offered by this technology.
Whereas the human brain can excel at identifying features in the recorded
events, it is a significant challenge to develop an automated, algorithmic
solution. The Pandora Software Development Kit provides functionality to aid
the design and implementation of pattern-recognition algorithms. It promotes
the use of a multi-algorithm approach to pattern recognition, in which
individual algorithms each address a specific task in a particular topology.
Many tens of algorithms then carefully build up a picture of the event and,
together, provide a robust automated pattern-recognition solution. This paper
describes details of the chain of over one hundred Pandora algorithms and tools
used to reconstruct cosmic-ray muon and neutrino events in the MicroBooNE
detector. Metrics that assess the current pattern-recognition performance are
presented for simulated MicroBooNE events, using a selection of final-state
event topologies.Comment: Preprint to be submitted to The European Physical Journal
Network monitoring in multicast networks using network coding
In this paper we show how information contained in robust network codes can be used for passive inference of possible locations of link failures or losses in a network. For distributed randomized network coding, we bound the probability of being able to distinguish among a given set of failure events, and give some experimental results for one and two link failures in randomly generated networks. We also bound the required field size and complexity for designing a robust network code that distinguishes among a given set of failure events
Sharing Representative Internet Topologies
This material is based upon work supported by the Department of Homeland Security, and Space an
Exploring networks with traceroute-like probes: theory and simulations
Mapping the Internet generally consists in sampling the network from a
limited set of sources by using traceroute-like probes. This methodology, akin
to the merging of different spanning trees to a set of destination, has been
argued to introduce uncontrolled sampling biases that might produce statistical
properties of the sampled graph which sharply differ from the original ones. In
this paper we explore these biases and provide a statistical analysis of their
origin. We derive an analytical approximation for the probability of edge and
vertex detection that exploits the role of the number of sources and targets
and allows us to relate the global topological properties of the underlying
network with the statistical accuracy of the sampled graph. In particular, we
find that the edge and vertex detection probability depends on the betweenness
centrality of each element. This allows us to show that shortest path routed
sampling provides a better characterization of underlying graphs with broad
distributions of connectivity. We complement the analytical discussion with a
throughout numerical investigation of simulated mapping strategies in network
models with different topologies. We show that sampled graphs provide a fair
qualitative characterization of the statistical properties of the original
networks in a fair range of different strategies and exploration parameters.
Moreover, we characterize the level of redundancy and completeness of the
exploration process as a function of the topological properties of the network.
Finally, we study numerically how the fraction of vertices and edges discovered
in the sampled graph depends on the particular deployements of probing sources.
The results might hint the steps toward more efficient mapping strategies.Comment: This paper is related to cond-mat/0406404, with explorations of
different networks and complementary discussion
- âŠ