基于丟包率的多播網(wǎng)絡(luò)拓?fù)渫茢嘌芯?/H1>
發(fā)布時(shí)間:2018-10-08 19:31
【摘要】:現(xiàn)如今,計(jì)算機(jī)網(wǎng)絡(luò)已經(jīng)逐漸成為我們信息社會(huì)的支柱,因而網(wǎng)絡(luò)中存在的問(wèn)題也日益顯現(xiàn)出來(lái)。尤其是在網(wǎng)絡(luò)安全領(lǐng)域中,對(duì)大型網(wǎng)絡(luò)的檢測(cè)和保護(hù)。由于網(wǎng)絡(luò)出現(xiàn)不良狀況的因素多樣,為了檢測(cè)不良狀況產(chǎn)生的原因,網(wǎng)絡(luò)管理員必須探測(cè)網(wǎng)絡(luò)中的元素即網(wǎng)絡(luò)設(shè)備來(lái)收集相關(guān)數(shù)據(jù)。但是網(wǎng)絡(luò)規(guī)模日益擴(kuò)大,網(wǎng)絡(luò)管理員已無(wú)法直接獲取網(wǎng)絡(luò)中的元素,且傳統(tǒng)的拓?fù)渫茰y(cè)方法已無(wú)法滿足管理員獲取網(wǎng)絡(luò)元素的需要,因此使用新興的技術(shù)——網(wǎng)絡(luò)斷層掃描(Network Tomography, NT)技術(shù)進(jìn)行網(wǎng)絡(luò)拓?fù)渫茰y(cè)。該技術(shù)在不需要內(nèi)部網(wǎng)絡(luò)設(shè)備協(xié)作的情況下,僅依靠在邊緣設(shè)備測(cè)量得到的性能屬性,利用兄弟節(jié)點(diǎn)的相關(guān)性原理來(lái)判斷已知網(wǎng)絡(luò)設(shè)備間的關(guān)系,然后推斷網(wǎng)絡(luò)內(nèi)部的連接情況。利用該方法可以彌補(bǔ)傳統(tǒng)網(wǎng)絡(luò)拓?fù)渥R(shí)別方法的不足,因此論文主要研究網(wǎng)絡(luò)斷層掃描技術(shù)在網(wǎng)絡(luò)拓?fù)渫茰y(cè)方向的應(yīng)用。 首先介紹了NT技術(shù)的研究背景、意義以及NT技術(shù)的原理、測(cè)量方法和推斷模型。 其次介紹了網(wǎng)絡(luò)拓?fù)浣Y(jié)構(gòu)推斷的方法,該部分內(nèi)容屬于文章的重點(diǎn)內(nèi)容,分析了傳統(tǒng)網(wǎng)絡(luò)推測(cè)方法的應(yīng)用局限性以及基于NT技術(shù)的網(wǎng)絡(luò)拓?fù)渫茢喾椒ǖ膬?yōu)勢(shì)。論文使用的基于NT技術(shù)的推斷方法將網(wǎng)絡(luò)丟包率作為推斷的參數(shù),使用多播測(cè)量的方法獲取終端節(jié)點(diǎn)的丟包率,利用丟失率作為參數(shù)進(jìn)行拓?fù)渫茰y(cè),剖析并比較現(xiàn)有多播網(wǎng)絡(luò)拓?fù)渫茢嗨惴ǖ膬?yōu)勢(shì)及不足之處,在此基礎(chǔ)上,提出一種更優(yōu)的拓?fù)渫茢嗨惴ā狧TIP算法。該算法根據(jù)節(jié)點(diǎn)的丟包情況去計(jì)算兩兩節(jié)點(diǎn)間的海明碼距,利用兄弟節(jié)點(diǎn)間相似性較大的特點(diǎn)對(duì)拓?fù)浣Y(jié)構(gòu)進(jìn)行合理的推斷。 隨后介紹了網(wǎng)絡(luò)仿真模擬軟件NS2的仿真模擬原理,使用NS2模擬多播網(wǎng)絡(luò)發(fā)包,測(cè)量獲取節(jié)點(diǎn)性能參數(shù),并對(duì)HTIP算法和BFHC算法進(jìn)行分析比較,結(jié)果顯示HTIP算法具有更優(yōu)的性能。 在文章的最后,講解了信息可視化在基于NT技術(shù)的拓?fù)渫茢喾较虻倪\(yùn)用以及目前常用的信息可視化的布局算法,選擇合適的方法對(duì)網(wǎng)絡(luò)設(shè)備及鏈路等進(jìn)行存儲(chǔ)以及對(duì)拓?fù)渫茢噙^(guò)程進(jìn)行可視化的動(dòng)態(tài)顯示,使用C#語(yǔ)言對(duì)可視化軟件進(jìn)行編寫(xiě),以一種整齊、美觀的方式展現(xiàn)拓?fù)渫茢嗟倪^(guò)程。
[Abstract]:Nowadays, the computer network has gradually become the pillar of our information society. Especially in the field of network security, the detection and protection of large networks. In order to detect the causes of the bad condition, the network administrator must detect the element in the network, that is, the network equipment, to collect the relevant data. However, with the increasing scale of the network, the network administrator has been unable to directly obtain the elements in the network, and the traditional topology speculation method can no longer meet the needs of the administrator to obtain the network elements. Therefore, network tomographic (Network Tomography, NT) technology is used to speculate the network topology. Under the condition of not requiring the cooperation of internal network devices, the technology only depends on the performance attributes measured in edge devices, and uses the correlation principle of brother nodes to judge the known relationships between network devices. The connection inside the network is then inferred. This method can make up for the shortcomings of the traditional network topology identification method, so this paper mainly studies the application of network tomography technology in network topology estimation. Firstly, the research background, significance, principle, measurement method and inference model of NT technology are introduced. Secondly, the paper introduces the method of network topology inference, which belongs to