Advanced Search
Volume 30 Issue 3
Dec.  2010
Turn off MathJax
Article Contents
Liu Xinag-hui, Jing Ning, Yin Jian-ping, Li Jun, Jin Xiao-shan. The Hierarchical Network Monitoring Model with Bounded Bandwidth and Delay Constraints[J]. Journal of Electronics & Information Technology, 2008, 30(3): 712-716. doi: 10.3724/SP.J.1146.2006.01316
Citation: Liu Xinag-hui, Jing Ning, Yin Jian-ping, Li Jun, Jin Xiao-shan. The Hierarchical Network Monitoring Model with Bounded Bandwidth and Delay Constraints[J]. Journal of Electronics & Information Technology, 2008, 30(3): 712-716. doi: 10.3724/SP.J.1146.2006.01316

The Hierarchical Network Monitoring Model with Bounded Bandwidth and Delay Constraints

doi: 10.3724/SP.J.1146.2006.01316
  • Received Date: 2006-09-06
  • Rev Recd Date: 2007-04-30
  • Publish Date: 2008-03-19
  • Designing optimal monitoring infrastructure is a key step for network monitoring. In this paper the problem of optimizing a hierarchical monitoring system is to reduce the cost of deployment of the monitoring infrastructure by identifying a minimum aggregating set subject to bandwidth constraints on the individual links and delay constraint on the aggregating path. The problem is NP-hard and approximation algorithm is proposed with performance guarantee ln d + 1 under unique aggregating route, where d is the number of monitoring object.
  • loading
  • Asgari A, Trimintzios P, Irons M, Pavlou G, Egan R, andden Berghe S V. A scalable real-time monitoring system forsupporting traffic engineering. In: Proc. of the IEEEWorkshop on IP Operations and Management, Dallas, 2002:202-297.[2]Breitbart Y, Chan CY, Garofalakis M, Rastogi R, andSilberschatz A. Efficiently monitoring bandwidth and latencyin IP networks. In: Proc. of the IEEE INFOCOM, Anchorage,2001: 933-942.[3]Liotta A, Pavlou G, and Knight G J. Active distributedmonitoring for dynamic large-scale networks. Proceedings ofthe IEEE International Conference on Communications(ICC'01), Helsinki, Finland, June 2001, Vol. 5: 1544~1550.[4]Liotta A, Pavlou G, and Knight G. Exploiting agent mobility forlarge scale network monitoring [J]. IEEE Network, special issueon Applicability of Mobile Agents to Telecommunications, 2002,16(3): 7-15.[5]Liu X H, Yin J P, Tang L L, and Zhao J M. Analysis ofefficient monitoring method for the network flow [J]. Journalof Software, 2003, 14(2): 300-304.(in Chinese with Englishabstract).[6]Li L, Thottan M, Yao B, and Paul S. Distributed networkmonitoring with bounded link utilization in IP networks. In:Proc. of the IEEE INFOCOM, San Francisco, 2003:1189-1198.[7]Liu X H, Yin J P, Lu X C, Cai Z P, and Z J M. Thedistributed monitoring model with bounded delay constraints[J].Wuhan University Journal of Natural Science.2004, 9(4):429-434[8]Thottan M, Li L, Yao B, Mirrokni V S, and Paul S.Distributed network monitoring for evolving IP networks. In:Proc. of the 24th Int'l Conf. on Distributed ComputingSystems, Hachioji: 2004: 712-719.[9]Cai Z P, Yin J P, Liu F, and Liu X H. Distributed monitoringmodel with bounded delay[J].Journal of Software.2006, 17(1):117-123[10]Waxman B M. Routing of multipoint connections [J].IEEEJournal on Selected Areas in Communications.1988, 6(9):1617-1622
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2982) PDF downloads(686) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return