高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

带宽延迟约束的层次化网络监测模型

刘湘辉 景宁 殷建平 李军 靳肖闪

刘湘辉, 景宁, 殷建平, 李军, 靳肖闪. 带宽延迟约束的层次化网络监测模型[J]. 电子与信息学报, 2008, 30(3): 712-716. doi: 10.3724/SP.J.1146.2006.01316
引用本文: 刘湘辉, 景宁, 殷建平, 李军, 靳肖闪. 带宽延迟约束的层次化网络监测模型[J]. 电子与信息学报, 2008, 30(3): 712-716. doi: 10.3724/SP.J.1146.2006.01316
Liu Xinag-hui, Jing Ning, Yin Jian-ping, Li Jun, Jin Xiao-shan. The Hierarchical Network Monitoring Model with Bounded Bandwidth and Delay Constraints[J]. Journal of Electronics & Information Technology, 2008, 30(3): 712-716. doi: 10.3724/SP.J.1146.2006.01316
Citation: Liu Xinag-hui, Jing Ning, Yin Jian-ping, Li Jun, Jin Xiao-shan. The Hierarchical Network Monitoring Model with Bounded Bandwidth and Delay Constraints[J]. Journal of Electronics & Information Technology, 2008, 30(3): 712-716. doi: 10.3724/SP.J.1146.2006.01316

带宽延迟约束的层次化网络监测模型

doi: 10.3724/SP.J.1146.2006.01316
基金项目: 

国家自然科学基金(60373023)和中国博士后科学基金(20060400257)资助课题

The Hierarchical Network Monitoring Model with Bounded Bandwidth and Delay Constraints

  • 摘要: 如何既准确获取监测数据,又减少监测过程对实际网络传输数据的影响是网络研究的一个根本问题。该文提出了层次化网络测量模型,强调数据聚集过程的传输延迟和监测数据流量占用链路的带宽都小于预设数值同时,尽量追求聚集节点数目最小化。求解该模型的问题是NP难的,在节点间路由唯一的情况下,该文设计的近似算法的近似程度为lnd+1,其中d是监测节点的数量。
  • Asgari A, Trimintzios P, Irons M, Pavlou G, Egan R, andden Berghe S V. A scalable real-time monitoring system forsupporting traffic engineering. In: Proc. of the IEEEWorkshop on IP Operations and Management, Dallas, 2002:202-297.[2]Breitbart Y, Chan CY, Garofalakis M, Rastogi R, andSilberschatz A. Efficiently monitoring bandwidth and latencyin IP networks. In: Proc. of the IEEE INFOCOM, Anchorage,2001: 933-942.[3]Liotta A, Pavlou G, and Knight G J. Active distributedmonitoring for dynamic large-scale networks. Proceedings ofthe IEEE International Conference on Communications(ICC'01), Helsinki, Finland, June 2001, Vol. 5: 1544~1550.[4]Liotta A, Pavlou G, and Knight G. Exploiting agent mobility forlarge scale network monitoring [J]. IEEE Network, special issueon Applicability of Mobile Agents to Telecommunications, 2002,16(3): 7-15.[5]Liu X H, Yin J P, Tang L L, and Zhao J M. Analysis ofefficient monitoring method for the network flow [J]. Journalof Software, 2003, 14(2): 300-304.(in Chinese with Englishabstract).[6]Li L, Thottan M, Yao B, and Paul S. Distributed networkmonitoring with bounded link utilization in IP networks. In:Proc. of the IEEE INFOCOM, San Francisco, 2003:1189-1198.[7]Liu X H, Yin J P, Lu X C, Cai Z P, and Z J M. Thedistributed monitoring model with bounded delay constraints[J].Wuhan University Journal of Natural Science.2004, 9(4):429-434[8]Thottan M, Li L, Yao B, Mirrokni V S, and Paul S.Distributed network monitoring for evolving IP networks. In:Proc. of the 24th Int'l Conf. on Distributed ComputingSystems, Hachioji: 2004: 712-719.[9]Cai Z P, Yin J P, Liu F, and Liu X H. Distributed monitoringmodel with bounded delay[J].Journal of Software.2006, 17(1):117-123[10]Waxman B M. Routing of multipoint connections [J].IEEEJournal on Selected Areas in Communications.1988, 6(9):1617-1622
  • 加载中
计量
  • 文章访问数:  2963
  • HTML全文浏览量:  86
  • PDF下载量:  686
  • 被引次数: 0
出版历程
  • 收稿日期:  2006-09-06
  • 修回日期:  2007-04-30
  • 刊出日期:  2008-03-19

目录

    /

    返回文章
    返回