the main content of this paper. The limitations of traditional network inference methods and the advantages of network topology inference methods based on NT technology are analyzed. The inference method based on NT technology takes the network packet loss rate as the inferential parameter, uses the multicast measurement method to obtain the terminal node packet loss rate, and uses the loss rate as the parameter to carry on the topological inference. This paper analyzes and compares the advantages and disadvantages of the existing multicast network topology inference algorithms. On this basis, a better topology inference algorithm, HTIP algorithm, is proposed. The algorithm calculates the distance between two nodes according to the loss of packets, and deduces the topological structure reasonably by using the characteristics of the similarity between the two nodes. Then the paper introduces the simulation principle of network simulation software NS2, uses NS2 to simulate multicast network delivery, measures and acquires node performance parameters, and analyzes and compares the HTIP algorithm and BFHC algorithm. The results show that HTIP algorithm has better performance. At the end of the paper, the application of information visualization in topology inference based on NT technology and the layout algorithm of information visualization are explained. Choosing the appropriate method to store network equipment and link and visualize the process of topological inference, we use C # language to write the visualization software, and show the process of topological inference in a neat and beautiful way.
【學(xué)位授予單位】:蘭州交通大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.02
【參考文獻(xiàn)】
相關(guān)期刊論文 前9條
1 趙洪華;丁科;陳鳴;張婷婷;金鳳林;賀汛;;采用單測(cè)量源的拓?fù)渫茢嗨惴╗J];電子科技大學(xué)學(xué)報(bào);2010年02期
2 趙洪華;陳鳴;魏鎮(zhèn)韓;;基于測(cè)量聚類的網(wǎng)絡(luò)拓?fù)渫茢嗨惴╗J];東南大學(xué)學(xué)報(bào)(自然科學(xué)版);2008年S1期
3 劉彥娟;楊秋翔;;網(wǎng)絡(luò)拓?fù)浒l(fā)現(xiàn)算法的研究[J];電腦開(kāi)發(fā)與應(yīng)用;2010年03期
4 張宏莉,方濱興,胡銘曾,姜譽(yù),詹春艷,張樹(shù)峰;Internet測(cè)量與分析綜述[J];軟件學(xué)報(bào);2003年01期
5 趙洪華;陳鳴;;基于網(wǎng)絡(luò)層析成像技術(shù)的拓?fù)渫茢郲J];軟件學(xué)報(bào);2010年01期
6 楊國(guó)正;陸余良;夏陽(yáng);;計(jì)算機(jī)網(wǎng)絡(luò)拓?fù)浒l(fā)現(xiàn)技術(shù)研究[J];計(jì)算機(jī)工程與設(shè)計(jì);2006年24期
7 張偉明;羅軍勇;;網(wǎng)絡(luò)拓?fù)淇梢暬悗?kù)TopVisLibrary的設(shè)計(jì)與實(shí)現(xiàn)[J];計(jì)算機(jī)工程與設(shè)計(jì);2008年17期
8 張冬艷;胡銘曾;張宏莉;;基于測(cè)量的網(wǎng)絡(luò)性能評(píng)價(jià)方法研究[J];通信學(xué)報(bào);2006年10期
9 李勇軍;蔡皖東;王偉;田廣利;;基于端到端報(bào)文丟失的網(wǎng)絡(luò)拓?fù)渫茰y(cè)算法研究[J];通信學(xué)報(bào);2007年10期
,
本文編號(hào):2258006
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2258006.html
[Abstract]:Nowadays, the computer network has gradually become the pillar of our information society. Especially in the field of network security, the detection and protection of large networks. In order to detect the causes of the bad condition, the network administrator must detect the element in the network, that is, the network equipment, to collect the relevant data. However, with the increasing scale of the network, the network administrator has been unable to directly obtain the elements in the network, and the traditional topology speculation method can no longer meet the needs of the administrator to obtain the network elements. Therefore, network tomographic (Network Tomography, NT) technology is used to speculate the network topology. Under