Proceedings of the ACM Turing 50th Celebration Conference - China 2017
DOI: 10.1145/3063955.3063990
|View full text |Cite
|
Sign up to set email alerts
|

Taming both predictable and unpredictable link failures for network tomography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…The work of Ren et al [7] proposed algorithms to determine which link metrics can be identified and where to place monitors to maximize the number of identifiable links, subject to a bounded number of link failures. Additive metric tomography was also studied in [8], [9], to identify of additive link metrics under topology changes.…”
Section: Related Workmentioning
confidence: 99%
“…The work of Ren et al [7] proposed algorithms to determine which link metrics can be identified and where to place monitors to maximize the number of identifiable links, subject to a bounded number of link failures. Additive metric tomography was also studied in [8], [9], to identify of additive link metrics under topology changes.…”
Section: Related Workmentioning
confidence: 99%
“…Fan and Li [16] proposed a method of estimating link delay by using sparse Bayesian learning. Li et al [17] proposed a method of determining the minimum monitor arrangement under which the performance metric of all links can be estimated even when the topology is changed, based on the assumption that the monitor node can freely select the measurement paths. More recently, Tootaghaj et al [18] showed the optimal selection of monitoring paths considering the trade-off of identifiability and probing cost.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, we aim at the problem of how to understand the underlying routing topology from a node to a set of other nodes in a network, where all internal nodes (e.g., routers and three-layer switcher) may refuse to return any information about topology. The information of underlying routing topology of a network is particularly useful for many applications such as failure link diagnosis [25], [26], P2P network optimization [27], and link performance parameter inference [28]. For example, the works presented in [25] and [26] focus on the problem of discovering and localizing the failure links in networks by combining the topology and other path-level performance information under the assumption that the underlying routing topology is known.…”
Section: Problem Statement a Model And Assumptionmentioning
confidence: 99%
“…The information of underlying routing topology of a network is particularly useful for many applications such as failure link diagnosis [25], [26], P2P network optimization [27], and link performance parameter inference [28]. For example, the works presented in [25] and [26] focus on the problem of discovering and localizing the failure links in networks by combining the topology and other path-level performance information under the assumption that the underlying routing topology is known. Hence, understanding the underlying routing topology is a necessary preliminary work if those methods can be applied to actual networks.…”
Section: Problem Statement a Model And Assumptionmentioning
confidence: 99%