the condition of not requiring the cooperation of internal network devices, the technology only depends on the performance attributes measured in edge devices, and uses the correlation principle of brother nodes to judge the known relationships between network devices. The connection inside the network is then inferred. This method can make up for the shortcomings of the traditional network topology identification method, so this paper mainly studies the application of network tomography technology in network topology estimation. Firstly, the research background, significance, principle, measurement method and inference model of NT technology are introduced. Secondly, the paper introduces the method of network topology inference, which belongs to the main content of this paper. The limitations of traditional network inference methods and the advantages of network topology inference methods based on NT technology are analyzed. The inference method based on NT technology takes the network packet loss rate as the inferential parameter, uses the multicast measurement method to obtain the terminal node packet loss rate, and uses the loss rate as the parameter to carry on the topological inference. This paper analyzes and compares the advantages and disadvantages of the existing multicast network topology inference algorithms. On this basis, a better topology inference algorithm, HTIP algorithm, is proposed. The algorithm calculates the distance between two nodes according to the loss of packets, and deduces the topological structure reasonably by using the characteristics of the similarity between the two nodes. Then the paper introduces the simulation principle of network simulation software NS2, uses NS2 to simulate multicast network delivery, measures and acquires node performance parameters, and analyzes and compares the HTIP algorithm and BFHC algorithm. The results show that HTIP algorithm has better performance. At the end of the paper, the application of information visualization in topology inference based on NT technology and the layout algorithm of information visualization are explained. Choosing the appropriate method to store network equipment and link and visualize the process of topological inference, we use C # language to write the visualization software, and show the process of topological inference in a neat and beautiful way.
【學(xué)位授予單位】:蘭州交通大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.02
【參考文獻(xiàn)】
相關(guān)期刊論文 前9條
1 趙洪華;丁科;陳鳴;張婷婷;金鳳林;賀汛;;采用單測(cè)量源的拓?fù)渫茢嗨惴╗J];電子科技大學(xué)學(xué)報(bào);2010年02期
2 趙洪華;陳鳴;魏鎮(zhèn)韓;;基于測(cè)量聚類的網(wǎng)絡(luò)拓?fù)渫茢嗨惴╗J];東南大學(xué)學(xué)報(bào)(自然科學(xué)版);2008年S1期
3 劉彥娟;楊秋翔;;網(wǎng)絡(luò)拓?fù)浒l(fā)現(xiàn)算法的研究[J];電腦開(kāi)發(fā)與應(yīng)用;2010年03期
4 張宏莉,方濱興,胡銘曾,姜譽(yù),詹春艷,張樹(shù)峰;Internet測(cè)量與分析綜述[J];軟件學(xué)報(bào);2003年01期
5 趙洪華;陳鳴;;基于網(wǎng)絡(luò)層析成像技術(shù)的拓?fù)渫茢郲J];軟件學(xué)報(bào);2010年01期
6 楊國(guó)正;陸余良;夏陽(yáng);;計(jì)算機(jī)網(wǎng)絡(luò)拓?fù)浒l(fā)現(xiàn)技術(shù)研究[J];計(jì)算機(jī)工程與設(shè)計(jì);2006年24期
7 張偉明;羅軍勇;;網(wǎng)絡(luò)拓?fù)淇梢暬悗?kù)TopVisLibrary的設(shè)計(jì)與實(shí)現(xiàn)[J];計(jì)算機(jī)工程與設(shè)計(jì);2008年17期
8 張冬艷;胡銘曾;張宏莉;;基于測(cè)量的網(wǎng)絡(luò)性能評(píng)價(jià)方法研究[J];通信學(xué)報(bào);2006年10期
9 李勇軍;蔡皖東;王偉;田廣利;;基于端到端報(bào)文丟失的網(wǎng)絡(luò)拓?fù)渫茰y(cè)算法研究[J];通信學(xué)報(bào);2007年10期
,本文編號(hào):2258006
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2258006.html